Anonymous ID: c5ff0c May 5, 2019, 8:29 p.m. No.6425828   🗄️.is 🔗kun   >>6114

>>6425715

BO and Q/NSA know exactly who's who. They know which IPs are home cable/DSL, which are VPNs, Tor, and DNC/MediaMatters ranges. They know where useful research gets posted from, where bot activity comes from, and where human shills post from. They've been watching it for over a year. They know the patterns. And I have no doubt that they have correlated the captcha kvetching with previous activity. They know where objection to the change comes from.

They don't care about our arguing and name calling. They know who's who.

Anonymous ID: c5ff0c May 5, 2019, 9:03 p.m. No.6426040   🗄️.is 🔗kun

>>6425990

Depends on how much data you want to communicate. If you only need to send a few bytes (a go signal for one of various plan from a pre-established playbook) then sure, it's possible. It could be done a million different ways and be impossible to detect.

As for making hashes come out the way you want, this is only practical to do partially when dealing with a decent hash algorithm. But it would be enough to send a few bytes undetectably.