It looks like you're using an Ad Blocker.

Please white-list or disable AboveTopSecret.com in your ad-blocking tool.

Thank you.

 

Some features of ATS will be disabled while you continue to use an ad-blocker.

 

WikiLeaks Posts Mysterious 'Insurance' File

page: 22
150
<< 19  20  21    23  24  25 >>

log in

join
share:

posted on Aug, 1 2010 @ 06:55 PM
link   
I've heard a lot of people on ATS claiming he/wikileaks is a plant.

Could someone who believes this please explain to how they came to this conclusion? With all the press he is getting he seems pretty damn hot for a plant, doesn't make any sense to me at all!



posted on Aug, 1 2010 @ 07:05 PM
link   
I just wrote a shell script that will iterate through all the known keys and ciphers and save files that openssl returns 0 - no error.

This will probably take a while to complete ...

We'll see if anything valid is output.



posted on Aug, 1 2010 @ 07:07 PM
link   

Originally posted by crezo
I've heard a lot of people on ATS claiming he/wikileaks is a plant.

Could someone who believes this please explain to how they came to this conclusion? With all the press he is getting he seems pretty damn hot for a plant, doesn't make any sense to me at all!


Just that, he's getting all this press, his partner quit because of their amassing of funds, he doesn't believe 9/11 was a conspiracy, and.. well.. look for yourself, that's how it works, no on can convince you, you must look and find, and assess.



posted on Aug, 1 2010 @ 07:08 PM
link   
crezo~ he's not a plant,
that's just an accurate representation of the paranoia that is at ATS. lol
i do think i see through most BS,
and i don't feel anything but goodness from him. lol


nah, who knows,
i dont think he is though.

he is still doing lots of good right now, either way.

[edit on 1-8-2010 by Ahmose]



posted on Aug, 1 2010 @ 07:20 PM
link   
It does appear that openssl is supposed to return an error message if you give it an incorrect password. It is easy to encrypt a small file and try different wrong passwords.

I suppose that a select few wrong passwords can cause openssl to decrypt the entire file, but produce garbage. However, I could only find evidence of this in this thread and at ubuntuforums.org....

Can anyone say where or how they found ONION and the other passwords?



posted on Aug, 1 2010 @ 07:30 PM
link   
Gah I wish I was good at making scripts period. Freedommusic could you post that script so that everyone can do it, maybe make a collaboration on it?



posted on Aug, 1 2010 @ 07:45 PM
link   
Here is my script (still running)

--------
#!/bin/sh

pws=(ONION ROUTER Tor ONIONROUTER ONIONROUTERTor);

names=(aes-128-cbc aes-128-ecb aes-192-cbc aes-192-ecb aes-256-cbc
aes-256-ecb base64 bf bf-cbc bf-cfb
bf-ecb bf-ofb cast cast-cbc cast5-cbc
cast5-cfb cast5-ecb cast5-ofb des des-cbc
des-cfb des-ecb des-ede des-ede-cbc des-ede-cfb
des-ede-ofb des-ede3 des-ede3-cbc des-ede3-cfb des-ede3-ofb
des-ofb des3 desx rc2 rc2-40-cbc
rc2-64-cbc rc2-cbc rc2-cfb rc2-ecb rc2-ofb
rc4 rc4-40 rc5 rc5-cbc rc5-cfb
rc5-ecb rc5-ofb );

mkdir -p outfiles;

for pass in $[pws[@]]
do
for name in $[names[@]]
do
of=outfiles/out_"$pass"_$name.dec;
openssl enc -d -$name -in insurance.aes256 -out $of -pass pass:$pass;
if [ $? -ne 0 ]; then
rm -f $of;
else
echo GOOD: $of;
fi
done
done

exit 0;



posted on Aug, 1 2010 @ 07:51 PM
link   
> Can anyone say where or how they found ONION and the other passwords?

Well in this thread someone posted the word "ONION" in quotes.

So I tried it just for the heck of it ...

I didn't get an error.

Then someone else on this thread posted about Tor and how it meant ONION ROUTER. How this is the technology WikiLeaks uses.

So then I tried ROUTER using Blowfish Cipher.

and it worked.

Then we started scratching our heads.

So that's pretty much how we arrived where we are now.



posted on Aug, 1 2010 @ 07:52 PM
link   
reply to post by freedommusic
 


Has anybody thought that maybe tor must be installed and the required ports open on your pc. Tor is used as a ip location verifier. Tor sends out your ip to check on external database to compare to ips allowed access to the file.

Might have to spoof your own pc ip in order to appear as a authentic user. That ip could be military or government ip even could be wikis.

[edit on 1-8-2010 by JBA2848]



posted on Aug, 1 2010 @ 07:57 PM
link   

Originally posted by JBA2848
reply to post by freedommusic
 


Has anybody thought that maybe tor must be installed and the required ports open on your pc. Tor is used as a ip location verifier. Tor sends out your ip to check on external database to compare to ips allowed access to the file.

Might have to spoof your own pc ip in order to appear as a authentic user. That ip could be military or government ip even could be wikis.

[edit on 1-8-2010 by JBA2848]


Previous to this thread, I knew squat about Tor.. I've been impressed with its engineering from what I've learned the past couple days - just sayin'-



posted on Aug, 1 2010 @ 07:58 PM
link   
reply to post by Ahmose
 


You think we're paranoid on ATS?
Try the spy world.

I think this quote from Cryptome sums it up for me.



The security watchword is: don't ever expect infallible security, that is always snail oil. The intelligence watchword is never trust an intelligence source, they are all unreliable. The classification watchword is never trust the highest classification, that is bullshovel to dupe those who believe only they have access.
The sysadmin watchword is ... lay low, log everything, copy, replace with a fake, tell no one especially another sysadmin who will rat you: l'enfer, c'est les autres.



posted on Aug, 1 2010 @ 07:58 PM
link   
Its going down in a heatr beat, what, all you conspiracy buffs assumed that a minor or isp dependent can take on a single world power. I think it's time that posters re evaluated the term "deny Ignorance"

Hello.



posted on Aug, 1 2010 @ 08:00 PM
link   
People read up on your cryptography before getting all excited, all it means when openssl barfs at a key you give it is that it has issues processing the padding (look up PKCS#5 padding on google) the odds of getting an error when decrypting with a wrong key is slightly above 1 in 256. Thats why there are so many keys 'that work' (if you don't belive me fetch the source code of openssl and look for your self)

Open ssl doesn't (want to) know when you enter the 'correct' key its just running the input though an algorhitm and therefore not getting an error doesn't mean your key is 'good' it just means the last byte in the file is probably a 0x00 not making the padding code unhappy.

as for bruteforcing this (problem 1 ofcourse is how do you know when you have the correct key, since we have no idea about the plaintext) distributed.net has been going at an rc5-72 key (which is a significant faster algorhitm then aes) for 2799 days (done 0.947% of the keyspace) and predicts it needs atmost 47,429 days (about 133 years) to search the complete keyspace. Now lets for the sake of argument lets assume aes and rc5 as just as fast (which they are not) for every bit above 72 (thats 184) multiply those 133 years by 2.
Giving us 133 * (2^184) = 3261150510962611490586562473775857942740676852006705430528 *YEARS*

Even if computing power 100.000 folds in the next few years the odds of bruteforcing this before the universe ends are still virtually *ZERO*

If you don't belive any of what I tell you and still convinced you guessed the correct key since you are not getting an error, do your on research, encrypt a picture of your dog or cat with openssl then try random passwords to see how many don't produce an error and how many of those actually reproduce your orginal picture of your adorable pet.

sorry to crush your hopes and dreams but a little reality check was needed in this thread.



posted on Aug, 1 2010 @ 08:01 PM
link   
The password is not ONION or ROUTER or any of the suggested alternatives. OpenSSL only does very basic validity checking - it only checks the padding of the decrypted data. What this means in practice is that one in every 256 wrong passwords will seem valid to OpenSSL and not produce any error message. As an example, try this:

openssl enc -d -aes256 -in insurance.aes256 -pass pass:heyabovetopsecretthepasswordisnotonion149 > insurance.out

Definitely not the correct password, but it doesn't give any error.



posted on Aug, 1 2010 @ 08:05 PM
link   
Seriously know, people within 2010 assume they are able to hide....it does not happen but its allowed for obvious reasons. Whats the term for disclosing national security...life perhaps ?






posted on Aug, 1 2010 @ 08:05 PM
link   
reply to post by JBA2848
 


I suppose you could have a point.
Wikileaks does have links up that you can only connect to with their version of Tor.

To upload a document anonymously using tor

When you have installed our Tor access package (see below), you may then connect to Wikileaks via our anonymous address (the ".onion" is short for "Onion Routing", but you do not need to be concerned with this detail). Then whenever you want to establish an encrypted anonymous (even to internet spies) connection to Wikileaks goto our magic link:
http: // gaddbiwdftapglkq.onion/ (this link will only work once you have installed and configured Tor.) http: // www.__._/wiki/WikiLeaks:Tor


[edit on 8/1/10 by makeitso]



posted on Aug, 1 2010 @ 08:25 PM
link   
> The password is not ONION or ROUTER or any of the suggested alternatives.
> OpenSSL only does very basic validity checking - it only checks the padding of the
> decrypted data. What this means in practice is that one in every 256 wrong
> passwords will seem valid to OpenSSL and not produce any error message.

Yup, makes sense to me ...

I knew something wasn't right when different keys would not return an error code.

Can someone point me to some documentation that explains this behavior in opessl?

Thanks for the info!



posted on Aug, 1 2010 @ 08:32 PM
link   

Originally posted by ymgve
The password is not ONION or ROUTER or any of the suggested alternatives. OpenSSL only does very basic validity checking - it only checks the padding of the decrypted data. What this means in practice is that one in every 256 wrong passwords will seem valid to OpenSSL and not produce any error message. As an example, try this:

openssl enc -d -aes256 -in insurance.aes256 -pass pass:heyabovetopsecretthepasswordisnotonion149 > insurance.out

Definitely not the correct password, but it doesn't give any error.


ymgve mind if I ask how you found that password? Did you attempt decrypting 149 times?


[edit on 1-8-2010 by mikeATSuser]



posted on Aug, 1 2010 @ 08:36 PM
link   

Originally posted by IAMNOTWHOITSAYSIAM

Even if computing power 100.000 folds in the next few years the odds of bruteforcing this before the universe ends are still virtually *ZERO*

If you don't belive any of what I tell you and still convinced you guessed the correct key since you are not getting an error, do your on research, encrypt a picture of your dog or cat with openssl then try random passwords to see how many don't produce an error and how many of those actually reproduce your orginal picture of your adorable pet.

sorry to crush your hopes and dreams but a little reality check was needed in this thread.




I'm with ya, homie. lol
it is pointless to even attempt this.
I will just hold the file, in numerous locations until/if the key is ever given. lol

but if this file is for what i think it's for..
it would be best for all of us if the key is not given.

if the key is not given..
then everything worked how it should have. lol



posted on Aug, 1 2010 @ 08:52 PM
link   
[edit to remove]
Re-read thread and found dups earlier



[edit on 1-8-2010 by LookingIn]







 
150
<< 19  20  21    23  24  25 >>

log in

join