PIXELKNOT UPDATE
q drop about pixelknot
>https://8ch.net/qresearch/res/2298164.html#q2298508
anons found pixel knot messages posted on /qresearch/ before Q drop
>https://nofile.io/f/PR5CxvthaYp/jpeg_ffd8_ffdb_0084.zip
sha256 hashes
>https://pastebin.com/4e6Eswvc
pages they were posted
>https://pastebin.com/z4cXBLMv
html files of pages
>https://nofile.io/f/vQUoqymbq79/original_htmls.zip
original filenames of the images
>https://pastebin.com/qnieJg81
original weird filenames
>https://nofile.io/f/czFOXr2wYBF/out.zip
breaking the encryption
none of the images have been cracked yet
these methods are confirmed to work on test images
PixelKnot on Bluestacks
>https://www.bluestacks.com/
>https://guardianproject.info/releases/PixelKnot-0.3.2-RC-1.apk
>https://guardianproject.info/apps/pixelknot/
use the last 1/3 of the password to crack first layer of f5 encryption
PixelUnknot
>https://github.com/banona/PixelUnknot
f5.jar
>curl https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/f5-steganography/f5.jar –output f5.jar
>java -jar f5.jar x -p plan -e out.txt Q4example.jpg
>cat out.txt
YOU CAN HELP
look at the old posts, at the id of the post and replies
>https://pastebin.com/z4cXBLMv
learn the tactics (Thank You Baker)
find and recognize patterns
examples
https://8ch.net/qresearch/res/624511.html#q625298
>>625298
https://8ch.net/qresearch/res/1828419.html#q1829054
>>1829054
https://8ch.net/qresearch/res/1531874.html#q1532685
>>1532685
https://8ch.net/qresearch/res/1508591.html#q1509109
>>1509109
https://8ch.net/qresearch/res/1477025.html#q1477588
>>1477588
https://8ch.net/qresearch/res/2313270.html#q2314068
>>2314068 Exodus Chapter 8