um, is that original
>Using an open source password cracker (hashcat), publicly available information, and a little guess work about Q's favored key space, a user can successfully recover all of the passwords that correspond to Q tripcodes. These are posted below in chronological order of use:
Agree, I still dont understand why Q uses single hash trip. Not secure.
Still, there are other many things such as posts here that make me believe that this place is very legit and Q is very likely, actually extremely liqely to be legitimate.