PIXELKNOT UPDATE
anons found pixel knot messages posted on /qresearch/ before Q drop
>https://nofile.io/f/PR5CxvthaYp/jpeg_ffd8_ffdb_0084.zip
sha256 hashes
>https://pastebin.com/4e6Eswvc
pages they were posted
>https://pastebin.com/z4cXBLMv
html files of pages
>https://nofile.io/f/vQUoqymbq79/original_htmls.zip
original filenames of the images
>https://pastebin.com/qnieJg81
these are the pages the images were posted on
example
https://8ch.net/qresearch/res/624511.html#q625298
>>625298
breaking the encryption
none of the images have been cracked yet
these methods are confirmed to work on test images
use PixelKnot on Bluestacks, f5.jar or PixelUnknot
>https://guardianproject.info/apps/pixelknot/
use the last 1/3 of the password to crack f5 encryption
>https://github.com/banona/PixelUnknot
>curl https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/f5-steganography/f5.jar –output f5.jar
>java -jar f5.jar x -p plan -e out.txt Q4example.jpg
>cat out.txt
YOU CAN HELP
look at the old posts, at the id of the post and replies
learn the tactics (Thank You Baker)
find patterns
recognize