by BQnita
14
chronos 14 points ago +14 / -0

There is a real good analysis out there of the actual pool vs. the painted pool. Was really good.

by Evspra
1
chronos 1 point ago +1 / -0

I have been watching and following them for quite some time. Always felt sketchy. After seeing how "famous" they were getting. Dug into them. See below:

George news never outright says they are mil or are the White House Communications Agency, BUT they sure make it seem like they are in their two youtube channels. They do outright lie and say all content is original on one of their youtube channels. They also use an official looking logo in the lower right corner of their video but clicking it will subscribe you to them.

They do appear to be creators of various Anonymous themed content, before switching to George News theme. Both channels host Anonymous / Q themed videos.

History of their various domains.

George.news was created in April 2019. Other domains associated with George.news are:

  • https://georgenews.shop - Created Feb 2020. redirects to teespring, tshirt store

  • georgenews.org - June 2019 redirects to george.news

  • defensetv.org - redirects george.news. Created in Oct 2010 via Korean hoster. Expired then reregistered in Jan 2020.

  • 8ch.dev - created March 2019. (which redirected to qmap.pub before, now redirects to george.news)

  • 8kun.org - Created October 2019. Redirects to george.news

  • jfkjr.live - created in Dec 2018. Now dead.

  • https://twitter.com/TheCollectiveQ now banned / suspended

  • https://www.youtube.com/c/8KUNorg Youtube channel that pretends they are or associated with WHCA.

  • https://www.youtube.com/anonymousq Youtube channel. Description says All content is original and created by us, exclusively for this channel. That is a lie. Some content may be original, but all the military / state dept stuff is copied from open sources. They say they are creators of the Bloodlines series. Can find videos / PDF of this Bloodlines: The History of The Deep State.

  • qmap.pub - registered April 2018.

The youtube content mostly comes from https://www.dvidshub.net/

2
chronos 2 points ago +2 / -0

I've used most of the available tools. The problem in this case is Q specifically mentioned PixelKnot app which uses a very specific implementation of F5 algorithm. None of the standard steg tools decrypt the PK encoded pictures.

It really drove (drives) me crazy, which is one reason I stopped messing with it.

Take a look at this. I followed it with a self created PK image, with and without password, using openjdk and oraclejdk. Still no joy to decrypt.

This may be right up your alley?

https://github.com/guardianproject/PixelKnot/issues/4

I understand what needs to happen, just don't know how to make it happen.

Cheers.

1
chronos 1 point ago +1 / -0

I joined. I think. Pic is Washington crossing the Delaware? My username is chronosga.

1
chronos 1 point ago +1 / -0

Thanks for the reply. I can do Perl, but am not very good at it. Takes me a long time to setup a parsing script.

4
chronos 4 points ago +4 / -0

I have some experience in this. Assuming Q team is military, zero chance they are posting classified information in any form. That is a felony. Even with a password.

Confidential information is another matter. Or for official use only.

I suspect it would be more crumbs or clues though. Or as I think you pointed out locations.

1
chronos 1 point ago +1 / -0

u/LoneWulf

How are your Perl skills? I think one key to this will be to create a custom word list, using data from Q's posts (words, stringers, filenames).

3
chronos 3 points ago +3 / -0

Thank you, u/SqueezeOrSqooze

First of all, this thread is crucial to read so as to not repeat work already done that did not result in cracking the code / finding the key.

https://8kun.top/qresearch/res/2371258.html#2371258

2nd step in my opinion, is to use Pixelknot on a phone (or using something like Genymotion emulator) to

1 - Encrypt message using pixelknot. 2 - Decrypt message using pixelknot. 3 - Decrypt message using f5 pixelknot algorithm on a PC (Windows, Mac, Linux or whatever).

Step 3 is absolutely critical. If you cannot do #3 then any attempts to brute force or just try a bunch of passwords is at best just a random toss of the dice and at worst a major waste of time.