If you can, please edit this post with these double enters. Keep note that double enters will disappear each time you do a fresh edit.
Also, edits may take time to be processed by the server, so if unsure that your edits were committed or if the edits fail to commit, copy your edited text to a text document and restart your browser for a fresh session.
He's not. Binvis isn't going to tell you if there's steganographic content. He's not showing us the output of a steganography detector like Pixelknot / stegdetect. In his example with the blue blob, if there was steganographic content in that space it wouldn't be solid. It's also easy to figure out if there's an added trailer or not (you can append any extra data you want to the end of an image or ZIP file), but he hasn't done so.
This sounds like it might show something, but I'm not sure. Probably makes sense to start with some pics that don't have messages in them. Get an idea of what a normal jpg, png, etc, looks like. Each format is different and most of it should just be "random" where the bits of the picture are.
Then add a message to each pic and compare the original against the one with a message?
Steg. messages are supposedly hidden in the bits of the image, by changing them slightly across the actual image. 251,143,207 becomes 251,143,208 maybe, RGB values I mean. I say "supposedly" because I'm not an expert at all.
I don't think you're going to find a large area of a single color indicating a message. Someone posted recently that images with messages were larger than the originals. So maybe there are apps that just append the message somehow? Seems like that would definitely show up in binvis.
I'll try adding messages to a few test files with pixelknot, and post the binvis comparisons. Apparently that's not the code being used, though. It adds a header to the pics, which I didn't see on the SF pics.
Yes, on android. Open the app and pick a picture, then add the message and password. It finishes with "send the pic" and lets you choose Drive or mail or whatever. I mailed the pic to myself. It doesn't change the pic that you add the message to, on the tablet.
Then, get the pic out of mail, put it back on the tablet with a usb cable or wifi file transfer or whatever. Use a file manager to get to the pic, and when you hit it, the "open with" list will include pixelknot. Hit that, and it gives you the screen to enter the password and recover the message. Takes about a minute, for correct or wrong passwords.
The large hi res space force picture just hangs, when I try that. Might be too large for the app. The small one finishes with an error immediately, not sure if it supports webp format. But like I said, I don't think that pixelknot is the app they used. Even though Q mentions it specifically.
I tried a few different things, took a picture with the camera from the app, and a random one I downloaded. Didn't try the recent pic where he's walking into the building with the row of stars across the pavement. But again, the space force pics do not look like they came from pixelknot. It leaves a header in the pic that shows up as text, and those pics don't have that.
Test results here with three different files, comparing the original, a short message, and a longer message, with binvis. Original files are all jpgs, same version as the space force one, "JPEG image data, JFIF standard 1.01". Binvis output files are all png. I checked that catbox.moe doesn't change the file at all, so the test messages should be recoverable with pixelknot. Password for all the files is WW1WGA, the longer message is the shorter one plus a bit more text.
Links here are original, original with short, original with long, then binvis of original, binvis of original with short, binvis of original with long. The only useful part maybe is what the original jpgs look like in binvis? Files with messages are a lot smaller than originals, pixelknot is doing some kind of compression?
i flipped the space force pic upside down, and the lighting around the guys in the front seem different. look at their shoulders. makes me wonder if this is a composite.
Aha! The sun does NOT cast shadows in perspective. If it were close enough to cast this shadow, not only these soldiers but ALL of us would be torched.
Those shadows are either manipulated, or the true light source is just above and slightly behind these guys. Black hole sun?
Not up on that, but if I find some time I'll check it out - thanks for the heads-up! Happy to contribute - hopefully someone skilled in stegsolve can check it out.
Yes always use the original. When using an image hosting site, it can compress, delete EXIF data and many more to an image, making it different from the original.
We have a massive amount of info. Anonymous would be someone who would have the resources and skills to get the messages out if anyone. We are anonymous. We are legion. Expect us... that’s a good slogan. However, they can breech most anything. Would be nice if they could lend a hand. NCSWIC. Maybe if 88 million strong can band together, we can uncover what is being said. Q dropped the info for a reason, whether it be for us to decipher or a team effort to decipher. Just a thought...
So all digital images are made up of tiny pixels that are a single color on your screen. These pixels are represented by binary 1s and 0s in a bit-map image (.bmp) ... more complex file types compress these ones and zeros into much smaller sizes using various algorithms, resulting in .png .mpg etc. Jpegs lose some information when compressed so we can't use them for the next step.
Since each pixel can represent so many colors, a slight alteration to the numbers (say, the last bit or two) is unnoticeable to the naked eye as it simply tweaks the shade of a pixel slightly. A program/tool can systematically alter the last bit or two of every pixels, spreading tiny pieces of a message throughout the picture, hiding/encoding it undetectably in plain sight.
If you know how the manner in which the data was "encoded" (i.e. is it only in the last bit of each pixel? Or more?), you can then take all those altered numbers, build them back into characters(letters, think ASCII for this example) and decrypt(translate) the result with the password from garbage noise to (hopefully) meaningful data.
That's at least the basic overview / starting-point ... it can get pretty complex from there. I haven't played with stuff since undergrad Comp Sci. Really cool to see it used (for good) now. :)
If it helps, you can think of hiding a message in a book by using the first letter in each paragraph to spell a message (I know, not a perfect example, but might help our non-techie frens). Or like using the 1st note in every 4th measure of music to spell a word (assuming we had as many note names as our alphabet).
Steve Cortes posted a pic of GEOTUS at Mar a Lago and there's a weird heart shape with a diamond below GEOTUS hand. Almost like a reflection but not.
I'm not sure. It just seemed curious to me this was posted when you were trying to figure out a password. We know they lurk here. Strange heart shape with a diamond below his hand...probably nothing, hoping it's something. Wish I could link the pic here. It's from his Twitter account.
this is what I found when I opened the picture up in notepad. So I copied this little bit and searched it in a google browser. It has yielded some interesting results so far. Still digging though.
found in metadata when scanning the sourcecode of the "key" image.
"www.w3.org/1999/xhtml" - when searched, yeilded nothing but a revolving loading circle. So I deleted the xhtml and left the 1999, and it took me to a sign in page needing a username and a password.
had a long drive tonight, so I am just getting back to my digging.
not the best at coding, but I do believe something can be found in this image, but I believe that common pre-made stego apps, will not be able to unlock the data inside. I did however run the image and looked at the bit maps, and I do believe there is something in there.
When looking at the html formatting though, there is a background, boarder, padding, and then image.
but if there is any sort of cosign jstegging going on, there is going to need to be some pretty hardcore analysis performed on this picture.
I am just digging for anomalies in the data within the pic, like links to websites, unusual patterns, and so forth to point out in case there is something that can be done with them.
When inspecting the image, I decided to do a google search using the image to search with. I found some corresponding images.
I have uploaded those images to gofile that I have provided below. I then opened all three of the images I have in binvis.io and changed the color scheme to entropy, and noticed that the block in the upper left corner seems to be the image itself, because the bits don't really change at all. When looking at the color scheme of the upper left block between the three images, in the default bitmap color scheme the upper left block does change but I do believe that to be because the numbers in the three images change, so that could be the reason for that.
But..... looking at the bottom left block, between the three images, there is a good level of change. And with the big gap, between the upper left block, and the lower, of just fuzz, that is more than likely just nothing in my opinion.
So basically, whatever is hidden in these pictures, seems to be in the bottom left corner of the bitmap. I believe that is where the encoded data resides.
I am going to focus on what stands out in that block of bits in the bottom left corner of the bitmap.
It's like having all the pieces of the puzzle but only after [news unlocks] can the puzzle [full picture] be put together.
Q
What I mean is this, if we list out the images dropped by Q (pieces), and correlate them with resignations (news unlocks) then the full picture can be put together.
also consider this post...
4659
Q !!Hs1Jq13jV6 09/10/2020 21:25:24 ID: dd7b12
Archive Bread/Post Links: 10597058 / 10597394
Direct Link: 10597394
Anonymous 09/10/2020 21:23:14 ID:f42df9
Archive Bread/Post Links: 10597058 / 10597334
Direct Link: 10597334
10597304
easiest way is to recrop an image slightly smaller or slightly larger
another is to just place pixels within the picture as one black pixel usually fools software like this unless it's more advanced
10597334
More advanced.
Consider 'black corner box 20%' insert top-bottom left/right.
Sniffer cannot distinguish at this time.
Q
That could imply that the picture has been photoshopped entirely? Not sure why but yes, they do stand out big time, as if they were cut up from different picture then placed in another picture, like you do with magazine cutouts.
Trump looks normal with bits of artifacts around him, especially along the silhouette, but the Space Force has artifacts ALL over them.
It's important to realize that computers don't "see" like our eyes do. Even images to them ultimately are ones and zeros. Computers are simply taught to recognize patterns in the 1s and 0s that match their instructions ... think the Matrix scene where Cyrus is explaining to Neo how he watches the operator screen.
Step outside of your human limitations/mindframe and think like a machine. The patches highlighted are areas where data is consistent / possible patterns exist.
If a file/image contains no clear patterns, it's most likely empty. The converse implies that any strong, repeated pattern (especially a solid region) is very unlikely to be natural (i.e. mathematically impossible).
You're not stupid. This is a very specific skill and ability.
I'm really good at another specific technology but have no expertise in what they're doing. I'm sure you're an expert in other things. Don't downgrade yourself.
I can't help either but it's fun watching them puzzle through it!
I think the reason that Q told us about this is to make us aware. Also to make the bad guys aware that they are onto them. That they know about their picture codes.
No not saying it can’t be detected. May take multiple advanced platforms to do so. Run your image, then save the pic, then try to run that one through another one. It’s just a theory, but when I was programming, multiple layers were used. Encryption is breakable if the right layers are peeled back. Think onion....
No, there is other software that you can run it through. It’s trial and error at this point. Try multiple ones. Example, take 3. Run them through the 3 in different order and see what you get. You are on to something huge, but I think about how sophisticated your program is. Encrypted photos are hard to break. Enough time and you will get results. Q dropped an American flag image. Start with that. It’s easier. Then go bigger. The agencies are the most sophisticated in the world at their job. It won’t be a walk in the park. As aforementioned... think onion...
Maybe make the picture 20% transparent and then stack other pictures on top. It says 2-4 days in #4661. Might need that many days worth of photos to show the message.
You all are truly amazing. I feel like a kindergartener sitting in on a differential equations class and should probably just sit here quietly. However, I'll raise my hand with a timid little idea--has anyone tried the word "stone" as a password? The key "stone"--and from the Kim Clement prophecy, "He will bring down the giant with a stone--remember the name."
I'll be happy to. Just give a shout out when you're ready for that step. What you all are working on is mind blowing. I will be praying for your team to have clear minds and divine insight as you dig. ?
Alright, so based on what you're saying, Q125 is the key, as stated by q127. Look at the next post q128. It asks what is a map and what is a legend. You specified certain regions that looked... off. What if this is the next step, decoding where to look in these images?
Key may be in the image where the pixels look like a map key at the lower left. Perhaps a secondary program to clean up pixels after they have been broken down via binvis may help?
News unlocks map. Hey, can someone who can run these apps run the maps of the locust swarms that Pompeo tweeted about a while ago? I tried to find a message in them just looking at them a while ago. News=North East West South?
764
14-Feb-2018 9:52:21 PM PST
8ch/qresearch
You are missing the connections.
Continue to build the MAP.
MAP provides the KEY.
KEY spreads the TRUTH.
TRUTH shines LIGHT.
LIGHT saves HUMANITY.
Future proves past.
Trust the plan.
Q
So many results turn up in Q drops when looking for:
Key, keys, keystone.
Lots of context about the map, the graphic, keystone unlocks everything. Wasn't there a map graphic that we focused on maybe a month ago? Tied into an updated map, map holds the key?
military prolly has this unlocked they need us to unlock for public knowledge. the key is probably related to Q drop "proofs" time, date, misspelled words
I would start with the following ideas for decryption keys:
long alpha-numeric names of photos Q posted (ex. Dkrr0VeXgAArTN3 [.jpg] from 4914
repeatedly used phrases, trying upper/lower case variations, substituting . (dots) for spaces, underscores for spaces, etc.
-- WWG1WGA
-- You have more than you know
-- God Wins
-- These people are sick
-- etc.
Been binging the Terminator series, since I never actually watched the movies. Lots of crazy connections to the current situation and Q drops. Just heard the line: "Kyle Reese, he's the key to the future" or something... Could that be a key? "Kyle Reese"??
So all night I wondered could it be possible that the photos that tom hanks posts could have multiple pictures embedded and encrypted in the photo? Could it be a way these creeps share images without being caught certain people know where and what to look at but everyone else is oblivious? His posts picture is actually a "calling card" for the type of images embedded? Ie... hidden in plain site
I'll bite. I really think you are on to something.
I agree. There is some interesting and good investigative work going on here. I'm just gonna put this out there though for the OP:
Paragraphs, they're a thing.
In order to make paragraphs on this site you need to press enter twice between them. It would really help your readability if you used them.
If you can, please edit this post with these double enters. Keep note that double enters will disappear each time you do a fresh edit.
Also, edits may take time to be processed by the server, so if unsure that your edits were committed or if the edits fail to commit, copy your edited text to a text document and restart your browser for a fresh session.
Agree
He's not. Binvis isn't going to tell you if there's steganographic content. He's not showing us the output of a steganography detector like Pixelknot / stegdetect. In his example with the blue blob, if there was steganographic content in that space it wouldn't be solid. It's also easy to figure out if there's an added trailer or not (you can append any extra data you want to the end of an image or ZIP file), but he hasn't done so.
Because clearly they know less than they proclaim
This sounds like it might show something, but I'm not sure. Probably makes sense to start with some pics that don't have messages in them. Get an idea of what a normal jpg, png, etc, looks like. Each format is different and most of it should just be "random" where the bits of the picture are.
Then add a message to each pic and compare the original against the one with a message?
Steg. messages are supposedly hidden in the bits of the image, by changing them slightly across the actual image. 251,143,207 becomes 251,143,208 maybe, RGB values I mean. I say "supposedly" because I'm not an expert at all.
I don't think you're going to find a large area of a single color indicating a message. Someone posted recently that images with messages were larger than the originals. So maybe there are apps that just append the message somehow? Seems like that would definitely show up in binvis.
I'll try adding messages to a few test files with pixelknot, and post the binvis comparisons. Apparently that's not the code being used, though. It adds a header to the pics, which I didn't see on the SF pics.
Yes, on android. Open the app and pick a picture, then add the message and password. It finishes with "send the pic" and lets you choose Drive or mail or whatever. I mailed the pic to myself. It doesn't change the pic that you add the message to, on the tablet.
Then, get the pic out of mail, put it back on the tablet with a usb cable or wifi file transfer or whatever. Use a file manager to get to the pic, and when you hit it, the "open with" list will include pixelknot. Hit that, and it gives you the screen to enter the password and recover the message. Takes about a minute, for correct or wrong passwords.
The large hi res space force picture just hangs, when I try that. Might be too large for the app. The small one finishes with an error immediately, not sure if it supports webp format. But like I said, I don't think that pixelknot is the app they used. Even though Q mentions it specifically.
I tried a few different things, took a picture with the camera from the app, and a random one I downloaded. Didn't try the recent pic where he's walking into the building with the row of stars across the pavement. But again, the space force pics do not look like they came from pixelknot. It leaves a header in the pic that shows up as text, and those pics don't have that.
Test results here with three different files, comparing the original, a short message, and a longer message, with binvis. Original files are all jpgs, same version as the space force one, "JPEG image data, JFIF standard 1.01". Binvis output files are all png. I checked that catbox.moe doesn't change the file at all, so the test messages should be recoverable with pixelknot. Password for all the files is WW1WGA, the longer message is the shorter one plus a bit more text.
Links here are original, original with short, original with long, then binvis of original, binvis of original with short, binvis of original with long. The only useful part maybe is what the original jpgs look like in binvis? Files with messages are a lot smaller than originals, pixelknot is doing some kind of compression?
eggs,
https://files.catbox.moe/ktcmyb.jpg
https://files.catbox.moe/xj675r.jpg
https://files.catbox.moe/vjrfd0.jpg
.
https://files.catbox.moe/gr4b18.png
https://files.catbox.moe/ffccov.png
https://files.catbox.moe/1hf61v.png
middle east,
https://files.catbox.moe/ez9z2k.jpg
https://files.catbox.moe/0vy69q.jpg
https://files.catbox.moe/nxjyyp.jpg
.
https://files.catbox.moe/lcoxo0.png
https://files.catbox.moe/dfxyut.png
https://files.catbox.moe/69bh25.png
harbor,
https://files.catbox.moe/tu8zyv.jpg
https://files.catbox.moe/a123sk.jpg
https://files.catbox.moe/qt6d3t.jpg
.
https://files.catbox.moe/asoys0.png
https://files.catbox.moe/9micd9.png
https://files.catbox.moe/lmbxqw.png
I don't know if it was intentional but in your post, you had two of the same links to the Space Force pic.
Not sure if you were supposed to provide a link to the original while the 2nd link is to the pixel picture of Space Force you uploaded to binvis.io?
i flipped the space force pic upside down, and the lighting around the guys in the front seem different. look at their shoulders. makes me wonder if this is a composite.
Aha! The sun does NOT cast shadows in perspective. If it were close enough to cast this shadow, not only these soldiers but ALL of us would be torched.
Those shadows are either manipulated, or the true light source is just above and slightly behind these guys. Black hole sun?
The photo point-of-view adds perspective though. Search for similar (unrelated) photos in the sun, like "beach group photo".
There could be all sorts of trickery in that photo I don't know, but the direction of shadows looks normal to me.
Not up on that, but if I find some time I'll check it out - thanks for the heads-up! Happy to contribute - hopefully someone skilled in stegsolve can check it out.
I had just been looking at the men in front, men in back, hands behind back, folded in front left over right, right over left, and loose at sides.....
Exif data shows software as: Adobe Photoshop Lightroom Classic 7.1 (Macintosh)
Yes always use the original. When using an image hosting site, it can compress, delete EXIF data and many more to an image, making it different from the original.
Wholly Shiitaki....
This whole movement definitely has to have a tremendous Heavenly Spiritual facets buried within like layers of an onion
How else could these layers of brilliance be fully manifested ??!!??
During my journey with Q my mind has spun more than once More like a dozen of times or more....
This is another specific, spectacular moment that provides
Proof after Proof after Proof...
As Q always have referenced.....
" You have more than you know..... "
The depths and degrees of that specific comm is Mind Blowing
WWG1WGA
We have a massive amount of info. Anonymous would be someone who would have the resources and skills to get the messages out if anyone. We are anonymous. We are legion. Expect us... that’s a good slogan. However, they can breech most anything. Would be nice if they could lend a hand. NCSWIC. Maybe if 88 million strong can band together, we can uncover what is being said. Q dropped the info for a reason, whether it be for us to decipher or a team effort to decipher. Just a thought...
This is embarrassingly going way over my head. Could we get a layman's ELI5 for all the special kind of retards like me?
All I see is a bunch of blue and red
So all digital images are made up of tiny pixels that are a single color on your screen. These pixels are represented by binary 1s and 0s in a bit-map image (.bmp) ... more complex file types compress these ones and zeros into much smaller sizes using various algorithms, resulting in .png .mpg etc. Jpegs lose some information when compressed so we can't use them for the next step.
Since each pixel can represent so many colors, a slight alteration to the numbers (say, the last bit or two) is unnoticeable to the naked eye as it simply tweaks the shade of a pixel slightly. A program/tool can systematically alter the last bit or two of every pixels, spreading tiny pieces of a message throughout the picture, hiding/encoding it undetectably in plain sight.
If you know how the manner in which the data was "encoded" (i.e. is it only in the last bit of each pixel? Or more?), you can then take all those altered numbers, build them back into characters(letters, think ASCII for this example) and decrypt(translate) the result with the password from garbage noise to (hopefully) meaningful data.
That's at least the basic overview / starting-point ... it can get pretty complex from there. I haven't played with stuff since undergrad Comp Sci. Really cool to see it used (for good) now. :)
Eating dinner right now. Let me put the kids to bed first.
If it helps, you can think of hiding a message in a book by using the first letter in each paragraph to spell a message (I know, not a perfect example, but might help our non-techie frens). Or like using the 1st note in every 4th measure of music to spell a word (assuming we had as many note names as our alphabet).
Oops. Meant to reply to you, but replied to the reply.
Doesn’t sound dumb at all! It’s over my head, but if I need to fire up my MAC - I’m down!
Apple logo could also be a nod to Alan Turing
Didn't George just do the picture of the key? Blue box key(s)?
Came here to say this too. Talking about the image in this post: https://greatawakening.win/p/12hRQKr1u6/blue-box-pt2/c/
Steve Cortes posted a pic of GEOTUS at Mar a Lago and there's a weird heart shape with a diamond below GEOTUS hand. Almost like a reflection but not.
I'm not sure. It just seemed curious to me this was posted when you were trying to figure out a password. We know they lurk here. Strange heart shape with a diamond below his hand...probably nothing, hoping it's something. Wish I could link the pic here. It's from his Twitter account.
Space Force team photo is definitely Photoshopped. Their shadows are 100% fake.
https://www.wayfair.com/rugs/pdp/isabelline-one-of-a-kind-leonide-hand-knotted-tibetan-gray-10-round-area-rug-w001598203.html
I wouldnt go down that road. Go down too far you will regret it. I definitely do.
gd-jpeg v1.0
this is what I found when I opened the picture up in notepad. So I copied this little bit and searched it in a google browser. It has yielded some interesting results so far. Still digging though.
gd-jpeg is a tool part of LibGD, one of the graphic libraries used by many linux distributions and web servers
https://libgd.github.io/
found in metadata when scanning the sourcecode of the "key" image. "www.w3.org/1999/xhtml" - when searched, yeilded nothing but a revolving loading circle. So I deleted the xhtml and left the 1999, and it took me to a sign in page needing a username and a password.
had a long drive tonight, so I am just getting back to my digging. not the best at coding, but I do believe something can be found in this image, but I believe that common pre-made stego apps, will not be able to unlock the data inside. I did however run the image and looked at the bit maps, and I do believe there is something in there.
When looking at the html formatting though, there is a background, boarder, padding, and then image.
but if there is any sort of cosign jstegging going on, there is going to need to be some pretty hardcore analysis performed on this picture.
I am just digging for anomalies in the data within the pic, like links to websites, unusual patterns, and so forth to point out in case there is something that can be done with them.
When inspecting the image, I decided to do a google search using the image to search with. I found some corresponding images.
I have uploaded those images to gofile that I have provided below. I then opened all three of the images I have in binvis.io and changed the color scheme to entropy, and noticed that the block in the upper left corner seems to be the image itself, because the bits don't really change at all. When looking at the color scheme of the upper left block between the three images, in the default bitmap color scheme the upper left block does change but I do believe that to be because the numbers in the three images change, so that could be the reason for that.
But..... looking at the bottom left block, between the three images, there is a good level of change. And with the big gap, between the upper left block, and the lower, of just fuzz, that is more than likely just nothing in my opinion.
So basically, whatever is hidden in these pictures, seems to be in the bottom left corner of the bitmap. I believe that is where the encoded data resides.
I am going to focus on what stands out in that block of bits in the bottom left corner of the bitmap.
https://gofile.io/d/qpcjZ3
Just was rereading... Would 'the graphics' correlate to the pics and codes possibly embedded in the pics?
Drop 922
Keep the resignation list updated.
Important.
Keep the graphics updated.
Important.
Q
edit* Could the resignation list = passwords... date correlation??
Drop 4282 https://www.bloomberg.com/news/articles/2020-05-11/ex-trump-security-aide-who-left-in-controversy-rejoins-pentagon
It's like having all the pieces of the puzzle but only after [news unlocks] can the puzzle [full picture] be put together.
Q
^This^^^
Great idea
Drop 922
Keep the resignation list updated.
Important.
Keep the graphics updated.
Important.
Q
Drop 4282
https://www.bloomberg.com/news/articles/2020-05-11/ex-trump-security-aide-who-left-in-controversy-rejoins-pentagon
It's like having all the pieces of the puzzle but only after [news unlocks] can the puzzle [full picture] be put together.
Q
What I mean is this, if we list out the images dropped by Q (pieces), and correlate them with resignations (news unlocks) then the full picture can be put together.
Make sense??
also consider this post... 4659
Q !!Hs1Jq13jV6 09/10/2020 21:25:24 ID: dd7b12 Archive Bread/Post Links: 10597058 / 10597394 Direct Link: 10597394 Anonymous 09/10/2020 21:23:14 ID:f42df9 Archive Bread/Post Links: 10597058 / 10597334 Direct Link: 10597334
Tried something and this is interesting...
https://fotoforensics.com/analysis.php?id=ce3f82fcc756b39ecfd27bc74868f8cf9119788d.3928429
And I also used the one from GeorgeNews' telegram and got this:
https://fotoforensics.com/analysis.php?id=41e76f3954e943bb64e74f046207d49a191d0292.1534446
The Space Force pic looks to be photoshopped, while Trump pic looks like it's the real deal with zero photo manipulation?
Is there a reason that their patches show up differently? I'm just curious? They just stand out, unlike the rest of the monochrome.
That could imply that the picture has been photoshopped entirely? Not sure why but yes, they do stand out big time, as if they were cut up from different picture then placed in another picture, like you do with magazine cutouts.
Trump looks normal with bits of artifacts around him, especially along the silhouette, but the Space Force has artifacts ALL over them.
It's important to realize that computers don't "see" like our eyes do. Even images to them ultimately are ones and zeros. Computers are simply taught to recognize patterns in the 1s and 0s that match their instructions ... think the Matrix scene where Cyrus is explaining to Neo how he watches the operator screen.
Step outside of your human limitations/mindframe and think like a machine. The patches highlighted are areas where data is consistent / possible patterns exist.
If a file/image contains no clear patterns, it's most likely empty. The converse implies that any strong, repeated pattern (especially a solid region) is very unlikely to be natural (i.e. mathematically impossible).
Yeah, those are too many words ?
I never realized how stupid I am.......and everybody else knows what the heck this is all about....
You're not stupid. This is a very specific skill and ability.
I'm really good at another specific technology but have no expertise in what they're doing. I'm sure you're an expert in other things. Don't downgrade yourself.
I can't help either but it's fun watching them puzzle through it!
Same! Lol
I posted a comment a but above in this thread to help try and explain (for our otherly-talented frens like yourself).
I love this stuff.
I think the reason that Q told us about this is to make us aware. Also to make the bad guys aware that they are onto them. That they know about their picture codes.
Read Q drop 4659
https://qalerts.app/?n=4659
No not saying it can’t be detected. May take multiple advanced platforms to do so. Run your image, then save the pic, then try to run that one through another one. It’s just a theory, but when I was programming, multiple layers were used. Encryption is breakable if the right layers are peeled back. Think onion....
No, there is other software that you can run it through. It’s trial and error at this point. Try multiple ones. Example, take 3. Run them through the 3 in different order and see what you get. You are on to something huge, but I think about how sophisticated your program is. Encrypted photos are hard to break. Enough time and you will get results. Q dropped an American flag image. Start with that. It’s easier. Then go bigger. The agencies are the most sophisticated in the world at their job. It won’t be a walk in the park. As aforementioned... think onion...
Look at all post from the same day as #4659.
It may help
https://qalerts.app/?q=Sep+10%2C+2020
https://qalerts.app/?q=4660
1 is sufficient @ 20% of total. Q
Not sure if relevant but seemed interesting with the stego pic from Qlueless
Maybe make the picture 20% transparent and then stack other pictures on top. It says 2-4 days in #4661. Might need that many days worth of photos to show the message.
Did you do embedded string analysis of these images? See if any phrase (or something close to sensical) pops out and try that as your Stego password.
What if the green blobs are pepe?? :D
This is bad: https://www.wayfair.com/rugs/pdp/brayden-studio-one-of-a-kind-mcfalls-hand-knotted-traditional-style-gray-12-x-15-area-rug-w002013012.html
You all are truly amazing. I feel like a kindergartener sitting in on a differential equations class and should probably just sit here quietly. However, I'll raise my hand with a timid little idea--has anyone tried the word "stone" as a password? The key "stone"--and from the Kim Clement prophecy, "He will bring down the giant with a stone--remember the name."
I'll be happy to. Just give a shout out when you're ready for that step. What you all are working on is mind blowing. I will be praying for your team to have clear minds and divine insight as you dig. ?
Alright, so based on what you're saying, Q125 is the key, as stated by q127. Look at the next post q128. It asks what is a map and what is a legend. You specified certain regions that looked... off. What if this is the next step, decoding where to look in these images?
I would argue they already know what's locked inside, but they can't tell us due to rules are classified information.
But they need this information to "make its way" to the public, in order to fight the MSM or force the Cabal's hand, or something.
We do play an important role, but I doubt it's providing calculation power.
Pointing this out to help you look for the key. Seems like you are doing great and really working hour ass off ... mad respect, Anon.
Remember that line about lighting a fire to smoke the Cabal out? Seems fitting here ....
Key may be in the image where the pixels look like a map key at the lower left. Perhaps a secondary program to clean up pixels after they have been broken down via binvis may help?
News unlocks map. Hey, can someone who can run these apps run the maps of the locust swarms that Pompeo tweeted about a while ago? I tried to find a message in them just looking at them a while ago. News=North East West South?
Try "snow storm", "blizzard", "blackout"
Maybe any applicable emphasized word Q wrote in caps?
Also, why do the passwords have to be lowercase? Maybe try them uppercase also, if Q wrote them that way?
It's probably me that doesn't follow.
764 14-Feb-2018 9:52:21 PM PST 8ch/qresearch You are missing the connections. Continue to build the MAP. MAP provides the KEY. KEY spreads the TRUTH. TRUTH shines LIGHT. LIGHT saves HUMANITY. Future proves past. Trust the plan. Q
So many results turn up in Q drops when looking for: Key, keys, keystone.
Lots of context about the map, the graphic, keystone unlocks everything. Wasn't there a map graphic that we focused on maybe a month ago? Tied into an updated map, map holds the key?
https://qposts.online/?q=key&s=keyword
https://greatawakening.win/p/11Rhd51bfF/autists-needed--pompeo-x-the-map/
Has anyone tried using photos with keys. literal keys like the tiffany blue boxes, truck drivers, bibi, the one right before trump left office.
military prolly has this unlocked they need us to unlock for public knowledge. the key is probably related to Q drop "proofs" time, date, misspelled words
This is a little off the topic, but is there something drawn in the sand or formed with the rocks in the road kill picture?
https://ibb.co/tb2wq1K
I would start with the following ideas for decryption keys:
While I find this interesting and I don't think it's outside the realm of possibility, have you found any messages that were encoded?
Been binging the Terminator series, since I never actually watched the movies. Lots of crazy connections to the current situation and Q drops. Just heard the line: "Kyle Reese, he's the key to the future" or something... Could that be a key? "Kyle Reese"??
So all night I wondered could it be possible that the photos that tom hanks posts could have multiple pictures embedded and encrypted in the photo? Could it be a way these creeps share images without being caught certain people know where and what to look at but everyone else is oblivious? His posts picture is actually a "calling card" for the type of images embedded? Ie... hidden in plain site