TYB!
(from pb Notables, #19766)
>>15632341, >>15632346, >>15632346 Anons opinion of the Crime of the Century a theory of how Trump caught them all
Awesome write-up, which is at
https://sbierma.substack.com/p/crime-of-the-century-in-real-time
and much easier to read there (referenced in >>15632300 ).
Anon has experience with something called "port knocking" and would imagine this approach could have been used in the secure DNS configuration.
To use port knocking, a machine that wants to know another machine's address first "knocks in a pattern" e.g., send a single packet to ports A, B, C, D each in less than 5 seconds of each other, and then port E opens for 5 seconds for the first machine to then connect to and give credentials, then port F is open for it to do a DNS query on, which closes after 5 seconds.
"Timing is everything" has meaning in port knocking, picrel1.
https://en.wikipedia.org/wiki/Port_knocking
Anon envisions this could be expanded to multiple machines, i.e., have to knock on port A on machine A1, next port B on machine A2, then port C on machine A3, and port D on machine A4 opens up; etc.
And for further complexity, the knocks must come from separate machines/device. A huge "Rube Goldberg" machine (picrel2) which seems utterly complex and purposeless, unless you know the inner workings.
Mafia/bars during Prohibition used a similar approach, "door knocking in a pattern", which often would be to the tune of "shave and a haircut; two bits!"; picrel3.