[–]▶ daf460 (35) No.11365550>>11365569 >>11365651 >>11365723 >>11366102 >>11366185 >>11366461 >>11366502 >>11367555 >>11367878 >>11368544 [Watch Thread][Show All Posts]
INVESTIGATION HELP NEEDED Hidden photos on an image hosting site
As someone posted a few days ago on 4c 8c & here the search terms that give the cp results in the images come from the site img src at first look nothing really suspicious is to be seen on the site no really explicit photos of kids can be found other than upskirt, swimsuit, etc. except for when you look at the people a) commenting on the photos trading photos via mail (?) b) photos of flowers, cars, etc. commented by pedophiles talking about stuff other than in the photo
Can anyone please investigate this and see if there is more to this.
NOTICE THE COMMENTS ON A PHOTO OF A TRACTOR
screenshot of the tractor photo with comments
the tractor photo
screenshot of flower photos notice comments and SAME photo posted 10x in the album
BANNED URL SO CAN'T POST: /pharnisluvsyung/30034761.html?id=30034761
▶ daf460 (35) No.11365552
I have been banned on voat for asking help on this.
I know for sure there are also misinformists there because only irrelevant topics get upvoted others get downvoted or just deleted like mine did.
DO NOT REPORT THE SITE
THAT DOES NOT HELP
they just shut it down and make it even harder to find
this does not SOLVE anything
▶ ca727a (1) No.11365569
>>11365550 (OP)
Puh?
Ph…?
Po?
Poo?
Ih?
Ihnnn?
Innn?
Luh?
Lh?
Loo?
▶ 6769f7 (1) No.11365638
I've long since lost my steganography tools and not really wanting to dig, to be honest. Some quick thoughts:
>note the size of the file
>copy the full-size image (not the file) to any other image utility I like irfanview and save it as the same type with good quality settings
>compare sizes
They could be just fucking around, but their whole ethos disgusts me and I can't bring myself to look at it too long. The hidden thing is probably not another entire image, more likely a URL. You could maybe find this unencrypted in the file depending on how they operate.
▶ 14ddb4 (8) No.11365646
Some of them might just be generated comments to make the website seem more active than it is.
▶ bad011 (2) No.11365651>>11365659
>>11365550 (OP)
I'm a shitty phone poster so I can't try right now, but can you open the original picture with winRAR? Old /b/ used this to share cp.
▶ 14ddb4 (8) No.11365659>>11365669
>>11365651
Look at the file name in >>11365555
>imgsrc.ru_55122461LzA.rar.jpg
>55122461LzA.rar
You might be right. I'm not checking.
▶ bad011 (2) No.11365669>>11365703
>>11365659
I hadn't even noticed that yet. The pictures posted there are too small though, so they most likely won't contain cp. The originals on the Russian website may though.
▶ daf460 (35) No.11365671>>11365674
I tried opening it in rar or zip didn't work
stegdetect didn't open anything
I just can't find any other explanation
▶ 14ddb4 (8) No.11365674
>>11365671
Save a few different copies of the flower one and see if they have different hashes.
▶ daf460 (35) No.11365695
idk if it means anything but the photos with hidden content end with C8 or C6
▶ 193bb4 (24) No.11365697>>11365731 >>11365874 >>11366439
>>11365686
>355D9BDD14871BE2A91561715B9EA2D2972240522E626985D2D2019296A0A1E9
>>11365555
>EB4C8B0137153F0B04CFE376A3B5A2BF78333EE5D81EEB9B65F3FB0C9A214F50
Correct me if I'm wrong, but even if they have different file types, the same image should have the same hash correct?
▶ daf460 (35) No.11365703
>>11365669
what do you mean originals this is from the site
▶ d348a2 (42) No.11365723>>11365773
>>11365550 (OP)
>screenshot of flower photos notice comments and SAME photo posted 10x in the album
If hashes differ but the img res and overall appearances are identical (no filters, resize, blurring, etc), then steg is in use.
▶ ad5ab4 (10) No.11365731>>11365874
>>11365697
Files are just bytes of data, so they should have the same hash regardless of file type. But if the file was compressed or saved using another program, it could have lost some of the original bytes from the original site.
▶ 78b21c (5) No.11365733>>11365758 >>11365879
>i m g s r c . r u/main/user.php?user=dadoftween
>DadOfTweens
>"User info: Daddy of tween girls. Keen photographer who appreciates female beauty."
User has password protected albums classified under "kids"
▶ 47c5e9 (3) No.11365745
This shit makes me sick. Can someone try using wget to detect metadata in the photos? I am learning how to right now but won't have time to finish before I start work.
▶ 541201 (9) No.11365758>>11365762 >>11365769 >>11365984
>>11365733
Pic related is in album "Fund with Dad."
▶ d348a2 (42) No.11365761
My best guess for attack would be to do a simple dictionary attack with steghide and other steg tools.
▶ 541201 (9) No.11365762
>>11365758
His password is: 12345
▶ daf460 (35) No.11365768>>11365774
I just don't get how these pedophiles could be this intelligent and have this super intricate way of hiding photos and communicating.
▶ 541201 (9) No.11365769>>11365782 >>11374200
>>11365758
From one of his password-protected albums.
▶ 193bb4 (24) No.11365773>>11365776 >>11365786
>>11365723
So pic related from an old ass thread here is steg?
▶ 541201 (9) No.11365774>>11365777
>>11365768
You'd be surprised what the threat of prison on a sex offense will motivate you to do.
▶ d348a2 (42) No.11365776
>>11365773
I don't know of gif steg apps. Very bad example from you.
▶ daf460 (35) No.11365777>>11365781 >>11365801
>>11365774
I really never expected that and the cp sites always look like they were made in 1999 with html they often also use their real name in the username….
▶ d348a2 (42) No.11365781>>11365788
>>11365777
Don't mind the honeypots!
▶ daf460 (35) No.11365782>>11365785 >>11365893
>>11365769
good find
so buds is code for ….
▶ d348a2 (42) No.11365785
▶ 193bb4 (24) No.11365786>>11365796 >>11365803
>>11365773
Well that's creepy. They are in fact steg. I just opened them as zip files and they contain .opus audio files.
▶ da39b7 (4) No.11365787>>11365896
I cannot stand this stuff.
▶ 193bb4 (24) No.11365788>>11365798
>>11365781
This to be honest, I would be amazed if these files weren't packed with canaries.
▶ d348a2 (42) No.11365793
I'm sure the real deal guys use a preconfigured pair of VMs, one containing Tor, I2P, IPFS, and other darknet onramps, while the second VM is the 'view' VM, and skip the 'website' shit. Pro points if it's two physical machines, one behind the other, with the gateway's uplink further clamped.
▶ daf460 (35) No.11365796>>11365809
>>11365786
i tried changing the file format and it didn't work for me
▶ da39b7 (4) No.11365798>>11365808 >>11365809
>>11365788
After some brief digging in the site, I would recommend anyone who wants to dig further use an amnesic OS.
Related: Is Tails still a good tool?
▶ 03e4af (1) No.11365801
>>11365777
they have been doing this shit for a while
like the old mods arnt lookin post sinks meme
these fgts need the rope
god speed with your diggin lads
▶ d348a2 (42) No.11365803>>11365879
>>11365786
>I just opened them as zip files
LOL ABSOLUTE PLEBEIAN STEG XDDDD
Here's some nickels pedokidz, buy yourselves some real steg solutions (like steghide)!
▶ d348a2 (42) No.11365808
>>11365798
Not just amnesiac, but sandboxed/isolated behind a fascist darknet gateway.
▶ 193bb4 (24) No.11365809>>11365812
>>11365796
It has to be zip. The file name should be "a.gif.zip". Not sure it matters, but I'm using 7zip to open it. The file won't open in vlc so I'm assuming you need to unzip all 5 to get the complete video.
>>11365798
An amnesiac OS doesn't help with canaries, they give away your IP. You need to be using Tor or another VPN, both in fact to be safe.
▶ d348a2 (42) No.11365812>>11365817 >>11365830
>>11365809
>You need to be using Tor or another VPN, both in fact to be safe.
Ummm no, the VPN suggestion proves this isn't your living.
Best way to avoid FreedomHosting like decloak is isolation behind a darknet gateway, no clearnet access.
▶ 193bb4 (24) No.11365817>>11365845 >>11365857
>>11365812
Thanks for the info. So would this stop a canary from getting your IP? If you just used a VPN would the canary be able to resolve your real IP, since it would be sending the notification from your actual computer?
▶ da39b7 (4) No.11365830>>11365845 >>11365849 >>11365857
>>11365812
So doesn't Tails solve this, as all of it's network activity is routed through Tor?
▶ f27b79 (1) No.11365833
Use a hex editor that can do a diff of 2 files. A large number of differences will probably mean the images were compressed differently, while a smaller number may point to deliberate changes to the data. (Could just be the metadata though.)
▶ daf460 (35) No.11365834>>11365841
weird that nobody checked a very obvious steg
related to the piz case
▶ 13974a (2) No.11365842>>11365861
Have you tried DDT extensions? Those are specifically made for imageboards.
▶ ad5ab4 (10) No.11365845>>11365849 >>11365906
>>11365817
Hard to trust a vpn you do not control, they all "claim" to be anonymous…
>>11365830
As long as Tails has no outside connection or dns leaks, or any other unknown exploits. I have never used it but I hear its secure?…I use "Whonix", a ltitle less mainstream
▶ 193bb4 (24) No.11365849>>11365856
>>11365845
>>11365830
I could be wrong, but last time I looked into TAILS it did in fact have a dns leak, this was a while ago however and the issue could have been remedied.
▶ daf460 (35) No.11365852
>>11365841
it's so obvious he's not refering to mrp in the photo but something else
▶ ad5ab4 (10) No.11365856>>11365865
>>11365849
Personally I dont trust Tails simply because how "mainstream" it is, and how it is pushed as the defacto tor os. Hopefully I'm just overly paranoid.
▶ d348a2 (42) No.11365857
>>11365830
TAILs will stop application layer exploits. TAILs cannot save you if any clearnet-facing software is exploited, such as Tor router itself, the kernel, the network manager, etc. SELinux should mitigate this though, except for kernel exploits or in misconfiguration cases.
Even VM isolation isn't perfect, Spectre+Meltdown crossed those lines and I'm sure that infoleak exploit is one of the tamer ones in the toolbag.
>>11365817
Yes, assuming VPN routing isn't strict. If it is strict and it routes over VPN, you're dumb to think the VPN won't sing on you.
▶ daf460 (35) No.11365861>>11365910
>>11365842
do you mean a tampermonkey script
▶ da39b7 (4) No.11365865>>11365867 >>11365875
>>11365856
I don't know what to think. Wikileaks promotes it, which could be viewed as a reason to use it. Snowden also recommends it, which makes me question its viability, considering he might glow with the lights off.
▶ 289a1f (1) No.11365866>>11365869
yeah i have no idea what i am doing but this thread has peaked my interest very much
▶ ad5ab4 (10) No.11365867
>>11365865
Welcome to the world of what the fuck is the truth anymore :) Trust yourself, do your own research.
▶ d348a2 (42) No.11365869
>>11365866
>peaked
s/peaked/piqued
check'd
▶ aca292 (29) No.11365874>>11365883
>>11365697
>>11365731
No, they won't have the same hash if they're different file types.
▶ d348a2 (42) No.11365875
>>11365865
>Snowden also recommends it, which makes me question its viability, considering he might glow with the lights off.
Use it and Whonix as references and homebrew your own with a pair of extra systems.
▶ d85fdc (2) No.11365879>>11365897 >>11365926
>>11365733
This guy >>11365803 guessed correctly, it's steghide. The problem is though you need to get the password, hence they always have email or kik contacts. However, just the fact that there is an encrypted file within their pictures should be enough proof.
▶ ad5ab4 (10) No.11365883
>>11365874
I was saying if they were the same file and you changed the file ext. Data is data. Obviously the file headers and such will change if they were totally different file types.
▶ d348a2 (42) No.11365886>>11365899
Also, "isolating wifi" with a godlike password means nothing if the flare sweeps the channels spewing a covert distress code + identifiers, if it detects no clearnet + yes wifi card + no open wifi with clearnet, assuming kernel exploit to permit this, and assuming urban area cell towers also double as civilian wifi SIGINT collection stations.
▶ 47c5e9 (3) No.11365887>>11365916
I have no idea how to help or else I would. I hope you good guys find these fuckers.
▶ aca292 (29) No.11365893
>>11365782
>so buds is code for ….
Not code for anything.
Breast buds are the primordial lumps which sprout on a pubescent girl's chest. Not yet breasts but still not flat like a boy's.
Girls will start to bud as soon as puberty begins, so anywhere from 8 to 10 years old these days.
Conspicuous absence of buds, for example on the chests of a 16-year-old that it's being claimed is just a "late bloomer" are a fairly solid sign that she's actually a boy, because buds form so early.
▶ 6fad7d (3) No.11365896>>11365905 >>11365914
>>11365787
>I cannot stand this stuff.
I can. I prefer it. I don't want them to obfuscate. I don't want them to be smart enough to hide their statements. Now we know about tractors; we didn't know about tractors before. I prefer they be retarded. I prefer they be out in the open.
We have to kill them all.
We can't very well do that if we don't know who they are, right?
▶ 2aa76e (11) No.11365897>>11365901 >>11365908 >>11366245
P.I. Anon here.
All you need to do is to establish probable cause, if we can prove that a crime has occurred or is likely to occur by following the STEG trail, the Feds will be able to secure the warrants and subpoenas needed to put these individuals away.
I know little to nothing about steganography however. Any help this way is much appreciated.
>>11365879
Simply having encrypted/hidden data is not enough to get a warrant, the comments might make or break individual 'cases', but they can't get a blanket warrant for everything that's a violation of due process.
It may be possible to brute force the password, crypto I'm a bit better at so maybe I can be of help, I'll look into the algorithms steghide uses
▶ d348a2 (42) No.11365899
>>11365886
Along those lines, depending on how far the black project surveillance goes, DPA with smart power meters should pick up coded comms if the flare can make hardware with known power draw characteristics modulate power use. In physical penetration scenarios, mics getting coil whine could be used in a 1-2 punch on a totally isolated (no any-net) system.
Bah, I am digressing!
▶ 6fad7d (3) No.11365901>>11365913
>>11365897
A steganographic file system, for example, is a partition of your hard drive hidden within the normal file system. Hidden not like a "hidden file" in the OS, but rather the bits which make up the partition itself are spread all around the hard drive rather than being a big lump of gigabytes all together. This hides the existence of the partition from data dump systems and makes all of the information look like junk data if you're just reading files straight off the drive.
▶ daf460 (35) No.11365905
>>11365896
exactly I am against just shutting down the sites like the retards have done on voat.co seriously they are dumb asf
I posted this there and a retard commented on the pop-ups he got from some game
??? like wtf
trying to derail asf
and they just shutdown sites (((Gaetanne Antat))) as if that solves anything
▶ 830a91 (4) No.11365906>>11365918 >>11365923
>>11365845
>Whonix
Can you go into any detail why this over Tails? I don't know that much about this stuff and anything that is less well known will have less attackers. Curious why you like this one anon.
▶ d348a2 (42) No.11365908>>11365933
>>11365897
>All you need to do is to establish probable cause, if we can prove that a crime has occurred or is likely to occur by following the STEG trail, the Feds will be able to secure the warrants and subpoenas needed to put these individuals away.
Forgetting the password would net them less jail, but if only one is arrested so there's no Nash squeezing possible.
▶ 13974a (2) No.11365910
>>11365861
ya, if you need the base script go here:
https://lainchan.org/layer/index.html
▶ d348a2 (42) No.11365913
>>11365901
Doesn't this require a map of all written files to prevent collision on write?
▶ aca292 (29) No.11365914>>11365963
>>11365896
>Now we know about tractors
But there's nothing hidden in those files.
What another anon suggested is probably the case, posts by bots smart enough to inject context into their comments.
>why do you think there's nothing hidden?
Files are too small, data is not compressed.
At best there's URLs hidden somewhere in the pictures, which point to the real cp and it's those off-site pictures that perverted comments refer to.
But I still think bots is more likely.
▶ 830a91 (4) No.11365916
>>11365887
I'm the same anon, but these threads are always useful to try to learn things from other anons who know about these things. I think we should all strive to know a bit about this type of stuff given the age we live in, but some of us might be "to old" to learn such a thing in depth.
▶ d348a2 (42) No.11365918>>11365921
>>11365906
One VM is the router, with one side facing the net and the other a virtual LAN (etherstub), hosting Tor with SOCKS port on the virtual LAN side, and a second 'view' VM with ONLY the virtual LAN for connection.
▶ 14ddb4 (8) No.11365919>>11365920 >>11365933
Could it be something as simple as the images being different for users who are logged in?
▶ d348a2 (42) No.11365920>>11365933 >>11365940
>>11365919
If the host is involved, then yes.
▶ 830a91 (4) No.11365921
>>11365918
Thank you anon.
▶ ad5ab4 (10) No.11365923>>11365925 >>11365932
>>11365906
It was just the first one I used, but I like how they have two vms, one handles all connects to tor, and the other runs your apps. Basically just isolates anything you run from the networking and routing.
▶ 830a91 (4) No.11365925
>>11365923
I like the sound of that, I really need to get into knowing my system better than I do. Everyday it grows much more important nowadays.
I hope all the anons who know how to do this type of thing can do it and hopefully bring them down.
▶ d348a2 (42) No.11365926
>>11365879
I wish steghide embed WAV → Red Book audio CD → ripped WAV → steghide extract WAV worked.
I know steghide embed WAV → FLAC → WAV → steghide extract WAV works fine, I tried it myself.
▶ d348a2 (42) No.11365932
>>11365923
Good middle security solution, like Qubes or OpenSolaris 10 + Solaris Trusted Extensions (superior IMO, but dead now pic related).
▶ 2aa76e (11) No.11365933>>11365936 >>11366110
>>11365908
If we can get a foothold into their little social media platform, we can skiptrace at least a few of them, everyone leaves a trail. Patience and persistence anon.
>>11365919
>>11365920
Interesting theory.
Sounds to me undercover is going to net the best results, the problem with that is it opens up the investigator to charges.
▶ d348a2 (42) No.11365936>>11365964 >>11365992
>>11365933
Has to operate with sterile gloves. Can't be me now as I expressed capability here without a net-condom on.
▶ 193bb4 (24) No.11365940>>11365948 >>11365954
>>11365920
If this was the case wouldn't there be telltale signs in the scripting of the webpage that could be viewed in something like firebug or some other source viewing software or is it a setting on the server to specifically serve particular users other images?
▶ d348a2 (42) No.11365948>>11365964
>>11365940
If done right, ie on the backend: no.
If the site is hosting injected code then maybe. Probably just sloppy on the webmaster's part himself than an injection.
▶ d348a2 (42) No.11365954
>>11365940
Think of a CMS as a program which takes database content and creates the page on the fly upon request.
▶ daf460 (35) No.11365963>>11365970
>>11365914
I really don't think it's bots because those users have their own albums with explicit photos of children.
▶ 2aa76e (11) No.11365964>>11365976 >>11366010
>>11365936
I wouldn't recommend anyone do it unless they were prepared to accept the possibility of being caught up in their own net.
>>11365948
▶ efdf52 (1) No.11365966>>11365972
▶ aca292 (29) No.11365970>>11366006 >>11366177
>>11365963
Ok, I was thinking something like this (pic related) might be going on.
▶ d348a2 (42) No.11365972
>>11365966
It's nothing until it's something.
▶ d348a2 (42) No.11365976>>11365992
>>11365964
A jury would still need to convict. If I sat on that jury: no way would I convict.
▶ 000000 (21) No.11365977>>11365979
http://es2adizg32j3kob5.onion/
▶ d348a2 (42) No.11365979
>>11365977
Ain't clickin' it!
▶ aca292 (29) No.11365984>>11365996
>>11365758
>DadOfTweens
There's another
>DadOfTwins
▶ aca292 (29) No.11365990>>11366518
This one's a bigshot with 1/2 mil page views and hundreds of upvotes.
▶ 8488f4 (5) No.11365992>>11365995
>>11365936
And anons like me who want to help but only know enough to get into trouble.
Metoo has me paranoid as fuck because of how hysterical and gullible your average normie gets without the slightest bit of evidence to back up an accusation; and this is a subject orders of magnitude more sensitive than sexual harassment.
But, do continue so anons like me can become more competent.
>>11365976
You're an outlier, then.
I've seen first hand how easily a skilled liar can manipulate people.
It's frightening how easily most people can be led by the bullring.
▶ d348a2 (42) No.11365995
>>11365992
The more social credit, the larger the ring.
▶ 2aa76e (11) No.11365996>>11366003 >>11366016 >>11366079
>>11365984
I think we'll be able to skiptrace 'dadoftweens', it appears he is uploading pics of his facebook friends' children
▶ 5c2126 (1) No.11365997>>11366005
Forward to cops who deal with this shit. Not safe for anyone to look at it. You can probably get it and then what? Mind fuck torture most likely. But if you must, I'd have a look at the file in a hex editor, see what the header says.
▶ daf460 (35) No.11366003
>>11365996
there's a lot of people doing that on the site
1823803_293893893_39383938n type of titles
and sometimes even in the album title facebook friends' photos
▶ daf460 (35) No.11366005
>>11365997
good joke fwd to the abusers
▶ 78b21c (5) No.11366006>>11366010 >>11366012 >>11366059
>>11365970
This appears to be the original tractor, the text was almost entirely cropped from the bottom and I imagine the image was optimized to make it smaller. Perhaps this is a result of the Steg process, but I am currently unfamiliar with how it works. It seems as though a larger sized image would work better as there is more opportunity for insertion of data.
▶ aca292 (29) No.11366010
>>11365964
>I wouldn't recommend anyone do it unless they were prepared to accept the possibility of being caught up in their own net.
This.
Look what happens during pedo dragnets. Any(man) remotely associated gets shafted with the full force of the law and bonus punishments inside the cage while high echelon people get a quiet word from their lodgemates in the police.
Exact same shit happened during Operation Ore in the UK. Half of Blair's government had their names turn up in the list supplied to HMG by the FBI. Blair ordered a coverup for his people, meanwhile anyone in the pleb tier who was remotely connected was sent to jail without passing "go".
https://archive.fo/tR9zD
>>11366006
I did add a dummy link to the image I posted just by way of example.
▶ 193bb4 (24) No.11366012>>11366451
>>11366006
Oddly enough the steg image shows more. The people on the right are fully visible in the steg image.
▶ aca292 (29) No.11366016>>11366020
>>11365996
NEXT1-2 has his ICQ number in profile.
>607324290
Looks like ICQ is perhaps popular amongst pedophiles. Makes sense, it's "legit" and offers p2p file transfers.
▶ daf460 (35) No.11366020
>>11366016
they all have kik, gmail, yandex or some kind of other IM
▶ 2aa76e (11) No.11366021>>11366033
Nothing on DADOFTWEEN's albums is inherently illegal.
▶ aca292 (29) No.11366033
>>11366021
The albums they upload are essentially catalogues, samples of what (who) they can get nudes of to trade.
Unlikely they will upload actual cp, they would have to be caught in the act trading or offering to trade.
e.g
>http://imgsrc.ru/happywun
▶ aca292 (29) No.11366048>>11367869
>Hi guys back again! 1-11 love!meets even better! South west UK!adore hc vids, pics!looking for similar exchange
>meets even better!
Looks like they aren't only trading data.
▶ 8022b8 (1) No.11366051>>11366057 >>11366288
>>11366031
My rage knows no bounds right now. Most these users are cocky and a lot of the names include their first initial, last name and dob. Most of these seem to be boomers, I didn't think I could hate them any more
▶ 2aa76e (11) No.11366057
>>11366051
Good, let them get cocky it only helps us.
▶ 7b529d (6) No.11366059>>11366075 >>11366078 >>11366095 >>11366177
>>11366006
>but I am currently unfamiliar with how it works
It's quite easy.
Each pixel contains 24 bits of data (3 sets of 8bits for R,G,B). Stegonography works by using a few (often 1) least significant bits from each 8bit sequence to store arbitrary data. The original image is intact, because the difference is practically imperceptible.
▶ 20e9e9 (1) No.11366060
>>11366035
>>11366031
I can't express my hate enough…
▶ daf460 (35) No.11366074
that's the dad commenting
▶ 78b21c (5) No.11366075>>11366091
>>11366059
I see, so:
11111111
11111111
11111111
becomes:
11111010
11111101
11111010
? Is this currently the only method?
▶ 8488f4 (5) No.11366078>>11366097 >>11366277
>>11366059
I seem to recall from the first sinks thread wherein someone finally explained what was going on, there was a program that could compare side-by-side seemingly-identical photos and would point out all the differences.
That was several computers ago and I can't for the life of me remember its name.
▶ d348a2 (42) No.11366079>>11366089 >>11366096 >>11366234 >>11366542 >>11366696 >>11366746
>>11365996
>skiptrace
JESUS CHRIST I JUST READ TRANSUNION FUCKING DRIVES AROUND CATALOGING LICENSE PLATES JUST TO RESELL IN DATABASE FORM FOR APPLICATIONS LIKE 'skiptracing' HOLY SHIT!
▶ daf460 (35) No.11366085>>11366256 >>11366269
4 pages
of UNCLES
(cliché confirmed)
▶ d348a2 (42) No.11366089
>>11366079
You'd have to steal a new front plate every week off a color+model+year+edition match and put it on back with fake matching mo/yr registration stickers to avoid this!
▶ 7b529d (6) No.11366091
>>11366075
Yep. That's the common way it is done. There's also naive ways in which you just stick the hidden file at the very end of the false image. You could invent more complicated schemes to evade detection, say using every 10th octet octet for storage, or use some other arbitrary way to order the data.
▶ d348a2 (42) No.11366095
>>11366059
That is simple, steghide does swaps using the password as the seed so first order analysis on the image itself is clean.
▶ 2aa76e (11) No.11366096>>11366108
>>11366079
A lot of companies do this, there's big money to be made selling data.
In a lot of places you can just go to the DMV and they'll run plates for you.
▶ 7b529d (6) No.11366097>>11366130
>>11366078
You could just do that with a standard photoshop tool. Combine the layers and use different blending modes to show the differences. That's a good way to see where abouts they have applied stegnography.
▶ aca292 (29) No.11366099>>11366104 >>11366142
Got a solid lead for this one, kid's full dox in pic.
>imgsrc.ru/happywun
The abuser is a step parent.
▶ c7985c (3) No.11366102>>11366234
>>11365550 (OP)
I love old tractors and hang out on forums for them.
Oh fuck me. I never knew this was a thing.
▶ 399b23 (1) No.11366104
>>11366099
Christ that's an innocent looking girl
▶ d348a2 (42) No.11366108
>>11366096
>DMV and they'll run plates for you.
DMV don't say where your car was seen by van #1037 on Del Ray Blvd at 1037:09 Monday, and it was parked at Trader Joes!
▶ 541201 (9) No.11366110>>11366114 >>11366116 >>11366147 >>11366175 >>11367016
>>11365933
>Sounds to me undercover is going to net the best results, the problem with that is it opens up the investigator to charges.
Surely at least one anon here is either A) Professionally placed to investigate with legal immunity, or B) motivated enough to run the risk?
Legal immunity (or at least relative safety), as I understand it, could be had by either:
A) A lesse passe granted by a court
B) A job as an investigator who has some kind of legal permission to handle this shit
C) Living in a jurisdiction (such as Pakistan) where it's either legal or just not prosecuted
Anyone here ever been deputized by their local law?
▶ 01d9a3 (3) No.11366114>>11366175
>>11366110
why don't you just unironically send this shit the FBI, the comments alone are pretty clear.
▶ aca292 (29) No.11366116>>11366121 >>11366158 >>11366175
>>11366110
Half the anons who post here fall into category "B" in your list.
The problem is they aren't in the child sex crimes department, they're in the online extremism/domestic terrorism department.
▶ 541201 (9) No.11366121>>11366137 >>11366175
>>11366116
Private investigator won't do it either, I'm afraid. Or else I'd be in it right now. My brief has always been insurance fraud, not international kid fucking, so it might be a bit hard to explain this to the gals in the office.
▶ d348a2 (42) No.11366130>>11366135 >>11366159 >>11366234 >>11366248
>>11366097
These guys are amateurs. Steg covers should be never before seen originals, or a fine noise should be applied first. Real pros embed a small red herring with an easymode password, then embed the real payload with a hardmode password, then verify the red herring is still intact. The red herring could be just a distraction, or it could be a private outsider detecting tripwire, like a unpublished unknown onion hosted just to sound an alarm if requested by a client (likely investigator) somewhere.
▶ d348a2 (42) No.11366135
>>11366130
Additionally, leak tracing could be done this way.
▶ c7985c (3) No.11366137>>11366677
>>11366121
I would sit down with your local chief of police and ask to be deputized / work with them on this.
Fuck it, it might get you into contracting with them for their "weird" computer problems.
▶ 000000 (21) No.11366138
We've gotta deal with these pedos. Swift trial, death penalty.
▶ aca292 (29) No.11366142>>11366161 >>11366175 >>11366297 >>11366518
We could try a more direct approach, at least with some of the accounts.
For example the girl pictured in
>>11366099
Rose Pinney.
She has enough information on her sign to track down her family. Then it would be a simple matter to contact her mother with screenshots of her boyfriend/husband "Mike"'s account and what he's using their daughter for.
That's assuming she isn't involved.
The same tactic could be applied to any other accounts where victims can be identified.
This is not only lower risk than entering the social circle of the pedophile ring, it also bypasses law enforcement and creates a ton of lulz.
▶ d348a2 (42) No.11366147
>>11366110
>Anyone here ever been deputized by their local law?
I have about a 20% chance if I pull some strings I have let lay dormant.
▶ aca292 (29) No.11366154>>11366156 >>11366160 >>11366163 >>11366175 >>11366234 >>11366518
Was going to suggest archiving in case of pedos tipping their friends off about this thread, but look at this.
Archive.is won't archive their pages.
▶ 6a028e (1) No.11366156
>>11366154
use a different archiver then.
▶ d348a2 (42) No.11366158
>>11366116
>they're in the online extremism/domestic terrorism department.
You'd think this wouldn't be a problem here while Trump is in office, but it wouldn't be the first time 'right cover' is run by a GOP president.
▶ 7b529d (6) No.11366159>>11366170 >>11366175 >>11366234
>>11366130
Exactly. And if they're doing this on a public forum, how are they exchanging passwords? I'd need way more information to look into them. Do they ever use something like PGP on their boards? Also while I cannot detect any pixel differences between the two tractor images posted (strange!) here, there are very slight differences as a hex viewer shows.
▶ da0d21 (2) No.11366160>>11366187
>>11366154
Try with megalodon.
http://megalodon.jp/
▶ 000000 (21) No.11366161>>11366262
>>11366142
In many of these cases it's probably safe to assume that law enforcement is in on it to some degree.
Do not attempt to personally contact or involve yourself in these circles, these are actual sick fucks and they would likely try to kill you for exposing them.
▶ d348a2 (42) No.11366163>>11366187
>>11366154
wget mirror then darknet that shit?
▶ d348a2 (42) No.11366170>>11366175
>>11366159
Grab the steghide source, add an extra function which takes in a cover + dictionary list, and slams that bitch with the list until it screams cheese pizza!
▶ 76cde8 (2) No.11366171>>11366180
I am too brainlet to help anons. sending good vibes and stuff your way though.
▶ 2aa76e (11) No.11366175>>11366187 >>11366234 >>11366297 >>11368314
>>11366110 see >>11366114
also >>11366116 and >>11366121
P.I.s are not above the law. I have done some 'grey area' things, but when you're hunting down known enemy combatants the ROE is different than a criminal with due process rights.
The mere possession of a photograph is a felony, and that's the crux of the issue. We need to get evidence while also are prohibited from holding the evidence.
>>11366142
>That's assuming she isn't involved.
Which is exactly why we DON'T want to do this.
If we alert the rats, they will scurry and shut down everything. It's better to gather intelligence first and then when there's nothing they can delete, then you clamp down on the suspects.
>>11366154
>pedos tipping their friends off about this thread,
Anons monitoring antifa groups need to be on the lookout for this
>>11366159
One thing I've noticed is the word "EZ" in several password protected uploads of different users, in all cases the password was 12345 even for different users with seemingly unrelated.
>>11366170
github.com/Va5c0/Steghide-Brute-Force-Tool
▶ dbd19b (7) No.11366177>>11366186 >>11366187 >>11366198
>>11366059
Note that for jpegs it isnt in the RGB (because thats impossible to control), but instead in the frequency domain. Its put in the middle of turning the RGB data into a jpeg. Dont analyse the RGB, thats useless, you need to analyse the raw data with a tool like jpegsnoop:
https://www.impulseadventure.com/photo/jpeg-snoop.html
In the image posted >>11365970 I noticed that the jpeg consisted of two images: the image itself, and a jpeg version of it. It is possible to store data here as well.
Jpeg also adds the option to hide data in other places, because of the way its encoded. Jpeg consists of 'chunks' of encoded data, some of it picture data, some of it metadata. Not just picture data can hide tokens.
Ive included the thumbnail itself also. I couldnt find any tools online to obtain the raw macroblock data in picture form so it can be analyzed.
▶ 614ed3 (1) No.11366180
▶ a04f38 (4) No.11366185>>11366234
>>11365550 (OP)
Found an old archived site with index directory open that had some weird shit in it. Australians. See the Liddle Kidz thread, >>11280990, some related posts:
>>11292271
>>11292296
>>11292345
>>11292359
>>11292362
>>11310419
What kind of autists are you, educate yourself on stenography forensics.
http:// archive.is/MtsXx
http://ar c hive.is/oMYLW
https://en.w i kipedia.org/wiki/Steganography_tools
https://duckdu c kgo.com/?t=disconnect&x=%2Fhtml&q=stenography+foresnic+tools&ia=web
▶ 7b529d (6) No.11366186
>>11366177
Right, good points.
▶ aca292 (29) No.11366187>>11366248 >>11366518
>>11366160
web.archive.org seems to work.
Interestingly someone had already taken a snapshot of user happywun back in 2017.
>>11366160
Will bear it in mind, wayback machine worked though they do have a tendency to pull stuff quite often I've noticed.
>>11366163
Local archives aren't very good evidence, they're fine for your own reference but not for convincing others.
>>11366175
>Which is exactly why we DON'T want to do this.
You're right, I was thinking of the lulz of outing a step child/husband to its parents rather than the ultimate good.
On the other hand it's unlikely that one of their circle screaming "they're on to us!" would have much of an effect on the others.
>>11366177
I hid a url in that image using fourier transform.
▶ 44ae3c (4) No.11366191>>11366198 >>11366201 >>11366282 >>11366479
Some general tips:
The photo says it is a jpg. It's not really possible to hide data "in the image" because .jpg is lossy. Is it really a jpg? If so, the info must be either "appended" after eof in .jpg-container, or you use some information (like the name of the file) to access another file on another site, but that would make the comments there kind of strange…
If it is a .png or any other lossless format, there are ways to hide information in it. The most basic is to overwrite the last 1-2 bits so the color change of each pixel is not noticeable to the eye.
If it really is a .jpg, the information is most likely appended…
▶ 7b529d (6) No.11366198
>>11366191
>If it really is a .jpg, the information is most likely appended…
See
>>11366177 as well. To be honest I need to read up on some of the trickier techniques they're using for jpeg.
▶ dbd19b (7) No.11366201
>>11366191
Like I said, you can easily hide data in the raw compressed data. To put it in simple terms, jpeg works using a lot of 'shapes' overlayed on top of each other to fill 16x16 macroblock areas of the image. The more of these shapes you use, the better the quality. It is very simple to hide data in a macroblock that is barely visible.
For hiding data in jpegs you dont encode it in the RGB data prior to turning it into a jpeg, you do so in-between the conversion from RGB to the cosines that are used.
https://cs.stanford.edu/people/eroberts/courses/soco/projects/data-compression/lossy/jpeg/dct.htm
▶ 2aa76e (11) No.11366206
▶ 2aa76e (11) No.11366211>>11366228
ARCHIVE EVERYTHING HERE
http://imgsrc.ru/main/user.php?user=hjtexan
▶ aca292 (29) No.11366228>>11366233
>>11366211
Looks like normalfag shit trawled from the web.
"celebrities"i.e trannies and teens from Facebook.
▶ 2aa76e (11) No.11366233
>>11366228
Yeah I noticed.
▶ 8488f4 (5) No.11366234>>11366248
>>11366079
What the hell?
How is even half the crap those companies do legal?
>>11366102
Check out the Old Thresher's Reunion sometime. ;)
>>11366154
>In response to a complaint
That was fast.
Either someone's already tried, or >>11366130 is right about a tripwire.
>>11366159
Which program are you using there?
>>11366175
>github.com/Va5c0/Steghide-Brute-Force-Tool
Noice.
I've been meaning to rebuild my library of crypto and steg tools since my old XP rig died.
>>11366185
Hyperlinking's been disabled for months now, anon; you no longer have to break links. ;)
▶ 5f1121 (1) No.11366245
>>11365897
Godspeed and good luck to all law anons who look into this. Just be careful, this might be (((someone))) trying to honeypot you. It's probably best to deliver evidence anonymously.
▶ 193bb4 (24) No.11366248
>>11366234
>Either someone's already tried…
Someone already tried, see >>11366187
> … or >>11366130 is right about a tripwire.
There are most assuredly canaries in those files.
▶ aca292 (29) No.11366252>>11366317
Steganons might want to inspect this.
http://imgsrc.ru/main/user.php?user=aussiemagic2
Found from following a pedo comment, he has only one gallery full of pictures of carpet.
▶ 3c2e2b (2) No.11366256
>>11366085
Niece gets a facial (protected)
Niece and friends experiment (protected)
Sheeeit, someone needs to make this stop
▶ dbd19b (7) No.11366257>>11366267 >>11367519
I feel a bigger question to answer is how do all these people know how to extract the data from these jpeg images? Is there some underground network they exchange this information at? If there's distributed tools, then it's pointless to try to decipher this. Anyone with the knowledge of how to write a steg tool also knows how to AES encrypt it. They'd include a decrypting key with the software and use a matching private key on the server.
Insider knowledge is really needed to solve it. I hope I'm wrong and these pedos are pants-on-head retarded and encoded the URLs in plaintext in the image data. But it feels incredibly unlikely.
▶ 3c2e2b (2) No.11366260
>>11366035
this is fucking disgusting
▶ 00d932 (1) No.11366262>>11366266
>>11366161
Checked, the risk they're already taking… they wouldn't mind going a bit further.
▶ 193bb4 (24) No.11366266
>>11366262
There is nothing to check. Mouse over their ID.
▶ 44ae3c (4) No.11366267>>11366277 >>11366279 >>11367519
>>11366257
This
If you don't know how it was encrypted, you will never be able to get out the actual data…
Best you can do at the moment is to check "same images" for different bytes, and from there you can easily know if it's hidden in the images, or somewhere else. If difference is 10 kb or something, it might be some encrypted link do darkweb, and not the actual image…
▶ 429aec (1) No.11366271>>11366272
▶ aca292 (29) No.11366272>>11367255
>>11366269
Oh, the dirty panties album has around 80,000 views.
>>11366271
The guy is a professional used pantie vendor, active as recently as 2 weeks too.
▶ 193bb4 (24) No.11366277>>11366303 >>11366314 >>11366446
>>11366267
>>11366078
Hidden image confirmed.
▶ dbd19b (7) No.11366279>>11366298
>>11366267
I remember threads prior where a lot of unlisted youtube videos showed up with completely garbage data in it, full of pedo comments too. I'm almost certain there are tools in circulation we don't know about. For all you know all thats encoded in these images is a short video ID of an unlisted youtube video containing the actual payload. That's what, 10 bytes?
▶ d348a2 (42) No.11366282
>>11366191
> It's not really possible to hide data "in the image" because .jpg is lossy.
Bzzzt wrong. Go get steghide and see for yourself!
▶ 14ddb4 (8) No.11366288>>11366297
>>11366051
We should start doxing. Even if we can't get them arrested, we can alert employers/family/etc.
▶ 193bb4 (24) No.11366297
▶ d348a2 (42) No.11366298
>>11366279
My guess? A steghide like app for mp4 video or aac audio, done to yt-compatible format 1080p mp4 (so the 1080p version isn't re-encoded for 1080p distribution from CDN), then uploaded.
▶ 44ae3c (4) No.11366303>>11366311 >>11366312 >>11366326
>>11366277
Hidden data… if that is the full size of the image, there wouldn't be much space to hide a "ok quality" photo within it….
It's more likely that they have a secret tool which does encryption, padding etc. + has its own "file format" that is hidden, and this in itself would seem like pure junk if you managed to extract it…
If anyone is familiar with the .mkv format, which is basically binary XML, that's a likely thing imho…
With the right tool, everything could be "automated" so you download these, then the tool downloads one or more images from a secret url.
An image hidden in there would have to be the size of a stamp…
▶ dbd19b (7) No.11366311>>11366316 >>11366383
>>11366303
The right tool is very likely a browser extension so its a seamless experience to them. About the only weakness in all of this is when information about this is leaked.
▶ d348a2 (42) No.11366312
>>11366303
Multipar could provide resilience to missing member covers in a set, and possibly for some image modifications.
▶ aca292 (29) No.11366314
>>11366277
tbh you'd see a difference just due to resaving.
Here's the data I hid, pic related, a url hidden in the frequency domain.
▶ d348a2 (42) No.11366316>>11366323 >>11366349
>>11366311
Why high-five in the open though. Too retarded tbh.
▶ 9785ed (20) No.11366317>>11366322 >>11366327 >>11366430
It seems like most of the pedoshit while identifiably pedoshit isn't actually illegal and the hidden shit is the real pedoshit, definitely need steg anons in here.
>>11366252
>carpet
Found another doing the same thing, comments clearly indicate there is some sort of evidence inside the files.
▶ 01d9a3 (3) No.11366322>>11366402
>>11366317
>imgsrc.ru
why not report this shit to the russians?
▶ dbd19b (7) No.11366323
>>11366316
Because when its in the open, there is nothing to investigate. Its just a weirdos enjoying the picture of a tractor. Hell, we'd be the weirdos trying to find meaning behind it! People using their full names is probably part of the agreement also. If it retroactively is discovered, everyone posting these creepy comments is fucked. This keeps people quiet.
▶ 14ddb4 (8) No.11366326>>11366577
>>11366303
As careless as these fuckers are, I have a hard time believing they could be doing anything that advanced. Maybe there could be some kind of code where pictures of carpet mean some specific kind of kiddie porn or something? The whole thing is bizarre.
▶ aca292 (29) No.11366327>>11366344 >>11367422
>>11366317
I guess they're choosing carpet because it's a fairly uniform but repeating pattern.
Others are being fairly open about what they're doing.
This one LAPDOG420 gives stockings to his "nieces" then photographs them.
Some of the photos can be downloaded in fullsize original and have quite a bit of metadata. I don't doubt that some users have GPS coordinates in their uploads.
http://imgsrc.ru/lapdog420
He has a lot of "nieces".
Routine goes : give them stockings then take pics/touch them up/feel feet/get cock rubbed through clothes with feet.
▶ 9785ed (20) No.11366344>>11366617 >>11368145
>>11366327
Another thing I'm noticing is in a majority of ones which post blatant pedoshit comments, they have a 'to comment' album with seemingly random images.
▶ aca292 (29) No.11366346>>11366350 >>11366668 >>11367621
Fucked up the URL.
>http://imgsrc.ru/main/user.php?user=lapdog420
>Great Valentine present. Stayed the night too.
▶ 8488f4 (5) No.11366349>>11366361
>>11366316
Maybe the tingles they get from taking unnecessary risks is part of their addiction?
I remember reading that some people who suffer from addiction have exceptionally low amygdala response to stimuli.
It's only extreme behaviors that stimulate that part of the brain which is what allows the associated acts to become imprinted and habitualized, i.e. illicit drug and alcohol abuse or high-risk sex.
▶ 9785ed (20) No.11366350
>>11366346
>third pic
that one you might be able to get him charges for. It's not CP per-se, but if he indicates he was 'pleasured' at all then it might be enough to get a misconduct w/minor charge
▶ dbd19b (7) No.11366361>>11366408
>>11366349
Doing it in secret is useless, because a single person leaking the hidden urls/onion links/whatever is enough to bust everyone. Doing it this way gives them plausible deniability if accused.
▶ 78b21c (5) No.11366383>>11366412
>>11366311 (checked)
>https://addons.mozilla.org/en-US/firefox/addon/firesteg/
>http://diit.sourceforge.net/
this is likely the case, so it's "easy" to browse.
▶ 7fce6d (2) No.11366389>>11366391 >>11366405 >>11366408 >>11366425
So how many spooks are in this thread at the moment?
▶ da0d21 (2) No.11366391>>11366401
>>11366389
Too much and not enough.
▶ 9785ed (20) No.11366400
Found an elementary school teacher.
▶ 6fad7d (3) No.11366402
>>11366322
HAHAHAHAHAHAHAHAHAHAHAHAAHHAHAHAHAHHAHAHAHAHHAHAHAHAHHAHAHAHAHAHAHAHAHAHAHAHAHHAAHAH Report child trafficking to the fifth most corrupt government on the face of the Earth, which is in charge of the largest child trafficking ring in the world HAHAHAHAHAHAHAHAHAHAHAHAHAHAHAAHAHHAHAHAHAAHAHAHA WHAT THE FUCK ARE YOU SMOKING
▶ 000000 (21) No.11366405
>>11366389
Seems they are eager to protect the pedos at all costs.
▶ aca292 (29) No.11366406
This guy's daughter has pedo symbol attached to her bedside lantern.
http://imgsrc.ru/gadiss/58680390.html?#bp
▶ 8488f4 (5) No.11366408
>>11366361
Okay, I'm going with your explanation, because trying to get inside their heads is probably not very wise.
>>11366389
Turn off the lights and find out:^)
▶ 01d9a3 (3) No.11366412
>>11366383
this add on is XUL and a java mess, it requires a java installation on top of this extension, and it's not supported by the dev anymore (or they would have updated it to webext). to use this you need to use an out of date browser.
it's not likely this one, but i'm sure there are others. there's no technical reason why this couldn't be done in webext.
▶ 5d10e4 (2) No.11366425
>>11366389
I hope that at least some of them aren't (((spooks))) trying to bury and shut-it-down, but people with actual conscience. Considering recent pedo busts, there is a chance the right people are onto this shit too now.
▶ 44ae3c (4) No.11366430
>>11366317
Carpets are a good choice for this for technical reasons, but makes it very obvious that something is hiddden…
The "perfect" image would be just generated white noise. The more "noise", the better…
▶ ef22e6 (14) No.11366439>>11366443 >>11366467
>>11365697
>the same image should have the same hash correct?
The way hashes work, even a single bit changing would completely change the hash. For example, if timestamp metadata is altered.
There do exist image-based hashes, but it's a whole different kind of hash, and few people know about them.
▶ 211442 (3) No.11366443>>11366498
▶ c17c5e (8) No.11366446
>>11366277
>WAKE ME UP INSIDE
>CAN'T WAKE UP
▶ 78b21c (5) No.11366451>>11367237
>>11366012
You're correct, that was a different image once I clicked on it. This seems to be more likely a source image. both for comparison
▶ 9785ed (20) No.11366460
Anyone heard of the "clover dating app"?
▶ 000000 (21) No.11366461>>11366488 >>11367008 >>11368139 >>11368246
>>11365550 (OP)
BAIT THREAD DETECTED
1. You post here asking for help with no source.
2. You never archived anything
3. You know about steganography, but never searched for any online tools to do EXACTLY what you are asking us to do.
4. You make no mention of contacting law enforcement.
5. If you were genuine you would also know from public records, and many news reports that it is individuals in the justice system (politicians, judges, police, lawyers, etc) who are involved in CP. How the hell do you think the sick fucks cover it up? Look at all the Pizzagate investigation, Hillary, Biden, etc. UK, Nederlands, Knights and royalty. Heck! - in Australia police ran a CP site for a year!!! (For a honeypot - or so they say)
6. There is a stickied thread for #precisely# this subject, but you don't post there - you make a bait thread instead.
TL;DR go search for the steg tools online and do it yourself. All pedos deserve rope off a short platform while being used as a pinata by baseball bats spiked with sharp nails
▶ aca292 (29) No.11366467>>11366498
>>11366439
>For example, if timestamp metadata is altered.
The hash is the hash of the data, metadata isn't the data, that's why it's called metadata.
Your hash won't change if you change filename, permissions, timestamps etc.
If it did then it would be impossible to check hash of downloaded files.
▶ ef22e6 (14) No.11366479>>11366493 >>11366621 >>11366653 >>11366738
>>11366191
>The photo says it is a jpg. It's not really possible to hide data "in the image" because .jpg is lossy.
This is wrong. You can embed steganographed data into anything. Take a poorly-shot photo of a banknote for example, if you open it in Photoshop it will give you a warning and refuse to open it. How does it know it's a banknote? Because banknotes use a special kind of steganography that works even when resized, stretched, twisted, lossly compressed and poorly lit. It's fucking magic. It isn't available as a standalone product, too, but is developed by Digimarc and a variant on their commercial offering. I couldn't figure out how the hell it works, beyond that it slightly changes the luma of rounded squares in edges of the image. An image with lots of edges is best for steganography.
▶ 9785ed (20) No.11366480
So these pedos are required to post a dozen photos to get into whatever pedo network they're in.
▶ 14ddb4 (8) No.11366482
>>11365738
>view full-sized 4.32MB
Did anybody try extracting the full-sized images with winrar?
▶ aca292 (29) No.11366488>>11366491 >>11366502 >>11366684
>>11366461
TorPEDO has a point tbh.
Especially point #5.
If you want an example of what happens to people who report pedophilia to the cops, when friends of the cops are involved, just look up Robert Greene and the Hollie Grieg case.
tl;dr
>downy girl claims she was raped, names a bunch of local freemasons.
>mother reports it to cops
>within hours she is arrested and sectioned under the mental health act
>only gets released because she has enough money to pay her own quack to say she isn't schizophrenic
>everyone involved gets arrested
>her brother dies after his car becomes a fireball on the highway.
>the fellow helping them legally, runs for election in the city where the abuse happened, on a 1 issue ticket - elite pedophilia.
>is banned from entering the city where he's running for election.
In other words, the full force of the state came down upon them and it will come down on anyone who tries to overturn that particular rock.
I'm outta here, feels like a honeypot
▶ aca292 (29) No.11366491
[pop]YouTube embed. Click thumbnail to play.
>>11366488
Video about Hollie Grieg case.
▶ ad5ab4 (10) No.11366493>>11366653
>>11366479
You sure about that lol. Its probably some image analysis in photoshop that is blocking you not the image itself.
▶ ef22e6 (14) No.11366498>>11366507 >>11366522
>>11366443
>Tell us more
a-hash: Average hashing is the simplest algorithm which uses only a few transformation. Scale the image, convert to greyscale, calculate the mean and binarize the greyscale based on the mean. Now convert the binary image into the integer. The algorithm is so simple that you can implement it in an hour.
p-hash: Perceptual hash uses similar approach but instead of averaging relies on discrete cosine transformation (popular transformation in signal processing).
d-hash: Difference hash uses the same approach as a-hash, but instead of using information about average values, it uses gradients (difference between adjacent pixels).
w-hash: Very similar to p-hash, but instead of DCT it uses wavelet transformation.
All of these are implemented in this library: https://pypi.python.org/pypi/ImageHash
>>11366467
>The hash is the hash of the data, metadata isn't the data, that's why it's called metadata.
>Your hash won't change if you change filename, permissions, timestamps etc.
EXIF is also metadata. And there are timestamps in EXIF. A single second you change in the timestamp, boom, whole new hash. But you don't need to do that: just add a NUL byte (0x00) at the end of the image file.
▶ 5d10e4 (2) No.11366502>>11366504 >>11366749 >>11368375
>>11365550 (OP)
WAIT
Does anyone know who or which law enforcement exactly is responsible for the recent pedobusts in the U.S? How about sending them these links anonymously, considering they have proven they're doig their job? If we just do it on our own and gather proof, the shit might end up like pizzagate where all the proof is suddenly vanishing, invalid and everything gets cleaned up quickly or end up like >>11366488
▶ 9785ed (20) No.11366504
▶ 211442 (3) No.11366507>>11366532
>>11366498
I understood maybe two thirds of that at best.
▶ 9785ed (20) No.11366516>>11366517
I guess it's true what they say about pedos
spoilered for your protection
▶ 9785ed (20) No.11366517
>>11366516
>didn't spoil
kek.
Forgive me anons.
▶ de8410 (1) No.11366518>>11366539
>>11365990
copy the album's link and paste on a search engine to see who is linking to it
>>11366154
Anybody can issue a DMCA. Owner of the forum did it preemptively because otherwise he would have to get a lawyer to request the archives to be taken down.
>>11366142
Great idea you dumb nigger. All you would achieve is making the ones that got caught to warn the others and then the website would vanish without trace
>>11366187
Megalodon and archive.org will eventually nuke the pages, all it needs is the owner of the forum to simply request it. The fact it is still there is a mere oversight
▶ aca292 (29) No.11366522
>>11366498
>EXIF is also metadata. And there are timestamps in EXIF.
That's image metadata, not file metadata.
▶ ef22e6 (14) No.11366532
[pop]YouTube embed. Click thumbnail to play.
>>11366507
>I understood maybe two thirds of that at best.
It's fine, we all start somewhere. But remember, the kikes that want us all dead would rather we are stupid enough to fall for their tricks. Use all the time you have from not playing shitty vidya or watching shitty movies to study. Use jewtube for the only reason it's still good; lots of people who know stuff teaching you stuff. Everyone would tell you to read a book, but I know you won't do that any time soon, so just watch stuff on your spare time, it's easy and anyone can do it.
▶ aca292 (29) No.11366539
>>11366518
>Great idea you dumb nigger. All you would achieve is making the ones that got caught to warn the others and then the website would vanish without trace
It's not idea, yeah. But consider this:
There are already pedos and leftists viewing this thread, so it's already too late to worry about someone warning the ring.
On the other hand, directly reporting participants to their families creates real results and lulz, larping about gathering evidence then presenting it to an authority figure (who works for zog) then waiting for them to "do the right thing" will achieve nothing and you know that.
But it doesn't matter anyway. No one's really motivated, thread seems slidey or worse and will be forgotten about by the end of the week.
▶ b54573 (2) No.11366542>>11366555
>>11366079
which is why you have a fucking garage.
▶ 000000 (21) No.11366555>>11366570 >>11366575
>>11366542
Even if you don't they make spray-on shit which makes it difficult to read license plates by camera.
▶ aca292 (29) No.11366570>>11366589
>>11366555
Checked.
Spray-on can get you busted and is dubious efficacy.
Better solution is an infrared diode array. Invisible to piggies, but blinding to cameras.
▶ 76d6a9 (2) No.11366575>>11366943
>>11366555
theres really no law against covering up your license plate when you park it - just take a piece of cardboard and glue a magnet to it… just remember to take it off before driving or that shit will get you pulled over…
▶ ef9a2c (2) No.11366577>>11366595 >>11366690
>>11366326
>As careless as these fuckers are, I have a hard time believing they could be doing anything that advanced. Maybe there could be some kind of code where pictures of carpet mean some specific kind of kiddie porn or something? The whole thing is bizarre.
This was a fairly mainstream way of sharing fucking METAL ALBUMS in 2005. So no, this is not "advanced shit!!", just the trivial solution.
▶ 76d6a9 (2) No.11366589
>>11366570
the IR LED'S need to be fairly stout and you need a lot of them to totally obscure a license plate from a camera also, they draw current when they are on - not much, but if you park it long enough with those things on you will eventually drain your battery.
▶ ef22e6 (14) No.11366595>>11366690 >>11369012
>>11366577
>This was a fairly mainstream way of sharing fucking METAL ALBUMS in 2005
Checked, but why? Never seen music (or "music") needing to be steganographed. Didn't people in 2005 use Rapidshare, torrents and LimeWire/eMule already?
▶ 7eaf75 (1) No.11366617
>>11366344
twin towers,right in the merican
▶ c17c5e (8) No.11366621>>11366653
>>11366479
Have you tried copy/pasting the image into a new layer in a document, instead of opening it directly? Have you tried using GIMP, or any other image editor for that matter?
▶ 000000 (21) No.11366653>>11366706
>>11366479
>>11366493
>>11366621
>What are Omron rings?
>What is EURion constellation?
https://en.wikipedia.org/wiki/EURion_constellation
Scanning the note in two halves that divide the circles isn't illegal to do, but it should stop Photoshop whining like a bitch.
▶ 541201 (9) No.11366677
>>11366137
My local chief of police was just hired from her last job.In the Berkeley PD
▶ 04b53e (5) No.11366684
>>11366488
Cops are freemasons, and freemasons are pedophiles. Their cult demands they all lie for each other. If you want to remove freemasons, get them on having secret commissions other than their oath they swore to the sovereign/constitution.
▶ 04b53e (5) No.11366690
>>11366577
>>11366595
On cuckchan they used pictures of sinks.
▶ 04b53e (5) No.11366696
>>11366079
>lives in a state with no front plate
>always backs in when parking
Problem solved.
▶ ef22e6 (14) No.11366706>>11366768
>>11366653
>>What are Omron rings?
>>What is EURion constellation?
>https://en.wikipedia.org/wiki/EURion_constellation
I know what that is, and this is not that. Consider the first image with cuntface, and the second one with just the ring constellation. Just the rings isn't enough.
▶ 76cde8 (2) No.11366746>>11366767 >>11366794 >>11366800 >>11366846 >>11366867
>>11366079
I just looked this up. Is skiptrace a movie or has it gotten a kosher mask on?
I've noticed this same shit before if so. Seems like any hot topic somehow gets tangled with video games so when you try and research it you get flooded with bullshit.
▶ 85d00f (1) No.11366749>>11368375
>>11366502
You might be thinking of Sawman and VIPR. They seem to be dedicated to that sort of stuff. I wonder if their echo squads or whatever they're called ever stretch the law. Wouldn't want to piss off a bunch of ex-spec ops american hardasses myself.
▶ ef22e6 (14) No.11366767>>11366794
>>11366746
>I've noticed this same shit before if so. Seems like any hot topic somehow gets tangled with video games so when you try and research it you get flooded with bullshit.
Must be your imagination :^)
▶ 000000 (21) No.11366768>>11366777
>>11366706
>Consider the first image with cuntface, and the second one with just the ring constellation. Just the rings isn't enough.
A software mechanism to block scanning needs to be simple for it to be widely used, otherwise developers would need too much effort, or add too much bloat to their software. If it needs to be put in the majority of firmware for scanners & copiers then it needs to also have a low resource footprint - thus again it requires simplicity.
Therefore, we can deduce from this the mechanism must be very simple within the software (therefore NOT steganography), but the cunning is has to be in how the rings are used in the note.
Knowing we have deduced this, now look at his tie. It has the rings in it.
Elementary my dear Watson, elementary.
▶ ef22e6 (14) No.11366777>>11366812
>>11366768
>the mechanism must be very simple within the software (therefore NOT steganography)
Steganography isn't rocket science dude. Just flipping the least significant bits for R G and B already gives you some room to play. DCT is also hardware accelerated in some microcontrollers, so you can do some basic frequency-domain stuff with very little processing power.
▶ d282ad (1) No.11366794
>>11366767
>>11366746
Like when Prism info was leaked, and within two days Katie Perry's album 'Prism' was leaked to the internet?
Pure cohencidence
▶ 211442 (3) No.11366800>>11366867
>>11366746
Its a term used by bail bondsmen and debt collectors for tracking people down.
▶ 7e490f (1) No.11366803
found this in the comments, didn't look in album
▶ 000000 (21) No.11366812>>11366865
>>11366777
Truth trips checked.
However, for such techniques as steganography to work reliably across the many possible parameters:- device type, manufacturer, model, firmware, OS, application, application version, communicating drivers, and importantly scan resolution it would require over engineering of solutions.
Simply put, the effort expended is greater than the benefit gained. Humans choose minimum energy solutions in most cases, (use of extreme excessive energy oft indicates corruption rather than diligence). In this case the minimum solution is to use rings - thus that is what is chosen.
If someone really wanted to obtain a high quality image of it they would likely be using a Hasselblad camera instead of messing about with a scanner.
▶ d348a2 (42) No.11366846
>>11366746
>skiptrace
Search:
"skiptrace" -movie
▶ ef22e6 (14) No.11366865>>11366925
>>11366812
It would surprise you how much you can do nowadays. You can get an ESP8266 to run at 300MHz if you disable its wi-fi, and the newer ESP32 is an even more powerful dual-core beast of an uC.
>a Hasselblad camera
Overpriced jewish snake oil.
▶ 9785ed (20) No.11366867
>>11366746
see
>>11366800
It's the P.I. version of doxing
▶ 9785ed (20) No.11366881>>11366918 >>11367015
this is just getting physically painful at this point.
It sucks because you KNOW they're degenerates harming children, but it's not illegal what they're posting/doing online for the most part.
There's only been maybe three out of the literally hundreds I've gone through in the last few hours that I can definitely say "yes, you did something illegal". They've got loose lips in the comments sections, but without hard evidence it's difficult to know who, if any their victims were, or even who the person making the comment is.
I'll try and condense down my evidence a bit and categorize it, there is so much to go through, I genuinely did not know there were THIS many pedos, and a lot of parents as well what the fuck? It's fucking horrifying
▶ ef22e6 (14) No.11366918>>11366928 >>11366952
>>11366881
>I genuinely did not know there were THIS many pedos, and a lot of parents as well what the fuck? It's fucking horrifying
And one of them is supposedly a mom. A mother, complimenting a CP album.
▶ 000000 (21) No.11366925
>>11366865
Hmmm, it might be good to have a pocketful of those lying around! :) They've improved since the last time I checked. Thermal dissipation shouldn't be that significant since the wattage must be low for the footprint to function well.
Yes quite true, the Hasselblads are an aged example for me to have mentioned, but the high MP count was more the gist of what I meant.
Thanks for the tip! (I'll sage from here out, since I'm straying from off OP's topic, and I think it is actually a bait thread anyway )
▶ 9785ed (20) No.11366928
>>11366918
Yeah just checked her out, she's selling CP of her kids.
▶ 193bb4 (24) No.11366943
>>11366575
That image needs a race aware edit.
▶ ef22e6 (14) No.11366946
Anons, I feel a Hitler sensation growing in my chest.
▶ 541201 (9) No.11366952>>11366992
>>11366918
There are armies of female pedos. They only differ from the males in that they like to hurt the kids more and they're almost never caught. One of babby's first redpills was my discovery of how feminists would go fucking apeshit on academics who dared to investigate this issue. It's an open conspiracy of silence.
▶ 9785ed (20) No.11366959
found a big dealer http://imgsrc.ru/main/user.php?user=littlebouddha
▶ ef22e6 (14) No.11366992>>11367046
>>11366952
>One of babby's first redpills was my discovery of how feminists would go fucking apeshit on academics who dared to investigate this issue. It's an open conspiracy of silence.
The worst of this is that, if she's passably pretty, I do have much less of an emotional reaction than if it's an ugly old boomer. I can totally see why they would get away with it.
▶ 193bb4 (24) No.11367008
>>11366461
Point 4 and 5 are paradoxes.
▶ b54573 (2) No.11367015
>>11366881
There are 7 billion people on the planet, Anon. Just remember that. There are good people out there.
▶ 678274 (4) No.11367016>>11367086
>>11366110
This reminds me of an article I read where a CP site that was covertly run by Australian police for three months was exposed by some journalist website. It was a pretty big deal because the police ended up disguising themselves as the moderators of the CP site to gain the trust of the users. They posted CP, and basically got immunity from the law to do so. Apparently it really fucked up the two officers that had to do it. Here's the link:
http://archive.is/iwBZm
So yeah, if you want to investigate this shit you probably should be prepared for the possibility of breaking the law and getting jail time. Not many people would want to take that risk; and I doubt many people would have enough training to not get influenced by it. The safest bet would be tipping off the proper authorities, but for all we know it's already a co-opted honeypot. Or worst case scenario FBI nukes the site and the pedos scatter, but I doubt they'd be dumb enough to do that.
▶ 94222a (1) No.11367046>>11367071
>>11366992
wow you're that big of a beta cuck that pedophilia doesn't bother you as long as she's pretty? kill yourself!
▶ d85fdc (2) No.11367066>>11367079 >>11367092 >>11367114
Alright niggas so far i noticed that every gallery with (EZ) basically means "easy", the password is 12345. If it's (ZE), it's 54321 etc and other combinations, they do this to show previews of galleries. Another thing i noticed is that there are a fuckload of galleries called "twelve" "mytwelve" "open12" "just12" etc, i assume the number 12 and other number combinations and words are some kind of hidden pedo hint for the folder or STEG password. Basically they have preview folders with passwords known to pedos for advertisement. Some moron might accidently post something related to how it works, so keep an eye out in the commets considering how openly they reveal things there.
▶ ef22e6 (14) No.11367071
>>11367046
>wow you're that big of a beta cuck that pedophilia doesn't bother you as long as she's pretty?
It bothers me, but as a kid I did like some older women so whenever there's a story about a female teacher sleeping with a student, it doesn't sound gross as if it was a male teacher. I'd still gas them both.
▶ ef22e6 (14) No.11367079>>11367114
>>11367066
Checked. Some actually use it in the title…
http://imgsrc.ru/main/search.php?str=12345&cat=
I think they're retarded enough to say something about the steganography in the comments.
▶ 541201 (9) No.11367086>>11367111
>>11367016
This is nothing new. Julian Assange's first big job was designing a honeypot for the Aus police to ensnare CP operators from all over the world. It was kept quiet, but that just made it funnier when Hillary's goons accused him of being a pedo.
▶ 9785ed (20) No.11367092
>>11367066
I think the 12 thing is a sitewide thing to allow them to comment
▶ 9785ed (20) No.11367095>>11367114
625 albums containing the word "preteen"
▶ 98edab (1) No.11367111
>>11367086
assange is a glow nigger. he was probably on assignment spying on ecuador or whatever fucking country it was. definite honeypot operator/disinfo shill. sage for OT.
▶ 678274 (4) No.11367114>>11367123
>>11367066
>>11367079
>>11367095
Good work you brave souls. Aren't you guys worried about getting v& though? I think as long as your browser doesn't cache the images (somehow?) you should be fine, but 8ch does archive threads now and still does store IP's.
▶ 9785ed (20) No.11367123>>11367166
>>11367114
>Aren't you guys worried about getting v& though
Nope. It's not illegal to browse, most of things they post isn't illegal either, it's the other activities they do that's illegal, the rest is yes pedoshit, but its legal pedoshit.
▶ 678274 (4) No.11367166>>11367189 >>11367231
>>11367123
I see. I just assumed it would be illegal because of how sketchy it is. I'm not very knowledgeable about the legality of stuff like this. So I guess the bottom line is that it's only illegal to posses and distribute CP then? You don't run the risk of getting in trouble if you cache stenographed images with embedded CP? I'd probably be farther ahead to look this shit up tbh.
▶ 193bb4 (24) No.11367189
>>11367166
It isn't the fact it's illegal that should be worrying people. It's the fact that if you dig into this and are connected to the clearnet in any way when you actually decrypt these images you will trip canaries which will cause every OathNigger in your area to gangstalk you. Always practice EXTREME OpSec when dealing with shit like this.
▶ 9785ed (20) No.11367231>>11367243 >>11367268 >>11367308 >>11367382
>>11367166
It depends on the jurisdiction, but generally it's okay to have viewed materials online, however if e.g. a kid comes forward and accuses you of something it'd be an aggravating factor against you, and the mere fact you looked at it if made public could be life destroying.
I've 250+ screenshots with names, contact info, timestamps, etc. usually including anywhere from 5-15 other users I've yet to collect data on.
The most interesting lead is on a female teacher working with pre-k children uploading pictures of her students to the site. Plan now is to organize the evidence I have, submit it to the FBI, I didn't even fill out the forms I was working so fast so that needs to be done, then I can start skiptracing/doxing them.
Main goal right now: Collect as much evidence as humanly possible, because once that evidence is gone, you're not going to be able to get it back.
▶ 193bb4 (24) No.11367237
>>11366451
I got the exact location and dimensions from the original and compared it to the one on the site. 1 is the one from the site. 2 is the original.
▶ a04f38 (4) No.11367243>>11367268 >>11367293 >>11367308
>>11367231
Listen faggot. The only thing you can do is find out who these perverts are located, then kill them. Telling the authorities is going to amount to shit. If you're lucky, dox'ing someone who cares about their reputation may make them take their own life, but truly you only goal here should be to identify, hunt down, and kill these people. Bonus if you torture them first.
▶ c7985c (3) No.11367255>>11367293
>>11366272
WHAT THE FUCK?
Who do we bounce this to? Europool?
▶ 678274 (4) No.11367268>>11367308 >>11367312
>>11367231
Doing god's work.
>I didn't even fill out the forms I was working so fast so that needs to be done, then I can start skiptracing/doxing them.
Yeah, time is probably not on your side. I've heard that people who use these sites are jumpy as fuck, so if they detect even a hint that they've been compromised they'll scatter.
>>11367243
Classic internet tough guy. So what's your pedo kill count up to now?
▶ 9785ed (20) No.11367293>>11367308 >>11367312
>>11367243
>telling the authorities is going to amount to shit
It's a legal requirement anon.
Legally we are required to report this, if you do any digging of your own and don't report it, you could be opening yourself up to criminal charges.
And even if the Feds refuse to do anything, I plan on reporting it to the local PDs in the offender's neighborhoods.
>>11367255
interpol.
Wouldn't be a bad idea to contact the intelligence and police services of the nations of the individual posting if you figure that out either.
▶ 193bb4 (24) No.11367308
>>11367231
>>11367268
>>11367293
To be honest >>11367243 is kind of right, a large enough percentage of law enforcement are OathNiggers so if you ever hand this information over it's best to disseminate it through the most people and agencies you possibly can. Obviously you don't want it getting back to you under any circumstances in case you do hit a wasp nest of OathNiggers, so practice good OpSec and make sure you're using a third-party computer on public wi-fi a good distance from your house when you send the evidence to the relevant authorities. Your best bet would be to send to every FBI branch in all 50 states and possibly Interpol.
▶ a04f38 (4) No.11367312>>11367356 >>11367398
>>11367268
>>11367293
Go back to reddit faggots. This whole thread is shit. You are fucking pedos trying to shit up the board. Quit your fucking day job and hunt these people down to kill them for what they have done. If not your "research" is is a cover for the fact that you lost your steno passwords and need autistic help to fap. You all disgust me.
▶ 193bb4 (24) No.11367356
>>11367312
>You reddit fags aren't going to do anything!
>You would go commit a felony and possibly get caught and go to prison if you weren't LARPers
Hi OathNigger! I wondered how long it would take for you guys to start showing yourselves.
▶ c17c5e (8) No.11367382>>11367398
>>11367231
>submit it to the FBI
I'm wary about how much the FBI can be trusted as an institution. Make a second, identical report to the Secret Service as well.
▶ 9785ed (20) No.11367398>>11367407 >>11367520 >>11374425
>>11367312
How am I supposed to help people if I am in prison for murder?
I understand you are angry anon, but anger leads to haste, and haste leads to waste.
The best thing you can do is to document their crimes. We don't even know who these people are yet, I'm in the process of tracking some down but it's time consuming and difficult.
If you expect me to believe every single cop in the country is somehow on the payroll of these kiddiefuckers, I don't. I don't believe every judge is either. I will go through every legal way possible first because that's what you're supposed to do.
Besides, if I started killing pedophiles, I'd wind up killing Antifa and they'd call me a fascist :^)
>>11367382
The Secret Service deals with SVU cases? Didn't know that. Will do anon.
▶ c17c5e (8) No.11367407>>11367434
>>11367398
>The Secret Service deals with SVU cases? Didn't know that. Will do anon.
I don't know about SVU cases, but they do have an investigative branch and they do handle more than just presidential protection detail. This would be more of an insurance policy, in case your report to the FBI is met with either incompetence or corruption, your report on this matter would be distributed to more than one branch of the government and, hopefully, less likely to slip through the cracks or get buried. Also, maybe the SS (kek) has a closer relationship with the presidents office, and maybe this could filter up to Trump. We all know his stance on pedophiles.
▶ 000000 (21) No.11367422
>>11366327
> instagram.com/lapdog420
>http://imgsrc.ru/lapdog420
dig through the pics, find anything that can link the two.
Instagram name: Luke Hubbard
▶ 2e0a42 (1) No.11367434>>11367446 >>11367449 >>11367640
>>11367407
> We all know his stance on pedophiles.
you mean very cozy and comfortable? trump is definite kiddie fucker.
<never forget he's best buds with epstein and was mentored by roy cohn who was another mossad pedophile pimp exactly like epstein.
the odds trump has fucked kids is 1000000% guaranteed. fucking shills.
▶ 193bb4 (24) No.11367446>>11367536
>>11367434
Which is why he kicked Epstein out of his club and banned him from ever coming back when he saw him trying to peddle his shit? Go peddle yours somewhere else, mosche.
▶ c17c5e (8) No.11367449
>>11367434
Hah! Here come the (1)'s. You bastards have gotten sloppy since PizzaGate broke.
▶ bcb962 (3) No.11367461>>11367463
Speaking of steganography, I remember that that some of podesta's emails contained a ton of pictures that could have possibly steganographed. Stay tuned as I have to dig around, but I will find and post eventually
▶ bcb962 (3) No.11367469
▶ c17c5e (8) No.11367478>>11367625
>>11367463
Weren't those two gooks the (((journalists))) that were captured by North Korea and had their release negotiated by Bill Clinton?
▶ 9785ed (20) No.11367494>>11367558 >>11367709 >>11367762
>>11367463
FF D8 is the start for jpeg files, FF D9 is the end.
So if I have a jpeg say of the carpet photos and it has three FF D8 and three FF D9 I can assume it is three photos in one file.
▶ 43c9de (3) No.11367519
>>11366257
>>11366267
Someone's going to have to go underground on some CP forums and ask around. The shit sickens me, but it somebody has to do it. They might know something we don't.
▶ 9cfe42 (1) No.11367520>>11367540
>>11367398
>SVU cases
sometimes I'll think I've seen the dumbest thing I'll ever read on a chan, and then someone manages to supersede it.
▶ 43c9de (3) No.11367525
>>11367463
how to use pass?
▶ 14ddb4 (8) No.11367536
>>11367446
Trump was mentored by the boy-trafficking kike Roy Cohn, you can't pretend he doesn't have ties to organized pedophilia.
▶ 43c9de (3) No.11367539>>11368057
>>11367463
I don't understand. I dload the pizza.jpg image and decode it with the provided pass and it doesn't decode. Either something is missing from this screencap or it's bullshit
▶ c17c5e (8) No.11367540
>>11367520
>go home, gamer girl!
▶ f370f6 (3) No.11367555>>11367557 >>11367561
>>11365550 (OP)
Open the tractor pic in paint.
Save as 24 BitMap
File size enlarges to 555KB
▶ f370f6 (3) No.11367557
>>11367555
DEAR KEK WHAT HAVE I FOUND
>555 TRIPS
<555KB
▶ ad5ab4 (10) No.11367558>>11367599
>>11367494
Doubtful, but you could cut each out and save it as a new file to try or point me at it and I'll try it.
▶ c17c5e (8) No.11367561>>11367575
>>11367555
It's because you're saving it as an uncompressed bitmap. It's adding extra data that isn't there with the JPG compression, but it can't improve the fidelity of the image.
▶ f370f6 (3) No.11367575
>>11367561
Yeah, never mind I panicked when I thought I figured out something.
▶ 1921e6 (3) No.11367599>>11367709
>>11367558
Already tried the first, it didn't work.
▶ fe0635 (1) No.11367621
>>11366346
>MTG card in pic
Fucking hell, Jeremy Hambly ain't just stirring shit.
▶ 61dd70 (3) No.11367625>>11367709
>>11367478
Yes. Pastawindow is a hoax, nothing to see here, move along.
▶ 61dd70 (3) No.11367640>>11367709 >>11368333
>>11367434
>Muh Epstein
Drumpf blew the whistle on this poor, innocent manpig years ago in his typically subtle "I can ruin you, so stay the fuck away from me and mine" way. That quote floating around of him saying Jeff likes his women young, and that's great is what I'm referring to - he was obviously talking about underaged trafficking victims here, with the "and that's great" likewise being code for "you'll get yours, you sick fuck." Not that Epstein has ever committed such heinous crimes - that's just more delusional Drumpftard smearing.
>Muh Roy Cohn
He also knows Fat Tony and a host of other unsavory figures. Drumpf is not a clean-cut Christian family values man, he's a cutthroat, big stick, patriarchal bigot. He has "connections" to many people he hates and has gone on record saying as much, in so far as a criminal is "connected" to the cop arresting him, or the people sitting in their office drinking coffee who witnessed 9/11 outside their window were "connected" to 9/11.
▶ 61dd70 (3) No.11367681>>11367705 >>11367709
So hypothetically though, what if someone had the name and email of one of these people, but they lived in a foreign country?
What exactly is the process for doing something about this? Who do we pass it to? Since, according to you conspiratards, the CIATFBIDF are already in on it and all.
▶ 1921e6 (3) No.11367705>>11367792
>>11367681
You track them down the same way you track anyone else and hand over the data to the relevant authorities in their nation.
▶ ad5ab4 (10) No.11367709>>11367713
>>11367599
>>11367494
I only see one sec of ffd8 and ffd9 in this one, is this the right one?
>>11367681
>>11367640
>>11367625
Chill
▶ 1921e6 (3) No.11367713>>11367762
>>11367709
That is the right one, does 8chan automagically remove extra data from pics now?
▶ ad5ab4 (10) No.11367762
>>11367713
>>11367494
Interestingly enough if you merge two jpgs only first will display when viewed, I just tried a couple times.
▶ 000000 (21) No.11367792>>11367794
>>11367705
Anyone else digging?
Found a guy thas a bunch of pics of his kid in a leotard amongst other questionable things.. almost every comment is lewd or downright perverted.
[spoiler]found his dox{/spoiler]
▶ 000000 (21) No.11367794
>>11367792
Fuck me, messed up the spoiler tag. Maybe it's time for bed.
▶ 8008a2 (1) No.11367869
>>11366048
>UKCPFUN123
>UK CP FUN
What the fuck…
▶ 000000 (21) No.11367878>>11368240
>>11365550 (OP)
This is the most blatent message I've seen yet.. look at the comments.
>http://i mgsrc.ru/tweenyphile/55243013.html?pwd=&per_page=18
▶ 193bb4 (24) No.11368057
>>11367539
I got this screen from someone else's post, they left off a few steps in the actual post, as you can see it's cut off at the bottom. Something else was missing though, I was in this thread forever ago. Once you did what the post said you had to solve another layer of encryption and no one ever figured it out.
▶ 193bb4 (24) No.11368060
>>11367858
It's nothing, I believe, it's there in the original which was actually a tractor sale ad. I'm assuming it's a price or some sticker on the window on the other side of the tractor. Sage for double post.
▶ 678231 (2) No.11368139>>11368156
>>11366461
My issue is the timing. We all have known about mods asleep, post sinks for years.
Only a week ago or so a thread on /b (I think) appeared with this imgsrc.ru Shit and using ddg to find CP.
It's either breadcrumbs or astroturfing.
My other theory is that it is not just CP. If podesta was emailing over images that had hidden data, I dont think that just CP sharing was the main goal.
Drugs? Money laundering? Other top secret political information? CP could be a cover or method of entrapping those involved in the transmission and trying to assure that those sending and receiving don't leak.
▶ daf460 (35) No.11368145>>11368925 >>11373361
>>11366344
Yes you need 12 photos in order to be able to place a comment.
▶ e0e635 (2) No.11368156>>11368175 >>11368201
>>11368139
guns. it's guns you absolute nigger.
this certain site used to be shared on cuckchan back in the 'lol poast sinks' days, it's just a hive of pedos, stupid boomer-tier pedos.
still worth looking into because i want to see all pedos v& at a minimum and these idiots look like they practically selfdox.
pizzagate is a psyop, i'll probably be b& for saying that but it is. it's about fucking guns, funding private police forces that will be used in false flag attacks.
it all ties back to the vegas shooting, which was an arms deal gone wrong. some /big guys/ set paddock up and are going to capitalize on the media shitstorm to instill a sense of fear in the populace and get high-traffic areas, schools, casinos, concerts, malls, etc. under heavier surveillance with private police forces and metal detectors.
my theory is that they've given up on the FEMA-campening and just want to create a singapore-tier police state where everyone's under constant surveillance and any hint of dissent or revolution will get you black bagged and sent to your local micro-GITMO.
anyway, bullshit aside - /baph/ should be notified about this shit. they probably already know about it though since it used to get posed pretty frequently and this shit is only coming back because of a newfag who searched a certain string on ddg and got a bunch of /sickfuck/ shit in the results.
>>>/baphomet/
>>>/baph/
▶ 678231 (2) No.11368175
>>11368156
Thanks for entertaining my theories. I did also see a very circumspect thread about the whole motive behind Las Vegas
▶ e0519b (1) No.11368201>>11368215
▶ e0e635 (2) No.11368215
▶ daf460 (35) No.11368240>>11373911
>>11367878
>http://i mgsrc.ru/tweenyphile/55243013.html?pwd=&per_page=18
srsly?
YOU ARE A SPOOK
accusing me of baiting lol retarded fuck
idiot you are not taking this seriously at all
▶ daf460 (35) No.11368246>>11368255
>>11366461
tl;dr stfu and stop derailing this thread you spook
THERE IS SOME KIND OF DATA HIDDEN
in these photos
as well as the Dave Flintstone ones
on VOAT this thread got deleted lol
it's really obvious they are pedos and they just shut down sites with cp instead of doing something about it
https://pastebin.com/raw/KttZKgSV
all these sites are down now because of the pedoscum @voat
▶ daf460 (35) No.11368249>>11368255
how obvious does this have to be before you start waking up?
▶ 7e19df (1) No.11368255>>11368272
>>11368246
>>11368249
Probably connected with the pizzagate cabal; what they do and how they do it.
▶ daf460 (35) No.11368272
>>11368255
of course it is which is why if we solve this we solve pizzagate get them while it's hot
▶ daf460 (35) No.11368282
apparently this has been done already
https://de.pastebin.ca/2174219
▶ 9ece8a (1) No.11368290
>>11365555
>please help someone?
There can't be anything large hidden in a 550x344 PNG image with lots of details which takes 45 KB only, only if some piece of text.
▶ 49ab71 (1) No.11368314>>11368417
>>11366175
I remember reading in plaintext somewhere that their password system worked as follows (approximately):
EZ = 12345
ZE = 54321
EZE = 123454321
EZZE = 1234554321
ZEZ = 543212345
ZEEZ = 5432112345
…and so on, and so forth. Not all passwords involve such "EZ" clues; some are in plain sight, or maybe in the comments of one image in an unencrypted album.
▶ d82ffa (1) No.11368333
>>11367640
>he hates them because he went on record and said so
>he didn't know until we knew
>jews never lie
the state of /pol/
▶ 000000 (21) No.11368375
[pop]YouTube embed. Click thumbnail to play.
>>11366502
There are many agencies involved. This one would normally be examined by feds and they'd figure out the jurisdiction(s) involved, and go from there.
>>11366749
V4CR are pipe hitters that break stuff that needs breaking. They probably won't get involved with pic trading.
FYI, they've also a documentary coming out in few months called Contraland that's designed to educate people with an overview on this subject, and on pedo methodology, so we can start stopping the problem before it begins.
▶ 000000 (21) No.11368417>>11370328
>>11368314
Check the various "uncensored wikis" on TOR for updated clues and passwords. There used to be an active group of anons who'd dig up and report anything related to said clues/passwords. Don't know if they still do it.
▶ a1d42c (1) No.11368544>>11368562
>>11365550 (OP)
>not knowing who uses img src ru
>not knowing it's mentioned on the hidden wiki
▶ daf460 (35) No.11368562
>>11368544
tell me then wtf is this vague shit
▶ b4d7d5 (2) No.11368925>>11368989
>>11368145
That solves that mystery.
▶ daf460 (35) No.11368989
>>11368925
because it was not a mystery
just some derailing fucking shills
▶ ef9a2c (2) No.11369012
>>11366595
Yeah, the pictures included links to rapidshare uploads indeed.
Well man I cannot answer why it was necessary, in retrospect it's not something you wanna hide, but I did see this at a friend's place who was part of this "inner circle" metal warez group lol.
The point is regardless: encrypting a link in images is not something high tech.
▶ b4d7d5 (2) No.11369073
>>11365555
The comments might just be in reference to the users' profile pictures, it's also possible that the file names correspond with images in their private albums.
▶ 70c482 (1) No.11370328
>>11368417
>on TOR
Got a breadcrumb for those who want to dig?
▶ 9e333d (1) No.11370668
holy fuck, I have no idea how any of this works but its intriguing as fuck
hope you guys fuck over that pedo scum
▶ 918666 (2) No.11371772>>11371972
>>11368268
Surely that image is a fully loaded can? Wtf why is /pol/ so backwards lately, here is an epic thread that needs attention, and its not stickied! Yet they have a fucking thread about a book being censored on ebay, yet when I pointed out the hipocracy and blatant strangeness to that thread being stickied I got called a jew? This thread is a lot more important and needs some autistic oversight to say the least.
▶ 5be1b8 (1) No.11371972>>11372088
>>11371772
This thread is extremely important which is why it's NOT stickied. You want it sitting at the front page to attract the shills?
▶ 918666 (2) No.11372088
>>11371972
Cmon now, that seems rather backwards, as over the years of coming here and especially all the way through the election every thread of importance had its place on page 1. It just seems counter productive to let rubbish threads populate page one and hope the “important” threads will hover enough amoungst the other pages, and to proclaim such logic based on shills alone, unless I have missed something, that just doesnt seem right to me. Good god if so since when did such inter-dimensional chess begin to be played out?
▶ fd1cf4 (3) No.11372210
update bump.
Still entering all the info I've gathered, pic related.
censored to prevent spooking the prey
Don't worry anons, just because the thread isn't very active doesn't mean we aren't working on it.
▶ 8a9b0f (1) No.11372366
One day we'll kill them all. Keep up the good work men. God bless you all.
▶ fd1cf4 (3) No.11373096
Fucking hell I'm just going to hire a site archival service in hours alone I'm past the $1,500 mark.
▶ 000000 (21) No.11373287
http://imgsrc.ru/main/user.php?user=jacknjill1986
http://imgsrc.ru/main/user.php?user=sallyohsally
http://imgsrc.ru/main/user.php?user=b6tnh281
▶ 000000 (21) No.11373308
http://imgsrc.ru/main/user.php?user=twinkle-cave
▶ 000000 (21) No.11373322>>11373361
For some odd reason a lot of account have 12 images in a single album and will proclaim that
http://imgsrc.ru/main/user.php?user=jojo68
▶ 51cf07 (1) No.11373361>>11373380
>>11373322
see
>>11368145
I would help out more but I am terrified of following any of those links.
▶ 000000 (21) No.11373380
>>11373361
k
http://imgsrc.ru/main/user.php?user=nudist100
more shit
▶ 000000 (21) No.11373430>>11373644 >>11374358
ALERT: I FOUND FULL BLOWN PEDOPHILIA
http://imgsrc.ru/main/user.php?user=bobby010
▶ bcb962 (3) No.11373440
Hi it's the guy who was gonna post possibly encoded images. I'm still looking for my old hard drive
▶ fd1cf4 (3) No.11373644
>>11373430
why are you surprised?
▶ b99501 (2) No.11373853
AFAIK some basic steg techniques include hiding data in the white space in the blocks. I don't have too many steg tools anymore, but I did check the exif to see if they just buried the suspicious link in the comment field. As another anon said, a 45KB file likely will NOT have buried CP unless it's just another link as previous anons have mentioned.
One favored method of pedos is to change file conventions, requiring people change it back to the original file type to view the real payload. In this case converting a .txt file containing a link into an innocuous .png. I only know about this stuff because I remember hearing that back in 4chan /b/'s heyday, a lot of anons traded CP this way. many of those images saying '4chan gold is requiring to view' were 2MB files filled with pedo shit, but I was young so I never noticed.
▶ 9784cc (1) No.11373911>>11373915 >>11373928
>>11368240
>eye love 2 water young naked naked girls with flat tire blue footed booby nigger hand hairless cats
What is this fucking kike trying to say?
▶ b99501 (2) No.11373915
>>11373911
From top left to bottom right:
I love to see young naked girls w/ flat boobies and pussies
▶ 1b28e6 (1) No.11373928
>>11373911
Either he had a stroke (god I wish), it's some form of code where the nonsensical parts give some information, or it's a phonepedo who had an autocorrect problem.
▶ f4db7e (1) No.11374019>>11374358
None of the sizes of these images posted are large enough to steg hide picture or embed an archive. File size needs to be ~500k to be suspicious (for a photo). These files could only steg hide small text files ~1k-5k.
▶ 971bde (1) No.11374200>>11374352
>>11365769
Ther german user ask if also has nudes. Could this mean they are pedos ?
▶ 13a45b (3) No.11374352
>>11374200
I have yet to come across a user on that site that isn't related to pedoshit.
▶ 893100 (1) No.11374358>>11374374
>>11374019
vichan removes steg / embedded archives. even cuckchan does these days.
>>11373430
what does it say, i ain't clicking that shit nigger
▶ 13a45b (3) No.11374374
>>11374358
Some teenage kid posted pics of his dick
▶ a04f38 (4) No.11374425>>11374655
>>11367398
>How am I supposed to help people if I am in prison for murder?
Don't get caught dumb ass. Fuck. Are you stupid? Pedos are not human. They are demons and must be destroyed. How can you become an effective demon hunter if you assume you're going to get caught. Be smart. There are lots of resources online. The only way to clean the Earth of this scourge is to target these demons like some killers target human hookers. Hookers are a waste of effort when there are so many pedo demons to kill.
▶ 829e07 (1) No.11374520
Has anyone tried checking if there are files embedded into the pictures?
PDFs, other images, text, etc.
▶ 13a45b (3) No.11374655
>>11374425
I'm not disagreeing with you anon, but I cannot say anything beyond hypotheticals.