Anonymous ID: baf0ae April 15, 2019, 3 p.m. No.6190587   🗄️.is 🔗kun   >>0625 >>0654

>>6190520

 

If you have a book and I have a book, then we can transmit numbers between one another. Say 5 8 12 4

 

5 is the page number

8 is the paragraph number to start at

12 is the word to start at

4 is how many words to include after the start

 

We use the selected words to scramble our actual message (via a XOR). This lets us share messages in the open without fear of interception because XOR'ed messages are intrinsically immune to brute force.

 

So if Assange has that book, that book is a pad that can be used to generate the keys for his insurance file.

Anonymous ID: baf0ae April 15, 2019, 3:05 p.m. No.6190689   🗄️.is 🔗kun   >>0760

>>6190625

 

Even with knowledge of linguistic and grammatical bias, you still need the source mask since any XORed message in this matter, when unraveled at random, will spell out anything you want.

Anonymous ID: baf0ae April 15, 2019, 3:15 p.m. No.6190821   🗄️.is 🔗kun   >>1023

>>6190760

 

Aye, I should concur that you can chip away with heuristics and infer source patterns from testable output.

 

Breaking up grammar bias with letter offsetting is a good idea.

 

You win a reward. Pic related.