It looks like you're using an Ad Blocker.

Please white-list or disable AboveTopSecret.com in your ad-blocking tool.

Thank you.

 

Some features of ATS will be disabled while you continue to use an ad-blocker.

 

WikiLeaks Posts Mysterious 'Insurance' File

page: 27
150
<< 24  25  26    28  29  30 >>

log in

join
share:

posted on Aug, 2 2010 @ 04:13 PM
link   

Originally posted by freedommusic

Here is the entire response email w/ my original email quoted.

--------
Hang in the (my name), you almost got it!

Best ones


WikiLeaks

On Sun, Aug 01, 2010 at 11:12:16PM +0100, (my name) wrote:
> > Am I getting closer?
> >
> > --------
> > #AES PASSWORD == ONION
> > $ openssl enc -d -aes256 -in insurance.aes256 > out_ONION_AES.dec
> >
> > #BF PASSWORD == ROUTER
> > $ openssl enc -d -bf -in insurance.aes256 > out_ROUTER_BF.dec
> >
> > #BF PASSWORD == ONION
> > $ openssl enc -d -bf -in insurance.aes256 > out_ONION_BF.dec
> > --------
--------


Oh the fun it would be as a WL staff member - if only.



posted on Aug, 2 2010 @ 04:19 PM
link   

Originally posted by JBA2848
reply to post by CommandoJoe
 


If it wasn't that easy you wouldn't have cracked wares. You wouldn't have copied cds or dvds. You wouldn't have piracy on the internet. Nobody cares when its just a cd, video game or some over priced software. But now the government is coming down on them and those same ones who were ignored are now a problem. The science behind what those crackers were doing is now being turned on the government.


You're comparing apples and oranges - Software, music, dvds, and video games are a commercial product that many people use. Any protection that they use has to be able to be used by many people with different serial #'s or hardware players. Due to the ability to be easily used by the customer, the trade off is that they are not as secure as a single encrypted file that has ONE valid key.

In order for a video game/program/music cd, to use encryption similar to this file, every single disc/file would have to be individually encrypted with a different key. Meaning that unlike most software being able to install with many different keys, this hypothetical program would only work with the key it was designed for. And then, rather than being able to make a master disc and stamp them out very quickly for $0.10 each, they would have to burn each one separately increasing costs and production time exponentially... The techniques you are talking about work because there are multiple valid keys. That is not the case here.

I'm not saying there is no way to hack AES-256, but it hasn't happened yet. And there are people working on it. Some people actually do that for fun - I think they need to get out more...


The previous encryption standard that the US gov used (DEC) was designed in the 1970's, and it took 20+ years before it was able to be cracked, and that was only due to computer speed increasing so much to make a brute force attack feasable.

I suggest you forget everything you know about warez, keygens, and other l33t stuff and do some research on AES-256 before guessing any more...



posted on Aug, 2 2010 @ 04:36 PM
link   
I still think that by this method they could have just hidden a simple link.
Can you imagine a bit[.]ly one?


[edit on 2-8-2010 by dudez]

[edit on 2-8-2010 by dudez]



posted on Aug, 2 2010 @ 04:40 PM
link   
These encryption schemes are based on one way functions. Functions that are not feasibly reversible. You wouldn't want to use them for speed sensitive tasks.

RSA for example is based on the difficulty of factoring large numbers. No known algorithm (yet) is sufficiently more efficient at factoring than the ease of increasing the size of the number to be factored.



posted on Aug, 2 2010 @ 04:40 PM
link   
Its likely the people who would be incriminated by the contents of the file already know whats in it. They are likely to have been told. It wouldn't work as a deterrent otherwise. That would be a bit like building the secret Russian doomsday bomb from Doctor Strangelove.

That said, if somebody here or elsewhere decrypts it the secret would be out and it has no more deterrent value. May as well kill them.

Likewise if somebody decrypts it and it contains daffy duck cartoons, their bluff is a bust and their deterrent credibility is shot. May as well kill them.

Of course I could be wrong, happy decrypting.



posted on Aug, 2 2010 @ 04:53 PM
link   
reply to post by dudez
 


Try this. Im not sure if it will work?

RijndaelManaged RijndaelCipher = new RijndaelManaged();

byte[] EncryptedData = packet.Bytes;
byte[] Salt = new byte[5];//UNKNOWN;

PasswordDeriveBytes SecretKey = new PasswordDeriveBytes(EncryptedData, Salt);

// Create a decryptor from the existing SecretKey bytes.
ICryptoTransform Decryptor = RijndaelCipher.CreateDecryptor(SecretKey.GetBytes(32), SecretKey.GetBytes(16));

MemoryStream memoryStream = new MemoryStream(EncryptedData);

// Create a CryptoStream. (always use Read mode for decryption).
CryptoStream cryptoStream = new CryptoStream(memoryStream, Decryptor, CryptoStreamMode.Read);

// Since at this point we don't know what the size of decrypted data
// will be, allocate the buffer long enough to hold EncryptedData;
// DecryptedData is never longer than EncryptedData.
byte[] PlainText = new byte[EncryptedData.Length];

// Start decrypting.
int DecryptedCount = cryptoStream.Read(PlainText, 0, PlainText.Length-4);

memoryStream.Close();
cryptoStream.Close();

// Convert decrypted data into a string.
string DecryptedData = Encoding.Unicode.GetString(PlainText, 0, DecryptedCount);



posted on Aug, 2 2010 @ 05:05 PM
link   

Originally posted by Illusionsaregrander

You dont come off as crazy at all. You come off as someone trying to sound like a conspiracy theorist who is rather bad at it. But, at least, your level of approach is slightly more intelligent than some of the yahoos they throw at us.


Sorry, for being bad at a conspiracy. I just can't get away from the impression that the mainstream media is so ignorant to all off this. I feel for the first time that the public at large is being fed a lot of disinformation real time. We could be at the cusp of major reform. I am generally very excited over all of this and I think I let my enthusiasm make me appear naive.


Well, actually, you are. And, that agenda, coincidentally, is the same one being pushed at the American people in virtually all media. Even that targeted at non-conspiracy theorists. You are just using the conspiracy option for this website. Your bottom line is, "Wikileaks is dangerous and cant be trusted." Its the same bottom line as the governments bottom line being pushed by the MSM, only tailored for conspiracy theorists.


I am up in the air over Wikileaks. I don't want to say they can't be dangerous. Assange I'm sure has a better handle on the situation then I do. What I am saying is that the NYT never questioned the validty of the documents. That is not good journalism.


Wikileaks does not target the US. It will leak any data it is sent, about any nation. In this case, they received a big leak about the US. The fact that he is a long time hacker doesnt make him less credible. It might if he were a cracker, who hacked just to show his stuff so that the PTB would pay him, (like Lamo) but he isnt. He has a demonstrated past of ethically motivated behavior, not profit driven behavior.


I read through a couple hundred e-mails of Assange. He isn't really a cracker but he is heavily involved in a group of people that only communicate via PGP. He is one smart individual and I want to believe he is out for the greater good. This is one point I humbly agree with you with due to his record.


Is that what they believe in? Anonymity? Because the best way to be anonymous over the internet is not to start a website that stirs up the worlds leaders. They believe in providing information that is being withheld from the worlds people, and they offer anonymity to the leakers for their protection to accomplish that end. The "faction" they represent is the majority of the worlds people. Us, the nameless, faceless peons who are chess pieces on the world board, but who, through lack of information, cannot actually move the pieces in a meaningful way, even though many of us live in "democracies."


Yes, the anonymity I speak of is the most influential idealogy that he and his group operate by. Nothing goes uncrypted besides their anonymous remailer service. They know the government can spy on it's people through the web and see it as the ultimate threat to our freedoms. Wikileaks gives the ability of the people to do the same. However, if this was a false flag, it was done perfectly because they now know how to make the security tighter and can begin to scrutinize all web traffic to wikileaks from the god knows many people are monitoring it as we speak.



posted on Aug, 2 2010 @ 05:07 PM
link   

Originally posted by JBA2848
reply to post by dudez
Try this. Im not sure if it will work?


YOU need to prove your own argument, not me.
hint: copy-pasting from here won't help you much



posted on Aug, 2 2010 @ 05:10 PM
link   
reply to post by JBA2848
 


I have to say, your naivete is risible.


You've been informed already as to the herculean nature of the task to which you now so earnestly apply yourself. Perhaps you will learn something of far greater value than anything you might find in the file upon which you labor so furiously -- humility.

Good luck!



posted on Aug, 2 2010 @ 05:11 PM
link   
reply to post by dudez
 


www.reverse-engineering.net...
Came from here.



posted on Aug, 2 2010 @ 05:28 PM
link   

Originally posted by Smack
reply to post by JBA2848
 


I have to say, your naivete is risible.


You've been informed already as to the herculean nature of the task to which you now so earnestly apply yourself. Perhaps you will learn something of far greater value than anything you might find in the file upon which you labor so furiously -- humility.

Good luck!



No doubt man.

Can't believe he still trying. lol.

and not listening or paying attention.


[edit on 2-8-2010 by Ahmose]



posted on Aug, 2 2010 @ 05:28 PM
link   

Originally posted by JBA2848
Came from here.


Ok, but again, this proves you are in the wrong direction.



posted on Aug, 2 2010 @ 05:33 PM
link   
reply to post by JBA2848
 


No, dude,
it will not work
nothing you do,
will work.
that is how it is, just accept it..
you arent even on the right path.
Sorry.


and I cant believe WL replied in the email "you almost got it!".

kinda funny though, nice to see their sense of humor. . lol

[edit on 2-8-2010 by Ahmose]



posted on Aug, 2 2010 @ 06:13 PM
link   
reply to post by Ahmose
 

So your advice is to not bother searching for the truth and leave it to the experts. What are you even doing on this forum?



posted on Aug, 2 2010 @ 06:23 PM
link   
reply to post by eggcartonfiber
 


lol, uhmm... right.
no, actually that is not my advice.

but if that's what you want to take from it, be my guest!


But if people repeatedly tell you your doing something wrong,
and you dont care to listen, and keep doing it anyway..
then wth? what truth will be found that way?

Your better off spending that time actually learning how you might go about it, instead of just "playing hacker". lol
You'll be there for eons, and never find any truth.

what?



[edit on 2-8-2010 by Ahmose]



posted on Aug, 2 2010 @ 06:42 PM
link   
reply to post by Ahmose
 

Sure, but there is no harm in plugging away with a dictionary file and it is self-defeating to assume the crypto is well-implemented (for example, Enigma operators using names of girlfriends or german obscenities) and to say there's no point in trying.



posted on Aug, 2 2010 @ 06:47 PM
link   

Secret killing program is key in Iraq, Woodward says

"I would somewhat compare it to the Manhattan Project in World War II," he said "It's a ski slope right down in a matter of months, cutting the violence in half. This isn't going to happen with the bunch of joint security stations or the surge."

The top secret operations, he said, will "some day in history ... be described to people's amazement."

cnn.com



Mind = Blown

Thanks for that. I love this thread.



posted on Aug, 2 2010 @ 06:50 PM
link   
reply to post by chips
 


Oh, how right you are.

This little tidbit of information exposed within this thread has been grossly under analyzed.

[edit on 2-8-2010 by misinformational]



posted on Aug, 2 2010 @ 07:15 PM
link   
I had heard it hinted about YEARS ago - that high level defence contractors were looking at ways to quantify human interactions through email, online communications, ect.

At the time, I thought it was some anomaly based system, like comparable with an anomaly based IDS. The person I was talking with would not grant me any further details.

But in the last couple of days I'm seeing that it was so much more than that. Its like communications are a great BIG knot. Suddenly I can see into it so that every string is a number going into this knot hash function. I see that within the knot are many smaller tangles.

Each tangle is made of threads of different thicknesses and strengths.

Suddenly I can analyze which ones are causing the tangles to form into a knots. Sometimes it is the thinnest, weakest threads that cause the tangles to form.

In the future, when the threads start crawling into knots, I can just kick certain weak threads offline, kill their processes. And I can guide certain strong threads into an orderly braid of my own design.

It blows my mind. I know this might sound obscure, but that's how the manipulation is working. That's why the govt is so interested in social networks.

The religious right has a big section that hates homosexuality. Suddenly Manning only did it because he was gay - and OMG he even wanted a sex change operation.

A lot of people understand SUPPORT OUR TROOPS, LOYALTY TO THE CAUSE, so boom, this puts our national security at risk.

A lot of people are just plain busy. SO BOOM, this is old information, nothing to see here, move along.

What string has to be pulled to take me out?

I don't want to be on the wrong side.

[edit on 2-8-2010 by hadriana]



posted on Aug, 2 2010 @ 07:42 PM
link   
reply to post by hadriana
 


Your post is intriguing. Perhaps even insightful.

A few questions:


In the future, when the threads start crawling into knots, I can just kick certain weak threads offline, kill their processes. And I can guide certain strong threads into an orderly braid of my own design.


Do you view this thread as knotting? If so, whereupon? And in what direction would you have led it?


It blows my mind. I know this might sound obscure, but that's how the manipulation is working. That's why the govt is so interested in social networks.


In what manner is the government interested in social networts - i.e. how would you suspect they are manipulating communication within?



[edit on 2-8-2010 by misinformational]




top topics



 
150
<< 24  25  26    28  29  30 >>

log in

join