Free Republic
Browse · Search
General/Chat
Topics · Post Article

To: Wneighbor; ransomnote; Cats Pajamas; greeneyes; bagster; generally; mairdie; Swordmaker; ...

SMOCK
Scalable Method of Cryptographic Key
~ ~ ~ ~ ~ ~
I don’t have a clue what that encryption terminology means either. Neither do I know the answer to the questions you posed. But I can gleefully imagine the panic of the derps if their COMMS were relying on this Smocking technique. Based on that and the Q drops saying “Panic,” I say there’s a 188% chance it could be spot on.
~ ~ ~ ~ ~
LOL! Thanks for the vote of confidence, Wneighbor!

It sounds to me like SMOCK might be a modern day Enigma device - except instead of generating 1 code key, it generates 2.... or presumably more, as the technology would be developed.

So if I understand it, [and I truly don’t!] that means that if you are given a “SMOCKed” document, you would need two keys in order to translate it back into a readable message.

SO How would something like that WORK?

We are familiar with a simple substitution key of a number replacing a letter of the alphabet.

ie, A=1

That means you number A=1, B=2, C=3, etc.

I’m now out of my depth here, but presumably with a double code, you would have a way of randomly generating another key to use with the A=1 code. Let’s say our home made SMOCKER would give us F= A.

That code key would be a shifting of the alphabet so that A=F, B=G, C=H, etc.

Not sure what the actual SMOCK node tech would be, but there are probably different ways to use a double key. [I confess, in computer terminology, I’m not even sure what a node even IS... other than in very vague terms.]

A very simple example of how you could use two keys to encrypt a message could be a layering or nesting effect.

In our above simple key examples, you could put the message into the A=F shift. Then take those letters and make the A=1. You have a document then consisting of numbers.

In order to decrypt, it would be helpful to know which one to decrypt first, I would think. So you could decrypt the message from the numbers in front of you using the A=1.... Well, you then have a document of gibberish letters. It would be very tempting, not knowing there was another level of encryption, to dismiss the very correct and real solution you had hit upon.

If you KNOW the second key, then you can take those nonsense looking letters, and apply the A=F key, and get your message in the clear.

I may be completely missing the point here - and for sure the examples I’ve used are ridiculously simple for what the super computers are capable of doing, but this kind of thing is how, from my simple sandbox, I’m approaching a visualization of what could be at play here with an incredibly complicated SMOCK technology.

As I said, there are probably ways to use more than one key to encrypt a message. I could envision the use of number sequences such as pi, or Avagadros’ number to create a pattern which is somewhat random to create multiple keys at complication levels more difficult than the simple substitution examples. Again.... I’m leaving the baby pool here and getting into the seriously deep adult pool where people are diving from high dives and a few are even using scuba equipment,.... and I have no flotation device!


1,352 posted on 12/12/2018 8:11:25 PM PST by TEXOKIE
[ Post Reply | Private Reply | To 1315 | View Replies ]


To: TEXOKIE

SerialBrain2 has a recent post that sort of works with what you are saying... People on youtube make videos to show what these test posts say if you want to search for them, but I just follow SB2 on Reddit without even going anywhere else and read them myself anymore since all the Q subs were shut down. Most of the posts all deal with Gematria (A=1, B=2 etc) and hidden communications that you refer to. Sometimes it feels like reaching a bit, with Gematria rules and adding up stuff, but always backs it up pretty good. I can’t tell you how SB2 gets to the results but am amazed time after time and waiting to see if things pan out.

I personally think the younger generation is using this to talk to their friends without their parents knowing what they are saying... Right in front of their spying eyes...
I also believe Q is using it too. at least to some extent.

You probably need a reddit account to read anything...
Here is a link to SerialBrain2’s page if interested,
https://www.reddit.com/user/serialbrain2/posts/

Here is the last post I was referring to...
https://www.reddit.com/user/SerialBrain2/comments/a59nl5/the_reason_trump_tweeted_smocking_gun/

Here is cut and paste of that recent post in case you don’t have reddit account (note that SB2’s links wont copy over in the copy/paste, the images help understand the point being made)

Smocking Gun… Hahaha! I love this!

When the tweet came out, I immediately thought this was another Covfefe moment the Maestro has just created. I started looking around to see how those who still enjoy their ignorance would mock him and man! I was not disappointed! Look: Img1

As you can see, Fake News MSM had a field day and triggered their deceived programmed humans and other online species for a social media fiesta around the Maestro’s double misspelling. Even Monica Lewinsky shared her Oval Office cigar expertise on how to spell “smoking” and on these two extra C’s in the Maestro tweet link. Of course, we all know these two C’s probably meant Cigar and Clinton to her…

But, Fake News MSM, there is one problem. Actually two. First, did you ask yourself the question why it was misspelled twice? If it was a typo, it was more likely to occur once right? Now if it occurred twice, many among you argued Trump simply did not know how to spell “smoking”. If this was the case, then please explain this to me, as if I was your mental age: Img2

As you can see, on August 1st and December 8 2018, not only did the Maestro spell “smoking” as it should be, but he used the exact same expression “smoking gun”. Their claim that he could not spell that word therefore collapses dramatically and we know we are in Very Stable Genius message territory.

Let’s decode.

First, look at the timestamps of the 2 tweets: 6:46 Dec 10 and 7:00 Dec 10. Do you see it? They both add up to 17 using a simple “visual” operation with the numbers. Look: Img3

The Maestro is pointing at the Q board. Let’s follow his direction. The timestamp 6:46 would therefore point at Q646:

Q646 APACHE Q.

Here, we learn APACHE is the most widely used web server software and runs on 67% of all webservers in the world. We deduce the Maestro is referring to the Server(s) and of course, you already know where they are:

Q1815 We have the server[S]. Q

Now we have some context and can analyze the capital letters. Img4 For the first tweet, we have D SGTRJC NSG NC FN T NO COLLUSION SD = 350. For the second one, do you see this dash between “Obama” and “but”? This is the Maestro indicating we have to gather them in 2 groups: CIVIL CASE O=98 and LC WITCH HUNT=141. Look how the Maestro beautifully confirms this grouping: the timestamp difference 14 in conjunction with the first tweet timestamp number structure 646 “generates” 141! Take the time to fully understand what I have just described: it is delicate brain food from the Maestro.

Now let’s translate the numbers we have gathered, knowing the context is the server[s]. Let’s start with CIVILCASE O=98. It is also the value for DEAD CAT BOUNCE=98. This expression appears 3 times in the Q board: Q834, Q948 and Q1595. Which one is the Maestro talking about? Peruvian coffee for those who looked at the timestamps of these drops! Q834 was dropped on March 3rd 2018. What is March 3rd? Yes: 03/03. What is 3? Yes: C. These are the 2 C’s the Maestro added to SMOKING! The Maestro coded in these 2 “SMOCKING” the date of Q drop #834 where Q is giving the smoking gun against HRC, JP, his brother TP and other highest level government officials in their implication in the dissemination of ICBM tech to Russia, the dissemination of Special Access Program material, the U1 scandal and the murder of Seth Rich! Let that sink in.

Now that the context is narrower, we can easily translate D SGTRJC NSG NC FN T NO COLLUSION SD = 350, it is the same value as ALL THE WAY DOWN TO THE FOUNDATION=350. LC WITCH HUNT=141 is also the value for THREATEN ME AGAIN.

Let’s take a closer look at this CIVIL CASE in the vicinity of OBAMA in the tweet. CIVIL CASE=83. Value for CONNECTED=83. The Maestro is adding crucial information to what Q revealed in Q834: he is saying Hussein is CONNECTED to all of it. We already knew it from Wikileaks but here it comes directly from POTUS!

You already caught every time the Maestro says NO COLLUSION=149, he is actually talking to SKULL AND BONES=149 right? He is essentially telling them: you are trying to blackmail me with your hoaxes, bogus investigations and lawless tricks; I will never collude with you! I am a free man, I am a free President! You will never be my masters, I work for the People!

If you know this, you will also easily understand what he really means when he says WITCH HUNT=126. Value for I FEAR NOTHING? Yes, 126. With this new light, you should go back and re-read all his tweets where he said NO COLLUSION and WITCH HUNT. Enjoy! Now you know why they hate him so much. Now you know why they are constantly trying to gain leverage. Now you know why they will never stop trying to assassinate him. This is what is really going on behind the scenes.

We have now gathered all the pieces of the puzzle for the first 2 Dec 10 tweets. Here is the summarizing image: Img5

Let’s apply the same process to the last 2 tweets of the day. Img6 The first one is posted at 9:11. Coincidence? No, it’s a direct message to Comey’s friend Mueller and his involvement in the 9/11 cover up. Capital letters JC CC R FBI I WH=94, same value as THINK AGAIN. The second tweet is tweeted at 9:28. Notice that from this timestamp, we can extract 92+8=100. And 100 is the value for COVER UP. Coincidence? No, this time it’s about Comey’s cover up to save HRC even though he knew who paid for the phony Trump dossier as described in the tweet. Capital letters F FBI DJC D TD DT add up to 92, value for the atomic number for Uranium and TREASON.

Now we can gather the 4 tweets of the day and all the pieces of the puzzle in a synthetic image and extract Trump’s hidden message. Read very carefully: Img7

There is something else I would like to show you about the beauty of this C added to SMOKING twice and how Q prepared a feedback for us. Img8 Adding C twice is like saying CC and since C=3, it’s like pointing at the number 33 and we know 33=14+19. Now notice that 14 is the timestamp difference between the first two tweets. Q834 gives us 15 because 8+3+4=15. Q646 gives us 16 because 6+4+6=16. This line in Q834:

Q834 Why is SR back in the news?

gives us 18 and 19 because R=18 and S=19. As you can see, the first two tweets of the riddle generated all the numbers between 14 and 19! Except 17.

Where is 17 to make this riddle perfect? Where is Q?! Peruvian coffee for those who saw it’s the time difference between the last two tweets of the day: [9:28]-[9:11]=17.

Now you know why Q dropped this the same day and why he capitalized the T to give us 20:

Q2577 +17 min delta between Tweets (cherry on top). Q

Edit: capital letters J, F and N in first tweet.


1,412 posted on 12/12/2018 9:36:27 PM PST by AzNASCARfan
[ Post Reply | Private Reply | To 1352 | View Replies ]

To: TEXOKIE

Bkmrk


1,642 posted on 12/13/2018 8:44:17 AM PST by musicnart
[ Post Reply | Private Reply | To 1352 | View Replies ]

To: TEXOKIE; Wneighbor; ransomnote; Cats Pajamas; greeneyes; bagster; generally; mairdie; Swordmaker
If you would like a classic primer on the subject I would highly recommend Alexander D’Agapeyeff’s famous 1939 work, “Codes and Ciphers - A History of Cryptography”

The term you were looking for is a polyaphabetic cypher. The best known is the Vigenère cipher.

These were state of the art through WW1. Today they can be solved in less time than it takes to set up the decode on the computer. I have done one using pencil and paper.

WWG1WGA

Garde la Foi, mes amis! Nous nous sommes les sauveurs de la République! Maintenant et Toujours!
(Keep the Faith, my friends! We are the saviors of the Republic! Now and Forever!)

LonePalm, le Républicain du verre cassé (The Broken Glass Republican)

1,676 posted on 12/13/2018 9:47:25 AM PST by LonePalm (Commander and Chef)
[ Post Reply | Private Reply | To 1352 | View Replies ]

To: TEXOKIE

S. M. o. C. K. I believe the word definitions speak for themselves. Looks like there is a procedure in place to secure crucial communications as the situation changes. Or not. What do you think?

Scalable - able to be scaled or climbed, able to be changed in size or scale

Method - systematic planning or action, a particular form of procedure for accomplishing something or approaching something

Cryptographic- the practice and study of techniques for secure communications in the presence of third parties called adversaries.

Key - of paramount or crucial importance


1,749 posted on 12/13/2018 1:27:37 PM PST by KittenClaws ("They've got Daryl's Dad's car! .....Red Dawn)
[ Post Reply | Private Reply | To 1352 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson