[9:53 PM] Danger: ok thx [9:53 PM] Danger: will add shortly [9:56 PM] Kraya ☿: @jeanseberg really need ot head off now, but I assume none of those keys worked cause they arent what keys look like o.O I'm surprised someone with the coding skill to write that script tried that but either way yeah thats most likely a failed attemt at decoding the 2013 insurance files [9:56 PM] Kraya ☿: but yeah DM me specific questions and I'll read sometime when I wake up xD [10:01 PM] jeanseberg: @Kraya The key does not have to follow any pattern, I just created a file with aes256, used 'hello' as the password and decrypted it. [10:01 PM] jeanseberg: openssl enc -aes-256-cbc -salt -in text.txt -out test.enc [10:01 PM] jeanseberg: To make the file, and then: [10:02 PM] jeanseberg: openssl enc -aes-256-cbc -d -in test.enc -out file.txt [10:02 PM] jeanseberg: To get it back. [10:08 PM] sakulfromspace: passphrase is not the same as the key [10:08 PM] sakulfromspace: your computer saves the key in a file and uses a passphrase to retreive it, but its really using the full key [10:15 PM] lupdike: when the passwords do get released, how will we open the files....are they most likely truecrypt containers or what? [10:15 PM] Danger: no one knows how they will get released [10:16 PM] Danger: files are aes encrypted and available via torrent [10:16 PM] Danger: hang on and ill get you some links [10:16 PM] Danger: wikileaks insurance files: https://file.wikileaks.org/torrent/2016-06-03_insurance.aes256.torrent https://file.wikileaks.org/torrent/wikileaks-insurance-20120222.tar.bz2.aes.torrent https://file.wikileaks.org/torrent/wlinsurance-20130815-A.aes256.torrent https://file.wikileaks.org/torrent/wlinsurance-20130815-B.aes256.torrent https://file.wikileaks.org/torrent/wlinsurance-20130815-C.aes256.torrent [10:16 PM] lupdike: i've got the latest one....the 88gig one Danger pinned a message to this channel. See all the pins.10/23/2016 [10:16 PM] Danger: if you have space you should download the rest [10:16 PM] Danger: just in case [10:16 PM] Danger: it's possible keys will be released in chronological order [10:17 PM] jeanseberg: @lupdike Can you try the passwords posted in https://www.reddit.com/r/WhereIsAssange/comments/58vdsy/insurance_file_testing/d94ydme/ reddit Insurance file testing • /r/WhereIsAssange Found the original pastebin: http://pastebin.com/evFHJ61L Ongoing 8chan thread: https://8ch.net/pol/res/7946506.html Posts on... [10:18 PM] jeanseberg: @cooldude The post explains how to do it. [10:20 PM] jeanseberg: @lupdike Please post a comment with the passwords you tried (along with for which file) on the thread. [10:29 PM] lupdike: @jeanseberg I'm probably not competent to do this October 24, 2016 [12:47 AM] Danger: just saw this linked on 8chan: https://twitter.com/9CB9D65F54ED858 Twitter [12:50 AM] Elmyr: Looks like nonsense? [12:50 AM] Danger: not sure [12:50 AM] Danger: just wanted to post it here for posterity [12:50 AM] Danger: just in case [12:50 AM] Danger: i am too tired to dig in right now [12:50 AM] Danger: about toh ead to bed [12:51 AM] Danger: but i wanted to finish reading this 8chan thread [12:52 AM] ElectronSpinor: Which 8ch thread? [12:53 AM] jeanseberg: @Danger Where did you find this Twitter account? [12:54 AM] Dinghy: 8chan [12:55 AM] jeanseberg: @Dinghy Do you have a link? [12:55 AM] Dinghy: no, that's just what he said when he linked it [12:56 AM] Dinghy: I could look and see if i can find it [12:56 AM] Danger: https://8ch.net/pol/res/7952632.html THE SILENCE BREAKSPRAISE IThttps://twitter.com/wikileaks/status/... THE SILENCE BREAKSPRAISE IThttps://twitter.com/wikileaks/status/790074503472746496No claims of video proof of course but I'll take something over nothing. [12:56 AM] Danger: probably nothing guys [12:56 AM] Danger: don't get excited [12:57 AM] Danger: just wanted to post it here for tomorrow [12:57 AM] Dinghy: GO TO SLEEP ALREADY [12:57 AM] Danger: but if y'all will be up for a bit and want to try, by all means please do so! [12:57 AM] Danger: if you don't have the insurance files they are pinned to this chat [12:57 AM] Danger: i know, i know [12:57 AM] Danger: i am addicted to this shit man [12:57 AM] Danger: it is consuming my life [12:57 AM] Dinghy: We need to have a party while the mods are gone [12:57 AM] Danger: morning noon and night [12:57 AM] Danger: hey now i'm down to party [12:57 AM] Danger: does lame old white man dance [1:04 AM] Danger: one more thought before i REALLY go to bed this time (lol) [1:04 AM] Danger: if wikileaks is compromised [1:04 AM] Danger: and begins released data that is proven flase [1:05 AM] Danger: false* [1:05 AM] Danger: finding the keys to unlock these files is the only way to potentially salvage their reputation [1:05 AM] Danger: hopefully the june dump contains the full podesta email cache [1:05 AM] Danger: and it can be compared to any that were altered by these possible bad actors [1:05 AM] Danger: with that, i'm truly off now (until I'm back on) [1:08 AM] Mosh: later [1:12 AM] jeanseberg: https://www.reddit.com/r/WhereIsAssange/comments/58vdsy/insurance_file_testing/d9574vw/ reddit Insurance file testing • /r/WhereIsAssange lol. I was looking for more people working on the code itself. A little surprised to see mine pop up. I've actually decided to scratch the code... [1:26 AM] jeanseberg: New potential key: http://pastebin.com/Aa5YxXsR [2:02 AM] jeanseberg: Is someone willing to post a thread on 4chan/pol about this? I'm not able to do it for some reason. [5:05 AM] Mosh: Where is that from [9:07 AM] jeanseberg: @Mosh What? [9:08 AM] Mosh: the new potential key. I Dont know mucha bout encryption but interstedin helping [9:20 AM] jeanseberg: The new potential key has been posted on reddit, 4chan, 8chan, etc. [9:26 AM] Mosh: Oh okay. I thought maybe you were working on a process or theory putting them together [9:33 AM] Mosh: If we assume that the subreddit, the twitter, and the website are compromised: If releasing the keys happens, where would they come from [9:36 AM] Tyrone.Keklord: probably email distro to trusted affiliates for them to release [9:37 AM] Tyrone.Keklord: Not sure who they'd be and if they'd have the right sphere of influence to get them out, but I'd assume that'd have been planned [9:37 AM] Tyrone.Keklord: Issue is, if they physically got Assange, it'd only be a matter of time before they learned the contingencies and were able to disrupt them [9:38 AM] jeanseberg: It seems like the some potential keys were posted a few hours and keep getting deleted. Example: https://8ch.net/pol/res/7962287.html Insurance keys may actually have been released I'm seeing snippets of info around suggesting the insurance keys actually DID get posted, and the DDOS was an attempt to stop them, but it wasn't 100% successful.Apparently the keys were divided into separate parts and given to a variety of people. Nobody had the whole key themselves, but they all had parts of a key.Which means the keys we've been seeing around that haven't worked, may simply need to be combined with other keys to unlock the files.That's what this thread is for: Posting anything you suspect... [12:28 PM] jeanseberg: This is what I have: [12:28 PM] jeanseberg: ENCRYPTION KEY SET 1/4: +7[CX=\MJ8)TF{V,w+UMhIc'i]yZ^DDXct>88Mb0.=hJ;.C6RBgPOu@U.U“v'7]xKu)Tux2f~{w&Tqy1c^(/YrslZL?W},nt"U#:=D39!;1x#J6uNr ENCRYPTION KEY SET 2/4: :|Ag$sm![PkHWYGYd}T:Ojo5UeXm,CvWII={~d~y.q)p!l3e2M8\;pw