Anonymous ID: a8af5b June 13, 2020, 6:40 a.m. No.9596991   🗄️.is 🔗kun

Request for help from W&W (or any CyberFag, really – who knows anything about Stegano).

 

See the attached image.

 

It's a screengrab of an html report of the comparison of the two seemingly "identical" (covertext) 'American Flag' images in QDrops #3908 & #3983. (I just chose those two as my starting place; nothing special beyond that.) If you toss them as .pngs into WinMerge, it tells you they are "identical files". This is plainly BS, because one is 23kb & the other is 30kb.

 

So I simply changed the file extensions on copies of both, to .txt – and dropped them back into WinMerge a second time, as those. The first attached image is the result of the diffing.

 

They obviously differ, and they differ in enough ways a lot could be hidden in there. A lot. More than just key – actual cryptic plaintext.

 

I haven't an effing clue how to extract – not even extract something enciphered, that I can't read anyway b/c enciphered. One step at a time.

 

So, yeah, "You have more than you know". I know it is there. It's like having a strongbox that if you tip it back and forth, you can hear something sliding in the box. But you can't open the box; it's locked.

 

So, now, where do I go find the keys or, at least, the appropriate kind of crowbars, TNT and fuses, cryptographically and stenographically speaking, to crack this – or at least pry at the lid feebly.

 

Throw me a fricking bone, here.

 

Thank you for any help you may be able to provide.