>>413
I agree.
I am pointing out that the so-called Q posts today on 8pol and 4 are highly suspect.
I am also pointing out that Q was not using a 200-bit entropy tripcode, Q was using a "normal" tripcode, which would be relatively easy to crack.
>A very simple and visible example of this is 4chan's "tripcodes," which can be easily brute-forced given a long enough time (weeks to years on a single machine) and a powerful enough machine (or botnet, better yet) even if nothing about the password is known, characters in the password are chosen from a full range of ASCII, kana, and Kanji characters, characters in the code are case-sensitive alpha-numeric ASCII, and the code is 15 characters long. Here, the actual databases were not compromised, because no databases are actually kept (but the "hash," by which I mean the tripcode itself, is publicly displayed in that post), but the hashing function was discovered pretty easily anyway from ripped Yotsuba coding.
The ease of cracking a normal tripcode is well documented. Anyone saying it's not is lying or very badly misinformed.
Today's Q posts are suspect until proven otherwise.