q confirmation/Trip tweet
(media.greatawakening.win)
You're viewing a single comment thread. View all comments, or full comment thread.
Comments (29)
sorted by:
but could the server handle the tripcode ''demands'' of ten billions per seconds? I mean, I can't see how it could be allowed to try a password 10 bullion times per seconds
Idk. I found this from someone who claims to have cracked..
Tripcode: ITPb.qbhqo -> Password: Matlock Tripcode: UW.yye1fxo -> Password: M@tlock! Tripcode: xowAT4Z3VQ -> Password: Freed@m- Tripcode: 2jsTvXXmXs -> Password: F!ghtF!g Tripcode: 4pRcUA0lBE -> Password: NowC@mes Tripcode: CbboFOtcZs -> Password: StoRMkiL Tripcode: A6yxsPKia. -> Password: WeAReQ@Q
also found this:
"Ron Watkins implemented the "secure tripcode" system on 8chan. The secure system can be differentiated from the old system by the preceding "!!" at the beginning. The old system can be cracked trivially. No such crack exists for the new system."
It's not done on the server, you hash the password locally, you just need to know the algorithm
I see. Thanks