It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Originally posted by Maxatoria
Looking at the key size needed to brute force aes-256 i doubt that even the NSA has the pew to decode it by brute force but i'd imagine they'll slap a spare rig to have a go just in case they get lucky while probably using more normal techniques to see if they can get the keys from one of the people who must have it
Originally posted by Rosinitiate
It's a game silly.....there would be no need for insurance if the all the cards were on the table. All WL has done is provide false hope.....hmmm.....I wonder why?
Originally posted by Maxatoria
Looking at the key size needed to brute force aes-256 i doubt that even the NSA has the pew to decode it by brute force but i'd imagine they'll slap a spare rig to have a go just in case they get lucky while probably using more normal techniques to see if they can get the keys from one of the people who must have it
At 349GB it better have a stable build of that virtual battlefield simulator Bohemia Interactive makes for the military," snarked Raul Ceja on Facebook.
Originally posted by NoRulesAllowed
Originally posted by Maxatoria
Looking at the key size needed to brute force aes-256 i doubt that even the NSA has the pew to decode it by brute force but i'd imagine they'll slap a spare rig to have a go just in case they get lucky while probably using more normal techniques to see if they can get the keys from one of the people who must have it
Lol...why would the NSA need to decode them? They probably know everything contained in those files already
Originally posted by LookAtThisMarsRock
Do you guys remember when Anonymous did the same gag? They released encrypted files on some judges and had a Youtube video talking up the files as something big?? Operation: Last Resort.
Here is the video:
Nothing came of that and we have all forgotten it ever happened.
Conspiracy theory:
NSA released the files and will be tracking everyone that downloads it. They will then know all the hardcore Wikileaks supporters that downloads 400gb in the name of Wikileaks.
Originally posted by StargateSG7
Originally posted by Maxatoria
Looking at the key size needed to brute force aes-256 i doubt that even the NSA has the pew to decode it by brute force but i'd imagine they'll slap a spare rig to have a go just in case they get lucky while probably using more normal techniques to see if they can get the keys from one of the people who must have it
Actually AES-256 IS NO LONGER SECURE because there are now newer software methods
to FACTOR the large integers used to create public and private keys or the intermediate
encrypt/encrypt keys.
Elliptic curve estimation or estimation of the output of fractals
could be used to ESTIMATE the sequence of iterative numerical
equations and their source factors/multipliers to create an estimated
series of integers that could represent the POSSIBLE encyrpt/decrypt keys
of the insurance file. There are a number of modern papers that outline using
these methods AND more which COULD BE USED to break the insurance file.
Originally posted by LookAtThisMarsRock
Conspiracy theory:
NSA released the files and will be tracking everyone that downloads it. They will then know all the hardcore Wikileaks supporters that downloads 400gb in the name of Wikileaks.
WikiLeaks releases encrypted versions of upcoming publication data ("insurance") from time to time to nullify attempts at prior restraint.
Prior restraint (also referred to as prior censorship or pre-publication censorship) is censorship imposed, usually by a government, on expression before the expression actually takes place.