Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

WikiLeaks posts huge encrypted file to Web
Yahoo ^ | July 5, 2010 | Rapahel Satter

Posted on 08/05/2010 5:04:07 PM PDT by redhead

click here to read article


Navigation: use the links below to view more comments.
first previous 1-5051-100101-133 last
To: DBrow

As an article in the New Yorker says, the music industry tried to shut down Napster, and found that technology had outdistanced it. The better solution was to arrange for music to be purchased on the NET.

The government won’t be able to shut down sites that offer information. A better solution would be to 1 ) classify only a very few documents, those which really need to be “secret”; and 2 ) otherwise be as transparent as possible (make the FOI swift and responsive).

“Secret” documents should not be accessible to a low-level clerk, ever. Some “secrets” should never even be written down (let alone placed in endless bureaucratic reports).

The government is going to have to learn to live with and adapt to the new technological innovations—and not try, as the Pentagon has, to insist that Wikileaks “undo” the leak
and erase all websites which have the documents...

and forbid service members to look at websites which have the documents.

(One imagines that the leadership of the Army is in their dottage and has never used the NET the way every soldier under 30 has...)


101 posted on 08/06/2010 8:05:04 AM PDT by CondorFlight (I)
[ Post Reply | Private Reply | To 100 | View Replies]

To: CondorFlight

“The government won’t be able to shut down sites that offer information.”

Not if they follow our current constitution, no, they can’t.

But with a little more power, they could make it a fine-able offense for an ISP to offer, allow, cause, or enable traffic to or from a particular URL, site, or node (perhaps designated as a “hate site” or “espionage node). Say $10,000 per packet. And lay the same restriction on the backbone servers and transmission trunks.

Also, offer a $500 cash reward to anyone who discovers such a transmission, no arrest or conviction required.

The net appears to be free and robust, but that’s only because the ISP’s and trunk servers are currently operating freely without too much interference from USG or UN or the EU authorities. Look at China and places like that that do a pretty good job of controlling what their people can access.


102 posted on 08/06/2010 8:51:15 AM PDT by DBrow
[ Post Reply | Private Reply | To 101 | View Replies]

To: redhead

I wonder if some bright young lad from the CIA is currently looking at the WikiLeaks guy through a scope.


103 posted on 08/06/2010 12:07:56 PM PDT by SlayerOfBunnies (An Indian friend of mine wishes to remind everyone... Indians <> muslims)
[ Post Reply | Private Reply | To 1 | View Replies]

To: SlayerOfBunnies
I wonder if some bright young lad from the CIA is currently looking at the WikiLeaks guy through a scope.

If so, I hope he can read his mind through the same scope too. Because *most likely* the Wikileaks guy prepared multiple "dead man switches". He knows he jumped the shark on this one. For example, he hacks into some obscure computer somewhere, and programs a simple instruction to email the password to the whole world on a certain date, or if something happens, or if something doesn't happen.

Just to illustrate, he may post some trivial ad on Craigslist, every week a different one, and only the computer knows what that ad must and must not contain to hold onto the key for another week. The algorithm may be simple enough to just remember, but any mistake (unverifiable if he is arrested and works under control) will result in the release of the key. With Craigslist's traffic it's impossible to detect a lone computer in Elbonia (or California, to that matter) that checks ads.

That's the whole idea of distribution of the encrypted material. The whole world can take its time to download the bits, and since nobody knows what's there it's largely safe in legal terms. For all we know, it might be the video of Hillary Clinton running under sniper fire in Bosnia :-)

All it takes to unlock is a tiny key; it's only 32 bytes, or 64 printable characters. It can be emailed, or mailed on a postcard, or shouted from rooftops, or spray-painted on a bridge, or anonymously posted anywhere on the Internet. It's trivial to write down and enter into the program that then decrypts the large file.

104 posted on 08/06/2010 1:03:01 PM PDT by Greysard
[ Post Reply | Private Reply | To 103 | View Replies]

To: redhead

This guy is desperately acting out and NEEDS piano wire late one night.


105 posted on 08/06/2010 2:32:22 PM PDT by PaleoBob
[ Post Reply | Private Reply | To 1 | View Replies]

To: Dubya-M-DeesWent2SyriaStupid!

yeah, but its on an Apple, so its 100% encrypted and hack proof

/s


106 posted on 08/06/2010 2:42:11 PM PDT by esoxmagnum
[ Post Reply | Private Reply | To 20 | View Replies]

To: lovesdogs
But if true exposure of Zero and the hildabeast are in there...well?

Well, well well.

107 posted on 08/06/2010 5:25:04 PM PDT by Talisker (When you find a turtle on top of a fence post, you can be damn sure it didn't get there on it's own.)
[ Post Reply | Private Reply | To 17 | View Replies]

To: redhead

This is like a chess game! P-K4!


108 posted on 08/06/2010 5:42:23 PM PDT by 2harddrive
[ Post Reply | Private Reply | To 1 | View Replies]

To: VanDeKoik
You wont believe how many things this code unlocks.

I want in! [select] [start]
109 posted on 08/06/2010 7:00:59 PM PDT by Renderofveils (My loathings are simple: stupidity, oppression, crime, cruelty, soft music. - Nabokov)
[ Post Reply | Private Reply | To 39 | View Replies]

To: redhead

Does anyone know exactly where Insurance is on the wikileaks.com website? I can’t find it.

This article makes it sound like 1.4 GB is really big, but I have 67 GB available on this 8 year old computer.

If someone can point me to where it is, I’m ready to press the download button.

THANKS!


110 posted on 08/06/2010 7:32:35 PM PDT by japaneseghost
[ Post Reply | Private Reply | To 1 | View Replies]

To: DBrow

I googled wikileaks insurance and got this:

leakmirror.wikileaks.org/file/straw-glass-and-bottle/insurance.aes256

I tried downloading it, says it will take over 3 hours, so I canceled, I have no way of knowing if it’s really wikileaks or some Russian hacker taking advantage of this situation.

Please somebody tell me where the real download is. Thanks.


111 posted on 08/06/2010 8:19:58 PM PDT by japaneseghost
[ Post Reply | Private Reply | To 100 | View Replies]

To: japaneseghost

http://leakmirror.wikileaks.org/file/straw-glass-and-bottle/insurance.aes256

This is indeed the file you seek. What will you do with it?


112 posted on 08/06/2010 8:40:36 PM PDT by DBrow
[ Post Reply | Private Reply | To 111 | View Replies]

To: DBrow

How long before some hacker opens that file?


113 posted on 08/06/2010 8:49:20 PM PDT by Dubya-M-DeesWent2SyriaStupid!
[ Post Reply | Private Reply | To 112 | View Replies]

To: a fool in paradise

It’s not blackmail if whoever has incriminating evidence just puts it out there and does not contact let’s say ...Hillary and ask for monetary items or favors.


114 posted on 08/06/2010 8:54:14 PM PDT by Dubya-M-DeesWent2SyriaStupid!
[ Post Reply | Private Reply | To 98 | View Replies]

To: Dubya-M-DeesWent2SyriaStupid!

I suspect that the news will report that some random person with no connection to anyone has hacked the file.

This is political drama, something planned in advance.

That level of crypto rises to “national technical means” and its release won’t be accidental, though it will appear to be, like the Climategate release was anonymous (not).


115 posted on 08/06/2010 8:58:40 PM PDT by DBrow
[ Post Reply | Private Reply | To 113 | View Replies]

To: DBrow

Is that the real file or is the “Afgan War Files” / insurance the real thing. I downloaded 7z465.exe, I did an antivirus report from Download.com and it says it should be clean. I am now downloading the real file, supposedly. Should take 4 more hours.

Assange’s reputation is riding on this. If this is nonsense, he is toast. If there’s any viruses in this, he is toast. If this is just about Hillary and her girlfriend Houma, he is toast.

There is a guy here on FR who has been banned a few times for posting anti-Darwin threads. He is the expert on hacking/security and assembly language. If anyone here can get into this, it will be him. Instead of going into the higher level, hacking, he goes down into the assembly code, into the bowels of computer software. I don’t know what his current FR name is.


116 posted on 08/06/2010 9:08:55 PM PDT by japaneseghost
[ Post Reply | Private Reply | To 112 | View Replies]

To: redhead

>At 1.4 gigabytes, the file is 20 times larger than the batch of 77,000 secret U.S. military documents about Afghanistan that WikiLeaks dumped onto the Web last month, and cryptographers say that the file is virtually impossible to crack

Except that the more encrypted data you have, the more chance you have of finding and exploiting a weakness.
Though the ‘data’ in that scenario are usually multiple messages rather than one humongous blob.
It’s an interesting conundrum.


117 posted on 08/06/2010 9:20:09 PM PDT by OneWingedShark (Q: Why am I here? A: To do Justly, to love mercy, and to walk humbly with my God.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Redcloak

That would be awesome!! / LOL


118 posted on 08/06/2010 9:36:59 PM PDT by OneWingedShark (Q: Why am I here? A: To do Justly, to love mercy, and to walk humbly with my God.)
[ Post Reply | Private Reply | To 79 | View Replies]

To: VanDeKoik

Oh man, the Contra code! I can hear the music now...


119 posted on 08/06/2010 9:44:57 PM PDT by Textide
[ Post Reply | Private Reply | To 39 | View Replies]

To: japaneseghost
There is a guy here on FR who has been banned a few times for posting anti-Darwin threads. He is the expert on hacking/security and assembly language. If anyone here can get into this, it will be him. Instead of going into the higher level, hacking, he goes down into the assembly code, into the bowels of computer software. I don’t know what his current FR name is.

NO ONE is cracking AES 256 without a few DOZEN more major breakthroughs in computer processor speeds. This ain't your daddy's WEP 64 bit encryption algorithm.

120 posted on 08/06/2010 9:45:35 PM PDT by Centurion2000 (Three things you don't discuss in public; politics, religion, and choice of caliber.)
[ Post Reply | Private Reply | To 116 | View Replies]

To: japaneseghost
There is a guy here on FR who has been banned a few times for posting anti-Darwin threads. He is the expert on hacking/security and assembly language. If anyone here can get into this, it will be him. Instead of going into the higher level, hacking, he goes down into the assembly code, into the bowels of computer software. I don’t know what his current FR name is.

NO ONE is cracking AES 256 without a few DOZEN more major breakthroughs in computer processor speeds. This ain't your daddy's WEP 64 bit encryption algorithm.

121 posted on 08/06/2010 9:45:43 PM PDT by Centurion2000 (Three things you don't discuss in public; politics, religion, and choice of caliber.)
[ Post Reply | Private Reply | To 116 | View Replies]

To: DBrow
...like they’d never pull all telegrams sent from the USA.

Quite right. "Gentlemen don't read each other's mail."

122 posted on 08/07/2010 5:43:47 AM PDT by Androcles (All your typos are belong to us)
[ Post Reply | Private Reply | To 100 | View Replies]

To: Androcles

>>...like they’d never pull all telegrams sent from the USA.
>
>Quite right. “Gentlemen don’t read each other’s mail.”

Which brings up a question: would a gentleman ever work for the current government?
Would a gentleman work for the government at all? (George Washington observed that government *is* force.)


123 posted on 08/07/2010 6:37:17 AM PDT by OneWingedShark (Q: Why am I here? A: To do Justly, to love mercy, and to walk humbly with my God.)
[ Post Reply | Private Reply | To 122 | View Replies]

To: Androcles

lol According to the book “The Puzzle Palace” they routinely did just that, even after being ordered not to. Started during WWII and continued until Western Union went mostly electronic and stopped making carbons (and NSA of course stopped reading our mail then).


124 posted on 08/07/2010 6:39:50 AM PDT by DBrow
[ Post Reply | Private Reply | To 122 | View Replies]

To: Centurion2000

Maybe someone at a movie company. Digital effects, especially rendered effects, use giant server farms to process the huge amounts of calculations and imaging, frame by frame.

Using the Pixar setup for a couple months maybe?

Then there are the Google clusters, which are pretty big. But they’d never use that capability for evil, their motto says so!


125 posted on 08/07/2010 6:43:19 AM PDT by DBrow
[ Post Reply | Private Reply | To 121 | View Replies]

To: redhead

Insurance in spyspeak is Death Warrant


126 posted on 08/07/2010 6:47:43 AM PDT by bert (K.E. N.P. N.C. +12 ..... Greetings Jacques. The revolution is coming)
[ Post Reply | Private Reply | To 1 | View Replies]

To: DBrow; OneWingedShark
Well then, I think that if our governments have the decency to say they're not spying on us, then we should believe them.

Speak softly, praise the lord, and pass the high strength encryption.

127 posted on 08/07/2010 10:49:02 AM PDT by Androcles (All your typos are belong to us)
[ Post Reply | Private Reply | To 124 | View Replies]

To: CodeToad

“Dollar to donuts the NSA had that thing opened nearly instantly.”

Maybe, but only because Asange gave them the key: if you do x, this what will come out. Apparently you need gazillions of years to crack that and WL guys are no dummies to use a Ilovemom password. It’s brilliant if you ask me, especially with the threats, one tweet and thousands of people can open the files


128 posted on 08/07/2010 7:04:58 PM PDT by mainsail that ("A man will fight harder for his interests than for his rights" - Napoleon Bonaparte)
[ Post Reply | Private Reply | To 80 | View Replies]

To: japaneseghost

1.4 GB is indeed large for a file or posting on the Internet, even in the age of file sharing and piracy. It’s gigantic for a collection of documents, if that’s what this is.

The average text document is about 100KB in size. A CD ripped to MP3 is maybe 50 MB. An HD movie is about 300MB. This file is huge.


129 posted on 08/07/2010 11:39:48 PM PDT by Terpfen (FR is being Alinskied. Remember, you only take flak when you're over the target.)
[ Post Reply | Private Reply | To 110 | View Replies]

To: Dubya-M-DeesWent2SyriaStupid!

More on Manning

http://www2.timesdispatch.com/news/2010/aug/01/ed-beres01-ar-356184/

---------------------

the last three paragraphs are exactly what I have been thinking!
 
----------------------
 

"Why was Manning given a security clearance at all? For those who have been involved in security investigations -- even filling out the paperwork -- Manning's background clearly had red flags all over the place. And how does one remain largely unsupervised in a top-secret position after losing a stripe? (An acquaintance stationed in the Middle East tells me that is most likely the result of a critical shortage of manpower.)

Just last month, The Washington Post highlighted the fact that more than 850,000 people hold top-secret security clearances. How many of them are disgruntled individuals seeking retaliation for perceived wrongs? How many might now fancy themselves heroes by releasing critical data?

On another note: Just how much of the data released by Manning was marked classified but needn't have been? If security classifications were assigned to material just a little more judiciously, perhaps the need to dispense top-secret clearances would be, too. Then the Bradley Mannings of the world wouldn't need to assuage their consciences by indiscriminately turning over information that could aid and abet the enemy and cost American lives."


130 posted on 08/08/2010 7:37:41 AM PDT by united1000
[ Post Reply | Private Reply | To 42 | View Replies]

To: Dubya-M-DeesWent2SyriaStupid!

The Abu Ghraib photos were leaked by the uncle of one of the suspects charged (and later convicted). He was trying to negotiate a plea bargain for the perp and released them when it wasn’t offered.

Have to wonder if Abu Ghraib was instigated by a mole the same as the 90,000 documents were stolen by a mole in the military.


131 posted on 08/09/2010 12:41:32 PM PDT by a fool in paradise (I wish our president loved the US military as much as he loves Paul McCartney.)
[ Post Reply | Private Reply | To 114 | View Replies]

To: a fool in paradise

So Wiki sends info to the Obama and says stop me if you want. He doesn’t want to so Wiki posts the info. Info coming out that encrypted stuff is damaging to Hillary..and probably Bill.

So is this a way to shut down Hillary without providing the actual info?


132 posted on 08/09/2010 8:51:28 PM PDT by RummyChick
[ Post Reply | Private Reply | To 131 | View Replies]

To: RummyChick

found this on a site:

“In any case, some of the details might be wrong. The file might not be encrypted with AES256. It might be Blowfish. It might be OpenSSL. It might be something else. Some more info here.

EDITED TO ADD (8/9): Weird Iranian paranoia:

An Iranian IT expert warned here on Wednesday that a mysterious download file posted by the WikiLeaks website, labeled as ‘Insurance’, is likely a spy software used for identifying the information centers of the United States’ foes.
“The mysterious file of the WikiLeaks might be a trap for intelligence gathering,” Hossein Mohammadi told FNA on Wednesday.

The expert added that the file will attract US opponents and Washington experts can identify their enemy centers by monitoring individuals’ or organizations’ tendency and enthusiasm for the file.

http://www.schneier.com/blog/archives/2010/08/wikileaks_insur.html


133 posted on 08/09/2010 8:55:59 PM PDT by RummyChick
[ Post Reply | Private Reply | To 132 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-5051-100101-133 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson