Anonymous ID: 41bfef I knew it was too good to be tru.... Aug. 10, 2018, 4:48 p.m. No.2546305   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>6379 >>6409 >>6453

Q verifies his identity via a cryptographic signature, or "tripcodes." These tripcode hashes (e.g. CbboFOtcZs ) are based on the DES/crypt(3) encryption algorithm. DES (Digital Encryption Standard) was standardized in 1977 and has been largely deprecated due to widely-known weaknesses. A good primer on these weaknesses from way back in 1997 can be found here: [link to personal.stevens.edu] . Tripcodes are created via the algorithm described here: [link to www.thefullwiki.org] I suspect that if such an operation were carried out, the coordinator would at least sign messages using an algorithm from the NSA Suite B, such as the Advanced Encryption Standard (AES) โ€“ or even a PGP signature โ€“ so that an opponent couldn't hijack his identity as easily as has been done here. He may upgrade his standards after reading this, but frankly, it is a far too late to matter.

 

Using an open source password cracker (hashcat), publicly available information, and a little guess work about Q's favored key space, a user can successfully recover all of the passwords that correspond to Q tripcodes. These are posted below in chronological order of use:

 

Tripcode: ITPb.qbhqo -Password: Matlock

Tripcode: UW.yye1fxo -Password: M@tlock!

Tripcode: xowAT4Z3VQ -Password: Freed@m-

Tripcode: 2jsTvXXmXs -Password: F!ghtF!g

Tripcode: 4pRcUA0lBE -Password: NowC@mes

Tripcode: CbboFOtcZs -Password: StoRMkiL

Tripcode: A6yxsPKia. -Password: WeAReQ@Q

 

Note that Q seems to be unaware that the algorithm only takes the first 8 characters of the password and ignores the rest. In the past, Q has claimed to have baked meaning and foreknowledge of future events into these passwords, in particular, the 4pRcUA0lBE:NowC@mes tripcode-password pair. If I understand correctly, Q claims that the full password was "NowC@mesTHEP@inโ€”23," with 23 signifying the date of an important event, but anything beginning with "NowC@mes" would yield the same tripcode signature. This weakness severely undercuts any claimed predictive power and indicates a possible intent to mislead. For example, all of the following passwords should yield the same tripcode, 4pRcUA0lBE:

 

NowC@mesTheKing โ€“ Q is Snoop Dogg

NowC@mesTheSun โ€“ Q is Ringo Starr

NowC@mesTheAnswer-42 โ€“ Q is Douglas Adams

 

These can all be tested at at minichan's tripcode test page. [link to minichan.org (secure)] .

Anonymous ID: 41bfef itโ€™s over, weโ€™ve been duped by pamplet the dumass Aug. 10, 2018, 4:51 p.m. No.2546354   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>6370 >>6391

>>2546337

 

Q verifies his identity via a cryptographic signature, or "tripcodes." These tripcode hashes (e.g. CbboFOtcZs ) are based on the DES/crypt(3) encryption algorithm. DES (Digital Encryption Standard) was standardized in 1977 and has been largely deprecated due to widely-known weaknesses. A good primer on these weaknesses from way back in 1997 can be found here: [link to personal.stevens.edu] . Tripcodes are created via the algorithm described here: [link to www.thefullwiki.org] I suspect that if such an operation were carried out, the coordinator would at least sign messages using an algorithm from the NSA Suite B, such as the Advanced Encryption Standard (AES) โ€“ or even a PGP signature โ€“ so that an opponent couldn't hijack his identity as easily as has been done here. He may upgrade his standards after reading this, but frankly, it is a far too late to matter.

 

Using an open source password cracker (hashcat), publicly available information, and a little guess work about Q's favored key space, a user can successfully recover all of the passwords that correspond to Q tripcodes. These are posted below in chronological order of use:

 

Tripcode: ITPb.qbhqo -Password: Matlock

Tripcode: UW.yye1fxo -Password: M@tlock!

Tripcode: xowAT4Z3VQ -Password: Freed@m-

Tripcode: 2jsTvXXmXs -Password: F!ghtF!g

Tripcode: 4pRcUA0lBE -Password: NowC@mes

Tripcode: CbboFOtcZs -Password: StoRMkiL

Tripcode: A6yxsPKia. -Password: WeAReQ@Q

 

Note that Q seems to be unaware that the algorithm only takes the first 8 characters of the password and ignores the rest. In the past, Q has claimed to have baked meaning and foreknowledge of future events into these passwords, in particular, the 4pRcUA0lBE:NowC@mes tripcode-password pair. If I understand correctly, Q claims that the full password was "NowC@mesTHEP@inโ€”23," with 23 signifying the date of an important event, but anything beginning with "NowC@mes" would yield the same tripcode signature. This weakness severely undercuts any claimed predictive power and indicates a possible intent to mislead. For example, all of the following passwords should yield the same tripcode, 4pRcUA0lBE:

 

NowC@mesTheKing โ€“ Q is Snoop Dogg

NowC@mesTheSun โ€“ Q is Ringo Starr

NowC@mesTheAnswer-42 โ€“ Q is Douglas Adams

 

These can all be tested at at minichan's tripcode test page. [link to minichan.org (secure)] .

Anonymous ID: 41bfef your reply doesnt make sense Aug. 10, 2018, 4:56 p.m. No.2546420   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>6437 >>6459

>>2546370

 

Q verifies his identity via a cryptographic signature, or "tripcodes." These tripcode hashes (e.g. CbboFOtcZs ) are based on the DES/crypt(3) encryption algorithm. DES (Digital Encryption Standard) was standardized in 1977 and has been largely deprecated due to widely-known weaknesses. A good primer on these weaknesses from way back in 1997 can be found here: [link to personal.stevens.edu] . Tripcodes are created via the algorithm described here: [link to www.thefullwiki.org] I suspect that if such an operation were carried out, the coordinator would at least sign messages using an algorithm from the NSA Suite B, such as the Advanced Encryption Standard (AES) โ€“ or even a PGP signature โ€“ so that an opponent couldn't hijack his identity as easily as has been done here. He may upgrade his standards after reading this, but frankly, it is a far too late to matter.

 

Using an open source password cracker (hashcat), publicly available information, and a little guess work about Q's favored key space, a user can successfully recover all of the passwords that correspond to Q tripcodes. These are posted below in chronological order of use:

 

Tripcode: ITPb.qbhqo -Password: Matlock

Tripcode: UW.yye1fxo -Password: M@tlock!

Tripcode: xowAT4Z3VQ -Password: Freed@m-

Tripcode: 2jsTvXXmXs -Password: F!ghtF!g

Tripcode: 4pRcUA0lBE -Password: NowC@mes

Tripcode: CbboFOtcZs -Password: StoRMkiL

Tripcode: A6yxsPKia. -Password: WeAReQ@Q

 

Note that Q seems to be unaware that the algorithm only takes the first 8 characters of the password and ignores the rest. In the past, Q has claimed to have baked meaning and foreknowledge of future events into these passwords, in particular, the 4pRcUA0lBE:NowC@mes tripcode-password pair. If I understand correctly, Q claims that the full password was "NowC@mesTHEP@inโ€”23," with 23 signifying the date of an important event, but anything beginning with "NowC@mes" would yield the same tripcode signature. This weakness severely undercuts any claimed predictive power and indicates a possible intent to mislead. For example, all of the following passwords should yield the same tripcode, 4pRcUA0lBE:

 

NowC@mesTheKing โ€“ Q is Snoop Dogg

NowC@mesTheSun โ€“ Q is Ringo Starr

NowC@mesTheAnswer-42 โ€“ Q is Douglas Adams

 

These can all be tested at at minichan's tripcode test page. [link to minichan.org (secure)] .