Gee I wonder if any spies surround like sycophants and exert pressure until administration is compromised.
You think that's a common subversion protocol? Do you think it would be really stupid to rely on admin to prove identity when there exists a protocol that does not depend on an admin who says they have no idea how tripcodes work?