It looks like you're using an Ad Blocker.

Please white-list or disable AboveTopSecret.com in your ad-blocking tool.

Thank you.

 

Some features of ATS will be disabled while you continue to use an ad-blocker.

 

WikiLeaks insurance password (possibly) incoming!

page: 15
139
<< 12  13  14    16  17  18 >>

log in

join
share:

posted on Oct, 20 2010 @ 03:09 PM
link   

Originally posted by tothetenthpower
reply to post by jaynkeel
 


Unless some form of tracker exists within the files that sends your info to another machine, then no it's not possible.

The work around is easy though, just don't connect to the internet when you open the file.

~Keeper


So pretty much as I guessed no need to fearmonger and worry about men in black picking people up. Great news man thanks!!!



posted on Oct, 20 2010 @ 03:10 PM
link   
reply to post by boondock-saint
 

I know that proper nouns/names are capitalized, but as I pointed out, using the name "Reston" could be a deliberate ploy and it could be that it is to be read differently.

Regards,

Mike



posted on Oct, 20 2010 @ 03:15 PM
link   
reply to post by Aggie Man
 

That's clever. (Seriously. Not being sarcastic). What about replacing the "5" by a V and then seeing what is produced? Would not be unheard of to use a Latin numeral in the place of an Arabic one.

Mike



posted on Oct, 20 2010 @ 03:19 PM
link   
reply to post by jaynkeel
 


Nah, not fear mongering, a legitimate question and concern if you have any knowledge of computer tracking capabilities these days
.

Most of the time, the people who get caught, are the ones who didn't take that one precaution.

~Keeper



posted on Oct, 20 2010 @ 03:22 PM
link   
this code is probably an internal code, if it was the password they would just write the damn password

since they said previously that the password could be released or something like that



posted on Oct, 20 2010 @ 03:24 PM
link   

Originally posted by JustMike
reply to post by Aggie Man
 

That's clever. (Seriously. Not being sarcastic). What about replacing the "5" by a V and then seeing what is produced? Would not be unheard of to use a Latin numeral in the place of an Arabic one.

Mike


Replacing "five" with "V" I have come up with "Activator Events" and plenty of others that don't make a coherent statement.



posted on Oct, 20 2010 @ 03:27 PM
link   
Might be worth considering some sandbox software. I run a program called "Sandboxie" that lets me check out suspect files while limiting the risk to my computer. In fact I always browse using a "sandboxed" browser as well.

The other option, if you have disk space and access to some "virtual machine" software, is to have a "virtual" install of Windows/Linux/etc. Imagine running a complete copy of Windows inside your current Windows. It can be completely isolated from your actual install. If it goes wrong, gets infected etc, you just delete the copy.

There are open source (ie free) versions of both software available. Useful tools to have.



posted on Oct, 20 2010 @ 03:33 PM
link   
reply to post by EvillerBob
 


My personal favorite, is VirtualBox. used to be SUN, now its Oracle. but still free.



posted on Oct, 20 2010 @ 03:37 PM
link   
Just an Idea
Reston = part of DC
DC = DataCenter
Activate (servers/whatever/team) in D(ata)C(enter) 5 ?



posted on Oct, 20 2010 @ 03:38 PM
link   
Thnx everyone for explaining the Hash-issue, appreciate that.

Since I'm quite a noob, what program should open this file?
And where can you enter passwords to decrypt the file?

Thanks in advance!



posted on Oct, 20 2010 @ 03:46 PM
link   
(removed as the info I posted was old)
edit on 20-10-2010 by harrytuttle because: old info



posted on Oct, 20 2010 @ 03:47 PM
link   
reply to post by Enthropy
 





Since I'm quite a noob, what program should open this file? And where can you enter passwords to decrypt the file?


There's a bunch of programs that will do the trick. If you're running Windows you can use OpenSSL, Winzip & 7Zip to name a few.

If Linux, OpenSSL is probably your best bet. I think the file was actually encrypted using this although you can decrypt with any program that can handle AES-256 decryption.

Hope that helps.



posted on Oct, 20 2010 @ 03:50 PM
link   

Originally posted by harrytuttle
This just posted on the WikiLeaks Twitter feed:

WikiLeaks communications infrastructure is currently under attack. Project BO move to coms channel S. Activate Reston5.
less than 20 seconds ago via web

Could "Project BO" have something to do with Barack Obama?

edit on 20-10-2010 by harrytuttle because: (no reason given)


That message has been up ALL day pretty much... but no updates since they posted "Leaked reports detail Italian black ops in Afghanistan"



posted on Oct, 20 2010 @ 03:51 PM
link   
this is coded instruction to people that know what is going and what to do
and file from last night is downloaded at least 4000 times around the world, and men in black can do something against this only in US



posted on Oct, 20 2010 @ 03:51 PM
link   



EDIT: Nevermind my post, apparently this was posted a while ago, I wonder why the page says "less than 20 seconds ago"?
edit on 20-10-2010 by harrytuttle because: (no reason given)


Good point..... hmmmmmm.



posted on Oct, 20 2010 @ 03:53 PM
link   
Sorry ATSers i had to skip a few posts but here is my idea:
"WikiLeaks communications infrastructure is currently under attack. Project BO move to coms channel S. Activate Reston5."
Might be some sort of code (i'm assuming you guys brought this up) for the password of the encryption.

I've been looking at it almost an hour and can't think of anything.

In other random news, i was on 4chan, and they were also tring to figure out what was going on, the thread just 404ed, very odd, no CP or any other reason to shut down the thread...



posted on Oct, 20 2010 @ 03:55 PM
link   

Originally posted by TheDeader
Just an Idea
Reston = part of DC
DC = DataCenter
Activate (servers/whatever/team) in D(ata)C(enter) 5 ?


DC could also refer to "Domain Controller" Which is the server that runs a domain, which holds the user accounts (IE active directory), group policy, etc



posted on Oct, 20 2010 @ 03:55 PM
link   

Originally posted by doom27
Sorry ATSers i had to skip a few posts but here is my idea:
"WikiLeaks communications infrastructure is currently under attack. Project BO move to coms channel S. Activate Reston5."
Might be some sort of code (i'm assuming you guys brought this up) for the password of the encryption.

I've been looking at it almost an hour and can't think of anything.

In other random news, i was on 4chan, and they were also tring to figure out what was going on, the thread just 404ed, very odd, no CP or any other reason to shut down the thread...



Lol hopefully 4chan doesnt get angry, they can be scary some days.



posted on Oct, 20 2010 @ 04:00 PM
link   
Reston5 is a type of LOLKatz internet meme.

Follow the breadcrumbs from there.

Rev.



posted on Oct, 20 2010 @ 04:01 PM
link   

Originally posted by FuturePeace

Originally posted by doom27
Sorry ATSers i had to skip a few posts but here is my idea:
"WikiLeaks communications infrastructure is currently under attack. Project BO move to coms channel S. Activate Reston5."
Might be some sort of code (i'm assuming you guys brought this up) for the password of the encryption.

I've been looking at it almost an hour and can't think of anything.

In other random news, i was on 4chan, and they were also tring to figure out what was going on, the thread just 404ed, very odd, no CP or any other reason to shut down the thread...



Lol hopefully 4chan doesnt get angry, they can be scary some days.



Ha my thoughts exactly, maybe the fellows over there can break the encryption, those guys over there are much more intelligent than they seem, and they are definitely fighters of freedom, i feel the whole concept of their attacks are to show the freedom of the internet, and what is on the internet is the properties of the users of the internet.



new topics

top topics



 
139
<< 12  13  14    16  17  18 >>

log in

join