It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Originally posted by EdwardSlayton
reply to post by aivlas
One day I was with him in person and he said, "Turn your phone off." I held the red button until it was off. He dialed his cell phone, hit a bunch of numbers, and my phone turned itself on. Then it rang with a caller ID tag that wasn't his phone number. Then he spoke into the phone and every word I heard through the phone was perfectly in a natural woman's voice. (I heard his real voice as he stood in front of me)
Originally posted by desertflower
reply to post by Trillium
the B is a symbol check out this link en.wikipedia.org...
use alt0223 for US keyboard the numbers beside it I think mean to the power of 2332 or maybe add it to the end makes symbols strange lines when you add it all together
Originally posted by HomeBrew
Not trying to be a troll or anything but.....
I would not touch this file now with a ten foot pole now. I have little doubt that many, if not most of the miror sites are unwittingly(or otherwise) offering a trojan file that will give the powers that be the availability to know who has downloaded this file, who is attempting to open it, and possibly anything else on your computer/network. And this is just a best case scenerio I can think of.
Perhaps I'm just paranoid. But it's usually best to err on the side of caution.
Originally posted by meaningoflights
"From: Julian Assange "
This is like a regular encrypted disk except that it supports multiple keys, where it is computationally infeasible given some of those keys to show that there are more keys, or that particular blocks of data are being used to store something other than unallocated space. Even for the legitimate user.
....
A good keying system prevents revealing of the key, placing the subject of interrogation in a hostile environment (i.e not the computer room), damage to as many parts of the subject's body as possible, retardation of the subjects mental faculties and retardation of the subject's free will. The keying system should also be practical enough to be used and adopted by real life people, and not require expensive or hard to find hardware.
Originally posted by MattDalpe
Originally posted by Section31
People also have to remember that Assange is a hacker. Something about this size may also include a computer virus, or it could contain something in which is even more deviant.edit on 8-12-2010 by Section31 because: (no reason given)
There's no virus unless the file contains an executable file.. my guess is once you enter the key you will get a big zip archive with tons of docs inside.
Originally posted by Section31
Originally posted by MattDalpe
There's no virus unless the file contains an executable file.. my guess is once you enter the key you will get a big zip archive with tons of docs inside.
You do know that the password program is an .exe file type? Even though it has another extension, it can still be used as a trojan horse program.
.Zip file are also used in the same manner as a .exe file.
Wikileaks insurance.aes256 file - please refer to legend in previous E-mail. This is for the people who already have the encryped docs and a legend was sent out to use with the password. This is only one part of the password. Don't take it for face value. For example a series of numbers, i.e 12115, is a number or word. Hope this helps.
i205.photobucket.com...