Free Republic
Browse · Search
Topics · Post Article

Skip to comments.

WikiLeaks posts huge encrypted file to Web
Yahoo ^ | July 5, 2010 | Rapahel Satter

Posted on 08/05/2010 5:04:07 PM PDT by redhead

click here to read article

Navigation: use the links below to view more comments.
first previous 1-20 ... 61-8081-100101-120121-133 last
To: japaneseghost
There is a guy here on FR who has been banned a few times for posting anti-Darwin threads. He is the expert on hacking/security and assembly language. If anyone here can get into this, it will be him. Instead of going into the higher level, hacking, he goes down into the assembly code, into the bowels of computer software. I don’t know what his current FR name is.

NO ONE is cracking AES 256 without a few DOZEN more major breakthroughs in computer processor speeds. This ain't your daddy's WEP 64 bit encryption algorithm.

121 posted on 08/06/2010 9:45:43 PM PDT by Centurion2000 (Three things you don't discuss in public; politics, religion, and choice of caliber.)
[ Post Reply | Private Reply | To 116 | View Replies]

To: DBrow they’d never pull all telegrams sent from the USA.

Quite right. "Gentlemen don't read each other's mail."

122 posted on 08/07/2010 5:43:47 AM PDT by Androcles (All your typos are belong to us)
[ Post Reply | Private Reply | To 100 | View Replies]

To: Androcles

>> they’d never pull all telegrams sent from the USA.
>Quite right. “Gentlemen don’t read each other’s mail.”

Which brings up a question: would a gentleman ever work for the current government?
Would a gentleman work for the government at all? (George Washington observed that government *is* force.)

123 posted on 08/07/2010 6:37:17 AM PDT by OneWingedShark (Q: Why am I here? A: To do Justly, to love mercy, and to walk humbly with my God.)
[ Post Reply | Private Reply | To 122 | View Replies]

To: Androcles

lol According to the book “The Puzzle Palace” they routinely did just that, even after being ordered not to. Started during WWII and continued until Western Union went mostly electronic and stopped making carbons (and NSA of course stopped reading our mail then).

124 posted on 08/07/2010 6:39:50 AM PDT by DBrow
[ Post Reply | Private Reply | To 122 | View Replies]

To: Centurion2000

Maybe someone at a movie company. Digital effects, especially rendered effects, use giant server farms to process the huge amounts of calculations and imaging, frame by frame.

Using the Pixar setup for a couple months maybe?

Then there are the Google clusters, which are pretty big. But they’d never use that capability for evil, their motto says so!

125 posted on 08/07/2010 6:43:19 AM PDT by DBrow
[ Post Reply | Private Reply | To 121 | View Replies]

To: redhead

Insurance in spyspeak is Death Warrant

126 posted on 08/07/2010 6:47:43 AM PDT by bert (K.E. N.P. N.C. +12 ..... Greetings Jacques. The revolution is coming)
[ Post Reply | Private Reply | To 1 | View Replies]

To: DBrow; OneWingedShark
Well then, I think that if our governments have the decency to say they're not spying on us, then we should believe them.

Speak softly, praise the lord, and pass the high strength encryption.

127 posted on 08/07/2010 10:49:02 AM PDT by Androcles (All your typos are belong to us)
[ Post Reply | Private Reply | To 124 | View Replies]

To: CodeToad

“Dollar to donuts the NSA had that thing opened nearly instantly.”

Maybe, but only because Asange gave them the key: if you do x, this what will come out. Apparently you need gazillions of years to crack that and WL guys are no dummies to use a Ilovemom password. It’s brilliant if you ask me, especially with the threats, one tweet and thousands of people can open the files

128 posted on 08/07/2010 7:04:58 PM PDT by mainsail that ("A man will fight harder for his interests than for his rights" - Napoleon Bonaparte)
[ Post Reply | Private Reply | To 80 | View Replies]

To: japaneseghost

1.4 GB is indeed large for a file or posting on the Internet, even in the age of file sharing and piracy. It’s gigantic for a collection of documents, if that’s what this is.

The average text document is about 100KB in size. A CD ripped to MP3 is maybe 50 MB. An HD movie is about 300MB. This file is huge.

129 posted on 08/07/2010 11:39:48 PM PDT by Terpfen (FR is being Alinskied. Remember, you only take flak when you're over the target.)
[ Post Reply | Private Reply | To 110 | View Replies]

To: Dubya-M-DeesWent2SyriaStupid!

More on Manning


the last three paragraphs are exactly what I have been thinking!

"Why was Manning given a security clearance at all? For those who have been involved in security investigations -- even filling out the paperwork -- Manning's background clearly had red flags all over the place. And how does one remain largely unsupervised in a top-secret position after losing a stripe? (An acquaintance stationed in the Middle East tells me that is most likely the result of a critical shortage of manpower.)

Just last month, The Washington Post highlighted the fact that more than 850,000 people hold top-secret security clearances. How many of them are disgruntled individuals seeking retaliation for perceived wrongs? How many might now fancy themselves heroes by releasing critical data?

On another note: Just how much of the data released by Manning was marked classified but needn't have been? If security classifications were assigned to material just a little more judiciously, perhaps the need to dispense top-secret clearances would be, too. Then the Bradley Mannings of the world wouldn't need to assuage their consciences by indiscriminately turning over information that could aid and abet the enemy and cost American lives."

130 posted on 08/08/2010 7:37:41 AM PDT by united1000
[ Post Reply | Private Reply | To 42 | View Replies]

To: Dubya-M-DeesWent2SyriaStupid!

The Abu Ghraib photos were leaked by the uncle of one of the suspects charged (and later convicted). He was trying to negotiate a plea bargain for the perp and released them when it wasn’t offered.

Have to wonder if Abu Ghraib was instigated by a mole the same as the 90,000 documents were stolen by a mole in the military.

131 posted on 08/09/2010 12:41:32 PM PDT by a fool in paradise (I wish our president loved the US military as much as he loves Paul McCartney.)
[ Post Reply | Private Reply | To 114 | View Replies]

To: a fool in paradise

So Wiki sends info to the Obama and says stop me if you want. He doesn’t want to so Wiki posts the info. Info coming out that encrypted stuff is damaging to Hillary..and probably Bill.

So is this a way to shut down Hillary without providing the actual info?

132 posted on 08/09/2010 8:51:28 PM PDT by RummyChick
[ Post Reply | Private Reply | To 131 | View Replies]

To: RummyChick

found this on a site:

“In any case, some of the details might be wrong. The file might not be encrypted with AES256. It might be Blowfish. It might be OpenSSL. It might be something else. Some more info here.

EDITED TO ADD (8/9): Weird Iranian paranoia:

An Iranian IT expert warned here on Wednesday that a mysterious download file posted by the WikiLeaks website, labeled as ‘Insurance’, is likely a spy software used for identifying the information centers of the United States’ foes.
“The mysterious file of the WikiLeaks might be a trap for intelligence gathering,” Hossein Mohammadi told FNA on Wednesday.

The expert added that the file will attract US opponents and Washington experts can identify their enemy centers by monitoring individuals’ or organizations’ tendency and enthusiasm for the file.

133 posted on 08/09/2010 8:55:59 PM PDT by RummyChick
[ Post Reply | Private Reply | To 132 | View Replies]

Navigation: use the links below to view more comments.
first previous 1-20 ... 61-8081-100101-120121-133 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794 is powered by software copyright 2000-2008 John Robinson