I'm seeing snippets of info around suggesting the insurance keys actually DID get posted, and the DDOS was an attempt to stop them, but it wasn't 100% successful.
Apparently the keys were divided into separate parts and given to a variety of people. Nobody had the whole key themselves, but they all had parts of a key.
Which means the keys we've been seeing around that haven't worked, may simply need to be combined with other keys to unlock the files.
That's what this thread is for: Posting anything you suspect might be part of an insurance key. Anons with the insurance files test out combinations and let us know if anything works.
Archive.is is your friend. Immediately archive any web page, facebook post, twitter, that you think might be a key.
Would appreciate bumps; do we have any anons with the insurance files who want to start testing these out?
And anyone more familiar with the AES encryption on the volumes so we all know how things should be formatted?
Jayden Walker
PROTIP
(polite sage)
Zachary Price
For reference, this is what a full AES-256 bit key looks like in hex encoding. It's 64 hex characters. c68dd6a613ff26d191b3766c6974ce9046b0c446a34a449a6afb9a6a6ee433be
Ryder James
Bump
Kayden Moore
Can we get some anons to help transcribe them into text format rather than image?
Hi cuckchan poster. It's blatantly obvious you're from there or reddit, please lurk here before posting. The insurance files have always had the file extension "aes256" which most people take to mean the files are encrypted using aes256, although this can not be confirmed so it may be using another encryption method for whatever reason. The keys do not necessarily have to be in ASCII format, or unicode format or any specific format for that matter (they could also be hidden in the audio of a file, or video, or anything for that matter although that sounds stupid as fuck for wikileaks to do). The length of the key therefore may differ on the encoding. If the keys were divided into separate parts, this would mean the keys would be less than 256 bits each or there is multiple layers of encryption (which I doubt considering aes256 is secure enough already). It's probably just one key for one file. You're retarded for trusting anyone on twitter. You're retarded for trusting an Anonymous account considering it's probably run by an edgy 16 year old. "Guerilla Prophet" sounds like he's absolutely full of shit and is just tweeting something he randomly heard or completely made up, I'm guessing the latter. The DDOS on Dyn a few days ago was not meant to actually disable Twitter, they would have attacked Twitter's servers directly if that were the case. It was probably a test of some technique (I read some brief article saying a fair amount of the bots were embedded devices so that's interesting) or someone just wanted to cause a bit of a stir, I'm not sure about that. Wikileaks has no reason to release anything. Most of the files are probably just releases that they have identified as real but haven't released yet for whatever reason. I doubt there is much critical information in those, but if there is there's even more reason to avoid releasing them considering there's a lot of very high up people who really don't want certain things to go out and they'd probably kill people if that happened. In short you're a cuckchan refugee, your thread is shit, nobody cares, basic logic and common sense points to your concerns having no merit, and you should have left during gamergate. Fuck off.
Grayson Torres
Go kill yourself, you and your pasta.
Tyler Collins
The DDoSes are a state actor experimenting with how to take down the Internet.
Your article points to a concern that has been present since Cloudflare got hit with a DNS Amplification attack back in 2012. It has nothing to do with the attack on Dyn. The only reason the attack was covered in the media at all was it's negative effect on Twitter. Nothing points to it being a state actor, in fact DDoSes by design make this hard to do without extensive investigation.
Furthermore, why the fuck would a state actor need to "learn" how to take down the internet? Do you think China and Russia are helpless? For that matter, do you even think the internet can be taken down in the manner you describe?
Nobody knows who the perpetrators are. The only thing of note is that the target was a rather large DNS provider instead of some small website that posted a picture of someone's mother or something. What they do know however is that the amount of attackers is large (10 million), The Mirai botnet contributed to the attack, and someone really dislikes Dyn for whatever reason. That's it. Stop making shit up.
I think you know where to go back to.
Camden Smith
How would one use the keys to decrypt the dropped files? What sort of program is build for that?
Brandon Baker
Just dropping these over from a different thread. I feel this one is more suiting.
WEP keys can be 152 bits, which is 29 ascii characters. These keys are all hex values though, nothing but 1-9 A-F
David Young
The ASCII ones need to be converted to hex, which I did for one of them here:
which is base 64 hex, I think
idk for sure, because I'm not a genius and I just used an online translation tool.
Bentley Adams
I have to use a canadian proxy as my end point because though some of this is marked U//FOFU, others not.
There has a been quite a bit of talk today about the attacks on our cyber infrastructure.
technical details: >today's attack is likely just a test run for a larger more sustained attack.
habbening:
Owen Peterson
It is very simple to work with. Just install it, load it and select the file you want to decrypt, select the drive you want to mount it to and then select the "mount" button….enter your key and after a few seconds it will mount the enrypted file as a drive
Josiah Hall
Did you actually figure something out? These threads aren't too bad as long as you keep it to one containment thread I think.
Brayden Harris
CTR has raided every single one of them. This is the only non polluted one Ive seen.
William Flores
Well, that will likely change; maybe we can shit done in the meantime. Are we sure it's AES256 for one? How can we tell if it is? Is there a header maybe?
Jackson Barnes
Try running `file` on the insurance files from lunix/apple.
David Howard
I was able to get in… guys… I'm sorry…
Lincoln Thompson
Only 2 weeks left if they haven't released the dirtiest they should do it now.
Jaxson Price
HI I'm Julian. Dpn't tell me what to do! I thought the best thing to do is to release the most damaging shit after the election. It would look like wikileaks was pro-trump if we did it now. The image of wikileaks is more important than saving western civilization.
Brayden Wilson
This is literally trolls larping. There is another thread about it. They are trolling Jews on twitter…
#TheList
Have a bumb!
Nicholas Reyes
Lads… bare with me here.
Is The List a WikiLeaks Op? As in, trusted parties received the keys first and they're collating those implicated for a release? (Hashes = file implicating).
And the Op here is to discredit it. We're being subverted. Noise in an otherwise clear signal.
Aaron Flores
???
Austin Adams
At least 12 posts have been removed from this thread - why?
Aiden Edwards
RIPINPEACE Julian! Final bump for the white wizard, may he return to us when we need him the most , in heaven.
Josiah Stewart
Mods are pruning threads left and right, keep a eye out
Justin Adams
I suspect I know why.
Anyone with anything important should take it to endchan.xyz/pol/ .
Ethan Morris
Let us know why?? Did MasonJim finally hand the servers over to (((them)))?
Hunter Martin
Read the thread title.
People were probably being very very bad goys and sharing things they were not supposed to.
Bentley Gray
I doubt someone had the actual key, but one key was deleted in the other thread. This may be the case.
Blake Barnes
post the deleted key again
James Ortiz
Jesus fucking Christ people, I feel like I walked onto the set of Law and Order or one of those crime procedural shitshows that has a rough grasp on "techie" sounding terms to write a sentence like "Write a GUI Interface in Visual Basic to backtrace their IP."
What the hell does Wired Equivalent Privacy have to do with the insurance files? WEP is a legacy wifi psuedo-encryption technology (if it actually encrypts data, the keys are practically [read: they are] transmitted plaintext in the preamble/handshake when establishing a connection and in the header of every packet).
I'm sure you meant Base 16, which is what Hexadecimal is. Hex(a), 6, Decimal, 10. There are base 64 numbering schemes (Ancient Babylonians used a base 60 numbering scheme), but Hex is not the right word for that.
Alexander Parker
All sensitive posts are being deleted in this thread (and others).
You better confirm if you are going to make that kind of claim. Post the full key, here and on the endchan thread.
Joseph Johnson
He has to be trolling or v&. Either way, it's a distraction. Where did the posters go who were getting deleted? Someone is pruning, sliding and generally being fucky with many of the threads that are actually focusing on unlocking the files or the whereabouts of Assange.
Multiple posts were removed from both this thread and the other WL insurance thread. Did anyone nab them?
Joseph Robinson
Endchan was a diversion, whoever had the keys have moved somewhere secure for non newfags in the know
Jace Murphy
Thanks, very helpful.
Liam Murphy
Well fuck me I'll just go back to desperately lurking. No in-the-know here.
Isaac Hughes
Endchan thread was created because things were getting deleted here.
The keys there are probably real - just that no one knows how to use them (or they're incomplete).
Nathaniel Kelly
If no one knows how to use them then they aren't real. There's no scenario where a person creates a deadman's switch to release cryptokeys, but leaves the keys obfuscated by extra layers of unknown autism. It would make it less reliable without doing anything legitimate to mitigate the problems of an accidental release. Assange isn't that dumb.
This is disinfo to get idiots to waste their time running around in circles during the final crunch of the election cycle.
Brayden Wood
I'm pretty sure that Assange doesn't intend to ever release the full array of files that people have sent to him. He's just gonna dangle the possibility, like bait, in front of us as a distraction from other venues for taking on the Jews.
Lincoln Morales
If anyone gets hold of the key(s), my recommendation: Send transactions on the Bitcoin blockchain and attach the key(s) as a message (using OP_RETURN).
Once on the blockchain, it'll be INSANELY difficult to reverse/censor.
If your transaction doesn't get through (in the case that they have the capability to censor the blockchain) post them in reverse and then link to transaction.
Evan Thomas
fresh off the boat from reddit eh? This has been gone over a million times. Those aren't keys, they're hashes. Google it if you are too ignorant to know what that is