Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

WikiLeaks posts huge encrypted file to Web
Yahoo ^ | July 5, 2010 | Rapahel Satter

Posted on 08/05/2010 5:04:07 PM PDT by redhead

click here to read article


Navigation: use the links below to view more comments.
first previous 1-20 ... 61-8081-100101-120121-133 next last
To: DBrow

As an article in the New Yorker says, the music industry tried to shut down Napster, and found that technology had outdistanced it. The better solution was to arrange for music to be purchased on the NET.

The government won’t be able to shut down sites that offer information. A better solution would be to 1 ) classify only a very few documents, those which really need to be “secret”; and 2 ) otherwise be as transparent as possible (make the FOI swift and responsive).

“Secret” documents should not be accessible to a low-level clerk, ever. Some “secrets” should never even be written down (let alone placed in endless bureaucratic reports).

The government is going to have to learn to live with and adapt to the new technological innovations—and not try, as the Pentagon has, to insist that Wikileaks “undo” the leak
and erase all websites which have the documents...

and forbid service members to look at websites which have the documents.

(One imagines that the leadership of the Army is in their dottage and has never used the NET the way every soldier under 30 has...)


101 posted on 08/06/2010 8:05:04 AM PDT by CondorFlight (I)
[ Post Reply | Private Reply | To 100 | View Replies]

To: CondorFlight

“The government won’t be able to shut down sites that offer information.”

Not if they follow our current constitution, no, they can’t.

But with a little more power, they could make it a fine-able offense for an ISP to offer, allow, cause, or enable traffic to or from a particular URL, site, or node (perhaps designated as a “hate site” or “espionage node). Say $10,000 per packet. And lay the same restriction on the backbone servers and transmission trunks.

Also, offer a $500 cash reward to anyone who discovers such a transmission, no arrest or conviction required.

The net appears to be free and robust, but that’s only because the ISP’s and trunk servers are currently operating freely without too much interference from USG or UN or the EU authorities. Look at China and places like that that do a pretty good job of controlling what their people can access.


102 posted on 08/06/2010 8:51:15 AM PDT by DBrow
[ Post Reply | Private Reply | To 101 | View Replies]

To: redhead

I wonder if some bright young lad from the CIA is currently looking at the WikiLeaks guy through a scope.


103 posted on 08/06/2010 12:07:56 PM PDT by SlayerOfBunnies (An Indian friend of mine wishes to remind everyone... Indians <> muslims)
[ Post Reply | Private Reply | To 1 | View Replies]

To: SlayerOfBunnies
I wonder if some bright young lad from the CIA is currently looking at the WikiLeaks guy through a scope.

If so, I hope he can read his mind through the same scope too. Because *most likely* the Wikileaks guy prepared multiple "dead man switches". He knows he jumped the shark on this one. For example, he hacks into some obscure computer somewhere, and programs a simple instruction to email the password to the whole world on a certain date, or if something happens, or if something doesn't happen.

Just to illustrate, he may post some trivial ad on Craigslist, every week a different one, and only the computer knows what that ad must and must not contain to hold onto the key for another week. The algorithm may be simple enough to just remember, but any mistake (unverifiable if he is arrested and works under control) will result in the release of the key. With Craigslist's traffic it's impossible to detect a lone computer in Elbonia (or California, to that matter) that checks ads.

That's the whole idea of distribution of the encrypted material. The whole world can take its time to download the bits, and since nobody knows what's there it's largely safe in legal terms. For all we know, it might be the video of Hillary Clinton running under sniper fire in Bosnia :-)

All it takes to unlock is a tiny key; it's only 32 bytes, or 64 printable characters. It can be emailed, or mailed on a postcard, or shouted from rooftops, or spray-painted on a bridge, or anonymously posted anywhere on the Internet. It's trivial to write down and enter into the program that then decrypts the large file.

104 posted on 08/06/2010 1:03:01 PM PDT by Greysard
[ Post Reply | Private Reply | To 103 | View Replies]

To: redhead

This guy is desperately acting out and NEEDS piano wire late one night.


105 posted on 08/06/2010 2:32:22 PM PDT by PaleoBob
[ Post Reply | Private Reply | To 1 | View Replies]

To: Dubya-M-DeesWent2SyriaStupid!

yeah, but its on an Apple, so its 100% encrypted and hack proof

/s


106 posted on 08/06/2010 2:42:11 PM PDT by esoxmagnum
[ Post Reply | Private Reply | To 20 | View Replies]

To: lovesdogs
But if true exposure of Zero and the hildabeast are in there...well?

Well, well well.

107 posted on 08/06/2010 5:25:04 PM PDT by Talisker (When you find a turtle on top of a fence post, you can be damn sure it didn't get there on it's own.)
[ Post Reply | Private Reply | To 17 | View Replies]

To: redhead

This is like a chess game! P-K4!


108 posted on 08/06/2010 5:42:23 PM PDT by 2harddrive
[ Post Reply | Private Reply | To 1 | View Replies]

To: VanDeKoik
You wont believe how many things this code unlocks.

I want in! [select] [start]
109 posted on 08/06/2010 7:00:59 PM PDT by Renderofveils (My loathings are simple: stupidity, oppression, crime, cruelty, soft music. - Nabokov)
[ Post Reply | Private Reply | To 39 | View Replies]

To: redhead

Does anyone know exactly where Insurance is on the wikileaks.com website? I can’t find it.

This article makes it sound like 1.4 GB is really big, but I have 67 GB available on this 8 year old computer.

If someone can point me to where it is, I’m ready to press the download button.

THANKS!


110 posted on 08/06/2010 7:32:35 PM PDT by japaneseghost
[ Post Reply | Private Reply | To 1 | View Replies]

To: DBrow

I googled wikileaks insurance and got this:

leakmirror.wikileaks.org/file/straw-glass-and-bottle/insurance.aes256

I tried downloading it, says it will take over 3 hours, so I canceled, I have no way of knowing if it’s really wikileaks or some Russian hacker taking advantage of this situation.

Please somebody tell me where the real download is. Thanks.


111 posted on 08/06/2010 8:19:58 PM PDT by japaneseghost
[ Post Reply | Private Reply | To 100 | View Replies]

To: japaneseghost

http://leakmirror.wikileaks.org/file/straw-glass-and-bottle/insurance.aes256

This is indeed the file you seek. What will you do with it?


112 posted on 08/06/2010 8:40:36 PM PDT by DBrow
[ Post Reply | Private Reply | To 111 | View Replies]

To: DBrow

How long before some hacker opens that file?


113 posted on 08/06/2010 8:49:20 PM PDT by Dubya-M-DeesWent2SyriaStupid!
[ Post Reply | Private Reply | To 112 | View Replies]

To: a fool in paradise

It’s not blackmail if whoever has incriminating evidence just puts it out there and does not contact let’s say ...Hillary and ask for monetary items or favors.


114 posted on 08/06/2010 8:54:14 PM PDT by Dubya-M-DeesWent2SyriaStupid!
[ Post Reply | Private Reply | To 98 | View Replies]

To: Dubya-M-DeesWent2SyriaStupid!

I suspect that the news will report that some random person with no connection to anyone has hacked the file.

This is political drama, something planned in advance.

That level of crypto rises to “national technical means” and its release won’t be accidental, though it will appear to be, like the Climategate release was anonymous (not).


115 posted on 08/06/2010 8:58:40 PM PDT by DBrow
[ Post Reply | Private Reply | To 113 | View Replies]

To: DBrow

Is that the real file or is the “Afgan War Files” / insurance the real thing. I downloaded 7z465.exe, I did an antivirus report from Download.com and it says it should be clean. I am now downloading the real file, supposedly. Should take 4 more hours.

Assange’s reputation is riding on this. If this is nonsense, he is toast. If there’s any viruses in this, he is toast. If this is just about Hillary and her girlfriend Houma, he is toast.

There is a guy here on FR who has been banned a few times for posting anti-Darwin threads. He is the expert on hacking/security and assembly language. If anyone here can get into this, it will be him. Instead of going into the higher level, hacking, he goes down into the assembly code, into the bowels of computer software. I don’t know what his current FR name is.


116 posted on 08/06/2010 9:08:55 PM PDT by japaneseghost
[ Post Reply | Private Reply | To 112 | View Replies]

To: redhead

>At 1.4 gigabytes, the file is 20 times larger than the batch of 77,000 secret U.S. military documents about Afghanistan that WikiLeaks dumped onto the Web last month, and cryptographers say that the file is virtually impossible to crack

Except that the more encrypted data you have, the more chance you have of finding and exploiting a weakness.
Though the ‘data’ in that scenario are usually multiple messages rather than one humongous blob.
It’s an interesting conundrum.


117 posted on 08/06/2010 9:20:09 PM PDT by OneWingedShark (Q: Why am I here? A: To do Justly, to love mercy, and to walk humbly with my God.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Redcloak

That would be awesome!! / LOL


118 posted on 08/06/2010 9:36:59 PM PDT by OneWingedShark (Q: Why am I here? A: To do Justly, to love mercy, and to walk humbly with my God.)
[ Post Reply | Private Reply | To 79 | View Replies]

To: VanDeKoik

Oh man, the Contra code! I can hear the music now...


119 posted on 08/06/2010 9:44:57 PM PDT by Textide
[ Post Reply | Private Reply | To 39 | View Replies]

To: japaneseghost
There is a guy here on FR who has been banned a few times for posting anti-Darwin threads. He is the expert on hacking/security and assembly language. If anyone here can get into this, it will be him. Instead of going into the higher level, hacking, he goes down into the assembly code, into the bowels of computer software. I don’t know what his current FR name is.

NO ONE is cracking AES 256 without a few DOZEN more major breakthroughs in computer processor speeds. This ain't your daddy's WEP 64 bit encryption algorithm.

120 posted on 08/06/2010 9:45:35 PM PDT by Centurion2000 (Three things you don't discuss in public; politics, religion, and choice of caliber.)
[ Post Reply | Private Reply | To 116 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-20 ... 61-8081-100101-120121-133 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson