The #PixelKnot Saga is incredibly interesting.
This will clear some of the murkiness (because there was so much lead up that apparently went unnoticed...)

This is where most people came into things..
But, 5 days prior, /hph/ was going strong on 4chan
"what's /hph/ ?"
h0llywould p3d0ugh hunt...

And WHY was it going so "strong" that night?
https://archive.4plebs.org/pol/thread/179647411
because @tedcruz is a #savage and called out paedo B/S going on in #Hollywood.
Again, check the date & timestamp.
https://twitter.com/tedcruz/status/1020665661486522368?s=20
So how did "Sarah" get involved...?

Well, since this was a "hunt" apparently, an old tweet from 2009 of hers got brought up & was commented/RT'ed by a bunch of upset people:
Note the date to the replies..
and the Patton Oswalt ones...
From there, like many #polOps, things went deep.
These old tweets got brought up, too
but back to the "sarah" part--
so this was posted in response to the /hph/ Op (not specifically to "Q", but.. still along those lines)
So these "GAME COMMS" may come in many forms.
Everyone is aware of the "Star Wars" ones by now, but there are obviously other options/possibilities out there...
it was funny that an "Anon" mentions steganography and "Q" mentions PixelKnot 61 seconds later.
If you're a gematria fan, the English ordinal for "Qanon" is 61.
But regarding the "game sites"...
this would eventually lead to searching various places for clues related to the SS pic.
which eventually lead here.
Reddit group talking about "Fallout76".
aaaaaaand the file seems to have been tied up in a good ol' #PixelKnot on this CLEARweb SITE. 🤷‍♂️

Checked with a couple tools
https://lukeslytalker.pythonanywhere.com  - web based stego toolkit
https://github.com/daniellerch/aletheia - machine learning for steganography
(has a "calibration" attack for F5/PixKnot)
This is where some would go "AH HA!" and start spreading the word...
Instead, to better vet my own claim, I made sure that #F5steganography will actually work over Reddit (it does of course)
Some make claims before testing if the concept is even possible..
https://www.reddit.com/r/Steganography/comments/gsfcl0/curiosity
So, back to #PixelKnot..
Again, an anon had asked for examples and places we could "verify" messages were being sent.
Was this Reddit community one of them? 🤷‍♂️

Reddit doesn't alter images in a way that corrupts the data.

(Steg a cat pic, upload to Reddit, D/L & extract)
SO..
Funny thing, the very next morning.. an "Anon" posts a link to a program for cracking PixelKnot processed images

It was fishy for a few reason, but fishy in a "We will help you" sort of way
Aside from the post number being "interesting" (23xxx17)

Even CRAZIER was the DELTA
14 hours, 59 minutes, and 13 seconds... doesn't seem all that significant at first..
But when you start looking at other pieces, you may see the "checksums" or ways to "verify" this may have been a "special friend" and not just some "random anon"..
14 59 13
1+4+5+9+1+3 = 23... (ooo, spooky lol)
But what about this chunk of time being 0.17% of 2018? lol
How about 62.45% of a day?
6+2+4+5 = 17...

That SPECIFIC delta represents these things.
A "Spooky" coincidence.. 🧙‍♂️
But then you get to the "Anon's" GitHub...
BanonA
... and it was started back in January (1/24/2018)
There's an empty repo with "dibc" and that's it... then a long break, and then a PixelKnot cracker within hours of the program being mentioned.
The other day, I showed that the ORIGINAL thread from Oct 28th, 2017 contained NUMEROUS images processed thru #PixelKnot.
https://twitter.com/_Luke_Slytalker/status/1265458432326479876?s=20
(further proof of embedding with results from Aletheia steg suite)
So circling back, this was all because of the /HPH/ on July 21, 2018.

But ultimately.. this was something being "monitored" by "Q team" apparently (otherwise, how would they have known to post the screen shot?)
If you made it this far... yay!
Good for you.
You've learned something!

#steganography
#PixelKnot
#WWG1WGA
#HappyHunting
🤦‍♂️ I think I did my math wrong on the 61 second part 😆🤷‍♂️
You can follow @_Luke_Slytalker.
Tip: mention @twtextapp on a Twitter thread with the keyword “unroll” to get a link to it.

Latest Threads Unrolled: