Anonymous ID: 54da36 July 29, 2018, 9:08 a.m. No.2337999   🗄️.is 🔗kun   >>8119

>>2319042

https://web.archive.org/web/20060126085231/https://members.fortunecity.com/jpeschel/gillog3.htm#

THE BEALE CIPHER: A DISSENTING OPINION by James J. Gillogly

In 1885 James B. Ward of Virginia published a pamphlet describing a fabulous treasure buried by an explorer named Thomas Jefferson Beale in Bedford County, Virginia, over 60 years earlier. The location, contents, and intended beneficiaries of the treasure were concealed in three separate ciphers.

 

Ward claimed to have broken the second cipher (B2), describing the contents, and found it to be a book cipher based on the Declaration of Independence (DOI).

The words of the DOI were numbered consecutively, and each plaintext letter was replaced with the number of a word in the DOI beginning with that letter.

 

The details of the encryption are discussed exhaustively by Dr. Carl Hammer [1], The initials of words in the DOI are given in Table 1.

Anonymous ID: 54da36 July 29, 2018, 9:16 a.m. No.2338119   🗄️.is 🔗kun

>>2337999

https://en.wikipedia.org/wiki/James_J._Gillogly

James J. Gillogly (born 5 March 1946) is an American computer scientist and cryptographer.

 

Gillogly worked as a computer scientist at RAND, specializing in system design and development, and computer security. He has written several articles about technology and cryptography, is currently the editor of the "Cipher Exchange" column for The Cryptogram, and was president of the American Cryptogram Association.

 

He is best known for his work solving or debunking some of the world's most famous unsolved codes. In 1980 he wrote a paper on unusual strings in the Beale Ciphers, and he received international media attention for being the first person to publicly solve parts 1-3 on the CIA's Kryptos sculpture in 1999.

Anonymous ID: 54da36 July 29, 2018, 9:32 a.m. No.2338313   🗄️.is 🔗kun

>>2319635

>Can someone with Wireshark or another packet sniffer confirm any odd network activity from the app?

> app hasn't been updated since Feb 2017, so whatever that user found is still programmed in the app.

Please. Could be important, especially to those using it.

>My hope is that traffic was transferred to a white hat server

Along with all the passwords. Message within a message from Q?