Anonymous ID: 861f76 Aug. 4, 2024, 4:47 p.m. No.21351432   🗄️.is 🔗kun   >>1471

>>21351386

 

or the longer password versions are also used elsewhere.

 

to me, the strongest Q proof required no verification, but rather we the claims of "working for the office of the the president" and "potus is taking to you"

 

even if it's just implied, this is a serious crime. the entire Q (and bs qanon movement, followed by strong media backlash) is a threat. it's either a real threat to the cabal/deep state, OR it's a threat to DJT, in that if it's fake it could be used against him or undermine him.

 

since it's a threat either way, those claims would be addressed and any "fake association" would be squashed through legal channels.

 

no squash, the claim stands, is real.

 

this is my graphic. I've been here (each respective board at least) since the beginning.

 

i have no doubt… but i also have no idea how it all actually works. just faith.

Anonymous ID: 861f76 Aug. 4, 2024, 4:59 p.m. No.21351503   🗄️.is 🔗kun

>>21351471

 

i agree, the deltas and "too many occurrences to be coincidental" were strong… and different people have different levels of healthy skepticism.

 

to me there's no way either side would let it all stand in light of the potential threat… and nobody ever officially acknowledged it. just media pooh-poohing.

 

all good. just thinking out loud.

 

regarding the encryption. they all work based on known algorithms. sure some of the older algos can be brute force cracked, and as modern computing has advanced the trick has been to try to stay ahead of the curve.

 

but owning the algo means there is no curve.

 

and you can bet that the wrong people own all the common algos.

Anonymous ID: 861f76 Aug. 4, 2024, 5:13 p.m. No.21351575   🗄️.is 🔗kun

>>21351557

 

imagine how nerve racking it has to be on the outside of the op while pretending to be in the know, while not being sure of its real or a chan larp

 

think they'd sleep much?

Anonymous ID: 861f76 Aug. 4, 2024, 5:27 p.m. No.21351653   🗄️.is 🔗kun   >>1668

>>21351582

 

compute a hash and find a collision, or compute a hash just because?

 

in 2018 (for consideration) off the shelf hardware it was a matter of hours. the brute force methods are really trivial once you get to a certain point.

 

this is why you see mfa everywhere now. it's harder to crack AND THEN spoof AND THEN intercept out of band AND THEN inject the shared key.

 

obviously not impossible but harder.