Q photos with hash file names
The file names in Q photo attachments are 64 character hexidecimal hashes. For the most part, they cannot be decrypted/decoded back to clear text, but they are used as a proof such that the hash value of a clear text, like a name or perhaps even a future tweet (twat) from POTUS could be hashed and compared against the hash that Q provided us in the photos. A match would be a proof of foreknowledge (future proves past). I've been trying to hash POTUS twats, phrases, and names to try to find a match, to no avail. I'm hoping that given this knowledge to anons at large, we can find a match and thus provide a proof. The hash being used is SHA256. There are many simple SHA256 hash generators online. Simply go to one, enter the clear text and compare the hash value. Hashes are sensitive to case. Also, even a slight change to clear text will drastically change the hash value. So makes sure to check all possibilities.
Anyway, this is just a hunch, but I can't see any other reason that Q would name photos with hash values. Thoughts?
WWG1WGA