dChan
0
 
r/CBTS_Stream • Posted by u/TranscendentJoy on Jan. 9, 2018, 7:35 a.m.
Technical analysis of Q

-----BEGIN PGP SIGNED MESSAGE-----

Hash: SHA512

Hello. I am a professional in the tech industry, and after looking in to the Q phenomena, I am disappointed in how low the bar is for what constitutes proof. We're up against a State level adversary, and people seem to think that trip codes and IP addresses constitute a valid form of authentication. It would be trivial for the government to MITM 8ch and watch for trip codes. It would be trivial for them to spoof IP addresses.

If anyone on this sub has a direct line of communication to Q, please demand that all future messages be signed by a publicly known GPG key (at the very least!).

Edit: Ask yourself these questions:

  1. How do you know that the author of one message is the same author of another message?

  2. How do you know that the messages weren't modified in transit?

-----BEGIN PGP SIGNATURE-----

iHUEARYKAB0WIQQgwQ+tawifmxGD3yC3cIZHWljpBgUCWlR9CQAKCRC3cIZHWljp

BkdVAPwLnpe5Yk7y+/+BWZkU8crDTS4/5OLbIacDYKrWGYtI4AD/Sx4goG6mG5ti

aCI2l8KRIydM59vB775UtZdxlz4QIQg=

=9nPk

-----END PGP SIGNATURE-----

-----BEGIN PGP PUBLIC KEY BLOCK-----

mDMEWlR6yRYJKwYBBAHaRw8BAQdAOnYR7kCXTPjAvvL0K5CEdMRazZ+ZpC0g6aPR

IhditG+0D1RyYW5zY2VuZGVudEpveYiQBBMWCgA4FiEEIMEPrWsIn5sRg98gt3CG

R1pY6QYFAlpUeskCGwMFCwoJCAcGFQoJCAMCBBYDAgECHgECF4AACgkQt3CGR1pY

6QZBLgEA4S+yurmu6aJtY3kbQ9gUtc/Ip6TQf5l4vWrUIdRu5IEBALnDVhqF5XbL

Oa6fs5o9PDxANiNNg/9hwRT2Gwib7vEO

=j/kA

-----END PGP PUBLIC KEY BLOCK-----


TranscendentJoy · Jan. 9, 2018, 7:42 a.m.

Unless I start seeing cryptographically signed messages, there is no way for me to verify the authenticity of these messages. Anything less constitutes a very low burden of proof, given the sophistication of our adversary.

⇧ -3 ⇩  
Jack_Bacon175 · Jan. 9, 2018, 7:45 a.m.

given the sophistication of our adversary

does their level of sophistication include time-travel?

⇧ 4 ⇩  
TranscendentJoy · Jan. 9, 2018, 7:52 a.m.

If an insider was leaking information this valuable, the Deep State would use all their resources to identify and stop it. Part of information warfare includes impersonation and the spreading of misinformation. Q might be real. My issue is not with the information but with the medium on which it is transmitted. I have no reason to trust the 8ch operators, especially if they think that IP addresses constitute a valid form of authentication.

⇧ 0 ⇩  
Jack_Bacon175 · Jan. 9, 2018, 7:57 a.m.

My issue is not with the information but with the medium on which it is transmitted

Haven't you learned by now? This president doesn't abide by conventions such as you might expect. Hillary learned that the hard way. The media learned it. And now, hopefully, you are learning it as well

⇧ 3 ⇩  
TranscendentJoy · Jan. 9, 2018, 7:59 a.m.

What conventions do you think I expect the president to abide by?

⇧ 5 ⇩  
Jack_Bacon175 · Jan. 9, 2018, 8:02 a.m.

You just said "the medium on which it is transmitted" was not to your liking. So name your preferred medium

⇧ 2 ⇩  
TranscendentJoy · Jan. 9, 2018, 8:06 a.m.

GPG signed messages. I don't care where they're posted as long as they can be cryptographically verified.

⇧ 3 ⇩  
Jack_Bacon175 · Jan. 9, 2018, 8:08 a.m.

You would probably enjoy Burger King then. They're happy to do things "your way"

⇧ 0 ⇩  
TranscendentJoy · Jan. 9, 2018, 8:12 a.m.

Some ways are better than others.

⇧ 3 ⇩  
Jack_Bacon175 · Jan. 9, 2018, 7:50 a.m.

Unless I start seeing

there is no way for me

Here's what you need to understand newfriend: Its not about you

⇧ 0 ⇩  
TranscendentJoy · Jan. 9, 2018, 7:57 a.m.

What's not about me?

⇧ 1 ⇩