While browsing through some Q posts, i‘ve noticed that many have hashes as image file names.
For example: Post 1202
For non-techies: Hashes are one-way functions that take any input text and transform it to an encrypted text, which (ideally) cannot be reversed.
However, the hash in 1202 seems to be md5 (a hashing algorithm) and it should be possible to decipher it via bruteforce (trying every combination of words/letters).
Is there any list of decrypted hashes from Q‘s drops?
If not, maybe we should start digging.. Because, after all, we already have more than we know
Thanks Fren, i tried to find up the original file but all links are going to 8ch that's ko, same filename on 8kun doesn't work as well, tried earlier via post (https://8kun.top/qresearch/res/1116399.html#1117177)
do you know where i could find or, by any luck do you have, the original file unaltered?
The rename is a sha256 sum; of what I don't know. Some 8kun internal
src="https://media.8ch.net/file_store/thumb/5b06ca5f7922944762569054c1e33b055d8da4495b33cc0db0c9cd5597829ab5.png"
data-md5="J/lHx/UWHLHQMGUZZKeAkA=="
Doesn't work Fren :(, it points to 8ch.net no redirect, i had found this earlier ( think it was the direct link to the original image ): https://media.8ch.net/file_dl/5b06ca5f7922944762569054c1e33b055d8da4495b33cc0db0c9cd5597829ab5.png/41A7C496-2188-4AA3-85AE-806E3FE14E93.png
sorry. I think its reasonable that the other copies are identical
On the image side yes, on the image content (file) depends, not talking about what's visible and not by our eyes, but about ways in which information's can be hidden within the image files, that can be within the pixels or within headers / EXIF data / etc. If the file is touched / compressed (normally that's what happen with thumbnails / preview) or anyway modified, then you may lose partially or entirely the content inside, that's why is always better to analyse the original sources