Anonymous ID: 085c8e April 18, 2020, 7:01 a.m. No.8837707   🗄️.is 🔗kun   >>7767 >>8010 >>8184

Steganographyfags, I did some digging on the 2 american flags Q posted in 3908 and 3983. I got far enough to see they are definitely comms. Exact same dimensions, and even the visual "signature" of the image is identical, but the file sizes are different and have different checksums.

 

Here's what I found interesting. Post 3983 filename was "AMERICA.png" and the metadata says it was created 8/9/2017, before Q started posting. The SHA256 hash of this file is "f768deaef22da979abcfb73c9175b54d71fcf891666c5449c1969c07c3cc8920"

 

The filename of post 3908 is that same hash: "f768deaef22da979abcfb73c9175b54d71fcf891666c5449c1969c07c3cc8920.png"

 

So the anon speculating about checksums last night was on to something. I'm not sure how to take this further. I'm not sure if this is something we're supposed to try to decode or if it's intended for operators.

 

The posts asking about this on the crypto stackexchange have been removed?!

Anonymous ID: 085c8e April 18, 2020, 8:14 a.m. No.8838291   🗄️.is 🔗kun

>>8838010

It's a mathmatical algorithm that outputs a number based on an input of text or binary data.

 

If the input data changes even slightly, the output of a good hashing function will change also.

 

Used a lot in computing to verify file integrity, create unique filenames, etc.

 

Now if you're asking me how the algorithms work, that's a little above anon's pay grade. :-)