It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
originally posted by: ventian
Quick summary of what I have gathered thus far. Will edit if needed.
Wikileaks released what looks to be decryption keys.
Shortly thereafter, Assange lost internet connectivity.
I currently have no idea if he is alive or dead, or what these decryption keys are for.
The rest of the thread is lines being drawn in the sand.
Looks like Monday, folks.
originally posted by: ventian
Quick summary of what I have gathered thus far. Will edit if needed.
Wikileaks released what looks to be decryption keys.
Shortly thereafter, Assange lost internet connectivity.
I currently have no idea if he is alive or dead, or what these decryption keys are for.
The rest of the thread is lines being drawn in the sand.
Looks like Monday, folks.
originally posted by: roadgravel
a reply to: Trillium
I am not even trying. But someone must have.
Back to my drama suggestion - if it's been 3 years since file release, why the hashes now, other than to get attention. They should have been released back then.
you sound like you know what you are talking about. Tell me, how are hash values and checksums different?
originally posted by: StargateSG7
originally posted by: ventian
Quick summary of what I have gathered thus far. Will edit if needed.
Wikileaks released what looks to be decryption keys.
Shortly thereafter, Assange lost internet connectivity.
I currently have no idea if he is alive or dead, or what these decryption keys are for.
The rest of the thread is lines being drawn in the sand.
Looks like Monday, folks.
===
One correction!
Wikileaks DID NOT actually release the decryption keys
themselves, but rather they released the numeric SHA256
HASH VALUE that is obtained when an iterative math
function is applied to EVERY single byte and/or integer
word in the original wikileaks insurance file.
When this "Hash Function" adds up and multiplies
various bytes/words in the original file, a cryptographically
secure value is obtained which SHOULD MATCH
what a user obtains when they run the SAME
"Hash Function" on their local copy of the
insurance file.
It is ASSUMED that the "Hash Function" applies
certain math operations in a specific order
such that if the ORIGINAL ENCRYPTED FILE is
changed in ANY WAY even on only a SMALL
part that the resulting hash value would
DIFFER in some small way to what was
distributed by the author.
If the hash value disclosed by
Wikileaks DOES NOT MATCH
what the user gets then it means
the user's file is CORRUPTED or
FAKE !!!!!
On a technical basis, hash functions
aren't TRULY TRULY secure since it
IS POSSIBLE to change certain values
in multiple places within the original
file in such a way so that the hash value
REMAINS THE SAME as what was distributed.
BUT...only a state-level actor (i.e. only a big
government with LOTS computing horsepower
could figure out WHICH bytes to change or leave
alone to ensure any given hash function algorithm
outputs the original hash value!)
There's a lot of numeric theory which I won't
get into now but hash functions and CRC
(Cycle Redundancy Check) are one of a FEW
methods to ensure a LARGE data file is proveably
kept free from corruption and modification.