There are people and organizations who send images and have a program which analyzes each color of each pixel to form lengthy messages, having entire series of books worth of content completely hidden in a large seemingly normal image. A receiver can have a one-time encryption for that specific image or it can be an image shared around with a distributed program that will allow you to view its actual contents. The CIA has had this technology for the past 30 odd years and can do the same thing with moving images like videos or gifs. They use a super computer to tweak extremely large images in ways that can be read by a program that's generated by the same computer. This is done in a quarantined space and transferred online to be spread around to create a vast information network that can only be read by intended individuals and organizations but is freely spread far and wide by the general internet communities.
It has no extra file weight, it has no way to really crack it without having a program capable of reading it and backwards engineering it, and it means you right now potentially hold a vast amount of deeply confidential information if you can crack it.
The CIA isn't the only organization that has had this. People still do use it though, namely criminals and elite individuals who have reason to hide vast amounts of information over a large invisible network. If such information can be cracked it will implicate a large amount of people, some very important individuals who you would never guess in a trillion years.
They send messages through youtube videos, news images, streamed television, pirated movies, it's scattered all over. Although it requires a super computer to manufacture the message encoded, theoretically any form of learning code could unravel it given enough time and dedication. It is the primary reason the CIA wanted control over media organizations, the propaganda was another bird.
What an idiotic theory. Why would you use an image instead of simple cryptographed data? That's impractical.
Alexander Hernandez
Because it has limits and leaves evidence where as this can send entire agency databases worth of information through a 10MB video creating a system of extremely high data transfer at extremely fast speeds.
Evan Allen
Op has never worked with image files
Colton Gonzalez
go back to sleep this thread is for those that are awake
Jacob Nguyen
Deep State Operative here; Islamic terror cells usually send their communications embedded in CP.
Jeremiah Richardson
Limits can only be reached using an image or video instead based on extra data. If you surely can't read the data, there's no trace, that's a rule.
Ayden Cox
You fucking retards don't get it; this allows them to make and receive as large a forum of contact and discussion as needed, globally, even outside of the internet. In its final form it's based on imagery rather than any actual data, to the point where advanced enough computers could pick a completely undetectable 8,000,000 word message off a twenty-minute tape being played through a VCR.
Isaac Lewis
No it's real it has been around since pre internet times it is called stenography.
Andrew Rodriguez
If you can't read it but know it's there then there's a trace.
Luke Watson
You are right but as you say it is 30 odd year technology (within computers)
I think there are some other examples of artists hiding small messages in paintings or pencil drawings and this would be the older form of stenography.
Christian Ross
If you need to decode an image using a computer, you're not outside the electronic world. Different times, different uses.
Camden Bennett
This is disturbing and yet probably true. As if you needed any more evidence these people are literally Satanic...
Christian Peterson
Huffman tables.
Isaiah Lewis
Anybody with a PC or cellphone can do this. A lot of nigga gangs use it. Stop with the drama.
Noah Torres
This is disturbing and yet probably true. As if you needed any more evidence these people are literally Satanic...
There is digital image stenography the current method as well as old world stenography which could hide very short messages. Just google stenography there are probably DefCon talks on the topic.
Anthony Lewis
If you think about it absolutely makes sense; it's how these societies have operated for hundreds if not thousands of years. Imagine what they would consider to be the cutting edge of this technology: videos you can watch which will dispatch knowledge directly into your mind to advanced levels. Just a few minutes of erratic sickening movements of color and light and you fully understand humanity's full knowledge of physics, mathematics, pottery specifics, anything. How hard of a time do you think such a perfect think-tank of people able to dispense all this knowledge would have keeping themselves secure and secret?
this is called steganography and it's nothing new. you can literally use this on your home computer hassle free, it's just really inconvenient and you're better off encrypting your data end to end anyway
Same thing. Impractical as fuck, objectively said, based on use. What you people are saying is to just add a 10^255(RGB) to modern data crypto.
Mason Butler
Yeah,
Mason Ramirez
Here is a cool video for anyone who wants to hear about historical steganography youtu.be/c8LrqAm3CfA
Levi Stewart
Great doc that is and proves my point. Blessed be thee.
Henry Foster
Go to the used book store. Find two old books for like twenty bucks Number the words on each page randomly the same in each book Send perfect encoded messages
Lucas Roberts
This is also how you can embed a trojan in a picture You edit a file with notepad
I downloaded the top images from imgur for like a week and used stegdetect and like a tenth of them had steganographic messages inside. I believe you OP.
I don't doubt this the least bit. I filled out some surveys for Nielsen ratings and got a few bucks in the mail. They have this program were they want you to carry around a beeper sized device which monitors the audio of broadcast media (terrestrial and internet radio, network and cable tv) for embedded, inaudible signals that can identify what program is being watched or listened to. I never followed through since it was a lot to do for about $15 a month.
Thomas Lewis
This is why socialism never works. Practicality is always off the "menu".
Gabriel Thomas
Cell phones listen to those signals too, carriers often have the daemon which senses them running in the background as add on bloatware that you can’t even see.
Elijah Harris
>N DEEP MESSAGE ENCRYPTION
It's called steganography and it isn't new.
Ayden Wood
Thanks bro you too!
Balls deep encryption is new Assange was working on it called it the "rubber hose file system" It was a Pentagon grant he got kicked off and that is where his grudge for WikiLeaks came from.