It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Originally posted by bikeshedding
reply to post by depth om
I don't see the value as an intelligence tool. What is it really proving in that scenario? That person X is potentially interested in secrets and has a gig and a half of free space and the patience to wait on those secrets? Aside from the hard drive space, that's pretty much everyone. If it's a tool, it seems like a dull and costly tool with little viable use other than to suggest that certain parties might be interesting to spy on. To then spy on those parties takes resources like manpower, time, and most importantly: money. Is it worth allocating those resources to keep an eye on Joe Blow in Nowhere, Kansas because he decided to download a file that he can't read? I don't buy it.
I see no compelling evidence to suggest that a weak key was chosen (certainly not in that email), but I do admit that it is a possibility.
Originally posted by the.krio
... The quoted email by Wikileaks suggests that they've used a weak key on purpose. Otherwise I see no reason for them to add fuel to this fire and frustrate a lot of people in the process. As matter of public relations, they've should have out right stated that we won't crack it and that they don't want us to.
So it looks like that this file is too hot even for them to release so they are using us to shift some blame away.
The idea of a weak key/password has been mentioned a lot - but discussion relative to HOW this encryption is accomplished seems to negate a 'weak key' theory
And regarding the email and PR - my two cents: The email reply probably included sarcasms.
misinformational started some discussion earlier about legal liabilities and such, but it hasn't been expanded on yet. I was wondering if your comment was relevant to that or if you meant something else entirely.