Anonymous ID: a36465 Feb. 28, 2018, 10:59 p.m. No.523695   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>3698 >>3704 >>3710 >>3892

>>523589

 

If the clock started on 12/7 and phase [2] began 2/20

 

Feb 20 2018 22:44:40

Q

!UW.yye1fxo

ID: b0b86f

448338

Stay tuned.

Everything has meaning or a purpose.

@Jack - getting nervous?

Phase [2].

Q

 

Then Phase [1] was 76 days.

 

It happens to be the total number of blank spaces of Qโ€™s Feb 21 post (58)

 

Feb 21 2018 17:34:05

Q

!UW.yye1fxo

453

Last edited at Feb 21 2018, 17:34:05

SEC_TEST_1_

SEC_TEST_2_

SEC_TEST_3_

SEC_TEST_4_

SEC_TEST_5_

[DEVICE_1_X]

[SECURE_COMMS_ACT]

[SIG_5:5_READ]

[ ]

Q

 

And Trumps Feb 22 tweet blank spaces (18)

Anonymous ID: a36465 Feb. 28, 2018, 11:25 p.m. No.523829   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>3847 >>4019

>>523798

 

Anons Q said this

 

Feb 22 2018 17:54:38

Q

!UW.yye1fxo

ID: 9539a2

465797

>>465779

Did you count the spaces in the tweet and cross ref against spaces left here to match meaning?

Q

 

Heโ€™s asking about spaces. And cross referencing then. That could mean many things, but he isnโ€™t mentioning capitals or letters at all. Just spaces.

 

The are 18 spaces there if you open the tweet cut paste and then count then

Anonymous ID: a36465 March 1, 2018, 12:32 a.m. No.524161   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>524072

 

Was reminded of Q=Alice when investigating Clock Encryption earlier.

 

Came across this article.

 

โ€œTime-lock encryption. Alice has a document that she wants to make public in, say, a couple of days, but she is not willing to hand it out to anybody before this deadline. Therefore she puts the document into a box and attaches a time-lock. The lock keeps the box securely sealed, and thus the document confidential, for the determined period of time. It will unlock automatically when the deadline has passed, which makes it possible for everyone to access the document easily, without any further interaction with Alice. Time-lock encryption is a digital equivalent of such time-locked boxes. It allows to encrypt data for a period of time, up to a certain deadline, such that even a computationally powerful adversary is not able to learn any non-trivial information about the data before the deadline. However, when the time is over, even parties with relatively weak computational resources should immediately be able to decrypt easily.โ€

 

https:/ /eprint.iacr.org/2015/478.pdf