Vindicator

Giving this our "Possible Disinfo" flair based on comments.

sig94

From the example given in the Twitter link , this is data written into an image file from a steganography (secret writing) software program known as Outguess. Look here under Method 3 to see the steg receive: seed: format..

I received this kind of training for BMP and JPG files almost 20 years ago. Of course the technology has changed significantly since then but I am retired and no longer maintain my training. BMP files were the easiest to decode as the three lesser bits of an 8 bit BMP file are manipulated to write the hidden file data. This cases a very slight degradation of the image file when viewed but it is pretty much indiscernible to the naked eye. Steganography detection software analyzes any image file manipulation to determine if that file contains hidden text or other images.

skrrata

We know what steganography is.

What we don't know is if he really got the image from nypost or not because where is the proof of that?

mathemagician33

I suspect that he did something like this. If you search google (or a proxy for it like ixquick.com) with the query "site:nypost.com thenypost.files.wordpress.com" you will find links to many pages which themselves contain links to images that were posted on the wordpress domain. I suspect he used (or wrote) a scraping tool (or maybe refined the search query) to extract images having urls matching "Jeffrey-Epstein-*" or whatever wildcard string he mentioned. I don't know why he wouldn't just post the direct links, though it may have been done with the intention of not 'setting off alarms' at the nypost.

skrrata

The picture has been found, read the edit

letsdothis3

I had a look. Think it's much ado about nothing.

skrrata

Check the edit, I was able to find the image and there is something there

heygeorge

big problems with his claim:

He didn't post the link to the nypost images, instead he uploaded them on mega.

Yeah, this is a serious issue which immediately triggered my sniff test. Was he unable to archive the images in question?

NowThatsInteresting

Thanks for bringing this to our attention. This guy Luke understands definitely what he’s talking about and seems honest for asking for help since he’s stuck. He cannot link it back to the CMS site of NYP as it redirects to the main site as demonstrated.

He’s also using parrot sec (Linux distro) which has all the tools he might need to do the investigation. For now I believe him. Until I get a chance to look at the files he downloaded to mega.

letsdothis3

A secret key that's called secret key?

skrrata

Well... I work in infosec and I think this guy doesn't understand what he's talking about lol.

I mean, somehow he is. But some of his tweet make no sense. Like the one where he compares Ghislaine pic to Cicada makes 0 sense. It seems to be just there to grab attention and likes, and again, I haven't found these pictures yet... If he was really good at infosec, the first thing he would have done is archive the original images

zerost8te

Cicada kids are a different bunch, may have been a callsig to let them know, or simply incite them as viewers

mathemagician33

this is pretty consistent with what I noticed as well, I'm another infosec fag.

skrrata

Yep, I had forensic peeps confirm it's a false positive.

It's a shame so many people are falling for it though.. These people are in their own bubble and believe what they want

letsdothis3

It's a tactic used by cyber soldiers.. mix some tech talk with nonsense.

derram

https://archive.ph/VJvLu :

Luke Slytalker & The Force on Twitter: "We’ll just get right to the meat& potatoes—I found a thing. Happening currently.

Embedded PGP Encryption Key???

Inside of Jeffrey Epstein photos, uploaded by the NYPost.… t.co/tgpfTFioWg"


This has been an automated message.