2nd step in my opinion, is to use Pixelknot on a phone (or using something like Genymotion emulator) to
1 - Encrypt message using pixelknot.
2 - Decrypt message using pixelknot.
3 - Decrypt message using f5 pixelknot algorithm on a PC (Windows, Mac, Linux or whatever).
Step 3 is absolutely critical. If you cannot do #3 then any attempts to brute force or just try a bunch of passwords is at best just a random toss of the dice and at worst a major waste of time.
A lot of work has already been done on 8kun. I'd suggest starting there to see what they've done. No sense reinventing the wheel, as you say, chronos. From a quick glance, it seems they've had as much trouble figuring this out as we have, which begs the question, why? If Q is supplying the photos, why make the decode so hard? Are we missing something obvious? Or, is this just an exercise to get us up-to-speed before some real effort is required?
I had earlier technical problem with the net so i post it here:
android on virtualbox and install on it pixelknot. Maybe you will have enough resources then. If pixelknot is worth anything.
u/ApplesOrangesLemons found article about chinese being able to crack it I knew,but not mentioned because we are observed by D.S. It is almost useless without sources for us - that's the problem.
1st filesize = 3844 kb. (3,8 mb) But after converting it into bmp and back into jpg -after cropping few pixels: 3,7 mb -after coming back to base 5185x3457 = 3,1 mb
Check for yourself,maybe I fucked the method using gimp 2.10 or something (You know,I am not native speaker of english + there is kind of color coding not being native for gimp) but if not we will have nice proof something is there...
But It would be perfectly fine if there is something because rest of the jpgs are not more than 3,2 mb...
Does anyone else confirm or deny there is something according to this method ?
Thank you, u/SqueezeOrSqooze
First of all, this thread is crucial to read so as to not repeat work already done that did not result in cracking the code / finding the key.
https://8kun.top/qresearch/res/2371258.html#2371258
2nd step in my opinion, is to use Pixelknot on a phone (or using something like Genymotion emulator) to
1 - Encrypt message using pixelknot. 2 - Decrypt message using pixelknot. 3 - Decrypt message using f5 pixelknot algorithm on a PC (Windows, Mac, Linux or whatever).
Step 3 is absolutely critical. If you cannot do #3 then any attempts to brute force or just try a bunch of passwords is at best just a random toss of the dice and at worst a major waste of time.
A lot of work has already been done on 8kun. I'd suggest starting there to see what they've done. No sense reinventing the wheel, as you say, chronos. From a quick glance, it seems they've had as much trouble figuring this out as we have, which begs the question, why? If Q is supplying the photos, why make the decode so hard? Are we missing something obvious? Or, is this just an exercise to get us up-to-speed before some real effort is required?
u/SqueezeOrSqooze :
I had earlier technical problem with the net so i post it here:
android on virtualbox and install on it pixelknot. Maybe you will have enough resources then. If pixelknot is worth anything.
u/ApplesOrangesLemons found article about chinese being able to crack it I knew,but not mentioned because we are observed by D.S. It is almost useless without sources for us - that's the problem.
Anyone has checked thing I posted in recent posts ? ( https://greatawakening.win/p/12hRZjLZAu/space-force-17--decoded--15-of-1/ )
I mean:
https://link.springer.com/chapter/10.1007/3-540-36415-3_20
Does anyone else confirm or deny there is something according to this method ?