q confirmation/Trip tweet
(media.greatawakening.win)
You're viewing a single comment thread. View all comments, or full comment thread.
Comments (29)
sorted by:
On 8chan/8kun, the advice is given to always post as anonymous (people that put names are called namefags for trying to become known while the highest-ranking anons are private).
Since anyone COULD post as Q or any other name, the trip code works as a password, a hashcode of that password is what is shown. !!Hs1Jq13jV6 in this case.
This allows a person to post as anonymous, but to display something that would identify them as being the same person who entered the same password. The only way to get the password from the hash would be a brute force attack of running every combination of 'password' to see what the tripcode would be.
ahhhh
should be noted that tripcodes are not perfectly secure
a RTX 3090 graphics card should be able to generate ten billion tripcodes per second, so with 4 of those bad boys you should be able to crack a full tripcode in less than a year, around 320 days
a normal user would be unlikely to demand that kind of attention from a cracker, but Q's trip could be easily cracked with by an entity with access to powerful computing resources (CIA, NSA etc) even a group effort by anons, if we wrote some scripts and all of us on greatawakening.win diverted our computing power we'd crack it in a month or two
but could the server handle the tripcode ''demands'' of ten billions per seconds? I mean, I can't see how it could be allowed to try a password 10 bullion times per seconds
Idk. I found this from someone who claims to have cracked..
Tripcode: ITPb.qbhqo -> Password: Matlock Tripcode: UW.yye1fxo -> Password: M@tlock! Tripcode: xowAT4Z3VQ -> Password: Freed@m- Tripcode: 2jsTvXXmXs -> Password: F!ghtF!g Tripcode: 4pRcUA0lBE -> Password: NowC@mes Tripcode: CbboFOtcZs -> Password: StoRMkiL Tripcode: A6yxsPKia. -> Password: WeAReQ@Q
also found this:
"Ron Watkins implemented the "secure tripcode" system on 8chan. The secure system can be differentiated from the old system by the preceding "!!" at the beginning. The old system can be cracked trivially. No such crack exists for the new system."
It's not done on the server, you hash the password locally, you just need to know the algorithm