Sorry, but he's still right at the fact that tripcodes use a very weak encryption system from 1977, which can be easily cracked. BO or someone who leads 8ch needs to install a better encryption method.
>"Q verifies his identity via a cryptographic >signature, or "tripcodes." These tripcode >hashes (e.g. CbboFOtcZs ) are based on the >DES/crypt(3) encryption algorithm. DES >(Digital Encryption Standard) was >standardized in 1977 and has been largely >deprecated due to widely-known weaknesses."
(from the pastebin)
so, why in the heck does 8ch use such an encryption method for a highly classified government operation!? I never knew that the operation could have been endangered that easily.
BO or owner of 8ch, please create a better tripcode encryption method. The one currently being used is weak as hell, as the pastebin just proved. We cannot let this operation be endangered by something like this.
I ask again:
Why does 8ch use such a weak encryption method for tripcodes if they can be (as anon in pastebin stated) be easily cracked with a tool like hashcat? Seriously. Q is a highly classified and important operation which was ENDANGERED all the time by such a weak encryption like DES? CodeMonkey or someone else needs to immediately install a way better encryption system or The Cabal or other anons will try this again.
Uhm, I think you are an idiot for not getting in what fucking situation we are in right now. If tripcodes can be easily cracked because of an abondened encryption algorithm (DES) which is KNOWN for several weaknesses, then this operation is endangered. Plus, it also splits and divides the Q movement ONCE MORE.
What "fake" messages are you specifically talking about?