While browsing through some Q posts, i‘ve noticed that many have hashes as image file names.
For example: Post 1202
For non-techies: Hashes are one-way functions that take any input text and transform it to an encrypted text, which (ideally) cannot be reversed.
However, the hash in 1202 seems to be md5 (a hashing algorithm) and it should be possible to decipher it via bruteforce (trying every combination of words/letters).
Is there any list of decrypted hashes from Q‘s drops?
If not, maybe we should start digging.. Because, after all, we already have more than we know
Not thinking it on that way, even with a timestamp or MAC you won't be able to do so much, but still, it may be used to access something else, videos, documents, folders (maybe something from a leak / dump).... it may be an identifier or it (or the SIV) may even contain a pass or crypt key,
Otherwise the question is, why he would have let there half of it, taking out just the last 10 numbers leaving you to guess?
The ellipsis is a page render feature. The original 8kun post prints that as well, but the source shows 41A7C496-2188-4AA3-85AE-806E3FE14E93.png
Thanks Fren, i tried to find up the original file but all links are going to 8ch that's ko, same filename on 8kun doesn't work as well, tried earlier via post (https://8kun.top/qresearch/res/1116399.html#1117177)
do you know where i could find or, by any luck do you have, the original file unaltered?
The rename is a sha256 sum; of what I don't know. Some 8kun internal
src="https://media.8ch.net/file_store/thumb/5b06ca5f7922944762569054c1e33b055d8da4495b33cc0db0c9cd5597829ab5.png"
data-md5="J/lHx/UWHLHQMGUZZKeAkA=="
Doesn't work Fren :(, it points to 8ch.net no redirect, i had found this earlier ( think it was the direct link to the original image ): https://media.8ch.net/file_dl/5b06ca5f7922944762569054c1e33b055d8da4495b33cc0db0c9cd5597829ab5.png/41A7C496-2188-4AA3-85AE-806E3FE14E93.png