Anonymous ID: 17c4b7 March 30, 2018, 5:50 a.m. No.839944   🗄️.is 🔗kun   >>0118

Total props to anons for highlighting Q use logic repetition.

 

Logic may refer to Cryptographic Protocol Logic.Think of it this way,

A secret system (social engineering not software) of distributing information,

specifically relayed to a large open community.

There are 7 basic components. Not all systems require all components.

Key agreement

Authentication

Systemic Material Construction

Data trasport/distro

Non-repudiation

Secret sharing

Open source computation

 

1 key agreement: A key agreement is essentially #Qanon establishing contact. Initially through 4 then 8 Chan.

Anons pick it up…..The fuse is lit.

2 Systemic Material Construction: Q, tells a story and we dig! Think mid October timeframe. We had been primered for this (i.e. MegaAnon etc)

3 Secured data transport: Finding the right Chan he could communicate on (research & GA)

4 Non-repudiation: This was the best part POTUS was used for confirmation multiple times. Q had to make it absolutely undeniable that the

information he was providing was provable beyond a doubt.

5 Secret sharing: what you have to understand is Q was absolutely planned in advance, there is a timeframe schedule that is pre coordinated

with minimal impromptu outside of what is necessary to drive the program. This comm is a crypto on multi levels think, @Snowden

6 Secure multi party computatuon: Q inducted the anons. Not just the obscure, but every big swinging brain in a network solving,

distributing, propagating the non-repudiated truth.

7 Az an Anon I don't care if I ever know who You are, but this program is one of the most beautiful I have seen.

Straight forward, Honest, Eloquent, Subtle, Real, Enlightening & Patriotic.

I pray you may receive the campfire reunions u deserve with pacific winds framed by stars, God bless the wizards and warlock

Thank U Q

Anonymous ID: 17c4b7 March 30, 2018, 6:45 a.m. No.840335   🗄️.is 🔗kun

Q is using what would be understood as a timed Dolev-Tao model to distribute the distribute the logic formation. Details here https:// en.wikipedia.org/wiki/Dolev–Yao_model

Anons are a literal living distributed open source network.

It is important though that blackhats/adversaries see his comms as the "the attacker carries the message." think Black Hats

 

When he says we have more than you know and "Use Logic" he means we need to use the ease of link between Dolev-Yao into algebraic equastion to decrypt the encoded messages. I believe we already have access to what is needed, we just have to decipher.

 

Sample equstion: can be found in cryptographic primitives. i.e. Cryptographic primitives are modeled by abstract operators. For example, asymmetric encryption for a user

x {\displaystyle x}

is represented by the encryption function

E x {\displaystyle E_{x}}

and the decryption function

D x {\displaystyle D_{x}}

. Their main properties are that their composition is the identity function (

D x E x = E x D x = 1 {\displaystyle D_{x}E_{x}=E_{x}D_{x}=1}

) and that an encrypted message

E x ( M ) {\displaystyle E_{x}(M)}

reveals nothing about

M {\displaystyle M}

. Unlike in the real world, the adversary can neither manipulate the encryption's bit representation nor guess the key. The attacker may, however, re-use any messages that have been sent and therefore become known. The attacker can encrypt or decrypt these with any keys he knows, to forge subsequent messages.

A protocol is modeled as a set of sequential runs, alternating between queries (sending a message over the network) and responses (obtaining a message from the network).