Hillary’s Podesta Pedo Ring – Codebreaking

19 11 2016

Wikileaks– Podesta uses “Bible Code”- Meets with controversial “conspiracy” figure

LINK –  http://youtu.be/TgQkfFU6iq0

On Steganography more on it

JULIAN ASSANGE ISN’T DONE WITH HILLARY, REVEALS HIDDEN HUMAN TRAFFICKING NETWORK

” . . . The image (.jpg) of the two girls eating pizza was discovered as an attachment in the Podesta emails by Wikileaks. Data can be hidden in a .jpg file. In that image, a zipped directory (PK) was hidden inside. That doesn’t happen by accident. The directory likely contains illegal imagery and/or discussion. It is highly suggestive of illegal activity connected to child pornography, child exploitation, and child abuse.”

Line_Med_paleblue

About this photo:

johnpodesta

 

The De-Occulting of John Podesta

LINK –  http://youtu.be/9YxaCrxDrxo

This talks about e-mail # 39999 and the attached photo

480cool

donate

end

Advertisements

Actions

Information

11 responses

20 11 2016
https://dublinsmick.wordpress.com/

This is all I have to say about that

Drunk from the Blood of Her Victims

https://dublinsmick.wordpress.com/2016/11/18/drunk-from-the-blood-of-her-victims/

20 11 2016
flyingcuttlefish

— wish that had a reblog button! — posting…

20 11 2016
flyingcuttlefish

Sent in –
from a code breaking knowledgeable person who has great IT skills –

“It’s hard to decide whether to laugh, cry, or scream. This isn’t computer-data-steganography , this is a metadata append to a JPEG File.
This is a night-and-day difference. Steganography encrypts the file to be hidden in the JPEG, then breaks it into pieces to be secreted in the “white space” of the JPEG image that is being used to carry the data. Real Steganography requires massive, super-computer brute strength to decrypt. Reading a JPEG-append only requires a programmer’s text editor to make the append apparent. These clowns are real amateurs who over-rely on deceiving and distracting the general public with techniques such as ‘Political Correctness” and deceptions embedded in Neuro-Linguistic-Programming (NLP); fed to the Public through malign, co-opted and totally-owned (pwned), Main Stream Media Outlets (the MSM), to maintain their domination of the masses. These idiots actually thought they were hiding data in an impenetrable manner? These animals are benightedly ignorant, and malevolent beyond any capacity to remain Human. These sub-humans require eradication in order to heal the souls of all of us who are genuine, participating members of Mankind.”

20 11 2016
flyingcuttlefish

and source says . . . .
“Here’s a very good analysis of how steganography really works and why JPEG’s aren’t well suited to carrying steganographic data in the first place:
http://www.garykessler.net/library/steganography.html

20 11 2016
flyingcuttlefish

Good vid – but SCARY images — listen, don’t watch if you want to sleep ever again.

21 11 2016
flyingcuttlefish

Titus Frost – #PizzaGate the Documentary, Pedophilia involving Podesta Emails, Clinton, Obama, David Brock, DNC…..
some more on codebreaking and pizza parlor – after 8 min. mark here –

17 12 2016
flyingcuttlefish

1 – Every picture file is actually a code/pattern of numbers that our computers “translate” into images on the screen.

2 – Some “extra” information has been discovered in at least one picture code/pattern from a Wikileaks email.

http://dailyteasip.com/hillary-one-step-closer-prison-assange-reveals-new-hidden-human-trafficking-ring-shocking/

22 12 2016
flyingcuttlefish

They talk about the fish and 14 signs on Podesta’s hands in this video – at 29:55 min. mark –

6 01 2017
flyingcuttlefish

9 01 2017
flyingcuttlefish

some code-breaking – secret word list
http://archive.is/R7s9r

8 02 2017

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s




%d bloggers like this: