Wtf who cares ?
Cryptome.org is brazenly written across video start! Play it again!
ITS A CIA Steganography test payload upload!
https://en.wikipedia.org/wiki/Steganography
YES CIA video file from Cryptome.org!
You do know that 80% of Cryptome.org is spooks sharing data from all over for over 20 years?
Since 1996 Cryptome has boldly been leaking and planting spy info onto internet, long before Wikileaks stole the show.
https://en.wikipedia.org/wiki/Cryptome
YOU SHOULD CARE!!!
Steganography that survives a file reprocess on YouTube.com is trickier than if it is a mere lossless format or a file not reprocessed. It limits how much high energy error-corrected data payload you can hide in that link you saw that looks innocent.
IT IS NOT A INNOCENT FILE, it is a CIA/NSA/NRO/FBI/DIA/USDOJ/State Dept INR/USAFISR/DOE/DHS/TFI/ONSI/NSF/ etc test.
The purpose of the test, is merely to show up in a Federal black ops "white paper" that video sites like YouTube can or might be used by WHITE TERRORISTS to spread info to those holding the steganography key. Youtube does mild high energy noise scrubbing on behalf of FBI/CIA to all uploads, but only so much can be done without introducing human visible annoying artifacts.
For example the steganography key , without which shows white noise, might be :
"SLEEPYJOEISNOTMYPRESIDENT" or something tongue in cheek. The payload would be a single mid resolution encrypted photo of Trump in a MAGA hat perhaps with text "Jan 6 Coup" printed below, or "all lives matter" or something for the CIA White Paper.
Fun plausible deniability for cryptome : "a leader of cryptome is a real estate involved person at that locale" (true, not that I make dossiers on the figureheads).
DOWNVOTED!?!?
you got downvoted by CIA, like I will be, but I upvoted you.
Fun time for you.... VISIT site and go back many years and click on some top secret files there : https://cryptome.org/
Cryptome is known for publishing the alleged identity of the CIA analyst who located Osama Bin Laden,[7][8] lists of people allegedly associated with the Stasi,[9] and the PSIA.[10] Cryptome is also known for publishing the alleged identity of British intelligence agent and anti-Irish Republican Army assassin Stakeknife[11] and the disputed internal emails of the WikiLeaks organization
Get covered in more honey than merely reading wikileaks files.
Enter that massive spy honeypot!
cryptome.org the honeypot : https://en.wi.kipedia.org/wiki/Honeypot_(computing)
Wheeeeeeeeeeee!
I should probably stop typing, before I myself start to glow too much to some autists here
Apparently, cryptome has been in the news as a wikileaks before wikileaks. There's a RT video from 2011 talking about it: https://www.youtube.com/watch?v=oMRUiB_8tTc .
This posted video on youtube was put out by John Young, the site's administrator. He has a separate site, jya.com . Here, he has a pdf of past projects.
http://jya.com/John-Young-Architect.pdf
Look at the projects this man worked on in 1998 alone:
NORTH AMERICA HEADQUARTERS OPUS DEI
REUTERS USA HEADQUARTERS
CONFERENCE CENTER COUNCIL ON FOREIGN RELATIONS
If you aren't familiar with Opus Dei, you should be. They are a catholic cult possibly affiliated with other secret societies. Here's a wiki excerpt:
Critics allege that Opus Dei maintains an extremely high degree of control over its members—for instance, past rules required numeraries to submit their incoming and outgoing mail to their superiors for inspection, and members are forbidden to read certain books without permission from their superiors.[130] Critics charge that Opus Dei pressures numeraries to sever contact with non-members, including their own families.[130] Exit counselor David Clark has described Opus Dei as "very cult-like".
This is a WELL-connected person. If so, what the hell is up with such a low-quality video on an channel with 2 subscribers? This is NOT what he shows to potential clients. And this is the only video on the channel? Either this is not his channel, or something reeeealy fuckin weird is going on. The channel was made right around the start of the pandemic, if that means anything.
Again, it might not be his channel, but if it's not... where did this footage come from? Anybody find proof of prior existence?
Also, check out this creepy video from 5 years ago. I'm going to go ahead and straight up call this one steganography: https://www.youtube.com/watch?v=NP3UMcTcAdY
Weird shit.
and straight up call this one steganography
i concur.
the annoying part, is that without the tool used, you cant even determine if there is steganography used in a good implementation, so no way to even start using brute force guesses on passphrase or even start using a rainbow table.
Real spooks know all about rainbow tables though. Real spooks would not use merely three word passphrases because even clearnet rainbow tables available have 3 word/digits now in 2021, and some rainbow tables have all typeable glyphs up to 12 letters long.
7 letter open value rainbow tables take 744 TB according to disinformation on wikileaks and other sites : see :
https://www.google.com/search?q=biggest+rainbow+table+digits
Google is all too eager to take over main search result to spread disinfo of 744 TB, as seen if you do that link. 7 bytes is (2568) ore a total combination of bits equating to (256256256256256256256) or (7.2057594e+16) byte combinations implicit. 72,000 terabytes, but the people curating them tend to use only standard ASCII, and ascii high bit is "undefined" (not zero) and is 7 bits, and the people making and trading rainbow lookups tend to ignore control characters other than space :
https://project-rainbowcrack.com/table.htm
so on that page it shows a 10 character passphrase comprised of "loweralpha-numeric#1-10" being 316 GB, per assumed hash algorithm and computations for three famous hashes shown, all being the same 316 GB size naturally. you can even download the 316 GB rainbow tables and use them to immediately get password that will work for a windows laptop with a lost password. I used "L0phtCrack" a few times since 2000 to many grateful scatterbrained users. Nowadays you would use freeware versions ( ophcrack, Cain and Abel, or John the Ripper according to this page : https://sectools.org/tool/l0phtcrack/ )
cryptome admins would not hide in the light so brazenly, so I can only assume he is baiting nation states to waste money processing those blatant steganography-payload files online.
The payload might just be a fortune cookie like : "Which department reimbursed you NSA boys this time. $$$ !"
As for your find of an obvious stenography test :
Also, check out this creepy video from 5 years ago. I'm going to go ahead and straight up call this one steganography: https://www.youtube.com/watch?v=NP3UMcTcAdY
He is employing white and pink noise mixed with loud and amplitude-clipped "organic derived pinknoise" not CPU algorithmic, to blind out the YouTube anti-steganography filters, and the constant scene changes in your link are to mimic ROCK MUSIC VIDEOS to also be whitelisted and spared from more aggressive CIA/FBI anti-steganography which evidently spares pop music videos perhaps. Very amusing to a cryptopunk to watch that. We know he succeeded because all failures would have been downloaded and reuploaded with less data payload. You are looking at success of the most possible "signal to noise" stenography state of the art for the year 2015, assumedly. Bravo for him.
pink noise :
https://en.wikipedia.org/wiki/Pink_noise
I would have left audio alone, and only gone after using an exotic legal mp4 file format that allows lots of razzle dazzle in the h264 file format, including separate channels and such. Some funny engineers put ENTIRE TOKEN streams into mp4 and youtube left the nonstandard data alone and entire mini trucrypt hard drive images got inserted! https://appliedtech.iit.edu/school-applied-technology/projects/mp4-steganography
That "TCSteg" guy thinks like me. Why stick out with accoustic noise unless delivery meant as rapid data insertion into a phone app by CIA that uses *microphone only, and meant for a "coffee shop" rented machine. Avoid white and pink noise to be more covert, unless needed to perversely disable youtube reprocessing.
Sorry , I get it now . I didn't know the CIA was evil AND own real estate . We are truly fucked .
ITS MORE THAN THAT... the account of the OP posted 3 hours ago BEFORE MY SNITCHING... another spy POST from cryptome.org !!
link of post : https://cryptome.org/2021/04/Joseph-Meyer-IEEE-1977.pdf
(PDF possible zero-day warning)
See? three hours ago, an hour before I wrote https://poal.co/s/Videos/355598/763c31f8-7cf2-4b7f-a797-144ed2f4a2fa#cmnts
This means that this site is jam packed with CIA GlowNiggers or ex-CIA GlowNiggers
Poal.co has spooks leaving odd implicating links? Why?
I care. Thats cool and difficult. So fuck you.
Go do something productive.
(post is archived)