Anonymous ID: a7d73e July 26, 2018, 6:57 p.m. No.2304402   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>2304030

You might start with a better understanding of what a "hash" actually does. It is not encryption.

 

Definition - What does Message Digest mean?

 

A message digest is a cryptographic hash function containing a string of digits created by a one-way hashing formula.

 

Message digests are designed to protect the integrity of a piece of data or media to detect changes and alterations to any part of a message. They are a type of cryptography utilizing hash values that can warn the copyright owner of any modifications applied to their work.

 

Message digest hash numbers represent specific files containing the protected works. One message digest is assigned to particular data content. It can reference a change made deliberately or accidentally, but it prompts the owner to identify the modification as well as the individual(s) making the change. Message digests are algorithmic numbers.

 

This term is also known as a hash value and sometimes as a checksum.

 

Am one-way hash is just that - one way (non reversible)

 

As an integrity check (dhecksum) you simply take the source, run the given hashing algorithm and compare the resulting has to the one inluded with the source material.

 

A match of those two "hashes" confirms the "message" is an unmodified replica of the original. Digital Signatures (using various algorithms) fill a "similar" function, as do message authentication codes like SHA- 256.

 

Like reversible encryption, the longer the better i.e more secure

 

Scripting languages are optimized for convenience, not speed so are inferior to custom hardware-based ASICs, similar to the old school generic "math co-processors"

 

How that helps to avoid wasting you time on hash "decodes"

Anonymous ID: a7d73e July 26, 2018, 7:41 p.m. No.2304966   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>5009 >>5244

>>2304792

Would you expect an ASCII text reader to translate a 24-bit or 256-bit color code?

 

Where did you learn about computers?

 

Sesame St?

 

What would a megapixel graphic look like in binary

 

IIf you looked a s HDD sector with a very powerful microscope, would you see letters, numbers or pictures?

 

Hint: you would see nothing since they are extremely localized magnetic fields.

Anonymous ID: a7d73e July 26, 2018, 8:20 p.m. No.2305416   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>5486

>>2305197

So who has the private key?

 

BTW a password is not and encryption/decryption key.

 

Also understand that "symmetrical encryption has one shared key that is used to encrypt and decrypt. Asymmetrical encryption has two keys on to encrypt and one to decrypt. Public/private key systems are one method but Diffie Hellman exchange is another.

 

It helps to understand the terms before theorizing from misunderstanding

Anonymous ID: a7d73e July 26, 2018, 10:05 p.m. No.2306680   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>6768 >>9191

>>2305982

He post to keep up the morale.

 

Notice his recent posts are mostly open source from Normie World.

 

He doesn't need our help, and never really did.

 

We were invited to "propagate" as our role.

 

Some took it way too seriously like the Q team was waiting for our "research".

 

That was always for "our benefit" and his credibility. We were a small part of the messaging, but failed to deliver as normie news picked up the baton and ran with it.

 

We get trophy for "participation".

 

But like John Kerry's Purple Heart it is not like we saw any action ( He shot up some bags of rice on a wooden boat and got splinters in his ass, according to his crew).

 

He used it to impress people how he was in the thick of war and took a bullet ==combat veteran Hero.

 

His crew ratted him out when he tried to run for president against Bush in 2004 after Gen.Norman Schwatzkopf took Iraq down in 3 weeks; Bush was his commander-in-chief.

 

Q is being "decent" and still comes around so we don't feel stiffed and left out.

 

Very few here are really making any effort on Qstuff anyways

 

Good think he wasn't counting too heavily on this board. The Plan would be FUBAR

Anonymous ID: a7d73e July 26, 2018, 11:03 p.m. No.2307281   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>2307112

Someone just echoing Q? Duh!

โ€ฆ Something big is going to drop..

 

.. Nothing small is ever going to riseโ€ฆ..

'Mighty oaks from little acorns grow'?

 

Seem like a contradiction.

 

Deductive logic does not allow for contradictions.

 

They are "illogical fallacies"

 

Reconcile your premise and conclusion.

 

They don't follow a logical IF โ†’THEN

 

In your context that would translate to:

 

Nothing small (dough) is never going to rise

Double negative is irrational

 

How does a mirror modify your meaning

 

Perhaps you could state it more logically and coherently?

 

Thanks in advance

Anonymous ID: a7d73e July 28, 2018, 2:17 a.m. No.2322286   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>2455 >>3524

>>2322011

How do you know which one was used to "encrypt"

 

Have you done the calculation on how long 1 billion seconds really is: 60 (sec) x 60 (min) x 24 (Hours) x 365 (days) = 31,536,000 seconds per year.

 

1,000,000,000 / 31,536,000 = 31.71 years

 

Better get some more computers

Anonymous ID: a7d73e July 28, 2018, 5:05 a.m. No.2322913   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>3524

>>2322743

BY brute force do you really mean "Try lots of guesses: or do you have some supercomputer?

 

Only the weakest cryto has bee susceptible to brute force in the last 20-25 years.

 

You been watching too many movies where the genius hacker only need a couple minutes.

 

Do a simple calculation by talking the full ASCII code exponentiation to the power of the max length of the target password.

 

try a simpler example 26 letters to the 10 power. That is way low but I think you can see from all the permutations of that small set, what a "brute force" method might entail

 

hint: 26^10 = 141,167,095,653,376

 

make the set larger all ASCII characters (upper case, lower case, numbers, symbols etc) and look at max password length - you get the idea

 

THEN, worry that it may use something other than ASCII (english), like Cyrillic, Japanese, Hebrew, Arabic etc.

 

About 20 minutes should be enough, ya think?

 

Lastly consider how idiotic you sound to someone that actually understands crypt, including stenography

 

BTW what makes you think the password is within the graphic?

 

That would be dumb, since it could easily be shared separate from the document.

 

If so you would have to examine the entire (megapixel?) files as a contiuous binary number determine the edge/boundaries of the individual color code 8-bit/24-bit/256-bit etc.

 

Then you need to examine each group and fine the odd ones that weren't color codes and "hope" the substituted a "character" in place of the bits in the colorcode.

 

About 1,0000 years would be a good guess on that kind of brute force,

 

But you wouldn't need any password if you knew the substitution pattern/scheme.

 

Confused and overwhelmed yet?

Anonymous ID: a7d73e July 29, 2018, 8:10 p.m. No.2348153   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>2347556

Steganography includes the concealment of information within computer files. In digital steganography, electronic communications may include steganographic coding inside of a transport layer, such as a document file, image file, program or protocol. Media files are ideal for steganographic transmission because of their large size. For example, a sender might start with an innocuous image file and adjust the color of every hundredth pixel to correspond to a letter in the alphabet. The change is so subtle that someone who is not specifically looking for it is unlikely to notice the change.

 

Sooo.. What is the pattern/ formula you are using on the raw binary color-codes of mega-pixel graphics?

 

What is the pattern "adjustment" do you expect to find in the original color codes ?

 

ACSII text 8-bit replacement of 8-bit sections of color coding or something else?

 

That would presume you could detect edge boundaries on color-codes then compare to ASCII of appropriate segment of 8/15/24/32/48-bit color coding.

 

Or some other approach?

Anonymous ID: a7d73e July 29, 2018, 11:45 p.m. No.2351207   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>2351060

It is ,,, if you have the coding pattern.

 

If not, you are wasting you time.

 

That's why people use encryption methods that can't be compd

 

If a couple of mopes could figure it out, why would they bother?

Anonymous ID: a7d73e July 30, 2018, 9:53 p.m. No.2366835   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>2365916

No one credible ever said that - anon theory

 

Q pointed out how simple it would be, now that deep state comms were disrupted and monitored.

 

He posed it an an example of what they might have to resort to,

 

His mention if Pixelknot may have been intentional, since it is likely an amateur implementation that might be exploited.

 

A tricky honeypot for the deep state maybe.

 

Like the SecureDrop the MSM used (that wasn't so secure)

 

Think like a spy.