While browsing through some Q posts, i‘ve noticed that many have hashes as image file names.
For example: Post 1202
For non-techies: Hashes are one-way functions that take any input text and transform it to an encrypted text, which (ideally) cannot be reversed.
However, the hash in 1202 seems to be md5 (a hashing algorithm) and it should be possible to decipher it via bruteforce (trying every combination of words/letters).
Is there any list of decrypted hashes from Q‘s drops?
If not, maybe we should start digging.. Because, after all, we already have more than we know
I'm afraid you'll have hard times guessing or brute forcing them, thought of firing up a cluster with multiple parallel GPUs to push it but honestly i'm to lazy, instead i'm searching in another way, steganography, deciphers and decoders, there could be hidden text within the image "source", or something hidden within the image itself, or maybe a combination of the two, or something else, specially Steganography has always been widely used from agencies / spies. Only concern on this is that, images that may have been edited to include something, ahnd have been then copy / pasted via print screen or else, may have lost the content, or it may be damaged in case
EDIT: just checked the drop you referenced, the number there is NOT a hash, but looks much like a G/UID
41A7C496-2188-4AA3-85AE-80….png
Will second the UUID idea
After writing that, i tried to dig a little on that image from OP
Is definitely an UUID, version 4 variant 8 (DCE 1.1, ISO/IEC 11578:1996) but we miss the last 10 digits, that's the content i got so far ( using missing 10 digits as 0 )
41:A7:C4:96:21:88:0A:A3:05:AE:80:00:00:00:00:00
now, if someone that digged numbers around does have a set of 10 numbers that has never been able to use....and a mention of a character encoding that may have been used....maybe we can get it complete
if its version 4, then its completely random. No timestamps, no MAC address crumbs.
Not thinking it on that way, even with a timestamp or MAC you won't be able to do so much, but still, it may be used to access something else, videos, documents, folders (maybe something from a leak / dump).... it may be an identifier or it (or the SIV) may even contain a pass or crypt key,
Otherwise the question is, why he would have let there half of it, taking out just the last 10 numbers leaving you to guess?
The ellipsis is a page render feature. The original 8kun post prints that as well, but the source shows 41A7C496-2188-4AA3-85AE-806E3FE14E93.png
Thanks Fren, i tried to find up the original file but all links are going to 8ch that's ko, same filename on 8kun doesn't work as well, tried earlier via post (https://8kun.top/qresearch/res/1116399.html#1117177)
do you know where i could find or, by any luck do you have, the original file unaltered?
The rename is a sha256 sum; of what I don't know. Some 8kun internal
src="https://media.8ch.net/file_store/thumb/5b06ca5f7922944762569054c1e33b055d8da4495b33cc0db0c9cd5597829ab5.png"
data-md5="J/lHx/UWHLHQMGUZZKeAkA=="
Have you tried googling them? They could be file hashes too. I also think there has been some that appear to be ascii coded. Or hex codes for UTF-8 chinese symbols and such. I remember digging into it a bit but things were mostly just interesting/keywords. Worth digging! Like e298ba is utf for smiley face, similarly I found others that were chinese symbols, one I think was for traitor, lol. I don't keep my notes unfortunately.