I'm up for the challenge. Got 20+ years of programming experience and an MSCIS. Stenography and keys may be beyond me, too, but I'm always willing to dig in and learn something new.
I've been wondering whether a deep dive into the q drops might be in order. If we're expected to figure this out on our own, I can't imagine they'd ask us to do anything that is totally beyond us. There's got to be a hint or a clue somewhere as to how to proceed. From what I've been reading about stenography, it doesn't seem likely that we could guess the key just by looking at bits and bytes.
I have some experience in this. Assuming Q team is military, zero chance they are posting classified information in any form. That is a felony. Even with a password.
Confidential information is another matter. Or for official use only.
I suspect it would be more crumbs or clues though. Or as I think you pointed out locations.
The timestamp points you to Q drop 2144 and the picture of the "Band of Anons,"
21:44 being the military time. The verbiage in the George post matches the verbiage in the "Band of Anons" pic.
BTW: There could be other things in the George post that I haven't discovered yet. My gut tells me there's something we need to find in that photo of POTUS at the South Lawn of the WH.
You can use docker pull to install and avoid needing to install the dependencies. Works pretty well for analyzing images.
Second, there's some research papers about breaking F5 encryption that I'd recommend either finding the source code (couldn't find it), or reimplementing .
I've used most of the available tools. The problem in this case is Q specifically mentioned PixelKnot app which uses a very specific implementation of F5 algorithm. None of the standard steg tools decrypt the PK encoded pictures.
It really drove (drives) me crazy, which is one reason I stopped messing with it.
Take a look at this. I followed it with a self created PK image, with and without password, using openjdk and oraclejdk. Still no joy to decrypt.
the GeorgeNews 1-year-delta picture (JFIF header, and location 0x88 = x31 x34 x34 x35)
the creepy Tom Hanx building photo (JFIF header, and location 0x88 = x32 x32 x32 x32)
that creepy Wayfair rug that looks blood-splattered (JFIF header, loc 0x88 = x1E x1E x1E x1E)
Post 2790 flag image "GOD BLESS THE UNITED STATES OF AMERICA _ PREPARE.png" (PNG header, loc 0x88 = xAA x5B xF2 x3B) ... however, I checked the one at qposts.online; it may be worth checking the original.
So we have at least "SI"/"SIS" or ?S?I?/?S?I?S where ? is some other chars.
full output of exiftool ,maybe you notice more unusual chars in output.
ExifTool Version Number : 11.16
File Name : 1.jpg
Directory : .
File Size : 3.7 MB
File Modification Date/Time : 2021:02:20 09:32:48+01:00
File Access Date/Time : 2021:02:20 19:16:18+01:00
File Inode Change Date/Time : 2021:02:20 19:03:50+01:00
File Permissions : rw-r--r--
File Type : JPEG
File Type Extension : jpg
MIME Type : image/jpeg
JFIF Version : 1.01
X Resolution : 300
Displayed Units X : inches
Y Resolution : 300
Displayed Units Y : inches
Current IPTC Digest : f7ca898706b35cd3ba75201107430eea
Coded Character Set : UTF8
Application Record Version : 4
Keywords : USSF COMMISIONING CEREMONY
Time Created : 19:26:54
Digital Creation Date : 2021:02:11
Digital Creation Time : 19:26:54
Caption-Abstract : US Airforce Photo By RIchard Gonzales
IPTC Digest : f7ca898706b35cd3ba75201107430eea
Exif Byte Order : Little-endian (Intel, II)
Image Description : US Airforce Photo By RIchard Gonzales
Make : Canon
Camera Model Name : Canon EOS-1D X Mark II
Resolution Unit : inches
Software : Adobe Photoshop Lightroom Classic 7.1 (Macintosh)
Modify Date : 2021:02:11 16:15:50
Exposure Time : 1/8000
F Number : 5.6
Exposure Program : Manual
ISO : 800
Sensitivity Type : Recommended Exposure Index
Recommended Exposure Index : 800
Exif Version : 0230
Date/Time Original : 2021:02:11 19:26:54
Create Date : 2021:02:11 19:26:54
Shutter Speed Value : 1/8000
Aperture Value : 5.6
Exposure Compensation : 0
Max Aperture Value : 4.0
Metering Mode : Multi-segment
Flash : Off, Did not fire
Focal Length : 50.0 mm
Sub Sec Time Original : 83
Sub Sec Time Digitized : 83
Color Space : sRGB
Focal Plane X Resolution : 1520
Focal Plane Y Resolution : 1520
Focal Plane Resolution Unit : cm
Custom Rendered : Normal
Exposure Mode : Manual
White Balance : Auto
Scene Capture Type : Standard
Serial Number : 072012000256
Lens Info : 24-105mm f/?
Lens Model : EF24-105mm f/4L IS USM
Lens Serial Number : 000053ca78
Profile CMM Type : Linotronic
Profile Version : 2.1.0
Profile Class : Display Device Profile
Color Space Data : RGB
Profile Connection Space : XYZ
Profile Date Time : 1998:02:09 06:49:00
Profile File Signature : acsp
Primary Platform : Microsoft Corporation
CMM Flags : Not Embedded, Independent
Device Manufacturer : Hewlett-Packard
Device Model : sRGB
Device Attributes : Reflective, Glossy, Positive, Color
Rendering Intent : Perceptual
Connection Space Illuminant : 0.9642 1 0.82491
Profile Creator : Hewlett-Packard
Profile ID : 0
Profile Copyright : Copyright (c) 1998 Hewlett-Packard Company
Profile Description : sRGB IEC61966-2.1
Media White Point : 0.95045 1 1.08905
Media Black Point : 0 0 0
Red Matrix Column : 0.43607 0.22249 0.01392
Green Matrix Column : 0.38515 0.71687 0.09708
Blue Matrix Column : 0.14307 0.06061 0.7141
Device Mfg Desc : IEC http://www.iec.ch
Device Model Desc : IEC 61966-2.1 Default RGB colour space - sRGB
Viewing Cond Desc : Reference Viewing Condition in IEC61966-2.1
Viewing Cond Illuminant : 19.6445 20.3718 16.8089
Viewing Cond Surround : 3.92889 4.07439 3.36179
Viewing Cond Illuminant Type : D50
Luminance : 76.03647 80 87.12462
Measurement Observer : CIE 1931
Measurement Backing : 0 0 0
Measurement Geometry : Unknown
Measurement Flare : 0.999%
Measurement Illuminant : D65
Technology : Cathode Ray Tube Display
Red Tone Reproduction Curve : (Binary data 2060 bytes, use -b option to extract)
Green Tone Reproduction Curve : (Binary data 2060 bytes, use -b option to extract)
Blue Tone Reproduction Curve : (Binary data 2060 bytes, use -b option to extract)
XMP Toolkit : Adobe XMP Core 5.6-c128 79.159124, 2016/03/18-14:01:55
Rating : 5
Creator Tool : Adobe Photoshop Lightroom Classic 7.1 (Macintosh)
Metadata Date : 2021:02:11 16:15:50-08:00
Lens : EF24-105mm f/4L IS USM
Image Number : 0
Approximate Focus Distance : 4294967295
Flash Compensation : 0
Firmware : 1.0.2
Date Created : 2021:02:11 19:26:54.83
Document ID : xmp.did:85a7a681-fb93-497d-b88d-b4063b84ef0c
Original Document ID : AF8233F0EAA9ACE0675B7171E6EFBC92
Instance ID : xmp.iid:85a7a681-fb93-497d-b88d-b4063b84ef0c
Format : image/jpeg
History Action : derived, saved, converted, derived, saved
History Parameters : converted from image/x-canon-cr2 to image/jpeg, saved to new location, from image/jpeg to image/x-canon-cr2, converted from image/x-canon-cr2 to image/jpeg, saved to new location
History Instance ID : xmp.iid:f8b9cb9b-3279-42f5-a71a-238749bd6522, xmp.iid:85a7a681-fb93-497d-b88d-b4063b84ef0c
History When : 2021:02:11 16:15:50-08:00, 2021:02:11 16:15:50-08:00
History Software Agent : Adobe Photoshop Lightroom Classic 7.1 (Macintosh), Adobe Photoshop Lightroom Classic 7.1 (Macintosh)
History Changed : /, /
Derived From Instance ID : xmp.iid:f8b9cb9b-3279-42f5-a71a-238749bd6522
Derived From Document ID : xmp.did:f8b9cb9b-3279-42f5-a71a-238749bd6522
Derived From Original Document ID: AF8233F0EAA9ACE0675B7171E6EFBC92
Description : US Airforce Photo By RIchard Gonzales
Subject : USSF COMMISIONING CEREMONY
Image Width : 5185
Image Height : 3457
Encoding Process : Baseline DCT, Huffman coding
Bits Per Sample : 8
Color Components : 3
Y Cb Cr Sub Sampling : YCbCr4:4:4 (1 1)
Aperture : 5.6
Date/Time Created : 2021:02:11 19:26:54
Digital Creation Date/Time : 2021:02:11 19:26:54
Image Size : 5185x3457
Megapixels : 17.9
Scale Factor To 35 mm Equivalent: 1.1
Shutter Speed : 1/8000
Create Date : 2021:02:11 19:26:54.83
Date/Time Original : 2021:02:11 19:26:54.83
Circle Of Confusion : 0.028 mm
Depth Of Field : inf (15.68 m - inf)
Field Of View : 37.7 deg
Focal Length : 50.0 mm (35 mm equivalent: 52.8 mm)
Hyperfocal Distance : 15.68 m
Lens ID : Canon EF 24-105mm f/4L IS USM
Light Value : 14.9
Not sure if anyone has mentioned this, but even if one of us anons doesn't crack anything, if there is something to crack then some "anon" is going to wind up cracking something.
Everyone needs to get comfortable using these tools, and hold on to every potentially steganographic image we find. They will be powerful red pills once we start finding/getting the keys.
2nd step in my opinion, is to use Pixelknot on a phone (or using something like Genymotion emulator) to
1 - Encrypt message using pixelknot.
2 - Decrypt message using pixelknot.
3 - Decrypt message using f5 pixelknot algorithm on a PC (Windows, Mac, Linux or whatever).
Step 3 is absolutely critical. If you cannot do #3 then any attempts to brute force or just try a bunch of passwords is at best just a random toss of the dice and at worst a major waste of time.
A lot of work has already been done on 8kun. I'd suggest starting there to see what they've done. No sense reinventing the wheel, as you say, chronos. From a quick glance, it seems they've had as much trouble figuring this out as we have, which begs the question, why? If Q is supplying the photos, why make the decode so hard? Are we missing something obvious? Or, is this just an exercise to get us up-to-speed before some real effort is required?
I had earlier technical problem with the net so i post it here:
android on virtualbox and install on it pixelknot. Maybe you will have enough resources then. If pixelknot is worth anything.
u/ApplesOrangesLemons found article about chinese being able to crack it I knew,but not mentioned because we are observed by D.S. It is almost useless without sources for us - that's the problem.
1st filesize = 3844 kb. (3,8 mb) But after converting it into bmp and back into jpg -after cropping few pixels: 3,7 mb -after coming back to base 5185x3457 = 3,1 mb
Check for yourself,maybe I fucked the method using gimp 2.10 or something (You know,I am not native speaker of english + there is kind of color coding not being native for gimp) but if not we will have nice proof something is there...
But It would be perfectly fine if there is something because rest of the jpgs are not more than 3,2 mb...
Does anyone else confirm or deny there is something according to this method ?
I have been working in image processing and AI for the last 20 years. I have the computation power at my hands and I am willing to help, but I lack time for the coming 2-3 weeks.
First thing I would do is gather the relevant images and set up a conda environment to write a few Python scripts. I assume they did not use steganography on PNG/BMP type files, which rules out any information being hidden in the least significant bits in a pixelwise fashion.
My hypothesis would be that any messages would be encoded in the factors of the discrete cosine transform that encode each 8x8 block of pixels. First order of business would be to have a look at those. There are tools out there to do this. Depending on their output, I would wrap these (command line) tools with a Python script, so I can quickly use many different settings on large amounts of images.
However, one must not forget that simply changing the DCT factors has proven to be easily detectable, such that more advanced ways of DCT encoding have been developed. I am sure tools exist for that, but it may make things very difficult.
Once a message has been detected in an image, once must assume the message is encrypted, at which point a dictionary attack in addition to a common MAGA phrase list, could potentially work to decrypt the message.
I will look into pixelknot and see if I can make a little time to do some tests.
I'm not very tech savvy these days, but i will never quit, so if there is anything i can offer, whether it's a thought or whatevs I'm in. I learn more and more every day. I will not give up. We will figure this out together patriots. God speed
Nice idea; the Q clock would be a great source for possible keys. I haven't spent much time learning to read it correctly, so if there's an Anon more versed, I'd recommend we pair possible keys with interesting pictures. Good options could be capitalized words or the themes of posts on the following days:
1.) Picture/files create-date
2.) The post/tweet date
3.) Dates mentioned in the photo content itself (if any)
Obviously, year-deltas posts (of the above dates) should also be checked for capitalized and thematic possible keys as well.
I’m game. But this is going to be very dangerous. Understand the consequences of knowing high value intel. Nothing about this is for someone who has something to lose. Let me know the details and we can go about this. I don’t use Tor because I don’t want to be Clintoned. My previous message about Anonymous joining this endeavor was serious. If anyone knows or are part of this community, no need to answer. After all that’s why they call it anonymous. But reach out to those you know who can do this type of stuff. I for one will not be on Tor at all. That may be the answer all together. Beware, it’s monitored by the DS almost constantly. Use VPNs and be extra cautious. Waiting instructions on anything else.
Both are not completely safe,but safe for some purposes and for some not.
u/Negativefeedback2021 : VPN keep logs despite guaranteeing they do not and sell it to the governments if thing is important (of course those companies avoid being caught red-handed)
tor+vpn is "safest" but of course there are ways to cheat it too for intelligence community in USA probably.After many sharks of cybercrime are catched somehow...
Things safe according to Snowden leaks may be not so safe if we Trust Q being quite pissed off about Snowden as Snowden being "CIA asset" and traitor really according to Q.Also: those leaks are outdated.
PS: u/Negativefeedback2021 : I doubt it is intel. Remember: releasing intel would be illegal.Also: releasing this thing such way is obvious way to make interested enemies (so: Chinese and Deep State) informed sooner or later. Probably they might know what is in sooner than us even.So or they are unable to stop it anyway,or...
we might be cannon fodder...
It all depends against who or what and how you configure it really
Agreed that against some American government agency this is usually explosive mixture which could blow on your face if you do it.
If you configure it properly and you pay with cryptocurrencies launded in tor network (well but money laundering is considered illegal) then some dangers can be migrated - some still not.
It is still not "silver bullet" but neither tor or vpn alone are.
May be or not may be. this sha is hexadecimal like it should be.
hash functions are used to verify integrity and validity of data but it could be used like password or kind of one time pad. Funny thing I generated my username here simply generated random blob using pwgen,because I was thinking to change account after some time in purpose of (relative) anonymity - but because of shills riding .win registering again would be stupid.
The problem kurwa is: we are running blind without noticing right clues being in plain sight.
I'm up for the challenge. Got 20+ years of programming experience and an MSCIS. Stenography and keys may be beyond me, too, but I'm always willing to dig in and learn something new.
I've been wondering whether a deep dive into the q drops might be in order. If we're expected to figure this out on our own, I can't imagine they'd ask us to do anything that is totally beyond us. There's got to be a hint or a clue somewhere as to how to proceed. From what I've been reading about stenography, it doesn't seem likely that we could guess the key just by looking at bits and bytes.
I joined. I think. Pic is Washington crossing the Delaware? My username is chronosga.
u/LoneWulf
How are your Perl skills? I think one key to this will be to create a custom word list, using data from Q's posts (words, stringers, filenames).
I have no experience with Perl, unfortunately.
Thanks for the reply. I can do Perl, but am not very good at it. Takes me a long time to setup a parsing script.
Oh sweet. This will save some time .
If it is short password or dictionary one...
How do you get the images on 8kun.top to load? (other than manually repairing the URLs and hand-downloading them?)
Good work!
I have some experience in this. Assuming Q team is military, zero chance they are posting classified information in any form. That is a felony. Even with a password.
Confidential information is another matter. Or for official use only.
I suspect it would be more crumbs or clues though. Or as I think you pointed out locations.
I'm not familiar with matrix groups. Can you pass me a link about getting started?
The timestamp points you to Q drop 2144 and the picture of the "Band of Anons," 21:44 being the military time. The verbiage in the George post matches the verbiage in the "Band of Anons" pic.
BTW: There could be other things in the George post that I haven't discovered yet. My gut tells me there's something we need to find in that photo of POTUS at the South Lawn of the WH.
Programmer too. Recommend you guys download the stego toolkit
https://github.com/DominicBreuker/stego-toolkit
You can use docker pull to install and avoid needing to install the dependencies. Works pretty well for analyzing images.
Second, there's some research papers about breaking F5 encryption that I'd recommend either finding the source code (couldn't find it), or reimplementing .
https://www.researchgate.net/publication/224672005_An_Effective_Algorithm_for_Breaking_F5
Here's a more recent paper https://jivp-eurasipjournals.springeropen.com/articles/10.1186/s13640-020-00526-2
I've used most of the available tools. The problem in this case is Q specifically mentioned PixelKnot app which uses a very specific implementation of F5 algorithm. None of the standard steg tools decrypt the PK encoded pictures.
It really drove (drives) me crazy, which is one reason I stopped messing with it.
Take a look at this. I followed it with a self created PK image, with and without password, using openjdk and oraclejdk. Still no joy to decrypt.
This may be right up your alley?
https://github.com/guardianproject/PixelKnot/issues/4
I understand what needs to happen, just don't know how to make it happen.
Cheers.
https://8kun.top/file_dl/f620d7d09fc0bc57cd799bc0a5266987dff317e8c4c80bb56435d960c242aa54.png/find-pixelknot.PNG
The fingerprint of a PixelKnot-encoded image is no JFIF header, and the hex bytes xFF xC0 x00 x11 at location 0x88.
I've checked the following images and did not find this fingerprint:
SpaceForce Commissioning Ceremony (JFIF header, and location 0x88 = x31 x1C x02 x3C)
the GeorgeNews 1-year-delta picture (JFIF header, and location 0x88 = x31 x34 x34 x35)
the creepy Tom Hanx building photo (JFIF header, and location 0x88 = x32 x32 x32 x32)
that creepy Wayfair rug that looks blood-splattered (JFIF header, loc 0x88 = x1E x1E x1E x1E)
Post 2790 flag image "GOD BLESS THE UNITED STATES OF AMERICA _ PREPARE.png" (PNG header, loc 0x88 = xAA x5B xF2 x3B) ... however, I checked the one at qposts.online; it may be worth checking the original.
The example in the PixelUnknot repo does have a PixelKnot message: https://github.com/banona/PixelUnknot/blob/master/Q4example.jpg
... as does the first link from the 8kun research linked above (https://8kun.top/file_dl/68ccb4146da74068a0d8749ac6bd3dab249e1a6d947c8ee106ef5bfdc0c9cf6e.jpeg/1*xv-xqPhM_w3qdIatlg8L9A.jpeg)
Hope this saves Anons time.
oh, and funny side-note about the Space Force image ... it's title in the metadata is misspelled as "COMMISIONING" --> missing an 'S'.
Since misspellings are purposeful, seems like this would be a hint to look at what's missing (but props to the Anon who figured the proof first: https://greatawakening.win/p/12hRZjLZAu/space-force-17--decoded--15-of-1/ )
Also misspelling: author of photos. https://greatawakening.win/p/12hRZjLZAu/space-force-17--decoded--15-of-1/ There is no: "Richard Gonzales", there is: "RIchard Gonzales". Big "i"...
So we have at least "SI"/"SIS" or ?S?I?/?S?I?S where ? is some other chars.
full output of exiftool ,maybe you notice more unusual chars in output.
Also - I have a question why we not follow the way mentioned earlier in: https://greatawakening.win/p/12hRZjLZAu/space-force-17--decoded--15-of-1/
Were my look and u/RageBringer look at that not useful at all ?
/https://greatawakening.win/p/12hRZjLZAu/space-force-17--decoded--15-of-1/
Not sure if anyone has mentioned this, but even if one of us anons doesn't crack anything, if there is something to crack then some "anon" is going to wind up cracking something.
Everyone needs to get comfortable using these tools, and hold on to every potentially steganographic image we find. They will be powerful red pills once we start finding/getting the keys.
Eventually it will happen. Just a matter of time before the collective deciphers the intended code. We just don’t know what they are using.
Thank you, u/SqueezeOrSqooze
First of all, this thread is crucial to read so as to not repeat work already done that did not result in cracking the code / finding the key.
https://8kun.top/qresearch/res/2371258.html#2371258
2nd step in my opinion, is to use Pixelknot on a phone (or using something like Genymotion emulator) to
1 - Encrypt message using pixelknot. 2 - Decrypt message using pixelknot. 3 - Decrypt message using f5 pixelknot algorithm on a PC (Windows, Mac, Linux or whatever).
Step 3 is absolutely critical. If you cannot do #3 then any attempts to brute force or just try a bunch of passwords is at best just a random toss of the dice and at worst a major waste of time.
A lot of work has already been done on 8kun. I'd suggest starting there to see what they've done. No sense reinventing the wheel, as you say, chronos. From a quick glance, it seems they've had as much trouble figuring this out as we have, which begs the question, why? If Q is supplying the photos, why make the decode so hard? Are we missing something obvious? Or, is this just an exercise to get us up-to-speed before some real effort is required?
u/SqueezeOrSqooze :
I had earlier technical problem with the net so i post it here:
android on virtualbox and install on it pixelknot. Maybe you will have enough resources then. If pixelknot is worth anything.
u/ApplesOrangesLemons found article about chinese being able to crack it I knew,but not mentioned because we are observed by D.S. It is almost useless without sources for us - that's the problem.
Anyone has checked thing I posted in recent posts ? ( https://greatawakening.win/p/12hRZjLZAu/space-force-17--decoded--15-of-1/ )
I mean:
https://link.springer.com/chapter/10.1007/3-540-36415-3_20
Does anyone else confirm or deny there is something according to this method ?
I have been working in image processing and AI for the last 20 years. I have the computation power at my hands and I am willing to help, but I lack time for the coming 2-3 weeks.
First thing I would do is gather the relevant images and set up a conda environment to write a few Python scripts. I assume they did not use steganography on PNG/BMP type files, which rules out any information being hidden in the least significant bits in a pixelwise fashion.
My hypothesis would be that any messages would be encoded in the factors of the discrete cosine transform that encode each 8x8 block of pixels. First order of business would be to have a look at those. There are tools out there to do this. Depending on their output, I would wrap these (command line) tools with a Python script, so I can quickly use many different settings on large amounts of images.
However, one must not forget that simply changing the DCT factors has proven to be easily detectable, such that more advanced ways of DCT encoding have been developed. I am sure tools exist for that, but it may make things very difficult.
Once a message has been detected in an image, once must assume the message is encrypted, at which point a dictionary attack in addition to a common MAGA phrase list, could potentially work to decrypt the message.
I will look into pixelknot and see if I can make a little time to do some tests.
It's been a minute and I had company come over unannounced which took me away from my fresh lenox (pun intended) install. I think this is relevant, I am trying the software mentioned in the PDF. https://embeddedsw.net/doc/Openpuff_for_experts_L00F_group_hacked_NASA_and_shared_top_secret_data.pdf And squeez, Who are you with a 2 day old acct causing all this chaos?
What did you use to turn the photos to red/green/black pixels? I want to try something tomorrow after I get some zzz's
I tried finding your group on matrix... no luck.
But I tried a different photo using pixelknot and got 60% and app crashed again.
I used the photo from drop #869 https://qalerts.app/?q=%23869
Send me a message on matrix (same user name as here) and ill explain what password I used.
I'm not very tech savvy these days, but i will never quit, so if there is anything i can offer, whether it's a thought or whatevs I'm in. I learn more and more every day. I will not give up. We will figure this out together patriots. God speed
Nice idea; the Q clock would be a great source for possible keys. I haven't spent much time learning to read it correctly, so if there's an Anon more versed, I'd recommend we pair possible keys with interesting pictures. Good options could be capitalized words or the themes of posts on the following days:
1.) Picture/files create-date
2.) The post/tweet date
3.) Dates mentioned in the photo content itself (if any)
Obviously, year-deltas posts (of the above dates) should also be checked for capitalized and thematic possible keys as well.
Not sure if this will help but there is an ebay post of the georgenews key to the white house https://www.ebay.com/itm/324464778660?ul_noapp=true
I’m game. But this is going to be very dangerous. Understand the consequences of knowing high value intel. Nothing about this is for someone who has something to lose. Let me know the details and we can go about this. I don’t use Tor because I don’t want to be Clintoned. My previous message about Anonymous joining this endeavor was serious. If anyone knows or are part of this community, no need to answer. After all that’s why they call it anonymous. But reach out to those you know who can do this type of stuff. I for one will not be on Tor at all. That may be the answer all together. Beware, it’s monitored by the DS almost constantly. Use VPNs and be extra cautious. Waiting instructions on anything else.
Both are not completely safe,but safe for some purposes and for some not.
u/Negativefeedback2021 : VPN keep logs despite guaranteeing they do not and sell it to the governments if thing is important (of course those companies avoid being caught red-handed)
tor+vpn is "safest" but of course there are ways to cheat it too for intelligence community in USA probably.After many sharks of cybercrime are catched somehow...
Things safe according to Snowden leaks may be not so safe if we Trust Q being quite pissed off about Snowden as Snowden being "CIA asset" and traitor really according to Q.Also: those leaks are outdated.
I am about this: https://www.theguardian.com/world/interactive/2013/oct/04/tor-stinks-nsa-presentation-document
PS: u/Negativefeedback2021 : I doubt it is intel. Remember: releasing intel would be illegal.Also: releasing this thing such way is obvious way to make interested enemies (so: Chinese and Deep State) informed sooner or later. Probably they might know what is in sooner than us even.So or they are unable to stop it anyway,or... we might be cannon fodder...
It all depends against who or what and how you configure it really
Agreed that against some American government agency this is usually explosive mixture which could blow on your face if you do it.
If you configure it properly and you pay with cryptocurrencies launded in tor network (well but money laundering is considered illegal) then some dangers can be migrated - some still not.
It is still not "silver bullet" but neither tor or vpn alone are.
You can...
May be or not may be. this sha is hexadecimal like it should be. hash functions are used to verify integrity and validity of data but it could be used like password or kind of one time pad. Funny thing I generated my username here simply generated random blob using pwgen,because I was thinking to change account after some time in purpose of (relative) anonymity - but because of shills riding .win registering again would be stupid. The problem kurwa is: we are running blind without noticing right clues being in plain sight.
Use "steganography" (instead of "stenanography")