It's all Fake and Gay ID: 8673ef Fake and Gay Nov. 22, 2018, 7:11 p.m. No.4000844   πŸ—„οΈ.is πŸ”—kun   >>0860 >>0862 >>0885 >>0892 >>0902 >>0929 >>0952 >>0966 >>0981

Q verifies his identity via a cryptographic signature, or "tripcodes." These tripcode hashes (e.g. CbboFOtcZs ) are based on the DES/crypt(3) encryption algorithm. DES (Digital Encryption Standard) was standardized in 1977 and has been largely deprecated due to widely-known weaknesses. A good primer on these weaknesses from way back in 1997 can be found here: http://personal.stevens.edu/~khockenb/crypt3.html . Tripcodes are created via the algorithm described here: http://www.thefullwiki.org/Tripcode. I suspect that if such an operation were carried out, the coordinator would at least sign messages using an algorithm from the NSA Suite B, such as the Advanced Encryption Standard (AES) – or even a PGP signature – so that an opponent couldn't hijack his identity as easily as has been done here. He may upgrade his standards after reading this, but frankly, it is a far too late to matter.

 

Using an open source password cracker (hashcat), publicly available information, and a little guess work about Q's favored key space, a user can successfully recover all of the passwords that correspond to Q tripcodes. These are posted below in chronological order of use:

 

Tripcode: ITPb.qbhqo - Password: Matlock

Tripcode: UW.yye1fxo - Password: M@tlock!

Tripcode: xowAT4Z3VQ - Password: Freed@m-

Tripcode: 2jsTvXXmXs - Password: F!ghtF!g

Tripcode: 4pRcUA0lBE - Password: NowC@mes

Tripcode: CbboFOtcZs - Password: StoRMkiL

Tripcode: A6yxsPKia. - Password: WeAReQ@Q

 

Note that Q seems to be unaware that the algorithm only takes the first 8 characters of the password and ignores the rest. In the past, Q has claimed to have baked meaning and foreknowledge of future events into these passwords, in particular, the 4pRcUA0lBE:NowC@mes tripcode-password pair. If I understand correctly, Q claims that the full password was "NowC@mesTHEP@inβ€”23," with 23 signifying the date of an important event, but anything beginning with "NowC@mes" would yield the same tripcode signature. This weakness severely undercuts any claimed predictive power and indicates a possible intent to mislead. For example, all of the following passwords should yield the same tripcode, 4pRcUA0lBE:

 

NowC@mesTheKing – Q is Snoop Dogg

NowC@mesTheSun – Q is Ringo Starr

NowC@mesTheAnswer-42 – Q is Douglas Adams

 

These can all be tested at at minichan's tripcode test page. https://minichan.org/triptest?name=A%23NowC%40mesTheAnswer-42 .

 

To directly test all of these examples with a DES cypher, go to https://www.functions-online.com/crypt.html , paste the password in, and use the second and third characters of the password as the salt. The tripcode will be the final ten characters of the resulting DES hash.

 

Most concerning to me is the penultimate password, which contains the word "StoRM," which is Q's prophesied calamity which will sweep away those Q calls out as enemies and may involve mass arrests, executions, and institution of martial law in the worst case. The second part, "kiL", is self-explanatory. Both of these are especially concerning since Q has been ramping of his rhetoric of late. I urge everyone to be VERY careful before taking action which could injure anyone, especially yourself, your family, and your fellow patriots, at Q's direction. I do not believe he has our values or best interests at heart.