So Jack Posobeic said:
''Using an open source password cracker (hashcat), publicly available information, and a little guess work about Q's favored key space, a user can successfully recover all of the passwords that correspond to Q tripcodes. These are posted below in chronological order of use:
Tripcode: ITPb.qbhqo - Password: Matlock
Tripcode: UW.yye1fxo - Password: M@tlock!
Tripcode: xowAT4Z3VQ - Password: Freed@m-
Tripcode: 2jsTvXXmXs - Password: F!ghtF!g
Tripcode: 4pRcUA0lBE - Password: NowC@mes
Tripcode: CbboFOtcZs - Password: StoRMkiL
Tripcode: A6yxsPKia. - Password: WeAReQ@Q
Note that Q seems to be unaware that the algorithm only takes the first 8 characters of the password and ignores the rest. In the past, Q has claimed to have baked meaning and foreknowledge of future events into these passwords, in particular, the 4pRcUA0lBE:NowC@mes tripcode-password pair. If I understand correctly, Q claims that the full password was "NowC@mesTHEP@inโ23," with 23 signifying the date of an important event, but anything beginning with "NowC@mes" would yield the same tripcode signature. This weakness severely undercuts any claimed predictive power and indicates a possible intent to mislead. ''
So much work for a larp.