Game Night!: This weekend! https://www.facebook.com/events/317792721696252/
Partial solve to the media images.
So since we were finding nothing at the locations posted by the media, I decided to try messing with the images themselves to see if there was something hidden in them.
I used an application called jphide/jpseek for windows that will de-steg (steganography) image files to see if there is anything hidden within them.
The application requires a password.
So after deep thought, I decided to try the image we had for the Badlands, and using the word "Snort" for the password.
I chose Snort because we kept dying to him when out there the other night.
The application was succesful and provided the following information:
Now the hard part will be finding the passwords for the other images we've recieved.
Any help with this is greatly appreciated.