It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Originally posted by donttellthefeds
has anyone tried reston5 as the password ????? or something along those lines, i have tried doing it but i am not very compitant.
Originally posted by Itop1
OK!!, somebody i know accessed the file (please take note i did not say he cracked the file!), 4 hours later he gets taken away, dont know who by, dont know where, this was about 4 hours after he access the file, i really dont think they give a # if you download it, after all the file is protected so people cant access it.
Originally posted by Unclerayray3000
Can anyone break this down barny style for me? Whats happening to wikileaks? did someone shut it down? What does the torrent hold in it? What do we do with that info after we DL it? I'm sorry guys I just don't really understand whats goin on...
Originally posted by fraterormus
Originally posted by donttellthefeds
has anyone tried reston5 as the password ????? or something along those lines, i have tried doing it but i am not very compitant.
I just did for you. "reston5" can be confirmed as not being the password, it throws a "bad decrypt" error.
Also, for those that question whether the file on the torrents is the same as the file originally released...
I used the following:
www.torrentdownloads.net...
Torrent added: 2010-07-28 22:21:03
Last Updated: 2010-07-29 21:01:07
This file which I downloaded last night gives the following hash/sha1sum:
SHA1(insurance.aes256)= cce54d3a8af370213d23fcbfe8cddc8619a0734c
This matches the hash/sha1sum of the original file released on 29 July 2010, meaning it is the precise same file. If one character had been changed it wouldn't match.
(Again, this is presuming that the NSA doesn't have a backdoor to decrypt AES encrypted files, modify the contents and pad them to match the original hash/sha1sum...which in theory is impossible to do.)
Originally posted by Mak Manto
If that's true, that they're checking everybody who downloaded the file and who opens it, then we live in a more screwed up world then I thought.
But how would they know if you opened up the file?
Originally posted by randomer
reply to post by ImaginaryReality1984
I live in the UK i downloaded this file. I really dont think the police or anyone else are going to come knocking at my door.
Originally posted by Spartannic
maybe this is a test tptb are doing to findou if someone can get into that encrytion...
This would be the second line ,if i had more to say about this
Originally posted by THE_PROFESSIONAL
Another method to release the password would be a deadmans type of switch. Julian would have to log into a program or website every day and if he missed a day the computer would release the password to the entire world.
Or maybe something related to Skynet.
Originally posted by fraterormus
Originally posted by donttellthefeds
has anyone tried reston5 as the password ????? or something along those lines, i have tried doing it but i am not very compitant.
I just did for you. "reston5" can be confirmed as not being the password, it throws a "bad decrypt" error.