Wikileaks new encrypted file

any way to decrypt it? so curious as to whats in it, well its a few thousand pdf password protected files

Other urls found in this thread:

archive.is/mCAmv
twitter.
archive.
blog.rubypdf.com/pdfcrack/
twitter.com/AnonBabble

No.

But releasing individually encrypted files is unusual for wikileaks. My guess is that they want CIA to know what files they're going to release. CIA can probably tell the contents from the file sizes.

probably not. you could probably brute force it but that could literally take years.
btw what happened to the merkel conversations they promised a while ago?

There should be a front page post on this now. This could be big. It is "PRE-RELEASE" which means like with the original vault 7 stuff, they will release the password imminently. My guess is within the next 1-2 days.

The "Media Ops" suggests that there may be information relating to the CIAs activities to influence narratives in the media.

No there is no practical way to decrypt. We must wait for the password/key to be released.

Only when Assange's killswitch get triggered. And that is when the storm comes.

Julian Assange is dead

DO EET, JULIAN!

Archive of tweet: archive.is/mCAmv

Wasn't wikileaks shown to be compromised?

...

It's always been a possibility, but I'm starting to lean heavily towards that being a PsyOp to discredit WL.

how long could it take to brute force it if you have multiple computers going at it at the same time working your way through all possible combinations?

Weren't the past wikileaks passwords always esoteric phrases that related to the current event they were releasing on? we might just be able to guess

Shills are like clockwork. Shoo, shoo, jew. This isn't halfchan.

More seconds of time than there are atoms in the galaxy user.

Last key was
'SplinterItIntoAThousandPiecesAndScatterItIntoTheWinds'

So you're likely right.

OTOH, that eliminates entire subsets of entropy that have to be tested, assuming the key is made of whole words from relevant quotes and references, with no spaces.
Would still take a long-ass time, though.

There was a lot of shit pointing towards that yes. I can't fully trust them until it's proven to me that that isn't the case.

Also "ACollectionOfDiplomaticHistorySince_1966_ToThe_PresentDay"


anyone ever why?

true.

THIS

Christene Assange getting her twitter shut down and replaced with an account that was one character off of the original was a big sign.
Even bigger, was when she didnt seem to have any awareness of things she should, and was unable to verify her authenticity.
Upon questioning her on things that the real Christine would easily know/answer I was immediately banned from all of twitter.

If his mother is indeed compromised, then the dominoes all have fallen.

The real Christine Assange did not have the _ after her name on twitter.
She had some real bantz, now its all silence on a fake account.
Mossad/CIA is using wiki to assist an agenda.
Look at the wiki section on "Israel & occupied territories"
It is clear that WikiLeaks is under control.

Some of you might think I'm a shill, some of you just might agree with me. It's very simple to me. We should be demanding one of two things from Assange. Balcony or Blockchain, he has not been able to provide either. Since Paman first served him a nice hot lunch & his internet got cut back in Octoberish things have been clearly fucky.

It's hard to know what to believe. Assange dead or alive? Is it all a big ruse? Confusion. Mission accomplished for the tptb I guess.

CIA still trying to create confusion. Hire anons with an IQ above 70 to get better results.

Why do you guys even save this type of pic?

Masochism.

twitter. com/wikileaks/status/855441254489960448

archive. org/download/CIAVault7PartBMediaOps/2017-04-14_WL_Vault7-PartB_Media-Ops.zip

Tweet posting direct link (archive.org) to zip file

You mean as much as Julian Assange was shown to be a CGI hoax after October 17th?

Multiple years, you're wasting your time. The password_is_supposed_to_be_a_sentence_written_like_that. Just wait for the password.

It is possible it can be guessed with dictionary word phrases. You would have to have a super algorithm that could guess proper phrases and a shit ton of cpu cores going though. US gov obviously has both.

Also have to assume US gov has been trying to develop a quantum computer since at least 2001… and they are probably much further along than any public institution.

Breaking current encryption becomes trivial with legit quantum computers.

He did three or four audio interviews and two or three video interviews since October 17th.


Since Pamela gave him a vegan lunch and he said no, I want to eat your pussy instead and the embassy cut off his internet connection on October 16th I believe, a wave of shills appeared on the internet to try to inject all kinds of doubts about Wikileaks. One of my favorite was that Cryptome clown – who once said in an interview that he doesn't believe in verifying the authenticity of documents – explaining how Julian Assange was kidnapped with pictures of the map. Where did that come from? Not to mention all the anonymous people yelling WIKILEAKS IS COMPROMISED! everywhere. These shills were there to poison the well of Wikileaks by associating them with all kinds of rumors.

isn't even worth arguing with em
they think this is cgi too

What the fuck is wrong with you.

Try "OPIsAFaggotAndLiterallyCannotStopSuckingCock"

Stop watching midget porn, Jeremiah.

I don't see a public release happening until Monday morning but suspect that media partners already have access and are working on stories.

Assange always uses hashes as passwords for these files. Look at the filename of any pic you download from this board. That's what a WikiLeaks passwd looks like.

Inside sources say the hashes themselves are checksums of Pam Anderson's nudes.

In my limited understanding, to decrypt this kind of password you need a quantum bit register that's as many entangled qbits wide as a the password itself. Which will be 32 bits at the very least.

DWave has only produced machines with a 2-qbit register and no one can conclusively prove that they're even true qbits.

https:// crypto.stackexchange.com/questions/40893/can-or-can-not-d-waves-quantum-computers-use-shors-and-grovers-algorithm-to-f


https:// www.theregister.co.uk/2014/01/03/snowden_docs_show_nsa_building_encryptioncracking_quantum_system/
Snowden docs: NSA building encryption-cracking quantum computer

This is timed to coincide with the vaporware rumors that Sessions might file charges against Assange. This is to distance Trump from the leak, which will probably be beneficial to him.

This coordination could not occur without WL and Trump. He may not be scheming with Putin of course he fucking is and I approve but he's certainly scheming with Assange.

God he's a clever motherfucker. I will never get tired of his tricks.

I know dwave can't do it. What I am implying is that the US gov could be years ahead of dwave with their own secret program


https:// en.wikipedia.org/wiki/D-Wave_Systems
On August 20, 2015, D-Wave released general availability of their D-Wave 2X computer, with 1,152 qubits in a Chimera graph architecture (although, due to magnetic offsets and manufacturing variability inherent in the superconductor circuit fabrication fewer than 1,152 qubits are functional and available for use. The exact number of qubits yielded will vary with each specific processor manufactured.) This was accompanied by a report comparing speeds with high-end single threaded CPUs. Unlike previous reports, this one explicitly stated that question of quantum speedup was not something they were trying to address, and focused on constant-factor performance gains over classical hardware. For general-purpose problems, a speedup of 15x was reported, but it is worth noting that these classical algorithms benefit efficiently from parallelization—so that the computer would be performing on par with, perhaps, 30 high-end single-threaded cores.

I stand by balcony or blockchain. If there were nothing to hide there would be no issue doing either.

While I'm not on the boat of interviews being fake it is fair to remain skeptical based on the circumstance. We have all seen the videos of what (((they))) are capable of producing with little material.

Still like 30 orders of magnitude under what's needed to crack an AES key like Assange uses.

It is more about big data, and the exact estimation of that. And once a problem arises it will be countered with a sufficant measure., once a thought gets to strong a dialectic thought will get introduced once a certain comfort level will get achieved some discomfort will be introduced. That is why they collect all your data, for them it is like a tuning an instrument to make a cetain sound, the sound of all your vocies. ANd every note is like an a centralized blackhole of your information that you cannot escape and your minds are like ink on a clean sheet of paper, and the instrument that reads it is your essence.
And it alwys keeps track on the basic maintaince so it runs smoothly. That my goyim is what you have to expect and none of you really can even vaguely grasp the whole enterprise and the few that can do that will be part of us.

bruteforce key-list.pdf
blog.rubypdf.com/pdfcrack/
lunix fags go

windows users, everyone.

Retards everyone