It looks like you're using an Ad Blocker.

Please white-list or disable AboveTopSecret.com in your ad-blocking tool.

Thank you.

 

Some features of ATS will be disabled while you continue to use an ad-blocker.

 

Wikileaks 'insurance' file decrypted: Names of informants exposed

page: 2
26
<< 1    3 >>

log in

join
share:

posted on Aug, 29 2011 @ 03:33 PM
link   
reply to post by Praetorius
 


I wouldnt download that to be honest......its more than likely a fake.
It been months since it was released, im pretty sure the real file is no longer available. Probably 1.4g of meaningless data, porn, or some other useless junk.




posted on Aug, 29 2011 @ 03:37 PM
link   
Something seems off with this whole thing. Call me paranoid but I smell a trap here. I'm not sure how but its way too suspicious that news of a decryption was leaked and then it was later posted as being a false statement. Seems like a good way to bring those with the original file out of the woodwork. Next we will see a downloadable file for the key which could be potentially incriminating.



posted on Aug, 29 2011 @ 03:47 PM
link   

Originally posted by hadriana
I wonder if the issue is that the password is LOST?
If DB took the harddrive, I think it was destroyed, wasn't it?
What if that was a generated password with no other copy?


In this battle, do you truly believe anybody would destroy anything that could possible save their necks at some point? No, everything, passwords, keys or thousands of "deleted" files are hidden away, ready to be brought forth if the need arises.



posted on Aug, 29 2011 @ 03:47 PM
link   
reply to post by loves a conspiricy
 
Eh, your call. The file size is right based on the news reports that came out when the file was released, and these download pages were put up at the right time as well.

I suppose you can assume that someone got to the torrent providers and somehow managed to swap out junk files (seems to not agree with the way torrents work, but OK), but I guess there's only one way to find out, if the key ever is actually released.

Be well.



posted on Aug, 29 2011 @ 04:42 PM
link   

Originally posted by Aliensun

Originally posted by hadriana
I wonder if the issue is that the password is LOST?
If DB took the harddrive, I think it was destroyed, wasn't it?
What if that was a generated password with no other copy?


In this battle, do you truly believe anybody would destroy anything that could possible save their necks at some point? No, everything, passwords, keys or thousands of "deleted" files are hidden away, ready to be brought forth if the need arises.


Not particularly, but they say there is a problem. I have the background to imagine more than most, if that makes any sense at all. I can envision each person having part of a keyphrase with a copy that is complete being on a hd. I can also envision there only being a few copies - a very few - and DB took one, and the others have fell victim to theft, compromise, or hardware failure.

Or I can envision that someone knows a vulnerability in the AES system that was used to encrypt the file that the rest of us don't know about. IE www.theinquirer.net...



posted on Aug, 29 2011 @ 04:43 PM
link   
Facebook has been blocking almost anything to do with anonymous. Pirate Bay started being blocked b/c of that.

If you download the file, just check the checksum with the original.



posted on Aug, 29 2011 @ 04:54 PM
link   
I think you did it right Hadriana! S/F

I kind of wonder what this new issue is.

I did read Maxmars thread regarding AES encryption. IIRC the encryption was not "cracked" but they have IDed a vulnerability.

It seems wierd that WL has been pretty quiet for awhile and within the past week and a half, it seems that they are busy again.



posted on Aug, 29 2011 @ 09:11 PM
link   
For those wondering if they have the real insurance file or not...
I am sure the file has an MD5 checksum (aka fingerprint) which you can use to verify if you have the real insurance file or not. I do not have the file nor do I have a lot of interest in this matter but I just thought it would be helpful to point y'all to the MD5.



posted on Aug, 29 2011 @ 09:19 PM
link   
Here is an update from the same article:

Update: In a tweet, the @wikileaks says: “WikiLeaks ‘insurance’ files have not been decrypted. All press are currently misreporting. There is an issue, but not that issue.”


I also think that the password was not released. Else we would have known by now what is the content of the insurance file.



posted on Aug, 29 2011 @ 09:24 PM
link   

Originally posted by wavemaker
Here is an update from the same article:

Update: In a tweet, the @wikileaks says: “WikiLeaks ‘insurance’ files have not been decrypted. All press are currently misreporting. There is an issue, but not that issue.”


I also think that the password was not released. Else we would have known by now what is the content of the insurance file.


So what's the real issue then?
Does anybody know?
Are Wikileaks under some form of government attack?



posted on Aug, 29 2011 @ 11:06 PM
link   
reply to post by Tollon
 


Wikileaks is always under threat and attack by many corporations. Anonymous hackers are said to be protecting Wikileaks, they shut down Mastercard and Visa websites (they are back up again) a few months ago I believe in relation to Wikileaks attacks that Mastercard and Visa were planning or tried doing.

Here is something I found:. www.unfictional.com...

Assange just might be dead.

Update: Something I noticed is that the Youtube video linked in the article is no longer available due to a closed account? Hmm... Not sure if this means anything, but I do have my suspicion.

edit on 29-8-2011 by FidelityMusic because: (no reason given)

edit on 29-8-2011 by FidelityMusic because: (no reason given)

edit on 29-8-2011 by FidelityMusic because: (no reason given)



posted on Aug, 29 2011 @ 11:12 PM
link   

Originally posted by Praetorius
reply to post by loves a conspiricy
 
Eh, your call. The file size is right based on the news reports that came out when the file was released, and these download pages were put up at the right time as well.

I suppose you can assume that someone got to the torrent providers and somehow managed to swap out junk files (seems to not agree with the way torrents work, but OK), but I guess there's only one way to find out, if the key ever is actually released.

Be well.



I dont use torrent sites like TPB, ive downloaded plenty of files that were not what they stated they were.
Im a Demonoid man lol

I could upload a file, the same size and name it the same as the Wikileaks file....i could add all sorts of stuff to it that you wouldnt want sat on your hard drive.

1,491,834,576 bytes is the real one.........the 2 i can find on TPB are 1.39gb

MD5: 94a032849b1f446e3a1ed06cf4867a56 is the original
edit on 29-8-2011 by loves a conspiricy because: (no reason given)


EDIT AGAIN: This COULD be the original one.....but who knows now, it could have been altered or the data not correct

thepiratebay.org...

MODS: Please delete the link to the download if this is not allowed, or U2U me and il get rid asap.
edit on 29-8-2011 by loves a conspiricy because: (no reason given)



posted on Aug, 29 2011 @ 11:13 PM
link   
reply to post by Domo1
 


Net freedoms are already in their death throes. Internet 2 will be completed and fully implemented shortly. They appointed their board of directors within the last few weeks. This is just a smoke screen to what is really going on and an excuse for the way it will be set up. Enjoy it while you can internet 2 isn't going to be much fun.



posted on Aug, 29 2011 @ 11:22 PM
link   
The thing that isn't "right" about all this, is the fact that an "insurance" file even exists.

It doesn't make much sense to have all your contacts in one file that could be cracked. Your are jeopardizing them and anyone close to them's safety.

Seems to me the Wikileaks founder started playing a game he wasn't prepared to play. Unless the whole Wikileaks was a program designed to take away internet anonymity. If you take that angle then all of it makes sense. You have classified information obtained by a private party that isn't really important and is classified due to standard protocols that much of it isn't released for some reason that doesn't make an sense. Then you also have a file that has all the names of the informants in one convenient location and all they need is the passkey to decrypt and everyone there is up for punishment.

At first I was excited about the whole Wikileaks thing, then they started playing the marketing game with their information and immediately lost interest and didn't think anything more about it and now we have all these "issues" that seems more like a real life soap-opera that is really playing with our internet freedoms.

Seems all like a con-job to me.



posted on Aug, 29 2011 @ 11:25 PM
link   
reply to post by Xcathdra
 


Oh whopdedoo. This story is a lie. The insurance file hasn't been compromised. Also WL doesn't have "informant names". Fact of the matter is that the whole system is build so that noone ever knows who leaks stuff. If you try to give out your name it'll most likely end up rejected anyway. WL does not work with people who identify themselves.
Who's the POS now?



posted on Aug, 30 2011 @ 12:19 AM
link   
reply to post by PhoenixOD
 


I agree and think that has now become glaringly obvious.

This was done strictly to sway public opinion against Wikileaks and Assange.

I hope Assange responds quickly and calls out old dumb$h*t for what he really is... another black ops a-hole.



posted on Aug, 30 2011 @ 01:20 AM
link   

Originally posted by WhatKnot
Something seems off with this whole thing. Call me paranoid but I smell a trap here. I'm not sure how but its way too suspicious that news of a decryption was leaked and then it was later posted as being a false statement. Seems like a good way to bring those with the original file out of the woodwork. Next we will see a downloadable file for the key which could be potentially incriminating.

That thought crossed my mind back when I initially downloaded it from Wikileaks. A few minutes after it completed the download it got moved to a DVD and a USB flash drive where it's sat ever since. Just on the off chance we ever get the key, I'm hanging onto an OLD laptop with no network access to stick my USB flash into for the occasion. That file will never be on one of my working systems again. I just got a bad feeling about it almost immediately...but I still can't resist having a way to safely peak someday.



posted on Aug, 30 2011 @ 01:38 AM
link   
The password ß²²¹³99942apophis could be the right password. But I think you have to have the right PKI certificate installed on your comuter as a second part to opening the file. You need to find one of the people who were given the files and find there public key PKI. The New York Times reporter Scott Shane has been known to have worked with Wikileaks on files in the past and I think he is one of them who were given unredacted files by mistake. Find his PKI public key. Install that key on your computer then use the password.

The PKI public key could also be Julian Assange's?

Heres a article with some of the names of reporters who were given files.
www.guardian.co.uk...

Here are some of Julian Assange's public keys.
gpg-keyserver.de...
Here are some of David Leigh reporter who worked on the files public keys.
gpg-keyserver.de...
Strange theres a public key for apophis the password that leaked dated 2010-11-09.
Thats about the time the password leaked.
gpg-keyserver.de...
edit on 30-8-2011 by JBA2848 because: (no reason given)



posted on Aug, 30 2011 @ 02:33 AM
link   
Assange works for us.

If he didn't, he'd be dead or at Gitmo.


Imagine if you put the names of say Syria's President loyals as "informants"....the Syrians would end up killing their own good people thinking they were bad.

Warfare on the Cheap. I commend the Pentagon/CIA for saving money. Good going boys.



posted on Aug, 30 2011 @ 03:42 AM
link   

Originally posted by Timing

It doesn't make much sense to have all your contacts in one file that could be cracked. Your are jeopardizing them and anyone close to them's safety.



Curious to know why you think this is what is on the insurance file?



new topics

top topics



 
26
<< 1    3 >>

log in

join