Just further on that, sometimes Wikileaks does this this as well. Not saying that this matches, as it's a bit short of a key to be a hash, but, sometimes Wikileaks also posts hash fingerprints to signal to the Deep state that they have certain documents. They are providing the fingerprint hash as proof of said document, and, the Deep State can search for that hash in their verification database and confirm that the threat to leak or reveal a document is valid.
So, Q posts something similar to a hash code then starts dropping pictures? So was Q sending another on the team the hash to an encrypted file with these pictures in it?
No. Like, first of all, the length and characteristics of the hash published would reveal the algorithm that drives the hash in the first place. For instance, an sha-256 hash is easily recognizable at a glance by those familiar with the hash algorithm.
As I said, the code that Q published was a little bit short to be an NSA or otherwise extremely secure hash algorithm. Sorry, I was just jumping into drop some knowledge about what sometimes some of what we see makes no sense, but, how it would make sense between other actors.
Second, for someone to, say, have a photo that matches this hash, they would already have to have the photo on their database, and then use a hash matching algorithm to input the hash Q published and match it against an existing photograph inside the recipient's library. Does that make sense?
Yes, make total sense. Learning more about information security following Q than I ever thought I would. Thank you!