Anonymous ID: 4df727 May 3, 2018, 8:37 a.m. No.1286065   🗄️.is 🔗kun   >>7618 >>7632 >>9370 >>6719 >>2351 >>7031

>>1279851 FIND THE KEY

 

Classified data cannot be transmitted unless it is encrypted. Q tells us he’s given us 40,000 ft classified data, but that it’s not open source. I believe everything we’ve been given includes enough information for us to deduce the encryption method and the key to unlock. I believe the plan was to dump this encrypted data onto a read only board here, ‘Great Awakening’.

 

I think I know the method, Oracles Golden Gate Security, AES128, AES192, AES256, or Blowfish. We could never brute force these, but we can deduce the key to unlock from Q’s drops. I just don’t know how Q has given it to us, he says the key is the graphic. If we can deduce the methods of encryption, which I think I have, we can decrypt the coming data dump using the key provided.

 

[CLAS-N-DI_9] is an encrypted classified field in an Oracle database, where the data is located. He’s taunting those who know.

 

The encryption method, Oracle GoldenGate Security ‘gg_dump’

 

https: //docs.oracle.com/goldengate/1212/gg-winux/GWUAD/wu_security.htm#GWUAD354

 

Q came here for a reason, he could have gone to reddit. This is what RA’s do. We need to find the key.

Anonymous ID: 9479f4 May 3, 2018, 8:44 a.m. No.1286134   🗄️.is 🔗kun

Here is the dump again i saved a while ago.

 

Maybe you cypherfags have use for it:

 

Key Dump

 

eta numeris 392D8A3EEA2527D6AD8B1EBBAB6AD

 

sin topper D6C4C5CC97F9CB8849D9914E516F9

 

project runway 847D8D6EA4EDD8583D4A7DC3DEEAE

 

7FG final request 831CF9C1C534ECDAE63E2C8783EB9

 

fall of cassandra 2B6DAE482AEDE5BAC99B7D47ABDB3

 

echo "392D8A3EEA2527D6AD8B1EBBAB6AD" eta-numeris.hex

 

echo "D6C4C5CC97F9CB8849D9914E516F9" sin-topper.hex

 

echo "847D8D6EA4EDD8583D4A7DC3DEEAE" project-runway.hex

 

echo "831CF9C1C534ECDAE63E2C8783EB9" 7FG-final-request.hex

 

echo "2B6DAE482AEDE5BAC99B7D47ABDB3" fall-of-cassandra.hex

 

openssl enc -aes256 -in eta-numeris.hex -out eta-numeris.key

 

openssl enc -aes256 -in sin-topper.hex -out sin-topper.key

 

openssl enc -aes256 -in project-runway.hex -out project-runway.key

 

openssl enc -aes256 -in 7FG-final-request.hex -out

 

7FG-final-request.key openssl enc -aes256 -in fall-of-cassandra.hex -out fall-of-cassandra.key

 

for w in $(ls .aes256); do for k in $(ls keys/.key); do echo "$w, $k, $(echo "$(openssl enc -d -aes256 -in $w -kfile $k -bufsize 8 | xxd -l 8 | sed s/00000000://g)" | cut -c 1-23)"; done; done;

 

wlinsurance-20130815-A.aes256, keys/7FG-final-request.key, 6f46 30e1 c6f3 385d wlinsurance-20130815-A.aes256, keys/eta-numeris.key, f22d 7304 8224 8ad6 wlinsurance-20130815-A.aes256, keys/fall-of-cassandra.key, 07d6 db54 f3c2 7d4a wlinsurance-20130815-A.aes256, keys/project-runway.key, da46 2913 216c 9a0d wlinsurance-20130815-A.aes256, keys/sin-topper.key, 48ab b7eb ceda f42d wlinsurance-20130815-B.aes256, keys/7FG-final-request.key, fde0 5ea5 34a9 c372 wlinsurance-20130815-B.aes256, keys/eta-numeris.key, 52f3 436e 82db 1fde wlinsurance-20130815-B.aes256, keys/fall-of-cassandra.key,ca1c c808 dfbd 0d23 wlinsurance-20130815-B.aes256, keys/project-runway.key, a10a 3571 a17b 8898 wlinsurance-20130815-B.aes256, keys/sin-topper.key, b1a0 64d4 0004 8865 wlinsurance-20130815-C.aes256, keys/7FG-final-request.key, 998a f677 3d20 33da wlinsurance-20130815-C.aes256, keys/eta-numeris.key, 5aec a6e6 5de9 dfdb wlinsurance-20130815-C.aes256, keys/fall-of-cassandra.key, 197f 378d 63b0 3e54 wlinsurance-20130815-C.aes256, keys/project-runway.key, acb3 a582 a477 75c6 wlinsurance-20130815-C.aes256, keys/sin-topper.key, d0f1 6154 a193 8905

Anonymous ID: c08229 May 3, 2018, 11:40 a.m. No.1287618   🗄️.is 🔗kun   >>7632

>>1286065

A guaranteed unique identifier includes a reference to the network address of the UUID generating host, a time stamp and an arbitrary component. Because network addresses for each computer vary, the time stamp is also different for each generated UUID. Thus, two different host machines exhibit sufficient levels of uniqueness. The randomly created arbitrary component is added for enhanced security.

 

UUIDs are also part of the Tmodel data structure, which is a service type in the Universal Description Discovery and Integration (UDDI) registry used for Web service discovery.

Anonymous ID: c08229 May 3, 2018, 11:42 a.m. No.1287632   🗄️.is 🔗kun

>>1286065

>>1287618

Universal Description, Discovery and Integration (UDDI, pronounced /ˈjʊdiː/) is a platform-independent, Extensible Markup Language protocol that includes a (XML-based) registry by which businesses worldwide can list themselves on the Internet, and a mechanism to register and locate web service applications. UDDI is an open industry initiative, sponsored by the Organization for the Advancement of Structured Information Standards (OASIS), for enabling businesses to publish service listings and discover each other, and to define how the services or software applications interact over the Internet.

 

UDDI was originally proposed as a core Web service standard.[1] It is designed to be interrogated by SOAP messages and to provide access to Web Services Description Language (WSDL) documents describing the protocol bindings and message formats required to interact with the web services listed in its directory.

Anonymous ID: 129ce7 May 3, 2018, 11:58 a.m. No.1287779   🗄️.is 🔗kun

Hi, I know FUCKALL about coding.

But pence just HAD to pick this prayer from 110 (111) days ago. Any key in here?

Jan 13 2018 22:33:44 (EST) Q !UW.yye1fxo 10

-D_CsTBA_YES[AUTH_H7^pZBVTZ7302-]

##FLY##

[OWLS]

HOT-1_pre_D

HOT-2_pre_D

HOT-3+

HOT-4_TERM_AUTHC-TVFCAZD-837392x

HOT-5_pre_D

HOT-6_pre_D

HOT-7_corr_TAXjV^-293Z

HOT-8_pre_D

HOT-9_pre_D

HOT-10_pre_D

HOT-11_pre_D

HOT-12_pre_D

AS THE WORLD TURNS.

HAPPY HUNTING.

P_PERS: WRWY [N1LB][FG&C]

Jeremiah 29:11

Q

 

ps: there are more Q drops on that day. good luck !

Anonymous ID: c08229 May 3, 2018, 2:58 p.m. No.1289391   🗄️.is 🔗kun   >>5818 >>0350 >>6810

>>1289141 Synopsis::

 

No Such Agency accidentally releases IT ALL Into the Cloud? Using Oracle Products?

 

[CLAS-N-DI_9] gg_dump [No Such Agency].

 

It does not technically exist as open-source. dump is there, but technically not there

 

In order to 'read the dump you need a key. Get it?

 

The graphic is your key. Notice it says 'your key' and not 'the key' as elsewhere.

 

Where is the key???

 

Military Intelligence, No Such Agency = key They Provide the key to NSA accidental dump of all

 

How to find??????

 

Graphic is necessary and vital. ←—–

 

Graphic is essential. ←—

 

Find the ke[y]stone. ←—

 

But, what graphic[s]???

 

This/These. >>1286183 ←—

Anonymous ID: c08229 May 3, 2018, 3:17 p.m. No.1289573   🗄️.is 🔗kun

http://smallbusiness.chron.com/decrypt-messages-embedded-within-images-50077.html

 

Decrypting Digimarc-Encoded Images with Photoshop

 

  1. Open Adobe Photoshop by double clicking its icon.

 

  1. Select "Open" from the "File" menu. In the file selector box, locate the file with the embedded Digimarc watermarking message and double-click it to open it.

 

  1. Choose the "Filter" option from the menu bar and scroll down to the "Digimarc" open. A menu will pop-out to the right. Select "Read Watermark" from that menu and click it.

 

  1. Select the "Web Lookup" button in the Digimarc dialog box that pops up to learn more about the creator of the image. It will open a lookup page in a separate browser window.

 

  1. Close the Digimarc dialog box in Photoshop by clicking on its "OK" button.

Decrypting OpenPuff Encoded Files

 

  1. Open the OpenPuff application by double-clicking on its icon.

 

  1. Click the "Unhide" button.

 

  1. Enter the password or passwords to decrypt the hidden message. Each image will have at least one password, which you should enter in the "Cryptography (A)" box, and may have as many as two more which go, respectively, in the "(B)" and "Scrambling (C)" boxes. If the image does not have a second or third password, unclick the "Enable (B)" and/or the "Enable (C)" boxes located under the field for password B.

 

  1. Select the file with the hidden image by clicking the "Add Carriers" button in the lower-left corner of the Open Puff Screen, selecting the file and double-clicking it.

 

  1. Choose the way in which the message is encoded in the "(3) Bit selection options" pane. Click the "+" sign to the left of the type of file that hides the message, then select the compression level.

 

  1. Click the "Unhide!" button.

 

  1. Indicate where you want the file with the hidden message to go by selecting the output directory in the "Browse for Folder" box that pops up and clicking the "OK" button.

 

  1. Click "OK" on the "Task completed - Info" dialog box that appears then click "Done" on the Task Report window that comes up. Note the name of the file that got pulled out. It will appear roughly in the middle of the report window directly to the right of where it says "Name <-".

 

  1. Close FilePuff by clicking the red button with an X the upper right corner of the "Data Unhiding" window then by clicking the close button in the upper right corner of the main FilePuff screen.

 

  1. Locate the file you decrypted and open it by double-clicking on it.

Anonymous ID: c08229 May 3, 2018, 4:18 p.m. No.1290068   🗄️.is 🔗kun

https://incoherency.co.uk/image-steganography/#unhide

 

used tool, nothing hidden 'in plain site' so I'm not sure there's anything to anything other than maybe filename…

Anonymous ID: d227a0 May 3, 2018, 6:23 p.m. No.1291438   🗄️.is 🔗kun

There are many theories about finding the key.

 

If they involve using certain specific softwares that I do not use, possess and/or understand it is highly unlikely that I will be of any help on that front. I defer to the anons with the experience in that field and I anxiously await their theories and findings.

 

That being said, I have been using a dumb method using markers or groupings of markers to combine statements from different Q posts that contain the same markers (signatures).

 

For example, looking at the top two Q posts in the attached graphic and noticing that both contain the same markers (Snow White & Wizards & Warlocks) I combined the text from the two Q posts to produce a message that is less cryptic.

 

I will note that this does not work every time there are the same markers in two Q posts. Either the theory is simply coincidence, there are multiple posts with the same markers and I have not grouped the proper Q messages yet and/or the theory is imperfect and there is a deeper method of which I am only scratching the surface.

 

Anyway, I hope the following translation might fire your brains up and that you may help me find the dumb key.

 

When big news drops please re-read graphic.

We need to get organized.

This is so critical and why information is provided in a certain order and why some topics are continually emphasized more than others as those will be the recent happenings.

Things need to be solved to understand what is about to happen.

This is the purpose of this new thread (re-organize).

 

Let's start w/Alice & Wonderland

Hillary Clinton in Wonderland by Lewis Carroll.

Saudi Arabia - the Bloody Wonderland

 

Simplified

Alice & Wonderland

Hillary & Saudi Arabia

References:

Hillary Clinton in Wonderland by Lewis Carroll

Saudi Arabia - the Bloody Wonderland

 

Please add crumbs in new complete graphic.

Organized and in order.

Critical for understanding and review.

 

Spiderweb

 

Hillary & Saudi Arabia (Alice & Wonderland)(see above)

This is staged and deliberate.

Snow White

Godfather III

Anonymous ID: 1aa0e8 May 4, 2018, 1:52 a.m. No.1294254   🗄️.is 🔗kun   >>6719

Let me ask you a question: about how long might one expect the key to be? Also, is it possible that the file might be found on one of Wikileak's servers?

 

I have a suspicion that what you may be looking for is the "stone," or the actual data. Early on, there was a rumor that the "key" was the password that would give access to one of Julian Assange's "insurance" drops. He's made at least nine so far–the latest I know of was a 64.31 GB drop on Christmas of last year:

https://steemit.com/conspiracy/@vaerospace/wikileaks-drops-65gb-torrent-link-weiners-emails

 

There were many rumors that Julian Assange was passing data to visitors via thumb drive (64 GB obviously seems a coincidental fit). There were a couple of suspects which are relatively easy to find with a search; for instance, Nigel Farage visited Assange on March 9th, 2017; on January 19, he was accused of helping:

https://www.theguardian.com/politics/2018/jan/19/trump-russia-inquiry-is-told-nigel-farage-may-have-given-julian-assange-data

 

Trump has met with Nigel Farage several times since and before Farage's visit with Assange. This is all tied to research I did quite awhile ago–which was ignored; I'm sure you understand the frustration. Anyway, some anon found a book called "Expand Your Thinking," which listed a series of mind-mapping techniques. I started to focus on the bracketed text, going on the assumption that the last relevant date was December 15. The reasoning was because of this unique post on that day:

 

>Follow the crumbs.

>You have it all.

>SEC Conf will be analyzed.

>Dark [10].

>Enjoy the show!

>Q

 

I'd set about trying to figure out what the key was using the methods in that book and the cryptography methods listed on Q's link to the C_A's website for kids. On March 6th, I posted pic related:

https://8ch.net/qresearch/res/565493.html#q565535

(You can find a link to some of the "Expand Your Thinking" texts by following one of the responses to my post).

 

The next day, Q posted other pic related. Most anons figured he was speaking to JA, but I saw something different–if you're thinking in terms of shifting letters, "L-6" becomes "F"…because L is the 12th letter of the alphabet, and F is the 6th. The significance of that is that the very first content in braces is "[F]" (post #14, see last pic related).

 

I spent some time working on it, and could probably put together a program to spit out all possible combinations of braced content fairly quickly…but there is still too much uncertainty. How do we know what is a subpart of what? What is the length of the key? Would our part be in used in combination with another part?

 

There have been several "pre-commitments" already (see link at end, plus search "NSA pizzagate tweet", plus look up Assange's mysterious New Year's tweet). Even if you stop at Dec. 15th, there are already 54 separate instances of content in braces. Without knowing the length you need, whether clues should be interpreted as letters (such as …+1), knowing how to automate a program to make attempts, and being fairly busy irl, it just seemed out of reach. Maybe with your knowledge and that of others, we can winnow down the possibilities.

 

I'll keep checking back; hopefully we can get this figured out. I think that, with the clues Q has given, we're a lot closer than we've ever been.

 

If you'd like more background on Wikileak's files, you can read up here (it's two years old, but covers things that aren't well-known):

https://steemit.com/wikileaks/@ausbitbank/how-to-download-the-wikileaks-archives-insurance-files-email-leaks-for-safe-keeping

Anonymous ID: 8c82be May 4, 2018, 8:23 a.m. No.1295818   🗄️.is 🔗kun   >>8930 >>9301

>>1289391

i thought i remember anons finding something in Q’s flag picture that was at the top of the great awakening thread. i dont know if the research bread was archived or not. had to do with the points on the stars when the color was shifted

Anonymous ID: 740381 May 4, 2018, 2:19 p.m. No.1299272   🗄️.is 🔗kun   >>9421 >>0679

NEW PRIVATE BOARD BY Q CALLED PATRIOTS FIGHT (/patriotsfight/)

 

we are in phase three

 

Q Posted:

 

05/04/18 (Fri) 14:46:23 No.62[

 

[Future Comms]

 

Pre_stage ele_y

 

Pre_stage sec_y

 

Pre_stage dir_y

 

Pre_stage cap_y

 

[OnReady]

 

Q

Anonymous ID: 420e09 May 4, 2018, 2:27 p.m. No.1299421   🗄️.is 🔗kun

>>1299272

Does "ele" mean election?

Does "sec" mean secretaries?

Does "dir" mean directors?

(Don't know what "cap" might mean)

Does "[OnReady]" mean ready to go?

Anonymous ID: 497b83 TheMuze/FromTheForests May 4, 2018, 4:02 p.m. No.1300679   🗄️.is 🔗kun

>>1299272

 

I wonder where this will lead to? The new room, I mean. Someone was saying something about not asking Q questions…to me it seems there are a lot of question marks being answered with many question marks…it's riddled and a gateway to make those reading to think and get that V8 or Eureka moment. Such military images flash by in thoughts. Prayers offered. Our fight strengthens. WWG1WGA. So asking questions seems proper here. Really the last time I was around these parts, my question was mainly about the victim of that Joe Scarface guy. I was hoping that what I picked up through the Ley Lines whenever I'd go to that place and time was something that lead to the resolution of what was hidden. The oil rigs. Soron/Soros. The poor girl that was killed because she found some documents that he didn't want her to find. He was being an asshole. Oppressive. She found something. He killed her. And no name ordered it maybe…

 

https://youtu.be/09dypgdxFJ0

Anonymous ID: 8c82be May 5, 2018, 5 a.m. No.1307096   🗄️.is 🔗kun   >>9367

>>1299301

nice! thanks for doing that! :)

 

>>1306953

not sure about the morse code. but i wouldn't classify myself as an autist either

but there IS a pattern - like a mirror image = it is symmetrical

and i did find that there is such a thing as symmetrical encryption:

https://computer.howstuffworks.com/encryption2.htm

Anonymous ID: 1aa0e8 May 5, 2018, 11:10 a.m. No.1309367   🗄️.is 🔗kun   >>7013 >>6719

>>1306953

>>1307096

 

Anons should recognize the difference between things like cryptography, steganography, and what computer science people refer to as "encryption." Encryption is usually something done at a level of complexity that would make it very, very difficult for a computer to decipher unless it knows the key (often also known as a password), whereas cryptography and steganography are designed for people, given the right method, to decrypt. This is the best site I've found on the subject, with tools for almost everything related:

https://www.dcode.fr/tools-list#cryptography

 

Earlier on Q intimated that the C_A (and I believe Obama, via the RED_RED stringer) were communicating with Snowden using regular, main-stream channels like Twitter and youtube. This makes sense to me–Snowden has some idea what the NSA can do, so he would likely never let his guard down for private communication on a personal device. But if you had certain code words, or perhaps an agreed-upon method of extracting code words from regular speech, then you could communicate in public without realizing it. Here's a simple example: Let's say we make an agreement before your mission starts:

R = K, E = I, D = L, F = A, O = L, X = L,

Then somewhere down the line I tweet

>my favorite comedian was REDD FOXX!

 

I believe some of Q's biggests hints were post #231 and #709 (pics related). The C_A link leads you to kid's puzzles using letter substitution, letter skipping, letter rotation, and symbol substitution. If you look at post #231, you see the first line:

>T: B, F, J, 1, 5, 11-20, ^

to me, that meant: "Table: B = 1, F = 5, J = (maybe -9)?"

A table is a lookup where you would exchange numbers for letters:

A = 0, B = 1, C = 2, D = 3, E = 4, F = 5, G = 6, H = 7, I = 8, J = 9…

 

There are other hints mixed throughout the earlier posts. I think it's pretty obvious that Q was frustrated at our inability to solve some of his stringers–not surprising, given that they're probably relatively simple and his team does this as a matter of routine.

 

I made a thread on the subject before, but it was (rightfully) archived. I'll try to see if I can locate it.

Anonymous ID: 03014a May 5, 2018, 12:38 p.m. No.1310008   🗄️.is 🔗kun   >>1029

I'm trying to work on this apple pic. In scanning I find one 1file. It's a json file, but it's a .png file he posted. I can open the json file in c++ I turn the encryption to utf-8 and change the language to xml. There's a distinct pattern. I have saved the filed in several formats. I am not trained in much just what I've taught myself. I will keep trying, but would be nice if someone smarter than me could take a look. I'm sure there is an easier way to do it, but I always start from bottom up.

Anonymous ID: dad828 May 5, 2018, 4:20 p.m. No.1312079   🗄️.is 🔗kun

nvm. It's the log file. Reagardless the file is too big. It isn't in kb it is Megs. Something is there and i'm trying different programs, just nothing as of yet. It has to be simple. Run it thru a program and decrypt. I can't find a program that will run for me to do so. I should give up.

Anonymous ID: dad828 May 5, 2018, 5:58 p.m. No.1313141   🗄️.is 🔗kun

'Holmium Regardless  Liu holmium lone? The Z Lu = \ fleece expansion Gu z lu) W Trade ~) <holmium? Qi O Mei Youweng? Furnace} r furnace Lu? `> ~ Suborner 3? UW? Bow of a Chinese boat no coal Naopao cap y 鈥樎嘎 鈥樎嘎 鈥樎嘎 脻 脻 脻 脻 脻 脻 脥 脥 脥 脥 脥 脥 脥 脥 脥 鸥 鸥 ? ?? N陋修t舱聫 P胫麓s=聧3鈩?wV=戮wv路鹿不?5驴驴)镁!!脟E脜冒脜陆脙漏盲膜酶帽矛帽矛矛, 镁 镁 镁 镁 镁 镁 镁 镁 镁 镁 鈥 鈥 鈥 伱 伱 伱 伱 镁 镁 镁 镁 镁 镁 镁 镁 镁 镁 镁 镁 镁 镁 镁 镁 镁 镁? Road record | cranial enzyme Hao sacrificial flesh take u}; holmium Ji Jie Jiang Su was screwed Nao U Krupp holmium every four Xiu Ji Lu Hao  € sacrificial flesh cat You did good  gO holmium holmium shake Mao Peng and Lu road ?? ?? > Every x reckless plum mate 潞鈥 莽脻 ? g 鈥 鈥 鈥 ? ? ? ? ? ? O | 貌 貌 貌 貌 ' 脟 陋脝 陋脝 陋脝 陋脝 陋脝 陋脝 陋脝 陋脝 聫 聫 聫 Ga Ga Ga 2 cabin repair gq repair} = 脵 T cap y blind cap q 脺茫 w w w w w w w w w w w w w w w w w w w w w w w w w | | | | | | | | | w l? Veratrum E|.e脨]潞 潞 脗 脗 脗 ? ? ? ? ? ? 茫 茫 茫 茫 茫 茫 茫 茫 茫 茫 聺 聺 聺 聺 聺 聺 聺 聺 聺 路 ? ? ? ? ? ? ? ? ? ? ? o 酶 霉 霉 霉 霉 霉 霉 霉 霉 霉 霉捗瞦 捗瞦 舱 鸥 鈩 鈩 鈩 衡 衡 衡 衡 衡 衡 衡 衡 衡 衡 衡 衡 衡 衡 衡 衡 衡 衡 衡 衡 衡 衡 衡 衡 衡 衡 衡 衡 衡 衡 衡 衡 衡 衡 衡 衡 衡 衡 衡 衡 衡 衡 衡 衡 衡 衡 衡 衡 衡 衡 衡 衡 €聧 猫              聫 聫 聫 聫 聫 聫 聫 聫 聫 聫 聫 聫 聫 聫 聫 聫 聫 聫 聫 聫 7 7 7 7 7 ~ 聧鈥 胀 胀 - - - # # # # # # # # # # # # # U U U U U U U U U I I I I I I I I I I I I I I I I I I I I I I脝脽 脝脽 脝脽 聺莽 聺莽 聺莽 聺莽 聺莽 拧 拧 拧 拧 拧 拧 拧 拧 拧 拧 拧 拧 ] ] ] ] ] ] ] ] ] l g 芦 鈥 鈥 鈥 没 没 没 没 没 没 W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W WM?! ? O per 4 kill # m = Qi a7 spear? Jie? 7 Lu Lu Chiliang recorded Shui Lu ass off bow of a Chinese boat Lo Qie & Te? Mount S holmium Ning? ou? G bulging e holmium Tang? holmium knock N Mount Uu path Pi )w screw riveting Gw7 脥z戮V 鈥溍暵? > Bi? G humble donkey media Mount Mau '+

Anonymous ID: 352524 May 5, 2018, 9:06 p.m. No.1315037   🗄️.is 🔗kun

Pic attachment.. I'm literally confused on weather I am on right page but then I find companies.. or something that tells me I'm going right way. Wish I had confirmation.

 

https://www.wuxiaworld.com/novel/battle-through-the-heavens/btth-chapter-478

 

Alot of what I'm finding is referencing this novel.

Anonymous ID: dad828 May 7, 2018, 6:44 p.m. No.1332384   🗄️.is 🔗kun

I think so. I think if we can get those and what's in the pic to match up.. Idk. I'm still working on it. I rather be working on the Wmv.

Anonymous ID: 6d3967 May 7, 2018, 7:22 p.m. No.1332861   🗄️.is 🔗kun

While I only know enough computer stuff to destroy one, I've been reading thru these posts and was thinking about the old "Distomap" Rand McNally that we used to use as dispatchers. If the numbers were put in a circle, and then the holes punched as in the hidden flag pic, perhaps that would be a key?

Distomap for sale here…

https://www.amazon.com/Distomap-Rand-McNally/dp/0528883690

Anonymous ID: dad828 May 7, 2018, 7:29 p.m. No.1332958   🗄️.is 🔗kun

Maybe the numbers on the pics? I know the number is encryption uid, but there is away to set your own. Something to look at.

Thanks!

Anonymous ID: 6d3967 May 7, 2018, 7:33 p.m. No.1333002   🗄️.is 🔗kun

There was an anon a week or so ago that had put all of the timestamps in a circle that looked very interesting. Like you could put one of those distomap wheels on it.

Anonymous ID: dad828 May 7, 2018, 7:46 p.m. No.1333169   🗄️.is 🔗kun   >>3193

https://encoder.mattiasgeniar.be/index.php

 

https://qbit.it/lab/hextext.php

 

https://www.youtube.com/watch?=991J04f18Xs

 

https://www.youtube.com/watch?v=VrCqo5_xxy8

Anonymous ID: 6d3967 May 7, 2018, 7:49 p.m. No.1333203   🗄️.is 🔗kun

>>1333009

U R way above my pay scale! I was just thinking about a way to write down the time stamps like a clock, and/or maybe everything in brackets in a circle. Then put a wheel over top, with the little holes punched out as the highlighted flag pic. Maybe resulting in the file name key. Sort of like the anon post 1309367

code idea.

Anonymous ID: dad828 May 7, 2018, 7:57 p.m. No.1333291   🗄️.is 🔗kun   >>3905

There is more to get a clearer info. I have to goto bed:/ I'll work on tomorrow. You can do any pic. But consider this. These Names and random people (dealing with weakened steel) could be in a photo that is just jibberish? There's something to it.

Anonymous ID: 6d3967 May 7, 2018, 8:31 p.m. No.1333624   🗄️.is 🔗kun

Thinking about when Obama opened up the Internet to the individual countries that the key would be in US/English code in order to access it.

Anonymous ID: b5612f May 7, 2018, 9 p.m. No.1333905   🗄️.is 🔗kun   >>6104

>>1333291

>>1333291

Notepad++ not an option right now because of OSX. If you can post python code / something I can run I'll run it.

 

However, I WAS able to confirm the two images posted by >>1333291 match their sha256 values. e.g., if you run this in terminal:

 

openssl sha256 f37cacad979dc2bc90cd1699218c1b268a94ffdb5e3287870adce6b1a582f9aa.png

 

And the result is: f37cacad979dc2bc90cd1699218c1b268a94ffdb5e3287870adce6b1a582f9aa

 

which matches the name of the file. So I presume there is a reason to go through all the trouble to make sure to verify that those images have not been modified by a single bit. Additionally, I was not able to compress the two images. (Though admittedly I didn't try very hard). Both together strongly implies there is some information there.

Anonymous ID: 35e073 May 7, 2018, 9:18 p.m. No.1334086   🗄️.is 🔗kun   >>4162 >>6600

>>1333275

JFIF ?? Qq? 2aN? "I do not know what you're talking about, EWSD? W nude reviews?

 

virtual sEzie local governments?

NK DDD? thOuthAMe? djyl?

K? IISS? | SNI? AJ? Concrete chicken?

Municipality ? IBA? AeAeEthuμIUaIIssu? Au ~ ²KIND

Û-EK Où SoeO? Vau? Austria?

· OVIAU? a® ?? OAO? Gl? HS Doe?

Anonymous ID: 35e073 May 7, 2018, 9:28 p.m. No.1334162   🗄️.is 🔗kun   >>6600

>>1334086

LETS GO BACK

Ú q q? will CN ? U, Soap?

????

$? Rc? Û?? ƒoee? ME? swine? JoeD

NWW O! U + $ "Yes ??? i8Imo reviews

Buzzing fOeHO & NauC? OssU ? EZ-Lao |? by? UA "6A? Zed?

H?

      • +. ??? W? Q Q Q Q Q Q Q Q Q Q Q Q Q Q Q Q Q Q Q Q. LA Û S S ? rOK? Y Ü? Asia? OQ Z? Ohi?

!? IQS? [EMS tOWN U ?? HI

Anonymous ID: a0c367 May 8, 2018, 4:34 a.m. No.1336132   🗄️.is 🔗kun   >>6561

These were posted by anon but the filenames have the same format as Q's pictures:

 

9A47B7E5-08EF-42B2-A720-374C8B587981.jpg

18A539B4-3085-4E11-8945-DAF65460925B.jpeg

82EEB8DE-C3D6-44D9-86F7-2E47EA957DE3.jpeg

51959A07-E9B5-4387-A05A-DECE0D97F37F.jpeg

ABD8260F-EBBB-4C18-A9AE-882F588257C1.jpeg

 

There's probably more of them, these are only from posts quoted by Q.

Anonymous ID: dad828 May 8, 2018, 7:06 a.m. No.1336818   🗄️.is 🔗kun   >>9217

>>1336138

I found this when I ddgo that line. I did this other day when I asked in post why would it lead me there, and i looked thru turn out someone had said it's apple iphone that was used. Seeing your post wondering if they are connected?

Anonymous ID: c5c444 May 8, 2018, 6:32 p.m. No.1343338   🗄️.is 🔗kun   >>4999

Have you checked out the shadowbrokers

's GitHub post? Q mentioned them once in an article but said the article heposted wasdisinfo, but the subject was good (not an exact quote)

 

Then, within the shadowbrokers files (which, if you go through and read all of their messages, they mention the elites & howthey know what happened with BC & LL on the tarmac, and how the elites should realize how valuable all this info is [it was all written in a psuedo-brokenenglish], they even indicated that they were US military, or atleasthad taken the oath

 

But! If you look inside their dumped files there's oracle server hack to bypass authentication – could this be relevant?

 

there's also a mirrored GitHub posting by an account named DonnCha C…not sure if that's relevant

Anonymous ID: ff8930 May 8, 2018, 8:51 p.m. No.1344999   🗄️.is 🔗kun

>>1343338

>On April 8, 2017, the Medium account used by The Shadow Brokers posted a new update.[18] The post revealed the password to encrypted files released last year to be CrDj"(;Va.*NdlnzB9M?@K2)#>deB7mN. Those files allegedly reveal more NSA hacking tools.[19] This posting explicitly stated that the post was partially in response to President Trump's attack against a Syrian airfield, which was also used by Russian forces.

 

>Fifth leak: "Lost in Translation"[edit]

On April 14, 2017, the Twitter account used by The Shadow Brokers posted a tweet with a link[21] to the Steem blockchain. Herein, a message with a link to the leak files, encrypted with the password Reeeeeeeeeeeeeee.

Anonymous ID: aa0bcf May 9, 2018, 12:49 a.m. No.1346719   🗄️.is 🔗kun   >>5238

>>1286065

I'm thinking the files might be on AWS. There was a huge pentagon leak about 3 years ago:

https://www.upguard.com/breaches/cloud-leak-centcom

 

I also saw read some robby mook emails referencing aws, around general #1650 or so.

 

It appears at least part of their infrastructure involves Cisco. I'm not an IT guy, so feel free to weigh in.

 

If your theory is correct, then AWS is the most likely souce, hands down. They host almost everything for the federal government. At one point I had to use it to draw data on nonprofits from the IRS. If there is an open bucket out there with government info, it will be somewhere on their cloud.

 

They found the open "buckets" by doing a search of *com. I don't think it will be that easy for us. Good chance we'll find clues in Q's posts:

>>1294254

>>1309367

I won't have much time to help look until next week, but hopefully this gives you some ideas.

Anonymous ID: 4216a9 May 9, 2018, 2:29 p.m. No.1351465   🗄️.is 🔗kun

>>1339217

>>1336138

 

These were posted by the same ID's as those, but the pictures aren't working anymore:

 

8ch.net/qresearch/res/174635.html#174966

8ch.net/qresearch/res/924173.html#924917

8ch.net/qresearch/res/924173.html#924810

8ch.net/qresearch/res/381169.html#381429

8ch.net/qresearch/res/612849.html#613323

8ch.net/qresearch/res/567140.html#567349

 

The filenames seem to be Version 4 UUID's:

 

https://www.uuidgenerator.net/version4

Anonymous ID: 1aa0e8 May 9, 2018, 8:38 p.m. No.1355238   🗄️.is 🔗kun

>>1346719

There is also this to consider–check out post #566:

>Need a few red pills for family, friends, and others?

>Read the #Memo.

>Release coming.

>Final clearance underway.

>Make sure to learn Russian.

>Q

 

A little research shows that Rostelecom handles most of Russia's IT needs (see pics related). Again, I'm not an IT guy, but searching for "Rostelecom Cisco" brings up some hits–notably some SEC dustup from '14.

 

Not sure how one would go about finding exposed data from there, but I thought I would throw it out there. I wouldn't be surprised if they had some major dirt on HRC–there is a project they have called SORM:

>SORM was first implemented in 1995, requiring telecommunications operators to install FSB-provided hardware allowing the agency to monitor users’ communications metadata and content. This included phone calls, email traffic and web browsing activity, despite the low internet penetration rate at the time.[1]

https://en.wikipedia.org/wiki/SORM

 

If there is one thing that I have noticed–an overarching pattern through all of Mueller's investigation and the cabal's accusations toward POTUS, is that it's all a great big mirror. Everyone implicated by Mueller so far had ties to crimes likely committed by members of the Cabal. Papadopoulos: Russia, Greece, Turkey, Israel (Soros, HRC, maybe more); Rick Gates: Russia, Ukraine (HRC, Adam Schiff, Soros); Michael Flynn: Russia; Paul Manafort: Russia, Phillippines (Obama?); Carter Page: Council on Foreign Relations, UK, Russia (Rothschilds, the MSM, etc.). So when I think back to HRC, the media and the DNC howling about how Russia likely has kompromat on Trump…it makes me think they probably have it on HRC.

 

Seriously, these people have never had an original idea in their lives–they just all agree on something dumb then shout it out in unison. Maybe Epstein was using Kaspersky for his surveillance system on Lolita Island. Who knows?

Anonymous ID: a03ef5 May 11, 2018, 1:52 p.m. No.1375692   🗄️.is 🔗kun

i made a stupid observation, curious if it's been discussed.

 

aspect ratio of some of his pictures. the odd shape, with the black box fillers.

 

i've seen two sizes, 375x812 and 591x1280, neither is conventional, and both have an aspect ratio of 2.165ish.

 

has this been discussed, does it mean anything to anyone else?

Anonymous ID: 3b80bf May 12, 2018, 2:49 a.m. No.1382245   🗄️.is 🔗kun

>>1376365

look at the 25mb+ "padding" file in that equation grp dump, and the sql tables, for serious. im getting around to doing it but i had to put together a crap parts rig real quick cuz i dont really want 1000+ nsa r00tkits getting opened from a thumbnail generation upon opening a folder :D

Anonymous ID: 124e14 May 13, 2018, 6:38 a.m. No.1396104   🗄️.is 🔗kun

>>1333905

 

I can't comment on mac applications, however gedit can handle different encodings.

 

Here's a link to official builds:

> http://ftp.gnome.org/pub/GNOME/binaries/mac/gedit/

 

If you want the latest version you can grab it with homebrew:

> brew install gedit

 

Hope that helps.

Anonymous ID: 70a11b May 13, 2018, 2:33 p.m. No.1400447   🗄️.is 🔗kun   >>7238

BAKER BE THE FAGGOT I KNOW YOU ARE and add this notable

 

found gg oracle

 

https://apicatalog.oraclecloud.com/ui/views/apicollection/oracle-public/ogg/v2.1

 

"title": "Successfully created procedure \"\"oggadmin\".\"GG_PURGE_HB_TAB\"\" to purge the heartbeat history table.",

 

"type": "http://docs.oracle.com/goldengate/c1230/gg-winux/GMESG/oggus.htm#OGG-14017"

 

},

 

{

 

"$schema": "ogg:message",

 

"code": "OGG-14005",

 

"issued": "2017-12-14T12:42:07Z",

 

"severity": "INFO",

 

"title": "Successfully created scheduler job \"\"oggadmin\".\"GG_UPDATE_HEARTBEATS\"\" to update the heartbeat tables.",

 

"type": "http://docs.oracle.com/goldengate/c1230/gg-winux/GMESG/oggus.htm#OGG-14005"

 

},

 

{

 

"$schema": "ogg:message",

 

"code": "OGG-14018",

 

"issued": "2017-12-14T12:42:07Z",

 

"severity": "INFO",

 

"title": "Successfully created scheduler job \"\"oggadmin\".\"GG_PURGE_HEARTBEATS\"\" to purge the heartbeat history table.",

 

"type": "http://docs.oracle.com/goldengate/c1230/gg-winux/GMESG/oggus.htm#OGG-14018"

 

}

 

]

 

}

 

}

 

}

 

},

 

"tags": [

 

"Administrative Server/Database"

 

],

 

"produces": [

 

"application/json"

 

],

 

"consumes": [

 

"application/json"

 

],

 

"parameters": [

 

{

 

"name": "connection",

 

"in": "path",

 

"description": "

 

Connection name. For each alias in the credential store, a connection with the name 'domain.alias' exists.

 

",

 

"required": true,

 

"type": "string",

 

"pattern": "^[a-zA-Z][a-zA-Z0-9_#$]{1,29}([.][a-zA-Z][a-zA-Z0-9_#$]{1,29})?$",

 

"minLength": 1,

 

"maxLength": 61

 

},

 

{

 

"name": "version",

 

"in": "path",

 

"description": "

 

Oracle GoldenGate Service API version.

 

",

 

"required": true,

 

"type": "string",

 

"enum": [

 

"v2"

 

]

 

},

 

{

 

"name": "body",

 

"in": "body",

 

"description": "",

 

"required": false,

 

"schema": {

 

"$ref": "#/definitions/ogg:tablesHeartbeat"

 

COUNT YOUR BEATS FAGGOTS

 

>>COUNT YOUR BEATS FAGGOTS

 

COUNT YOUR BEATS FAGGOTS

Anonymous ID: e648b8 May 13, 2018, 9:36 p.m. No.1404159   🗄️.is 🔗kun   >>7263

https://youtu.be/9JR0V41vH2Y?t=537

 

Anyone seen this before?

This guy decodes images and songs in Cicada 3301 and find Q reference before Q gets public?

Anonymous ID: 12c1ed May 15, 2018, 12:04 a.m. No.1417201   🗄️.is 🔗kun   >>7177

don't know if the below is useful at all, but I think taking the hyphenated names of the photoes and putting them together by making all jpg, png, and jpeg equal and putting them in sequence gives an interesting result that looks like it could be a cyphered string to me.

 

E4E7A284-C686-406E-89E1-3FF30826F988-6AECCB3F-2186-4C21-9749-064DCA968401-C7248201-F913-4F0C-A667-9BB6457B6477-0704911B-FBA8-4DE7-9C53-93474FE2A4E1-03821C90-07E4-4906-B30D-AB3A4B6182AE-B6C47FD8-1F66-4549-8A4B-26A929B76212-9AB57841-1F3F-4630-889B-4DA55D4A237D-77C6EF7B-C1F0-49A6-BD1E-C437076EEDE4-BA1C5CD5-5C3B-4FE5-93B1-FB20FD72A4A2-25346004-2104-4DBA-9B88-E96D580353D8-C2C6E563-AEEE-46D4-95F9-03866E094C95-29ABE882-37B0-472A-A79E-F287D7C8C11D-9B7BDECB-79FD-4D3C-BE97-A1557507DFD1-540296AD-9205-4253-B4CF-B237CEC6EA85-2C880EB2-FFFC-4E95-B22C-B6F1BF18DBA4-5D00DA74-A956-474C-A7A1-522BC1E1A21A-54950FD4-115E-404E-B1DF-47B149E32097-A783B991-11D9-40D0-BD69-17FF6041E890-3155B65F-063D-445E-A3BD-5461D811E865-8BF7AC13-C658-41A6-A0E3-80BAED6ED3B0-710102CD-50EE-4035-93E4-6755836B436D-E349DAAB-AEE3-45EF-B056-239EFBFA7429-482D19E4-6664-478F-8836-30F2755F5EC0-DEA28E7A-5339-4D0B-A991-AB6E6DF88133-7803B61A-1F3E-47BD-88D4-F3CE15179DB0-7F0F82A1-151F-4868-96EE-054CE9876425-F4929FC0-EA86-4042-82CC-AEE84ABDA9BF-BD670B90-67CC-47F5-8D78-AA5C7FA5B2AE-72E0C7D9-EB8A-49A7-8367-1190ACAD8F9F-4F58B09A-B9F0-4E21-B587-5E11BD9B237F-B1ADF2C9-65EF-42CB-A3D8-8B486CB51EA8-BF865568-AABA-4354-A7C6-18EB2B3C08BE-18454392-100A-4B49-A774-679F9B78981C-784A60C6-B1C0-4DCE-ACE1-A9E68284BD0D-683C2B19-0FF1-4C01-B33B-3C215A046DEF-32AD9484-F41A-4806-AD48-6C98BCC552EF-CBFE279C-FAD2-403C-A11C-E3FC49FC757C-FC8DF5A5-6BB2-4A87-90BF-B4C9E1A3A036-C879615C-3616-402C-B3F6-814E3314AB16-31506F85-476A-4DD6-BDF4-5667E4661A57-13372080-45DC-4E32-B340-34FC892B9D1B-D6C46F7A-C7B1-4A32-9576-E28854C1C1DC-B42CA278-6C32-4618-A856-0CB9B680CC38-763B79E9-EA56-4EBD-A42A-285FF7E4257F-8B01A899-533A-4231-8BAF-6A0B2F5687AB-EA29DD13-F16F-4580-9DC8-0D75F0ACC0C1-25666BD0-F5F9-4A63-AE62-4A14579ABE82-C13A8327-8986-4D5E-AC6B-ECC05F19AE45-89F919D3-5900-4DCA-BA1B-DB69850056B1-CC1B1FD7-8B70-4CEB-A4F7-F5807253D459-72C68DD2-F512-4DC8-ADA8-E27EDC22028C-CAFB8AB7-539E-4AFB-9EC0-E55830B39316-EFABC59D-40D3-4570-81E3-5CC335555028-BC185452-3F1B-493B-98D9-92CA7B865759-AA00D4A7-BF25-44EC-BB62-48819678C8B0-83139841-57B9-47B5-8FA6-D45C0E44F9FC-E78CC59C-D045-42BB-9201-D9BB8BA35699-703C92E0-E064-4400-932F-24EEBCE27949-A3589E21-85D1-4056-9DC7-553651D87D03-0568570F-2EA7-4162-A75F-4E9BF6E7CB37-95DDEF59-7086-4535-985D-5523BE39A9D1-9E1AB60E-071C-4226-ADEC-BFC405E74170-901FFF2C-CFFC-4586-8226-7CDE571EEF72-A2735ADE-C628-42EA-855F-146700A8A886-54BC82F4-E3C2-4ED9-A24D-BD3D395518F4-875F2639-359D-43A8-BB00-1F0760D92AC8-8614095C-F745-4036-8460-19EF8AD06021-41A7C496-2188-4AA3-85AE-806E3FE14E93-57989E34-0050-4758-9F69-40CA170C7070-B939331B-C53A-4497-B9A0-3D8217F16E9B-AA18E55B-4CFD-4974-A479-37C7703ECC1D-BADA0EFE-BCA6-4469-BB48-DA6C23B83AC7-1FBDA20C-D6A7-4A72-8E45-FE084D388834-01F47CBA-ECD6-4413-8769-9AEA0CE17961-7F62F04D-0B3A-4B66-AF51-381CD774E117-DB0379CC-9229-43B5-AD54-F467FD74FD6E-EB072EBC-0DF3-4A2C-BE89-E388996B786D-8466691D-0F75-44F5-AA92-43E5E6D981F9-39E6E8ED-2D45-4AB9-A4EA-6820AA0037B9-B3D12FDF-7189-4836-AD41-F493E801B4FE

Anonymous ID: c2bbc1 May 24, 2018, 4:09 a.m. No.1526560   🗄️.is 🔗kun

https://www.nsa.gov/about/cryptologic-heritage/historical-figures-publications/publications/misc/assets/files/The_Cipher_Disk-op.pdf

 

potential inputs into the disk cipher are, kill brackets and date/time

 

 

what do you guys think? I tried some but only got nonsense. maybe wrong with inputs

 

it just seems like such a clear hint to a disk cipher also makes sense why he would want and entire map of his posts

Anonymous ID: 946d90 June 3, 2018, 3:48 a.m. No.1616810   🗄️.is 🔗kun   >>7276

(THIS IS THE FIRST PART OF MY POST)-

Dear anonymous, I only ask for a moment of attention. If you look at the post of this anonymous >>1289391 you will notice that he left several clues.

I was particularly struck by the following scheme(PIC1): I started from this to construct a table of comparison words / symbols(PIC2). It is also evident that many of the words used can be easily anagrammed.

The diagram shows that some words used by Q are divided into two parts (Y / ears, F / Ears etc). If the initials of these words are highlighted (W / ears-H / ears-Y / ears-F / ears-App / ears) the phrase Why Fear Appears is composed. (PIC3)

 

Searching on the web the various phrases you will find a lot of important occurrences, related both to the manipulation (electronic) of moods (fear etc)

Wyfeapp

http://mobile-tracking-blog.tk/DRJPM9/track-your-wife-app/aHR0cDovL2loZWxwLmludGVybmF0aW9uYWwvdHJhY2steW91ci13aWZlLWFwcA==/google/

Wyfeappear

https://www.newshub.co.nz/home/world/2018/03/husband-and-wife-appear-in-same-photo-11-years-before-they-met.html

PrayforyourWife

https://itunes.apple.com/us/app/pray-for-your-wife-31-day-challenge/id730746083?mt=8

 

SWHAASG

https://www.google.it/search?hl=it&as_q=SWHAASIG&as_epq=&as_oq=&as_eq=&as_nlo=&as_nhi=&lr=&cr=&as_qdr=all&as_sitesearch=&as_occt=any&safe=images&as_filetype=&as_rights=

Pray For Your Wife

P4YW3100B

https://www.google.it/search?lr=&hl=it&as_qdr=all&biw=1705&bih=891&ei=vncRW-v-H8OS6QSrp5CoBg&q=%23p4w3100B&oq=%23p4w3100B&gs_l=psy-ab.3…2597.2597.0.3000.1.1.0.0.0.0.76.76.1.1.0….0…1c..64.psy-ab..0.0.0….0.qVxRMgnWFFU

 

http://worldremittances.info/h/p4yw

 

(part1)

Anonymous ID: ec2c57 June 3, 2018, 6:10 a.m. No.1617177   🗄️.is 🔗kun

>>1417201

Is this what you're looking for? Here's a link to all of those pics and docs, already sorted, etc. All I did was copy/paste into browser search field. Files can also be downloaded if desired.

 

https://www.scribd.com/document/378147985/q-pics

Anonymous ID: 946d90 June 3, 2018, 6:29 a.m. No.1617276   🗄️.is 🔗kun   >>9306

>>1616810

(part2) Moreover, always in the same post, numerous words appear that can be anagrammed or read in reverse. Keeping in mind the comparison table the first thing that jumps to the sight is the lack of the words "and vital”. Let's try to anagram "and vital" The results are very interesting

 

Graphic is necessary and vital. ←—– and vital

Graphic is essential. ← — Cipher(G) is essential

Find the ke[y]stone. ←— Graphic = Cipher(G)

But, what graphic[s]??? But what Cipher (G)???

This/These. >>1286183 ←— THIS(means HERE)THESE(1286183)

 

and vital anagram (one of the possible anagrams) is Valid Tan. What is a valid TAN?

TAN is A transaction authentication number (TAN) is used by some on line banking services as a form of single usa one time password to authorize financial transaction (ring a bell?) - https://en.wikipedia.org/wiki/Transaction_authentication_number. Of course it is VITAL to keep digging: HUGE EVIDENCES FIND…

Anonymous ID: 946d90 June 3, 2018, 11:23 a.m. No.1619306   🗄️.is 🔗kun

>>1617276

 

https://www.sec.gov/Archives/edgar/data/1171014/000114036116088727/ex10_1.htm

 

https://www.sec.gov/Archives/edgar/data/3673/000119312509227819/dex1010.htm

 

http://investors.portlandgeneral.com/node/13961/html

Anonymous ID: f95390 June 10, 2018, 3:13 p.m. No.1691157   🗄️.is 🔗kun

So the posts are the graphic or part of it, the guy who wrote Alice in wonderland also wrote a book on mathematics and what he created could be used for a Cypher. I also believe if you near the text they create an audio file somehow predicting something that has yet to happen. Just a thought, everything we need has been given we just have to decode it.

 

https://en.m.wikipedia.org/wiki/Rouch%C3%A9%E2%80%93Capelli_theorem

 

https://en.m.wikipedia.org/wiki/Alice_and_Bob

 

https://en.m.wikipedia.org/wiki/Communication_complexity

 

https://en.m.wikipedia.org/wiki/Schur_complement

Anonymous ID: 05f018 June 18, 2018, 12:09 p.m. No.1800281   🗄️.is 🔗kun   >>6511

Maybe filenames are anagrams? Been working this for weeks…

 

DfcXSDKUEAAVzjm.jpg

UK ADJACE VDF (XM) .VDF = STEAM config file that cloud syncs with other .VDF files. These files may reappear after deletion in their containing folders on multiple computers.

Anonymous post ID: XM check related content

 

Ddb5V0oV4AA6Zxq.jpg

DDBEVNOV4AAFZXQ Roman symbol "N" = 0

Q ADDED BAZ NOV 4 (XF) BAZ = Is a diminuative of Barry, Anonymous post ID: XF check related content

Anonymous ID: c83805 June 24, 2018, 7:11 p.m. No.1893975   🗄️.is 🔗kun

Looking at the commentary regarding graphic as the key, I ended up following the Cicada messaging as well. 5 rabbit holes later, I ended up purchasing pdf versions of books written by R.Stone (& not his political books). Seems like the code in a graphic could be unlocked somehow to reveal alternate graphic or text?

 

Also, I ended up in fandom wikis where I found chatter, articles, what I assume are encrypted graphics which all seemed to carry symbolism of the enemy.

 

Not sure how any of this might help… But these thoughts have been on the brain like a leech since I started lurking 24/7.

Anonymous ID: d45c94 June 24, 2018, 7:49 p.m. No.1894453   🗄️.is 🔗kun

Newfag here, has anyone considered the image is the key as in steganography? Ive been thinking on this for weeks, ive thought about writing a simple app to see if i can pull any useful data out of the images by comparing q images to known duplicates from other sources. I know q says his images are all originals but i know the picture of the submarine surfaced, shortly after missle launch q post was taken from another article talking about the chinese stealing sap programs. I have the image q posted but if someone could kindly post the link to the article i could get that image and work from there. My idea for weeks has been to get the raw image (not exif data) examine the lsb of the data byte by byte and compare them 1 for one between images. If anyone is interested id like to contribute, could be a nothing burger, maybe not. First step would be to run a simple hash between the raw data, if its the same then its a no go.

J

Anonymous ID: e65262 June 24, 2018, 11:47 p.m. No.1896471   🗄️.is 🔗kun

>>1287687

long shot… very long, but + ++ +++? perhaps these keys, combined with Q keys possible additive? now multitiplicative [] [[]] [[[]]]… , in order…. Wish I could find raw database… raw nsa FINAN data? or do hex (which seem in GUID form, for WIW could be applied to photos to get raw data from them for key extraction? Not great at application, better at the theoretical possibilities… What if the unusually lg PNGs are hiding massive keys… ?

Anonymous ID: e65262 June 24, 2018, 11:51 p.m. No.1896488   🗄️.is 🔗kun

poss IPv6?… Either sites per se, or "expanded" so each GUID is key to a small chunk which must be put together? Has anyone by any chance compile a DB of "GUID"/"Pngs"s from beginning? i get the feeling this is more multi faceted than we want to believe….. 3301, show your work.

Anonymous ID: e65262 June 25, 2018, 12:03 a.m. No.1896547   🗄️.is 🔗kun   >>6617

1,2,3… +, ++,+++.. [],[[]],[[[]]]… 123 seems to come up a lot…. abcs? 4,10,20? or is that more of a hint to logical steps linear progression? 4,10,20? what numbers to follow.. is 41020 more than it seems?new lands, unfamiliar landscape… what avenues to follow? Follow the map…. sorry peeps. little too much beer tonight, but welcome to the world of inf log/possiblities. where do you go when you finally get through the rabbit hole? one direction finds land, but how do we find the direction to take?

Anonymous ID: d45c94 June 25, 2018, 12:16 a.m. No.1896617   🗄️.is 🔗kun   >>6639

>>1896547

That's my problem, to many possibilities. I'm going through and looking at letters/sentences inside the kill boxes, I'm leaning toward them all having to be aligned/fill in the missing. and then I'm leaning toward POTUS tweets giving us part of the missing key in his deliberate misspelling of words/corrections. My adhd super powers aren't doing shit tonight.

Anonymous ID: d45c94 June 25, 2018, 12:20 a.m. No.1896639   🗄️.is 🔗kun   >>6815

>>1896617

I 100% agree there is a key hidden in his posts but a key is worthless without data to decrypt. Which leads me back to data being hidden in his original images (most of which are lossless .png files). My next issue is which encryption method did he use? I only have access to civilian methods, I don't even have a clue what encryption methods the military would use, I suspect most people wouldn't either so i would stick with the civilian methods.

Anonymous ID: e65262 June 25, 2018, 1:05 a.m. No.1896815   🗄️.is 🔗kun   >>6819

>>1896639

I would say 90% aes 256.. seems most likely culprit… that's why I suspect its less likely he would use a super hard lock, but rather a very hard to find / well camoflagued key. Q wants us to find, so I doubt he used some hyper impossible to decipher key, if used true mil encryption, it would take 100k yrs to decipher, if we had their tech… However, I will say, Q seems much more intelligent than he appears… so many hidden messages, many of which are border line… I believe the may be encryption of an ecrypted encryption… ie,…. order of operations becomes important… 2 pics contain AES in their names, KJI watch the water, and The sub from Singapore day. Could be message… not sure.. I believe the details are what we are looking for, the prob is defining the details we should search… I believe we have everything right now though…. just need to try and plot out the map in its entirety..

Anonymous ID: e65262 June 25, 2018, 1:09 a.m. No.1896831   🗄️.is 🔗kun   >>6918

>>1896819

just wonder if we could be deciphering properly, but not recognizing significance of what seems like random noise… feels a bit like a wild goose chase to me… which means the clues aren't leading to answers, but to more clues… could be wrong though

Anonymous ID: d45c94 June 25, 2018, 1:41 a.m. No.1896918   🗄️.is 🔗kun   >>6972

>>1896831

That's why i haven't done much with it. i only have a few hours a night to dedicate. I can write the program but i don't have time to hunt down possible key candidates =( Remember the png's of the pallets (phones?) specifically the pallet skid in the back of semi truck. I downloaded (when he posted) it and looked at just the file size and it was over 8mb. Png's aren't nearly as small as .jpg but it seemed excessive. by far the most common image file would be .jpg so i think by q selecting .png it is telling. Larger file sizes = more bytes to hide data in using stego methods. I think we can assume we have the data and focus more on how to unlock it. As noted i will focus on aes 256.

Anonymous ID: 8d9f83 June 25, 2018, 3:35 a.m. No.1897218   🗄️.is 🔗kun

>>1802351

 

My friend,

What is the difference between (The Key), the Key, and the Keystone?

Forget the Socratic method, because I don't truly know, kek!

I do however believe that (The Key) is the Vatican. One of the Q posts = You are missing the connections, MAP provides the KEY.

The Key, The Vatican was found on Q's map.

Q stops posting about missing the connections.

So Q… When we do storm the walls?

Will the White Hats truly get to explore the hidden vaults under the Vatican?

I believe this is crucial to saving humanity…

Anonymous ID: 557559 June 25, 2018, 6:07 a.m. No.1897652   🗄️.is 🔗kun

>>1287687

I believe Q is pointing us to a Google Drive account.

 

ES is KEY.

 

And Q mentions EYE alot. Then a pic of Comey with a GNOME.

 

Eye of GNOME ?

Anonymous ID: c83805 June 25, 2018, 6:33 a.m. No.1897813   🗄️.is 🔗kun

And Q's message on 4/26/18, 1279 mentions all three items being discussed here:

Game forum comms ( a place - which on the frontend appears like game chatter to unsuspecting visitors )

 

Gmail comms (after clarifying that [R] is Renegade also after mentioning [EG] w/reference to Evergreen - leads me to question who is behind the codename Renegade)

 

When do you call a plumber? when there's a leak?

 

ongoing investigation require …. Q [auth478-24zgP] ← will that get us in? if so, how? or what does it mean again?

 

Sorry, lots of questions & super excited about 4/26/18 Q drop being relevant today (its what got me to the fandom wikis)

 

& still I see Roger Stone relevance to all of this

 

Sorry for incoherent line of thinking, trying to reason how many different pieces relate to one another.

Anonymous ID: c83805 June 25, 2018, 8:24 a.m. No.1898581   🗄️.is 🔗kun

Was digging in kingdomhearts.wikia.com/wiki/Organization_XIII, went to the Dynamic Scripts, Unknown script code (1), saw the license for James Mott. Started digging on him. Lots of stuff. For now, focusing on sharing this link: https://code.google.com/archive/p/crypto-js/#

 

Current Reasoning here:

 

Google - database/archive

Fandom wikis/music forums - frontend frameworks where bad actors can engage

Look in the backend code for links

There's more to this. R. Stone books may help in unlocking also.

Also, that authentication code Q shared on 4/25/18

 

Latest rabbit hole thread ^ & line of reasoning. Probably lots of it leads to deadend. But, there's something here.