Unlocking the Wikileaks Insurance files
72 2016-12-17 by Virtcoin
Somebody posted this about unlocking the insurance files, can someone confirm if this works or not.
Anonymous 12/17/2016 (Sat) 03:46:24 Id: 8d7306 [Preview] No. 25902 [Hide User Posts] [X] del https://en.wikipedia.org/wiki/Nineteen_Eighty-Four
The story of Winston Smith begins on 4 April 1984: "It was a bright cold day in April, and the clocks were striking thirteen"
Using the quoted text:
-----BEGIN PUBLIC KEY----- MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEApm8n84Ek+DEqSpQ4vagV dFATjh7Y9E7Y65fZsSx45C+PHG+Li7O/F2qoV4y6T2Ib7aaNMywzXf8KrDs5anh5 aFFx9AyRESvMQbBIUsgYOCzetQdUBmH4CFadXyivxqK/xwSSxbew6oiY20KSbZk2 nKCO+iej+AkCKvKIedj34MICFI1u9on1p+MghosS2iPKp7mwji/DJ9NFJ1DR/vfB z2SK5E04gZic277ft7dwrQ+5D9x6jzPlzX+QVF6D2LpCNKJ3KMaB+1SL+un3pJjy k3B1jP1h7LdYSpjH7w/X0/Aqw6V+xe/1ISJVKDDhjV8Y4igRW8T5pozQ3bFbwQCR IQIDAQAB -----END PUBLIC KEY-----
30 comments
17 Virtcoin 2016-12-17
"RECORD THE HASHES
Wikileaks recently tweeted three 256-bit hashes in hex digit form. Record these hashes exactly. When it comes time to use them to either decrypt something or to verify something, it is imperative that you - yes, YOU personally Anon - have a copy of the hashes on hand so you don't need to spend energy asking others for them and sorting out disinfo from truth. The mathematics are on our side, but we need to use them.
The hashes follow. I have included a version that breaks them up into 4-character groups for easy transcription and checking.
pre-commitment 1: John Kerry 4bb96075acadc3d80b5ac872874c3037a386f4f595fe99e687439aabd0219809
4bb9 6075 acad c3d8 0b5a c872 874c 3037 a386 f4f5 95fe 99e6 8743 9aab d021 9809
https://twitter.com/wikileaks/status/787777344740163584
pre-commitment 2: Ecuador
eae5c9b064ed649ba468f0800abf8b56ae5cfe355b93b1ce90a1b92a48a9ab72
eae5 c9b0 64ed 649b a468 f080 0abf 8b56 ae5c fe35 5b93 b1ce 90a1 b92a 48a9 ab72
https://twitter.com/wikileaks/status/787781046519693316
pre-commitment 3: UK FCO f33a6de5c627e3270ed3e02f62cd0c857467a780cf6123d2172d80d02a072f74
f33a 6de5 c627 e327 0ed3 e02f 62cd 0c85 7467 a780 cf61 23d2 172d 80d0 2a07 2f74
https://twitter.com/wikileaks/status/787781519951720449
Write these hashes down with a pen, or maybe print them onto paper. Check them. CAREFULLY. Make sure EVERY single digit matches, don't rush.
Use a torrent client and add this .torrent file from Wikileaks: https://file.wikileaks.org/torrent/2016-06-03_insurance.aes256.torrent
Download it completely, move it off to an offline secondary drive if you have one. If you have the spare bandwidth, continue to seed it for others in the swarm.
Additionally, if you have a lot of hard drive space, grab these insurance files as well:
https://file.wikileaks.org/torrent/wlinsurance-20130815-A.aes256.torrent
https://file.wikileaks.org/torrent/wlinsurance-20130815-B.aes256.torrent
https://file.wikileaks.org/torrent/wlinsurance-20130815-B.aes256.torrent
https://file.wikileaks.org/torrent/wikileaks-insurance-20120222.tar.bz2.aes.torrent
(optional) 3. MIRROR PREVIOUS LEAKS
Wikileaks maintains torrents of all previous leak files at https://file.wikileaks.org/torrent/ - if you have the space and bandwidth, consider mirroring some of them so we collectively have a backup copy to restore from."
10 alwayslurkeduntilnow 2016-12-17
Are things about to get very very interesting?
3 Virtcoin 2016-12-17
Not sure , I'm hoping someone can confirm if this works or not in any case.
3 LightBringerFlex 2016-12-17
I'm confused. What's all the excitement about?
8 Z3R0C001 2016-12-17
So a while ago Wikileaks released the Insurance Files, a kinda 'If I die, the worst shit will get leaked, so dont kill me!'. And OP says they just pressed the big red button.
5 LightBringerFlex 2016-12-17
So... where are the leaks if they pressed the release button?
5 [deleted] 2016-12-17
Its not really that simple. I think Op is asking if anyone with the insurance files has tried using the PGP Orwell quote message to open the files. Its possible whoever posted this to endchan today was giving out a hint or trolling but it will take someone who has the files to confirm or debunk this. Its possible this is new info to unlock them which means that's it is possible someone pressed the big red button. This needs more exposure and for someone to try it before we know though.
3 LightBringerFlex 2016-12-17
Hmm, alright. Hurry up. Soros is buying out all the gold again. He's up to his old shananigans again. We are really short on time. Break those locks damn it. Soros is planning on a Great Depression part 2 and it's planned for the summer.
1 Z3R0C001 2016-12-17
The files themselves have been out for quite a while, but were encrypted. The keys were released today. Or so says the OP....
2 Telenerd 2016-12-17
Probably not.
4 [deleted] 2016-12-17
Could you give a brief overview of what's going on? Is this a recent development, or have others known about this?
8 Virtcoin 2016-12-17
The PGP message saying to use the quote from George Orwells 1984 was a recent post.
https://endchan.xyz/pol/res/24781.html
2 [deleted] 2016-12-17
Thanks
4 The_Watterboy 2016-12-17
Is there a megathread for this anywhere?
2 Virtcoin 2016-12-17
Just the end Chan link I posted above in the comments
2 [deleted] 2016-12-17
Was wondering the same thing. This deserves much more attention, until it is confirmed or debunked. People are too caught up in the Russia shit.
4 Mr_Davis5 2016-12-17
The password or passphrase used to encrypt the files is most likely not a sentence, especially not a sentence that is well known and can be found on the internet.
When using a password for encryption it's very important to use as much randomness as possible.
Someone running a computer night and day could easily guess the password if it's a coherent sentence from a well known book that can be associated with what Wikileaks is fighting.
3 webofslime 2016-12-17
Unless, you needed to know the key from memory.
1 Mr_Davis5 2016-12-17
Yes but then someone like Assange will still add some randomness in the mix, like adding a number to the start of each word. And in Assange's case, probably something more sophisticated than that.
2 webofslime 2016-12-17
Here's the thing; No one's gonna know until they try. No point in coming up with reasons why it won't work. Just try it.
2 Mr_Davis5 2016-12-17
What I am describing is common knowledge in crypto land: the only good password is a password with a lot of randomness. Trust me, the Wikileaks people know this as well.
Computers these days are so fast, that they can easily crack passwords that do not contain a lot of randomness.
1 webofslime 2016-12-17
I get it. But, it is virtually impossible for most people to remember 100 or more random characters, but easy to remember a random sentence that could be converted in some way.
I'm not saying it isn'the common knowledge and there is no reason to argue the point, because it either works or it doesnt.
Why be all hurt over it? Why not just try it?
It works or it doesnt. Speculating about it is pointless.
1 Mr_Davis5 2016-12-17
Yes but you use tricks for that. You can for instance take the number Pi and multiply it by 15. Then you take all the numbers and place them one by one in front of a word in a famous sentence, like Orwell's one.
Then you take all of that and use it twice and add the word "$H1TFACED" to it at the end to then generate the key.
All you need to remember is Pi times 15, the sentence, then times 2 plus $H1TFACED.
Good luck guessing that ;)
1 webofslime 2016-12-17
I'm not sure why any other argument is required beyond it works or it doesn't work.
2 Mr_Davis5 2016-12-17
I'm trying to show people that they're wasting their time if they want to somehow guess the Wikileaks password.
Those hashes in the OP are pre-commitment hashes. Those have nothing to do with generating the password.
1 webofslime 2016-12-17
Let them waste their time.
3 [deleted] 2016-12-17
https://www.reddit.com/r/conspiracy/comments/5i1fhj/this_odd_message_about_a_wikileaks_guy_trying_to/?ref=search_posts
3 meditation_IRC 2016-12-17
Thats not password for insurance files. Thats public key
2 [deleted] 2016-12-17
Something to add
https://imgur.com/Zml2WY0
1 [deleted] 2016-12-17
503 error now, convenient. Was a screen shot of a more recent post on endchan thread
1 webofslime 2016-12-17
Let them waste their time.
1 [deleted] 2016-12-17
503 error now, convenient. Was a screen shot of a more recent post on endchan thread