cookie

Sizning foydalanuvchi tajribangizni yaxshilash uchun cookie-lardan foydalanamiz. Barchasini qabul qiling», bosing, cookie-lardan foydalanilishiga rozilik bildirishingiz talab qilinadi.

avatar

MEDJED

Uit de tijd dat een adelaar nog een mus werd genoemd, en de kinderen bier dronken

Ko'proq ko'rsatish
Reklama postlari
248
Obunachilar
Ma'lumot yo'q24 soatlar
Ma'lumot yo'q7 kunlar
+630 kunlar

Ma'lumot yuklanmoqda...

Obunachilar o'sish tezligi

Ma'lumot yuklanmoqda...

Julian Assange Insurance Files
Hammasini ko'rsatish...
this one if from the first page 9:53 PM] Danger: ok thx [9:53 PM] Danger: will add shortly [9:56 PM] Kraya ☿: @jeanseberg really need ot head off now, but I assume none of those keys worked cause they arent what keys look like o.O I'm surprised someone with the coding skill to write that script tried that but either way yeah thats most likely a failed attemt at decoding the 2013 insurance files [9:56 PM] Kraya ☿: but yeah DM me specific questions and I'll read sometime when I wake up xD [10:01 PM] jeanseberg: @Kraya The key does not have to follow any pattern, I just created a file with aes256, used 'hello' as the password and decrypted it. [10:01 PM] jeanseberg: openssl enc -aes-256-cbc -salt -in text.txt -out test.enc [10:01 PM] jeanseberg: To make the file, and then: [10:02 PM] jeanseberg: openssl enc -aes-256-cbc -d -in test.enc -out file.txt [10:02 PM] jeanseberg: To get it back. [10:08 PM] sakulfromspace: passphrase is not the same as the key [10:08 PM] sakulfromspace: your computer saves the key in a file and uses a passphrase to retreive it, but its really using the full key [10:15 PM] lupdike: when the passwords do get released, how will we open the files....are they most likely truecrypt containers or what? [10:15 PM] Danger: no one knows how they will get released [10:16 PM] Danger: files are aes encrypted and available via torrent [10:16 PM] Danger: hang on and ill get you some links [10:16 PM] Danger: wikileaks insurance files: https://file.wikileaks.org/torrent/2016-06-03_insurance.aes256.torrent https://file.wikileaks.org/torrent/wikileaks-insurance-20120222.tar.bz2.aes.torrent https://file.wikileaks.org/torrent/wlinsurance-20130815-A.aes256.torrent https://file.wikileaks.org/torrent/wlinsurance-20130815-B.aes256.torrent https://file.wikileaks.org/torrent/wlinsurance-20130815-C.aes256.torrent [10:16 PM] lupdike: i've got the latest one....the 88gig one Danger pinned a message to this channel. See all the pins.10/23/2016 [10:16 PM] Danger: if you have space you should download the rest [10:16 PM] Danger: just in case [10:16 PM] Danger: it's possible keys will be released in chronological order [10:17 PM] jeanseberg: @lupdike Can you try the passwords posted in https://www.reddit.com/r/WhereIsAssange/comments/58vdsy/insurance_file_testing/d94ydme/ reddit Insurance file testing • /r/WhereIsAssange
Hammasini ko'rsatish...

those where the last pages. to save you a trip
Hammasini ko'rsatish...
python newscript.py trans.txt > cables you will get a zipfile with the cables [2:42 AM] iDanoo: woah [2:42 AM] claudiacardinale: GETTING ADDRESSES FROM HASHES # How to get address from hash # Run the following on bitcoin from pybitcoin import BitcoinPrivateKey pk = BitcoinPrivateKey('HASHGOESHERE', compressed=True) pk.public_key().address() # Compressed address will be returned pk = BitcoinPrivateKey('HASHGOESHERE', compressed=False) pk.public_key().address() # Uncompressed address will be returned snowden 1EnDZkT8Thep9sfbAy5gwg23EHhZw7tYwg 1L3Zqv68zsXxNs53r25dKcUgjDe1119Rhj kerry 1D7f2VtZz7HHmdhpgn82nDhfu1b3PN5TaU 1KWsRE9FjFTZgBzKyjv6UQQGwKACbQgR9e ecuador 1JZL5DtxtsPk5MuAhQgsDd5ZYGaKVbiRta 16YJC3wJtAUjYWsCRXgYed9iyfL8AqqXpB ukfco 1Pf71gkiDPZNaS1DrnexsA33t394A2JBmf 1HsJsAsDT3yJLBHJFBioTLQDGWi5DJvbdm [2:42 AM] claudiacardinale: Analysis threads (heavily deleted and slid): https://8ch.net/pol/res/7946506.html https://8ch.net/pol/res/7962287.html Post where a 'key' was posted and deletions started taking place: https://web.archive.org/web/20161024220842/http://8ch.net/pol/res/7933031.html https://web.archive.org/web/20161022203236/http://8ch.net/pol/res/7933031.html [2:42 AM] claudiacardinale: Link to original insurance file in case anyone wants to test that one: https://wikileaks.org/wiki/Afghan_War_Diary,_2004-2010 https://web.archive.org/web/20100901162556/http://leakmirror.wikileaks.org/file/straw-glass-and-bottle/insurance.aes256 https://file.wikileaks.org/torrent/2016-06-03_insurance.aes256.torrent https://file.wikileaks.org/torrent/wikileaks-insurance-20120222.tar.bz2.aes.torrent https://file.wikileaks.org/torrent/wlinsurance-20130815-A.aes256.torrent https://file.wikileaks.org/torrent/wlinsurance-20130815-B.aes256.torrent https://file.wikileaks.org/torrent/wlinsurance-20130815-C.aes256.torrent openssl enc -d -aes-256-cbc -in insurance.aes256 -out onionout -k "ONION" openssl enc -d -bf -in insurance.aes256 -out bfonionout -k "ONION" openssl enc -d -aes-256-cfb8 -in insurance.aes256 -out fb8onionout -k "ONION" openssl enc -d -bf -in insurance.aes256 -out bfrouterout -k "ROUTER" openssl enc -d -cast -in insurance.aes256 -out outtor -k "Tor" the passwords seem to be telling us that there might be multiple files coming out of this, or it could be telling us a message like "Use a Tor Onion Router and do this". It might be that the file has to be unlocked over and over. also someone suggested, "take the last 32 or so bytes in the file, flip them, save it and then run 'file -b' on it." UNCRACKED TRANSACTIONS: 7379ab5047b143c0b6cfe5d8d79ad240b4b4f8cced55aa26f86d1d3d370c0d4c d3c1cb2cdbf07c25e3c5f513de5ee36081a7c590e621f1f1eab62e8d4b50b635 cce82f3bde0537f82a55f3b8458cb50d632977f85c81dad3e1983a3348638f5c 2a14783f74796ace53e0a6859a7012723d3d6cd9dacf72d4e90a3394484093df 657aecafe66d729d2e2f6f325fcc4acb8501d8f02512d1f5042a36dd1bbd21d1 05e6c80d9d6469e7d1328e89b9d971b19972594701586bbcbd70070f2be799db 623463a2a8a949e0590ffe6b2fd3e4e1028b2b99c747e82e899da4485eb0b6be 5143cf232576ae53e8991ca389334563f14ea7a7c507a3e081fbef2538c84f6e
Hammasini ko'rsatish...

psbdmp FUfs2QTG Search-Kim Dotcom.docx.pdf1.86 KB
psbdmp FUfs2QTG Search-Kim Dotcom.docx.txt0.80 KB
psbdmp FUfs2QTG Search-Kim Dotcom.docx0.61 KB
txt and docx format both files are the same im sending one more in pdf if anyone is interested
Hammasini ko'rsatish...
[2:43 AM] claudiacardinale: Spread this everywhere. [2:43 AM] claudiacardinale: Download the blockchain and the insurance files NOW [2:43 AM] iDanoo: saving it [2:44 AM] iDanoo: done! [2:45 AM] iDanoo: Thanks @claudiacardinale [2:45 AM] Bobb: Ok so wow and thanks [2:47 AM] Bobb: it seems like layered hex that one "TOR" file. That is anothers comment not mine. I like the tool there also. is I understand correctly it is a way to recomplile files from multiple bitcoin trancasctions. That could be huuge utility going forward. [2:51 AM] iDanoo: Yeah I'm not sure, woo gone from 8 years down to 5 years behind in the block chain [2:54 AM] claudiacardinale: Please take my messages about, put them into a text file and save them. [2:54 AM] claudiacardinale: I don't have much time. [2:55 AM] Bobb: I saved your message @claudiacardina [2:56 AM] Bobb: thanks [3:00 AM] iDanoo: @claudiacardinale where are you from? If you don't mind me asking. [3:01 AM] claudiacardinale: I am completely compromised. I don't have more time left. I won't be able to log back in after I disconnect now. [3:04 AM] iDanoo: Is there anything else? [3:04 AM] iDanoo: Do you have pgp/any other contact methods? [3:04 AM] iDanoo: We appreciate the info/time you've put in. [3:07 AM] Bobb: How do you know you are comp'd? You are good if you can tell IMO [3:09 AM] Bobb: when the fcc took over the internet in the usa many people did not notice the bug running in the background. Only those who hand code their websites noticed anything at all. And that was on an older machine running a special linux live cd [3:09 AM] Bobb: that is why I ask re: "I am completely compromised"... [3:10 AM] claudiacardinale: Pay attention to the DDoS attacks and what gets deleted from the Internet. [3:10 AM] claudiacardinale: Listen. There is no one left. [3:11 AM] claudiacardinale: When we started we had a big group [3:11 AM] claudiacardinale: Everyone is missing or completely silent. [3:11 AM] claudiacardinale: We made the mistake of working alone and not sharing. [3:11 AM] claudiacardinale: If we spread the progress there is no reason to silence anyone. [3:11 AM] claudiacardinale: The keys are out there. Don't let anyone tell you otherwise. The truth can still come out. [3:11 AM] claudiacardinale: Work together and keep everyone informed. [3:12 AM] claudiacardinale: Push progress to the blockchain. [3:12 AM] Bobb: I agree the keys are out [3:12 AM] Bobb: good plan claudia [3:12 AM] iDanoo: Will do that. [3:13 AM] Bobb: Where are the keys? [3:14 AM] Bobb: You are not alone [3:15 AM] claudiacardinale: Use the information posted above. [3:15 AM] claudiacardinale: If anyone finds a working key spread it immediately.
Hammasini ko'rsatish...
Hammasini ko'rsatish...
Boshqa reja tanlang

Joriy rejangiz faqat 5 ta kanal uchun analitika imkoniyatini beradi. Ko'proq olish uchun, iltimos, boshqa reja tanlang.