It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Originally posted by crezo
I've heard a lot of people on ATS claiming he/wikileaks is a plant.
Could someone who believes this please explain to how they came to this conclusion? With all the press he is getting he seems pretty damn hot for a plant, doesn't make any sense to me at all!
Originally posted by JBA2848
reply to post by freedommusic
Has anybody thought that maybe tor must be installed and the required ports open on your pc. Tor is used as a ip location verifier. Tor sends out your ip to check on external database to compare to ips allowed access to the file.
Might have to spoof your own pc ip in order to appear as a authentic user. That ip could be military or government ip even could be wikis.
[edit on 1-8-2010 by JBA2848]
The security watchword is: don't ever expect infallible security, that is always snail oil. The intelligence watchword is never trust an intelligence source, they are all unreliable. The classification watchword is never trust the highest classification, that is bullshovel to dupe those who believe only they have access.
The sysadmin watchword is ... lay low, log everything, copy, replace with a fake, tell no one especially another sysadmin who will rat you: l'enfer, c'est les autres.
When you have installed our Tor access package (see below), you may then connect to Wikileaks via our anonymous address (the ".onion" is short for "Onion Routing", but you do not need to be concerned with this detail). Then whenever you want to establish an encrypted anonymous (even to internet spies) connection to Wikileaks goto our magic link:
http: // gaddbiwdftapglkq.onion/ (this link will only work once you have installed and configured Tor.) http: // www.__._/wiki/WikiLeaks:Tor
Originally posted by ymgve
The password is not ONION or ROUTER or any of the suggested alternatives. OpenSSL only does very basic validity checking - it only checks the padding of the decrypted data. What this means in practice is that one in every 256 wrong passwords will seem valid to OpenSSL and not produce any error message. As an example, try this:
openssl enc -d -aes256 -in insurance.aes256 -pass pass:heyabovetopsecretthepasswordisnotonion149 > insurance.out
Definitely not the correct password, but it doesn't give any error.
Originally posted by IAMNOTWHOITSAYSIAM
Even if computing power 100.000 folds in the next few years the odds of bruteforcing this before the universe ends are still virtually *ZERO*
If you don't belive any of what I tell you and still convinced you guessed the correct key since you are not getting an error, do your on research, encrypt a picture of your dog or cat with openssl then try random passwords to see how many don't produce an error and how many of those actually reproduce your orginal picture of your adorable pet.
sorry to crush your hopes and dreams but a little reality check was needed in this thread.