It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Some features of ATS will be disabled while you continue to use an ad-blocker.
originally posted by: StargateSG7
I included the encryption original text which to me DOES SEEM LIKE
but I should note that if you turn your mind OFF a bit
and sink yourself into a teenager's or a younger person's mindset, you will see that he does not explicitly say that he absolutely broke the AES encryption system itself
but rather he used some incomprehensible (to me at least!) attack on the disk image itself which in MY PERSONAL BELIEF that means that in some way he was able to obtain access to a passcode or data entry system that may have had the original key within what I suppose would be a system cache file or a TEMP file.
And one OTHER VULNERABILITY is that the large intermediate and final keys produced by AES or any other SHIFT BOX oriented algorithm TENDS to require some space in global heap memory that CAN BE SWAPPED OUT TO DISK if there is low RAM memory issue unless LOCAL RAM has been explicitly LOCKED in place. This means the windows swap file could STILL HAVE the intermediate or final keys and you can stick those in a custom AES implementation to decrypt a data stream.
So again, it is my belief that the hacker took five weeks to search the entire original drive image
It sounds like a task for someone with obsessive compulsive disorder would do which MANY young technology nerds or hackers would likely be.
I got a recent anonymously sourced, extrememly large encrypted text file of hex numbers on a series of large flash memory cards -also AES encrypted-which contains a message hinting at a possible key combination-Because the message indicated the file was a bit-by-bit copy of a FAT32 hard disk image of a specific brand and type of hard disk, I immediately knew of the content's plaintext and the position of certain pieces of that plaintext content-Statistical analysis supposedly says that Advanced Encryption Standard has a uniform randomization of plaintext-however that isn't quite true because of shiftbox blocking length which allows me to find and narrow down my search for specific plaintext within the length of the shiftbox-so bingo-five weeks later i've got a true decrypt key of a FAT32 drive image which I mounted as a virtual drive!
originally posted by: DJW001
a reply to: StargateSG7
What does a Dyson sphere and various coding techniques have to do with a grainy old film of a President meeting aliens? I submit that you are obfuscating your own thread deliberately. [HOAX!]
I'm nodding my head, so far.
originally posted by: defuntion
a reply to: StargateSG7
I am sorry Stargate, but after reading the OP and many of your responses defending the ideas and concepts proposed therein, I am going to have to call you out as the original author..
I would Love to be wrong, but you seem to have a lot of "supporting knowledge" of the subjects discussed..
Writing styles are very similar.
I do give you credit for a good attempt.
Again, I want to be wrong..
One hole. How many others? THIS is why hoaxers need to speak generally, not too deeply. Better to say less.
originally posted by: UKWO1Phot
Well just been looking through Hillenkoetters diary for November 47 and can't see any mention of a meeting with Fahrney.
Also on the Tues 18th it looks like he was in the office all day and a party at night.
Link to diary