Anonymous ID: 3add62 July 30, 2018, 1:20 p.m. No.2358577   🗄️.is 🔗kun   >>8604 >>8689 >>8789 >>8980 >>9101 >>9217 >>9272

PIXELKNOT UPDATE

q drop about pixelknot

>https://8ch.net/qresearch/res/2298164.html#q2298508

>>2298508

 

anons found pixel knot messages posted on /qresearch/ before Q drop

>>2347619

>https://nofile.io/f/PR5CxvthaYp/jpeg_ffd8_ffdb_0084.zip

 

sha256 hashes

>https://pastebin.com/4e6Eswvc

 

>>2350592

pages they were posted

>https://pastebin.com/z4cXBLMv

 

html files of pages

>https://nofile.io/f/vQUoqymbq79/original_htmls.zip

 

original filenames of the images

>https://pastebin.com/qnieJg81

 

original weird filenames

>https://nofile.io/f/czFOXr2wYBF/out.zip

 

breaking the encryption

none of the images have been cracked yet

these methods are confirmed to work on test images

 

PixelKnot on Bluestacks

>https://www.bluestacks.com/

>https://guardianproject.info/releases/PixelKnot-0.3.2-RC-1.apk

>>2298508

>https://guardianproject.info/apps/pixelknot/

 

use the last 1/3 of the password to crack first layer of f5 encryption

PixelUnknot

>>2311401

>https://github.com/banona/PixelUnknot

 

f5.jar

>>2325105

>curl https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/f5-steganography/f5.jar –output f5.jar

>java -jar f5.jar x -p plan -e out.txt Q4example.jpg

>cat out.txt

 

YOU CAN HELP

look at the old posts, at the id of the post and replies

>https://pastebin.com/z4cXBLMv

learn the tactics (Thank You Baker)

find and recognize patterns

 

examples

https://8ch.net/qresearch/res/624511.html#q625298

>>625298

https://8ch.net/qresearch/res/1828419.html#q1829054

>>1829054

https://8ch.net/qresearch/res/1531874.html#q1532685

>>1532685

https://8ch.net/qresearch/res/1508591.html#q1509109

>>1509109

https://8ch.net/qresearch/res/1477025.html#q1477588

>>1477588

https://8ch.net/qresearch/res/2313270.html#q2314068

>>2314068 Exodus Chapter 8