Anonymous ID: 9e0434 Aug. 10, 2018, 11:08 a.m. No.2540671   πŸ—„οΈ.is πŸ”—kun   >>0710 >>0791

Using an open source password cracker (hashcat), publicly available information, and a little guess work about Q's favored key space, a user can successfully recover all of the passwords that correspond to Q tripcodes. These are posted below in chronological order of use:

 

Tripcode: ITPb.qbhqo - Password: Matlock

Tripcode: UW.yye1fxo - Password: M@tlock!

Tripcode: xowAT4Z3VQ - Password: Freed@m-

Tripcode: 2jsTvXXmXs - Password: F!ghtF!g

Tripcode: 4pRcUA0lBE - Password: NowC@mes

Tripcode: CbboFOtcZs - Password: StoRMkiL

Tripcode: A6yxsPKia. - Password: WeAReQ@Q

 

Note that Q seems to be unaware that the algorithm only takes the first 8 characters of the password and ignores the rest. In the past, Q has claimed to have baked meaning and foreknowledge of future events into these passwords, in particular, the 4pRcUA0lBE:NowC@mes tripcode-password pair. If I understand correctly, Q claims that the full password was "NowC@mesTHEP@inβ€”23," with 23 signifying the date of an important event, but anything beginning with "NowC@mes" would yield the same tripcode signature. This weakness severely undercuts any claimed predictive power and indicates a possible intent to mislead. For example, all of the following passwords should yield the same tripcode, 4pRcUA0lBE:

 

NowC@mesTheKing – Q is Snoop Dogg

NowC@mesTheSun – Q is Ringo Starr

NowC@mesTheAnswer-42 – Q is Douglas Adams

 

These can all be tested at at minichan's tripcode test page. https://minichan.org/triptest?name=A%23NowC%40mesTheAnswer-42 .