While browsing through some Q posts, i‘ve noticed that many have hashes as image file names.
For example: Post 1202
For non-techies: Hashes are one-way functions that take any input text and transform it to an encrypted text, which (ideally) cannot be reversed.
However, the hash in 1202 seems to be md5 (a hashing algorithm) and it should be possible to decipher it via bruteforce (trying every combination of words/letters).
Is there any list of decrypted hashes from Q‘s drops?
If not, maybe we should start digging.. Because, after all, we already have more than we know
src="https://media.8ch.net/file_store/thumb/5b06ca5f7922944762569054c1e33b055d8da4495b33cc0db0c9cd5597829ab5.png"
data-md5="J/lHx/UWHLHQMGUZZKeAkA=="
Doesn't work Fren :(, it points to 8ch.net no redirect, i had found this earlier ( think it was the direct link to the original image ): https://media.8ch.net/file_dl/5b06ca5f7922944762569054c1e33b055d8da4495b33cc0db0c9cd5597829ab5.png/41A7C496-2188-4AA3-85AE-806E3FE14E93.png
sorry. I think its reasonable that the other copies are identical
On the image side yes, on the image content (file) depends, not talking about what's visible and not by our eyes, but about ways in which information's can be hidden within the image files, that can be within the pixels or within headers / EXIF data / etc. If the file is touched / compressed (normally that's what happen with thumbnails / preview) or anyway modified, then you may lose partially or entirely the content inside, that's why is always better to analyse the original sources