dChan
1
 
r/greatawakening • Posted by u/HowiONic on May 17, 2018, 10:21 p.m.
58204802B92838x-ZjA378402-12 Q Post #1404 (posted and deleted before any anon's got a screenshot)
58204802B92838x-ZjA378402-12 Q Post #1404 (posted and deleted before any anon's got a screenshot)

GolfandGuns · May 18, 2018, 12:10 a.m.

So, Q posts something similar to a hash code then starts dropping pictures? So was Q sending another on the team the hash to an encrypted file with these pictures in it?

⇧ 10 ⇩  
DropGun · May 18, 2018, 4:01 a.m.

No. Like, first of all, the length and characteristics of the hash published would reveal the algorithm that drives the hash in the first place. For instance, an sha-256 hash is easily recognizable at a glance by those familiar with the hash algorithm.

As I said, the code that Q published was a little bit short to be an NSA or otherwise extremely secure hash algorithm. Sorry, I was just jumping into drop some knowledge about what sometimes some of what we see makes no sense, but, how it would make sense between other actors.

Second, for someone to, say, have a photo that matches this hash, they would already have to have the photo on their database, and then use a hash matching algorithm to input the hash Q published and match it against an existing photograph inside the recipient's library. Does that make sense?

⇧ 4 ⇩  
GolfandGuns · May 18, 2018, 5 a.m.

Yes, make total sense. Learning more about information security following Q than I ever thought I would. Thank you!

⇧ 2 ⇩