I agree the photos could be stegos on both sides. The trick would be, as you say, to know the algorithm used and the password. Using the same password defies security, so there must be a clue to the password in a specific picture. Does this make sense? I'd say a password might be in a Qdrop that would be somehow referenced in the photo (finding these drops has been going on here for a while). Not sure about an outsider's photos. Also, don't know if there'd be a super-secret stego program. Would probably be something that anyone could get ahold of. (was there a stego program on Hunter's laptop, for example, or Weiner's?).
Why hide the password if the answer will be posted on the internet via this forum? Serious question, if you want the message to be read, and to be spread, why encrypt make it so hard to unlock
Because the military can't just release classified information directly to the public. It breaks the rules they have to follow (major difference between the white hats and the cabalists).
If the info is encrypted in some form, and the decrypt key/mechanism just "happens" to be found out, this allows "plausible deniability" ... Q's early posts discuss this (although I don't remember exactly where off the top of my head). Information disclosure is one of the primary purposes of Q (in my opinion, due to the abusive approach the Deep State has leveraged the InfoSec rules to hide their tracks and silence people).
It all depends on what and how was hidden in an image, we had some interesting talks about the topic and tried also to work on some Q images (no other ones), problem is, some types of encryption / spoofing / hiding / method you prefer, are writing metadata and actual bytes in the image, some may show up in the picture analysing it (like information in a specific pixel or set of / stereograms / Marks / etc ), others, purely within the headers or in some unused sectors, will be likely altered / wiped from images that are not the source one, ex when uploaded on socials and specially when they get "thumbnailed" or similar ( a new raw file is made but generally retains the lowest possible information's from the original as should be a low res one) , best advice is, if you spot an image that looks interesting, check first from where it is coming, and when possible try to reverse lookup or find the source for the original one
I agree the photos could be stegos on both sides. The trick would be, as you say, to know the algorithm used and the password. Using the same password defies security, so there must be a clue to the password in a specific picture. Does this make sense? I'd say a password might be in a Qdrop that would be somehow referenced in the photo (finding these drops has been going on here for a while). Not sure about an outsider's photos. Also, don't know if there'd be a super-secret stego program. Would probably be something that anyone could get ahold of. (was there a stego program on Hunter's laptop, for example, or Weiner's?).
Has anyone attempted the password Q "leaked" for their id?
Sadly I can't recall what it was exactly, but it went something like "they will feel the pain". It was the "password" that Q uses in their name.
Example: "Q #FeelThePain" or something like that
Hunter02
Could the hint be in the dog names?
Appearantly they use dogs for comms.... IPOT1776 had been on it for years
https://youtu.be/qNfWOmJ95Bo
It showed up heavy today on MSNBC
Why hide the password if the answer will be posted on the internet via this forum? Serious question, if you want the message to be read, and to be spread, why encrypt make it so hard to unlock
Because the military can't just release classified information directly to the public. It breaks the rules they have to follow (major difference between the white hats and the cabalists).
If the info is encrypted in some form, and the decrypt key/mechanism just "happens" to be found out, this allows "plausible deniability" ... Q's early posts discuss this (although I don't remember exactly where off the top of my head). Information disclosure is one of the primary purposes of Q (in my opinion, due to the abusive approach the Deep State has leveraged the InfoSec rules to hide their tracks and silence people).
It all depends on what and how was hidden in an image, we had some interesting talks about the topic and tried also to work on some Q images (no other ones), problem is, some types of encryption / spoofing / hiding / method you prefer, are writing metadata and actual bytes in the image, some may show up in the picture analysing it (like information in a specific pixel or set of / stereograms / Marks / etc ), others, purely within the headers or in some unused sectors, will be likely altered / wiped from images that are not the source one, ex when uploaded on socials and specially when they get "thumbnailed" or similar ( a new raw file is made but generally retains the lowest possible information's from the original as should be a low res one) , best advice is, if you spot an image that looks interesting, check first from where it is coming, and when possible try to reverse lookup or find the source for the original one