Anonymous ID: a92cdf July 26, 2018, 9:56 p.m. No.2306573   🗄️.is 🔗kun   >>6694 >>9191

Guys, it's been a shill tactic for at least a year or two to show up, claim stego hidden cp msgs omg, then just do nothing. Aside from one or two pics that seemed to legitimately have extra data in them, nobody's ever found shit or posted anything we could repeat or confirm.

 

Wtf are we supposed to do, brute force stego passwords? This shit exists. It can be done. But there are steps we can take and steps that are retarded.

 

  1. Confirm data separate from the pic.

 

  1. Try passwords on pics with extra data.

 

  1. Try to brute force these when nothing else works.

 

That's all.

 

Unless Q gives us the pw or it's a findable Easter egg, there's not much to do. W also might need instruction on how to interpret the data so confirmation of a correct pw isn't all that cut and dry either. And it might just be a fucking troll to get bad actors wasting their time the same way it's been done to us all this time.

 

Dig efficiently.

Anonymous ID: a92cdf July 26, 2018, 10:06 p.m. No.2306694   🗄️.is 🔗kun   >>6905

>>2306573

Ok maybe they're actually using that stego service and Q is juking us into ddosing the site with nonsensical attempts just so they're inconvenienced. Because seriously, what is our best option besides running a fucking dictionary against the picture via the site q posted?

 

Lol.

Anonymous ID: a92cdf July 26, 2018, 10:46 p.m. No.2307117   🗄️.is 🔗kun   >>7211 >>7463

>>2306905

Yeah i got nothing. All i can confirm is that pixelknot is pretty slow to use and it's definitely case sensitive.

 

Here's the pics. The screenshot is Qs pic. The other is the original from the 4pol post.

Anonymous ID: a92cdf July 27, 2018, 5:03 a.m. No.2308956   🗄️.is 🔗kun   >>8982 >>1819

>>2308432

Niiiice. Wtf. It never even crossed my damn mind that there would be a prepackaged success check. Wtf.

 

I guess it makes the app run smoother because it doesn't have to try to comprehend the garbage. But it's like begging to be brute forced.

 

Any chance there's a prepackaged indicator of whether the pic has been encoded at all?

Anonymous ID: a92cdf July 27, 2018, 5:07 a.m. No.2308982   🗄️.is 🔗kun

>>2308956

Actually the fucking app just fails and sends you back to the pw prompt rather than spitting out gibberish so of course it's doing this. Nm. I'm a tard.