Joan Tracking Thread #2 Krispy Cream is the Best Edition

As opposed to your spaghetti code pleb scripts you are posting so that our enemies can also analyze our communication on the board?

Holding your hand and explaining to you that this "Joan and the GUIDs" nonsense is not the real concern is in itself valuable, but if you want to get pedantic about it most of the advice I posted was in the previous thread. It's pretty simple: File hashes need to be non-destructively altered, and filenames need to be generated in such a way so as to be non-unique (e.g. match the file's hash to that of an image that already exists in an archive such as 4plebs.org and randomly select a filename based on the results).

Please post more shittershattered responses, user-kun. The fact you revealed you're fresh off of the boat from cuckchan just makes your salt all the more delicious.

Attached: 9483e82e9649ebeb2df2af3d5fd3d1c610ae1ab95b458e913685d7e3d4785245.png (561x540, 286.19K)

If Joan-Tech and it's half-baked pseudo-tracking methods can be monetized, then an actually good tracking method would be worth more.
And if this one spook process is worth money, why not copy and corporat-ize another process after I work at a 3-letter for a few years?
The only take away from all this, if nothing else gets through, is: 1. You can probably track anons within Zig Forums based on filenames 2. Practice safe opsec, as you should already be doing.

We can hope user. However, you forget something: political belief is not a protected class.
Except in Commiefornia, oddly enough.

No, especially since you are the only one making an attempt at discussion.

I agree, remembering how to keep anonymity is probably the best, such as with the methods at the top of the thread.
I've always wanted to make a script that randomizes image data and filenames on my saved folder. I should see if anything like that already exists.

Attached: shrug.png (97x179, 11.43K)

can you explain the logic behind your reasoning? what link are you trying to establish?

are you obtaining md5 for all images on 8ch and 4chan? or are you just focusing on guid images

true, but we can still speculate and act based upon our best guesses


uh…
neither. we need to build a script that jumbles filenames in order to circumvent tracking full stop. the landwhale is irrelevant, and i'm not interested in idle speculation about dime-store political actors

i'm not convinced that is a complete solution. stegnography remains a persistent threat even if the metadata (filename) is scrambled

i haven’t forgotten shit nigger. i would love to sue a company that had an HR dept that utilized such data. im a law fag nigger and you want to lecture me on the fucking law? go to law school you subhuman piece of shit before you try that. i alreadu told you, your fear mongering isn’t going to work here. your just making a fool of yourself. first you proove that your retarded on the subject of tech, now your demonstrating your ignorance of the law? FUCKING KEK NIGGER! please respond again cunt, this is some funny shit

I posted code earlier for maximizing filename collisions. This script reduces filenames to hexadecimal representations of integers starting from zero so the filename is extremely compact

See

one steganography algorithm description:

The embedding algorithm roughly works as follows: At
first, the secret data is compressed and encrypted. Then a
sequence of postions of pixels in the cover file is cre­
ated based on a pseudo-random number generator initialized
with the passphrase (the secret data will be embedded in
the pixels at these positions). Of these positions those
that do not need to be changed (because they already con­
tain the correct value by chance) are sorted out. Then a
graph-theoretic matching algorithm finds pairs of posi­
tions such that exchanging their values has the effect of
embedding the corresponding part of the secret data. If
the algorithm cannot find any more such pairs all
exchanges are actually performed. The pixels at the
remaining positions (the positions that are not part of
such a pair) are also modified to contain the embedded
data (but this is done by overwriting them, not by
exchanging them with other pixels). The fact that (most
of) the embedding is done by exchanging pixel values
implies that the first-order statistics (i.e. the number
of times a color occurs in the picture) is not changed.
For audio files the algorithm is the same, except that
audio samples are used instead of pixels.

i'm getting all images with a guid posted on Zig Forums and searching 4pleb for the md5 to see how many results it produces. I want to see how many of these images are OC first of all, and to what extent they're on 4chan.

depending on how widespread these images are i'll either look to see what the filenames are on 4chan manually (to see if they're guids) or script it. i'm not sure what i'm trying to accomplish but I'm curious about the result. many of these guid images posted on Zig Forums seem to be OC.

Found another one in a currently live thread on cuckchan:
boards.4chan.org/pol/thread/184842979#p184843609

126 results for the image hash on 4plebs.org:
archive.4plebs.org/pol/search/image/I1ZE1tOqQfTu2aN47pGKYQ/

Image was first posted on February 16 2015. First GUID filename appears on 16 November 2017:
archive.4plebs.org/pol/thread/149690447/#149691426

All of the posts that have GUID filenames (all of which seem to be unique) are just random, run of the mill cuckchan shitposts.

Attached: guid_1.png (341x500 244.98 KB, 42.15K)