As opposed to your spaghetti code pleb scripts you are posting so that our enemies can also analyze our communication on the board?
Holding your hand and explaining to you that this "Joan and the GUIDs" nonsense is not the real concern is in itself valuable, but if you want to get pedantic about it most of the advice I posted was in the previous thread. It's pretty simple: File hashes need to be non-destructively altered, and filenames need to be generated in such a way so as to be non-unique (e.g. match the file's hash to that of an image that already exists in an archive such as 4plebs.org and randomly select a filename based on the results).
Please post more shittershattered responses, user-kun. The fact you revealed you're fresh off of the boat from cuckchan just makes your salt all the more delicious.
If Joan-Tech and it's half-baked pseudo-tracking methods can be monetized, then an actually good tracking method would be worth more. And if this one spook process is worth money, why not copy and corporat-ize another process after I work at a 3-letter for a few years? The only take away from all this, if nothing else gets through, is: 1. You can probably track anons within Zig Forums based on filenames 2. Practice safe opsec, as you should already be doing.
We can hope user. However, you forget something: political belief is not a protected class. Except in Commiefornia, oddly enough.
No, especially since you are the only one making an attempt at discussion.
I agree, remembering how to keep anonymity is probably the best, such as with the methods at the top of the thread. I've always wanted to make a script that randomizes image data and filenames on my saved folder. I should see if anything like that already exists.
can you explain the logic behind your reasoning? what link are you trying to establish?
are you obtaining md5 for all images on 8ch and 4chan? or are you just focusing on guid images
Jacob Ross
true, but we can still speculate and act based upon our best guesses
uh… neither. we need to build a script that jumbles filenames in order to circumvent tracking full stop. the landwhale is irrelevant, and i'm not interested in idle speculation about dime-store political actors
Matthew Harris
i'm not convinced that is a complete solution. stegnography remains a persistent threat even if the metadata (filename) is scrambled
Asher Wood
i haven’t forgotten shit nigger. i would love to sue a company that had an HR dept that utilized such data. im a law fag nigger and you want to lecture me on the fucking law? go to law school you subhuman piece of shit before you try that. i alreadu told you, your fear mongering isn’t going to work here. your just making a fool of yourself. first you proove that your retarded on the subject of tech, now your demonstrating your ignorance of the law? FUCKING KEK NIGGER! please respond again cunt, this is some funny shit
Andrew Bell
I posted code earlier for maximizing filename collisions. This script reduces filenames to hexadecimal representations of integers starting from zero so the filename is extremely compact
See
Gabriel Watson
one steganography algorithm description:
The embedding algorithm roughly works as follows: At first, the secret data is compressed and encrypted. Then a sequence of postions of pixels in the cover file is cre ated based on a pseudo-random number generator initialized with the passphrase (the secret data will be embedded in the pixels at these positions). Of these positions those that do not need to be changed (because they already con tain the correct value by chance) are sorted out. Then a graph-theoretic matching algorithm finds pairs of posi tions such that exchanging their values has the effect of embedding the corresponding part of the secret data. If the algorithm cannot find any more such pairs all exchanges are actually performed. The pixels at the remaining positions (the positions that are not part of such a pair) are also modified to contain the embedded data (but this is done by overwriting them, not by exchanging them with other pixels). The fact that (most of) the embedding is done by exchanging pixel values implies that the first-order statistics (i.e. the number of times a color occurs in the picture) is not changed. For audio files the algorithm is the same, except that audio samples are used instead of pixels.
Zachary Cooper
i'm getting all images with a guid posted on Zig Forums and searching 4pleb for the md5 to see how many results it produces. I want to see how many of these images are OC first of all, and to what extent they're on 4chan.
depending on how widespread these images are i'll either look to see what the filenames are on 4chan manually (to see if they're guids) or script it. i'm not sure what i'm trying to accomplish but I'm curious about the result. many of these guid images posted on Zig Forums seem to be OC.