Hillary Clinton and her campaign manager John Podesta are wrapped up in a human trafficking scandal that will make your head spin.
I have been reporting for weeks now about the D.C.-based “pizza pedophilia” ring that is being exposed based on thousands of “Podesta emails” released by Wikileaks in the past month or two.
As of last week, the case became even more explosive.
— Thomas Bernpaine (@ThomasBernpaine) November 11, 2016
Now, don’t get nervous because it looks like computer mumbo-jumbo. You only need to remember two things.
1 – Every picture file is actually a code/pattern of numbers that our computers “translate” into images on the screen.
2 – Some “extra” information has been discovered in at least one picture code/pattern from a Wikileaks email.
I reported weeks ago about this “pedo ring” something called “photo steganography,” which is just the fancy term for the two points I explained just now.
The image (.jpg) of the two girls eating pizza was discovered as an attachment in the Podesta emails by Wikileaks. Data can be hidden in a .jpg file. In that image, a zipped directory (PK) was hidden inside. That doesn’t happen by accident. The directory likely contains illegal imagery and/or discussion. It is highly suggestive of illegal activity connected to child pornography, child exploitation, and child abuse.
Some have objected that the pizza.jpg file size is simply too small to contain any useful data (like an image, a link, a message, etc.), but the point is this: all the file would have to “smuggle” is a short password to open a secret website or .zip file. The hidden data could literally just be a few bits of information but it could open up thousands of gigabytes of data in the right website or compressed file. That’s how the users would access the dirty pictures, videos, messages, etc.