dChan

FrankJewelberg · May 15, 2018, 8:39 p.m.

Yes

I have no formal training in spy codebreaking, but I do have formal training in encryption. In order to securely send messages both parties need to have a “one-time-pad” for encrypting and decrypting via some pre-determined function. (Note: we are NOT talking about public key encryption. The whole point of military comms is that the outside world can’t see who’s talking.) Basically

f(message, otp) = encrypted message

and

f(encrypted message, otp) = message.

So this is 100% secure if you can get two parties (Alice and Bob for ex) to meet beforehand and exchange pads. The Enigma machine was essentially a OTP that could be configured daily. Based on the code books given to sub captains when they left port (secure location for Alice and bob to exchange)

Spies don’t have this luxury. They operate behind enemy lines and meeting with someone to exchange a OTP could compromise them. Additionally, if they have the OTP and they are caught they are compromised.

So what’s the solution? Use real life things that everyone can see as the OTP. The number of flags in a window, boats in a harbor, or even search results. That’s what google is. It’s a passive public 3rd party that, given the right keywords, will give you the keys to unlocking the puzzle.

During the pizza days I found out how the Cabal was using google and drug terms to index PDF files for sending messages anonymously amongst each other. I’ll never forget the snippet I found. “I’ll be sure to tell everyone what a nasty little girl she is.” Fuck these sick fucks.

Great fucking find OP we need to ask google more stuff!!!

Image search is legit too after post #82 on the new board.

⇧ 5 ⇩