q confirmation/Trip tweet
(media.greatawakening.win)
You're viewing a single comment thread. View all comments, or full comment thread.
Comments (29)
sorted by:
should be noted that tripcodes are not perfectly secure
a RTX 3090 graphics card should be able to generate ten billion tripcodes per second, so with 4 of those bad boys you should be able to crack a full tripcode in less than a year, around 320 days
a normal user would be unlikely to demand that kind of attention from a cracker, but Q's trip could be easily cracked with by an entity with access to powerful computing resources (CIA, NSA etc) even a group effort by anons, if we wrote some scripts and all of us on greatawakening.win diverted our computing power we'd crack it in a month or two
but could the server handle the tripcode ''demands'' of ten billions per seconds? I mean, I can't see how it could be allowed to try a password 10 bullion times per seconds
Idk. I found this from someone who claims to have cracked..
Tripcode: ITPb.qbhqo -> Password: Matlock Tripcode: UW.yye1fxo -> Password: M@tlock! Tripcode: xowAT4Z3VQ -> Password: Freed@m- Tripcode: 2jsTvXXmXs -> Password: F!ghtF!g Tripcode: 4pRcUA0lBE -> Password: NowC@mes Tripcode: CbboFOtcZs -> Password: StoRMkiL Tripcode: A6yxsPKia. -> Password: WeAReQ@Q
also found this:
"Ron Watkins implemented the "secure tripcode" system on 8chan. The secure system can be differentiated from the old system by the preceding "!!" at the beginning. The old system can be cracked trivially. No such crack exists for the new system."
It's not done on the server, you hash the password locally, you just need to know the algorithm
I see. Thanks