# /private/var/folders/bf/r04p_gb17xxg37r9ksq855mh0000gn/C/com.apple.QuickLook.thumbnailcache/index.sqlite
$ sudo python3 mac_apt.py -d E01 ../Spotlight/FruitBook.E01 -o ../quicklook QUICKLOOK
$ ls quicklook/Export/QUICKLOOK/Thumbnails/hansel.apricot
GET A NEW PHONE TODAY!.jpg
# private/var/db/dslocal/nodes/Default/users/hansel.apricot.plist
$ plistutil hansel.apricot.plist > output.txt
$ cat out.txt # find hint
Family Opinion
# When i find in the fsevents logs, it point to Users/shared/GoodExample.jpg
# I export it and analyze
$ steghide extract -sf GoodExample.jpg
Enter passphrase:
wrote extracted data to "steganopayload27635.txt".
$ cat steganopayload27635.txt
Our latest phone will have flag<helicopter> blades and 6 cameras on it. No
other phone has those features!