Settings

Theme

Recreating Epstein PDFs from raw encoded attachments

neosmart.net

544 points by ComputerGuru 23 days ago · 223 comments

Reader

dperfect 22 days ago

Nerdsnipe confirmed :)

Claude Opus came up with this script:

https://pastebin.com/ntE50PkZ

It produces a somewhat-readable PDF (first page at least) with this text output:

https://pastebin.com/SADsJZHd

(I used the cleaned output at https://pastebin.com/UXRAJdKJ mentioned in a comment by Joe on the blog page)

  • pests 22 days ago

    So it was a public event attended by 450 people:

    https://www.mountsinai.org/about/newsroom/2012/dubin-breast-...

    https://www.businessinsider.com/dubin-breast-center-benefit-...

    Even names match up, but oddly the date is different.

    • elmomle 22 days ago

      Your links are for the inaugural (first) ball in December 2011; OP's text referred to a second annual ball in December 2012.

      • pests 22 days ago

        You are right my first is incorrect but the second does seem to be from 2012.

        • sorbus-25 22 days ago

          DUBIN BREAST CENTER SECOND ANNUAL BENEFIT MONDAY, DECEMBER 10, 2012 HONORING ELISA PORT, MD, FACS AND THE RUTTENBERG FAMILY HOST CYNTHIA MCFADDEN SPECIAL MUSICAL PERFORMANCES CAROLINE JONES, K'NAAN, HALEY REINHART, THALIA, EMILY WARREN MANDARIN ORIENTAL 7:00PM COCKTAILS LOBBY LOUNGE 8:00PM DINNER AND ENTERTAINMENT MANDARIN BALLROOM FESTIVE ATTIRE

          • Groxx 20 days ago

            Since it looks like this got flagged (probably because out of context at a glance it looks like insane babble that somewhat frequently occurs here), some context: this is appears to be text recovered from the pdf, in the links up-thread. Though there's more text than that link shows, and I'm not entirely sure why it's posted in this specific thread, though it's relevant-ish at least.

            • sorbus-25 20 days ago

              It's from a contemporaneous reference to the very same event listed in the PDF. I found it online and archived it: https://web.archive.org/web/20260206040716/https://what2wear...

              It includes screenshots of what looks like an expanded document for the event.

              Why relevant? I found it by searching the archive for "DBC". There were references to "Dubin", then I found the rest online easily. All that extra text could have helped with decoding the base64 text

    • turtlesdown11 21 days ago

      interesting, Eva Dubin was highlighted today for offering Epstein her 15 year old daughter and her friends.

      She's a medical doctor, who became amnesic when on the stand for Maxwell's case

      >Pressed about gaps in her memory, Dubin told the court: "It's very hard for me to remember anything far back and sometimes I can't remember things from last month. My family notices it. I notice it."

    • nialv7 22 days ago

      looks like we have it. in the end it's pretty mundane...

      • JKCalhoun 21 days ago

        There are plenty of other PDF's with Base64 encoded attachments.

      • klustregrif 22 days ago

        Which begs the question why was it censored?

        • nickthegreek 21 days ago

          They censored Dont in one location. The current Thought process is they were redacting mentions of Don T.

        • pbhjpbhj 21 days ago

          Mighty be they censored all pages mentioning keywords, this one says "Breast" ... perhaps they censored all sexual content?

          • klustregrif 21 days ago

            At the risk of repeating myself. Which begs the question why?

            • mmastrac 21 days ago

              To protect the people in power, as always.

              • redeeman 21 days ago

                what is insane is that everyone just accepts it, knows that this happens, and dont go lynch the ones in charge immediately.

                There was a time when the guy making the cannon had to sit on top of it for the first shot. Perhaps this kind of policy could be adapted to other situations aswell.

                Take the job to guard epstein? take the consequences when things go wrong.

                Protect criminals? take the very real consequences if found out

                • ben_w 21 days ago

                  > what is insane is that everyone just accepts it, knows that this happens, and dont go lynch the ones in charge immediately.

                  For a while, my pet conspiracy theory was that this was Epstein's real cause of death: a lynching by a prison guard made to look like suicide.

                  I never took it too seriously, because no actual evidence; now I'm more inclined to think it was a coconspirator hoping it would mean no more evidence getting out.

                  • quickthrowman 21 days ago

                    Epstein being murdered is the one conspiracy that I personally still think may be possible/probable.

                    All it takes is a single actor paying off some guards to ‘fall asleep’, a camera to be disabled, and a 15 minute window of opportunity. It’s much more probable than something like the US Government planning 9/11 and somehow keeping thousands of co-conspirators silent.

                    I don’t really spend a whole lot of time thinking about it since as you said, we’ll never know for sure. It just seems at least probable if he actually did have kompromat on powerful people.

        • mikeyouse 21 days ago

          Likely because the named list is a bunch of Trump appointees and mega donors and they're illegally trying to spare them the embarrassment.

        • lanyard-textile 21 days ago

          Distraction.

  • notpushkin 22 days ago

    > It produces a somewhat-readable PDF (first page at least) with this text output

    Any chance you could share a screenshot / re-export it as a (normalized) PDF? I’m curious about what’s in there, but all of my readers refuse to open it.

  • dperfect 21 days ago

    Letting Claude work a little longer produced this behemoth of a script (which is supposed to be somewhat universal in correcting similar OCR'd PDFs - not yet tested on any others though): https://pastebin.com/PsaFhSP1

    which uses this Rust zlib stream fixer: https://pastebin.com/iy69HWXC

    and gives the best output I've seen it produce: https://imgur.com/itYWblh

    This is using the same OCR'd text posted by commenter Joe.

    • daveguy 21 days ago

      > which is supposed to be somewhat universal in correcting similar OCR'd PDFs

      Xerox would like a word.

      https://news.ycombinator.com/item?id=29223815

      Point being, "correcting" to "correct looking" may be worse than just accepting errors. Errors are often clearly identified by humans as a nonsense word. "Correcting" OCR can result in plausible, but wrong results that are more difficult for the human in the loop to identify.

      • dperfect 21 days ago

        That's true if we're correcting OCR of actual output text. In this case, it's operating on the base 64 text, trying to produce chunks that form valid zlib streams and PDF syntax so the file can be intact enough to be opened. "Just accepting errors" would mean not seeing any content in the file because it cannot be read.

        So yes, the "fixed" output has errors, but it’s not hallucinating details like an LLM, nor is it trying to produce output that conforms to any linguistic or stylistic heuristics.

        The phrase "correcting similar OCR'd PDFs" should have been "correcting similar OCR'd base 64 representations of PDFs".

  • the_real_cher 21 days ago

    This is cool!

bawolff 22 days ago

Teseract supports being trained for specific fonts, that would probably be a good starting point

https://pretius.com/blog/ocr-tesseract-training-data

pyrolistical 22 days ago

It decodes to binary pdf and there are only so many valid encodings. So this is how I would solve it.

1. Get an open source pdf decoder

2. Decode bytes up to first ambiguous char

3. See if next bits are valid with an 1, if not it’s an l

4. Might need to backtrack if both 1 and l were valid

By being able to quickly try each char in the middle of the decoding process you cut out the start time. This makes it feasible to test all permutations automatically and linearly

percentcer 22 days ago

This is one of those things that seems like a nerd snipe but would be more easily accomplished through brute forcing it. Just get 76 people to manually type out one page each, you'd be done before the blog post was written.

  • jjwiseman 22 days ago

    Or one person types 76 pages. This is a thing people used to do, not all that infrequently. Or maybe you have one friend who will help–cool, you just cut the time in half.

    • wildzzz 22 days ago

      Typing 76 pages is easy when it's words in a language you understand. WPM is going to be incredibly slow when you actually have to read every character. On top of that, no spaces and no spellcheck so hopefully you didn't miss a character.

  • sjducb 21 days ago

    The first week of my PHD was accurately copying DNA sequences from an old paper into a computer file. 10 pages in total. I used OCR to make an initial version then text to speech to check it

    76 pages is a couple of months of work

  • quuxplusone 21 days ago

    As TFA says, the hard part is that "1" and "l" look the same in the selected typeface. Whether your OCR is done by computers or humans, you still have to deal with that problem somehow. You still need to do the part sketched out e.g. by pyrolistical in [1] and implemented by dperfect in [2].

    [1] - https://news.ycombinator.com/item?id=46906897

    [2] - https://news.ycombinator.com/item?id=46916065

  • fragmede 22 days ago

    > Just get 76 people

    I consider myself fairly normal in this regard, but I don't have 76 friends to ask to do this, so I don't know how I'd go about doing this. Post an ad on craigslist? Fiverr? Seems like a lot to manage.

  • WolfeReader 22 days ago

    You think compelling 76 people to honestly and accurately transcribe files is something that's easy and quick to accomplish.

    • altairprime 22 days ago

      Non-engineers are perfectly willing to volunteer their time to do drudgery. It's one of my opseng career's distinguishing specialties: I'll do drudgery rather than code when appropriate, rather than avoiding it or sulking about it (as was a common response at work for some number of decades!). Learned that lesson when I was 18 from an internship (where I completely failed to deliver any work product due to trying to code around the work). It's part of why I'm going into accounting: apparently having the stamina for dreary work is rare?!

      Also look up double/triple data-entry systems, where you have multiple people enter the data and then flag and resolve differences. Won't protect you from your staff banding together to fuck you over with maliciously bad data, but it's incredibly effective to ensure people were Actually Working Their Blocks under healthy circumstances.

    • pbhjpbhj 21 days ago

      Captcha!

    • estimator7292 21 days ago

      Friend, have you ever heard of secretaries?

legitster 22 days ago

Given how much of a hot mess PDFs are in general, it seems like it would behoove the government to just develop a new, actually safe format to standardize around for government releases and make it open source.

Unlike every other PDF format that has been attempted, the federal government doesn't have to worry about adoption.

  • gucci-on-fleek 21 days ago

    XPS [0] seems to meet these criteria. It supports most of the features of PDF, is an "official" standard, has decent software support (including lots of open source programs), and uses a standard file format (XML). But the tooling is quite a bit worse than it is for PDF, and the file format is still complex enough that redaction would probably be just as hard.

    DjVu [1] would be another option. It has really good open source tooling available, but it supports substantially less features than PDF, making it not really suitable as a drop-in replacement. The format is relatively simple though, so redaction should be fairly doable.

    TIFF [2] is already occasionally used for government documents, but it's arguably more complex than PDF, so probably not a good choice for this.

    [0]: https://en.wikipedia.org/wiki/Open_XML_Paper_Specification

    [1]: https://en.wikipedia.org/wiki/DjVu

    [2]: https://en.wikipedia.org/wiki/TIFF

  • Spooky23 22 days ago

    You’re thinking about this as a nerd.

    It’s not a tools problem, it’s a problem of malicious compliance and contempt for the law.

    • legitster 22 days ago

      Even the previous justice departments struggled with PDFs. The way they handled it was scrubbing all possible metadata and uploading it as images.

      For example, when the Mueller reports were released with redactions, they had no searchable text or meta data because they were worried about these exact kind of data leaks.

      However, vast troves of unsearchable text is not a huge win for transparency.

      PDFs are just a garbage format and even good administrations struggle.

  • Ekaros 22 days ago

    I give any new document format 3 to 5 years until it ends up with similar mess. And that is if it starts well designed and limited.

  • derwiki 22 days ago

    JPEG?

ChocMontePy 22 days ago

You can use the justice.gov search box to find several different copies of that same email.

The copy linked in the post:

https://www.justice.gov/epstein/files/DataSet%209/EFTA004004...

Three more copies:

https://www.justice.gov/epstein/files/DataSet%2010/EFTA02153...

https://www.justice.gov/epstein/files/DataSet%2010/EFTA02154...

https://www.justice.gov/epstein/files/DataSet%2010/EFTA02154...

Perhaps having several different versions might make it easier.

tcgv 21 days ago

> Then my mom wrote the following: “be careful not to get sucked up in the slime-machine going on here! Since you don’t care that much about money, they can’t buy you at least.”

I'm lucky to have parents with strong values. My whole life they've given me advice, on the small stuff and the big decisions. I didn't always want to hear it when I was younger, but now in my late thirties, I'm really glad they kept sharing it. In hidhsight I can see the life-experience / wisdom in it, and how it's helped and shaped me.

pimlottc 22 days ago

Why not just try every permutation of (1,l)? Let’s see, 76 pages, approx 69 lines per page, say there’s one instance of [1l] per line, that’s only… uh… 2^5244 possibilities…

Hmm. Anyone got some spare CPU time?

  • wahern 22 days ago

    It should be much easier than that. You should should be able to serially test if each edit decodes to a sane PDF structure, reducing the cost similar to how you can crack passwords when the server doesn't use a constant-time memcmp. Are PDFs typically compressed by default? If so that makes it even easier given built-in checksums. But it's just not something you can do by throwing data at existing tools. You'll need to build a testing harness with instrumentation deep in the bowels of the decoders. This kind of work is the polar opposite of what AI code generators or naive scripting can accomplish.

    • JKCalhoun 21 days ago

      Not necessarily a PDF attachment?

      Someone who made some progress on one Base64 attachment got some XMP metadata that suggested a photo from an iPhone. Now I don't know if that photo was itself embedded in a PDF, but perhaps getting at least the first few hundred bytes decoded (even if it had to be done manually) would hint at the file-type of the attachment. Then you could run your tests for file fidelity.

      • swsieber 21 days ago

        I'd say 99% of the time, the first 10 bytes would be enough to know the file type.

    • cluckindan 22 days ago

      On the contrary, that kind of one-off tooling seems a great fit for AI. Just specify the desired inputs, outputs and behavior as accurately as possible.

    • sznio 21 days ago

      >It should be much easier than that. You should should be able to serially test if each edit decodes to a sane PDF structure

      that's pointed out in the article. It's easy for plaintext sections, but not for compressed sections. Didn't notice any mention of checksums.

    • pimlottc 22 days ago

      I wonder if you could leverage some of the fuzzing frameworks tools like Jepsen rely on. I’m sure there’s got to be one for PDF generation.

  • kalleboo 22 days ago

    Easy, just start a crypto currency (Epsteincoin?) based on solving these base64 scans and you'll have all the compute you could ever want just lining up

kevin_thibedeau 22 days ago

pdftoppm and Ghostscript (invoked via Imagemagick) re-rasterize full pages to generate their output. That's why it was slow. Even worse with a Q16 build of Imagemagick. Better to extract the scanned page images directly with pdfimages or mutool.

Followup: pdfimages is 13x faster than pdftoppm

  • masfuerte 21 days ago

    This. Not only is it faster, the images are likely to be of better quality. If you rasterize the pages then the images will be scaled, unless you get very lucky.

chrisjj 22 days ago

> it’s safe to say that Pam Bondi’s DoJ did not put its best and brightest on this

Or worse. She did.

  • winddude 22 days ago

    there are a few messaging conversations between FB agents early on that are kind of interesting. It would be very interesting to see them about the releases. I sometimes wonder if some was malicious compliance... ie, do a shitty job so the info get's out before it get re-redacted... we can hope...

  • krupan 21 days ago

    I am in no way a republican apologist, but how many people were clamoring for the immediate releasing these documents, saying it "should be easy" and all that? Laws were passed ordering their sudden speedy disclosure. How would you have handled this?

    • deadbabe 21 days ago

      Released all files as is, no redactions.

    • chrisjj 21 days ago

      Sudden speedy immediate didn't happen.

      If I was Pam? I wouldn't have been.

      If she was me, start earlier, hire better, end later.

  • eek2121 22 days ago

    I mean, the internet is finding all her mistakes for her. She is actually doing alright with this. Crowdsource everything, fix the mistakes. lol.

    • TSiege 22 days ago

      This would be funnier if it wasn’t child porn being unredacted by our government

    • helterskelter 22 days ago

      I wonder if this could be intentional. If the datasets are contaminated with CSAM, anybody with a copy is liable to be arrested for possession.

      More likely it's just an oversight, but it could also be CYA for dragging their feet, like "you rushed us, and look at these victims you've retraumatized". There are software solutions to find nudity and they're quite effective.

      • adaml_623 22 days ago

        Or it's distraction. Leave nudity in to use up attention that should be turning to analysis of what's been redacted.

        There's redaction to protect victims and there's redaction to protect specific co-conspirators in Epstein's spy ring

        • SketchySeaBeast 21 days ago

          It's hilariously revealing that it keeps redacting "Don't".

          • chrisjj 21 days ago

            Odd indeed. The President's name contains no apostrophe :)

            • lukifer 21 days ago

              The emails are bizarrely sloppy with spelling and punctuation, perhaps many usages of "don't" ended up being typed as "don t", triggering an automated find-and-replace.

              • SketchySeaBeast 21 days ago

                The export itself is also sloppy, with characters like equal signs being added in weird places. Seems like they have it set to cast a wide and poorly set up net.

                • chrisjj 20 days ago

                  Equals signs substituting in some places.

                  Looks like the result of quoted printable decoding done by inept regex.

      • JKCalhoun 21 days ago

        I'll take Hanlon’s Razor for 500, Alex.

    • dagi3d 22 days ago

      the issue is that mistakes can't be fixed in the sense once they are discovered, it doesn't matter if they are eventually redacted

    • chrisjj 22 days ago

      Let's see her sued for leaking PII. Here in Europe, she'd be mincemeat.

      • ISL 22 days ago

        The US administration is, at present, regularly violating the law and ignoring court orders. Indeed, these very releases are patently in violation of multiple federal laws -- they're simultaneously insufficiently-responsive to meet the requirements of the law requiring the release of the files and fall afoul of CSAM laws by being incompletely redacted.

        The challenge, as we're all experiencing together, is that the law is not inherently self-enforcing.

        • typeofhuman 22 days ago

          Can you provide a couple examples of the laws they're violating?

          • roywiggins 22 days ago

            How about court orders?

            https://www.cbsnews.com/minnesota/news/ice-violations-judge-...

            > ICE has likely violated more court orders in January 2026 than some federal agencies have violated in their entire existence," Schiltz said, adding that he counted 96 court orders that ICE has violated in 74 cases.

            https://www.cbsnews.com/news/frustrations-from-judge-prosecu...

          • ISL 22 days ago

            As noted above:

            https://www.govinfo.gov/content/pkg/PLAW-119publ38/pdf/PLAW-... : the Attorney General was to have produced the entirety of the Epstein files, with very narrowly-enumerated redactions, in December. She has not done so.

            Furthermore, there are numerous allegations that the documents that have been released contain CSAM, which (referencing the PDF above) may fall afoul of 18 U.S.C. 2252–2252A.

            In addition, one need only glance at the action in US courts to see egregious violations of the Constitution and valid court orders playing out daily.

            https://www.documentcloud.org/documents/26513988-trorder0128...

            https://storage.courtlistener.com/recap/gov.uscourts.mnd.230...

            • typeofhuman 22 days ago

              Allegations aren't evidence. Has the Administration actually been found guilty of violating the law - if that is even possible.

              • jcranmer 22 days ago

                Yes, the Abrego Garcia and Öztürk detentions are two very newsworthy cases that have actually reached the point of a final judgement in the district courts, as opposed to "merely" preliminary injunctions against the government.

                (It's also worth noting that almost none of the government's appeals to their losses in preliminary injunctions have been on the merits as to whether or not their actions were legal, but rather on the grounds of "no one should be allowed to challenge our actions," which has also been a fairly losing argument for everybody except SCOTUS.)

              • bryceacc 22 days ago

                >if that is even possible

                yes.... any administration can be found guilty of violating law, and should be dealt with accordingly.

              • paulryanrogers 21 days ago

                > Has the Administration actually been found guilty of violating the law - if that is even possible.

                Obviously administrations can violate the law. Otherwise this is just an autocracy with term limits.

              • 542354234235 21 days ago

                >Allegations aren't evidence

                Allegations are literally evidence. "He attacked me" is an allegation of a crime and is evidence that would be used in conjunction with other evidence to prosecute said crime.

              • rockskon 22 days ago

                Evidence is evidence - of which there are enormous amounts of.

              • anon84873628 22 days ago

                Are you expecting the administration to prosecute itself?

          • mschuster91 22 days ago

            There's more than enough credible reports of CSAM in the Epstein Files dump - more than enough for me to not go and download even a single file of them myself, simply because German law does not care about why you are in the possession of CSAM, even if you took the picture yourself.

            The legal situation regarding CSAM is very strict no matter which country, and I better hope no one here will actually be dumb enough to provide actual links.

            • chrisjj 21 days ago

              If those reports are true then what we have is not just an effective deterrent for download and distribution of the set, but legally prosecutable malware targetting anyone who does, empowered by the Interpol CSAM database to which the DOJ should probably already released the offending material.

            • direwolf20 21 days ago

              Use encryption

              > even if you took the picture yourself.

              I'd hope the punishment is more severe in that case!

              • simonh 21 days ago

                It's a tricky issue. In many countries it's not illegal and quite common for children to run around naked in public, during the summer on beaches for example, and so millions of people have holiday photos that are technically CSAM in their possession that they don't even know they have.

                • direwolf20 21 days ago

                  CSAM must be for sexual gratification usually. A medical anatomy textbook isn't CSAM.

                  • woooooo 21 days ago

                    And now you're in court strenuously arguing that you weren't sexually gratified by the photo of your kid in the tub.

                    Obviously most people are sensible most of the time but sometimes they are not.

                  • chrisjj 21 days ago

                    More than that. CSAM is evidence of abuse. Hence the "A".

                    And nudity is not required.

                    • direwolf20 21 days ago

                      CSAM has a meaning identical to child porn but doesn't make that meaning explicit. Drawn or generated depictions of child nudity can be considered CSAM in some jurisdictions.

                      • chrisjj 21 days ago

                        "CSAM isn’t pornography—it’s evidence of criminal exploitation of kids."

                        That's from RAINN, the US's largest anti-sexual violence organisation.

                      • mschuster91 21 days ago

                        Yep. Germany is very very strict for example. Even textual descriptions fall under that law.

              • mschuster91 21 days ago

                > I'd hope the punishment is more severe in that case!

                I'm talking about kids making photos of themselves. Which has been an issue multiple times in the past.

            • subscribed 21 days ago

              That might be intentional tbh, to make the database toxic to limit the spread.

          • mikeyouse 22 days ago

            They illegally fired the IGs responsible for whistleblowers and fraud in every department; https://www.nycbar.org/press-releases/firings-of-inspectors-...

            They illegally withheld funds (impoundment) from congressionally authorized/mandated expenditures and relied on pocket rescissions to defund programs they didn't like: https://www.cbpp.org/research/federal-budget/pocket-rescissi...

            They keep illegally appointing unqualified hacks as US attorney in defiance of the mandate they're approved by the Senate (Essayli, Habba, Halligan, Sarcone, Chattah) - judges have found at least five of the appointments illegal. As one example: https://www.politico.com/news/2025/10/28/judge-los-angeles-t...

            They've repeatedly violated court orders to either return immigrant detainees or release them. "This is one of dozens of court orders with which respondents have failed to comply in recent weeks.": https://www.cnn.com/2026/01/27/politics/patrick-schiltz-judg...

            The EPA illegally convened a secret panel of climate deniers to issue a sham report in order to repeal the endangerment finding: https://www.nytimes.com/2026/01/30/climate/energy-department...

            His targeting and shakedowns of Universities, law firms, and media companies is transparently illegal jawboning.

            Everything about the tariffs is obviously illegal which he confirms every time he opens his mouth since he's relying on 'national security' justifications to issue them without Congress and he keeps insisting they're punishment for some random perceived slight.

            His illegal firing of Federal workers without the notice required: https://www.npr.org/2025/09/25/nx-s1-5544317/federal-probati...

            Some sillier things like renaming the Kennedy Center -- the law that established it literally said that it couldn't be renamed without Congress -- so Trump firing everyone on the board and then appointing a bunch of his flunkees to vote for the name change doesn't cut it.. https://beatty.house.gov/sites/evo-subsites/beatty.house.gov...

            It's a literal onslaught of illegality so I can't tell if you haven't read a news article since 2025 or if you're trolling.

    • rockskon 22 days ago

      Yeah - they'll take these lessons learned for future batches of releases.

    • rcakebread 21 days ago

      Sicko.

bushbaba 22 days ago

This proves my paranoia that you should print and rescan redactions. That or do screenshots of the pdf redacted and convert back to a pdf

velaia 22 days ago

Bummer that it's not December - the https://www.reddit.com/r/adventofcode/ crows would love this puzzle

nubg 22 days ago

Wait would this give us the unredacted PDFs?

  • ryanSrich 22 days ago

    That's the idea yeah. There are other people actively working on this. You can follow vx-underground on twitter. They're tracking it.

  • poyu 22 days ago

    I think it's the PDF files that were attached to the emails, since they're base64 encoded.

  • sznio 21 days ago

    From the unredacted attachments you could figure out what the redacted content most likely contains. Just like the other sloppy redactions that sometimes hide one party of the conversation, sometimes the other, so you can easily figure out the both sides.

alhamdulillah23 21 days ago

Got it.

Page 1: https://imgur.com/a/jwgu9uH

Page 2: https://imgur.com/a/4Zi3bkk

Use this: https://github.com/KoKuToru/extract_attachment_EFTA00400459

iwontberude 22 days ago

This one is irresistible to play with. Indeed a nerd snipe.

  • netsharc 22 days ago

    I doubt the PDF would be very interesting. There are enough clues in the human-readable parts: it's an invite to a benefit event in New York (filename calls it DBC12) that's scheduled on December 10, 2012, 8pm... Good old-fashioned searching could probably uncover what DBC12 was, although maybe not, it probably wasn't a public event.

    The recipient is also named in there...

    • RajT88 22 days ago

      There's potentially a lot of files attached and printed out in this fashion.

      The search on the DOJ website (which we shouldn't trust), given the query: "Content-Type: application/pdf; name=", yields maybe a half dozen or so similarly printed BASE64 attachments.

      There's probably lots of images as well attached in the same way (probably mostly junk). I deleted all my archived copies recently once I learned about how not-quite-redacted they were. I will leave that exercise to someone else.

    • notenlish 22 days ago

      There's 70 results that come out when searching for "application/pdf" on the doj website

      • netsharc 22 days ago

        OK, but if the solution is to brute-force them, there's probably a need to choose which files to focus on.

        Of course there are other content-types, e.g. searching for "Content-Type: image/jpeg" gets hits as well. But only a few of them actually have the base64 data, mostly there are just the MIME headers.. Looking for "/9j/" (which is Base64 for FF D8 FF, which is the header for JPEG files), the Trumpian justice.gov website ignores "/" and shows results case-insensitively, but there are 4 or 5 base64'ed JPEG images in there.

        I also saw that the page is vulnerable to code injection, somehow garbage in one search result preview was OCREd as "<s [lots of garbage]>", and the rest of the search results were striken-through because "<s>" is the HTML to do that.

linuxguy2 22 days ago

Love this, absolutely looking forward to some results.

Evidlo 22 days ago

I took at stab at training Tesseract and holy jeebus is their CLI awful. Just an insanely complicated configuration procedure.

  • subscribed 21 days ago

    Gods, I had a flashback just from you mentioning that.

    I had a reasonably simple problem to solve, slightly weird font and some 10 words in English (I actually only missed one or two blocks for missing letters to cover all I needed).

    After a couple of days having almost everything (?) I just surrendered. This seems to be intentionally hostile. All the docs scattered across several repositories, no comprehensive examples, etc.

    Absolutely awful piece of software from this end (training the last gen).

queenkjuul 22 days ago

I'm only here to shout out fish shell, a shell finally designed for the modern world of the 90s

FarmerPotato 22 days ago

If only Base64 had used a checksum.

  • zahlman 22 days ago

    "had used"? Base64 is still in very common use, specifically embedded within JSON and in "data URLs" on the Web.

    • bahmboo 22 days ago

      "had" in the sense of when it was designed and introduced as a standard

ks2048 22 days ago

I wonder if jmail (https://www.jmail.world/) has worked on this?

I tried to find the message in this blog post, but couldn't. (don't see how to search by date).

blindriver 22 days ago

On one hand, the DOJ gets shit because it was taking too long to produce the documents, and then on another, they get shit because there are mistakes in the redacting because there are 3 million pages of documents.

  • tclancy 21 days ago

    It really doesn’t matter which foot you use to step on your own dick. This could not have been more mishandled if they gave it to an actual snake.

  • rexpop 22 days ago

    "On the one hand the chef gets shit for taking too long, and then on another for undercooked, badly plated dishes."

    Incompetence is incompetence.

  • rapind 22 days ago

    What they are redacting is pretty questionable though. Entire pages being suspiciously redacted with no explanation (which they are supposed to provide). This is just my opinion, but I think it's pretty hard to defend them as making an honest and best effort here. Remember they all lied about and changed their story on the Epstein "files" several times now (by all I mean Bondi, Patel, Bongino, and Trump).

    It's really really hard to give them the benefit of the doubt at this point.

    • Rebelgecko 22 days ago

      My favorite is that sometimes they redact the word "don't". Not only does it totally change the meaning of whatever sentence it's in, the conspiracy theory is that they had a Big Dumb Regex for redacting /Don\W+T/i to remove Trump references

  • thereisnospork 22 days ago

    Considering the justice to document ratio that's kind of on them regardless.

  • subscribed 21 days ago

    It's pretty clear who they should be reacting (victims/minors) and who they shouldn't (perpetrators).

    They wasted months erasing Trump from that instead. So it's on them.

  • krupan 21 days ago

    Government is bad at stuff, and more news at 11

  • hypeatei 21 days ago

    The zeitgeist around the files started with MAGA and their QAnon conspiracy. All the right wing podcasters were pushing a narrative that Trump was secretly working to expose and takedown a global child sex trafficking ring. Well, it turns out, unsurprisingly, that Trump was implicated too and that's when they started to do a 180. You can't have your cake and eat it too.

zahlman 22 days ago

> …but good luck getting that to work once you get to the flate-compressed sections of the PDF.

A dynamic programming type approach might still be helpful. One version or other of the character might produce invalid flate data while the other is valid, or might give an implausible result.

winddude 22 days ago

here's another few to decode,

https://www.justice.gov/epstein/files/DataSet%2010/EFTA01804...

https://www.justice.gov/epstein/files/DataSet%209/EFTA007755...

https://www.justice.gov/epstein/files/DataSet%209/EFTA004349...

and than this one judging by the name of the file (hanna something) and content of the email:

"Here is my girl, sweet sparkling Hanna=E2=80=A6! I am sure she is on Skype "

maybe more sinister (so be careful, i have no ideas what the laws are if you uncover you know what trump and Epstein were into)...

https://www.justice.gov/epstein/files/DataSet%2011/EFTA02715...

[Above is probably a legit modeling CV for HANNA BOUVENG, based on, https://www.justice.gov/epstein/files/DataSet%209/EFTA011204..., but still creepy, and doesn't seem like there's evidence of her being a victim]

  • Enhaj12 20 days ago

    Regarding EFTA00434905

    I tried and got alot of errors, cant seem to fix it, due to corruption.

    https://www.docfly.com/editor/fa3bcb1fa9e8d2629b32/v9r21qsju...

    Tried to get AI to guess the remaining text: https://pastebin.com/Z9X2d510

  • netsharc 22 days ago

    Geezus, with the short CV in your profile, you couldn't tell an LLM to decode "filename=utf-8"CV%5F%5F%5FHanna%5FTr%C3%A4ff%5F.pdf"? That's not "Bouveng".

    Anyway searching for the email sender's name, there's a screenshot of an email of hers in English offering him a girl as an assistant who is "in top physical shape" (probably not this Hanna girl). That's fucking creepy: https://www.expressen.se/nyheter/varlden/epsteins-lofte-till...

    • winddude 21 days ago

      not sure how I missed the url encoding. yea, fuck not sure I want to decode that PDF, and their's a high probability that that's a victims name.

      Wonder why there's so many random case files in the files.

  • Snoozus 22 days ago

    this one has a better font, might be a simple copy&paste job

    • winddude 22 days ago

      I've checked for copy and paste, there's so many character flaws, their OCR must have sucked really bad, I may try with deepseekOCR or something. I mean the database would probably more searchable if someone ran every file through a better OCR.

eek2121 22 days ago

Honestly, this is something that should've been kept private, until each and every single one of the files is out in the open. Sure, mistakes are being made, but if you blast them onto the internet, they WILL eventually get fixed.

Cool article, however.

  • misja111 21 days ago

    Won't that entire DOJ archive already be downloaded for backup by several people? If I'd be a journalist working on those files, this is the very first thing I would do as soon as those files were published. Just to make sure you have the originals before DOJ can start adding more redactions.

SomaticPirate 22 days ago

Are there archives of this? I have no doubt after this post goes viral some of these files might go “missing” Having a large number of conspiracies validated has lead me to firmly plant my aluminum hat

IshKebab 21 days ago

Disappointing how terrible open source OCR still is.

sorbus-25 22 days ago

Event details: https://web.archive.org/web/20260206040716/https://what2wear...

  • sorbus-25 22 days ago

    DUBIN BREAST CENTER SECOND ANNUAL BENEFIT MONDAY, DECEMBER 10, 2012 HONORING ELISA PORT, MD, FACS AND THE RUTTENBERG FAMILY HOST CYNTHIA MCFADDEN SPECIAL MUSICAL PERFORMANCES CAROLINE JONES, K'NAAN, HALEY REINHART, THALIA, EMILY WARREN MANDARIN ORIENTAL 7:00PM COCKTAILS LOBBY LOUNGE 8:00PM DINNER AND ENTERTAINMENT MANDARIN BALLROOM FESTIVE ATTIRE

wtcactus 22 days ago

My non political take about this gift that keeps on giving is that: PDF might seem great for the end user that is just expected to read or print the file they are given, but the technology actually sucks.

PDF is basically a prettify layer on top of the older PS that brings an all lot of baggage. The moment you start trying to do what should be simple stuff like editing lines, merging pages, change resolution of the images, it starts giving you a lot of headaches.

I used to have a few scripts around to fight some of its quirks from when I was writing my thesis and had to work daily with it. But well, it was still an improvement over Word.

  • direwolf20 21 days ago

    It's meant as a printer replacement format, hence "print to PDF". It's a computer file format about equivalent to a printed document. Like a printed document, you can't just change its structure and recompile it.

Keyboard Shortcuts

j
Next item
k
Previous item
o / Enter
Open selected item
?
Show this help
Esc
Close modal / clear selection