During the DDoS attack a few hashes and keys were posted on several sites for a few minutes and then deleted without a trace (pic related is one of them i.imgur.com/undefined.png).
Additionally, the Wikileaks site showed "The Insurance files may have just been released" for a few minutes as well. (see i.imgur.com/6IMYfUK.png)
I have begun trying some of the candidate keys. I could use some help. I think the least we can do is try them and keep track of the results and what has been tried.
The candidate for C is in pic related as well but it has to be typed down manually. We should also rerun the commands shown there and verify that we get the same result. Moreover, I believe something similar can be done with the hashes tweeted recently.
That script shouldn't take long to run, though, should it? Incorrect keys will be rebuffed immediately, right?
Ethan Sanchez
What DDoS attack?
Cameron Perry
I thought it would just be a key, not an unnecessarily convoluted process of keyfile creation etc. Surely if it were more than a simple key WL would have supplied instructions somewhere?
Easton Torres
The large DDoS attack that happened all over the US yesterday.
Christopher Rivera
I've been busy this week. Is there a summary of it? I seem to recall something about wikileaks supporters DDoSing shit as revenge for Assange being silenced. Is that the same one?
Adam Flores
Yes, same event. No real proof who did it though.
Juan Myers
>i.imgur.com/undefined.png). pic deleted, can you repost here? slimgur is better tbh, born out of the fph censorship on imgur
Adrian Fisher
Only thing we know is that it was a large and complex ops. I am more siding with the story of revenge w/ Julian's crew & support group.
Doesn't really make sense for Julian's crew to do that. What purpose would it serve? Makes more sense as a smokescreen to prevent a deadman's switch signal from being released while they transport Julian.
Ryder Fisher
Duude
Xavier Lopez
I had it saved that way, I just copied it off that. Sue me.
Owen Russell
You could have copied the number that is on the link and put two arrows in front
IS THAT SO HARD?
Jonathan Gray
Calm your fucking tits faggot
Gavin Phillips
How do I use the password? Got the file, how do I try passwords?
Daniel Diaz
why would you need help running through these exactly?
Jack Martinez
Do you know how to run them? Then do it already.
Mason Myers
$ openssl enc -aes-256-cbc -d -in insurance.aes256 -out file.txt is the case if it's just a key, however, people seem to know something I don't, and are constructing keyfiles from the supplied… dump? tweet? strings?
The process he's using is something like echo "eta numeris" > plaintext.txtopenssl enc -aes256 -in plaintext.txt -out keyfile> enter aes-256-cbc encryption password: > Verifying - enter aes-256-cbc encryption password: (using phrase that's next to hex string)openssl enc -d -aes256 -in wlinsurance-20130815-A.aes256 -kfile keyfile > unencrypted-A
Sebastian Campbell
Perhaps Gavin MacFadyen knew what to do with it.
Colton James
Aren't these just more file hashes to proof they aren't fucking around and really do have the data?
Luis Cox
Yeah, I think it's far more likely to be that, but OP thought it was worth a try just in case
Angel Wood
How would you have more hashes to prove a file when you already have an existing hash? That doesn't make sense. It seems more likely they're either used in some way to obtain the keys or they're fake.
Austin Carter
it's almost like this is a (1) disinfo thread, huh?
Julian Gray
Did we have the hashes to begin with? Do we even know what files these hashes pertain to? Does someone else? Why would WL communicate with them over twitter?
Jordan Morris
Wikileaks has thousands of files, and each one would have it's own hash proving its existence.
Cameron Jenkins
Fuck off faggot
Blake Ross
They're not going to send out hashes for each individual file. The hashes that were already sent out were for each large insurance chunk of files. We've already got the hashes to those. It makes no sense to send more hashes.
Alexander Hughes
The hashes aren't for us. They are for the people they are threatening. It's the same thing as the three hashes they released when they threatened the embassy. It's a "fuck you you think we are faking? Do these looks familiar?"
Christian Evans
It does though, because the hashes released were as a warning/threat for individual files.
Threatening your entire dump is a lot less scary than a specific piece of dirt on a specific person.
Christopher Jones
I have to pause to wonder if government really keeps hashes of all its files, and in a searchable database.
Xavier Allen
An idiot copy pasted something nonsensical from reddit and never came back, the thread is shit. You pointing out that it might be shit doesn't make it not shit, it just makes you a jackass for bumping shit.
Andrew Young
alright, anchor this shit and close up shop, 40 replies and 0 content
Cooper Martin
Denying it without trying it doesn't sound too smart. If for some reason that was Julian's keys we should totally just ignore it because it came from plebbit. Smart.
Grayson Sanders
I'll test it. I'm downloading an insurance file as we speak.
Nathan Jackson
...
Brayden White
Got an update on that?
Benjamin Adams
Since the keys are in a fucking image, I have to type everything. It takes a while. I'll smoke a "last" sigaret just in case. I'll post as soon if I have something.
Aaron Wright
Okay. Godspeed!
Liam Phillips
If it were his keys, then the person would have said, hey i found his keys and opened it and here's what's in it.
Instead it was, hey, here's this convoluted process that would never be the actual release vector for keys, and here's a script that'll do it, and I could have just run it and verified it myself, but I'm going to ask idiots on the internet to waste their time instead.
Chase Martinez
Boy, you really have a hard-on for trying to suppress this, don't you? Why don't you just mind your own business if you don't think it's real?
Eli Edwards
use an ocr converter such as onlineocr.net/, it converts images to text.
Jonathan Davis
CTR seems to be working over time to bury something on this board. I wonder if this is it.
Brandon King
They're moving here full force, since halfchan was just completely overrun today.
Angel Edwards
That actually does make perfect sense. No sense in shilling halfchan when the cuck mods will do it for free.
Daniel Robinson
Anti-Slide Bump
Bentley Cooper
Bumpan
Oliver Russell
Nice dubs, checked bump
Adrian Rodriguez
hes already dead
Aiden Morales
I have nothing at the moment, but it is possible those are not the keys (next to the files). Or the spaces aren't meant to be typed as the passphrase. I'm trying that now.
Oliver Williams
if i was smart, i will only publish the keys, and never name what's in it, so scared normies won't need to buckle up and double down.
Sebastian Cox
So many slide threads. Definitely someone raiding the shit out of us.
Wyatt Cook
imagine you found the Scalia.mp4 file, are you ready for what's to come ?
Brody Morales
Suiciding yourself with two shotgun blasts to the back of the head? I'm not ready for that.
Daniel Jackson
I'm a "diplomat" so, I will fucking run to the diplomatic area…
Logan Hall
I'm starting to think Holla Forums has been compromised since they're not doing shit about all these obvious slide/spam threads.
David Flores
come on bruh, i saw the insurance files with more than 2000 lechers the other day, imagine that for a fucking month, because you can download it in a day if you have average broadband, so it's more than 200K people with the file already, can you imagine what that means ?? stop the fear-mongering.
Robert Williams
I have tested them. No.
Cooper Kelly
2 theories on the DDoS:
1 krebs and others talk about certain attacks on internet infrastructure probing for weakness to take down largest number of things.
2: bobama calls out "Solar Flares" while Biden says "starting covert cyber war" which means they've installed firewalls into their monitoring software on tier1 stuff. Perhaps this has been attacked but ICMP and UDP packets were still going through even when the DDoS was occurring.
Kayden Russell
No what?
Christian Ward
I wasn't intending to fear monger, just a joke.
Christian Jenkins
Have you tried this one?
Posted, but nobody even responded to it.
Caleb Torres
No luck guys, sorry. If anyone is interested I can put online the text version of this. The key next to the file is probably not the key.
Jackson Gutierrez
That is interesting. Could be coded messages. Maybe keys.
Ryan Taylor
They don't need to "keep" hashes. Hashes are automatically generated based on the file itself.
If you have the file, and then copy it, the copy will have the same hash as the original because they contain the exact same data.
He was telling kerry, "I have something on you, this is proof, and if you do anything I'll release it"
Nathan Walker
OP said "The order might be incorrect". Perhaps you'd have to try each key on each file. Tedious but maybe it's the only way.
Dominic Jackson
Right but this is implying that the aggressor would know exactly what file WL was talking about from just a hash. It sounds unusual at the least.
Bentley Powell
Yeah, but that is what the for loop does. But I've noticed now that xxd is complaining about "cannot write to output file". However, if I use xxd in a regular way I get a hexstream. So I'll try it if I see something pop up in the hex stream.
Right down to the media telling us ASSANGE IS STILL ALIVE, CARRY ON EVERYONE. DON'T ACTIVATE THAT DEAD MAN'S SWITCH.
Leo Hughes
OP is offering nothing
RED FLAGS op is posting non sense that has no effect on the insurance files op is not breaking links op posted to undefined.png, nice going, why would your own pic 404 and then you copy and pasted that url op is offering "Stay Safe" links which included defunct truecrypt and unvetted email and "phone" services
Colton Young
This is a list of IDs of CTR at cuckchan
Tyler Taylor
archive.is/AfyZh - /r/The_Donald - I Decoded That Supposed Wikileaks Message
Nathan Powell
Any updates?
James Martin
This is what I'm getting
wlinsurance-20130815-A.aes256, 7FG-final-request.key, 0000000: d5e5 d6e5 42d1 error writing output file wlinsurance-20130815-A.aes256, eta-numeris.key, 0000000: 07a4 a6d5 85a8 error writing output file wlinsurance-20130815-A.aes256, fall-of-cassandra.key, 0000000: 0a64 92d8 3289 error writing output file wlinsurance-20130815-A.aes256, project-runway.key, 0000000: 22ac 68c0 1500 error writing output file wlinsurance-20130815-A.aes256, sin-topper.key, 0000000: 6674 d1c0 b5e3 bad magic number wlinsurance-20130815-B.aes256, 7FG-final-request.key, bad magic number wlinsurance-20130815-B.aes256, eta-numeris.key, bad magic number wlinsurance-20130815-B.aes256, fall-of-cassandra.key, bad magic number wlinsurance-20130815-B.aes256, project-runway.key, bad magic number wlinsurance-20130815-B.aes256, sin-topper.key,
Luis Lewis
...
Cameron Gutierrez
Explain how testing these keys is pointless.
Thomas Green
Isn't it supposed to say bad magic number?
Luke Turner
bump
Noah Martinez
Deleted. Please repost it.
Ryan Morris
Bump in case assange is dead
Blake Cooper
Posts here are getting deleted (I suspect they're highly sensitive).