It looks like you're using an Ad Blocker.

Please white-list or disable AboveTopSecret.com in your ad-blocking tool.

Thank you.

 

Some features of ATS will be disabled while you continue to use an ad-blocker.

 

WikiLeaks Insurance File Password

page: 18
130
<< 15  16  17    19  20 >>

log in

join
share:

posted on Dec, 9 2010 @ 09:19 PM
link   
please note that passwords work in a key-value pair format most likely.
That means that what was on the youtube site is half the password. That key is used as a seed to create the actual password. So what you are looking for are two passwords. The seed password and the actual password. This is from my previous work with AES encryption.



posted on Dec, 9 2010 @ 11:18 PM
link   
reply to post by InvalidRequest2011
 


Hey everybody!

First: everyone speculating on the insurance file... first read this
www.infoworld.com...
Julian Assange had many years to prepare this thing. I don't think he's a dumb guy so if a 'normal' person like the one who wrote the article already tought about some interesting things, rest assured that Assange also did...
That's my opinion on the matter

Second: Some of you guys are totally sure the NSA or whatever is light years ahead of things, that doesn't ad up with the plan for world domination now does it.
Saying that IF they had these techniques or computers or wathever futuristic devices, why wait so long to use them, if they could listen into phones and track people down they would already now about China's future plans, Iran's plans, Russia's plans and so on, THERE WOULD BE NO NEED FOR THESE CABLES THEN would it... STOP THE PARANOIA! The governments are just a bunch of widespread small 'power' communities who still rely on people LIKE Assange to build them new encryptions and stuff...
Now we have someone who has certain 'powers' BUT on the other side... YEAH!

Third and most IMPORTANT: Has anyone noticed the longest URL (or what you call'em, i'm no computer guy) ever, in this you tube video?
And isn't a legend something that explains things like a URL does to a computer?

Just my two cents, keep up the discussions and smile!



posted on Dec, 10 2010 @ 01:33 AM
link   
reply to post by SonOfTheLawOfOne
 



It uses a ONE TIME PAD. Julian Assange is likely the ONLY PERSON ON EARTH who knows the one time pad or where to find it


Ya think?
Better make that "one of only 2 people on earth" etc etc.

Question: Wheres the very "best" place to hide something if you don't want it to be found accidentally?

Answer?... Hide it in plain sight! (coz no one will ever think of looking for it there!)

This is the principle that camoflauge works on - hiding something in plane sight andeven nature uses this principle to its advantage as do army snipers etc etc.

Back in my spy days - we had dead drops, a hollowed out rock or tree branch along side a road 'visible in plain sight".

Wealso had a signal to show if the dead drop was loaded or not and needed clearing - a discarded coke can alongside the road way 100 yrds up from the hollow rock might signal its loaded and needs to be cleared.

So it is with one time pads!

The BEST one time pads are hidden in plain sight, every one has one but doesn't know it!. They don't need to be transmitted - thus can't be intercepted easily.

Humpty Dumpty makes a great one time pad - but there are better ones!.

One Time Pad..... = OTP.

OTP = Old testament Prayer.

Our father who etc etc - everyone knows it off by heart and the letters of your requirement for a, "one time pad" tell you what it is!.

Thats the difference between a spy and a dead spy or a wannabe.

The kids on here continually make me laugh with their naivety.

Most of 'em couldn't find the cheeks of their own butt with both hands if I loaned them a seeing eye dog and a mirror.

Dunno 'bout you blokes but I'm in like Flynne - all it takes is an IQ approaching that of Julian - give it your best shot!.

Thats the ultimate beauty of hididng something in plane sight, sooner or later ONE day, someone with the right intelligence quotia will come along and crack the code - look at the Pyramids for example.

Look at the hidden codes in Poussin's Les Bergers De Arcade, et in arcadia ego sum, resipsa prettiosa and so many of the clues hidden throughout history for us,

One has to become a bit of a sleuth, and learn to "spot" the things hidden in plain sight!

Cheers!



posted on Dec, 10 2010 @ 04:59 AM
link   

Originally posted by gandhi
Now if I only knew how to open the damn file....

Maybe computer programming would have been a good idea.


You beat me to it.
How do you even get to enter the password if you had the right one?
I've got it on my HDD and there's no utility in my files that can even touch it!



posted on Dec, 10 2010 @ 06:26 AM
link   

Originally posted by WatchRider

Originally posted by gandhi
Now if I only knew how to open the damn file....

Maybe computer programming would have been a good idea.


You beat me to it.
How do you even get to enter the password if you had the right one?
I've got it on my HDD and there's no utility in my files that can even touch it!

7.zip
* High compression ratio in 7z format with LZMA and LZMA2 compression
* Supported formats:
o Packing / unpacking: 7z, XZ, BZIP2, GZIP, TAR, ZIP and WIM
o Unpacking only: ARJ, CAB, CHM, CPIO, CramFS, DEB, DMG, FAT, HFS, ISO, LZH, LZMA, MBR, MSI, NSIS, NTFS, RAR, RPM, SquashFS, UDF, VHD, WIM, XAR and Z.
* For ZIP and GZIP formats, 7-Zip provides a compression ratio that is 2-10 % better than the ratio provided by PKZip and WinZip
* Strong AES-256 encryption in 7z and ZIP formats
* Self-extracting capability for 7z format
* Integration with Windows Shell
* Powerful File Manager
* Powerful command line version
* Plugin for FAR Manager
* Localizations for 79 languages

try to extract archive after and you will be prompted for password,you will get error but you are ready for Password when released.Mister



edit on 10-12-2010 by Mister1k because: (no reason given)



posted on Dec, 10 2010 @ 02:57 PM
link   
ok i think i did everyting needed do dencrypte file
but when i right click on the file only got only ( AES Encrypt) as an option



posted on Dec, 10 2010 @ 03:46 PM
link   
Should look in to trying to "crack" this one as well
uploading.com...

supposed to hold

# the embedding of what can only be described as spyware within PDF files downloadable from WikiLeaks site –(now, even if WikiLeaks didn’t put it there, how did it pass the WikLeaks stringent ‘cleansing’ process and end up on multiple documents available to an ‘interested public’? (Who’s spying on who?) # who’s financing and donating – (few surprises here, wonder why ‘those guys’ are donating large amounts of $$$ to WikiLeaks, and if I know about it – who else does?) # advisory board – (J, B, W, N, D, T, Y, X, P, C, C – you know who you are



posted on Dec, 10 2010 @ 05:30 PM
link   

Originally posted by Section31

Originally posted by aivlas
reply to post by Section31
 

It's open source is it not? I think people would of ditched it as soon as that was found it.

No. It is not open source.


Yes, it IS open source - in the sense that anyone who wants to can get the source code and examine it for phone home routines. How much more open should it be?



As a matter of fact, the NSA and the government are the only ones who use it. How Assange got a hold of this is up for debate, but be warned that this is not a type of file you want to mess with.


No they aren't. I have the algorithm in several different implementations, and I'm nobody. Even 7Zip uses AES256 as it's encryption algorithm. Imagine all those 7zip files phoning home every time they're unzipped!



Don't say I didn't warn everyone. If this ends badly for you folks, you have only yourselves to blame. Good luck.


Ok, I've been warned. Thanks. You've done your duty. Don't look for me hiding under the bed over it.



posted on Dec, 10 2010 @ 07:37 PM
link   
reply to post by aivlas
 


HOT = gap-insurance.aes256


Now that one i would not touch with a ten foot pole
best of luck if you do
edit on 10-12-2010 by Trillium because: (no reason given)



posted on Dec, 10 2010 @ 10:45 PM
link   
reply to post by ianmoone1
 


I usually don't care about this kind of stuff, but this was fun to read so I guess here I go, just for fun because I'm bored.



The kids on here continually make me laugh with their naivety.


Old people who says that kind of stuff cracks me up, how easy they forgot when they also were young and naive, and how easy they forgot that naivety is what helped human kind get where we are now... I'm rather disappointed of previous generations who can't even begin to understand how to really grow up and become wise.



Most of 'em couldn't find the cheeks of their own butt with both hands if I loaned them a seeing eye dog and a mirror.


So i supposed you were born old and wise, well old at least, i would not expect someone wise to say that
, because you see, old does not mean wise, nor wise means you have to be old, but anyway..




Dunno 'bout you blokes but I'm in like Flynne - all it takes is an IQ approaching that of Julian - give it your best shot!.


Sure you are, should we wait for you? we've been waiting here for a few days now, can we close this today? after all you are in like Flynn right? Will you give it your best shot? I wonder..

Meh, but you're probably 10 or something and trying to imitate grandpa


The truth of the matter is, nobody will be able to crack it using standard methods, there's not enough information at this time to even start figuring out the password, and if you have the password, then you don't need to crack anything because you already have the key to open the file, i don't think most people who are trying to open the file understand what they're doing, the full key won't be available to the public that easy, once it is released, it probably will go first to key targets so that the effect is greater, it will be a controlled operation, not a youtube video, same as with the current leaks, why don' they just post a torrent with all the cables in it and move on? because they don't have anything to gain from that, it is a controlled operation because that's what they need, same will happen with that insurance file which in the end may contain a copy of Porky's or a collection of Lady Gaga and Britney videos, who knows?

Kai


edit on 10-12-2010 by Kaifan because: (no reason given)

edit on 10-12-2010 by Kaifan because: (no reason given)



posted on Dec, 11 2010 @ 12:37 AM
link   
reply to post by Trillium
 


Why, would you like to give a reason?



posted on Dec, 11 2010 @ 01:28 AM
link   

Originally posted by aivlas
reply to post by Trillium
 


Why, would you like to give a reason?


Sorry just what i think no proof
just to much time when by so could be a set-up



posted on Dec, 11 2010 @ 01:34 AM
link   
Sorry for asking a second time but i'm at a dead end here

ok i think i did everyting needed do decrypte file
but when i right click on the file only got only ( AES Encrypt) as an option

just whant to be ready when password come out



posted on Dec, 11 2010 @ 01:46 AM
link   
reply to post by Trillium
 


I asked why you think it's "hot" and shouldn't be touched, not if you have proof. Some interesting stuff going around if you look for it



posted on Dec, 11 2010 @ 02:22 AM
link   
reply to post by aivlas
 


Yes i agree with you some very interesting thing out there if you take the time to look for it.
I'm just a newbie getting his feet wet and hopping not to get his ego get the best of him
3:20 am got to go to bed. this will still be here tomorrow



posted on Dec, 11 2010 @ 03:23 AM
link   
I got the no-error password!

The password is very easy and normal...
The hint is in your discussions and wikidoc's movie.
I used below command-line.

[ openssl enc -d -aes256 -in insurance.aes256 > output.bin ]

The most passwords had occurred the error & error...
But one-password is passed!
So,I belive this word is correct passowrd.

But I can't analyse the below result file.

Who know the format of this file?
If your advice is correct, I'll open my password.

[Result File Header for WinXP]
E4 3F 17 CE 36 96 81 D9 D2 00 55 23 D8 D7 E5 62
C4 65 83 08 66 68 17 2D 41 65 40 59 96 BB 40 FC
EC A4 50 D7 3C 1E 2A AB C7 75 CC 66 60 E9 1F 68
4D 95 2D 4A 43 F1 74 1A 87 FB BB F6 18 20 E8 D8
C8 6B 6A 09 03 D8 E8 18 4B 43 08 47 DD 0F 58 2A
3E B9 FC 43 49 31 C4 C4 EE 12 4E AB A0 04 6E E9
97 15 BD A8 56 6C DF 97 65 EC B8 18 C1 42 AC BF
37 DA D0 91 5E 0F 6F EF DA 01 AC D1 B0 05 C3 11
A5 FA 38 A0 D6 6E 89 D7 21 C4 B5 45 14 9B C7 CA
35 16 9F F8 35 35 C1 D0 39 DB CA BC FC 77 B4 09
80 8F 12 10 2D 7C B8 33 43 1D 00 D9 A6 59 4E 9C
A6 CD FE B6 47 FE 1B 99 43 A4 91 FD 77 03 C6 9F
26 90 AD A8 5D D6 EB AC A6 A6 91 FB B6 66 DD 56
72 C8 F4 71 BF 19 35 A8 E8 C1 29 8C 76 8D 7C 8C
47 AE ED 62 A0 3B 23 9D 38 F4 29 BC E8 28 92 1C
E5 80 4F 2A 4A 04 17 A3 84 A7 CA CC 38 F0 4A 05

[Reversed File]
27 FC E8 73 6C 69 81 9B 4B 00 AA C4 1B EB A7 46
23 A6 C1 10 66 16 E8 B4 82 A6 02 9A 69 DD 02 3F
37 25 0A EB 3C 78 54 D5 E3 AE 33 66 06 97 F8 16
B2 A9 B4 52 C2 8F 2E 58 E1 DF DD 6F 18 04 17 1B
13 D6 56 90 C0 1B 17 18 D2 C2 10 E2 BB F0 1A 54
7C 9D 3F C2 92 8C 23 23 77 48 72 D5 05 20 76 97
E9 A8 BD 15 6A 36 FB E9 A6 37 1D 18 83 42 35 FD
EC 5B 0B 89 7A F0 F6 F7 5B 80 35 8B 0D A0 C3 88
A5 5F 1C 05 6B 76 91 EB 84 23 AD A2 28 D9 E3 53
AC 68 F9 1F AC AC 83 0B 9C DB 53 3D 3F EE 2D 90
01 F1 48 08 B4 3E 1D CC C2 B8 00 9B 65 9A 72 39
65 B3 7F 6D E2 7F D8 99 C2 25 89 BF EE C0 63 F9
64 09 B5 15 BA 6B D7 35 65 65 89 DF 6D 66 BB 6A
4E 13 2F 8E FD 98 AC 15 17 83 94 31 6E B1 3E 31
E2 75 B7 46 05 DC C4 B9 1C 2F 94 3D 17 14 49 38
A7 01 F2 54 52 20 E8 C5 21 E5 53 33 1C 0F 52 A0



posted on Dec, 11 2010 @ 08:35 AM
link   
reply to post by korean1818
 


Unless of course the correct password simply unlocks something which is a decoy, like truecrypt containers where you can have a false set of data and a genuine set of data and all of it looks like the real thing.



posted on Dec, 11 2010 @ 08:55 AM
link   

Originally posted by korean1818
The most passwords had occurred the error & error...
But one-password is passed!
So,I belive this word is correct passowrd.

Guess again. Approximately 1 in 256 passwords do not trigger a "wrong password" error.



posted on Dec, 11 2010 @ 03:24 PM
link   

Originally posted by Trillium
Sorry for asking a second time but i'm at a dead end here

ok i think i did everyting needed do decrypte file
but when i right click on the file only got only ( AES Encrypt) as an option

just whant to be ready when password come out


Quess i will have to go to a other site to get a answer
using HP Pavillion I7 x64bit laptop 6GB Ram with two 500MB HD



posted on Dec, 12 2010 @ 01:15 AM
link   

Originally posted by WatchRider

Originally posted by gandhi
Now if I only knew how to open the damn file....

Maybe computer programming would have been a good idea.


You beat me to it.
How do you even get to enter the password if you had the right one?
I've got it on my HDD and there's no utility in my files that can even touch it!


Most of us are not computer programmers. So what is to stop the govt. from flooding the Torrents with false "Insurance Files" to confuse people when Assange releases the key. Most would have no way of verifying what they have, let alone even know how to open it.

I believe Assange will release the key, because they will never let him go. Though, the document release may be a game the CIA is playing with us. Assange may have just been an asset, doing what they wanted. Tough to know the truth on this right now.



new topics

top topics



 
130
<< 15  16  17    19  20 >>

log in

join