Anonymous ID: cd02c3 May 28, 2020, 8:08 a.m. No.9344789   🗄️.is 🔗kun

>>9044191

 

Ever read Sherlock Holmes?

 

Looks a bit like the code Holmes deciphered that had dancing men on it:

 

https://www.boxentriq.com/code-breaking/dancing-men-cipher

 

Or the flag alphabet:

 

https://en.wikipedia.org/wiki/Flag_semaphore

Anonymous ID: cd02c3 May 28, 2020, 8:19 a.m. No.9344939   🗄️.is 🔗kun

Has anyone connected any of this to the hashing/Wikileaks connection that another Anon had found?

 

I've worked on it a bit myself. I'm not sure whether the connection is legit or not.

 

You can hash phrases from Q posts using various hashing algorithms and they result in hashes that can be used as e-mail IDs on the Wikileaks site.

 

Another anon mentioned that md5 can be used. I found numerous other hashing algorithms worked.

 

The questionable aspects of it for me were:

 

  1. Some really old, no longer secure, algorithms were used. Why do that? Even for something like this. It de-legitimizes the whole thing.

 

  1. Some short/nonsense strings were hashed, making it seem like whoever hashed things did so with a brute force or dictionary style approach. (e.g. "b" and "1" could both be hashed and give results)

 

  1. There's no telling when the Wikileaks servers were updated with these e-mail IDs. Meaning, it might have seemed intelligent to have an e-mail ID for, say, "COVID-19" a year ago, but if that was hashed and those hashes were used for e-mail IDs within the past few months, that's not impressive, it's just following the news.

 

  1. I'm yet to find any connection between the key phrases that I hash and the e-mails that come up.

 

It's a little odd to go through all that trouble for a nothingburger, though, on the Wikileaks end of things.

 

If you find strings with Ghidra that could be used as hashes or if you try hashing them, consider plugging them into the e-mail ID search for the Wikileaks e-mail drops. This might just all tie together somehow.

 

I got results with most if not all of these algorithms: md4, md5, sha1, sha224, sha384, sha256, sha512, ripemd160

 

On these addresses: (append hash to end of link)

 

https://search.wikileaks.org/gifiles/?viewemailid=

https://wikileaks.org/podesta-emails/emailid/

https://www.wikileaks.org/clinton-emails/emailid/

https://www.wikileaks.org/dnc-emails/emailid/

https://www.wikileaks.org/akp-emails/emailid/

https://www.wikileaks.org/hbgary-emails/emailid/

Anonymous ID: cd02c3 May 28, 2020, 8:25 a.m. No.9345003   🗄️.is 🔗kun

>>9043728

 

Looks a bit like a cutout into a sheet of paper. Reminds me of a Grille type cipher. What's interesting about this is that people were accusing Comey, Obama, etc., of using a cipher of this type on social media to send out comms.

 

See: https://en.wikipedia.org/wiki/Grille_(cryptography)

 

If it is this kind of cipher, the real question is what it overlays on.

 

Thinking outside the box, it may not even belong on a word-based sheet of paper. What if it were laid onto a map to show something underneath or points of interest?

 

The original post this came from could give a clue what it could be laid over…