It looks like you're using an Ad Blocker.

Please white-list or disable AboveTopSecret.com in your ad-blocking tool.

Thank you.

 

Some features of ATS will be disabled while you continue to use an ad-blocker.

 

We can finally break the WikiLeaks Insurance Files! University-of-Toronto Encryption Discovery!

page: 1
37
<<   2  3 >>

log in

join
share:
+6 more 
posted on Jun, 2 2016 @ 10:41 PM
link   
THIS IS HUGE !!!!!

We can finally break the WikiLeaks Insurance Files!
because of an Encryption Discovery by Students of
the University of Toronto which allows huge
integer numbers to be factored quickly!

====

(copied from a unreleased draft of a News Release from UofT)

AES-256 Encryption Possibly Now Broken
after New Method to Speedily Factor
Integers Greater than 128 bits found!

University of Toronto
Mathematics Dept./Computer Sciences Dept.

Factoring of Large Integers using Estimation
of Weak Intermediate Key Points along a
Quadratic Curve has been discovered by
Department of Computer Science PhD candidates
xxxxx x. xxxxxxxxx, xxx xxxxx xxxxxxxxxxxx
and Department of Mathematics MSc. candidate
xx xx xxxxx and his visiting professor advisor
Dr. xxx xxxxx xxxxxxxx (PhD, Princeton University)

Quadratic Curves embodied within numeric sentences
such as Fibonacci Sequences, Non-Evenly Divisible
values including PI, Catalan Numbers, Mersenne Primes
were examined by IBM-sourced datamining software
originally developed as part of the Deep Blue Project
which became the core for IBM's Jeapordy-winning
Watson SuperComputer.

The University of Toronto students were awarded
thousands of hours of CPU time on an IBM Watson-based
supercomputing system as part of a Youth in Computer Sciences
Initiative sponsored by the Government of Ontario and
Government of Canada.

After completion of the datamining experiment,
the students found that intermediate keys created
specifically within the AES-256 encryption algorithm
had cryptographically weak output that followed
a Quadratic Curve when initial keys contained
identifiable Fibonacci Sequences, Non-Evenly
Divisible values including PI, Catalan Numbers
and Mersenne Primes which allowed the students
to estimate possible integer factors allowing
them to recover the initial encryption key
within as little as 100 hours of compute time.

The students and their advisor will be presenting
an abstract of their final paper at the August 1, 2016
to August 4, 2016, 22nd Conference on Applications of
Computer Algebra at the Kassel University, Kassel, Germany.

Link: www.mathematik.uni-kassel.de...

As part of the presentation, source code will be
distibruted for peer review and an announcement
on further papers and conference appearances will
be forthcoming after the conference in Germany.


===

WHOAAAA !!!!! Somebody throw me a pie!

If I get this, 256-bit AES (Advanced Encryption Standard)
encryption can now be broken by seeing if the output
of any intermediate keys contains mathematically
significant numeric sequences?

If this is true and the keys broken in less than 100 hours,
THAT is literally one of biggest scientific discoveries
OF THE CENTURY !!!!! All current banking transactions,
digital signatures, network communications,
credit card and debit card transactions,
and AES-256 encrypted files are NOW TOAST
and can be BROKEN !!!!!

It means TRILLIONS OF DOLLARS is at risk
if this gets let out. I'm not quite sure that
the students and advisor realize how DANGEROUS
this discovery is especially if they release SOURCE CODE!!!!!

The ONLY GOOD NEWS is that we will FINALLY be able to BREAK
all the WikiLeaks Insurance files (I have lots of copies!)
If the source code release is true, I'm gonna get my cousin
in Germany to go and get a copy and email it back to me
where I will then BREAK the WikiLeaks files!

THIS IS TRULY TRULY A HUGE EVENT !!!!!!!!!

Can't wait to see if this is true.

---

P.S. One of my usual sources sent this to me.....Don't Bother to Ask!

(names were redacted by my source)

---

Read and Comment Away!

I Will Read and Add to Any Comments
starting on this Friday!


edit on 2016/6/2 by StargateSG7 because: sp




posted on Jun, 2 2016 @ 10:50 PM
link   
Not everyone has Watson in their back pocket for 100 hours.



posted on Jun, 2 2016 @ 10:51 PM
link   
The link only takes me to the main page. Where is the rest of your info from?



posted on Jun, 2 2016 @ 10:51 PM
link   
1. So no actual source for anyone else to verify?

2. If true, you realize it took a super computer 100 hours to crack this... your home desktop would take significantly longer.

3. If true, you question their intelligence to know how this could effect sensitive encrypted data, but you trust their intelligence to figure out how to come up with this ability?



posted on Jun, 3 2016 @ 05:20 AM
link   

originally posted by: Kargun
Not everyone has Watson in their back pocket for 100 hours.


watson was only used to discover the method, the 100 hours is regular computing power.



originally posted by: AdmireTheDistance
The link only takes me to the main page. Where is the rest of your info from?
the answer to your question is in the op itself, improve your reading comprehension.



originally posted by: StargateSG7
(copied from a unreleased draft of a News Release from UofT) P.S. One of my usual sources sent this to me.....Don't Bother to Ask! (names were redacted by my source)


so long as it remains unreleased, the op is the source, the references could be contacted to verify the story if someone where so bold...
edit on 6/3/16 by pryingopen3rdeye because: (no reason given)



posted on Jun, 3 2016 @ 07:39 AM
link   

originally posted by: pryingopen3rdeye
...the references could be contacted to verify the story if someone where so bold...

I am. Can you give any more specific contact information, or should I just contact the department head?



posted on Jun, 3 2016 @ 07:44 AM
link   
HaHa fib's sequence. It's always fib, always. The backbone of our reality. Might as well be the universes DNA because nothing exists without.

Makes me really wonder more and more about holographic simulation theory. A great focus perhaps for testing the control system.



posted on Jun, 3 2016 @ 10:24 AM
link   
this is great news for save file hackers. now we can bust the encryption on the x box one and ps4.



posted on Jun, 3 2016 @ 12:14 PM
link   

originally posted by: AdmireTheDistance

originally posted by: pryingopen3rdeye
...the references could be contacted to verify the story if someone where so bold...

I am. Can you give any more specific contact information, or should I just contact the department head?


---

I have made inquiries into the mathematics department and
computer sciences departments at the University of Toronto
(they seem to be the same department!) and have done a
alumni/professor emeritis search at Princeton to see which
professor is visiting the University of Toronto.

From there I can find out WHICH students are the ones
that have prepared this paper.

---

I also have some further information as to a general algorithm
outlining WHY and HOW the student's method supposedly works.

The output of the intermediate keys created by the combination of
plain-English-text initial keys and common computer file-type headers
from MS-Word, Excel, Access, JPEG, BMP files were compared with
intermediate keys created from fully randomized initial keys and
fully random data blocks and it was found that plain-text keys
and plain text header data TENDED to create intermediate
keys that contained mathematically significant numeric
sequences that tended to follow a Quadratic function.

See Link:
en.wikipedia.org...

This allowed the researchers to EXCLUDE specific initial key
values and focus on likely candidates for the initial key based
upon possible excluded pre-calculated factors (i.e. value of
C is a product of A x B where A and B are called the factors)
that were caused by keys and data that contained highly
random values vs keys and data that had common file-type
headers information and common text.

This allowed the students to NARROW DOWN the key search
down from 2^256 possible combinations down to 2^128, 2^64
or even less possible combinations.

The differences in the resulting intermediate keys between
plaintext and fully random initial keys/data allowed the students
to also differentiate initial keys that contain ASCII characters
that were within a specific range of ordinal/ASCII/Unicode values
(i.e. in between 'A'-to-'Z' and 'a'-to-'z', '1'-to-'9') so that the IBM Watson
system could ESTIMATE that at character-key index X1-to-X2 the likely
characters were vowels or consonants or numeric/punctuation characters.

From there, basic English-language dictionary attacks were used to find LIKELY
initial keys that contained common words and any extra jumbled characters.

If I remember correctly AES is a Rijndael-type cipher that allows different
key and block sizes but COMMON ones are 128 bit block size and 128, 192
and 256 bits that uses a substitution-permutation network

See link:
en.wikipedia.org...

which seems to have just been proven to produce output that
follows a quadratic function. This to me INDICATES A POSSIBLE
INTENTIONAL BACKDOOR PROBABLY INTRODUCED ON PURPOSE
by it's creators or the encryption standards-committee modifiers!
(i.e. NIST or NSA, etc.) I suspect that on a commercial basis,
the fact it still took a supercomputer and 100 hours to decode
a 256 bit block indicates that AES-256 is secure enough for
MOST time-limited commercial applications but for files
that were encrypted for long-term storage that
THIS IS A BIG PROBLEM !!!!! It also means I could
probably used a few hundred AMD GPUs to find
or BREAK the PRIVATE KEYS of any public/Private
key exchange mechanism and impersonate those
credentials...!!!!!

CAN YOU SAY WIRE MYSELF Two Billion dollars from
a SWIFT-money-wire-transaction or stock trade account
by impersonating CitiGroup or Goldman Sachs credentials!

HOOOO-BOY !!!! This is H-U-G-E !!!!!!!!!

Seriously --- I don't think y'all or these kids
TRULY UNDERSTAND JUST HOW DANGEROUS
this INFORMATIION TRULY IS !!!!!!!!

If that source code GET RELEASED
WE ARE ALL SOOOOO SCREWED !!!!!

===

I should note that the IBM Watson supercomputer used in the research
is only an IBM PowerServer system of 80 teraflops which means I can
buy 40 Consumer-grade AMD Radeon Fury-X gaming graphics cards (GPU's)
at 2.2 Teraflops for less than $650 each ($26,000 total) to have the same
CPU horsepower as the IBM Watson.

And since the students will reveal the source code, I can get it
to run on a Linux system and do what IBM watson did lickity split!
In fact since at our company we have access to a much larger system
(i.e. 400 AMD S9150 GPU's = 1.2 PetaFLOPS) we could break
the Wikileaks files in less than a few hours!

--- HOOO YA !!!!!!!! WikiLeaks Insurance File Password here we come!


edit on 2016/6/3 by StargateSG7 because: sp



posted on Jun, 3 2016 @ 12:46 PM
link   
a reply to: StargateSG7

Here is a list of POSSIBLE candidates for the student advisor
and graduate student positions who MIGHT be supervising
or ARE these kids.

I suggest focusing on anyone who does Matrices, algebra, encryption,
differential equations, complex variables and number theory. THEY
would be the most likely candidates for the Mathematics portion.

Link:
www.math.toronto.edu...

I'll keep a copy of the website list
just in case it SUDDENLY DISAPPEARS!!!!!

----

For the computer science portion I suggest the
Number Theory Group and the Numerical Analysis
and Scientific Computing Group at the following links:

web.cs.toronto.edu...

and

www.cs.toronto.edu...

and

www.cs.toronto.edu...

Possible People:
www.cs.toronto.edu...

===

Make a copy of these lists because I GUARANTEE YOU
that in a few hours or at most a few days this is
SUDDENLY going to disappear from the UofT website!

This type of discovery is LITERALLY THE BIGGEST EVENT in
50 YEARS FOR COMPUTER SCIENCE AND FINANCIAL SERVICES !!!!



posted on Jun, 3 2016 @ 01:00 PM
link   

originally posted by: TycoonBarnaby
1. So no actual source for anyone else to verify?

2. If true, you realize it took a super computer 100 hours to crack this... your home desktop would take significantly longer.

3. If true, you question their intelligence to know how this could effect sensitive encrypted data, but you trust their intelligence to figure out how to come up with this ability?


---

They're Gen-Y kids most likely, so YES I do question their ability
to FULLY UNDERSTAND the FULL ramifications of their discovery!

I've got a A LOT OF EXPERIENCE with Gen-Y's and they are really
book-smart with high technical ability but 90% utterly deficient
in Future Consequence Analysis and utterly deficient in emotional
maturity. I can see the consequences of this! But I don't think
THEY DO or more likely don't really CARE becuase they are
so media saturated and so indoctrinated into the
MEDIA-AND-INFORMATION-IS-FREE mentality that
they really aren't looking forward that much!

I cannot guess at the mentality of the professors or advisors!

It looks like we will just have to wait for the German
Math Conference to find out more about the source code!

I do suspect the above description sent to me is JUST ENOUGH DATA
that it could reasonably be used by a Math and CSC major to duplicate
their efforts.

---

Again, don't ask about my source, but the very fact that he/she
could actually get it in the first place (based upon their usual
area of intelligence-gathering expertise) indicates he/she
is concerned enough to send it to me!

And when THIS SOURCE sends something to me, it also means
MORE THAN A FEW PEOPLE in the Intelligence Community is HIGHLY
CONCERNED AND ALREADY LOOKING HEAVILY into this subject area.

AGAIN! I suspect we will see some "Sudden Changes" in the
U-of-T's Math and Computer Science websites by Monday!



posted on Jun, 3 2016 @ 01:11 PM
link   
a reply to: StargateSG7

You have experience with generation-y kids, great. What is your experience with mathematicians who hold a PhD? What is your own background in mathematics or computer science? Do you have a PhD?

I have a PhD in mathematics, so I have a lot of experience with mathematicians and computer scientists. I can't think of a single one that I know who wouldn't initially grasp the doom scenario of wire transferring funds (you know, assuming you don't leave any sort of trail right.... or would you make sure to cover your tracks with encryption.... wait....)

If this is true I am very interested. However, surely you understand why people are skeptical of your claims when you provide no source and ask us not to inquire further about your source.



posted on Jun, 3 2016 @ 01:34 PM
link   
a reply to: TycoonBarnaby

I personally have NO PHD nor any Masters in Computer Science
and Mathematics. While I do have TONS of in-field experience
in Computer Graphics/Video Systems programming and very
general encryption systems programming (self-taught over 30 years),
my formal Diploma is in Television Broadcast Operations from
SAIT (Southern Alberta Institute of Technology).

I also have more than just a little field experience
in Intelligence Gathering which I would rather keep
private due to the security situation of certain of
my still active earlier-life colleagues.

The Gen-Y comment I make is battle worn experience
over the last few years (i've canned enough of them!)
regarding HUGE emotional immaturity but excellent
technical skills. A HUGE deficiency in foresight is
my own personal observation and conclusion!

The advisors SHOULD be seeing the ramifications
of this type of research BUT I am inclined to believe
that desired personal achievement/academic recognition
may be a BIG FACTOR on the supervisory side here!

--

Anyways, ALWAYS takes this report with a grain of salt
because NONE of the claims have as of yet been fully
evaluated or proven publicly!

---

It still means I AM VERY INTERESTED because I want
to use this technology to BREAK all the Wikileaks
Insurance Files and find out what's been hidden
from public view! --- HOO YA!!!!! I CAN'T WAIT !!!!!


edit on 2016/6/3 by StargateSG7 because: sp



posted on Jun, 3 2016 @ 01:39 PM
link   
Watson isn't the only way to yield heavy computational power. Rent a botnet. Or establish one of your own. The shared resources of any computer not using all its resources at that moment would be significant, indeed.



posted on Jun, 3 2016 @ 02:30 PM
link   

originally posted by: bigfatfurrytexan
Watson isn't the only way to yield heavy computational power. Rent a botnet. Or establish one of your own. The shared resources of any computer not using all its resources at that moment would be significant, indeed.


---

I think IBM Watson was used because of it's PRE-BUILT Datamining abilities!

Nowadays, there lots of open-source datamining/fuzzy logic systems that
can be installed on Beowulf networks (i.e. Networked Linux machines).
At our local SFU/UBC universities, in my estimation, there is over a
10 teraflops just in general Intel CPU horsepower sitting idle at night.
Add in a decent but CHEAP graphics card to each of those idle
computers and probably a full TWO PetaFLOPs is available.

These days $26,000 is CHEAP! for such supercomputer horsepower.
80 Teraflops of computing horsepower for that amount using
consumer-grade GPU gaming cards is NOTHING TO LAUGH AT!!!!

Our original GPU cards were $4000+ EACH !!! for 400 of them (S9150)!
Nowadays nearly the same GPU horsepower can be had
for $650 EACH!!! What a price drop!

With 80 Teraflops being that cheap, we could just put it
on the company Visa and even stuff it in the downstairs
storage room at my cramped Vancouver office and have
it up and running in just a few days!

---

I am soooooo curious as to the source code and I am
just ITCHING to get my hands on it! I'll send a text to
my cousin to see if he can get a copy of the source
code at the German math conference.


edit on 2016/6/3 by StargateSG7 because: sp

edit on 2016/6/3 by StargateSG7 because: sp



posted on Jun, 6 2016 @ 01:37 PM
link   
a reply to: pryingopen3rdeye

..

It looks like I POSSIBLY MIGHT be one of the luckiest guys on Earth
and soon MAYBE have a copy of the source code MUCH EARLIER
THAN I ORIGINALLY THOUGHT !!!!

It seems the code DOES NOT NEED an IBM Watson supercomputer
but rather the supercomputer time was originally donated for that
work and Watson's built-in software was ideal in finding numeric
sequence patterns in AES-256 keybreaking output tasks.

Two packages for Linux are able to DUPLICATE Watson's software
and that is FuzzyLite 5.0 for C++ which is something nearly
commercial quality and for NeuralNet software it's one of
the following:

Comparison of Biological System's Neural Network Simulators
which can be code-modified to work on Numerical Sequences:
grey.colorado.edu...

and

Some background Neural Net software definitions:
en.wikipedia.org...

This is probably one of the better ones all packaged up for immediate use:

---- Data Analysis Simulators for Linux ---

SimFit
www.simfit.org.uk...

List of Science and data Applications for Linux:
wiki.archlinux.org...

===

However to run this type of data you really do
need some spare computing horsepower
(i.e. Windows PC's sitting idle at night) or an
array of GPU graphics cards from AMD or NVIDIA.

To do good data analysis work, you need a MINIMUM
of EIGHT such GPUS which is about $5200 in total cost.

It would be PREFERABLE that you had at least
20 or more GPU cards (i.e. AMD Rage Fury-X with
4 gigs of RAM) so that you could break a 256-bit AES
key code in something less than 7 days! ($13,000 total cost)

80 such GPU cards will EQUAL the horsepower of
the IBM Watson supercomputer ($26,000 total cost)

---

My source SAYS he can get me a copy, but whether it's complete
that will be for me to evaluate --- I hate reading other people's
source code since MANY times it is so obtuse. It ain't a simple
to make source code understandable but we shall see...... :-) :-)
No specific timeline was specified for me to get the code....



posted on Jun, 6 2016 @ 01:40 PM
link   
a reply to: StargateSG7

An interesting observation from IBM:


You're probably using IBM's Watson computer and don't know it
But please don't call it "artificial intelligence," IBM's CEO says.

www.recode.net...

---

P.S. Watson is technically a RULE-BASED AND/OR A FUZZY-LOGIC-BASED EXPERT SYSTEM !!!



posted on Jun, 17 2016 @ 09:11 AM
link   
a reply to: StargateSG7

so this is really strange, back when this thread first popped i went ahead and saved a copy of this thread into the wayback machine archives at web.archive.org
cause i figured what if it got censored, just in case,
well now i went to double check and it is no longer archived, believe the only ones capable of having something removed from the archive would be ats themselves, or University of Toronto after confirming to the archives the press release was real,

so this could be an indicator.
i have just saved this thread to the archives AGAIN, lets see if it sticks this time
web.archive.org...://www.abovetopsecret.com/forum/thread1120355/pg1
youll have to quote my post and copy past the url into browser to see it, ats wont allow it to format correctly in the post
edit on 6/17/16 by pryingopen3rdeye because: (no reason given)



posted on Jun, 20 2016 @ 03:50 PM
link   

originally posted by: pryingopen3rdeye
a reply to: StargateSG7

so this is really strange, back when this thread first popped i went ahead and saved a copy of this thread into the wayback machine archives at web.archive.org
cause i figured what if it got censored, just in case,
well now i went to double check and it is no longer archived, believe the only ones capable of having something removed from the archive would be ats themselves, or University of Toronto after confirming to the archives the press release was real,

so this could be an indicator.
i have just saved this thread to the archives AGAIN, lets see if it sticks this time
web.archive.org...://www.abovetopsecret.com/forum/thread1120355/pg1
youll have to quote my post and copy past the url into browser to see it, ats wont allow it to format correctly in the post


---

ATS Posts not being posted!

Web Archives NOT being archived!

Messages being lost between U2U users!

There are a NUMBER of reasons for these events
but here is a VERY GENERAL POSSIBLE EXPLANATION
for SOME of the issues you have experienced.

This web archives issue is a common problem with
ATS because the client connections between the
servers owned and operated on behalf
of AboveTopSecret by:

Matt Mahvi,
Staminus Communications, Inc,
4695 Macarthur Court,
11Th Floor,
Newport Beach, USA
92660

have had numerous issues with hackers!

His hosted websites have had MORE THAN
A FEW PROBLEMS with agency hackers
(USA, Russia, China, UK, etc. etc.)
AND criminal hackers:

www.ibtimes.co.uk...

And based upon the surrounding offices, I can
SUSPICIOUSLY INFER where he gets his probably
gets his OWN AGENCY secret funding from:

Capstone Partners?
Bank of America?
Vanguard Capital?

"https://www.google.ca/maps/place/4695+MacArthur+Ct/@33.6704025,-117.8626663,19z"

NOTE: Copy above link to Google maps MINUS THE DOUBLE QUOTES

Who knows? I smell an ATS Multi-Agency Slush Fund Conspiracy here !!!!!!!

...ALSO....

There are NUMEROUS Man-in-The-Middle server connections
operated by MANY agencies and groups which INTERCEPT and decrypt
your SSL2/SSL3/TLS/etc encrypted ATS connections and the sent/received
IP packets are almost always saved to local hard disks and /or also forwarded
onto UTAH, Langley VA, Ft. Meade, etc. where something called
an "Array Processor" does deep packet inspections to find text
containing one of the "Dictionary Keywords" that is requested
by the "Five Eyes" Echelon partnership (USA, UK, Canada,
Australia, New Zealand). The first 5-Eyes keyword search
is done ON ALL ATS packets to search for the usual ATS oddballs
who might be contemplating terrorist acts or are part of domestic
groups (aka gun owners, survivalists, anti-government types, etc)
that ANY of the 5-eyes partners wants to keep tabs on.
If a hit is made on any of the "Dictionary Entries" the
data packets obtained from ATS get sent to
FBI/CSIS/CSE/MI5/MI6, etc for possible criminal
activities intelligence action.

The 2nd Layer Text search is for Metadata (packet times,
IP address, discernable phone numbers, email and social
media addresses and other identifiable person, time and
place data) which goes into the NSA's SearchBook database
which is its own version of Facebook running on an SQL backend
and I think an Oracle or DB2 database engine (not sure which
one anymore!) which takes all the man-in-the-middle packets
taken from various telco datamining intercepts and creates an
internal-only online profile of a person-of-interest. It's pretty
much identical to Facebook (even the front end user interface!)
and allows NSA employees the ability to correlate ALL current
who/date/time/place CONNECTIONS between all persons of
interest within a given geographic area, calendar period
and/or social media and email communications criteria.

The NSA SearchBook system allows NSA to have a
timeline-like graph/chart that shows how many
degrees of separation are between any given group
of individuals so that a determination may be obtained
if the actions and/or words of a single person of a group
of people are actionable and related!

The 2nd layer text search/metadata correlation
is for NSA-internal use only for mostly internal-to-USA
and SOME foreign intelligence agency sharing! The CIA
his its own version of SearchBook for Foreign Policy/StateCraft/Spy
use by its external affairs area staff in various countries but both
agencies HATE SHARING their own databases with each other
in fact, BLATANTLY interfering and delaying requests for each
other's data! --- STUPID STUPID STUPID !!!!

The 3rd Layer Deep Packet inspection is
DIA (Defence Intelligence Agency) use
internal to SPECIFIC SUBGROUPS who need
to find certain political and technological
activities/personnel/systems and for
use by SOCOM/Joint Chiefs perusal.
Military operations oriented and
for protection of Services property
and personnel.

The 4th Layer Search of ATS communications
and postings...is for us and if you find out
about it then we (Me?) gets to come and
hunt y'all down in your office be it at
McLean, VA 22101 or at 9800 Savage Road
or at 20 20 MacDill Blvd and trust me on this
YOU DO NOT WANT TO SEE ME IN YOUR BUILDING
accompanied by my Oakley-sunglass-wearing-and-
Oakley-booted force of 250 lbs+ black-badged goons! ;-) :-)

Dat's fer da Spooks!

---

After the above explanation, I can say ATS is also slow PARTLY
because Microsoft hasn't got folder, file and communications
permissions down correctly on Windows 2012/SQL server which
means too many retries for packet requests that are being made
between the man-and-the-middle servers and the client and
ATS main servers. In addition to STOOOPID DNS (Domain Name
System) timeouts caused by improperly configured DNS lists,
bad packet forwarding setups and any number of simple
MUST BE DONE server administration tasks that well...
JUST WEREN'T DONE by the people intercepting
all our ATS communications!

This means updates to user interfaces, whois requests,
internet archive requests are all screwy. Plus this breaking
AES-256 keys is VERY INTERESTING to NSA crypto personnel
and a lot of requests are coming into ATS for further website
searches which also slows thing.

For the spooks:
P.S. Replace all file/folder permissions with System, Services, Network Services,
Domain Admins, Enterprise Admins and Administrators (set all to Full Control)
then add Trusted Installer (partial control --- u cn figure which ones out!)
and add the LOCAL MACHINE Admin account on the server or client
(full control) and finally the actual account (i.e. NSA_Sweeper_Account)
that the software is running under (full control) --- Disable all inheritance
use explicit permissions only --- Take ownership as Administrators on all
files and folders so you can remove inheritance. GO THROUGH EVERY FLDER
in C:Windows --- do it by hand! Permissions ARE the problem!

---

Now back to ATS....ATS is monitored DAILY even HOURLY or more!
My crypto subject area is interesting --- And soon I WILL have the
Wikileaks insurance file broken by the University of Toronto
algorithm and then will post the password here once I break it!


P.S. It is SO EASY to determine whether a
man-in-the-middle server is being used
it's not funny....

edit on 2016/6/20 by StargateSG7 because: sp



posted on Jun, 20 2016 @ 05:46 PM
link   
Well,IMHO, you have won the Isser Harel award for persistence in finding a method and you also have a interesting source.
The only thing remaining is product. A few hundred extra hours of process time won't be problem.

I for one will be very interested in your results, in a few weeks or how ever long it takes.

Best of luck.

Buck



new topics

top topics



 
37
<<   2  3 >>

log in

join