Anonymous ID: 49c379 Nov. 9, 2018, 6:37 p.m. No.3827249   🗄️.is 🔗kun   >>7288 >>7292 >>7305

Q gave us a link which contains an article with a very convincing debunking of him/her… Hard to argue with the below… Is Q giving hints that it's all bullshit?

 

Technical discussion:

 

I am not a infosec expert, so please feel view this analysis with a skeptical eye, and as always, do your own research!

 

Q verifies his identity via a cryptographic signature, or "tripcodes." These tripcode hashes (e.g. CbboFOtcZs ) are based on the DES/crypt(3) encryption algorithm. DES (Digital Encryption Standard) was standardized in 1977 and has been largely deprecated due to widely-known weaknesses. A good primer on these weaknesses from way back in 1997 can be found here: http://personal.stevens.edu/~khockenb/crypt3.html . Tripcodes are created via the algorithm described here: http://www.thefullwiki.org/Tripcode. I suspect that if such an operation were carried out, the coordinator would at least sign messages using an algorithm from the NSA Suite B, such as the Advanced Encryption Standard (AES) – or even a PGP signature – so that an opponent couldn't hijack his identity as easily as has been done here. He may upgrade his standards after reading this, but frankly, it is a far too late to matter.

 

Using an open source password cracker (hashcat), publicly available information, and a little guess work about Q's favored key space, a user can successfully recover all of the passwords that correspond to Q tripcodes. These are posted below in chronological order of use:

 

Tripcode: ITPb.qbhqo - Password: Matlock

Tripcode: UW.yye1fxo - Password: M@tlock!

Tripcode: xowAT4Z3VQ - Password: Freed@m-

Tripcode: 2jsTvXXmXs - Password: F!ghtF!g

Tripcode: 4pRcUA0lBE - Password: NowC@mes

Tripcode: CbboFOtcZs - Password: StoRMkiL

Tripcode: A6yxsPKia. - Password: WeAReQ@Q

 

Note that Q seems to be unaware that the algorithm only takes the first 8 characters of the password and ignores the rest. In the past, Q has claimed to have baked meaning and foreknowledge of future events into these passwords, in particular, the 4pRcUA0lBE:NowC@mes tripcode-password pair. If I understand correctly, Q claims that the full password was "NowC@mesTHEP@in—23," with 23 signifying the date of an important event, but anything beginning with "NowC@mes" would yield the same tripcode signature. This weakness severely undercuts any claimed predictive power and indicates a possible intent to mislead. For example, all of the following passwords should yield the same tripcode, 4pRcUA0lBE:

 

NowC@mesTheKing – Q is Snoop Dogg

NowC@mesTheSun – Q is Ringo Starr

NowC@mesTheAnswer-42 – Q is Douglas Adams

 

These can all be tested at at minichan's tripcode test page. https://minichan.org/triptest?name=A%23NowC%40mesTheAnswer-42 .

 

To directly test all of these examples with a DES cypher, go to https://www.functions-online.com/crypt.html , paste the password in, and use the second and third characters of the password as the salt. The tripcode will be the final ten characters of the resulting DES hash.

 

Most concerning to me is the penultimate password, which contains the word "StoRM," which is Q's prophesied calamity which will sweep away those Q calls out as enemies and may involve mass arrests, executions, and institution of martial law in the worst case. The second part, "kiL", is self-explanatory. Both of these are especially concerning since Q has been ramping of his rhetoric of late. I urge everyone to be VERY careful before taking action which could injure anyone, especially yourself, your family, and your fellow patriots, at Q's direction. I do not believe he has our values or best interests at heart.

 

Finally, many of you know someone who has handled highly classified information, worked in SCIFs, and communicated securely in a professional context. I urge you to seek their wisdom in this matter, to evaluate to feasibility of Q's claims. I also urge you to study the National Industrial Security Program Operating Manual (NISPOM), which covers handling and protection of national security information in exhaustive detail, then contrast its instructions with what "Q" is doing.

 

It is my hope that I am blowing this all out of proportion, and I apologize if I am making mountains out of molehills. However, I feel that it is my duty to pass this on to you all, just in case. God bless you, and thank you again for your time and all your hard work.