New to the search for knowledge on here and the Q continuum in general, so pardon if this is a re"hash" but I noticed that of the first three images I looked at from Q's posts, they had the same type of hash key either in the post or as an image name. I went to WL and was able to match these keys to emails.
I don't necessarily follow the interrelations, but this overlap is obviously not by coincidence. Here are some examples-
Q post regarding a rigged system- which btw, in the upper right corner shows the person as "following" so it's a separate account from DJT. https://qagg.news/images/630f371317c497114eb3a252057c56b19ec0d22173dc7d4920dc5ff42185db25.png WL email- https://www.wikileaks.org/dnc-emails/emailid/630f371317c497114eb3a252057c56b19ec0d22173dc7d4920dc5ff42185db25#searchresult
Q post regarding Epstein island- email key is embedded within the post https://qagg.news/siteimages/postimage4911.jpg WL email- https://www.wikileaks.org/akp-emails/emailid/432ae3735c00d7cca9d417d98fe6f7d7ed9aa35ec6480cdac2b3460863d03b88#searchresult
Q post of American flag- https://qagg.news/images/63d961c72b558a8009823025001eebe46be8903b830cebca81dc7a27a7e4025c.png / https://8kun.top/qresearch/res/11617725.html#11617856
I've always thought this might have something to do with Pixelknot. We have more than we know.
Has anyone been using Pixelknot consistently with Q image drops since we found out about it in Spring 2018? I remember anons keeping up with it for a few months and I think the clockfags were utilizing it but the whole Pixleknot thing just sorta faded out after a while.
Did we get lost in habbenings, decodes, and proofs and just forget about the image codes?
I downloaded the app, but don't you need a password to unlock whatever is hidden in the image?
I always figured the password was somewhere in the drops.
I ask for Papacy?
anyone tried the hash as the password?