This one’s for anyone with an Android Device, as the app to do this is only available on Google Play.
Q has pointed us to this app that embeds hidden messages into images.
We wouldn’t be surprised if there’s hidden messages for us in the images they’ve posted.
An anon has been able to find 66 images posted on the /qresearch boards that have the initial header code Pixelknot uses to encode messages into images.
The code to detect is here:
They’ve uploaded their findings here:
Q has posted 513 images. We’re going to try and repeat what they’ve done to eliminate any images that don’t have the initial code, but in the timebeing, we can start testing some passwords to see if we find anything.
Here’s the basic instructions on how to get setup to be able to start testing passwords on images on your own:
- Download the Pixelknot App to your Android device.
- Open this spreadsheet on your device (have found it easiest to do device in hand, and spreadsheet up on desktop, as Google Sheets on mobile is harder to enter into, but easy to view and click links on).
It should look something like this:
- Click the image you want to test. Open it in your browser.
- Once open, long press on the image itself. This will open up the below window. Select “Download image”.
- It should look something like this. Click the blue text and the local image on your device will be opened.
- Click the … in the upper right.
- Select Pixelknot
- Congrats. Now try a password.
- Log what you’ve tried back in the spreadsheet so we’re all not repeating things.
- If you find one, log it in column D. Log your attempts in columns E to infinity…Well hopefully not infinity. But you get the idea.
I’m working on creating a dashboard for the spreadsheet to track what messages have been found and what they say now. Will report back.
If you’d like to help check images and try some passwords, please join us in this effort.
Anons, you’re amazing.
The ones that draw the most attention to me are the ones that have names like “9F73E4EB-AD40-49FA-A2D4-F37B32C433CF”
These are formatted like keys that would be generated by a piece of software to create a unique identifier.
I’d be willing to bet the name of the picture is the password to unlock the message. Or a message somewhere…