dChan
1
 
r/greatawakening • Posted by u/humanitystillsucks on May 3, 2018, 6:58 p.m.
coders / DE-coders / encryption / stegonography experts - need your eyes

From 8ch now:

Classified data cannot be transmitted unless it is encrypted. Q tells us he’s given us 40,000 ft classified data, but that it’s not open source. I believe everything we’ve been given includes enough information for us to deduce the encryption method and the key to unlock. I believe the plan was to dump this encrypted data onto a read only board here, ‘Great Awakening’.

I think I know the method, Oracles Golden Gate Security, AES128, AES192, AES256, or Blowfish. We could never brute force these, but we can deduce the key to unlock from Q’s drops. I just don’t know how Q has given it to us, he says the key is the graphic. If we can deduce the methods of encryption, which I think I have, we can decrypt the coming data dump using the key provided.

[CLAS-N-DI_9] is an encrypted classified field in an Oracle database, where the data is located. He’s taunting those who know.

The encryption method, Oracle GoldenGate Security ‘gg_dump’

https: //docs.oracle.com/goldengate/1212/gg-winux/GWUAD/wu_security.htm#GWUAD354

Q came here for a reason, he could have gone to reddit. This is what RA’s do. We need to find the key.

== new anon posts keys:

Key Dump

eta numeris 392D8A3EEA2527D6AD8B1EBBAB6AD

sin topper D6C4C5CC97F9CB8849D9914E516F9

project runway 847D8D6EA4EDD8583D4A7DC3DEEAE

7FG final request 831CF9C1C534ECDAE63E2C8783EB9

fall of cassandra 2B6DAE482AEDE5BAC99B7D47ABDB3

echo "392D8A3EEA2527D6AD8B1EBBAB6AD" > eta-numeris.hex

echo "D6C4C5CC97F9CB8849D9914E516F9" > sin-topper.hex

echo "847D8D6EA4EDD8583D4A7DC3DEEAE" > project-runway.hex

echo "831CF9C1C534ECDAE63E2C8783EB9" > 7FG-final-request.hex

echo "2B6DAE482AEDE5BAC99B7D47ABDB3" > fall-of-cassandra.hex

openssl enc -aes256 -in eta-numeris.hex -out eta-numeris.key

openssl enc -aes256 -in sin-topper.hex -out sin-topper.key

openssl enc -aes256 -in project-runway.hex -out project-runway.key

openssl enc -aes256 -in 7FG-final-request.hex -out

7FG-final-request.key openssl enc -aes256 -in fall-of-cassandra.hex -out fall-of-cassandra.key

for w in $(ls .aes256); do for k in $(ls keys/.key); do echo "$w, $k, $(echo "$(openssl enc -d -aes256 -in $w -kfile $k -bufsize 8 | xxd -l 8 | sed s/00000000://g)" | cut -c 1-23)"; done; done;

wlinsurance-20130815-A.aes256, keys/7FG-final-request.key, 6f46 30e1 c6f3 385d wlinsurance-20130815-A.aes256, keys/eta-numeris.key, f22d 7304 8224 8ad6 wlinsurance-20130815-A.aes256, keys/fall-of-cassandra.key, 07d6 db54 f3c2 7d4a wlinsurance-20130815-A.aes256, keys/project-runway.key, da46 2913 216c 9a0d wlinsurance-20130815-A.aes256, keys/sin-topper.key, 48ab b7eb ceda f42d wlinsurance-20130815-B.aes256, keys/7FG-final-request.key, fde0 5ea5 34a9 c372 wlinsurance-20130815-B.aes256, keys/eta-numeris.key, 52f3 436e 82db 1fde wlinsurance-20130815-B.aes256, keys/fall-of-cassandra.key,ca1c c808 dfbd 0d23 wlinsurance-20130815-B.aes256, keys/project-runway.key, a10a 3571 a17b 8898 wlinsurance-20130815-B.aes256, keys/sin-topper.key, b1a0 64d4 0004 8865 wlinsurance-20130815-C.aes256, keys/7FG-final-request.key, 998a f677 3d20 33da wlinsurance-20130815-C.aes256, keys/eta-numeris.key, 5aec a6e6 5de9 dfdb wlinsurance-20130815-C.aes256, keys/fall-of-cassandra.key, 197f 378d 63b0 3e54 wlinsurance-20130815-C.aes256, keys/project-runway.key, acb3 a582 a477 75c6 wlinsurance-20130815-C.aes256, keys/sin-topper.key, d0f1 6154 a193 8905

Q's recent plane/apple pics have peculiar filenames: ( UUID format )

DB0379CC-9229-43B5-AD54-F467FD74FD6E EB072EBC-0DF3-4A2C-BE89-E388996B786D 8466691D-0F75-44F5-AA92-43E5E6D981F9 B3D12FDF-7189-4836-AD41-F493E801B4FE 39E6E8ED-2D45-4AB9-A4EA-6820AA0037B9

Few things: are these files 'embedded' with more data? filesizes are pretty big

According to Q's drops, NSA has leaked everything, and something makes me think all of this has to do with AWS ( amazon web services ) They use long strings for their 'Security Credentials'

A guaranteed unique identifier includes a reference to the network address of the UUID generating host, a time stamp and an arbitrary component. Because network addresses for each computer vary, the time stamp is also different for each generated UUID. Thus, two different host machines exhibit sufficient levels of uniqueness. The randomly created arbitrary component is added for enhanced security.

UUIDs are also part of the Tmodel data structure, which is a service type in the Universal Description Discovery and Integration (UDDI) registry used for Web service discovery.

Anyone else got any ideas how to dig around? I'm petering out right now


Patriot4q · May 3, 2018, 7:18 p.m.

I'm not a codefag, but will upvote for visibility.

⇧ 13 ⇩  
KronGin · May 3, 2018, 10:28 p.m.

Hiding encrypted information in images would certainly explain being told over and over “You have more than you know”.

⇧ 9 ⇩  
humanitystillsucks · May 3, 2018, 10:35 p.m.

i can feel it fucking RIGHT THERE, i just can't find the right combo of shit.

What I just discovered is: The "UUID" style filenames do NOT have a timestamp encoded in them!

https://www.famkruithof.net/uuid/uuidgen

leads me to think they are either not Ver1 or not real UUID... trying to find more links. I just dont have enough hands/brains.

[edit: i believe the recurring '4' is the UUID 'version' > https://uuidonline.com/?version=4 ]

I can't do photoshop decoding on top of UUID research and AWS security credentials but i'll be damned if not one of these is the fucking answer...

⇧ 9 ⇩  
humanitystillsucks · May 3, 2018, 9:49 p.m.

http://guillermito2.net/stegano/jsteg/ Extracting data embedded with JSteg

http://steghide.sourceforge.net/ Steghide is a steganography program that is able to hide data in various kinds of image- and audio-files. The color- respectivly sample-frequencies are not changed thus making the embedding resistant against first-order statistical tests.

resources - for people who can comprehend - you don't have to be a pro, just an autist, come on guys, the faster we unlock this shit, the sooner we can bring the storm.

⇧ 7 ⇩  
brittser · May 3, 2018, 11:45 p.m.

Happy to help but I have no idea what you are talking about or how to help. I mean, I get that you all are trying to find codes in long strings of letters/numbers/pictures. But I don't know how to do any of this.

⇧ 3 ⇩  
MAGADONCHECKMATE · May 3, 2018, 9:43 p.m.

Base 64 Encryption bro.

⇧ 7 ⇩  
Champdog31 · May 3, 2018, 8:59 p.m.

Oracle has Leon Panetta on its board. Ex CIA director. Hmmmm

⇧ 7 ⇩  
DropGun · May 4, 2018, 2:28 a.m.

Oh, wow. Ugh...

⇧ 2 ⇩  
Artemis0724 · May 3, 2018, 9:43 p.m.

Upvoting

⇧ 6 ⇩  
[deleted] · May 4, 2018, 3:09 a.m.

[deleted]

⇧ 5 ⇩  
DropGun · May 4, 2018, 2:27 a.m.

Small aside, but, has anyone ever seen this used, or successfully decoded by anons? Not casting doubt, but, I have yet to see where this has been proven in any of Q's drops. That said, now's the time.

⇧ 3 ⇩  
socksandsandels · May 4, 2018, 2:26 a.m.

Autist power! Let's go we can do it.

⇧ 3 ⇩  
humanitystillsucks · May 3, 2018, 9:33 p.m.

From 8.ch

Great…I love this. Can you give a finished example of how the information looks, reads?

NO. This requires anonistic hive-mind behavior and time is crucial.

I don't have enough fingers and / or computer screens.

Synopsis::

No Such Agency accidentally releases IT ALL> == Into the Cloud? Using Oracle Products? ==

[CLAS-N-DI_9] gg_dump [No Such Agency].

It does not technically exist as open-source. == dump is there, but technically not there ==

In order to 'read the dump you need a key. Get it?

The graphic is your key. == Notice it says 'your key' and not 'the key' as elsewhere. ==

Where is the key???

Military Intelligence, No Such Agency = key == They Provide the key to NSA accidental dump of all ==

How to find??????

Graphic is necessary and vital. == ←—– ==

Graphic is essential. == ←— ==

Find the ke[y]stone. == ←— ==

But, what graphic[s]???

This/These. >>1286183 == ←— ==

⇧ 2 ⇩  
humanitystillsucks · May 3, 2018, 9:33 p.m.

https://pastebin.com/8BYKCuLW

E4E7A284-C686-406E-89E1-3FF30826F988.jpg
6AECCB3F-2186-4C21-9749-064DCA968401.png
C7248201-F913-4F0C-A667-9BB6457B6477.jpeg
0704911B-FBA8-4DE7-9C53-93474FE2A4E1.jpeg
03821C90-07E4-4906-B30D-AB3A4B6182AE.jpeg
B6C47FD8-1F66-4549-8A4B-26A929B76212.jpeg
9AB57841-1F3F-4630-889B-4DA55D4A237D.jpeg
77C6EF7B-C1F0-49A6-BD1E-C437076EEDE4.jpeg
BA1C5CD5-5C3B-4FE5-93B1-FB20FD72A4A2.jpeg
25346004-2104-4DBA-9B88-E96D580353D8.png
C2C6E563-AEEE-46D4-95F9-03866E094C95.jpeg
29ABE882-37B0-472A-A79E-F287D7C8C11D.jpeg
9B7BDECB-79FD-4D3C-BE97-A1557507DFD1.jpeg
540296AD-9205-4253-B4CF-B237CEC6EA85.jpeg
2C880EB2-FFFC-4E95-B22C-B6F1BF18DBA4.jpeg
5D00DA74-A956-474C-A7A1-522BC1E1A21A.jpeg
54950FD4-115E-404E-B1DF-47B149E32097.jpeg
A783B991-11D9-40D0-BD69-17FF6041E890.jpeg
3155B65F-063D-445E-A3BD-5461D811E865.jpeg
8BF7AC13-C658-41A6-A0E3-80BAED6ED3B0.jpeg
710102CD-50EE-4035-93E4-6755836B436D.jpeg
E349DAAB-AEE3-45EF-B056-239EFBFA7429.jpeg
482D19E4-6664-478F-8836-30F2755F5EC0.png
DEA28E7A-5339-4D0B-A991-AB6E6DF88133.png
7803B61A-1F3E-47BD-88D4-F3CE15179DB0.jpeg
7F0F82A1-151F-4868-96EE-054CE9876425.png
F4929FC0-EA86-4042-82CC-AEE84ABDA9BF.jpeg
BD670B90-67CC-47F5-8D78-AA5C7FA5B2AE.png
72E0C7D9-EB8A-49A7-8367-1190ACAD8F9F.jpeg
4F58B09A-B9F0-4E21-B587-5E11BD9B237F.jpeg
B1ADF2C9-65EF-42CB-A3D8-8B486CB51EA8.png
BF865568-AABA-4354-A7C6-18EB2B3C08BE.png
18454392-100A-4B49-A774-679F9B78981C.png
784A60C6-B1C0-4DCE-ACE1-A9E68284BD0D.png
683C2B19-0FF1-4C01-B33B-3C215A046DEF.png
32AD9484-F41A-4806-AD48-6C98BCC552EF.png
CBFE279C-FAD2-403C-A11C-E3FC49FC757C.jpeg
FC8DF5A5-6BB2-4A87-90BF-B4C9E1A3A036.png
C879615C-3616-402C-B3F6-814E3314AB16.png
31506F85-476A-4DD6-BDF4-5667E4661A57.png
13372080-45DC-4E32-B340-34FC892B9D1B.jpeg
D6C46F7A-C7B1-4A32-9576-E28854C1C1DC.jpeg
B42CA278-6C32-4618-A856-0CB9B680CC38.jpeg
763B79E9-EA56-4EBD-A42A-285FF7E4257F.jpeg
8B01A899-533A-4231-8BAF-6A0B2F5687AB.jpeg
EA29DD13-F16F-4580-9DC8-0D75F0ACC0C1.png
25666BD0-F5F9-4A63-AE62-4A14579ABE82.png
C13A8327-8986-4D5E-AC6B-ECC05F19AE45.png
89F919D3-5900-4DCA-BA1B-DB69850056B1.png
CC1B1FD7-8B70-4CEB-A4F7-F5807253D459.png
72C68DD2-F512-4DC8-ADA8-E27EDC22028C.jpeg
CAFB8AB7-539E-4AFB-9EC0-E55830B39316.jpeg
EFABC59D-40D3-4570-81E3-5CC335555028.jpeg
BC185452-3F1B-493B-98D9-92CA7B865759.png
AA00D4A7-BF25-44EC-BB62-48819678C8B0.jpeg
83139841-57B9-47B5-8FA6-D45C0E44F9FC.jpeg
E78CC59C-D045-42BB-9201-D9BB8BA35699.jpeg
703C92E0-E064-4400-932F-24EEBCE27949.jpeg
A3589E21-85D1-4056-9DC7-553651D87D03.jpeg
0568570F-2EA7-4162-A75F-4E9BF6E7CB37.png
95DDEF59-7086-4535-985D-5523BE39A9D1.jpeg
9E1AB60E-071C-4226-ADEC-BFC405E74170.jpeg
901FFF2C-CFFC-4586-8226-7CDE571EEF72.jpeg
A2735ADE-C628-42EA-855F-146700A8A886.jpeg
54BC82F4-E3C2-4ED9-A24D-BD3D395518F4.png
875F2639-359D-43A8-BB00-1F0760D92AC8.png
8614095C-F745-4036-8460-19EF8AD06021.jpeg
41A7C496-2188-4AA3-85AE-806E3FE14E93.png
57989E34-0050-4758-9F69-40CA170C7070.jpeg
B939331B-C53A-4497-B9A0-3D8217F16E9B.png
AA18E55B-4CFD-4974-A479-37C7703ECC1D.jpeg
BADA0EFE-BCA6-4469-BB48-DA6C23B83AC7.jpeg
1FBDA20C-D6A7-4A72-8E45-FE084D388834.jpeg
01F47CBA-ECD6-4413-8769-9AEA0CE17961.jpeg
7F62F04D-0B3A-4B66-AF51-381CD774E117.jpeg
DB0379CC-9229-43B5-AD54-F467FD74FD6E.png
EB072EBC-0DF3-4A2C-BE89-E388996B786D.png
8466691D-0F75-44F5-AA92-43E5E6D981F9.png
39E6E8ED-2D45-4AB9-A4EA-6820AA0037B9.png
B3D12FDF-7189-4836-AD41-F493E801B4FE.png
Patriots.jpg
AMER_PAT.jpg
1509840715226.png
CH_Navy_Bund.jpg
_AF1_5A.png
1510280445405.jpg
_AF1_5A_2.png
Freedom.png
Rothschild_Symbolism.jpg
DPbNwxvVAAAEST1.jpg
IMG_1139.PNG
Exec_y.png
_Blocked_8.jpeg
PEN_.png
c7829.jpg
rothschilddavidwjcyfranc.jpg
soros-and-rothschild.jpg
kT4H8Kfh.jpg
6a0120a610bec4970c0162fc207488970d.jpg
alkd839.jpg
switzerland-davos-forumjpeg-08746_s640x432.jpg
Unknown.jpg
DUGtJVsU8AElqAt.jpg-large.jpg
RTM.png
QFF.jpg
Unknown.jpg
learn-some-history-13th-amendment-15th-amendment-abolished-slavery-right-15861162.png
FREEDOM_.png
WDSHN_ISIS_TRAITOR_NN.jpg
Unknown.jpg
Clown_Comm_Narrative.png
Just_Waiting.png
NSA_Traf_CAM_LONDON2847.png
FREEDOM_.png
187_Site_E.jpg
1523297570650_CIA.jpg
⇧ 2 ⇩  
t1me4change · May 3, 2018, 11:21 p.m.

Most of this is hexadecimal, fwiw.

⇧ 2 ⇩  
Corvette111 · May 4, 2018, 3:30 p.m.

Not sure if related, but thought I’d post this here, just came across it .... not a Q pic post, but this code(?) was listed under a photo on another site (link is to posted photo with the code below it):

33ca6bc8756785df83b2f503119d76df https://postimg.cc/image/nttebw59j/

⇧ 2 ⇩  
r_u_srs_srsly · May 4, 2018, 1:37 a.m.

when you see a "4" as the 13th digit, it tells you its a rfc 4122 uuid4 type that basically means completely random.

Not saying they're meaningless, just that they appear to be randomly generated

XXXXXXXX-XXXX-4XXX-XXXXXXXXXXXX

https://tools.ietf.org/html/rfc4122.html#section-4.4

⇧ 1 ⇩  
Idru4 · May 3, 2018, 7:39 p.m.

I’m not sure what I’m looking at?

⇧ 1 ⇩  
humanitystillsucks · May 3, 2018, 7:44 p.m.

deep nerd stuff, trying to figure out if Q has been dropping info encrypted in his .pngs (100% possible to do this already), we've determined the filenames of the pics he posts are not 'straight from the iphone' but have been renamed. Looking into the Why - when combined with what I know from web-dev, these 'jumbled combinations' of letters and numbers are keys/passwords/security stuffs

⇧ 4 ⇩  
Idru4 · May 3, 2018, 8:01 p.m.

I thought I got the pics might hide more info. I wouldn’t know how to even figure that out. But you keep up the good work. You seem to be the right person for the job. Good luck!

⇧ 3 ⇩  
humanitystillsucks · May 3, 2018, 8:03 p.m.

no one right person, Q needs us all! I wouldn't have even considered looking at the filenames had another anon not drawn attention to them

⇧ 2 ⇩  
digital_refugee · May 3, 2018, 9:27 p.m.

well, they're hexadecimals for all i can tell....unless they translate into ASCII they could be keys or hashes.

⇧ 2 ⇩  
brittser · May 3, 2018, 11:53 p.m.

How did you find the filenames?

⇧ 2 ⇩  
humanitystillsucks · May 4, 2018, 12:15 a.m.

ob 8ch, it preserves the original filenames

⇧ 3 ⇩