Grizz
Gold Member
- Jun 27, 2015
- 2,440
- 312
- 160
"
The image (.jpg) of the two girls eating pizza was discovered as an attachment in the Podesta emails by Wikileaks. Data can be hidden in a .jpg file. In that image, a zipped directory (PK) was hidden inside. That doesn’t happen by accident. The directory likely contains illegal imagery and/or discussion. It is highly suggestive of illegal activity connected to child pornography, child exploitation, and child abuse.
Some have objected that the pizza.jpg file size is simply too small to contain any useful data (like an image, a link, a message, etc.), but the point is this: all the file would have to “smuggle” is a short password to open a secret website or .zip file. The hidden data could literally just be a few bits of information but it could open up thousands of gigabytes of data in the right website or compressed file. That’s how the users would access the dirty pictures, videos, messages, etc.
So, from a technical angle, this method is very possible, and it makes sense of why the Podesta emails include so many strange photo attachments. Are all those attachments little “Trojan ponies” for sharing images, videos, passwords, payment resources, etc.?"
Julian Assange Isn’t Done With Hillary, Reveals Hidden Human Trafficking Network
Apparently she is just like Bill
The image (.jpg) of the two girls eating pizza was discovered as an attachment in the Podesta emails by Wikileaks. Data can be hidden in a .jpg file. In that image, a zipped directory (PK) was hidden inside. That doesn’t happen by accident. The directory likely contains illegal imagery and/or discussion. It is highly suggestive of illegal activity connected to child pornography, child exploitation, and child abuse.
Some have objected that the pizza.jpg file size is simply too small to contain any useful data (like an image, a link, a message, etc.), but the point is this: all the file would have to “smuggle” is a short password to open a secret website or .zip file. The hidden data could literally just be a few bits of information but it could open up thousands of gigabytes of data in the right website or compressed file. That’s how the users would access the dirty pictures, videos, messages, etc.
So, from a technical angle, this method is very possible, and it makes sense of why the Podesta emails include so many strange photo attachments. Are all those attachments little “Trojan ponies” for sharing images, videos, passwords, payment resources, etc.?"
Julian Assange Isn’t Done With Hillary, Reveals Hidden Human Trafficking Network
Apparently she is just like Bill