Anonymous ID: 8c863d Sept. 8, 2018, 7:32 p.m. No.2941209   🗄️.is 🔗kun   >>1245 >>1269 >>1289 >>1898

>>2940819

 

I can give you the short answer on why DOITQ is relevant.

 

As Q put it: 1/billion chance.

Its probably a much bigger odd that the POTUS, who just happens to be working with Q - gets a randomized file name "DOITQ".

 

So LOGICAL THINKING says - what is more likely

a. The POTUS received a random file hash that just so happens to be popular phrase used by the mysterious anon and group who are secretly working for the POTUS?

 

b. Someone somewhere has the secret sauce to Twitters hashing algorithm and can use it to name files whatever they want.

 

so the logical answer is obviously b. which then leads us to who is doing this and why.

 

Q & POTUS need to be able to signal enough to anons to inspire belief but not enough to openly admit to the enemies who are also watching the boards that Q is really actually legit.

 

In July/August the strategy changed. Q said that the Q-anon project is a research project but also a public disclosure.

 

By being on these boards reading the breads you are participating in the full public disclosure. You are the "first responder" to a global catastrophe and you will be useful later by keeping the public calm during the transition through the use of the knowledge you have acquired here.

 

So yes, the Twitter POTUS file name is a "proof" but its designed to be ambigious enough to not give up the ghost of the whole op.

 

Be patient, Trust the Plane, Logical Thinking, Read Between the Lines

 

These are crucial while the project is still putting all assets into position for the big reveal.

Anonymous ID: 8c863d Sept. 8, 2018, 7:51 p.m. No.2941396   🗄️.is 🔗kun   >>1472

>>2941269

Here's how it works. BTW I have significant academic experience with hashing algos like this fine name randomizer.

 

So the purpose of a filename randomizer is to safeguard against "address collisions". An address collision occurs when a database query returns multiple files as the same object, this is bad when you are servicing a billion+ userbase who post millions of files to your database every day.

 

So the randomizer uses a "Hash" to create "entropy" AKA random numbers.

 

A hashing algorithm does this by using the data inside the file itself to "Spin the Wheel" of the randomizer so to speak.

 

But its not so easy right, because what if someone uploads the same file twice, or multiple people load the same file at the same time - would they all be named the same?

 

The answer is no. Not only would the entropy be created by the time-stamp of the post, but all kinds of other fields of data could be used to help generate significant entropy that no image will ever have a predictable name.

 

You cant just buy a randomizer of the shelf either, if a competitor or malicious actor knows your secret sauce then they could use that to fuck with your database and shut you down, falsify evidence, etc

 

The fact that DOITQ was on a POTUS tweet is extremely significant to those who know about this arcane back-end wizardry.