I've been looking out to identify how a web situation is popping some encoded string returned from an api accurate into a explicit identification string, the returned string appears admire execrable64 encoded on the opposite hand when i place it accurate into a decoder i safe some random gibberish that appears nothing admire the identification string i'm looking out to identify safe, a brand new encoded string is returned on every demand but the following identification string is the identical.
examples of returned encoded strings:
"1eyRPgdigC6egnwawgEi+9UCT6o6flC79Zj5bgHgyV6FhFaSm/CVxti8xeJKb4hNCHlddJxwYZtJppHeLfdrxlDo42DWgSVs/dGaupmCvmQ4bY06hc6fDYKCb8Mi6iNfeLwG8zPeFzYPsXemPIeNa/tsAa4EwOlOG4t5e2/MFjEe1XVw5wnNlnipfKycRCsGqd6gc"
"pm1Rp8XhFyB1eeDX5HyMnFgvR/OC5On8Nj0dZ1/x/d7hJ+4rXeypkNrwWIMU263nOmbgng7DzXyDA5cLS7ubM2iCVeRSCmjXQeH8fMVkqalonVfxxi6UWBBkAGzOcqVnKdaY2XzTx7PpvsFK+0uOXh8I5sXRktSpivXxVpDAkmnVJtY11G0s3ukeC6QeTznY5wzcs"
"ehXFdW8njPPS65UrOm4i7u6F/L5FgBP7geNra3yjf9Brcdv2G1Huxj4ltO8NwG7GCKLSAXmXuNOw4iWDWBvoN44mKWppJHbUxDMGmlEmSZzgiWCwHpJGth5rfz0pEy2KkYw27VjVYJ/LmIjjuACVlM1Z7HtHFkkje8aCHCjcN+Lg9J+Cjgkhq1OFnb2BLfCYAjuxD"
## the gain situation decodes from every of these the identical string in a roundabout blueprint: "4x66px"
here's an describe showing the network demand that returns the encoded string and the decoded identification string .
I'm new to this so i'd in actuality esteem it if any individual can display cowl to me what these returned strings are and if there is a come to decode them, thanks .