Daily reminder
Using an open source password cracker (hashcat), publicly available information, and a little guess work about Q's favored key space, a user can successfully recover all of the passwords that correspond to Q tripcodes. These are posted below in chronological order of use:
Tripcode: ITPb.qbhqo -> Password: Matlock
Tripcode: UW.yye1fxo -> Password: M@tlock!
Tripcode: xowAT4Z3VQ -> Password: Freed@m-
Tripcode: 2jsTvXXmXs -> Password: F!ghtF!g
Tripcode: 4pRcUA0lBE -> Password: NowC@mes
Tripcode: CbboFOtcZs -> Password: StoRMkiL
Tripcode: A6yxsPKia. -> Password: WeAReQ@Q
Note that Q seems to be unaware that the algorithm only takes the first 8 characters of the password and ignores the rest. In the past, Q has claimed to have baked meaning and foreknowledge of future events into these passwords, in particular, the 4pRcUA0lBE:NowC@mes tripcode-password pair. If I understand correctly, Q claims that the full password was "NowC@mesTHEP@in---23," with 23 signifying the date of an important event, but anything beginning with "NowC@mes" would yield the same tripcode signature. This weakness severely undercuts any claimed predictive power and indicates a possible intent to mislead. For example, all of the following passwords should yield the same tripcode, 4pRcUA0lBE:
NowC@mesTheKing -- Q is Snoop Dogg
NowC@mesTheSun -- Q is Ringo Starr
NowC@mesTheAnswer-42 -- Q is Douglas Adams
These can all be tested at at minichan's tripcode test page.
https://minichan.org/triptest?name=A%23NowC%40mesTheAnswer-42 .
To directly test all of these examples with a DES cypher, go to
https://www.functions-online.com/crypt.html , paste the password in, and use the second and third characters of the password as the salt. The tripcode will be the final ten characters of the resulting DES hash.