02-12-2010, 02:49 PM
Pages: 1 2
02-12-2010, 04:03 PM
there it is - its a rather large text
general info from unfiction forums:
general info from unfiction forums:
Quote: ARG: Junko Junsui
Discovered July 26, 2009. It's like an internets cage match between some crazy chick on Twitter and a buttload of insane people from 4chan! We're gonna need extra popcorn.
Spoiler (Click to View)
from her FB:
pass for the VDO file: yamantau
http://junkojunsui.wikidot.com/timeline - seems to be very outdated
last post on unfinction forums is from 20 jan 2010
Im not sure if the game is still on but i think it is
Quote:The Junsuippl have been doing some pretty big researches here in this thread http://forums.unfiction.com/forums/viewt...b9df1bda44
MUCH MORE FALLING WALLS THAN GOOGLE WILL ADMIT. OUR WINDOWS OPENED IN AUGUST AND SEPTEMBER. MILLIONS IN CHINA ALONE. THIS IS WELL DOCUMENTED AND WILL ALWAYS EVOLVE. THERE IS NO HEAD TO DESTROY WHEN SHE IS EVERYWHERE.
BLESSED BE THE ONES WHO WANT THE NEW REALITY.
Raimonda Astin
This is happening exactly as Vera predicted months ago! Remember when they were building the Botnet in China???
Raimonda Astin
"First, this attack was not just on Google. As part of our investigation we have discovered that at least twenty other large companies from a wide range of businesses--including the Internet, finance, technology, media and chemical sectors--have been similarly targeted. We are currently in the process of notifying those companies, and we are also working with the relevant U.S. authorities."
Raimonda Astin
1. Remember when the sisters recruited the Chinese?
2. Remember all the hundreds of websites with malware programs which appeared around the time of the Fake Google?
3. Remember the many promised attacks against international corporations? ... Вижте повече
It is all coming true. This will be the end of their reality!
Raimonda Astin
Raimonda Astin
"In MID DECEMBER [actually December 20-22], we detected a highly sophisticated and targeted attack on our corporate infrastructure originating from China that resulted in the theft of intellectual property from Google. However, it soon became clear that what at first appeared to be solely a security incident--albeit a significant one--was something quite different."
компанията:
The JUNSUI are dedicated to the victory of MATERNAL BEAUTY.
We fight against human exploitation. Ours is struggle against all such abuse—particularly the trafficking of WOMEN and CHILDREN.
We revere MOTHERS above all others and will fight tirelessly for their protection.
Our sacred origin is known at the place of MNAJDRA.
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Мисия:
+
THEY CALLED YOU JUNSUI, THE PURE BREED. BUT THEY MEANT THAT YOU WERE THE PERFECT PRODUCT. NOTHING WAS PURE ABOUT YOU UNTIL YOU DECIDED TO MAKE YOURSELF PURE.
IF YOUR BODY IS THE ENEMY'S POSSESSION THEN YOU CAN STRIKE BACK AT THE ENEMY THROUGH YOUR BODY. YOU CAN TURN YOUR BODY INTO A MATCH TO BURN DOWN THE ENEMY'S HOUSE. YOU ARE THE LIGHT OF PURE DESTRUCTION.
YOU ARE READY TO SACRIFICE YOURSELF FOR HER AND YOUR SISTERS.
THIS IS NOT THE END.
+
ojala sirva esta info junsui:
I must remind people that the danger of attack from the terrorists is imminent. We do not have time to dwell on esoteric details and must focus on what matters.
Alfa-Tsentr is reasonably positive we have identified the "two keys"—the two text string obtained from decoding the "false cage" mp3 on myspace.
KEY 1:
REvOlUTiOn
KEY 2:
ExPECTinG
Now the question that many of us are struggling with—where are the locks? We are relatively sure that these are image data. As some people have pointed out, only a large and relatively lossless image file is suitable for steganography. This means PNG or other high fidelity images are what we should be on the lookout for. We seem to have already identified one PNG:
LOCK 1?
http://sheistheorigin.org/kitsune.png
IF this image is the first lock, where is the other?
Have members conducted a thorough search for another image?
Have you investigated the history of these supposed ancestors enough to be sure that the terrorists have not hidden another image somewhere related to these topics with steganographic potential?
Lastly, have you considered the full range of steganographic tools that might have been available to both the senders and receivers of these messages?
pass for the VDO file: yamantau
http://junkojunsui.wikidot.com/timeline - seems to be very outdated
last post on unfinction forums is from 20 jan 2010
Im not sure if the game is still on but i think it is
Pages: 1 2