White Rabbit

Direct comms come in many different forms (q posts - 1713, 1715,1826)

user image 2018-09-05
By: White Rabbit
Posted in: access

A video and accompanying article on how to achieve secure comms  was already done. Also in the ongoing Final Countdown , we link a number of steganography techniques and discuss the use of strategy in a broad sense.

Here I want to give a concrete example in more detail. Below is a layered image with an Open Puff steganography embed (hidden message). That in itself is fairly mundane and not what makes this powerful. There are different things going on at different levels, the message you take away will depend on who you are.

This was a statement by Q in post-1826 - U.S. Air Force B-52 [Precision Bombs] . Forget for a moment if it has a hidden meaning or should be taken at face value. Real bombs or information bombs, that's not under discussion here.

I will simply show you a way of communicating the same idea in a different form (as Q discusses in post-1713). At the same time, I will help "red pill" normies, communicate by hidden message to those willing to use a tool, but also give a second hidden message to those participating in training.

Please study the picture below and see what it is communicating. Can web bot "spiders" that crawl the web and index everything read images or just text? Does AI do well with images, especially those that express the subtleties of human thought and humor? Why do you think the "overlords" want to ban memes?

Think Pink.jpg

Modus Operandi



  1. It is the foolish things that confound the wise. ( 1 Cor. 1:27) Give them a reason to write it off as yet another silly meme from a crackpot. If it gets your message where it needs to go, that's all that matters.


  2. Use multiple layers. Which is the real message? One could hone in on the humor of switching the M for an O in bombs and spelling something different, based on the location of the word. Then hinting to it with Modus Operandi. Someone might write that off as some politically incorrect memester trying to be cute - let them.


  3. Some might just assume it's a "cutesy" way to express U.S. Air Force B-52 [Precision Bombs] in visual form. Hell, their "Love Shack" song even has "bang, bang" in the lyrics. Let them assume and move on - if they are not your target.

  4. f you open the picture in Open Puff (version 4.01) and put in the password Think Pink (given as a layer in the image) you will find some info about quantum. Leave the B and C blanks unchecked, you just need A and the default .jpeg setting. The hidden information is not "top secret" (so not very carefully hidden). It is simply a building block, background information.
     
  5. After all of those legitimate ways of interpreting the image are explored, there is yet another message. The TH and the P were separated from the ink in Think Pink just by the location on the page. The isolated THP means something to those who have had training. Another message is embedded hidden with 3 very strong 32 bit passwords referenced by those letters. Access relates to IFF protocols , those with POS status have access for training purposes.
     

There was a Star Trek episode called Darmok where communication difficulties were explored. It is highly illustrative of some of the problems. How can patriots and whitehats in the system establish comms without the blackhats intercepting them?

The corruption of the system has forced some to think "outside of the box", to develop their own "Pig Latin", their own methods and comm language(s).

Tags