ITT: We try to figure out the decrypt keys for the insurance files

OK, I know everyone keeps saying that assuming Assange is dead is what (((they))) want us to do. But evidence seems to be to the contrary: old pics/videos being pushed as recent. So (((someone))) wants us to think he is alive. So shouldn't the logical response be to assume he is dead?
inb4 shill, CTR, reddit spacing
Also it is possible that we're being shilled by different entities with different objectives.
Anyway, assuming he is dead (without it demoralizing me, on the contrary, spurring to further action) is it not our responsibility to find the decrypt keys? I think that they are out there, one way or another. And maybe Assange was counting on our collective autism to find something that (((they))) missed. Here's my call to action:
1. The keys were dropped during the Twitter blackout. I recall seeing a pic, but was probably disinfo. What can we do if this is the case?
2. Perhaps the keys are hidden in plain sight? Like the recently surfaced /file on Wikileaks that turned out to be full of old stuff. Maybe this "old stuff" has been altered in a small way to hide new keys. Does anyone have the old versions of these files to diff?
3. Perhaps we need to combine the known information in different ways and try that to decrypt? I have a little crypto training, but I'm not full-on crypto-user.
Please contribute with any ideas/info you have. We might be the only hope that his death was not in vain. If you're not going to contribute, please kindly fuck off and do the more productive things you're going to be telling me to do. In here, we're assuming he is dead or compromised and trying to decrypt the insurance files

Other urls found in this thread:

csrc.nist.gov/publications/fips/fips197/fips-197.pdf
en.wikipedia.org/wiki/RSA_numbers#RSA-1024
twitter.com/NSFWRedditGif

I thought that as well and tried to use Wikileaks' twitter bio. It wasn't.

We know you do, as a crypto-kike.

Try remote viewing.

you guys are fucking retarded.
if wikileaks wanted to publicise those keys they would definitely not hide them in the hope that some faggots on an imageboard find them.

looks like the terrorists have won.

I'm not saying this would have been his first form of dissemination, but we know that Twitter was blacked out. A few of his close friends have suicided. So maybe plan D is the only one left. To blindly say "That's not possible" is infantile at best. Does anyone have that pic allegedly from the Twitter blackout? I have seen it floating around, but can't find it now

Probably retarded suggestion but I'll make make it anyway. Remember when Snowden had made two posts on twitter? One was about something about to begin and the other was what looked like a decryption key. Maybe they are related?

That could be relevant. Time frame? And can you find a screenshot of the Tweet in question?

...

2/10, Try harder next time.

just google "snowden twitter code" and check out images

Found. And saved. Will try when I get back to my real computer

The most logical place to look would be images.
Breaking up large keys in cryptic text messages isn't very effective.

Fuck these kile niggers saying that he's alive and should sit around fucking jerking our dicks until he shows up. Is this what you needed?

KIKE*

I recall that Assange had a cat with a twitter, so one could look for it there, or in images of Assange and the Embassy cat.

Cracking aes is a fuckton harder than cracking pgp goy.

You could brute force it, at 2^256 possible keys you might get it done with all the computing power in the universe in a few hundred years.

This shill attempt is fucking shameful and obvious. Do you realize that Assange isn't the only person involved in Wikileaks? Switch up your methods, CTR. You've been running this same narrative for weeks now.

The problem is that leftists like yourself are trying to get people to think that new WL releases are fake.

you mean this, right?

of those 2^256, a large majority of them are so improbable, they are statistically negligible. suppose approximately 2^64 permutations account for the majority of likelihoods given a key with sufficient entropy and low autocorrelation. the problem quickly becomes tractable.

I should say, supposedly there's 2^256 possible key combos.

Realistically the first or second bit is probably going to be a 1 (otherwise it wouldn't be 256 bytes long, ya see?).

So knowing that we can find there's around 32,640 possible keys. 32,640 256byte keys translates into roughly 8 megabytes

the reason people say its impossible is because dumb mathfags think 0001 is a 4 bit number and think you actually have to start from there in order to brute force shit
btw I'm sabotaging my livelihood and defcon talk by sharing my methods. Use it well you cucks.

Isn't there a new operator that's working with wikileaks? That 400 lb one?
Respectful sage but he ain't dead, I don't believe it.

I know user. I was shitposting what I've heard the last few years.

I'm glad I'm not the only person calling bullshit on it though

look, I might be retarded, but would it be possible use a distributed cracking technique along the lines of [email protected]/* */ or bitcoin?

Who cares if he's not dead?
I'm sick of his blueballing us.

You know, I spent a fuckton of money making an analog computer using fucking sine waves as my datastream just to generate large primes in a timely manner just to hack google's ssl because google pissed me off by deleting my gmail account.

I will move mountains to cuck assange at this point. My autism KNOWS NO BOUNDS.

I have a gpu farm for mining so if we had anons that could work together and put our computing power together(since we have the initial digits too) we might be able to crack them in time.

The problem is decryption takes a long time and it's the only way to verify you found the key with aes.

This gon b gud

BUMP DUE TO INTEREST

Dubs confirm we cracking this shit now.

Anyone have some info on how aes works mathematically? I'll see if I can find a way to speed up the process.

Daat ID checked

sage your way back to cuckchan newfag.

Hmmm so what if the decryption process was distributed as well?

I sage when my message has nothing to add to the OP

i wrote a RNG that flies on GPU. it makes bit streams whose average ratio of 1's to 0's holds a gaussian distribution at about 50% mean. self-generating process as well, that is, each 'key' iterates to a new unique 'key' in a pure one-way. forgot the word for it. but you can't go backwards. in most cases, when seeded with sufficient entropy the generator goes on forever, scarcely repeating a pattern. it is these patterns that could be tried in brute force. probably better than going from 0x00..00 to 0xFF..FF in sequence, that is, you'll hit in less time probably. idk.

csrc.nist.gov/publications/fips/fips197/fips-197.pdf

I believe in Holla Forums, if Holla Forums can make guacman from tays source code then Holla Forums can do this.

probably need all of /techs/ help though

Do what you can user, that's all anyone can ask.

Right now I'm working on generating a list of keys and reading up on the aes algorirthm, the more you can narrow down the possibilities before a brute attack the faster it will be.

Anyone have the link where the guy who wrote a book on Assange used an old password for the chapter title.

Julian uses words mixed with special characters,

Something like

[email protected]/* */ cunts 1223

I am willing to lend processor time from my farm if you need. Its closed network.

Can this realistically be done? Please Holla Forums give it a shot. You would assuredly go down in the history books as the people who started the nationalist revolution.

If Assange's team is leaving little clues to lead to the key, possibly

If you want to brute force decrypt the insurance files, our sun will fizzle out before that happens

You guys said the same thing about 1024 bit RSA then 2048 bit RSA.

I broke both.


AES 256 bit uses 14 rounds of a substitution permutation network, a bit more complicated than the simple modulus function of RSA but I will fill up another 2 notebooks with scribbles and come out babbling with the details on how to break it as I always do.

As stated previously the first bit might be zero but probably not, if it is the second bit absolutely cannot be zero.. The other 255? Well we learned that basic math in school. That leaves 32,640 combinations. Much more manageable than the 2^256 previously stated.

Of those 32,640; on average you will only need to test half to get in. That leaves you with 16,320 tests to open that folder.

I may be wrong, and correct me if I am, but that's nothing that couldn't be done in a week by hand. A few days tops by a computer.

Unfortunately I am no mathematician and not much of a programmer, so all I am capable of is posing the question.
It is obvious that no single actor is capable of brute forcing it (without quantum hardware) so I am just pondering whether it would be possible as a distributed effort.

In that case Assange's team had better get working on the proof of life before they don't need it anymore.

will you do it tech user, will you save the world?

I think it's possible.

If you take a smart approach and don't just blindly start brute forcing it that is, you have to narrow down the possibilities.

link to encrypted files?

For kek I will.

We have another thread with a compiled magnet:

(witnessed)
Kek blesses you on this holy quest, user.
May kek reward you with tendies and dead liberals for your service.

It will take at most 277 days to crack the 88GB file (assuming it's just my one computer and assuming the software doesn't realize an incorrect key was used and goes through a full decryption cycle).

With 20 computers running that one operation 24/7 it'll be done in 3 days.

God damnit assange you nigger.

I'm sure you could organize some anons together, I myself am tech illiterate so forgive me if I'm retarded but do the computers all have to be in the same area or can they be connected online

I wish I had a botnet to volunteer. This might be a job for /baph/. Also, this thread briefly e0001'd on me. I would hazard a guess that if user hacks AES, tptb will have even greater concerns than what's in that insurance file.

save the world user

Would need to run 10,000 operations at the same time 24/7 to crack it in 11 days.

how many computers could you theoretically acquire in a few days?

Honestly I'll probably be v& for posting what I have so far. Spooks would love to get their hands on my papers.

Fuck it, let's do it.

I have 2 right now, could run 4 operations at the same time.

Theoretically I have enough loosh to rent a supercomputer or 10 for a month.

do you need a month if you can acquire them?

must you attempt a decrypt on the entire file? can you not do a small portion as a test sample to qualify the key?

Nah, I could start today. Right now I'm working out the math and writing scripts.

That's the spirit.
I believe in you user. Believe in the me that believes in you.
You can do the impossible. Break the unbreakable.

I hope you can do it user, I really don't want to haunt a nuclear wasteland

Depends on how it was encrypted. I don't have any insurance files to check, but worst case scenario we'd need those 10,000 operations.

That would speed it up a fuckload though.

Get started user. Sounds like you are the man for the job.

You have my axe as well user.

no you did not, faggot. stop LARPing.

prove it by factoring en.wikipedia.org/wiki/RSA_numbers#RSA-1024 or get out.

Sticky requested

AES is immune to quantum cryptanalysis. You're thinking of RSA

I'm in. I have an FX-8150 and an nVidia gtx 550 I'd be happy to crunch numbers with.

But I like larping
1000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000545512531439555883798502177310896758887030691592386838880984042886835sound about right?

YOU HAVE TO GO BACK

1350664108659952233496032162788059699388814756056670275244851438515265106048595338339402871505719094417982072821644715513

I can't go back to cuckchan. Not after the exodus.

And plug those numbers into bc, see if they're your 1028 bit number factors, i had to type it in by hand because my internet a shit and I'm phone posting.

YOU HAVE TO GO BACK

I checked and you failed. stop wasting our time.

Are you fucking serious? Show the math because you sound like an utter roleplaying moron

I fucked up on the number of combinations, wrote a quick script in python of all things and didn't bother double checking.

AES can decrypt/encrypt at around 60mb/s sauce: fucking google it.

From there its basic multiplication. Fuck off I'm tired.

Anyway the number of combinations is 2^256-2^255, divide by 2 (average attempts needed), multiply by the size of the file, divide by 60mb/s, divide by 60s, divide by 60 min, divide by 24 hours, etc.

Sure, my math was off at the start. I even said "correct me if I'm wrong", quit acting like ass blasted faggots.

I'm keking at the fact you're probably a fed coming in here for juicy info and getting blueballed by a neet.

No shit sherlock? Did someone lie on the internet?

Anyway RSA is broken by design, adding on more bits only serves to waste bitspace.

...

>user's autism levels get 10 feet higher as he challenges the NSA to a crypto-duel
This thread is a travesty.

holy shit this whole thread was so fucking painful to read.
sage goes into all fields

Seriously, dude?

It's an alphanumeric password to an AES 256bit cryptographic hash.

good fucking luck.

*file

ffs, me.

I found the key, guise:

888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888888

:^)

fuck me, forgot to sage. just ignore me and move along

I had no idea! Did we ever figure out what that was about? Looks sketchy

This is Assange giving us a sign

Have you tried the fourteen words?

You can it's a 1 time use 256 aes key. Unless it's out in the ether somewhere th see is no guessing it