In the vast expanse of the internet, where trends come and go, there exists a digital time capsule. A relic from the early days of online communities. Its name is 4chan, and it carries with it a rich history that stretches back to the late 1990s. Born from the roots of internet relay chat (IRC) and message boards, 4chan emerged as a unique and influential platform. It has defied and outlasted traditional norms and paved the way for a new era of anonymous interaction.
As the internet evolved, so did the landscape of online communication. From the ashes of early bulletin board systems (BBS) and IRC, 4chan rose to prominence in the early 2000s. Created by Christopher Poole, known by his online pseudonym “moot,” the platform offers users a haven for anonymity. It provides an escape from the constraints of personal identity and fosters an environment of free expression.
In its early days, 4chan was primarily fueled by an eclectic user base drawn to its anonymous nature. I like to describe it as the public portal to the darknet. It’s the most public preview of the secret societies that exist under the surface layers of mainnet. As 4chan has grown it has attracted users from all walks of life. The website is powered by tech enthusiasts, artists, meme connoisseurs, and conspiracy theorists. What sets 4chan apart is its unique subculture, characterized by its distinct set of topics and boards.
While 4chan has gained notoriety for its association with controversial content and subversive movements, it would be remiss to overlook the creative and collaborative aspects that have emerged within its virtual walls. From the birth of beloved internet memes like “lolcats” and “Rickrolling” to the development of groundbreaking internet subcultures and many secret societies, 4chan has been a breeding ground for innovation, artistic expression, and mystery.
The website’s monetization model has always been a topic of interest and speculation. Unlike traditional platforms driven by advertising revenue, 4chan relies on user donations and merchandise sales to sustain its operations. Given the high costs of hosting millions of photos and a massive database, it takes a good amount of capital to keep the lights on. So who are the generous benefactors that keep 4chan around, and why? Well, I can tell you about one source: hackers like me. Our reasons range, but the biggest motivation is the ability to communicate in plain sight, coordinating with hackers who know a call sign (e.g. white rabbit) to find hidden messages embedded in images.
4chan continues to captivate and confound both new and veteran internet users alike. It stands as a testament to the power of anonymity, the vastness of online communities, and the enduring legacy of early internet culture. Beyond its outward appearance, 4chan conceals a hidden world—an underground network of secrets, conspiracies, and encrypted messages—that beckons the curious to delve deeper into its enigmatic depths.
So, as you traverse the vast landscape of the internet, remember that beneath the surface of seemingly ordinary websites, a multitude of stories and secrets awaits discovery. The tale of 4chan serves as a reminder of the ever-evolving nature of online communities, and the power they hold to shape our digital world. It is within this realm that we venture, shining a light on the hidden corners of 4chan, exploring the art of steganography, and unraveling the secrets that lie within its intricate tapestry.
Steganography
Steganography, derived from the Greek words “steganos” (meaning covered or hidden) and “graphein” (meaning to write), is an ancient art of secret communication. Dating back thousands of years, it has been employed by civilizations throughout history to conceal messages within innocuous carriers, ranging from hidden compartments in physical objects to invisible ink on parchment. Steganography operates on the principle of security through obscurity, relying on the fact that the hidden message remains undetected by those who are unaware of its existence.
In the modern digital era, steganography has found new life, taking advantage of the vast amounts of data we generate and share every day. The concept remains the same—to embed information within other data in such a way that it appears inconspicuous to the casual observer. This can be achieved by subtly altering the pixels of an image, the least significant bits of an audio file, or even the whitespace in a document.
How a Secret Society Uses Steg
Hackers and secret societies with hidden agendas have embraced steganography as a powerful tool in their clandestine activities. Sites like 4chan, with their inherent anonymity and vast user base, provide an ideal breeding ground for the covert exchange of information. Hackers can use steganography techniques to hide malicious code, sensitive data, or instructions within seemingly innocuous files shared on the platform. The allure of steganography lies in its ability to evade detection by conventional security measures. By embedding information within benign-looking files, hackers can bypass traditional scanning tools and surveillance systems that are designed to detect specific patterns or signatures of malicious activity. This covert communication method allows hackers to operate under the radar, making it challenging for cybersecurity professionals to identify and counter their activities.
On platforms like 4chan, where users engage in a wide range of discussions, image sharing, and meme creation, steganography becomes an attractive option for those seeking to disseminate hidden messages. By embedding sensitive information within images or media files, hackers can leverage the platform’s vast user base to distribute their concealed content without raising suspicion. This makes it difficult for security teams and moderators to identify and prevent the transmission of potentially harmful or illegal material.
Broad Use of Steg
While steganography has gained notoriety in the realm of cybersecurity and hacking, it is essential to recognize that it has legitimate applications as well. Law enforcement agencies and intelligence organizations may employ steganography techniques for covert communication and information exchange in the interest of national security. Additionally, researchers and professionals in fields such as digital forensics and data protection utilize steganalysis—the detection and analysis of steganographic content—to uncover hidden information and enhance security protocols.
As the digital landscape continues to evolve, steganography remains a potent tool in the arsenal of hackers and individuals seeking covert communication. It underscores the ongoing cat-and-mouse game between those seeking to exploit hidden channels and those striving to detect and counteract their activities. In the ever-advancing field of cybersecurity, understanding the principles and techniques of steganography is crucial for staying one step ahead in the ongoing battle to safeguard digital information and protect online communities.
Secrets Revealed
Alright, you read through the mumbo-jumbo GPT-written shit about steganography that you could have picked up off of Wikipedia. I won’t elaborate or list out further all of the cryptography techniques and methods when you can research that elsewhere.
You want real-world examples, am I right?!
First, let me introduce you to Julie. A friend of mine created her as a puzzle to identify seasoned crackers. She’s not your beginner’s guide to steganography. There are other websites and tools out there for that. Julie has a hidden payload that takes a lot more skill to crack.
I’ll point you in the direction of a few “boards” I actually use. It’s important to note, a “message board” is literally whatever you want to define. In hacker communities, we still use old nomenclature but the reality is you can communicate in a myriad of ways and places. One that I’ve used with a couple of friends is the 4chan Pokemon Section.
Warning: 4chan/vp is tamer than other areas of 4chan, but still often NSFW.
Look for Jigglypuff posts on there as those posts are not likely to have much security on those messages. We mostly just use JP for casual conversations. Most of us use open-source tools to encrypt/decrypt but the exact methods and passwords used are more of a private rule established between a group with an agreed upon standard.
Follow the White Rabbit
There are tens of thousands of embedded secrets hiding in plain sight across websites like 4chan. The deepest, darkest, and craziest shit is all ripe for picking if you’re willing to dig through the garbage of 4chan/b Random (NSFW). The average person probably wouldn’t be able to figure out WHY these secrets are posted in public and in the filth of pornographic or disturbing images, but the reasons are actually fairly trivial. By hiding messages in images ranging from revolting to illegal, hackers reduce the likelihood that some government spooks are going to browse our shit. If the requirement to decode content means staring at hardcore porn or gore for hours on end then that means the average person cannot or will not do so.
Are Hackers Always Perverts and Pedophiles?
Ironically, because of the nature of hiding payloads in media filth, this is also why you see a lot of hackers getting busted and labeled with child porn charges. None of the hackers I know are into this smut bullshit but all of us probably have interacted with it. It’s also an ugly and necessary evil when probing around the dark web or in certain public channels.
Breaking the law is part of the risk in partaking in the highest security communities and messages. Along with all of the other illegal shit we do, a child porn charge is far from the worst we could get stuck with if caught. In reality, it’s just the easiest charge for a prosecutor to stick a hacker with in court, which is why it’s so common.
Why Prosecutors Love This Charge
It is often very difficult for a prosecutor to prove that I contributed to a server hack. My mode of operation is always about anonymity. But IF I was caught, and IF I was raided, the thing prosecution will focus on is not likely the fact that I hacked into some organization’s servers, for a few reasons:
- The attacked organization would be in the spotlight and security breaches are bad press.
- It’s difficult to find a judge, prosecutor, or jury that understands all of the tech lingo.
- The evidence is usually circumstantial at best.
The charge that is sticky and embarrassing to the hacker is often something like a child porn charge. Such a charge establishes that I may have sick and disturbing behavior. The goal is to ruin my name and character.
Fuck you FBI
So if Mr. Joe Blow from the FBI is after me, he’s likely to look for history or downloaded media that makes me look like a pervert and that’s likely all he’ll need to make a private plea deal or get my full cooperation. Even if he knows that inside those files are keys, rainbow tables, entire programs, and troves of harvested government docs he knows it takes work to crack those open. It’s much easier for the agency to negotiate and use whatever leverage or intimidation tactics on me to make me subservient. Also, does Mr. Blow really want to comb through derogatory and disturbing media all day to find secrets? Will the bosses even allow that?
There are safer ways than using 4chan though, and for me personally, I’ve been out of the hacking game for a good amount of time so you won’t find anything crazy on my computer these days. In my heyday, however, I played my part in redistributing assets across 4chan for others to retrieve.
Minion Speak
After a good decade or so immersed in that world, I and many friends of mine were concerned we were desensitizing ourselves to the porn, gore, and all the crazy shit we’d have to look through to find each other’s messages.
My "call sign" by the way, was Cartel beheading photos and videos. If you wanted to find my messages you'd pull those down and look for my signature in exif data and then run through steg with a custom key I shared with you in order to retrieve my message.
Instead of having to look at this shit all day, I had an interesting idea circa 2005 for a new communication method. The idea was to combine leet-speak with a mix of spoken language and ciphers to invent a new communication strategy. I called it Minion speak.
Many of us were bi-lingual already and could dabble and stumble our way through Germanic and Latin-based languages pretty well. So my idea was: why don’t we do this intentionally to throw off anyone that would try to scrape our conversations? Bonus points for poor spelling or using phonetic sounds at random too. The goal was to keep bots at bay, not humans, so it was a pretty solid plan and thesis. So in my hacker group and our IRC chats, this became our standard operating procedure for communication. It’s only practical for L1 comms, for important assets and L5 communication we’d still need cryptology that was based on minion speak.
Secret Societies
Do you know what’s awesome about forming a secret society? All the buzz, theory, posts, and chatter speculating about the secret society creates so much noise that it protects the hidden signals of the society itself. I call it our force field, but it’s really just simple signal v. noise. Entire websites like Forgotten Languages are dedicated to trying to unpack and uncover our Minion Speak. Forums and Reddit threads light up trying to dissect and understand what’s going on. It’s the perfect place to hide serious secrets.
By hiding in plain sight, you ensure a passive distribution of assets to unknowing hosts. Like a virus, average conspiracy nuts are distributing actual government secrets (e.g. 9/11 cover-up) and have no idea. An average user might uncover a level-1 asset which may be a poem, fan fiction, or just two people shooting the shit about any topic that interests them. Often times they have unknowingly copied and pasted REAL state secrets guised as something trivial and seemingly safe. These messages from secret societies are encrypted with the highest degree of care and protection and embedded in content that is most likely to be shared.
Distribution
Another huge advantage and why many of us switched to this method over steganography is asset preservation. The problem with steganography is that these images are susceptible to damage when saved and uploaded to sites like Reddit (which optimizes the image using compression) and the original hidden payload can get lost. But a string of text of a weird-looking language: well that’s likely to be copied/saved in full and preserve the hidden payload. People are quite literally distributing our packets of information and unknowingly re-transmitting it to others. Us hackers took a page out of biology and this was another concept my group ideated: BE the virus instead of just creating the virus. Post the payload with your alt account on Reddit like “WTF is this?” and let it distribute on its own from there.
While I’m sure there are actual secret societies doing weird ass stuff from witchcraft to clandestine operations, I think a vast majority of “lost languages” are proprietary to different secs and I’m responsible for creating at least half a dozen languages myself, so I commonly come across some of my own content in the wild. For me, it is amusing and strokes my ego when I watch attempts at decrypting some of my work to reveal a poem or song that I wrote. I don’t get the fame or glory, but in some small way, it feels like I’m making my own life and thoughts less ephemeral and building a legacy of sorts.
There’s So Much More
Hopefully, this article helps someone out there better understand what we’re doing with these languages and what the conspiracy is all about. If it’s piqued your interest, know this: the best evidence of aliens, government secrets, 9/11 and a myriad of other secrets are all out there in plain sight. Famous whistleblowers and advocates like Snowden and Assange have been in these same circles and used these same tools. In fact, you can fact-check this post with them if you are so inclined. At this point, many of us have moved on to other methods of communication so Minion speak is as deprecated to many of us as leetspeak or steganography is. Nonetheless, almost two decades of secrets are out there as “lost languages” and ready for the patient and problem-solving mind to decode for themselves.
I’ll make some effort to keep up with comments on this post, so if there are specific questions or pointers you want, drop a note and I’ll check in from time to time to reply.
o7
Get the latest posts delivered to your inbox
Thanks for this fascinating explanation. I surmised that FL was exactly that. There is quite a trove over there. It scares me.
Can you share more about Forgotten Languages? Are they sharing government secrets?
Can you give us an example of hidden text or information from the forgotten languages website?
Hey there,
I spent time figuring out what conlangs were and what FL really did. I came across it from so many people bringing it up due to UAP discussions being popular after Grusch testified before congress. The content in info dumps about UAPs contained so much public info about various things and patents, there was content of actual merit regardless of the UAP subject which piqued my curiosity. I dove headlong into some new physics. I’ve spoken directly with one of the scientists that work on these things (Dr.Pais), and he likes my theory that gravity is an emergent property of electromagnetism. I came across the expression of the superforce while trying to tie QED to Einstein’s equations (c^4/G). I like the superforce theory, and have started work on ZPE. However much Dr.Pais has already worked on these things for many years, it does seem to be a little eccentric on top if that. Dr.Heaston did even better work on the superforce and has more math behind him, but sadly died in 2019. I just reached out to Dr.Davies about the deceased Dr.Heastons’ work. We will see what he says.
Little of this stuff is talked about online because it is so high level. I don’t think many others will get there for a long time, so ZPE tech is way far off from us working on it, IMO. If you happen to know more about these things, please reach back out to me. It’s been a while since I had a desire to be included in an “in-group”, but now that I’m really into theoretical physics and UAPs are being discussed more and more, I’d like to know if there really is a crashed UAP as large as a football field in another country under US control. The non-newtonian physics of the little mirror balls I think I understand, because it seems they are using force fields manipulating bosons (photons specifically) that allow them to zip around without any newtonian forces impacting them like inertia, hence their movement. Newtonian forces only effect fermions, not bosons, in my understanding.
Anyway, I’d have a lot more to talk about when it comes to your conlangs. I find blockchain beautiful due to solving the logic problem of the byzantine general’s solution. Such a shame NFT’s were used by banks to escape a global collapse of fiat. It’s only a matter of time before blockchain takes over many transaction methods and backends.
Also, your use of conlangs is also beautiful when you take into account the crossover with conspiracies and the irony of mainstream conflation and misunderstanding. This is all very funny to me, tbh. I spent too much time figuring this out on my own and posted it on reddit to try and help all those poor lost conspiracy souls save themselves from endless rabbit holes, but they just hated me for telling them the truth. I tried. Now, I have something I actually want to talk about with someone in the know, and hopefully dont have to install special software to encode and decode info to talk. If that’s the case, so be it. I can do whatever tech steps are needed, I worked in high-precision engineering fields and am familiar with tech.
All the best,
Ben
Hey Ben.
You can join us on keybase if you’d like. Shoot an email to FantasticTales@proton.me
Mainstream doesn’t like high level theories on physics. I don’t know when theories became so contrarian but it’s nice when you can share and ideate with like minded individuals. I personally subscribe to a superforce or emergent property of magnetism theory. I’ll be curious what you hear back from Dr Heaston.
If you wanted to take on the challenge and work of documenting some of that work and those theories in the form of posts on this site, I’d happily invite you into an author role. If our team had more time, we would extract some of the FL info here.
Fascinating article. I’m scraping your website to keep a copy, I can’t believe this exists.
>An average user might uncover a level-1 asset which may be a poem, fan fiction, or just two people shooting the shit about any topic that interests them. In reality, they have unknowingly copied and pasted REAL state secrets.
I witnessed an interesting example of this on the r/ufos subreddit. Someone made a post regarding the Office of Global Access, the likely CIA department responsible for coordinating crash retrievals. The existence of the OGA isn’t a secret and has been documented for decades, but as soon as people on reddit started publicly documenting names, linkedin profiles, and news articles of individuals who listed OGA on their resumes, it was noticed quickly. The OP posted a comment: “FYI Google has a warning right now saying that the results for “office of global access” is changing quickly. I suspect everyone is scrubbing it from their webpages and resumes.”
It was an interesting look at how context matters when it comes to secrets. When linkedin knows you worked there it’s not an issue. But as soon as the redditors find out… I can only imagine how many eyes are on that subreddit 24/7 looking for genuine leaks.
This website was created in response to the EBO post on reddit and is a mockery to true disclosure. I get what you are trying to do here but dont take yourself too seriously. These stories are cliche embellishment at best and contain no actual citation
We fully accept that some stories do not have citation. Not all things can be evident or disclosed in the way the public deserves or desires. However, in most publications the research and diligence performed behind the scenes is significant and we do our best to verify the authenticity of each author and article. Dismissing the website entirely and diminishing it’s purpose and intent based on one perspective is the real mockery. Truth is subjective and fallible. Outright dismissal of another individual’s truth is just plain ignorance in favor of one’s own bias. Talk to folks on keybase if you seek citation. The humans are brilliant, their efforts are palatable, and the evidence is abundant.