Anonymous ID: b6046e July 30, 2018, 12:29 p.m. No.2357764   🗄️.is 🔗kun   >>7853 >>7867 >>8132 >>8139 >>8158 >>8360 >>8371 >>8379 >>8390 >>8400 >>8427 >>8460 >>8514

PIXELKNOT UPDATE

anons found pixel knot messages posted on /qresearch/ before Q drop

>>2347619

>https://nofile.io/f/PR5CxvthaYp/jpeg_ffd8_ffdb_0084.zip

 

sha256 hashes

>https://pastebin.com/4e6Eswvc

 

>>2350592

pages they were posted

>https://pastebin.com/z4cXBLMv

 

html files of pages

>https://nofile.io/f/vQUoqymbq79/original_htmls.zip

 

original filenames of the images

>https://pastebin.com/qnieJg81

these are the pages the images were posted on

 

example

https://8ch.net/qresearch/res/624511.html#q625298

>>625298

 

breaking the encryption

none of the images have been cracked yet

these methods are confirmed to work on test images

use PixelKnot on Bluestacks, f5.jar or PixelUnknot

>>2298508

>https://guardianproject.info/apps/pixelknot/

use the last 1/3 of the password to crack f5 encryption

>>2311401

>https://github.com/banona/PixelUnknot

>>2325105

>curl https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/f5-steganography/f5.jar –output f5.jar

>java -jar f5.jar x -p plan -e out.txt Q4example.jpg

>cat out.txt

 

YOU CAN HELP

look at the old posts, at the id of the post and replies

learn the tactics (Thank You Baker)

find patterns

recognize

Anonymous ID: b6046e July 30, 2018, 12:54 p.m. No.2358132   🗄️.is 🔗kun   >>8142 >>8360 >>8371 >>8379 >>8390 >>8400

>>2357764

 

examples

https://8ch.net/qresearch/res/624511.html#q625298

>>625298

https://8ch.net/qresearch/res/1828419.html#q1829054

>>1829054

https://8ch.net/qresearch/res/1531874.html#q1532685

>>1532685

https://8ch.net/qresearch/res/1508591.html#q1509109

>>1509109

https://8ch.net/qresearch/res/1477025.html#q1477588

>>1477588

https://8ch.net/qresearch/res/2313270.html#q2314068

>>2314068 Exodus Chapter 8