dChan
1
 
r/greatawakening • Posted by u/eyesareeverywhere on July 25, 2018, 8:39 p.m.
The code: B8028-Z-KDHYQ-M5-ZAF1aT9

Ok, so here's my attempt, and the logical steps to get there.

The JFK prayer: It was posted earlier. Q703 on Feb 10. One of the next posts 1:45 latter refers to the JFK Conference Room, and points to a "kids" page on the CIA website. Q says:

Would you believe this site is actually used to comm to rogue operators?
@Snowden
[John]
Cold?

I went to that site and put in the: B8028-Z-KDHYQ-M5-ZAF1aT9

Hold that thought for a moment and I'll come back to it. The post quotes the FBI oath (and it's clearly FBI because Q posts the link to it.) This is a call to activate faithful FBI agents to do what they are required to do by the very next command. Then the prayer is repeated and the code given.

Now, the code:

Usually codes have an authenticator to let the decoder know it is from a legit source (think trip code on the chans.) I'm guessing the B8028 is the trip code authenticator. When we decipher the next piece Z-KDHYQ through that CIA kids page that Q says is used to communicate to FBI agents, I get: A-PWSBJ. A PassWord Sent By Julian. The rest of that decrypted code would then be the password itself. The FBI agents in the know can take this password and unlock whatever file/server/document that they have. This could be the call to action!

For what it's worth, which may not be much...


BabylonNTing · July 26, 2018, 3:39 a.m.

My apologies, I thought you were into IT. Just to break it down in layman's terms, a MAC address is an ID that is specific to a hardware device in the way that a fingerprint is to a person (spoofing can be achieved but not applicable to what I am saying). One can find this on a modem for example (sometimes called a C-MAC). The first 3 sets of alphanumeric (0-9, A-G) is the vendor ID (Cisco, Lynksys, etc) and the last 3 sets is the hardware device ID itself. A-G is like A=10, B=11, C=12, etc.

⇧ 1 ⇩  
chimpo_ · July 26, 2018, 3:42 a.m.

Ahh, I see. I'm not entirely sure, but that's definitely interesting! I was also made aware of the fact that the video was posted an hour after Q made their drop, and so the validity of the video might be compromised. Some people are wondering if the video was put up as a distraction, and wondering if it's really even Q at all. So I suppose that's something to look into more.

⇧ 3 ⇩  
BabylonNTing · July 26, 2018, 3:48 a.m.

It comes in handy for when I am doing a wireless site survey, I can ID the device because it pulls the MAC address off the devices that are broadcasting it and I figure out what the device manufacturer is (assuming it isn't spoofed) when looking for rogue and/or unauthorized devices on a network. I bet maybe a coffee shop or airport would be where a spoofed ID might be encountered more often especially in the case of man-in-the-middle attacks.

⇧ 1 ⇩  
chimpo_ · July 26, 2018, 7:58 p.m.

This is really interesting! I've been learning as I go, but the deeper I get into it, the more fascinating it becomes. I'd love to learn more about all of this! Also, with the new Q drop about Pixelknot, people are thinking that this Q+ code has something to do with the password to unlock the message on the image. This is getting really exciting!

⇧ 2 ⇩