Ever read Sherlock Holmes?
Looks a bit like the code Holmes deciphered that had dancing men on it:
https://www.boxentriq.com/code-breaking/dancing-men-cipher
Or the flag alphabet:
https://en.wikipedia.org/wiki/Flag_semaphore
Ever read Sherlock Holmes?
Looks a bit like the code Holmes deciphered that had dancing men on it:
https://www.boxentriq.com/code-breaking/dancing-men-cipher
Or the flag alphabet:
https://en.wikipedia.org/wiki/Flag_semaphore
Has anyone connected any of this to the hashing/Wikileaks connection that another Anon had found?
I've worked on it a bit myself. I'm not sure whether the connection is legit or not.
You can hash phrases from Q posts using various hashing algorithms and they result in hashes that can be used as e-mail IDs on the Wikileaks site.
Another anon mentioned that md5 can be used. I found numerous other hashing algorithms worked.
The questionable aspects of it for me were:
Some really old, no longer secure, algorithms were used. Why do that? Even for something like this. It de-legitimizes the whole thing.
Some short/nonsense strings were hashed, making it seem like whoever hashed things did so with a brute force or dictionary style approach. (e.g. "b" and "1" could both be hashed and give results)
There's no telling when the Wikileaks servers were updated with these e-mail IDs. Meaning, it might have seemed intelligent to have an e-mail ID for, say, "COVID-19" a year ago, but if that was hashed and those hashes were used for e-mail IDs within the past few months, that's not impressive, it's just following the news.
I'm yet to find any connection between the key phrases that I hash and the e-mails that come up.
It's a little odd to go through all that trouble for a nothingburger, though, on the Wikileaks end of things.
If you find strings with Ghidra that could be used as hashes or if you try hashing them, consider plugging them into the e-mail ID search for the Wikileaks e-mail drops. This might just all tie together somehow.
I got results with most if not all of these algorithms: md4, md5, sha1, sha224, sha384, sha256, sha512, ripemd160
On these addresses: (append hash to end of link)
https://search.wikileaks.org/gifiles/?viewemailid=
https://wikileaks.org/podesta-emails/emailid/
https://www.wikileaks.org/clinton-emails/emailid/
https://www.wikileaks.org/dnc-emails/emailid/
https://www.wikileaks.org/akp-emails/emailid/
https://www.wikileaks.org/hbgary-emails/emailid/
Looks a bit like a cutout into a sheet of paper. Reminds me of a Grille type cipher. What's interesting about this is that people were accusing Comey, Obama, etc., of using a cipher of this type on social media to send out comms.
See: https://en.wikipedia.org/wiki/Grille_(cryptography)
If it is this kind of cipher, the real question is what it overlays on.
Thinking outside the box, it may not even belong on a word-based sheet of paper. What if it were laid onto a map to show something underneath or points of interest?
The original post this came from could give a clue what it could be laid over…