It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Some Hints:
- You can't open it in notepad/Word or anything else to peek inside. That's the whole reason encryption was created - to hide info from being easily discovered.
- If you don't even know what program to use to try and guess a key, you will get nowhere with this!
- If you don't know how to use Linux, just stop now.
- If you have never used encryption, just stop now. (Unless you are prepared to do research and learn a lot before posting)
Salted__Þsïó^9ÚúHS[mÂ?4b /
ŽÿŠ5àÅJ?fníÈ?
I$?Eäóx?TÓŠa
öõí%%Ijó?Ç?ä?Ô?Öses#??Ðk?b??m@vL??Õü\âvE 2NºI3àm8?ÙRŸØRæxÇÿÊIl??ÝwE??EîH
Øéù[5[UÌ8?ì?%8D?ûmÂÍô7[?|kôîìà?J?Új?0EïiC)Híe?ýmKκkùÐR?Œta.ZH?ú]??\?Ê06RD?µ?ê???ÝO?g ?º#þGÄýá?ÜÉ??:' hpµñïªÊ?uGsÂ?Ä.îÛ?*
ø?:`?SU?ï+Ps-Kp)Ý?qIs_JodÚÌ6??Õ*,ä?@k?cåÏ
Originally posted by freedommusic
Ok, I received a reply to my email from WikiLeaks.
It reads:
---
Hang in there , you almost got it!
Best ones :-)
---
It would appear to me that they WANT this file cracked.
Originally posted by JBA2848
Salted__Þsïó^9ÚúHS[mÂ?4b ...
That is a little of the file. It is still encrypted. The first line salted means encrypted followed by the encrypted password. You could reverse engineer the orginal software to reverse the encryption then finding the password.
[edit on 2-8-2010 by JBA2848]
Originally posted by JBA2848
reply to post by CommandoJoe
That is a little of the file. It is still encrypted. The first line salted means encrypted followed by the encrypted password. You could reverse engineer the orginal software to reverse the encryption then finding the password.
[edit on 2-8-2010 by JBA2848]
Originally posted by freedommusic
When extracted it will be an order of magnitude larger.
If everything is legit. eg: It's aes256 encrypted and 7zip compressed and there is all valid content inside.
Right now I have no reason to think otherwise.
Originally posted by dudez
Originally posted by freedommusic
Ok, I received a reply to my email from WikiLeaks.
It reads:
---
Hang in there , you almost got it!
Best ones :-)
---
It would appear to me that they WANT this file cracked.
I'm curious, did you let them know you tried with ONION, ROUTER and such?
Originally posted by JBA2848
Salted__Þsïó^9ÚúHS[mÂ?4b ...
That is a little of the file. It is still encrypted. The first line salted means encrypted followed by the encrypted password. You could reverse engineer the orginal software to reverse the encryption then finding the password.
[edit on 2-8-2010 by JBA2848]
Are you sure? I tought "Salted__", the first 8 bytes, was the "magic number", the following 8 bytes should be the salt (DE181B73EFF35E39), the real encrypted data should starts at offset 0x10h.
Originally posted by misinformational
Originally posted by freedommusic
When extracted it will be an order of magnitude larger.
If everything is legit. eg: It's aes256 encrypted and 7zip compressed and there is all valid content inside.
Right now I have no reason to think otherwise.
Depends on what is being compressed. Zipped compression ratios vary for type of data being compressed.
Also consider that there could multiple layers of security (i.e. encryption) that add to the size of encrypted file.
In short, attempting to guess the contents of our beloved "insurance file" would be exactly that, only a guess and purely speculation.
Originally posted by JBA2848
The encryption is in the header. Like on a cd dvd. They use programs like cdroller to bypass the damaged sector to record whats on the disk if the hidden sector is damaged. The hidden sector is where drm rights and encryption data is stored. But in this case the hidden sector shows the password encrypted so the data inside can be decrypted. The program used to encrypt uses a algorithm unique to that software. If you know what encrypted it you can reverse there algorithm and do a cdroll to get the encrypted password then run it through the reverse of the algorithm to get the password. Cracking and reverse engineering is how video games are hacked. Thats where Daemon comes in.
Originally posted by JBA2848
The encryption is in the header. Like on a cd dvd. They use programs like cdroller to bypass the damaged sector to record whats on the disk if the hidden sector is damaged. The hidden sector is where drm rights and encryption data is stored. But in this case the hidden sector shows the password encrypted so the data inside can be decrypted. The program used to encrypt uses a algorithm unique to that software. If you know what encrypted it you can reverse there algorithm and do a cdroll to get the encrypted password then run it through the reverse of the algorithm to get the password. Cracking and reverse engineering is how video games are hacked. Thats where Daemon comes in.
Ok, I received a reply to my email from WikiLeaks. It reads: --- Hang in there , you almost got it! Best ones :-) --- It would appear to me that they WANT this file cracked.
Originally posted by nonamousely
I know I come off as pretty crazy. To be honest I've been involved in another forum that has completely gone the way side. They used to care about things that ATS is talking about.
Originally posted by nonamousely
I am not trying to push an agenda.
Originally posted by nonamousely
Right now, the head of the DoD, Robert Gates and the JCoS Adm. Mullen both released statements recognizing Wikileaks as legitimate. This, to me, is profoundly against our national policy of dealing with autonomous people that have something that we want. We usually see terrorists holding hostages and they make demands and we say "We don't negotiate with terrorists."
Originally posted by nonamousely
Now, we have an Australian, long time hacker, telling the United States of America to come clean about what they have done.
Originally posted by nonamousely
He does not represent any state, or faction, or even a terrorist group. Instead he represents a group of people who believe in anonymity over the Internet.
Originally posted by nonamousely
None of this raises any flags to you?
Now, for a second, just think of what the best way to collect the world's secrets would be? I think I can tell you how I would do it.
Originally posted by nonamousely
Next move is waiting until you catch the big one. Once you do make the catch, you release it in an agenda driven form.
Originally posted by nonamousely
We aren't seeing the diplomatic cables,
Originally posted by nonamousely
nor the Iraq war tracking, but instead... the Afghan Diary, which in itself has been heavily edited into browseable format and missing a quarter of it's original documents.
Originally posted by nonamousely
To the public (and the 3 newspapers), simply because if it's size and scope it seems sensational.
Protocol 1 (Additional to the Geneva Conventions, 1977) article 51 (Protection of the Civilian population)
4 Indiscriminate attacks are prohibited. Indiscriminate attacks are:
1. those which are not directed at a specific military objective;
2. those which employ a method or means of combat which cannot be directed at a specific military objective; or
3. those which employ a method or means of combat the effects of which cannot be limited as required by this Protocol; and consequently, in each such case, are of a nature to strike military objectives and civilians or civilian objects without distinction.
As of 8 June 2007, it had been ratified by 168 countries[1], with the United States, Israel, Iran, Pakistan, Turkey, and Iraq being notable exceptions. However, the United States, Iran, and Pakistan signed it on 12 December 1977 with the intention of ratifying it. According to an appeal by the International Committee of the Red Cross in 1997, a number of the articles contained in both protocols are recognized as rules of customary international law valid for all states, whether or not they have ratified them.[2]
Originally posted by nonamousely
However, any person who has been following the war was not able to bring any new issues to light with the release of these leaks (sort of the whole point behind "leaking" although transparency could be a solid motive as well.)
Originally posted by nonamousely
Assange is making money, that much we know.
Originally posted by nonamousely
Hosting a server in a northern European state to collect intel secrets on the world and potentially collect our intel that we never wanted to get out. Seems at least highly plausible.