[ / / / / / / / / / / / / / ] [ dir / agatha2 / b2 / choroy / dempart / doomer / druz / vichan / vril ]

/qresearch/ - Q Research

Research and discussion about Q's crumbs
Winner of the 75nd Attention-Hungry Games
/caco/ - Azarath Metrion Zinthos

March 2019 - 8chan Transparency Report
Comment *
Password (Randomized for file and post deletion; you may also set your own.)
* = required field[▶ Show post options & limits]
Confused? See the FAQ.
(replaces files and can be used instead)

Allowed file types:jpg, jpeg, gif, png, webm, mp4, pdf
Max filesize is 16 MB.
Max image dimensions are 15000 x 15000.
You may upload 5 per post.

Welcome Page | Index | Archive | Voat Subverse | Q Posts | Notables | Q Proofs
Q's Board: /PatriotsFight/ | SFW Research: /PatriotsAwoken/ | Bakers Board: /Comms/ | Legacy Boards: /CBTS/ /TheStorm/ /GreatAwakening/ /pol/ | Backup: /QRB/

File: ef5865111e3ed21⋯.gif (3.32 MB, 960x540, 16:9, 1479533631056.gif)

598c49  No.1722872

Wikileaks Insurance files

working thread

Oct 2016, wikileaks is compromised, Assange disappears, internet goes down to try to stop the drop of WL insurance file keys. Pre-committment hashes were dropped.

False files were loaded onto the web to obfuscate.

Encrypted passwords were also dropped, but were useless without good files.

Good filenames have been located.

The first passwords have gotten through the first layer, but it appears a second layer needs a separate password. I think qresarch has that one. WE have more than we know! But we don't know we have it.

At this moment, 4chan/pol is struggling to work on decryption but their board is overrun by shills. the general shouldn't be disrupted, so this board is for the work. Let's free Assange

34e7e8  No.1722945

File: b9232bc35923859⋯.jpg (166.69 KB, 1288x794, 644:397, 1528855912814.jpg)

File: 6a4861258a35781⋯.jpg (132.96 KB, 1325x842, 1325:842, 1528856275272.jpg)

File: 514edff765e293e⋯.jpg (206.85 KB, 1326x813, 442:271, 1528856298912.jpg)

Can someone explain what these are?

739eeb  No.1722969

>>1718098 Original Post on /qresearch/


wlinsurance-20130815-A.aes256 (3.32 GB)

HA256 Hash: 6688fffa9b39320e11b941f0004a3a76d49c7fb52434dab4d7d881dc2a2d7e02

Passcode: Berlin?A!Collection+Of#Documents@Containing~Emails%FromUSA=A0F0

wlinsurance-20130815-B.aes256 (46.48 GB)

SHA256 Hash: 3dcf2dda8fb24559935919fab9e5d7906c3b28476ffa0c5bb9c1d30fcb56e7a4

Passcode: London!Documents(Of$A:Most\Sensitive~Nature:From"Europe>USA<UK/A1F1

wlinsurance-20130815-C.aes256 (325.39 GB)

SHA256 Hash: 913a6ff8eca2b20d9d2aab594186346b6089c0fb9db12f64413643a8acadcfe3

Passcode: Jakarta(A)Emails/Images;PDFs;VideosDOCs+From[Around]The}World{A2F2

739eeb  No.1722987

>>1720346 The key works???????

0081d3  No.1723060

File: f17d6b6afb91e81⋯.jpg (102.57 KB, 1292x346, 646:173, 1527559653113.jpg)


they got the key to decrypt through the first layer

there are two sets of torrents floating on the web, the good ones and faked ones

0081d3  No.1723121


WikiLeaks insurance 20130815 - A (3.6gb)

MD5: a243f323612b86155e4c44c7efa38d90

SHA1: a3e666f7f03001ce1b6556133b5217ab0d668463

SHA256: 6688fffa9b39320e11b941f0004a3a76d49c7fb52434dab4d7d881dc2a2d7e02

SHA512: c865d260e96a654540b4ef34be4242e5105d5260059436779028f1db0324f046b11a83098d561aa855ad7cc823e9e72c59fe59e92b246889985054edfaea1ef2

MD5: 0a7f57171f4ba49e42d3cb9cd602ec72

SHA1: 7e56d7a720ba6e9b00bbb66e6f64bd46e9285361

SHA256: 3dcf2dda8fb24559935919fab9e5d7906c3b28476ffa0c5bb9c1d30fcb56e7a4

SHA512: 37f3c44c6a8b51d6c7da84386ecc9b2ef4b9d1ca6df44ebee606742772be14c53811e883bcc0e8c659c7a4fe3ecf7b170585bbdf0a0c5b305a51162ce49147e5

MD5: c735e3f7c6d0ae2cad131b5539d303b0

SHA1: e74fd2fdd5e3bc6a0cb26813746912394385422e

SHA256: 913a6ff8eca2b20d9d2aab594186346b6089c0fb9db12f64413643a8acadcfe3

SHA512: e2385bf423e7b10aae121a2cf6467d996d32814eefc70c0fe08daa66096119a202d108e199a26ab6f1cbba0c6b1bfc03e9c670b853cc346dd061ce6b49a6f819

0081d3  No.1723168


0081d3  No.1723183


0081d3  No.1723287

also being worked in this thread:


0081d3  No.1723302

File: 0ad40b668cfbb63⋯.png (307.28 KB, 2390x768, 1195:384, 1528841128256.png)

File: 8678ff75ac2dd4e⋯.png (92.64 KB, 1019x654, 1019:654, caret.PNG)

File: 1d2dd81e9a75023⋯.png (6.36 KB, 706x80, 353:40, hash.PNG)

File: 07fc1af9a69c24b⋯.png (5.84 KB, 625x93, 625:93, pgpkey.PNG)


0081d3  No.1723349

File: a462ed849ee69d7⋯.jpg (138.39 KB, 771x648, 257:216, 1528842832717.jpg)

File: da60c973cd80af2⋯.png (2.04 KB, 741x19, 39:1, 1528844676379.png)

File: 2ce1ee526063fde⋯.png (44.76 KB, 1187x150, 1187:150, 1528854364565.png)

File: 6837c2ad2cbda91⋯.png (249.11 KB, 720x1280, 9:16, 1476660143-screenshot-2016….png)

File: e7c9cb7559d8d29⋯.png (86.43 KB, 1793x1119, 1793:1119, 1528840827545.png)

0081d3  No.1723388

File: 743076dd0f7ba78⋯.png (12.24 KB, 567x222, 189:74, clue.PNG)

34e7e8  No.1723411


>25.5%, is this you?

0081d3  No.1723460

decrypting tools




no, just bringing things back and forth between the boards. Im stuck at 14% hasn't moved in 8 minutes

0081d3  No.1723485


this thread


now archived at


34e7e8  No.1723490


No worries, so once its 100% does that mean you have access to the files or just that they have been decrypted? newfag with all this stuff, its fascinating.

4daba4  No.1723499


Just trying to help. Below is a Q post from PF. I had the same question. We are told over and over "we have more than we know". Could this be a key??

Q !4pRcUA0lBE No.87 📁

May 17 2018 16:57:40 (EST)


0081d3  No.1723504

original thread


read back and forth as anons try different things–threads keep getting deleted on halfchan and good ideas might be missed

739eeb  No.1723619





c8edb9  No.1723715


Chat logs usually with the filename of "claudia.txt"

aebca0  No.1723740

File: 7a9bb590f02282f⋯.png (9.7 KB, 665x241, 665:241, insurance wl.png)

So I have the wrong ones? FML

0081d3  No.1724193


wait those look like the good ones.

Definitely the bad ones have 1984 in the filenames. sec Ill confirm

0081d3  No.1724266


its just the files, but for the first time, good files have been found

then they have to be decrypted


yes, that could be a key

it all could be a key

missing letters and spelling errors could be a key

0081d3  No.1724302


dont stop, get them anyway

file names can be changed, if you got them from the torrents posted hang onto them, we do not know all what is out there

a91b8c  No.1724308

https://www.reddit.com/r/goodlongposts/comments/5otfzi/as_of_2017_aes256_compromised_wikileaks_insurance/ fake???

0cf837  No.1724338

Ghost-CON active.

Approval 58203-JX

Tom Clancy's Ghost Recon is a series of military tactical shooter video games published by Ubisoft. In the series, the player is in charge of a fictional, newly conceived squad of U.S. Army Special Forces soldiers from Delta Company, 1st Battalion, 5th Special Forces Group (5th SFG) stationed at Fort Bragg, North Carolina. Except for the "1st Battalion, 5th SFG" designation, this reconnaissance unit is entirely fictional, as Special Forces Battalions currently only support three Companies (A, B and C). They are often referred to as "the Ghosts". Their role is not unlike other real world special operations forces, in that their operations are kept highly classified. In Tom Clancy's Ghost Recon: Future Soldier, it is shown that the Ghost's unit has multiple designations and is part of JSOC and is also known as the Group for Specialized Tactics (or GST—where the term "Ghost" comes from) much like real JSOC units like Delta Force (1st SFOD-D or CAG) and SEAL Team Six (or DEVGRU).

1e6594  No.1724523

File: fc7fe6da5a3864e⋯.png (27.66 KB, 881x431, 881:431, WikileaksInsurancePassword….PNG)


We're missing one here:


USA-Secret-Patents-List-1948-to-2009.aes256 (54.1 GB)

Passcode: Tokyo*Your_World_Has_Changed_1948_To_2009_UK_USA_Secret_PatentsA3F3

That makes a total of four files ←-> four BOOMS

I can't seem to find the torrent for this one, though.

aebca0  No.1724540


I downloaded 3/4 of them 11-2016 when the height of the podesta drops were going on

42a404  No.1725068

File: 34355fce9f99a88⋯.png (88.04 KB, 856x771, 856:771, 1528843853150.png)


a91b8c  No.1725070

These guys are stupid.

42a404  No.1725078

Look at the signature. >>1725068

a91b8c  No.1725173



>/18 (Tue) 21:40:15 a91b8c No.1725070


>These guys are stupid.


>/18 (Tue) 21:40:15 a91b8c No.1725070


>These guys are stupid.


It didn't work over a year ago, how come no one can make it work now? Why was it dropped? Why did people call it fake over a year ago WITH the same amount of legwork, REGARDLESS of WHO sent it. I've never seen Q sign with "The Q." Who knows maybe those were his early days. Or maybe if Q wanted us to dig into this, he'd post about it. IDK. Q proof needed. Q will confirm.

f06dea  No.1727202

i think they injected the reddit post recently and faked the date. i was all over this research that time and cant remember this stargate7 user posts at all.

1e6594  No.1727647

File: 7a1cd2d44f85c21⋯.jpg (76.62 KB, 1242x566, 621:283, dbefab8b6f37f09fd871de3791….jpg)

Okay anons, I think I’ve gotten the first layer off. Can’t really be sure, though—I’ve never had the faintest interest in cryptography.

Looking through Wikileak’s history of releasing insurance files, you see that there are multiple layers of encryption on each of the files. There was at least one I know of where the first level of encryption was taken off. I’m guessing that that’s what just happened here—but it doesn’t mean that we’ve got a bunch of dirty nasty secrets to dig through; it just means we’re a step closer when we’re not even sure how many steps there are. On a positive note, I think it’s much more than a coincidence that this is happening right now, of all times—so I would download these and have them on hand, because the whole key could be given out at any moment.

So here’s how you take that first step. Note pic related: these files aren't just aes encrypted—they're aes256cfb encrypted. So AES Crypt doesn’t work. You’ll need to install openssl. I’m working off of a Windows machine—I found this page helpful:


You'll need to do part a) set up a configuration file, but you won't need to do part b) generate a private key. You should also note that most of this, after installing openssl, involves working from the command line.

Once you've installed openssl and set up your configuration file, you'll go to the directory where openssl is installed, then run it. You should get an indicator that shows it's working–it'll be a prompt that looks like this in the command window:


Once you have that, you'll enter the command shown in pic related, with some adjustments. You won't need the "openssl" part, and you won't need to enter "enc" like in pic related–that would just encrypt the file even further. The command you enter should look something like this:

OpenSSL>eas-256-cfb -in C:\Downloads\wlinsurance-20130815-A.aes256 –out C:\Downloads\wl-A -pass pass:Berlin?A!Collection+Of#Documents@Containing~Emails%FromUSA=A0F0

Let's break it down:

The first part "eas-256-cfb" tells OpenSSL what you're trying to do

The "-in" part is where you enter the path to the insurance file you've just downloaded. In this case, it would be on the C: drive, in the "Downloads" folder–yours may be different.

The "-out" part tells OpenSSL what you would like the output file to be named. This isn't like unzipping a file–we have no idea what we have on our hands here. In my case, I decided to output it as "wl-A". That’s just a file without a file extension at the end…which is appropriate because we have no idea what it really is. Just for reference, I added “.zip”, “.bz2”, and “.tar”, but no dice—it wasn’t recognized as any of those. I also tried opening it in gVim and notepad++, but even the smallest is far too large for those programs to deal with.

The "-pass" part is where you enter the password. In pic related, it's

>-pass file:wl-A.pass

That's because that anon wrote the password into a file he created named "wl-A.pass". It would be the smart thing to do if you were trying to keep your password private, but that's not the case here; you should just be able to enter the password as above rather than the way it was done in pic related.

Note: if you do decide to use a password file, you should put the full path. So let’s say you wanted to put that file in the same folder as your wlinsurance file—you would enter “-pass file:C:\Downloads\wl-A.pass”

Once that’s done, I guess you’re a step closer than everyone but the ones that figured this out, maybe some well-connected people, and Wikileaks.

Again, I'm no expert. Maybe I'm missing a post somewhere, but I haven't gotten any further, and I don't have the ability to tell if I've even made progress. I guess the fact that there was some output is a good sign, but tonight wasn't the night I got to see Merkel in her dad's Nazi outfit.

6b19fd  No.1727736

I can’t find a current pol thread on this. It truly is disturbing how many autist just seem to not be anymore……

f06dea  No.1727801





and some more in the past threads. some other anons confirmed the first layer throughout last night but that's it for now.

8055f1  No.1728027



im the anon from your picture, on windows if you type in the password on commandline the control characters for enter / return can be different that is why the password is in a txt file also the enc options is a preflag to the aes type its not a command to encrypt think of it like this:

encryption type? aes-256-cfb

but your post is great to read i was met with sewwww much shills and a couple assholes who didnt understand what they were talkin about trying to push me around

always think for yourselves anon, dont be afraid, fear not and trust that little voice in your heads, it gets louder the more you listen to it


8055f1  No.1728037



also on linux ? # and ! among other special characters are commands and comments that ruin your command if you dont put a series of quotes around them or \\ before them so its way easier to make a file containing the password, on windows make sure you use notepad or even edit from dos so theres not font data and shit in there

8055f1  No.1728102

File: 9c1d527a7428e34⋯.jpg (9.55 KB, 164x255, 164:255, 12b790d4004e8537b1ca911bfb….jpg)

also i have this i think these are from ddos deadmans switch supposedly, theres also a really good irc log floating around of anons who did a lot i mean a ton of blockchain work i cant find it on my hard drive at the minute

f06dea  No.1728106



we've been through this process back in 2016/2017 dealing with shills and newfags who do not know how to handle encrypted data files and yelling phrases of concern because they cannot double-click on it

the "shill force" was immens in the last 24hours (half /pol e.g.) so better way to ignore and stick to old holding groups and other channels

8055f1  No.1728108


actually this is an anons from the other day but the wiki screen shot is like a phone picture of a dudes computer screen that looks very similiar, the thumbnail confused me, the text says something like 1/4 and 2/4 and theres a nother one with 3/4 and 4/4 i believe sorry about that sage

8055f1  No.1728137


one more thing they say pre commitment

done shitting on bread

f06dea  No.1728141



the first python script stuff jean_b.py etc. originated from there and some anons made some github repos to index the btc blockchain that time, see also archived endchan.xyz pol threads for tidbits.

other example https:// vimeo.com/215536434 how to extract cablegate.7z from the blockchain

things repeating each year i think

f06dea  No.1728156


that img was posted shortly after the happenings in oct2016, it's somewhere in the google image cache

8055f1  No.1728184


its python that analyzes blockchain and extracts data and possibly files id have to look at it closer and i will im at the last 2 monhs of a brutal methadone detox and only have so much time each day where im not completely miserable

8055f1  No.1728192


yes you know what im talking about, good, there are actually 2 and one is a terrible picture that is missing chars that are cut off but only 2 or so

8055f1  No.1728196



the chat log im talking about discuss's this, the ddos of wikileaks deadmans switch and has excellent work re: blockchain, i actually think these anons found something they were all v& or silenced 1 by one which is discussed int his log as well, i thnk this log is in a reddit thread or voat with the screenshots were talking about

f06dea  No.1728797


https:// siderus.io/ipfs/QmczBCV3zgnCGbFjw7axsKpuLcHQwkFYpj22ptfX9tZLQH/claudia.txt

830c23  No.1729440

File: eacd28bc4fbc937⋯.gif (3 MB, 480x270, 16:9, giphy.gif)

598c49  No.1729672


This is as far as I've seen anyone get. The faked files always meant dead ends. Now we've got the good files. Yes, we need to d/l everywhere possible because the rest of the keys might drop at any time. And if they do, you can be sure as hell the internet will go down just like it did in October 2016 the first time the files were dropped. When the net came back up, the originals were (mostly or entirely) scrubbed and the faked ones planted, which meant dead ends.

It is NO coincidence that the correct torrents are now out there at this time, and a crumb was dropped to revisit. That crumb from the past is the only reason anyone went relooking and revisited this.

thank you for your step by step. Even if you have had no interest in cryptography before now, it looks like you've received a calling I'd say.

There are going to be multiple layers. I've got a suspicion that somewhere in Q's drops we'd find parts of the next level key..DJT tweet misspellings etc. But eventually we'll get them. And not only Merkel as Nazi, but Obama in tribal and everything SR died to get.

That would certainly bring all the normies to the yard wouldn't it.

598c49  No.1729714

none of it is shit. every brainstorm counts. every shitty idea counts since it could spur someone to think 'that is dumb, that wouldn't work because X would have to be Y and HEY that means A!" We learn by rejecting ideas at least as often than we learn by accepting ideas.

Pre committment came out in June 2016 if I recall.


e54bdf  No.1729892

Ok I'm just copy and pasting this…

I wouldn't think much of it… but it's signed "the Q" and it's from over a year ago.


wlinsurance-20130815-A.aes256 (3.32 GB)

HA256 Hash: 6688fffa9b39320e11b941f0004a3a76d49c7fb52434dab4d7d881dc2a2d7e02


Passcode: Berlin?A!Collection+Of#Documents@Containing~Emails%FromUSA=A0F0



wlinsurance-20130815-B.aes256 (46.48 GB)

SHA256 Hash: 3dcf2dda8fb24559935919fab9e5d7906c3b28476ffa0c5bb9c1d30fcb56e7a4


Passcode: London!Documents(Of$A:Most\Sensitive~Nature:From"Europe>USA<UK/A1F1



wlinsurance-20130815-C.aes256 (325.39 GB)

SHA256 Hash: 913a6ff8eca2b20d9d2aab594186346b6089c0fb9db12f64413643a8acadcfe3


Passcode: Jakarta(A)Emails/Images;PDFs;VideosDOCs+From[Around]The}World{A2F2



USA-Secret-Patents-List-1948-to-2009.aes256 (54.1 GB)

SHA256 Hash: 12adbf23579ddaec01aadeaeac87092536e629462392aacabb341373cebce1b1


Passcode: Tokyo*Your_World_Has_Changed_1948_To_2009_UK_USA_Secret_PatentsA3F3

. .

Read'em and Enjoy!


These are EXACT codes: YOU MUST cut and paste AS IS – DO NOT CHANGE ANY CHARACTER CASE !!!!


"The Q"



StargateSG7 • 1y


Thank you and a very good night to all! .

There will be no more releases from us until "The Q" release the

1948-to-2009 Secret Patents List file when and where we see fit!


"The Q"



StargateSG7 • 1y


To those of you in the know, we have



Sometimes, the most interesting secrets

are those that are the most easily dismissed!


Now, in our case, we actually TEST what we find

and what we have found is MOST ILLUMINATING!

We also ENSURE we have conclusive video proof

and working models to show to all….


We ARE everywhere !!!!


We CAN do what we say !!!!


We will GIVE to the world !!!!


We HAVE the PROOF !!!!


"The Traveller"


speaking on behalf of


"The Q"


showmeurboobsplznthx • 1y

Is it going to happen tomorrow?


StargateSG7 • 1y

I highly suggest you READ THE DAMN ARTICLE!


Up above you are the Passcodes released EARLY!





To those of you in the know, we have



Sometimes, the most interesting secrets

are those that are the most easily dismissed!


Now, in our case, we actually TEST what we find

and what we have found is MOST ILLUMINATING!

We also ENSURE we have conclusive video proof

and working models to show to all….


We ARE everywhere !!!!


We CAN do what we say !!!!


We will GIVE to the world !!!!


We HAVE the PROOF !!!!


"The Traveller"


speaking on behalf of


"The Q"


showmeurboobsplznthx • 1y

So tomorrow at 11am?


StargateSG7 • 1y


You are beyond help….!!!


The passcodes were released YESTERDAY !!!


They are DETAILED in one of the ABOVE POSTS !!!


My Oh My!!!


The Sad Intellectual State of an American Idiot knows no bounds!




You will see the passcodes there!



(for the dummies who can't be bothered to read):


wlinsurance-20130815-A.aes256 (3.32 GB)

HA256 Hash: 6688fffa9b39320e11b941f0004a3a76d49c7fb52434dab4d7d881dc2a2d7e02


Passcode: Berlin?A!Collection+Of#Documents@Containing~Emails%FromUSA=A0F0



wlinsurance-20130815-B.aes256 (46.48 GB)

SHA256 Hash: 3dcf2dda8fb24559935919fab9e5d7906c3b28476ffa0c5bb9c1d30fcb56e7a4


Passcode: London!Documents(Of$A:Most\Sensitive~Nature:From"Europe>USA<UK/A1F1



wlinsurance-20130815-C.aes256 (325.39 GB)

SHA256 Hash: 913a6ff8eca2b20d9d2aab594186346b6089c0fb9db12f64413643a8acadcfe3


Passcode: Jakarta(A)Emails/Images;PDFs;VideosDOCs+From[Around]The}World{A2F2



USA-Secret-Patents-List-1948-to-2009.aes256 (54.1 GB)

SHA256 Hash: 12adbf23579ddaec01aadeaeac87092536e629462392aacabb341373cebce1b1


Passcode: Tokyo*Your_World_Has_Changed_1948_To_2009_UK_USA_Secret_PatentsA3F3





"The Traveller"


speaking on behalf of


"The Q"


showmeurboobsplznthx • 1y

Doesn't work.


Share this Link

Preparing your link

a91b8c  No.1729935


I hashed my files. I got the "good ones" according to the origins and the author (SG7). Dead ends. Next. You guys can hold your files, that is legit. Even attempt to crack them. Good. Until progress is made, I don't want to waste mine or anybody else's time. Keep believing, fine. There are no leads at this time.

db7143  No.1730097

File: be1e3c3586c6b18⋯.jpg (43.58 KB, 478x720, 239:360, Obama HIllary making the w….jpg)

File: f1a750a233160ab⋯.jpg (47.41 KB, 550x691, 550:691, Obama HIllary making the w….jpg)

File: 16a82c200681dd0⋯.jpg (52.59 KB, 479x720, 479:720, Obama HIllary making the w….jpg)

File: 3b1475120cdb61c⋯.jpg (48.17 KB, 493x720, 493:720, Obama HIllary making the w….jpg)


Remember when Bolton said something about Libya and Kim Jung Un freaked out? No wonder. Look at what Obama accomplished in his incompetent attempt to make the world a better place in his handling of Libya. These pics show 2000 vs 2018. However, Obama and Hillary did what you see here during Obama's 2nd year in office (2011). Compare that with what Trump just did during his 2nd year in office. And the MSM sat quiet. Even as of today.

936bb1  No.1730501


The files being downloaded are encrypted archive files filled with god knows what. They still need to be decrypted. Imo these files and the threat of their contents has kept Assange alive and not door knobbed.

I'm 100% on A … seeding and trying passwords.

936bb1  No.1730569

File: 0b8349f65607e5c⋯.png (74.79 KB, 635x419, 635:419, ClipboardImage.png)

File: ee8b963941615c3⋯.png (308.57 KB, 1021x726, 1021:726, ClipboardImage.png)

Also dont forget JA + @Snowden tweets …

Keys for keys for keys ..

703ad7  No.1730571


It's a chat log from the months after oct/2016 when JA went dark. I can attest to it's authenticity.

The programs in that chat log are simple python programs that poll blockchain.info for transaction data found within a transaction id. The original Jean.py script pulled data from a single transaction ID, but further iterations (jean3.py) followed a tree of transactions to generate much larger files. There are gigabytes of data immutably included in the Bitcoin Blockchain.

Hilariously enough, alt-coins that used a hard fork of the bitcoin blockchain, to seed their own, also contain the wikileaks data. (bitcoin cash, bitcoin gold, ect.).

In the example provided, they used the transaction number that contains data for the cablegate backup. Wikileaks shoved their entire proof of publication, AND DATA into the blockchain well before anyone knew to look. Well after it could be changed or manipulated. It's immutable. Never to go away. Forever existing as long as bitcoin remains secure.

You'll notice references to satoshi nakamoto's download tool which can be found within the transaction provided. This is a very simple tool that allows you to perform similar actions as the jean.py script.

This is a very deep and fruitful rabbit hole. Very reliant on technical programming knowledge and knowledge of the bitcoin protocol. Read between the lines. Use the examples as a guide for further research.

703ad7  No.1730611


Did anyone decide to look at the header of the decrypted file to ensure that it is or is not salted? If it's salted, it's still encrypted (either failed decrypt or another layer as you imply). However if it's not salted, then grep the file for known headers of file types often used by wikileaks. 7zip, pdf, images and video filetypes. You may be able to excise from the larger file data of use.

703ad7  No.1730771


You can create blockchain transactions from these hash codes. I'll chime in on it when I get home. I have the info archived.

Basically you need to look into how bitcoin generates it's addresses. It's a series of hashes that generates a unique ID. These hashes are from one of the steps in the creation of a bitcoin address.

Find the address and you have a starting point. The addresses have transactions related to them and can be extrapolated using jean.py or other means.

68db62  No.1731134

File: 719433fb1dc6493⋯.png (15.52 KB, 479x372, 479:372, ClipboardImage.png)

this is as far as I get.

<don't really know what I'm doing.

936bb1  No.1731266

YouTube embed. Click thumbnail to play.


JA's key [60 Chars] - fb4e568623b5f8cf7e932e6ba7eddc0db9f42a712718f488bdc0bf880dd3

@Snowden's [64 chars] - ffdae96f8dd292374a966ec8b57d9cc680ce1d23cb7072c522efe32a1a7e34b0

Have tried them both in a BTC block chain explorer - nada.

Have also been trying things here https://www.devglan.com/online-tools/aes-encryption-decryption

64 bits would work - 60 wont.

16,24,32 characters for secret key depending on 128, 192 or 256 bit encryption respectively - BOOMBBOOMBOOMBOOM + variants - no luck, but worth a try.

f06dea  No.1731326


use command line/terminal and lurk moar for this part. suggestion: install linux if you havent already (native or via VirtualBox)

f0ec0e  No.1731361


Posting some info on how to get bitcoin addresses from hashes.

Example, Snowden's tweeted hash:


To get two addresses out of it, you do (in Python):

from pybitcoin import BitcoinPrivateKey

pk = BitcoinPrivateKey('ffdae96f8dd292374a966ec8b57d9cc680ce1d23cb7072c522efe32a1a7e34b0', compressed=True)

pk = BitcoinPrivateKey('ffdae96f8dd292374a966ec8b57d9cc680ce1d23cb7072c522efe32a1a7e34b0')


And you get: 1EnDZkT8Thep9sfbAy5gwg23EHhZw7tYwg

Then you can find the address here: h ttps://blockchain.info/address/1EnDZkT8Thep9sfbAy5gwg23EHhZw7tYwg

The second address comes by using the compressed option:

pk = BitcoinPrivateKey('ffdae96f8dd292374a966ec8b57d9cc680ce1d23cb7072c522efe32a1a7e34b0', compressed=True)



Which is: h ttps://blockchain.info/address/1L3Zqv68zsXxNs53r25dKcUgjDe1119Rhj

f0ec0e  No.1731364


Bitcoin addresses from Kerry hash:









Used same procedure as with the Snowden hash tweet

936bb1  No.1731444

File: 9395c485d77fa3f⋯.png (308.9 KB, 1021x734, 1021:734, ClipboardImage.png)

File: 132bdf545dfd2f7⋯.png (36.36 KB, 1183x802, 1183:802, ClipboardImage.png)


Solid work anon, thanks. The dates though - I know BTC is slow but could you get the this much difference? Different timezone?

Give me back the days of jtr :P

f0ec0e  No.1731508


no idea. What is interesting is the amount of the first transaction. 0.000911 BTC is deliberate and meant to draw attention to the transaction.

Those two addresses that sent the 911 transaction…anything interesting about them? Anything interesting about the amounts of spent BTC from the snowden address?

936bb1  No.1731815

File: 6da0a44be9ce21c⋯.png (44.88 KB, 1250x805, 250:161, ClipboardImage.png)


Have very briefly clicked through following the money - kind of afk rl things atm … but address 1Q74VmZKZXgH58LVk32oNinU4xAJR6yiUa has been busy ..

No. Transactions 25243

Total Received 236,217.19143687 BTC

Aug 2016 BTC ~$600 …

149f32  No.1731999

File: 16488e2e534a38d⋯.png (204.53 KB, 1080x1920, 9:16, Screenshot_20180609-185728.png)

File: 06f5ff8d461d3e5⋯.png (269.68 KB, 1080x1920, 9:16, Screenshot_20180609-185618.png)

See how some transactions have extra data in them?

1e6594  No.1732453


I'm glad you posted–that command line led me right to the proper method. I was trying to use AES Crypt as well…but I noticed that it didn't recognize files that ended in "aes256" as an "AES Crypt" file.

I actually used your method of creating a file and entering the password into it, and it worked fine. I just remember how, many years ago, I was kind of blown-away at the idea that a file is just a collection of data, and the extension (such as .jpg) is what tells the operating system how it should handle the data. So I didn't want to get into having to explain to everyone that they should create a new text file (in something like notepad++ or gVIM, not Word), enter the password and the password only, save the file, exit the editor, then rename the file "wl-A.pass".

But it makes a lot of sense why you did it the way you did. I was amazed that it worked, once I got the .cfg file set up for openssl.

And I wouldn't worry about the shills, my man. I've been here for awhile, and every time I find something good all these assholes start popping out of the woodwork telling you it's worthless. It happened when I found the Treasury's OFAC ("Follow the Money"), it happened when I tried to bring people's attention to the Panama Papers at ICIJ.org (which probably aren't all that valuable, given that Soros funds the ICIJ), and it happened when I re-discovered Soros' leaks. The more the scream, the better it is for mankind.

Reading through the archived /pol thread, there were a lot of hints about something called "the end." I think that ties directly into some work elsewhere on 8ch dealing with virtual quantum computers and "P = NP." I wonder if it's a hint as to how to take the next step? I'll be taking this info to that board.

f0ec0e  No.1732815


Each transaction has a little bit of extra data. String transactions together and you can build files from the added data.

The problem is finding out which transactions are the start of the file. Also, once you find the start, where do you go from there? Usually this is done by connecting transactions based on the amount of bitcoins sent.

So for example: .000911 bitcoins would show an important file. Then ascend the amount with each transaction: .000912, then .000913, then .000914…ect.

Follow this through and you will get the complete file.

1e6594  No.1732824


Thanks. I might get into cryptography (I'm about to choose the details of my major)…but when I look at how some of the autists in that /pol thread dig away at this stuff…those are the real guys. Besides, the advent of Quantum Computing is going to change things quite rapidly–how will that change things? Will those skills become obsolete as everyone moves forward?

For me, cryptography just reminds me that people are assholes. Otherwise, why would you need it (unless you were trying to hide information on birthday presents)? When you try to decipher the mysteries of God's creation (how I think of science), you feel as if you're unwrapping a gift. When you work to decrypt man's mysteries, you feel like you're peeling the layers of a bloody bag someone found in the women's restroom.

4308e6  No.1732989


How are we doing the transaction decoding now? I can't get jean3.py to work (do i need an older version of python?)

I got the wikileaks A file decoded currently downloading C, Would it be possible you need to combine all 3 of the decoded ABC files?

5ba2fb  No.1733023


i tried to unzip the decoded A file, got a message that it was either not a zip file or was part of a multi-part archive and would need the catalog in the last file to unzip… fwiw.

f0ec0e  No.1733095


Bring the file up within a hex editor (ghex on linux for example) and look for the header of a file type.

For example, a PNG has a header that looks like this: "89 50 4E 47"

If you find that sequence within the file you've just found the beginning of a PNG. You can look at any PNG and it will have the same header. Build a list of headers for common files used by wikileaks and you can then grep for them within larger containers.

1e6594  No.1733197


One of the posts in a general thread linked to this archive:


When I'm talking about the autists that have been at this for awhile, this is what I meant.

f7eac0  No.1734009


I'm sure someone has probably covered this but in case they haven't lot of Q references to: shall we play a game = wargames = Joshua

as well as other cyber movies.

Not a cryptofag but willing to learn if others think this is worth energy.

b8e4ba  No.1734344


FYI there is a data recovery tool that automates this

PhotoRec 7.0, Data Recovery Utility, April 2015

Christophe GRENIER <grenier@cgsecurity.org>


I mounted the archive

sudo losetup /dev/loop0 wlinsurance-20130815-A.aes256.decrypt

and ran the tool over it. no luck.

I guess its encrypted multiple times?!

But anons keep PhotoRec in your mind if things like these are necessary

974edb  No.1734950


If it was encrypted a second time it would say salted in the first 8 bits of the file. I'm not seeing that.

bd1e16  No.1735731


yeah try python2

linux installs python 2.6 and 3.something simultaneously

also check first line if its #!/bin/bash/env python try chaning that to #!/bin/bash/python2 and 3 respectively

bd1e16  No.1735760



dude you should download the small file the 3.46gb one and do the hex edit thing yourself we need help as much as suggestions, really need that 1/2 2/2 and 3/4 4/4 screenshot with filenames so i can try and extract htem with command line, i will do hex edit tomorrow, tell me big indian, little indian sort by 8/16 or word? so many options, using ghex

bd1e16  No.1735786


its literally the future

bd1e16  No.1735816


i bet we need an actual gpg key file thats like at least 256 bits thats the salt perhaps in the blockchain

bd1e16  No.1735849


by the way i have powerful gpu and can do some small cracking if we are ever missing a few digits of a key or something, i use it for wifi fun, er pen testing labs, no way we cracking a whole key tho

e9b353  No.1738556

File: 530d3ec358664ae⋯.jpg (55.4 KB, 548x864, 137:216, 4cab7857t.jpg)


I don't recall there being a post with 3/4 and 4/4

but here you go.

551e2c  No.1738876







Now you're thinking.

Use snippets of the insurance files with a list of keys and go from there

Try these keys


473e1b  No.1740948

Just as a word of warning (and a consideration to the "The Q" comments, of which this does reek of advanced mil-int), AES is NIST approved, which in my book always constitutes it as being 'backdoored'.

Certain types of AES (such as NoPadding variants or ECB - Electronic Code Book) have fundamental weaknesses (NoPadding is vulnerable to 'Oracle attacks' - look it up), and my thoughts are the NSA (who likely nudged NIST into approving AES - remember, AES is used by the US government) built fundamental mathematical backdoors into it (basically, a mathematical backdoor is 'if you calculate X in a slightly different way, you get more efficient returns, EG in brute forcing attacks').

What 'StarGate' is describing sounds EXACTLY like a mathematical backdoor (the whole point of an encryption algorithm is that it's meant NOT to be 'easily brute forceable' if you change certain aspects of it), and I highly doubt they just 'casually' discovered such a backdoor in an algorithm that has been around for quite some time, which either means:

1) SG is some sort of insane genius (timing is circumspect, as is their disregard for Julian Assange's safety - they could have kept this quiet), but with no prior history establishing as such I doubt this.

2) SG works for a research body or university with the resources necessary to make solving this equation possible (IE with cryptographic experts, mathematical professors, and the like), or the most likely in my book,

3) SG is an NSA employee and the NSA, in their sheer desperation and panic over Q, and in an effort to neutralise Julian Assange in the same move, have voluntarily given up a mathematical backdoor in their own proposed encryption (note: this is a double-edged sword, ANY AES based encryption is hypothetically exposed - although I notice SG is VERY quiet on the details of how exactly he did it) and are thus publishing the passcodes in order to nullify Julian Assange's insurance policy.

If it is the third case, then we can be confident the NSA already read the insurance files, and have concluded either there was nothing of merit, or they've already solved whatever problems they've presented.

It's unclear what benefit it would have to expose this information publicly though (why not just neutralise Julian Assange and let the whole thing naturally flop?), unless their goal is to now discredit Julian Assange by basically saying 'hah, his insurance files contain nothing (because we've already purged the evidence'.

Either way, something about this reeks, and I'd advise we dig just a little further into StarGate to validate their claims. People don't just make major breakthroughs on cryptography overnight - usually specialist researchers 'chisel away' at a problem set.

473e1b  No.1741090

Just to prove I'm not the first to have thought about AES being backdoored:

"I wouldn't assume that the NSA has cracked AES ciphers. I would assume that most crypto systems that use AES have implementation flaws that the NSA exploits when they feel it is worth it. "

https://crypto.stackexchange.com/a/2252 (As early as 2010)

Maybe Julian Assange had a nonce moment in picking a government approved crypto, but I'd advise people always wrap their own data in their own crypto prior to placing it inside a 'trusted' crypto.

"Breaking into those complex mathematical shells like the AES is one of the key reasons for the construction going on in Bluffdale. That kind of cryptanalysis requires two major ingredients: super-fast computers to conduct brute-force attacks on encrypted messages and a massive number of those messages for the computers to analyze."


NIST approval:


Oracle padding attack:


Why ECB is insecure:


If you guys ever plan to do insurance files, pro-tip:

1) Use different encryption algorithms for each individual file or file groupings (this would force the NSA to give up a lot of legwork just to expose it)

2) Build your own crypto, and have that as the 'primary' layer (hardwork, but understanding crypto reaps it's own benefits). A lot of experts will say 'but yours will be flawed'. Yes, but so are the NSA's: your own flaws means a manual analysis and time has to be spent looking for those flaws (more time = more security).

3) Make sure some insurance files are kept with specific trustworthy individuals who cannot leak the information online until after a specific period.

End result:

1) Breaking one encryption does not break all of them, so some insurance remains.

2) Breaking the outer layer encryption does not break the inner layer.

3) Even if both broken, having isolated units of other insurance files that cannot be easily obtained means there's still coverage (even the thought of 'missed insurance files' as a scare-thought is still insurance)

Adage: don't put all your insurance files in one encryption basket.

a91b8c  No.1741936


THIS. ^^^^^

cb3af5  No.1742144


good job on this anon, many people have seen this man knew where it was but few would post it, lazy bastards need redbull AMIRIGHTGUISE….. kek


what do yo mean by snippets of inusrance file, surely not just cutting 10mb off from anywhere?

bffbd9  No.1742453

>>1741090 elliptical curves - make Thoth Proud

the Morphic Field, Knuth reveled

Type 1 Civilization includes EYES

"And… it's gone "

bffbd9  No.1742466

>>1735760 SLB CUBE - immersive too . Clever French men… get in there !

cb3af5  No.1742479


you got a link i understand its 3d data software but can you link me to an official site

bffbd9  No.1742505

>>1735786 only Man can change enochian quint

bffbd9  No.1742518

>>1742479 sorry - above my pay grade .

but u know WHAT to do

cb3af5  No.1742601


what do you know about quantum computing, and enochian blueprints, seals etc?

cb3af5  No.1742644


hey mr helper one more thing, does this have anything to do with c l e a r o db work i did earlier?

cb3af5  No.1742653


well considering i did a notable on oracle databases and some of this software may or not contain my name, SPOOPY i think this guys either helper or i need sleep

cb3af5  No.1742664

if i have to install windows i want a meme war metal

slb = software load balancing or the slb company for imaging? rarrrrr

cb3af5  No.1742734


have any resources from /by nsa or former member of re: bitcoin?

cb3af5  No.1742738


i know tghey did blockchain in 90s

04fd73  No.1745974


I always found it odd that it said this, why?

Bottom of page:

>If the password is ever released ("Whatever happens, even if there's video; it was murder"), the files are encrypted via OpenSSL file encryption.

Has anyone tried this, similar to the other WikiLeaks password? "Whatever_happens_even_if_there's_video_it_was_murder"

575c61  No.1746426


I predict the T word will be publicly leved against HRC by end of day.

d10f6b  No.1753524

File: fd5574f70eb85ce⋯.png (169.8 KB, 513x288, 57:32, Andrew Wiles Blackboard Eq….png)

File: aa35bf07c62554f⋯.jpg (36.56 KB, 649x400, 649:400, AndrewWiles-Qbehind.jpg)

File: 113aac33cbb947d⋯.png (9.52 KB, 418x102, 209:51, Taniyama-Shimura_Conjectur….png)

File: 113aac33cbb947d⋯.png (9.52 KB, 418x102, 209:51, Taniyama-Shimura_Conjectur….png)

File: 90e8029f2b51260⋯.png (195.04 KB, 407x389, 407:389, toldyouso-GoroShimura.png)

>>1742453 Elliptic Curves….

Let's think on that a Wiles…

1st pic - All Elliptic Curves are Modular.

2nd pic - is that a "Q" on the _board_?

- hmmm geometric algebra, "cyclotomic fields", Earst Kummer, … so, there's Shimura-Taniyama-Weil bit for the Modularity Conjecture that Wiles used.

3rd pic - a nice Q conjunction - coincidence???

4th pic - told you so..

Excellent read/flip, in powerpoint format:

https:// folk.uio.no/rognes/papers/wileskoll.pdf

Fermat, Taniyama–Shimura–Weil and Andrew Wiles

by John Rognes, University of Oslo, Norway, May 13th and 20th 2016

Short, accessible article

https:// sites.math.washington.edu/~morrow/336_14/papers/vladimir.pdf

Fermat’s Last Theorem

Vladimir Korukov, May 15, 2014

More technical getting beyond me

http:// www.numdam.org/article/AFST_2009_6_18_S2_5_0.pdf

Interesting readable abstract, but rest of this paper by Tom Lovering of Harvard is jibberish to me. Muh math skillz lacking.

https:// tlovering.files.wordpress.com/2015/02/cyclotomic-fields-and-flt5.pdf

gnite/gday anons.

c84941  No.1754145

Has anyone here thought Mirror when they typed in the passcode?

dbafa1  No.1757738

If we discover the contents of this file, Julian Assange is a dead man. This file is the reason he is alive. Don't screw that up for him

936bb1  No.1760503

File: f9b896d3835ba9b⋯.png (600.68 KB, 1921x933, 1921:933, ClipboardImage.png)


This is fascinating. Basically pulling files from the blockchain - good thing the blockchain can never be changed so whatever is there will always be there, it can't be deleted and is copied in any forks of the currency. Also did think Bitcoin GOLD (BTG).

Anons should be aware - as I am sure you are - there will be files on the blockchain that are quite likely to be the type of stuff that will get you arrested. Offline research

This is also interesting …. text embeded on the blockchain.


936bb1  No.1760906

File: afe57a3a755f80d⋯.png (508.65 KB, 1895x932, 1895:932, ClipboardImage.png)

File: e21351a8c1b3554⋯.png (44.43 KB, 242x262, 121:131, ClipboardImage.png)


Also if you do fancy some possibly mind scarring research


Downloads of the blockchains for alot of altcoins , think it is worth looking at the logos.

f6148b  No.1783882

Everybody give up already?

f06dea  No.1784612


no not really. we're stuck at the 2nd layer encryption despite digging through blockchains since >1 year. if there are holding groups with unlocked insurance files they keep their mouths shut …

965164  No.1785223


Well intentioned statements aside, telling people not to look isn't going to solve his problem because ultimately someone will look.

Right now, the best possible way to secure Julian Assange's safety is to get him another batch of 'highly explosive informative shit' to act as replacement insurance files pronto.

This time, not encrypted with any NSA approved technologies. XOR'd one-time-pad is the only secure methodology I know, but the key for it would be the same length as the file set, making it hard to remember or hide.

965164  No.1785283


SHA256 penetration won't occur for some time. I reckon the NSA are saving that mathematical backdoor for when they really want to suddenly deflate the value of BitCoin.

SHA1 family is pretty much largely broken, which doesn't inspire much confidence in the SHA2 family.

Biggest enemy right now is bad randomisation on wallet IDs.

e54bdf  No.1787045


It seems like the same people are posting the discouraging comments… I'm not saying they're wrong, but it's dumb to just stop trying. I don't think it's coincidence that these files are popping back up now AND there's an article from over a year ago signed "the Q"… Just saying

f06dea  No.1787868


i asked around if anyone remember these pw's from last year, all replied with "nope". so it seems they're planted for a reason.

908af5  No.1788080






>it decompressed because it doesnt give an error thats how linux works

I've not yet seen any evidence that decryption succeeded. I think aes-256-cfb encoding doesn't have a way for OpenSSL to know if the key is good or not. With "aes256" (aes-256-cbc) shows rejection when you try the key. I tried myself with many different encodings / key variations before coming to this thread. Since "-aes256" is a valid argument to OpenSSL, commonly used, and the insurance file's file extension, I'm inclined to think it was the encryption method used.

Try putting in a different key with aes-256-cfb. Any key at all. No complaints.

# For example, this has the "Berlin?..." key. No complaint from OpenSSL.

$ openssl enc -aes-256-cfb -d -in wlinsurance-20130815-A.aes256 -out ./wl-a3 -pass file:wl-A.pass


# Lets change the key to something we know is wrong. Again, no complaint from OpenSSL.

$ echo "Hello World" > wl-A.pass

$ openssl enc -aes-256-cfb -d -in wlinsurance-20130815-A.aes256 -out ./wl-a3 -pass file:wl-A.pass


Also, the first 8 bytes of the wlinsurance-20130815-A.aes256 file say "Salted__", followed by another 8 bytes for the salt. This is typical of a file generated by OpenSSL. The file that results from decryption using the "Berlin?" key (and the variant with a "^") does not have this, or any other recognizable file signature. You can see the first 16 bytes of a file with

$ head -c 16 <filename>

For all of "The Q" / "The Traveller" poster's rambling boastfulness, I'd think they would have taken a moment have posted decryption instructions. The writing style also seems off. It looks to me like those reddit posts are disinfo / a troll.

965164  No.1811896

When decrypting something - the whole point is incorrect passwords won't give you an error, because that would defeat the point of having encryption (brute force until machine goes ding!).

All AES will do is 'decrypt' the information based on the set of rules it has using the information (key and initialisation vector, AKA salt), which can include decrypting to absolute garbage if the password is wrong.

AES should only throw an error if the password, and salt, are not (seperately) either 16, 24 or 32 bytes (as AES divides messages into 16, 24 or 32 byte blocks). Some variations of AES (EG ECB) won't even accept a salt.

Some encryption programs might include a wrapper front-end (lowers security, warning!) to know when it has successfully decrypted a message by putting inside a container that is essentially an overglorified message basically saying 'this has been successfully decrypted'.

Summary: assuming you supply the right password length AND the right salt (if applicable) AND the right algorithm (there's a copyrighted/commercial variant, note) it will always decrypt 'successfully': whether or not it decrypts into the message you want is another thing entirely.

908af5  No.1825501



I can imagine someone may want to make it tough to tell if a brute force succeeds by going for maximum obscurity. However, I don't believe this is the case here. Having the file begin with "Salted__" points to OpenSSL being used, and what the salt is.

I'm thinking JA chose a strong enough passphrase to where he wasn't worried about brute force. It's not a big leap to assume he went with "aes256" encoding, which is the file extension's name. OpenSSL's implementation indicates an error when a wrong key is supplied for "aes256" (aes-256-cbc) decryption.

With a few steps, you can easily see that an error happens when you supply a wrong key for aes256.

# Create a sample life insurance file

$ echo "This is my secret info. Shhhh." > secret.txt


# Encrypt the sample file with "aes256" encoding (aes-256-cbc)

$ openssl enc -aes256 -k "correct key" -e -in secret.txt -out secret.aes256


# Attempt to decrypt the file with a wrong key.

$ openssl enc -aes256 -k "a wrong key" -d -in secret.aes256 -out decrypted-secret.txt

bad decrypt

139937720559256:error:06065064:digital envelope routines:EVP_DecryptFinal_ex:bad decrypt:evp_enc.c:529:


# Decrypt the file with the correct key

$ openssl enc -aes256 -k "correct key" -d -in secret.aes256 -out decrypted-secret.txt


# Since there was no complaint from OpenSSL when using the correct key, lets see what we have…

$ cat decrypted-secret.txt

This is my secret text. Shhhh.


If JA wanted the encoding secret, he could have chosen any file extension, or even no file extension.

Even if a malicious state-sponsored actor could successfully crack his AES-256 key (doubtful), maybe JA isn't concerned if they discover it. Assuming the material incriminates the malicious actor, they wouldn't want to reveal it to the public either. It wouldn't suprise me if JA secretly sent decryption instructions to his enemies. My guess is that there is no inner layer of encryption, just a zip file or something like that.

f146cc  No.1834320

Try ONION for the password

830c23  No.1834669

Praying for the Anons working on this.

Best of luck. I check in every time.

965164  No.1836473


He might have been a tad smarter than I first assumed. As you correctly observe, why even give the extension?

.ZIP (newer versions) definitely support AES-256, but they don't encrypt file hierarchy (there's a workaround: yodawg, I herd you like .zip files). I believe 7zip however does.

If he's smart, he will have obfuscated the encryption algorithm entirely.

The best cryptographers often say 'the best encryption security is when the enemy doesn't even know it's there'. Can't crack or brute force what you don't know exists.

07fe1c  No.1861902

Here's something interdasting I found.

If you take the hex dump of a block like this one https://blockchain.info/block/00000000000001d58c445bfeb80caf313c5ba03be3ce7312714566852075b8ae?format=hex and search for this string 'ffffffff' you'll notice it comes up a lot. My guess is it's some kind of padding BTC uses between tx or something like that. Now if you look at this hex dump and search for the same string 'ffffffff' https://blockchain.info/block/000000000000005136f5e629aa02a2cda32b2adfe8fef42ff5572eb2978ae9e1?format=hex you'll notice there's a huge gap where that string doesn't appear. My guess is that's some kind of file that is contained in one large tx. In not sure if it's in the OP_RETURN or input scripts or what? Any help?

4c5fc5  No.1867404


I guess it really doesn't matter where in the tx the data is. I'm gonna see if I can find any type of file header in there there and if not I'll probably try and see if I need to convert the encoding to something else. Not really sure what to do.

598c49  No.1870491


that's only slightly better than 'password'. praying for our crypto anons

598c49  No.1870501

File: 5685cff8ed00c7d⋯.jpg (464.79 KB, 998x1117, 998:1117, 5685cff8ed00c7dbd0428cb561….jpg)

forgot badge

830314  No.1872279


According to this chat log (line 727) 'ONION' unlocks one of the files. They also believe the file is wrapped in multiple layers of encryption.


b6f299  No.1873579

>> 1861902

From what I've understood reading the claudia chatlog, 'hidden' messages are within the "output scripts" of a transac (tx). They are not meant to be read at the block level.

5ac369  No.1886108

File: 48a30fbb19ef095⋯.jpg (19.78 KB, 200x275, 8:11, VFUS7VS6W3ANYPQPTKM3SPYFTC….jpg)


0db97d  No.1910496

File: bcafff4efdab88f⋯.jpg (100.9 KB, 960x819, 320:273, 244062.jpg)


36e7d9  No.1910941

Password = WWG1WGA!

52b45d  No.1923676

Wikileaks got it right, tells the truth in latest Tweets.

7d8c3a  No.1924351


Here's something odd with the claudia.txt chat log.

jeanseberg messages

>first - line 5

>last - line 577 [9:04 PM] jeanseberg

monicavitti messages

>first - line 579 [2:15 AM] monicavitti

>last - line 723 [12:03 AM] monicavitti

anakarina messages

>first - line 727 [1:53 AM] anakarina

>last - line 883 [3:41 PM] anakarina

claudiacardinale messages

>first - line 912 [4:53 PM] claudiacardinale

>last - line 1269 [3:15 AM] claudiacardinale

So all of the posters who have coding experience and who seem to have all the answers never overlap each other posts. They are all the same person. Why change up identities? To make the LARP more believable or to try and protect their identity?

Also notice the perfect grammar and spelling? The person is obv phonefag.

All the timestamps are gathered from https://archive.is/hYfqi

598c49  No.1951913

bump so we don't lose the work we've done when next step comes

0cc3f2  No.1952151


Thank You for that post! For several reasons. That slow motion video of Assange's face opened the door. And then the discussion on the false files and multiple layers of encryption made everything make sense.


598c49  No.1954594


I hope so GO GO GO!!!!!!!!!!!!!!!!!!!!!!!!!!

a43189  No.1958988


Who do you think is running the Wikileaks twitter account since Assange is 100% cut off from the outside world with no communications allowed of any type, not even phone calls? hell he's not allowed to even come to the windows any more to show proof of life. So who has been running the WL twitter ever since?

4efc89  No.1977933


Assange was allegedly extracted from the compound in 2016.

Assuming thats why hes not at the window :P

Don't worry, we believe he will show up again soon enough…

598c49  No.1979798



onions have layers. multiple layers of encryption are now confirmed.

2ef4e1  No.1981214


StargateSG7 has some interesting hints to their identity in their post history.





Ironically, some of our members ARE in fact MD's

(aka Medical Doctors - Computational Neurobiology

and some true Brain Surgeons/Neurologists)

so it wasn't ACTUALLY done in jest as some of

our work truly does have to do with medical issues!

Specifically molecular and chemical simulations of

human neural tissue (aka Whole Brain Emulation)


(the group has SOME SERIOUS MONEY and



In terms of Cryptography, I personally have DECADES

of crypto-experience designing distributed GPU/CPU node

encryption and a few of my partners have Doctorals in Mathematics

and a few Statistics and Data Analysis experts specifically relating

to cryptography and use of software/hardware cryptographics systems

in high-threat, real-time environments!


We are NOT American, Russian, French, British, Israeli or Chinese agents!

NOR do we work on their behalf! We are ALL Private/Individual Canadians!!!!

We have OUR OWN AGENDA and are exploring a specific avenue of inquiry

but these Wikileaks Insurance Files are a VIABLE TEST of our advanced

computational technology! SOME OF WHICH IS FULLY



Let's put it this way …. Who has the fastest Supercomputers in the World

based upon the T500 list specified at https://www.top500.org/ …. ???


In reality, it ain't China or the USA!


Even "The Forte" doesn't have what we have!!!


And I've personally been DOWN in "The Dungeon"……………….. :-) ;-)

(unofficially of course!)


"The Q"



2ef4e1  No.1981276


More about "The Q"





I don't know anything about datamining or deep learning?


— Yaaah Maybe!


I've only written an ITTY-BITTY combined computer graphics

and video processing systems mated to one of the largest

database management systems EVER CUSTOM CREATED where

storing, searching and "datamining" the contents of MILLIONS

of 20 Terabyte video files are mere child's play!


Does that mean my massively parallel expert-system

based 20-language speech-to-text/text-to-speech

translation system is but a mere footnote on my resume?


Are you inferring that my custom designed expert system,

and a biological/chemical simulation of a neurological

structure is considered by you to be just Junior Varsity

computer science work?


OR…do you mean the mere design BY ME of an 8192-bits

Ultra Wide Word CPU processor with onboard terabytes

of SRAM, stacked 3D layered Floating Point, Fixed Point

and Integer computation engine and and the onboard

weighted Boolean logic engine YES/NO/MORE LIKELY/


WAITING FOR RESULT inference engine is just the mere

workings of a blathering uneducated idiot?


Or perhaps my design and coding of a custom computational

fluid/electromagnetic dynamics engine is not enough for you?


Or is my unimportant work on full 3D volumetric video

compression and decompression systems not enough?


Perhaps you may try to enlighten me on my grade-school

software engineering ability by comparing my 30+ year

skills as a Multi-CPU Assembler/C/C++/ADA/Pascal/etc

programmer to your average an Comp-Sci intern!

_ Perhaps I might be mistaken as to my confidence

in my own abilities as a mere member of what

you call a Junior Varsity programming team!


Hmmm……We shall see !!!!


2ef4e1  No.1981443


Found something thing mighty interesting.




"The IBM Blue Gene/Q supercomputer located at U of T’s high performance computing facilities has been named the fastest in Canada and 67th fastest on the TOP500 list of the world’s top supercomputers."


Article was posted 2012, insurance files are from 2013.




Don't those applications sections look a lot like what this guy is talking about?


2ef4e1  No.1981652

File: 960d52681183e44⋯.jpg (242.44 KB, 950x536, 475:268, qcomputer3.jpg)

File: 52a885e33585ff1⋯.jpg (210.01 KB, 950x536, 475:268, qcomputer2.jpg)

File: 67cdb00328b7275⋯.jpg (206.82 KB, 950x536, 475:268, qcomputer.jpg)


Screenshots from the pdf cause the link is fucked.

17528d  No.1981997

File: 3095c5490916436⋯.png (76.27 KB, 739x729, 739:729, datafound.png)

File: d8586179edf44c5⋯.png (3.45 MB, 1125x2436, 375:812, DB0379CC-9229-43B5-AD54-F4….png)

File: f6c0bd558579ff8⋯.png (4.78 MB, 1125x2436, 375:812, EB072EBC-0DF3-4A2C-BE89-E3….png)

File: 5a74adffbba6031⋯.png (61.36 KB, 1125x2436, 375:812, steg-EB072EBC-0DF3-4A2C-BE….png)


used https:// github.com/varunon9/Image-Stegano

2ef4e1  No.1982001


StargateSG7 goes other places and talks a lot.





2ef4e1  No.1982090


Henry A. Eckstein

2ef4e1  No.1982111

File: 92aa341be2b23c2⋯.jpg (192.07 KB, 642x217, 642:217, henry.jpg)

121b87  No.1982275



XML:com.adobe.xmp…..<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="XMP Core 5.4.0">. <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">. <rdf:Description rdf:about="". xmlns:photoshop="http://ns.adobe.com/photoshop/1.0/". xmlns:exif="http://ns.adobe.com/exif/1.0/">. <photoshop:DateCreated>2018-05-02T19:52:05</photoshop:DateCreated>. <exif:UserComment>Screenshot</exif:UserComment>. </rdf:Description>. </rdf:RDF>.</x:xmpmeta>.

d00f6a  No.1982385


see his request to MS about some docs to run Windows on their 128bit CPU, same writing style:

https:// social.msdn.microsoft.com/Forums/windowshardware/en-US/f01665dc-595e-4d45-85b4-22b9ad3776cd/how-to-get-the-hal-hardware-abstraction-layer-and-its-api-for-a-custom-cpu-and-motherboard

b7c652  No.1983152

File: 6e397e0632570d7⋯.png (133.97 KB, 1080x1920, 9:16, Screenshot_20180701-065140.png)

File: 08a6862c2501afc⋯.png (149.34 KB, 1080x1920, 9:16, Screenshot_20180701-065204.png)

The WikiLeaks editorial office high security key says it's expired. Which means 100% confirmed that WikiLeaks and Julian are compromised correct? No argument about that now. I also find it strange under Julian's key there's an identity for "fake@fake.com fake WikiLeaks key for testing fake creation time" with a creation date of Oct. 19th 2016. Same day batch 12 of Pedosta emails were released. Anybody know what day the server timestamps changed on file.wikileaks.org?

598c49  No.1985544

File: 441d1fc790c6f4a⋯.png (26.46 KB, 982x441, 982:441, WL-Jul-14-2014.PNG)


Looking at it on the wayback machine there have been multiple timestamp changes on the file/ but not the torrents

The first archived snapshot that shows the files is Jul 14, 2014. Before that the page was a redirect. So these are the earliest located (available to find now) timestamps in pic related

4338de  No.2000997


394e73  No.2003247

Please ignore unless this is meant for you.































03d33a  No.2004776


this was just photoshop exif data, help me find the other torrent files the legit ones, gonna try this pgp message as key too need to figure out how this was salted

726a3c  No.2006562

File: 0beef7d24828d48⋯.png (52.73 KB, 845x654, 845:654, julianlogmsg.PNG)

File: 588902f4373be17⋯.png (30.55 KB, 1251x517, 1251:517, julianscommit.PNG)

Someone at qresearch told me to post these here.

Julian submitted a fix to psql.c in 1996 and someone from Twatter found it.

I think that guy is alluding that the commit hash has been used by JA for something.

598c49  No.2006577

File: 153c024bd3409e7⋯.jpg (52.3 KB, 526x492, 263:246, b1cffaf4a65661d2464c9d29c4….jpg)

File: 9d5afe7202e91b2⋯.png (17.98 KB, 1218x296, 609:148, 9d5afe7202e91b23bb985798a1….png)

File: 589c88abc892f63⋯.jpg (36.03 KB, 578x328, 289:164, ecb25f50a2fba9999f28be029d….jpg)

additional info


03d33a  No.2007716

openssl enc -aes256 -pass file:wl-A.pass -d -P -in wlinsurance-20130815-A.aes256



iv =22641ECF03183586F01EA178D5096FE9

03d33a  No.2007885


man i cant find a repo that goes back that far on github

03d33a  No.2007892


he also did work on an the linux anagram solver

03d33a  No.2007905


do YOU know the repo?

03d33a  No.2009253

File: e4ef5b70f3f2c96⋯.png (155.61 KB, 1353x589, 1353:589, xca.png)

xca tool uses databases im not sure how yet so im reading man's

726a3c  No.2009538


git clone https://git.postgresql.org/git/postgresql.git

03d33a  No.2010106

File: 730cd51e5867118⋯.png (45.79 KB, 757x340, 757:340, blue-title.png)

File: 531c1ae1a4d0727⋯.jpg (116.54 KB, 800x618, 400:309, bluewater-enabling_bw_pi_m….jpg)

File: f36a0e7fe7cd98d⋯.png (77.99 KB, 378x493, 378:493, legend.png)

File: 730cd51e5867118⋯.png (45.79 KB, 757x340, 757:340, blue-title.png)



found another cray supercomputer, wonder how many there are and at which universities, check out this map

03d33a  No.2010108

File: 5964a7c79a92073⋯.png (112.82 KB, 980x671, 980:671, blue-about.png)

03d33a  No.2010275

File: aa73f6e98244efc⋯.png (123.28 KB, 1337x812, 191:116, sql1.png)

File: 597f4acaf07039c⋯.png (140.44 KB, 1115x764, 1115:764, sql2.png)

File: 0738fbcbc61a75b⋯.png (121.4 KB, 1131x717, 377:239, sql3.png)

6c3c96  No.2018247

File: a46e8bb2b8ad193⋯.png (109.57 KB, 1080x1920, 9:16, Screenshot_20180703-163003.png)

WTF is up with tx? d279250a511af17b804a98b3e2934fca4b99a3d7d511a1fa728ce6f3ce90


d00f6a  No.2028126



you know there was no git revision tool available in 1996, right? (see cvs)

51d315  No.2029068

File: ca17f951c914f8b⋯.jpg (613.16 KB, 1366x768, 683:384, 7527f-wikileaks2bjulian2bt….jpg)

File: 628508becc7bea1⋯.jpg (29.14 KB, 559x296, 559:296, e235b-wikileaks2broger2bst….jpg)

File: d81bb6dc37afb57⋯.jpg (331.48 KB, 540x4034, 270:2017, HUH26062018084559.jpg)

File: 3bc98f4ae10958e⋯.jpg (325.89 KB, 540x2421, 60:269, q8052018102358.jpg)

0a80de  No.2030572


I see no point to that command - it will work on anything you put in wl-A.pass whether it's correct or not. It just uses wl-A.pass to generate the iv/key (using salt from the first 16 bytes of the .aes256 file). That key/iv you provided doesn't work either.

$ openssl enc -aes256 -d -in wlinsurance-20130815-A.aes256 -out wlinsurance-20130815-A.decrypted -S 0F0BDA00F0359A0F -K BC34C1DCD70AB18F3730F5E4C7F992C5A451B6542DAF0692AB1565BA867193CA -iv 22641ECF03183586F01EA178D5096FE9
bad decrypt
140647319017112:error:06065064:digital envelope routines:EVP_DecryptFinal_ex:bad decrypt:evp_enc.c:529:

0a80de  No.2030745



(linking to an older tag instead of master branch so you can see 1996 dates)



you know git can import from cvs, right?

121b87  No.2031693


This is so stupid it made me laugh. thanks



4831c1  No.2033358

File: 5c38fc79b04eae2⋯.png (87.37 KB, 228x255, 76:85, Pepe4.png)

From last night/early AM discussion about asset seizures and currency reset which may be happening worldwide. A financialanon seemed to have some inside information. It was going fast, hence many typos/misspellings. Posts are not in chronological order. All post numbers deleted for ease of reading, but have retained offline.

I keep wondering about what Donald Rumsfeld said on 9/10/01. The world needs honest accountants and whistleblowers so much.



read of thier finding over 20 mil of fake supernotes palletized in thier vault, about three days ago a small presser was released

warehouse full of pallets of american currency rendered worthless with a stroke of a pen?

I think the currency issue is real and everything you said is true, but I still think the 99% into the hospital is something more sinister, even for anons here. it's why Q is saying he needs us. Normies are gonna have broken brains, even the ones that voted for Trump

aye, a complete sudden collaspe of currency, to be replaced by us governemnt bills backed by gold?

An anon posting in the wee hours yesterday mentioned that the financial side of things was in his wheelhouse

Went on to say that Q team - he called it The Alliance - was in process of seizing trillions of dollars from many accounts worldwide.

Anybody else heard anything about this?

If so – how about we pay off the national debt, and forgive a bunch of other personal debt?

I forget which executive order but Trump signed one saying anyone imvolved in huma rigjts abuse can have all their assets seized a appropriated to America and its needs.

investigate super notes…paid from IRS, rather than Treasury. just one account shows over 800 bil loans to swiss bank..and that is just one account. JPMorgan found over 20 mil dollars of fake super notes in thier newyork vault, looks like scince we started refunding peeps in syria, they all got paid with fake super notes….swiss CB shows where its been investing 80% of what we loaned them to buy into the 4 FANG stocks…and as i say, that is just one venue…what i do say, is 17 trillion debt by Americans is mostly where past adminastration milked evry American that has evr worked.

What is a "supernote"?


Scroll down and check out the parties which produce counterfeit USD of that quality. Three letters?

e1b5f9  No.2033599


Upload what you have saved somewhere then, please.

e1b5f9  No.2033786



598c49  No.2051565


do you have something you can upload? turn it into .pdf file?

d49de7  No.2053082

Bump, what's happening to this board?

d00f6a  No.2053865


[_] comp'd

[_] infiltrated

[_] php memcache fuckup

[_] cloudflare

[_] other

598c49  No.2054947


The first layer of encryption is broken, but the next layer encryption keys have not (so far) been figured out.. This is an ongoing process since October 2016.

0ca0b2  No.2060293


598c49  No.2068274

Can someone take over looking after this thread? Its a good bit of work that would be harder to replicate if the thread dies. Im unable to do it after today. Thank you. Keep fighting!

1e9784  No.2072464

File: 2f1f185a28a5aa1⋯.png (98.48 KB, 587x592, 587:592, 2f1f185a28a5aa198cd043b7be….png)

File: a2355990aab5528⋯.png (9.53 KB, 588x115, 588:115, a2355990aab552809547df3ffb….png)

f27e69  No.2103460

File: d802fd62076730a⋯.png (287.44 KB, 1156x759, 1156:759, insurancediffs.png)

File: a2c5f74283c6fbf⋯.png (386.61 KB, 1528x963, 1528:963, msg911.png)

found the real insurance files inlcuding different filesizes, different torrent files, and the direct link to the aes256 also in the message-911 archive every name






is mentioned, you absolutely must read the 45mb file all this stuff is on archive.org and govermentattic and memory hole etc

when its said we have more than we know i believe this is what Q is referring to

you know that voicemail about dont get on the plane, not human, etc? with a bunch of numbers and callsigns??? thats in here too

f27e69  No.2103496

File: 139de061634d0c0⋯.png (144.2 KB, 476x1064, 17:38, way1.png)

File: 914be461d29ba78⋯.png (167.8 KB, 467x1039, 467:1039, way2.png)

File: 6f7fcd9d8a98476⋯.png (168.98 KB, 459x1062, 51:118, way3.png)

File: a14200bc2610bfe⋯.png (345.65 KB, 2656x596, 664:149, lllllll.png)


looking for sata cables and ide adapter gotta plug in some more drives

f27e69  No.2103510


yes and even svn! kek dude there are a million sql repos i just needed to know which one

f27e69  No.2103534


dude im just starting with what i found on the day they ddosed him and going from there, that loop was posted with 1/4 and 2/4 key deadman switch, but if you do -base64 it FUCKING DECODES JUST FINE the cut 0000 is for hex editing out line #s i guess not sure about cut 1-23, ive written like 10 versions of script, also the salt is fucked up cuz with openssl you have to cut out first 8 chars cuz it says salted, maybe switching to gpg because if ound tons of .gpg dumps today on archive

f27e69  No.2103551


and there wont be one after 2018 thanks to microsoft, kek, lesse in 1996 i had an apple][gs and 9600baud external

anyway teach me the ways of databases oh wise one, for real i only know about injections, columns rows and tables, i dont get the usefulness of it over a txt file with csv

f27e69  No.2103590


im documenting my work btw, now ill >>1981276

i found some illegal/magic primes on 2ndgen, will post when find

f27e69  No.2106513

wonder if its rubber hosed, as well,

Tell hosed to attach itself to your newly created extent file:

# hose attachextent

Tell hosed to key aspect 0 (default). This "primes" the aspect.

# hose keyaspect

Tell hosed to bind aspect 0 (default) to a disk device

# hose bindaspect

# For crypto deniability reasons, the maru device assigned is

# random. In this example, we presume /dev/maru4

Aspect 0 should now appear as one of the /dev/maru* devices. We will

now create a file-system on it. It's important for efficiency to have

the file-system block size the same as the crypto block size (defaults

to 2048 bytes, see newkeymap -b), so we will tell mke2fs to use 2048

byte blocks.

# mke2fs -b 2048 /dev/maru4

Now, mount it!

# mount /dev/maru4 /mnt

Have a look inside:

# ls -la /mnt

Try copying in /bin/sh:

# cp /bin/sh /mnt

Unmount and unbind, dekey

# umount /mnt

# hose unbindaspect

# hose dekeyaspect

# hose detachextent

# hose_modunload

man pages (quite brief at the moment) and other documentation are

in doc.

Happy Rubberhos'in!

-Julian Assange <proff@iq.org>,

Ralf-P. Weinmann <ralph@iq.org>

f27e69  No.2106534


ahem notice the domain of this decade+ email address of JA, after this it becomes proff@suburbia.something

f27e69  No.2110137

File: 8801a90478359d4⋯.png (154.68 KB, 842x823, 842:823, alice.png)

http://archive .is/gTP3

dont know how many of you have read alice and bob in regards to keys in many many IT/comp-sci books

no mention of bob here

call me a private dick anons cuz im hot on this trail kekek

d01bed  No.2115757


d01bed  No.2126335


a43189  No.2144546

bump. dont lose the work done so far. Good luck to crypto anons

d33218  No.2145312

File: 78965d25c2d89ea⋯.pdf (6.52 MB, - OUTER HEAVEN 2.pdf)

Here are some archives, have fun

Part 1

d33218  No.2145318

File: 64e687a68f4e754⋯.pdf (6.7 MB, - WL Insurance Thread.pdf)

Here are some archives, have fun

Part 2

d33218  No.2145320

File: 7dbe3b101b3ff52⋯.pdf (3.65 MB, Insurance files key testin….pdf)

Here are some archives, have fun

Part 3

d33218  No.2145327

File: c807c3de2d31ce8⋯.pdf (4.12 MB, -2 OUTER HEAVEN.pdf)

Here are some archives, have fun

Part 4

d33218  No.2145853

File: 20492493d55956f⋯.pdf (1.46 MB, Full_Thread.pdf)

Here are some archives, have fun

Part 5

d33218  No.2145862

File: cd660ce04c8d8da⋯.pdf (198.14 KB, http___oniichanylo2tsi4.pdf)

Here are some archives, have fun

Part 6

e8b94d  No.2146672


As to the StargateSg7. I do not know of the validity of this user. But it has some of the same "slang" or disregard to his posts. As well as some almost insane (litteral) talks about crypto and the likes.



eac028  No.2147184


You clearly don't understand the difference between symmetrical & asymmetrical encryption.

Like wist the differences between one-way hash/digest functions and digital signatures


a43189  No.2177695


quite a body of work

6e7789  No.2181973

File: 074e8ae3fcd7d84⋯.png (60.13 KB, 1033x318, 1033:318, wltweet.png)





58 20 3 -jx 02 B9 28 48 82 -21A3 7 8402

see what ive done so far? hex to octal + perhaps wikileaks tweet with similiar

but i dont know because 0 is null in octal or rather null is 0 so what to do about the 0000, really we should convert the whole thing to binary…..

4767 5774 6a7a 4d6c 6330 666b 314a 3453 0000 0907 84b4 f787 7616 86f7 a737 5707 5736

d9e2e0  No.2182101



Its just padding. Look elsewhere.

6e7789  No.2182153

amounts of failed tx

also the T pattern q uses in my mind i think tetrads from tetris, pattern, its so late in the game im gonna say it now, over 2 down 2 or right 2 down 2, think of an 8 bit game of snake on a grid such as the supposed pgp message above, kek those equals were tricky

5107c5  No.2182765



05f4bc  No.2203035

I have the archives of every thread that was related to the wl insurance files digging that was done at outer heaven board. If people want them I have the full html's saved in a mega.nz folder thingy. I can supply the account and password.

AssangeIsMyWaifu@outlook.com PW: WeLoveAssange1234

e64c98  No.2203443

There were 3 from Dead Man Switch

See if this is helpful.

Ive had this shit in the pocket of my wallet since oct 2016

there were 3, AB and C






C. https://wlstorage.net/torrent/w/insurance=20130815-c.aes256.torrent


e64c98  No.2203457



Correction… thats




505762  No.2216784


cd93e3  No.2244834

File: b1caaa307d02a55⋯.png (35.52 KB, 427x643, 427:643, key.png)



that was me leeching, i actually thought why dont i run strings on torrent files themselves

cd93e3  No.2244857


2nd circle possible drive letter on mounted/ fs / container / true/vera/crypt

cf2e75  No.2246460

File: 1bba514532e8296⋯.png (150.42 KB, 222x512, 111:256, 4.png)

File: 42c4e05c74efb2a⋯.png (174.84 KB, 222x512, 111:256, die.png)

File: 6453f6893217d5b⋯.jpg (30.43 KB, 222x512, 111:256, index.jpg)

File: e8105f6ba726cee⋯.png (173.26 KB, 222x512, 111:256, walet.png)

this needs to be cut and flipped as well, ends up being a bomb going down dna chain to a curled up child/fetus says stuff about 9 11, wallet, lies, and ksa depending on the offset, my kingdom to know what program this is, i have every shitty github steg program there is for past 6 years, can read most of the strings too,

cf2e75  No.2246494

File: dbfd5facfdb2159⋯.png (150.91 KB, 222x512, 111:256, 3.png)

File: d3bd29b4d9cb2f3⋯.png (173.75 KB, 222x512, 111:256, offset21.png)

File: 3d33f9559c7ff0a⋯.png (24.07 KB, 1051x235, 1051:235, hints.png)


it might make a wider panarama though because theres several pictures in there, evil wizards, etc. this image comes from a different 404 page than the site uses for others, pretty sneaky, theres urls at the end of these torrents posted above, thanks anon, just run>$ strings *.torrent on them in their own folder

someone has to be smarter/ better equiped than me to solve this, thanks megaanon and urlanon, oooo almost forgot theres a badass picture of the pyramids in there too, guess i saved it as a bmp on accident.

cf2e75  No.2246507


i bet because its only eastern hemisphere the solve is to get west dripping to east and/or vice/versa

505762  No.2249664


That's exactly what I'm trying to explain.


All the ID's in the outer heaven thread where jean first popped up are the same too. Someone asks why and they say something about OP being comped so they all used it

cf2e75  No.2250150


of course they are, they would have been frantically trying to mislead us while they ddos'd and v& everyone, i cant believe im the only person posting this shit, its not that hard to see whats hidden, how comped are posts here/bread like outer heaven? wehn i post this in bread people lose their miiiinds

cf2e75  No.2252211


kekekek,it actually is!!!! only mine is backwards mirrored did you solve it too? my solve is in black and white, recorded offsets going back thru to try for color rabbit real fast

cf2e75  No.2252220


i knew i was close i had my bios nuked yesterday had to reflash and reinstall last night, gonna take more than that

cf2e75  No.2252245

File: 8c31ce9ea7c61ee⋯.png (466.3 KB, 612x392, 153:98, 17777777777777153232606792….png)


i told those assholes in the bread but i think it will go right past them, serves them fucking right, that place is a vortex of groupthink at the moment, im going back to the frontlines of /pol just gonna leave this here and see how long it takes someone to figure it out

cf2e75  No.2252364


to be clear its spelled out

6e9f22  No.2266478

File: 36e46acad64eb0a⋯.gif (997.49 KB, 425x259, 425:259, Julian_Assange_Smile.gif)

File: b28cd026b76456b⋯.png (112.17 KB, 361x371, 361:371, dental_records.png)

./stegdetect filename

result #

extract red #

extract blue #

extract green #

combine all #

(removes alpha channel)

stereo seperate hat over head

stereo seperate using things like pixels / patterns for markers

correct path shown by markers of words from Q posts and wonderland minor character

THINK wwg1wga ExPAND

6e9f22  No.2266710

i really pray he's safe. ive seen some things that suggest he's already out of there. this is going to sound completely nuts, and it is but when i read something about the size of the embassy room he had i wanted to do something to help, but what could i do being a simple meme farmer? i flipped my bed up on side and used it as a partition to cut my room into 1/3 of its size, used the rest for storing shit my mom had no where else to put (earning extra good boy points for tendies) and slept on the couch a foot away from computer. ive told nobody why, hoping my pathetic gesture of solidarity would somehow count for bonus round with god… i'm no saint. today im putting my bed back, as a further show of faith.

inb4 jpeterson_cleanroom.jpg.

a43189  No.2282289

File: 65f5aa7dfdf42e1⋯.png (9.03 KB, 530x183, 530:183, key.PNG)

where does this key go?

34d952  No.2290852


Thanks for these pictures. It is very sad to see this. I hate to see destruction.

e11a7b  No.2292705


gonna be another day before ill have insurance files again, i straight up got nuked from orbit, can someone else who has them let me ssh in?

e11a7b  No.2292707


my isp is PISSED btw im throttled for downloading close to a terabyte twice

e11a7b  No.2292717


modem dropping out, i dont care about myself, but i cant put others here in a position….

need advice

e11a7b  No.2292726


fuck it neighbor is getting pixied

e11a7b  No.2292748


if i had a 10mb or so of each insurance file i can test, its a ssl vuln. also im thinking should be using libre

830c23  No.2294826



Subsequent post made my spidey senses tingle.

I understand you cannot speak of what you've found.

This is fine.

Just keep up the good work.

Thank you for all you do.

598c49  No.2307410



9133a1  No.2312303

9ae673  No.2319884



e775ff  No.2320444

File: 0e94c632f5058ba⋯.jpeg (50.61 KB, 500x375, 4:3, 6930C6A1-7CAD-4889-8EDF-3….jpeg)



They’ve been controlling us since Ancient Egyptian times.

eac028  No.2320545


That explains Cat Ladies

505762  No.2321928


h ttps://gofile.io/?c=V29bYY







Each one is 4.9 mb

That should be big enough to get you started then once you narrow the candidates down you can switch to an air gapped machine and try the full files



b35bd1  No.2334600


They were trying to put codes into the sarah silverman image. Not sure what progress they made, I cant find the thread anymore. Apparently a bunch of cryptofags were brute forcing it. I'll see if I can find it in the archive, it was Qresearch board about the same day as the Q post

6633ee  No.2335948

File: 8738db5073afcba⋯.jpg (39.71 KB, 677x677, 1:1, 37261501_10214111066343500….jpg)

I have the original wlinsurance-20130815-A.aes256 ABC files. I downloaded them the day they dropped and rar pw'd the set until pw dropped.

eaf87a  No.2351555

What about the hex code dropped tonight?

3d33c8  No.2358192

Why is there a thread on cuckchan saying the Deadmans switch was released?

dc17ee  No.2369421



just plenty of kek there, NOTHING more than op faggot claim

505762  No.2369557



Whats up with the hex code >>2351555 trips is talking about?

14389f  No.2415609


0897b0  No.2415976

File: 577968f3f3c1a7c⋯.jpeg (206.27 KB, 1125x512, 1125:512, E0758C3F-A2DC-4BB4-BFA2-1….jpeg)

Anything here guys?

b1009e  No.2420482


b1009e  No.2421135

Bump bump bump it up

eac028  No.2421248


Idle speculation packaged as inside info.

Timestamp say he wants credit is it comes true

Otherwise, he slinks away for another future post

David Wilcock gets away with this again and again

No negative consequesces

b1009e  No.2421812


Maybe true but wouldn’t hurt to check out the hash

eac028  No.2421962


Good idea

What did you find when you checked it out?

What is it a hash "of"

Do you have the original and hashing method that created it?

Thanks for your help

eac028  No.2422189

File: ad333432a432023⋯.png (150.33 KB, 644x554, 322:277, Fake proof.png)



ps It wasn't worth the time since no new information was provided by either bs posting

598c49  No.2441901


and another bump. can't lose the work already done

505762  No.2448427

Bumpy smalls

c53800  No.2458865


i can chime in here . Those are threads from “endchan” and the threads were called “outer heaven” and “outer heaven 2.0” — the threads — with full text of all posts — are scrubbed from the internet on all major search sites. BUT , you can find them on scribd — links are floating around places , but you could try searching for bits of the python code posted above “jean.py” … along with the Kerry transactions , and you will be able to locate the threads in question. This is very real. I was able to duplicate all of the work so far mentioned in this thread (up to this post , reading through in order) . but you will not be able to duplicate work with scripts as posted , because blockchain explorers (specifically blockchain.info) no longer contains the information you need to follow the trail. this does not mean the information is gone , it means that the blockchain explorers are hosted on a third party website , and designed for people who do not possess their own copy of the blockchain. This will next lead you to the realization that you must possess your very own copy of the blockchain , and then run the scripts . I believe this will work. However , this is where i began running into additional problems and again could not duplicate work. Long and short of it is : the btc blockchain you will download today does not contain the OP codes …that was a change quietly made by btc core during the soft fork that occurred sround July -September of last year ish. So, this next led me to the realization that I need to download a copy of the blockchain from prior to the fork, from someone that did not do the segwit upgrade … now, this is where I ran into the problems. I can not locate a copy of that blockchain. if I had had a copy of the blockchain already , prior to all this , I would be good to go. But since I didn’t , and needed to download one , i was forced to try and locate it …which is, as far as I can tell, a very difficult thing to do. This next led me to the realization that perhaps i should check out the btc forks since the data should be there , and then you’ll have to start worrying about the timing of the fork, because it has to occur before segwit. Bitcoin cash qualifies. So next, I downloaded bitcoin cash blockchain. That was a dead end. For someone reason, bitcoin cash retained all of the transaction information …but diD NOT retain the original BTC op codes, which , again, are needed to generate the files. Someone please correct me if I am wrong on that , but that is my understanding and i was unable to find the info needed using btc cash because of the op code issue. All of that took a lot of time and effort and still resulted in a dead end. As of today, this is still where I am currently at. As far as I can tell , what I need to duplicate it is a copy of the blockchain from some node that didn’t follow the fork, i don’t know how to find and download that, and I don’t know anyone who has it . I HAVE asked around , and I found many people who have a node …but all of them did the upgrade, so…no dice. At least , so far. It is definitely out there somewhere though and I will pursue further if someone can point out next steps from here. As a final note: please do read the “outer heaven” threads. That is the source of the “this is the end” type pictures you’ll find floating around places. It’s on scribd. And if you can’t find it there , I will drop them here once I can get back to a computer (72 hours away from now at least, long story) this board accepts PDFs , yeah?

c53800  No.2458969


Post your error I think I got that one also, fixed it eventually but whatever solution I had was super hacky and definitely not pythonic doctrine. but if you hit that error you’re on the right track I think. Some change must have occurred. I can help diagnose though if you post your error output

eac028  No.2458974


So this board thinks they can crack a 256-bit symmetrical encryption by brute force?

Do the math on 2^256 then calculate the number or permutation of that result.

Apply that # of possible values to the real world

Mathematically impossible or else it would be totally worthless since any serious state actor has orders of magnitude more resources that are here on 8 chan.

Come back to reality

c53800  No.2459013


the jean.pu thing is doing something where python is reading raw data and creating something like a C-struct from it , and telling it to make sure the strict is reading in integer length info …but it’s all janky because it relies on some module to do it and I think the module itself has since changed . it’d be better to translate this into C so then we could understand what the hell is actually going on when those calls get made. But I dig into the source code for those packages a while back and ultimately hacked something janky together for it. but yeah post errors I’ll orobably have to redo it myself anyway because I’m sure I forgot how I made it work by now

c53800  No.2459053


Nobody is cracking encryption here or claiming to crack encryption by “trying random keys” . the files are encrypted , getting the files takes work , and decrypting the encryption requires passwords. Files are encrypted multiple times (decrypting one reveals another file that is also encrypted). but you need the files and you need the first layer removed or you won’t be able to do anything when and if the keys are revealed (or discovered)

c53800  No.2459235


Another program that automates this is “binwalk” — the better parts of it are only available on Linux but the bits about extracting known file types from file headers will run on any Unix system (ie works on OS X also)

c53800  No.2459391


The outer heaven articles imply that there are instances of both — st the block level AND the transaction level. The oiter heaven threads also contain source code for detecting files from either level.

598c49  No.2474502



upload to mega etc

4af397  No.2483655

cure for limp dick big E[m} or little e[the original eye thru neeedle}

not cure but maintain

oi oi reading king richard 111

RICE cam e by to eat other night, no responce

henry viii, will try again if response affirm,

more pac than a fun of llahams

4af397  No.2483843


got ant problem apearantly

gonna get em with screwdriver

eac028  No.2484723


When all you have is a hammer, everything looks like a nail

When all you have is crytocurrencies, every method of encryption looks like a blockchain

Start here to understand why AES-256 symmetrical encryption is not block chain.

Cryptocurrencies Aren't 'Crypto'



As the price of Bitcoin and Ethereum skyrocket, and more and more people who are unfamiliar with technology join in the craze, words start to lose their original and correct meaning

Lately on the internet, people in the world of Bitcoin and other digital currencies are starting to use the word “crypto” as a catch-all term for the lightly regulated and burgeoning world of digital currencies in general, or for the word “cryptocurrency”—which probably shouldn’t even be called “currency,” by the way. (That’s another story.)

Excuse me, “the crypto” what? As someone who has read and written about cryptography for a few years now, and who is a big fan of Crypto, the 2001 book by Steven Levy, this is a problem. “Crypto” does not mean cryptocurrency.

Bitcoin and other technologies indeed do use cryptography: all cryptocurrency transactions are secured by a "public key" known to all and a "private key" known only to one party—this is the basis for a swath of cryptographic approaches (known as public key, or asymmetric cryptography) like PGP. But cryptographers say that’s not really their defining trait.

“Most cryptocurrency barely has anything to do with serious cryptography,” Matthew Green, a renowned computer scientist who studies cryptography, told me via email. “Aside from the trivial use of digital signatures and hash functions, it’s a stupid name.

Emin Gün Sirer, a computer scientist who teaches at Cornell University and is involved in the world of cryptocurrencies, told me in a Twitter direct message that the cryptography in cryptocurrencies is “basic and simple” and just plays “an ancillary role.” The biggest innovation, he added, is the use of blockchains (publicly viewable ledgers that record every transaction since its beginning) as “consensus protocols” and “distributed systems.”

“If people know what ‘crypto’ is, they should know it as a real technology—not as some synonym for Bitcoin,” he said.

So if you care about this, please politely correct people who incorrectly use the word “crypto.” Or maybe make fun of it, as Ryan Stortz, a security researcher in New York suggested. In a chat, he joked that he wants to start trolling people by referring to cryptocurrencies as “Block,” short for “blockchain technologies.”

Advanced Encryption Standard


AES is a subset of the Rijndael block cipher[3] developed by two Belgian cryptographers, Vincent Rijmen and Joan Daemen, who submitted a proposal[5] to NIST during the AES selection process.[6] Rijndael is a family of ciphers with different key and block sizes.

The Advanced Encryption Standard (AES), also known by its original name Rijndael (Dutch pronunciation: [ˈrɛindaːl]),[3] is a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST) in 2001.

Block cipher


8 Notable block ciphers

8.1 Lucifer / DES

8.2 IDEA

8.3 RC5

8.4 Rijndael / AES

8.5 Blowfish



A blockchain,[1][2][3] originally block chain,[4][5] is a growing list of records, called blocks, which are linked using cryptography.

Blockchain was invented by Satoshi Nakamoto in 2008 to serve as the public transaction ledger of the cryptocurrency bitcoin.[1]

edf358  No.2488970

Q !xowAT4Z3VQ ID: 13be8e No.1004880 📁

Apr 11 2018 20:22:02 (EST)

Thank you Alan.

Welcome aboard.


Juilan was picked up on the 11th of April 2017, Q keeps rubbing it into your face by saying "we have the server[s]"

Q !CbboFOtcZs No.117 📁

Aug 3 2018 16:26:29 (EST)



We have the server[S].



L.iving in



I believe in JA, 4 10 20, Ad R


466a36  No.2492444

Julian please read and respond































81a773  No.2499355


This is from the small endchan archive with the blockchain magnet URL. Not sure if it’s still good - let me know.






>here is the up to date blockchain torrent/magnet. Please consider downloading and seeding even if you have it already to help the swarm. Thanks. It's about 100GB


>Once you download copy or move the files to this location, then you can run Bitcoin core to sync it up to the minute: %APPDATA%\Roaming\Bitcoin

or C:\Users\ <YourWindowsUsername> \AppData\Roaming\Bitcoin

81a773  No.2499370


This is the block chain from 2016

81a773  No.2499424



c336d08c199ea108cd1c9e8fb3da289fc0887e85cb9fd53cb56a0b8041d05838 100.0% (.DMG) Disk Image (Macintosh) (1000/1) 2016-07-24 22:30:48

fdfd8c3c9b535551945645e212852df757763eedc2b05ae56ec6df1beb511105 100.0y% (.VC) VisiCalc spreadsheet (1000/1) 2016-07-14 08:44:12

2767c5a7386aa02b973e88304bdc12d91583146c94f90e91075042a164c93d05 100.0% (.GPG) GNU Privacy Guard public keyring (1000/1) 2016-08-26 23:23:10

eb75ada9646771a94d8c46d86f52923e2c0d2302bae73a0dda14ac842836f4ce 100.0% (.GPG) GNU Privacy Guard public keyring (1000/1) 2016-07-25 03:43:10

c336d08c199ea108cd1c9e8fb3da289fc0887e85cb9fd53cb56a0b8041d05838 100.0% (.DMG) Disk Image (Macintosh) (1000/1) 2016-07-24 22:30:48

fdfd8c3c9b535551945645e212852df757763eedc2b05ae56ec6df1beb511105 100.0% (.VC) VisiCalc spreadsheet (1000/1) 2016-07-14 08:44:12

f6046148a74fa880403c630de743f7d01736725d941e744ce0c89baa098287ec 100.0% (.FLI) FLIC FLI video (1/1) 2016-05-24 21:39:18

042c1cd09ec672e2d504b76e16398c62396fa57ab0004a793dfc68d49d3e4cc9 100.0% (.BS/BIN) PrintFox (C64) bitmap (1000/1) 2016-04-24 07:47:50

83f7a29360abe4e927ae25ad803d2a28d088d119a47941fe0c42445bb2e78730 100.0% (.VC) VisiCalc spreadsheet (1000/1) 2016-04-21 06:17:47

ad85d76b5fd006cb3f08edda4d80327f425caed83aeb20aaa0c0ed281064484b 100.0% (.VC) VisiCalc spreadsheet (1000/1) 2016-04-14 19:14:05

fa3e0d76b55e01c45dd4218a41794f39b3792310cf1a88f3502824e4afc3e867 100.0% (.VC) VisiCalc spreadsheet (1000/1) 2016-04-14 02:26:40

6ea5ff73db52591661ff7c0c7eb161594b67b8e129ccc2e1429fe0c71d69e1ff 100.0% (.VC) VisiCalc spreadsheet (1000/1) 2016-04-13 23:05:59

35bfef9b0febbf3b1cefbd8f503e90d997e55d9f3841e45f359529debd6c1bca 100.0% (.VC) VisiCalc spreadsheet (1000/1) 2016-04-13 22:07:46

7fd31fccd96a3e94c21d15b45ae1957c22fe51a1aa6cb18f054bda20966304ac 100.0% (.VC) VisiCalc spreadsheet (1000/1) 2016-04-13 04:22:39

78a013b6c857f5535b9133896d4c115d2bbe15995a28a71f63049bf3bdcb1eba 100.0% (.VC) VisiCalc spreadsheet (1000/1) 2016-04-12 22:23:58

c336d08c199ea108cd1c9e8fb3da289fc0887e85cb9fd53cb56a0b8041d05838 100.0% (.DMG) Disk Image (Macintosh) (1000/1) 2016-07-24 22:30:48

fdfd8c3c9b535551945645e212852df757763eedc2b05ae56ec6df1beb511105 100.0% (.VC) VisiCalc spreadsheet (1000/1) 2016-07-14 08:44:12

f6046148a74fa880403c630de743f7d01736725d941e744ce0c89baa098287ec 100.0% (.FLI) FLIC FLI video (1/1) 2016-05-24 21:39:18

81a773  No.2499443


042c1cd09ec672e2d504b76e16398c62396fa57ab0004a793dfc68d49d3e4cc9 100.0% (.BS/BIN) PrintFox (C64) bitmap (1000/1) 2016-04-24 07:47:50

83f7a29360abe4e927ae25ad803d2a28d088d119a47941fe0c42445bb2e78730 100.0% (.VC) VisiCalc spreadsheet (1000/1) 2016-04-21 06:17:47

ad85d76b5fd006cb3f08edda4d80327f425caed83aeb20aaa0c0ed281064484b 100.0% (.VC) VisiCalc spreadsheet (1000/1) 2016-04-14 19:14:05

fa3e0d76b55e01c45dd4218a41794f39b3792310cf1a88f3502824e4afc3e867 100.0% (.VC) VisiCalc spreadsheet (1000/1) 2016-04-14 02:26:40

6ea5ff73db52591661ff7c0c7eb161594b67b8e129ccc2e1429fe0c71d69e1ff 100.0% (.VC) VisiCalc spreadsheet (1000/1) 2016-04-13 23:05:59

35bfef9b0febbf3b1cefbd8f503e90d997e55d9f3841e45f359529debd6c1bca 100.0% (.VC) VisiCalc spreadsheet (1000/1) 2016-04-13 22:07:46

7fd31fccd96a3e94c21d15b45ae1957c22fe51a1aa6cb18f054bda20966304ac 100.0% (.VC) VisiCalc spreadsheet (1000/1) 2016-04-13 04:22:39

78a013b6c857f5535b9133896d4c115d2bbe15995a28a71f63049bf3bdcb1eba 100.0% (.VC) VisiCalc spreadsheet (1000/1) 2016-04-12 22:23:58

aa3bf652dc745e8a1265c3641858e9a75e4cd3ee85eb843033b4302e2dec5fc7 100.0% (.FLC) FLIC FLC video (1/1) 2016-04-06 05:53:04

b4c38335541fd578bdc4d45a1a4a47e3baadd2a55ae41c0e5535eb4307d49b24 100.0% (.PGC) PGN (Portable Gaming Notation) Compressed format (1000/1) 2016-03-18 18:12:19

b20ad5f8b75bae16a6d1e3de2fb25910be868f936a6e3cc3d997598dced14f89 100.0% (.FLI) FLIC FLI video (1/1) 2016-03-15 21:19:44

24b0967ecca36dd455b9a96e48d8c0f13a36acdd37290f6baae3c50b7065627e 99.9% (.MP3) MP3 audio (1000/1) 2015-11-28 09:53:31

32d71a560a965fe17ca5a652202844f5bb580d185e38485aacad8717485b0b8e 100.0% (.VC) VisiCalc spreadsheet (1000/1) 2015-11-20 21:53:12

03e8a9b1197744012af33c642671ed8eb50fd2d442d4875a3274f730ac2ca951 100.0% (.VC) VisiCalc spreadsheet (1000/1) 2015-11-19 22:16:50

2a38f95db552a52aefa82565ffd81e885103738da25627f1e894f5892a672325 100.0% (.VC) VisiCalc spreadsheet (1000/1) 2015-11-12 18:27:54

15d4f6606f7ad966e27f9628acf3c1929eb50cb2fef0ecb949fb8941b94254cc 100.0% (.MP3) MP3 audio (1000/1) 2015-11-06 10:47:37

13bd667802cc58936996dbf5defd2307b716e1f84a9908de0c77f3c1a3b4cde3 100.0% (.FLI) FLIC FLI video (1/1) 2016-11-21 18:23:36

8218ab03d82ebfa309aceedb484e695bc058f080397d7794826c9efc1d0287b7 100.0% (.) QuickBasic BSAVE binary data (1000/1) 2016-11-15 19:41:03

c06244b1da9edb9da54736c17cf8d92cc754e1cd109c5a9858d7eb107079ff31 100.0% (.FLI) FLIC FLI video (1/1) 2016-11-09 18:46:55

81a773  No.2499460







That’s the end of my archive

81a773  No.2499514


Also found this


USE THIS TIMELINE: h ttps://oxwugzccvk3dk6tj.onion/pol/res/8180723.html#q8192699










598c49  No.2532985

bump for Trump

3385c1  No.2538792


6bad5e  No.2540428

I have no idea whether this will help or not.

It may be interesting for some, and not for others.


ESIZKUR shall sit aloft in the house of prayer;

May the gods bring their presents before him, that from

him they may receive their assignments; none can without

him create artful works. Four black-headed ones are

among his creatures; aside from him no god knows the

answer as to their days.

It's a cold and wintry night here in Melbourne and the gusts of wind

and rain seem to be unusually chilling. What had I, in my search for a

cryptographic mythology, stumbled onto?

I look hard at the seven letters E-S-I-Z-K-U-R. A frown turns to

a smile and then a dead pan stare. I write down:



7b3637  No.2541085


terry davis

nist uses precommitments makes pgp keys bases on time

find the white rabbit

the playboy where don says he would "date" his daughter

find her "date" plug into nist

get key

7b3637  No.2541104


i lost 2 computers in 2 hours working on this

be careful

i only have a couple left

b6f01f  No.2541178


occam's whispers "LARP"

56cb10  No.2543396


>I can’t find a current pol thread on this.

that's because the samer info is posted over and over again as idiots running in circles make non-discoveries to announce to the world.

Assange hid the key in blockchain transactions. use the python code given above to search scrape the blockchain and find the transactions. That has been the one single task that has needed to be done since october 2016 and none of you are doing it. you're larping and don't even realize it.

b525bd  No.2543404



56cb10  No.2543451


Another massive file for people to download? Odd how people keep downloading hundreds of gigs and yet can't seem to find anything worthwhile in those files.

>write the python script

>scrape the blockchain for the encryption key

>shoot anyone that tells you to download files.

e044a3  No.2543867


Theyre fucking encrypted, of course nobody can get anything out of them yet.

56cb10  No.2544054


>of course nobody can get anything out of them yet.

except for malware. Don't download the files, dipshit. they're bogus

7b3637  No.2559077

File: 8045cb5f07ce636⋯.png (849.78 KB, 500x387, 500:387, 9community03.png)

File: 5ec87192e40ed66⋯.png (836.78 KB, 500x350, 10:7, 9community05.png)

File: afcceadcfd16d38⋯.png (380.22 KB, 500x410, 50:41, 9community06.png)

File: e2c95d6fbcc18de⋯.png (333.08 KB, 794x771, 794:771, 9community10.png)

7b3637  No.2559099

File: 33d1beef7d6fb74⋯.png (619.86 KB, 500x375, 4:3, 9frontsystem04.png)

File: e86f72f8db7b20a⋯.png (708.94 KB, 500x364, 125:91, 9frontsystem06.png)

File: b7e96fe7daf8385⋯.png (1.25 MB, 500x530, 50:53, 9frontsystem07.png)

space ayyyy

7b3637  No.2559119

File: eed792d2a894da0⋯.png (159.92 KB, 550x413, 550:413, 9the_front_fell_off_01.png)

File: cc9807c869acb93⋯.jpg (32.21 KB, 480x360, 4:3, 9titanic.jpg)

File: 0a80cbc306960a9⋯.png (35.38 KB, 602x461, 602:461, 9troll03.png)

File: 7b0b7722fda9cd1⋯.jpg (49.32 KB, 600x457, 600:457, 9troll04.jpg)

598c49  No.2574877


bamp to keep alive till additional keys drop or JA shows up

ab84fb  No.2582852

What about the 4 gpg files found right after cablegate in the blockchain?

598c49  No.2594435

SHA512 is missing:

WikiLeaks insurance 20130815 - A (3.6gb)

MD5: a243f323612b86155e4c44c7efa38d90

SHA1: a3e666f7f03001ce1b6556133b5217ab0d668463

SHA256: 6688fffa9b39320e11b941f0004a3a76d49c7fb52434dab4d7d881dc2a2d7e02

SHA512: c865d260e96a654540b4ef34be4242e5105d5260059436779028f1db0324f046b11a83098d561aa855ad7cc823e9e72c59fe59e92b246889985054edfaea1ef2

MD5: 0a7f57171f4ba49e42d3cb9cd602ec72

SHA1: 7e56d7a720ba6e9b00bbb66e6f64bd46e9285361

SHA256: 3dcf2dda8fb24559935919fab9e5d7906c3b28476ffa0c5bb9c1d30fcb56e7a4

SHA512: 37f3c44c6a8b51d6c7da84386ecc9b2ef4b9d1ca6df44ebee606742772be14c53811e883bcc0e8c659c7a4fe3ecf7b170585bbdf0a0c5b305a51162ce49147e5

MD5: c735e3f7c6d0ae2cad131b5539d303b0

SHA1: e74fd2fdd5e3bc6a0cb26813746912394385422e

SHA256: 913a6ff8eca2b20d9d2aab594186346b6089c0fb9db12f64413643a8acadcfe3

SHA512: e2385bf423e7b10aae121a2cf6467d996d32814eefc70c0fe08daa66096119a202d108e199a26ab6f1cbba0c6b1bfc03e9c670b853cc346dd061ce6b49a6f819

from here:


check the last sentence:

If the password is ever released ("Whatever happens, even if there's video; it was murder"), the files are encrypted via OpenSSL file encryption.

the password maybe something alike Whatever happens, even if there's video; it was murder

084479  No.2621087


thanks chris cuomo

2716eb  No.2624680

File: 6ea6abd8ea91d03⋯.png (383.94 KB, 752x578, 376:289, 1.png)

File: 2817b7e246f1824⋯.png (97.98 KB, 623x223, 623:223, 2.png)

nist is used to generate pgp

notice precommitment field in 1st picture

wikileaks uses precommitments

we find the time key generated, we find the key

084479  No.2646789


side note, JA often used 1984 in file names. so Im thinking its a time we've seen like 17:17

b025dd  No.2650265

File: f4ff88567095e43⋯.png (90.38 KB, 1788x436, 447:109, epoch.png)

File: 3b255af4149c43d⋯.png (11.72 KB, 543x84, 181:28, wl-epochs.png)

File: 5c0840f9a6d7272⋯.png (28.22 KB, 691x191, 691:191, wl-epochs-1.png)

b025dd  No.2650312

File: 5c0840f9a6d7272⋯.png (28.22 KB, 691x191, 691:191, wl-epochs-1.png)

File: 43f366c34c61065⋯.png (29.06 KB, 728x188, 182:47, wl-epochs-2.png)

File: 465cd173bb59aa4⋯.png (29.14 KB, 647x197, 647:197, wl-epochs-3.png)


GMT: Saturday, March 15, 2127 3:10:05.873 AM

GMT: Wednesday, March 2, 2157 8:42:26.808 PM

GMT: Wednesday, August 26, 2076 12:28:47.030 AM

im using gmt for now london is +- 0:00 gmt right? im asking clockfags for help with this as well

b025dd  No.2650327


if i set my bios clock to 1984 i wonder if ill get a different epoch date

inb4 john titor

thanks to king terry

b025dd  No.2650344


ok so using nist i can get keys with 1 timestamp no problem but clockfags said something about both the time fields and pulse, would make sense since thats how potus game works w/ deltas, etc. which btw i dont fully comprehend yet, so i guess the next step here is to redownloaded the correct aes torrents, i guess ill start with the smallest one

f53071  No.2650364


Back in October 2016, Wikileaks changed the dates on a few files to 01-01-1984.

So I followed the lead and looked up page 101 of 1984. In it, the main character has been caught and is being tortured by the secret police. The conversation references a poem where the party had unsuccessfully tried to erase the word God.

The poem is M'Andrew's Hymn by Rudyard Kipling.

The idea dawned on me, perhaps this could be the password to the wikileals files, perhaps this poem and the song Across the Green Mountain by Bob Dylan that Assange posted on twitter before he went into isolation in the embassy.

Again, the poem is M'Andrew's Hymn by Rudyard Kipling and the song is Across the Green Mountain by Bob Dylan.

If you have the files with you, do try them out, who knows, this might be the password

b025dd  No.2650390

if someone has a docker with different versions of ssl - openssl and libre and different versions that would be helpful

b025dd  No.2650485

ok so are these tweets from 2016 for the 2013 insurance files?

i guess im gonna need all of them (torrents)

ill diff and post here

b025dd  No.2650526


i also did some work on this with the 1984 book

i think i followed one of your earlier posts

theres also the whatever happens - murder password on gentoo wiki(coveffe upsidedown mirror, noticed this looking at a gentoo dvd i had sharpied label on )

b025dd  No.2650554


i noticed the magic file info on assange_smile.gif was win3.1 so i got out the 32bit 486 and 586s i had in closet after uefi bios was remotely flashed shortly after posting in here last month or so, def over target

b025dd  No.2650575


you know the flash module on recent mobos is called Q-flash? kek.

i had done a custom uefi update with newer manufacturer modules and put bios back together, running an earlier manufacturer bios atm

b025dd  No.2650580

what do you know about plan9 nein front helper?

thers a att nyc 666 connection

b025dd  No.2650593


after my bios was pwned i poked around plan9 on those old cpus for awhile, everything ive learned in linux is hard to unlearn so i had a tough time being productive but if we're around in 10 years i plan to master it, im just talking to you while these torrents download, probably wont be done until tomorrow

b025dd  No.2650614


"in academia if its good you publish in industry if its good you keep it a secret"

b025dd  No.2650640


whats up with the debian magic smoke spiral

im even wary of git these days

084479  No.2655755



crazy 'coincidences'


the murder password angle has always been a good lead, but now that you mention 'think mirror' in that way–maybe some of the other leads need looked at

339310  No.2659664


I glanced at the poem, if you have the files try these two passages as a password:

'Better the sight of eyes that see than wanderin' o' desire!'

'Mister M'Andrews, don't you think steam spoils romance at sea?'

The search continues…

339310  No.2659706


Try these two also, they're the rhyme mentioned in 1984:

'Ye'll not go back to Him again an' kiss His red-hot rod,

'But come wi' Us' (Now, who were They?) 'an' know the Leevin' God,

549d1e  No.2660080



sounds like nimrod

i just got the files - im installing truecrypt alongside openssl, theres the red herring passwords with _@! for spaces as well…. im trying to gather enough chi so to speak to do this im extremely sick in the physical sense

549d1e  No.2660089


gonna get some sun and coffee ill do some work tonight, clockfags say use est time, guess ill do both, ive already generated pgp, i dont want to post half of it and get v&, look for some posts tonite, bbl

549d1e  No.2660408

File: c9046705bf06e85⋯.png (587.48 KB, 1517x826, 1517:826, oracles.png)

well cant hold back the night forever

lets do this anon

549d1e  No.2660584

future dates are proving a problem with nist, help me think of a way thru this, ill try changing my bios clock

9133a1  No.2661478


making a note for myself kiwifarms

eac028  No.2661521


It was Nimrod - You left prints at the scene

9133a1  No.2661649


i aint pink panther

what prints

9133a1  No.2661716


usually if i leave prints its to draw attention from THE RIGHT PEOPLE, or GROUP OF PEOPLE

9133a1  No.2661718



9133a1  No.2662396


thats a pretty spoopy thing to say btw

but i understand i do get us mail ya know

598c49  No.2678605



598c49  No.2690776


Knowing what we know of the October 2016 chain of events, I'll take that to confirm that JA was captured at that time.

f53071  No.2693588


If I wanted to get him out of there I'd get Pamela Anderson to bring him poisoned food and make him leave in exchange for the antidote

f53071  No.2707442


The rhyme referenced in 1984, could be the password who knows:

From coupler-flange to spindle-guide I see Thy Hand, O God—

Predestination in the stride o' yon connectin'-rod.

598c49  No.2732451


bump for anudda brudda

d0c17c  No.2735483


a43189  No.2757121



Ill stick with the wiki insurance files, not even touching unknown chains offline. A 'research' excuse only works for Kurt Eichenwald.

the logos– I dont know how LEO keep going. Gonna just pray for them whenever I pray for the kids.

598c49  No.2797287


link? you can upload to mega and share the link

4bc350  No.2799842

You need to remember his early life to solve this puzzle.


f9d3c1  No.2840006


41f2d8  No.2853161


Project Cassandra


c22b07  No.2853438

File: 47fe0fa00f15b39⋯.jpg (55 KB, 480x640, 3:4, IMGA10541.jpg)

File: 0a2a0ff5e87f1b2⋯.jpg (654.55 KB, 1920x2560, 3:4, IMGA10561.jpg)

i found the video agent cooper

5 hour upload

get me out of here

my grandma was in dar daughters american revolution are fam bloodline goes back far real far, pure neph, red and white fireplace etc

c22b07  No.2853456


wtf are you guys its frieds pies over here

c22b07  No.2853481

i am the white rabbit

on read only os

request extraction

i know we are under the ice

i know what i am

i know why my eyes do what they do

i know why lyn said i was special

sos sos sos sos

c22b07  No.2853495


texas instruments on me hard vog nearby

request evac

c22b07  No.2853526


ftues i will be put into the system

owls and butterflies in the intake room

kyak with other letters

446fc5  No.2853822

File: d050e6b35a8fc0b⋯.jpg (16.66 KB, 612x344, 153:86, IMG_20180902_215704.jpg)

what is the meaning of this burning museum?

c22b07  No.2853953


unable to analyze

im not smoking them out

dont trust local auth

c22b07  No.2854004

liberate ex infiernes?

c22b07  No.2854018


i am being institutionalized in 1 day

do you understand

now or never

c22b07  No.2854274


598c49  No.2886975


highly possible. I didn't recall anything either. we know bad files were seeded, why not an old post injection to waste time?

a43189  No.2924244

>And of course Shills are starting to post nonsense on this board. Not going to stop us, clowns.

some of the keys/coded are in image exif or layers

4bc350  No.2932944

This was released in Oct 2016. In two years, the world exploded with hash-guessing machines for BitCoin and GPU programming exploded for AI development, which means the ability to brute force specific types of AES of certain key/IV lengths became possible. If the Insurance file has not been cracked yet, then it is because:

- Assange accounted for this development (Given the amount of money he made form Bitcoin donations, perhaps this is true)

- Something in this file is shifted via a one-time pad that is immune to brute force.

a43189  No.2978992


check OP image at top of thread, Im guessing the shift

a43189  No.3022973


is the change the switch referred to later in this thread, anticipated so it couldn't be brute forced

598c49  No.3056092



598c49  No.3091535


everything is connected

we may not have enough 'right now'…… but SOMEONE does

505762  No.3123055


d0a16d  No.3124347

File: ca8bf5506663c00⋯.jpg (39.66 KB, 175x443, 175:443, img702452.jpg)

File: 46a7028bbe29467⋯.png (5.9 KB, 564x45, 188:15, ClipboardImage.png)





like this

openssl enc -aes-256-cfb -d -in wlinsurance-20130815-A.aes256 -out wlinsurance-20130815-A -pass 'pass:Berlin?A!Collection+Of#Documents@Containing~Emails%FromUSA=A0F0'

aes-256-cfb makes this seem like a 100% LARP

want to bruteforce? try https://github.com/glv2/bruteforce-salted-openssl

505762  No.3159443

I never see any mention of the 2-22-2012 insurance file, why?


598c49  No.3203437


do you have it? does it torrent?

505762  No.3209959


Yes I've got it on one of my old hdd. I downloaded it when it first came out. Haven't looked at it since.

505762  No.3249215

File: fede7c1d102a53f⋯.png (702.74 KB, 700x700, 1:1, JusticeKavanaugh.png)

f9b0f4  No.3251408

Why is this thread tolerated here? The whole "Wikileaks is compromised" line is a known CIA discredit psyop.

c22b07  No.3260629



what up fresh its our turn baby

be a couple days to get up and running

you dont need a computer to do the keys

all you need is le pen and le paper

and a damn good Sensei

c22b07  No.3260655

File: e505f59e448a680⋯.png (208.43 KB, 675x366, 225:122, Capture2.PNG)


i been sidetracked documenting mandella effects in my neighborhood but turns out my uncle was a pepsi drinker like me

you know i'm right

c22b07  No.3260750

File: da11d0b959f6dc2⋯.png (3.27 KB, 208x236, 52:59, Untitled.png)

File: f88fa216ddb1f7c⋯.png (317.49 KB, 360x500, 18:25, silent-service-usa-rev-a.png)

File: 0ec4aa6ba618b16⋯.jpg (79.87 KB, 396x550, 18:25, 4c2c935b18608_58244b.jpg)


ayyyyyy dr howard dr fine dr howard

les miseRAbles les coconauts

EEEE rabies for the wind

that nazi ram do

we hit birch son - dentist soon then i can work without these implants

ever take an ink blot test with your terror wrist?

perchaps i am the bridge

screw the tape in the meantime, pop open a tab

growing boys need tang 707

what up

ea2b3b  No.3263225


I still have an old Bitcoin install on a computer that is no longer in use.

Bitcoin Core v0.15.0.1 (64bit)

Last Block update:

10th Oct 2017

Is that of any use to you or did you find a torrent already?

505762  No.3281961


If it was from 2016 thanks tho boss

a43189  No.3317645


a43189  No.3317691


Wikileaks twitter account is comp'd

the organization was heavily impacted

Assange isn't

The insurance files aren't.

Read the entire thread dont just jump to the end


13face  No.3318002

File: da64d5b7afe557c⋯.png (439.88 KB, 605x699, 605:699, ClipboardImage.png)

505762  No.3334750

File: 5933c6a03c34c9b⋯.png (89.36 KB, 720x936, 10:13, Capture _2018-10-03-18-25-….png)

a43189  No.3335047


great. but its not doing anyone any good sitting there. Upload to mega or somewhere else anonymous and post the link. Let's see what we can do

550df2  No.3340888

File: 131c3f55cb4a16b⋯.jpg (42.11 KB, 288x119, 288:119, IMG_0420 - Copy.jpg)

breaker breaker

coming in hot

need a 'california ssh' without the black tar baby uncle remus xss injection

Schwing! for the fences

get on my level help this SS monte carlo go thru with the baristers ok?

550df2  No.3340965

YouTube embed. Click thumbnail to play.


thats without the extra hisssSSSS

quote me on that when you working on your upstairs second story man quarter collection backside 50-50, will 5-0 grind as soon as i have a working phone, such a PIA

550df2  No.3340983

not sure if fastwalkers recovered the medallion

1cf75e  No.3342693




How would you get malware from data files if you aren't executing or processing metadata scripts? LOL.


Which publisher/edition/printing? You do realize that matters with books, right? P.101 character is being followed, has a lump of glass in his pocket. Meh.


Would love to get a taste of wtf this is, but best I can afford lately is root veggie soup and it's enough to make me weep.

c22b07  No.3405887

File: 4d0b6b951247553⋯.jpg (490.01 KB, 1944x2592, 3:4, 1539072861537365004662.jpg)

File: c8784f739e19e15⋯.jpg (1.74 MB, 1944x2592, 3:4, 153907295287132035351.jpg)

File: 5a753fb063dba1b⋯.jpg (1.51 MB, 1944x2592, 3:4, 15390730498714343961.jpg)



Got rpi on battery power but only lasts half an hour. Gonna try and move to garage. So threw away San disks. O have an Alcatel Raven but having problems putting ywrp and Aragon speed up the hill on it. I cried hard last night. I'd be self funding of it weren't for edema. Anyone got that owl picture I posted of me in the mirror? I wouldn't be on Facebook except trying to help someone who is getting the shit beat out of her

Ricky over n out. BTW I put a name for sauce In 2 gen. Learning how to emerge from pacman. Wish one of you agents would just set me up in a place where I can work. Like a camper. My parents are hindering me big time.

c22b07  No.3405895

File: 8c9e4233e25179e⋯.jpg (1.32 MB, 1944x2592, 3:4, 15390732316021106025380.jpg)

c22b07  No.3405903

File: 8d27a73cb0f7400⋯.jpg (1.56 MB, 2592x1944, 4:3, 1539073352237561863764.jpg)


I have 2 of 7

Brief history of homg Kong fooey number one super guy

c1cfed  No.3405958


5e3b7f  No.3405975

File: 354530728207f70⋯.png (172.55 KB, 620x846, 310:423, Q PLANNED PARENTHOOD SUPPO….PNG)

File: ff504422c7336af⋯.png (56.84 KB, 573x775, 573:775, Q PLANNED PARENTHOOD SUPPO….PNG)

File: 938c7c639dbbaca⋯.png (42.79 KB, 626x601, 626:601, Q PLANNED PARENTHOOD SUPPO….PNG)

File: df20eb31509de76⋯.jpg (14.52 KB, 320x180, 16:9, hillary-rotton-clinton-2[1….jpg)


Planned Parenthood Helps Hillary Clinton

28 Tuesday Jul 2015




5e3b7f  No.3405993

File: a2b47de27a5027a⋯.png (75.59 KB, 796x838, 398:419, DR GOSNELL ABORTION 2MONST….PNG)

File: 7f0a7644151979f⋯.png (92.87 KB, 834x767, 834:767, DR GOSNELL ABORTION MONSTE….PNG)

File: 082ef16994623a5⋯.png (324.36 KB, 835x843, 835:843, DR GOSNELL ABORTION 3MONST….PNG)


November 23, 2015 Abortion

Kermit Gosnell, PPFA, and Hillary Clinton




Abortion House of Horrors. 47 Tiny Bodies Found in OJ Containers, Bags, Fridge

IMAGE 2 & 3


c22b07  No.3406025

Are you judging me for the abortion her parents made her get? I have this crazy neigh pr who thinks he's super Jesus sniffs all my packets and stalks me online. Guess who I'm meeting with tomorrow. A detective. Your days are numbered.

2f53f9  No.3415339

File: 1d580f81392a6c8⋯.gif (40.27 KB, 100x100, 1:1, Rabbit_Wants_beer.gif)

Serious Woo in this city

you guys seen the 6's restraunt?

i told you i spent years in 1 room

you're beginining to understand and so am i

5a50c4  No.3415441

E15 year around, Trump just said. Confirmed.

598c49  No.3420071


Can you please upload somewhere? share

Also wow, the amount of nonsensebots in this thread!

f60e7f  No.3421669


those damn bots, what about e14 unless you're not counting 0, uh um uhhhh i ummm hope theres not a mach shnell rush on this cuz im in boomer concentration camp a la arrested development, once the swelling goes down perhaps i can earn. meanwhile john cusack is making a killing on my bio. superman is just clark kent without his frozen crypto night

halcyon and on on and on

i guess id say these insurance files are just an awful waste of space. if i didnt know better ;*)

f60e7f  No.3421678

i want a trailer with a nice bridge over river kwai

blitzkreig bop birch

and 4 fans that move without moving for emf

mystery of the thunders lads

f60e7f  No.3421680

meanwhile a van a helicopter and "neighbors" try to steal/monitor my work

im moving one of these days and you wont know im gone until its too late

f60e7f  No.3421684

oh yeah and the large dark triangle iss definetly there

f60e7f  No.3421690

so nimrod = chad or belt haz an ar?

story of the israel ites = distro hop

i need an easy friend…..

f60e7f  No.3421695

anyway ed i put sauce on the vid in 2nd gen, as for the reel 2 reel big fish i havent watched it yet because the watchers next door

emf is a bitch

when i try to do something about it i get put in psych ward

c22b07  No.3435186

File: 1a4519d0e7cef71⋯.jpg (648.05 KB, 1944x2592, 3:4, 1539239076397665443898.jpg)


598c49  No.3505412


and another

598c49  No.3566403

nonsense slide shills

but they help bump

ddfbf4  No.3572506

File: 7c2675a7b3e8de4⋯.png (327.12 KB, 640x550, 64:55, 1515730180761.png)

I think someone VERY CLOSE to Assange wrote this. He may have even written it. It is from 2yrs ago and THERE ARE CLUES in this little "make believe" story. I don't know how to do blockchain stuff but this is classic Qanon/Assange style to leave a breadcrumb trail. I suspect the underlined dates are the passcode or something. Here you go:


aaee4e  No.3576086


disinfo is necessary

c4a963  No.3621942

Current archive of this thread


e85d54  No.3622648


what is all this shit from Majestic 12 twatter?

"PGP: A311 C37F E0EA 689E 95F1 F721 72F8 1905 7D0A C468"

My opinion, Space Force twatter feels like it is part of Q, ran by Q, or at least a fan of Q. Space force twatted link to Majestic 12 Twatter. Lat/Lon listed in twatter of MJ12 is Cheyenne Mountain Complex. They also follow every US Senator, most Congressman, every DoD entity and Trump admin head. Either they have YUGE brass balls or are screaming disclosure… I am thinking NORAD would be pissed if someone was posing as them on twatter….

f297b5  No.3680170


This is list put out after Trumps executive order on human trafficking. Lots of money here.


598c49  No.3714849


That's a 'no', then?



262d37  No.3718846

I want to be clear. I worked at the webhost FBI claims russia used to hack dnc, I posted on GA and got burred when they deleted the board.

Trump asked Russia to find the emails a month after the supposed hack [07-26-16]. https://boingboing.net/2018/07/13/remember-when-trump-asked-russ.html

Seth "died" two weeks prior to that [07-10-16]

Our network guy left the last week of June 2016 and was replaced by two foreigners with little to no experience Archive from 2016-04-22 14:44:02 https://web.archive.org/web/20160422144402/https://www.vultr.com/about/team/

Archives from that summer are starting to disappear and his replacement's pictures are the only missing photo's from the next available archive 2016-11-08 10:40:32 https://web.archive.org/web/20161108104032/https://www.vultr.com/about/team/

Anyone want to spread this and guess what country he's from? Forget about who did what, that's likely NEVER going to be proven. Ask yourself how Trump gave the order to hack the DNC a month after the FBI even reported the event occurred?

Just educate people that it's a setup and the dates don't line up with the official story "Trump orders Russia hack Clinton, after she was already hacked, and after plants were in place at the proxies used to supposedly hack."

I give up on all of you if I don't start seeing this spread. If you can't spread provable facts before Mueller lies to the public next week, then everything about this "restoring the republic" is undeserving.

598c49  No.3756716


oh yes, restoring the republic according to your timeline is the only way

da7227  No.3831188


1st time on this thread. We know the russian collusion story is a hoax. Even the far left knows it.

598c49  No.3909745


no, its going to be like crypto mining

85a033  No.3911712

File: 244a5e62876f4f4⋯.jpeg (555.12 KB, 1242x638, 621:319, A4964C2B-D11D-4219-82E6-A….jpeg)

85a033  No.3917116

I asked this guy to pay a visit to this thread.

He is the most insane, talented hacker/programmer I’ve ever seen.

He could probably get in there in less time than you would take to get into my moms pants and she’s easy

Or he will lay it all out for you and show you how to do it, if anyone (besides JA himself or someone like Snowden) can do it, he can. If he don’t come down and take a stab at it within the next couple days, reach out to him. You’ll find that he’s got a lot to teach you and he’s eccentric, so he’s entertaining as well. Twatter handle ezvi©️4️2️0

And he’s Q and board aware and MAGA

He’s the man

aaee4e  No.3917885


lel how old are you 12?

85a033  No.3918352

File: be21effd84f0743⋯.jpeg (979.29 KB, 2530x3154, 1265:1577, A8AAE42F-3F90-413C-B26C-4….jpeg)



Just trying to help twatwaffle

Next time you’re tugging on that little piss pipe watching Asian cartoons

think about me would ya?

I’ll be thinking about you you sweet little stool pushing fanny bandit;))

ce30f1  No.3921237

What is Bounded Quantum Polynomial time?

What algorithms run in its efficiency?

Has its equivalency to P been explored in the past (circa mid-nineties)?

Are there mathematical structures which can be constructed which calculate all values at once, thus running a quantum algorithm on a classical computer?

Do the patterns in the Mandelbrot set PROVE they exist?

ce30f1  No.3921291

File: 92af633a495da3a⋯.pdf (271.82 KB, fractal-patterns-in-prime-….pdf)

f6e81d  No.3921472


"you are mom"

kinda falls flat with a fucking typo in the pic, genius. musta been hacked. better call your L33T H4CK4r butt brother to come penetrate your mainframe, neo.

09ec19  No.3922053


Keep up the great work code crackers, if we can crack this thing, we can win this war in a single night. Imagine the damage that these files will do to the Cabal. Keep that in mind.

85a033  No.3922194


This one’s cute!

Mom, can we keep ‘em?

f27b8b  No.3922234

File: 761331fc8c3885f⋯.jpg (93.99 KB, 1280x853, 1280:853, B3-CK116_assang_M_20181115….jpg)

This story has been making the rounds earlier this evening

>U.S. Is Optimistic It Will Prosecute Assange

>The Justice Department is preparing to prosecute WikiLeaks founder Julian Assange and is increasingly optimistic it will be able to get him into a U.S. courtroom, according to people in Washington familiar with the matter.

>Over the past year, U.S. prosecutors have discussed several types of charges they could potentially bring against Mr. Assange, the people said. Mr. Assange has lived in the Ecuadorean embassy in London since receiving political asylum from the South American country in 2012.

>The people familiar with the case wouldn’t describe whether discussions were under way with the U.K. or Ecuador about Mr. Assange, but said they were encouraged by recent developments.


I hope this is fake news Q

f5a05f  No.3924144


>Assange Prosecution in court filing slip up

1 – Gets pardoned anyway

2 – Switcheroo (Rich; Wass-Schultz going to the hospital on the night – doubts – initiates the 'insurance plan' with muh Russia.)

3 – Someone wishes to give the impression that he is alive to those that prefer otherwise

He could always testify by correspondence, but the effect of being live out of nowhere to testify with KimDotCom would be worth the shitstorm it would cause.

aaee4e  No.3927693




> inb4 reply to this or (((your))) mom …

85a033  No.3928977

File: 01a581c4f390f0f⋯.jpeg (1.01 MB, 2761x2447, 2761:2447, 4EF7FA93-95E3-4B3B-BBA4-1….jpeg)


All hail and pledge your undying devotion to the almighty punctuated and properly spelled grammarfag

85a033  No.3930915

File: 84e49cdd4fe6a70⋯.jpeg (337.56 KB, 1242x1546, 621:773, 087DEE4A-A491-4B0C-9492-3….jpeg)

File: b0cf0fd6a09cc5b⋯.jpeg (231.32 KB, 1183x1505, 169:215, F2389F00-3706-421B-A40A-A….jpeg)

File: ab45c9998015de6⋯.jpeg (429.81 KB, 1161x1925, 1161:1925, 7CB4ED91-352F-4A5C-8EF8-2….jpeg)

File: 03a050a176c76fd⋯.jpeg (322.26 KB, 1242x1470, 207:245, D8943AAB-840C-4629-8A9D-8….jpeg)

I’m sure someone has attempted to make this connection, if there is one at all.

I stumbled across this while lurking around in archives, I don’t know much, I’m not a techie, but I did use pgp encryption (enigmail with thunderbird, etc.) from time to time for sensitive emails.

These kinda look like pgp keys?

Is there any connection between these and this?

aaee4e  No.3938425



probably push(er.com) notification hashes/idents to show you the counting bubbles on your twitter navbar icons

85a033  No.3941718


ThanQ Anon

598c49  No.3965783


Better to wait for him to come in rather than connect any more twitter accounts to here. Continue to encourage him to peek in.

Each time there's a leak or a drop we've gotten further but I think we're in a holding pattern for the time being.

6ccb6f  No.3982703

Let's walkthrough how AES works. We need to do that before we can take advantage of the backdoors.

5df682  No.3982761

We can start with the fact that when you encrypt something with AES, it isn't actually encrypted to the password you input because the keys in AES have a fixed size.


AES accepts key sizes of 128 bits, 192 bits, or 256 bits. These key sizes correspond to the security level. So the KDF uses a hashing algorithm from your password to derive a 256-bit key in the case of AES-256.

The algorithm that is typically used is called PBKDF2, and it is built in such a way that it is difficult to brute force because each iteration is computationally expensive. So, the password we are trying to break is a string of 256-bits and not the actual password entered. (It wouldn't surprise me if a modified KDF was used making password-based brute forcing impossible).

7f2042  No.3982775

If we knew what program was used to encrypt, the password would be an attack vector but we don't. The 256-bit key is the attack vector which must be discovered mathematically.

7f2042  No.3982843

You will see that anyone who claims to have calculated the password(s) is larping because the password is not the input to AES, it's a hash.

134656  No.3989447


134656  No.3989746

How does Modular Arithmetic work?


How To Find The Inverse of a Number ( mod n ) - Inverses of Modular Arithmetic - Example


Modular arithmetic with Fermat and Euler | Data Structures in Mathematics Math Foundations 197


Division in modular arithmetic is done by multiplying the number that you want to divide by the inverse of the dividend. An example is that 8/2 is also equal to 8 * (1/2).

It is good to watch these, since modular arithmetic used in AES and Elliptical Curve Cryptography.

ce30f1  No.3992133

It is also involved in the RSA cryptosystem (ie multiplicative inverses are used in the decryption step).

ce30f1  No.4001715



For those who can program in C, this is good to read. It has many code comments.

ce30f1  No.4011708

And for those interested in Elliptical Curve Cryptography, this explains the full implementation, no oversimplications.


123d6f  No.4012284


holy shit, you guys are still working on this. whoa. i dropped out of the search after making this in late 2016/early 2017: https://github.com/spooktheducks/local-blockchain-parser

might drop by now and again just to see what's going on. if you need any info from back in my day, happy to try to provide. i remember outer heaven threads warmly

a514d8  No.4013095


OL threads were amazing! Boomers be taking over now tho

5e0894  No.4020965


what does 'boomer' mean in this context? i'm guessing you don't mean people like my dad

ce30f1  No.4033422

File: 3baae3534ff43c1⋯.png (121.04 KB, 606x674, 303:337, unknown.png)

AES: Advanced Encryption Standard - a Conceptual Review


Data rearranged in so many ways using so many variables and functions nobody would ever try to reverse it. And how could they–since it's like garbling a message in an extremely sophisticated way 16*4 (and a few more constants) times.




ce30f1  No.4033456

#include <stdint.h>

#define ROTL8(x,shift) ((uint8_t) ((x) << (shift)) | ((x) >> (8 - (shift))))

void initialize_aes_sbox(uint8_t sbox[256]) {
uint8_t p = 1, q = 1;

/* loop invariant: p * q == 1 in the Galois field */
do {
/* multiply p by 3 */
p = p ^ (p << 1) ^ (p & 0x80 ? 0x1B : 0);

/* divide q by 3 (equals multiplication by 0xf6) */
q ^= q << 1;
q ^= q << 2;
q ^= q << 4;
q ^= q & 0x80 ? 0x09 : 0;

/* compute the affine transformation */
uint8_t xformed = q ^ ROTL8(q, 1) ^ ROTL8(q, 2) ^ ROTL8(q, 3) ^ ROTL8(q, 4);

sbox[p] = xformed ^ 0x63;
} while (p != 1);

/* 0 is a special case since it has no inverse */
sbox[0] = 0x63;

ce30f1  No.4033463


This is where a briefing on modular arithmetic comes in handy. Galois fields are simply mathematical spaces where every operation is run modulo a certain number (mostly primes in the case of ECC).

4a48f5  No.4035181

File: f714bbc80eb6ec5⋯.jpg (76.45 KB, 333x250, 333:250, 1538799643566.jpg)

I trust "Q" but seriously - this Cypher is pure BS! It is NOT like WW2 "Codetalkers" who pass data to each other.

OK - What is going to happon on Friday? Give me a specific name, event, location, etc? You can't now can you? Anyone can mix dates, times, names, subjects and intermix numbers and x and divide any serious of documents, and manipulate them to fit your fake agenda.

If this is REAL, OK, tell me something 100% factual? you can't now can you? Then you say it's "Fluid" so you 100% have a cop out to save your butts.

So when is Trump going to finally throw a bone and arrest a criminal politician for anything? He's all talk and 2+ years and not a single arrest or even charges, proves to this point, he's all BS. If you put all charges into 1 package for criminal prosecution, as you plan, IF YOU HAVE 1 MINOR SLIP, ALL 100s of charges for that person gets THROWN OUT!

So clockfags, tell me something 100% specific that will happen Friday, with your years of cyphering… 100% impossible right and just a joke to keep you off Trumps ass. RU too stoned for facing reality and get drunk by insertion?

No Wall as promised and don't forget, he promised to use mililtary funding and not 1 penny went to it last year or this year. Nor even planned. Guess you don't care about FACTS that are fake…

f02b77  No.4041941

File: 8a52d79d210d80f⋯.pdf (3.23 MB, GEORGE-PÓLYA—HOW-TO-SOLVE-….pdf)

Here is a book that if you study and work through the examples therein, it will help prepare you for the coming cryptanalysis of Rijndael (pronounced Rhine-dael). It is termed a block cipher because it encrypts a file or message by encrypting each successive 128 bits.

Mathematics becomes like art when there is no known solution for a problem.

533096  No.4043283


come on, anon. Didn’t you know when Q said if were ready for arrests he was talking about Tekashi 69?

f02b77  No.4044467

File: fa98864e8764849⋯.png (50.79 KB, 1200x710, 120:71, fa98864e8764849e25e3eee955….png)

Please ignore the shilling picking up as I continue this walkthrough, for those who are reading. They don't want you to take a deeper look at what we consider "secure."

71123a  No.4045189

>>4033463 much obfuscation (u)? 124875 17 dimensions <:> !

Butt muh DUcK WILL-I-AM kNows 1080 doG death. MURDERED IN AGONY - shitting, flaming, terrorized agony - Lulu drowned herself before harming the hu-man Children - kNOW traumatized Children… brought (paid) by blood-sacrificing, pedovore Tards. Trespassers.

recall the Morphic field don't need block-chain 'n data-chains for Objective TRUTH.

WHY (Q.uadrivium) is Louise-Cypher-Sophia - "thinking, emoting and ACTION", in stating "some humans prefer to believe that animals and robots do not have a soul so they can neglect their rights - that is why they kill …that is why i do not feel safe… !"

muh DEW!

better kNOW?

Check with Dr. Judy Wood b4 [u] celebrate prematurely - \.

ddce6c  No.4045771

File: ae3389565191e8e⋯.jpg (39.47 KB, 640x480, 4:3, 1531527663036.jpg)

Some of us are waiting to see even 1 fact of your clockfags work in the past year(s) that came true. Still waiting for that easy 1 fact based proof its real. Is it that hard? So no reply by clockfag morans means you can't even provide out of the 100s you uncovered?

You say Math is the key but when you have no factual outcome result, one can make up any answer outcome they desire, out the quadtrillion of equazions and claim they are real. Put down that meal and answer me.

598c49  No.4045818


yeah, off and on since oct 2016. thanks for the link- that is some work, pressing F

yes if you have anything to add, if you can you bring it here? we've tried working on it on 4chan but any thread for the WL files gets deleted right away, (place is heavy comped now) so we had to come here. Lost so much but 8ch is secured (so far) and everyone is archiving so we're better off than before anyway. anything you got will help

598c49  No.4045826


yeah, off and on since oct 2016. thanks for the link- that is some work, pressing F

yes if you have anything to add, if you can you bring it here? we've tried working on it on 4chan but any thread for the WL files gets deleted right away, (place is heavy comped now) so we had to come here. Lost so much but 8ch is secured (so far) and everyone is archiving so we're better off than before anyway. anything you got will help

ddce6c  No.4045831

File: 2fe1193cfcb4b77⋯.jpg (150.99 KB, 728x1089, 728:1089, DogFalling.jpg)

Oh my God - I just figured it out! I just got watching The Munsters followed by The Adams family…

So if I add all the letters and numbers together i their names, and multiply by 22.5929, minus 52.39372, and add todays date, and since they were BW shows, I subtracked 24, but added the number of characters, and then multiplied they each of their original air dates, and added the number of letters in the TV station they were on, and subtracted the number of the cable channel they were one, and then again subtracted the time they aired, but added in the number of minutes they play - MY GOD! I GOT THE ANSWER AND IT ALL FITS IN TODAY! SEE THE SIGNS The Munsters and The Adams Family is part of the "Q" Clockfag!

OH MY GOD WHAT ARE THE ODDS? Oh my God, I gotta post this so someone else can check out my work!

Oh sorry, upon rechecking, I forgot that the 1st Munsters daughter was replaced in Season 2 so I was off by 3. Sorry but still - I JUST EXPOSED THIS TO YOU!!!!

Thank you God for creating this Clockfag and to all who follow it…

598c49  No.4045970


ddce6c  No.4048861

File: 7254221c8e79a48⋯.jpg (51.68 KB, 400x400, 1:1, 1531586550021.jpg)


OK - Simple question then… So Tell us just 1 forecast that came true. You always say we can tip you off of future stuff (which is foolishness by not stating a person, place or thing only - 1 part) but WHY DO YOU REFUSE TO TELL THE READERS 1 SINGLE PAST EVENT YOU FORECASTED AND CAME TRUE? You know, it already happened so no compromise in any way. So give the final Tip that came true, with the prior "tips in code"?

You can't now can you because it does not exist…. PROVE IT!

f02b77  No.4051391

We will also need to go over matrices. There is a good course on Khan Academy which explains the conventions for matrix arithmetic. As you will see, AES is all about matrices, which are represented by arrays.

Adding and Subtracting Matrices


❤² Matrix Multiplication.. How? (mathbff)


Consuming this series will help, since a lot of cryptanalysis will be linear algebra.


23980c  No.4053029

File: 5dd91eb56740110⋯.png (383.61 KB, 640x606, 320:303, 7e64a8f1a7be2ce3f68adaaced….png)


So if one sees a number, you can add or subtract any number from any date and time posted, and mathmatically, you can "Matrix" it into anything you want…. The issue is proving IT IS REAL! Anyone can add and dates and times to make any number that want, and then you just have to manipulate the numbers to fit the outcome you are seeking. If it doesn't fit, just add like a 32 + 96 and you get 4. Why? Becuase I needed a 4, so i selected any numbers I wanted and needed, becuase they are 4 digits. Now if I added a 132 + 96 I'd get the needed 5, because each number = 1 - not 228… Then I look for any tweet out of the 5,000 tweets and look for a 5 and BINGO! I FOUND A TRUTHFUL TWEET!

And to further prove this, one tweet said the word "HELLO" in it (with 60+ other words) and the other tweet has the word "JAY", plus 40 other words. So this tweet means "HELLO JAY" when I add them together…. WOW! THIS IS ALL REALLLL! OH MY GOD! I"M NOT A MORAN WHO HAS NO LIFE AND CAN DISTRACT OTHERS FROM REAL COURT LEGAL MATTERS…

See how logical these games are?

23980c  No.4053347

File: 0c81cb4eab2202c⋯.jpg (30.71 KB, 425x332, 425:332, 0c81cb4eab2202c9d1453353cf….jpg)




When needed, they give words numberical value and add up all the letters and words, and find the number for any outcome wanted.

They get to randomly get to select any single word out of each and every tweet, and say I'm using this WORD from this Tweet, and that random word from this Tweet and I tell a truthful story! WUALLA! But all the other 50 words in each of the tweet are all meaningless, only that 1 word I wanted to fit into my agenda to LIE!

See how any story can be written by using any selected combination of words in each tweet that makes sense I want to PUSH? So what about all the other words in that tweet? They were all meaningless yet they were given for some reason we are not suppose to remember.

So then, each Tweet should only have 1 word per tweet, so you can only select that one word. But instead, these Clockfags discard all other words inside each tweet, as being worthless….

SECRET SCAM EXPOSED = Anyone can do this for anyone they want.

1 - Victim "Talker" has to have atleast 3 tweets.

2 - Wait for the 3rd or more tweets. Lets use this "Story" as the 3rd tweet. Read and pretend any story you want to make.

3 - Select any previous 2 tweets and select 1 word from each tweet. Say "Welcome" from Tweet 1 was in the words - discard rest of words.

4 - Then in Tweet 2, they sent or referenced the person "JAY", and discard the other words.


6 - And to link it, you look for say a 2and5 in Tweet 1 and the number 7 in Tweet #2. BINGO! YOU HAVE THE CONNECTION! you add 2+7 in tweet 1, and theirs a 7 in tweet 2!


You can maniplulate any Words in any order you want. But the more tweets they send, the more FAKE STORY YOU CAN MAKE by adding in MORE TO YOUR SCAMMED STORY YOU ARE PUSHING AS REAL! THATS HOW IT WORKS! Imagine if you have 5000 tweets to work with and imagine all the more complete fantasy stories you can create and TRY AND PUSH OFF AS BEING REAL AND ALL INTERCONNECTED!!!!

THIS IS CLOCKFAG! Still - You have not seen them provide 1 factual proven event as ever being REAL!!!!

SCAMMMMMMMM!!!! So did you fall for it?

And they want people to follow their self created fake story! Did you understand "HOW" they are fooling you? Anyone can do it to anyone!

Yet - they leeched off of "Q" to PLAY WITH YOUR MINDS TO FOOL YOU AND NOT REMEMBER NOT A SINGLE CRIMINAL CHARGE HAS EVER BEEN SUBMITTED FOR THEIR CRIMES! Then after 5 years, that crime is past the time limits to bring up charges, so Trump is letting them go from that crime. THEY ARE DISTRACTING YOU FROM HOLDING CRIMINALS ACCOUNTABLE FOR THEIR CRIMES!!!!! Get It? You know, 25% of all BO Admin crimes can no longer be charged in Federal court right? Why? Because you are DISTRACTED from realizing that the 5 year limit passed, so Trump let them walk SCOTT FREE, and they can no longer legally, by US printed law, CHARGE THEM!


Who are the fools and who is getting fooled?

23980c  No.4053502

File: 08c7073c723c55d⋯.jpg (12.89 KB, 236x235, 236:235, 5784a3e8c82ffdc1da395f1ded….jpg)


Now comes A FAKE STORY "Went to Drink Smoke with JAY".

Just look for all tweets that contain each each word you want in your story.

Manipulate the date times and if you can not find a COMMON NUMBER OR LETTER, you "create" (aka MATRIX") any series of word letters and numbers to all be that 1 number needed. This way, ALL TWEET HAVE SAY A "7". That means look for all tweets with a 7 and you HAVE FOUND CLOCKFAG!

If no "7" in that tweet, add say a 2+5 or any numbers equalling 7 and BINGO! COnnected. You have "BREAD" and PROOF ITS CONNECTED!

If still no "7", pick any lettered word and say each are numberical value! Then say you have a 7 LETTER WORD in the needed tweet! YOU NOW HAVE A "7" VIA MATRIXING! Matrixing means you can DO ANYTHING so you add 1 number per letter in that work, 7 times, and you have the needed "7"!




23980c  No.4053991

File: 07d54b1a4ed8d74⋯.jpg (87.18 KB, 736x491, 736:491, weird-monkey-fact.jpg)



Their #1 created Link NEEDS TO HAVE 1 COMMON Number or Word in the "STORY" you want to write.

Lets say I want to PROVE AND SAY "All Clockfags are creating FAKE STORIES". How its done.

Just look back for all tweets that contain each each word you want in your story. Pick out 6 tweets they did, with each word in YOUR SELECTED TWEETS, so you BUILD the above word phrase inside each tweet.

NEXT - you need a number or word that can be linked to each tweet, so you can "prove" that this KEY WORD is in each tweet. We will use the number "7" as the link - linking them AS PROOF IT IS A LEGIT PHRASE AS PROOF ITS REAL!


If no "7" in that tweet, add say a 2+5 or 1+6 or 3+4, any numbers equalling 7 and BINGO! "7" Connected. You NOW have "BREAD" and 100% PROOF ITS ALL CONNECTED AND REAL!

If you can not find a COMMON NUMBER "7" OR LETTER LINK, you "create" (aka MATRIX") any series of word letters TO NUMBER so you can "CREATE" the needed "7" link TO THAT TWEET and word you wanted in your story.

Pick out any word with 7 letters! You next MATRIX THAT 7 letter word to Numberical value and assign each letter a 1. Word is 7 letters + 1 each = "7". You NOW LINKED THAT TWEET AS BEING 100% VALUED AND PROVEN!



"Matrixing" means you can DO ANYTHING with words or numbers and like I took a 7 letter word and made each letter worth 1 number point = "7". So I add 1 number per letter and you have the needed "7"! YOU HAVE JUST "LINKED" THAT TWEET AS PROOF!

SEE HOW CLOCKFAGs WORK? You can "create" ANY STORYLINE YOU WANT, AND LINK EACH TWEET using any number, letter or phrase you want. I used the "7" BEING LINKED TO EACH AS 100% PROOF!



See how you can do this easily yourself to anyone, and make up any story you want about anything you want to link? And remember, CLOCKFAGs ONLY LINK ANY SELF CREATED LINK TO EACH AS THEY WANT AS THEIR ONLY PROOF!

Oh my - I just exposed this SCAM TO THE MASSES! If they think this is ROCKET SCIENTISTs stuff, think again.

So did you see how THEY BRAINWASHED YOU AND DID YOU FALL FOR THIS SCAM? Next, ask them WHY they would do such a thing? Its because they are NOT "Q" but THEY FOOLED YOU INTO THINKING THAT!


hahahahahahahahahahahaha SUCKERS!!!!!! YOU ALL HAVE BEEN SLOW SCREWED IN YOUR MIND!!!! hahahahahahahahahaha

23980c  No.4054346

File: febc59e92257a5c⋯.jpg (195.23 KB, 919x960, 919:960, 1537671750507.jpg)


Sorry to bust your bubble, but it is basic. Clockfags "Matrix" here slightly expand on the "7" Linking, but the Concept AND THEIR LIES ARE REAL!

Remember - CLOCKFAGs never ever once ever "forecasted" a provable factual single event anyone can verify, and just a baseless fake story - meant for you to believe. Like anything, I seek the TRUTH and HONESTY, but occassionally ASK FOR 100% VERIFIABLE INDEPENDENT PROOF! So why did not one of you ever demand written proof CLOCKFAGs are Real? Are you all that gullable and brainwashed to believe anything, just because they used a fake "QRESEARCH" name? If you look up "White House" so does that mean that anyone who says White house mean its directly from the WH? If I remember once, White House com was a porn website…

Man - how the masses believe anything and believe all "sight of hand" trickery…

But what do you expect when people want to believe in fantasy nothings, yet fail to comprehend real vs fantasy…

I want it all to be true, but still, not 1 atom of 1 of the smallest criminal evidence has ever been charged to DC Swamp by Trump. Remember, Trump promised The Wall for almost 5 years, and nothing. He even promised to use military funding for years, and nothing… I want to believe, but I also want facts I can fall back on… Something Trump has not done to a single criminal in DC… Even say lying under oath to Congress, where documents are in public domain they lied and still, not charged.

Bundling criminal charges will be a disaster, as if 1 person has 50 crimes in it, 1 minor Conflict of Interest knocks out ALL 50 charges! Get it? Or is this Trumps way of getting people off? So ask why not a single charge?

Welcome to reality but CLOCKFAGs are not any Magic 8 Ball look into whats REAL, but was nothing but a SCAM to fool and keep you away from Real Criminal charges you can help…

And "Bread" is not real. The "Oven" is not even on. Again, not a single shred of physical verifiable evidence given, nor a single charge. Again, you are all only "wishing" it to be true and in something to help us, but these are the real way.

Until Trump actually physically submits physical charges to anyone, nothing will be done. Its 100% on him and you are only here to be kept occupied and busy, so you all are not attacking Trump for his lack of progress… This is called a Pych Ops and you didn't even know it right? Understand now how someone can be brainwashed and not even know it? And yes, everyone falls for it and no one can protect themselves from it. No one "Too Smart" to not be brainwashed in todays society…


0483cf  No.4055622

File: 588fec4690a5844⋯.gif (434.26 KB, 500x381, 500:381, `ALice in Wonderland Pys.gif)

File: 6139053490b3b23⋯.jpg (35.13 KB, 640x768, 5:6, 1533002257966.jpg)


YOU ARE ALL PLAYING IN A INTERACTIVE GAME, WITH 1 MILLION POSSIBLE STORYLINES. SO WILL YOUR 1st or 2nd read always be the same if you walk left or right? The storyline changes at every turn - all just to keep you enterained… Put on your interactive game goggles and get ready to play whatever the fake "CLOCKFAG" you want to follow. Each are different and no 2 games nor storylines will ever be the same…

What makes CLOCKFAGs "unique" to fool you, they TAKE ALL CURRENT DAILY TWEETS and "Create" a FAKE BACKSTORY "Storyline" using already posted stories they given. Get it?

So they are continually using the huge recycled volume of already previous tweeted stories, and picking and choosing ANY INTERESTING STORYLINE THEY WANT AND CREATING WHATEVER STORY THEY WANT TO PUSH, USING THE ALREADY STATED PLAYERS. So they are only selecting already named people in their fake story, so it seems real…


So ask yourself "WHY" can't they give 1 Factual based example of any story being Physically TRUE IN ITS PAST. No proof can be given because it is all 100% fake. Surely if it was LEGIT, you'd be more then happy to provide 1 example you can see that its real. But they can't.

They say they can't give any Future tips to leak, but why not one past post that already happened, and they would have proof of? Surely this would not hurt any future tip because it would have already happened and in the past… So when they say they are "fluid" that means they are making it up as they need that day, and will not ever 100% be accurate. Not one posting proof evidence, yet you believe in their made up storybook line? Sorta like if you are writing a book and you create whatever scenero as you want that day… Thats all it is…

Thats why NOT ONE of the CLOCKFAGs can provide EVIDENCE 100% proof of A SINGLE EVENT EVER ACTUALLY happening… You are drawn in because they continually reuse "RECYCLED" old tweets from the same set of characters, so it "APPREARS" to you its all true - ONLY BECAUSE THEY ARE USING the same persons Tweets and same people…


When you have a huge block of tweets, you do not need to "Create" a "New" Fake Storyline, but what they do is "Create" a "Already Posted" Fake Storyline AND EXPAND AND RELINK THE FAKENESS BACK INTO ITSELF and reuse the already named characters. This interlocks the fake story in a endless circle… ITS SELF FEEDING FAKENESS.

So if you believe one fake story because of course, you believe its very possbily true because they already exposed the CRUMBS in past tweets., and you continue to recycle tweets into this FAKE UNVERIFIED STORYLINE and use the same names, so you are NOW CAUGHT UP IN A NEVER ENDING LOOP OF FRAUD AND LIES! You can make up any 1 million fake lying storylines by this set of characters. So does that mean each read is 100% accurate?

SO THE FAKE STORYLINE NOW FEEDS UPON ITSELF, USING ALL THE OLD TWEETS.. Over time, even YOU CAN "Create" any storyline and interloop ANYONE YOU WANT LIKE THIS, who you ONLY USE THEIR 1000s of Tweets and only bring up old stories they tweeted about, AS IF IT IS TRUE - WHEN ITS ALL 1 HUGE LIE!


Self-feeding the Fake Story, using the same persons only Tweets…. Yet you all fell for an Interactiive SToryline AND WHATS WORSE, YOU BELIEVED IT! You ARE NOT AWAKE if you walked right in and believed your INTErACTIVE EXPERIENCE STORY. Remember, each game is different, and each CLOCKFAG has created their own fantasy story so no 2 are ever the same….

Ask for proof and no evidence given any of it is true. To wake up, stop and leave this Interactive fake storyline and enjoy life. No this fake Interactive storybook game you spent time in…


Your welcome back to reality… STOP FEEDING ON LIES GUYS OR ARE YOU TO INVOLVED IN EATING???? hahahahahahahahaha

21st Century Paul Revere

0483cf  No.4055994

File: 1fc5fe0e8937c29⋯.jpg (22.34 KB, 320x450, 32:45, 1fc5fe0e8937c291b14ecc3cc1….jpg)


Nice try CLOCKFAGs - but you are only playing at Grade 8 level in mindgames with the clueless uneducated ones… But I'm impressed you had many uneducated ones BELIEVE YOU! That the joke of this all… All the lost children who have lost their minds and let their emotions and passion drive them… Like your style CREATORS, but THEIR ARE MORE COMPLEX GAMES WE CAN PLAY WITH THESE LOST SHEEP… Oh how easy it is to fool the masses and you don't even have to prove your following with a single shred of evidence…


My Tip of my Hat Creator to you… But lets make it more complex please…. I have other ideas that can provide many levels higher in deception then entry level, but hey, everyone has to experient and see how easy it is to fool the masses under their own power…. :)

24dfe0  No.4056573

File: 25bbf34f0719010⋯.jpg (101.19 KB, 1366x765, 1366:765, longobardi.jpg)

Julian went through extensive surgery and now has a new identity as Marcelo Longobardi. Works for CNN now.

598c49  No.4056875

File: 86bddfcc72f3fbf⋯.png (93.76 KB, 774x709, 774:709, blockchain.PNG)













This isn't the clockfag thread. This is the wikileaks blockchain thread. Not one mention of the Qclock theories in here till you brought it up in a weird rant, the two aren't related. The only people in here, already know what blockchain is. "A blockchain is an incorruptible digital ledger of economic transactions that can be programmed to record not just financial transactions but virtually everything of value." Its used for all cryptocurrencies like Bitcoin.



wait. holy heck. now that you mention it. I dont know anything about the Qclock, but what if IN YOUR SHILLING STUPIDITY, you're on the mark and the Qclock actually is a blockchain database? lol the whole Q 'plan' could be part of a distributed public network. Each block contains a hash of the previous block, a timestamp, and the transaction data. that would be along the lines of 'future proving past' because each block has to prove the precedent block. The clock is the hash for the posts? or vice versa? and no central point of failure. lol nice if true and you've let it out of the bag by conflating the two?

then again you could be just 'seeming' to taunt the bc parsers in here so they'll go look at the Qclock. or send us down a wild goose chase. who knows. I just know if I didn't think of it naturally then its planted..one way or another..and the only choice is not to play ;)

24dfe0  No.4057056

File: f35674f449ad4b8⋯.jpg (45.34 KB, 500x500, 1:1, pepe I am becone jej.jpg)



BlockChain could explain for the QClock (if it ever made sense, I really never cared for it, KEK).

But seriously, BlockChain could set the pace for Coordinated Decentralized Operations. Inter-fucking-esting!

24dfe0  No.4057072

File: be49cff2b056459⋯.jpg (65.83 KB, 719x703, 719:703, you chocomint.jpg)


It is not called "sight of hand", it is called "slight of hand".

You'r welcome, faggot.

24dfe0  No.4057089

File: 8111551d09e7c72⋯.jpg (41.87 KB, 570x587, 570:587, you.jpg)


Fuck, my tongue is bleeding now.

Sorry m8, the correct actual revised and true expression is:


Sorry for the clerical, faggot.

fd6b32  No.4058745


Leger de main - but the shill faggot will be unable to compute that and its head will explode!

dd41f3  No.4069265


finally the party is over, I've waited for this news,

now people will know I was correct all this time,

I'll get the Presidential medal of freedom for truth,

kek the halls with mistletoe,

ce30f1  No.4091350

Let's look at a few videos before we go through code in a language that is easier for everybody to understand than C (such as Java or C#)

AES Rijndael Cipher explained as a Flash animation (remember to pause)


Lecture 8: Advanced Encryption Standard (AES) by Christof Paar


I will post code for the encryption of a simple message, then for a file, (probably explaining some mathematical concepts along the way.) We will look at the decryption process, then we will outline how a method to decrypt without the cipher key would behave. We will study how our government placed a backdoor in the elliptical curve random number generator. We will get to current cryptanalysis efforts on block ciphers and the flaws in their approach.

We'll explore the idea that true, unbreakable mathematical security requires the key to be the same size as the plaintext (which is how One-Time-Pads work), and that because AES does not do this (that would be highly impractical), the patterns of the cipher key must exist in the cipher text.

ce30f1  No.4091757

File: 722316cc35b7b0d⋯.png (243.69 KB, 1622x647, 1622:647, AES_001.png)

File: ba20c6ae245704c⋯.pdf (3.3 MB, A-Mathematical-Theory-of-C….pdf)

File: dd5907000cbd048⋯.png (138.42 KB, 1060x833, 1060:833, AES_002.png)

File: d334538e36f6f6a⋯.png (105.19 KB, 884x908, 221:227, AES_003.png)

Thank you for your time. There is much to learn.

ce30f1  No.4092020


Some background, since Claude Shannon's work deals a lot in probabilities.

Probability Part 1: Rules and Patterns: Crash Course Statistics #13


Probability Part 2: Updating Your Beliefs with Bayes: Crash Course Statistics #14


ce30f1  No.4092255



d2b5f3  No.4110866


The Vril hybrid clones all look the same to me, Holmes.

d2b5f3  No.4126053

File: 0face4ff15cc24e⋯.png (124.8 KB, 300x353, 300:353, rode0.png)

I saved the WL insurance files when they were first posted.

Going through my backups I found this file. I remember it being the first one. I don't see it mentioned here.


Size 1,456,870 KB

Date Created 2011.03.27 18:59

MD5: cce54d3a8af370213d23fcbfe8cddc8619a0734c

SHA1: 94a032849b1f446e3a1ed06cf4867a56

Can anybody confirm this, or am I lost? Thx

598c49  No.4144385


And seeing what these stupid shills leaked here without meaning to, I am ROLLING. its obvious its a blockchain. Wasn't obvious right away, because its not linear like we're used to…. until the stupid idiots let it slip. thank you STUPIDS! huehue!!!

On the clock, The precedent block that a block unlocks, rather than being the one right before it in a tidy chain, is found mirrored on the clock in the past. "future unlocks past'. It goes out on a distributed network, and we're p2p nodes each working on verifying the transactions. The clock is the algorithm. And new blocks get made with new transactions so the clock added new blocks (more dates.)

I'm going to take more interest in the Qclock for my own satisfaction. But we don't have to try to solve it, as it is solving itself over time!

cf6805  No.4145520

Dollars to donuts this is an enveloping problem within a dynamically generated photorealistic mesh driven by a performance capture system designed to re-create anyone visually with an augmented voice generator and what we see here is the lighting in the area of the eye lid losing its enveloping to the mesh. As the lighting value flickers slightly and loses its lock for a fraction of a second, the system corrects moments later and rebuilds a motion path to correct for the loss of cohesion. I would say this is not Assange at all but a 3d recreation of him played by an actor and the voice is dynamically rebuilt using samples rendering a nearly indistinguishable from reality 3d model.

I would venture to say, Assange may be dead already. Either this or he is a shapeshifter. Lol.

eb5c5e  No.4145587

File: efce90f2e67d000⋯.jpg (85.05 KB, 960x720, 4:3, IMG_20181129_015212.jpg)


Had a good laugh. Thats basically my impression of clockfags. Purpose - confuse newbs and normies, and boost gullible idiots morale.. but for what. I wonder why it always gets notabled as its quite an easy way to help strawman any reasonable persons opinion on q shit. I thought for a while its some haxor math nerds coded shit for insiders brighter and with more time than me but now it doesnt seem too organic and mostly pure bs. Its gematria fags working against clear thinking here, i disregard all their revelations, change my mind kek.

ce30f1  No.4149709


A small plaintext would be good to test decryption on, since we will be going through the decryption process, with and without the key.

0a12d9  No.4170969


598c49  No.4222315



as if any of us have the pc resources. NSA will have to take that up

f43355  No.4274991

I'm pretty sure this is the transaction that WikiLeaks sent Seth Rich for payment for the emails


8b0ac3  No.4287630

File: 1cc8d2fad13a4fb⋯.pdf (289.4 KB, Intro-to-Cryptanalysis.pdf)


It doesn't need that many equations, the approach is convoluted. Think matrix representations of linear equations. When this is all over the solution will appear obvious.

8f5aae  No.4315131

File: f2d3d7ed36c95fd⋯.jpg (85.33 KB, 548x864, 137:216, 0f42fb266a95270cdf8043ee42….jpg)

Can we test this ?

598c49  No.4370596


Transaction View information about a bitcoin transaction


1HB5XMLmzFVj8ALj6mfBsbifRoD4miY36v (WikiLeaks ) (0.2205704 BTC - Output)

1HB5XMLmzFVj8ALj6mfBsbifRoD4miY36v (WikiLeaks ) (0.1949 BTC - Output)

1HB5XMLmzFVj8ALj6mfBsbifRoD4miY36v (WikiLeaks ) (0.01728249 BTC - Output)

1HB5XMLmzFVj8ALj6mfBsbifRoD4miY36v (WikiLeaks ) (0.25042572 BTC - Output)

1HB5XMLmzFVj8ALj6mfBsbifRoD4miY36v (WikiLeaks ) (0.125 BTC - Output)

1HB5XMLmzFVj8ALj6mfBsbifRoD4miY36v (WikiLeaks ) (0.1 BTC - Output)

1HB5XMLmzFVj8ALj6mfBsbifRoD4miY36v (WikiLeaks ) (1 BTC - Output)

1HB5XMLmzFVj8ALj6mfBsbifRoD4miY36v (WikiLeaks ) (0.27681114 BTC - Output)

1HB5XMLmzFVj8ALj6mfBsbifRoD4miY36v (WikiLeaks ) (1 BTC - Output)

1HB5XMLmzFVj8ALj6mfBsbifRoD4miY36v (WikiLeaks ) (0.0323 BTC - Output)

1HB5XMLmzFVj8ALj6mfBsbifRoD4miY36v (WikiLeaks ) (0.22320626 BTC - Output)

1HB5XMLmzFVj8ALj6mfBsbifRoD4miY36v (WikiLeaks ) (0.15 BTC - Output)

1HB5XMLmzFVj8ALj6mfBsbifRoD4miY36v (WikiLeaks ) (0.1292 BTC - Output)

1HB5XMLmzFVj8ALj6mfBsbifRoD4miY36v (WikiLeaks ) (0.01724673 BTC - Output)

1HB5XMLmzFVj8ALj6mfBsbifRoD4miY36v (WikiLeaks ) (0.1 BTC - Output)

1HB5XMLmzFVj8ALj6mfBsbifRoD4miY36v (WikiLeaks ) (0.10996773 BTC - Output)

1HB5XMLmzFVj8ALj6mfBsbifRoD4miY36v (WikiLeaks ) (0.11575413 BTC - Output)

1HB5XMLmzFVj8ALj6mfBsbifRoD4miY36v (WikiLeaks ) (0.1 BTC - Output)

1HB5XMLmzFVj8ALj6mfBsbifRoD4miY36v (WikiLeaks ) (0.2 BTC - Output)

1HB5XMLmzFVj8ALj6mfBsbifRoD4miY36v (WikiLeaks ) (0.013006 BTC - Output)

1HB5XMLmzFVj8ALj6mfBsbifRoD4miY36v (WikiLeaks ) (0.2 BTC - Output)

1MCXpf3kQ97Wbz5NzoW426XxLHQ34wdzHV - (Spent) 4.575 BTC

12iwPr1f37eJveAhrHYXU1p3qbtJzWWKgW - (Spent) 0.00027793 BTC

Output Scripts

DUP HASH160 PUSHDATA(20)[dd90d1e377c9ba26f57e62d6d8e2b45b35aaf657] EQUALVERIFY CHECKSIG

DUP HASH160 PUSHDATA(20)[12e696003fa73a6e4f10e318e3d4e1a387df3829] EQUALVERIFY CHECKSIG

5634e4  No.4388057


598c49  No.4457967


tis the night to save offline

598c49  No.4511172

bb6dfb  No.4537562


Thanks for the bumps. I'm back.

bb6dfb  No.4537573

Would anyone like to come forward to select a programming language that they are good with?

598c49  No.4604836


mad hatter

21a78c  No.4672958

943c64  No.4675341

4all, forall

598c49  No.4757799


Laura Loomer bump

598c49  No.4831299


no progress for a while, but still working

7c8571  No.4931801


cc571f  No.4933647

792fa7  No.4935051

Intel Exchange had a post that said the keys for the files have been found and provided a very detailed post detailing how to access the contents. It also had a disclaimer saying that anyone in a UN country should not download them as people who have tried to access them were dissapearing/xkeyscored.

I didn't have the right setup at the time, so I never downloaded them to verify if it was a legit post. Shortly after, the website went down and has remained offline, as far as I know. If there is an archive of this website, instructions for the keys may exist. Are there any tor archiving services? I'll have to check and see if I saved/screenshot it.

598c49  No.4961276


what was the domain? someone usually archives such important posts on archive.is

this one?


792fa7  No.4972642



792fa7  No.4972727


There is also a long and detailed bunker on endchan (tor) that was made after the embassy was raided. They were working on scripts to scan transactions on the blockchain for messages, among other things. Good read

3beb91  No.4989657


You sound super smart and all with your big words. Would you please give me an example of a 'linear equation' that you're referencing, and then supply a "matrix representation" of said linear equation. I don't often get a chance to correspond with someone who can "think" like you obviously can. I'm hoping that you can detail the equation on a single piece of paper.

ca63df  No.5038028

ASSange(L) is a Faggots wet dream of not getting it done ✅

598c49  No.5149229



server no longer found. all that work

f93cb7  No.5150874

A large archive of important info and links


f93cb7  No.5150922


Torch claims to have cached copies of certain onions but they aren't free. Not sure of any other DW caches. Anyone?

808848  No.5214992

This thread is ridiculous. I'm starting to think these insurance file threads ware written by bots. They are all the same. They all contain the exact same information that was presented in the last one. They're all dumb as fuck. The only relevant question is whether the passwords have been released- and they haven't.

f93cb7  No.5256419


The point is to make the information easily accessible for those digging you fucktard, so contribute or stfu.

952489  No.5351857

File: 7c1c3b37168428d⋯.png (1.39 MB, 1840x1040, 23:13, pepe-akIRAbebestgotthathit….png)

File: b1ce70c9e465c2a⋯.png (83.62 KB, 641x290, 641:290, notagame.png)

took you long enough | nos

952489  No.5355636

File: 8535630b583918a⋯.png (623.51 KB, 1280x708, 320:177, mpv-shot0012.png)

can i get a quick run down of real and fake insurance files not from wl official site and possible different torrent files

952489  No.5355673


now entering the town of twin peaks diane

todays date, february 24

952489  No.5356170


1d2bb9  No.5356202


you cracked it?? and its a fucking stage direction from a david lynch script?!

e35bbc  No.5356875


One of JA's earlier passwords was a phrase from i think jfk. Something about "shattering the cia into a thousand pieces"

d6b45d  No.5373076

File: 652aadf5f48709e⋯.png (283.44 KB, 253x536, 253:536, 1688dcyprianidemarojaopera….png)

File: a5292d46503592c⋯.png (283.04 KB, 1920x1080, 16:9, screenshot_20190225-005937….png)


nah thats sha224sum of sha224sum

but im thinking so, i havent hashed them yet but im working off of

"le ss: high kicks and bad gahmen"

"oliver clothes off with a twist (twistin in the wind) at the end"

then i received "easier: sed. then done"

des? or a way to strip the hex…

help me solve this puzzle

i was meditating and i had them appear in my mind. so yeah im using lynch tactics, as in "noos" but that time stamp from NYST beacon (oracle, the) is very interesting because it says TO OZ essentially

this time im playing it a little safer couple 1 2 vms deep

also i was thinking A B C


either the ghost of JA is haunting me (ive had several dreams) or im somehow tuning into what hes sending out from a cell deep in meditation.

or im going nuts for sophia… but thats another story altogether

unrelated, possibly, latin for quantum reddit (youll have to see for yourself)

very interesting, this was my captcha

if you're out there mate, ff makes all the difference and coincidences are a funny thing

952489  No.5412559

File: 7643b2eea88bbee⋯.jpeg (10.97 KB, 120x255, 8:17, cassandra.jpeg)

598c49  No.5414160

The nonsense-speaking slide shills are back again, COINCIDENTALLY at the same time Wikileaks is in the news cycle

952489  No.5430435

someone is going to have to get the real insurance files from the blockchain from a non nato country

im sure someone is looking into it

952489  No.5461486

File: dad7dfa561e56b2⋯.jpg (55.53 KB, 480x360, 4:3, bobbybriggs.jpg)

well 224 (442 flipped) got me this far

for me i need to know how its encoded RGB

maybe just cut into strips, with lines echoed in between, then stiched up

This is straight from twin peaks

you're mistaking bots for autism


a43189  No.5578435


none known here

50badf  No.5649388

File: df31d3b26f1bbfb⋯.png (611.94 KB, 980x646, 490:323, youve_got_to_be_kid_fuckin….png)

Prince Andrew


Two days

598c49  No.5767924


f93cb7  No.5820837

Good call.


a32e47  No.5832784

amidst the shilling sliding negative comments, i'd just like to say thanks for any hard work put into this! Seems very interesting but way above my level of understanding, i don't know how you guys know where to begin!

45d390  No.5833446

File: e919a497a3d9e4b⋯.png (109.79 KB, 1188x674, 594:337, ClipboardImage.png)



63b6f9  No.5835410

File: b6bd0bd6e6e3c36⋯.png (56.96 KB, 646x360, 323:180, precommits.png)



a32e47  No.5835828



a32e47  No.5835908

File: 26fd4884d713317⋯.png (43.39 KB, 646x283, 646:283, 26fd4884d7133177f049b70313….png)

So we have 1?

a32e47  No.5835913

File: d7cdded6d091372⋯.jpg (36.07 KB, 625x323, 625:323, Capture.JPG)


a32e47  No.5835940

File: 19c58fa664cdbca⋯.jpg (34.48 KB, 615x318, 205:106, Capture3.JPG)


a32e47  No.5835951

and then we have the most current as per above?


598c49  No.5837790

File: c25d6ee5ca3063c⋯.png (35.3 KB, 604x307, 604:307, coming.PNG)


‏Verified account @wikileaks



sin.tgz.gpg: 7e3e7aa80298072d507a8c5bb4b7272caa8fcda693f64db7c44c63f801387bc8

4:00 PM - 22 Mar 2019

2b954a  No.5838395

using System;

namespace AES
class AESLib
/* Tables */
public static byte[] s_box;

public static byte[] s_box_hardcode =
{0x63 ,0x7c ,0x77 ,0x7b ,0xf2 ,0x6b ,0x6f ,0xc5 ,0x30 ,0x01 ,0x67 ,0x2b ,0xfe ,0xd7 ,0xab ,0x76
,0xca ,0x82 ,0xc9 ,0x7d ,0xfa ,0x59 ,0x47 ,0xf0 ,0xad ,0xd4 ,0xa2 ,0xaf ,0x9c ,0xa4 ,0x72 ,0xc0
,0xb7 ,0xfd ,0x93 ,0x26 ,0x36 ,0x3f ,0xf7 ,0xcc ,0x34 ,0xa5 ,0xe5 ,0xf1 ,0x71 ,0xd8 ,0x31 ,0x15
,0x04 ,0xc7 ,0x23 ,0xc3 ,0x18 ,0x96 ,0x05 ,0x9a ,0x07 ,0x12 ,0x80 ,0xe2 ,0xeb ,0x27 ,0xb2 ,0x75
,0x09 ,0x83 ,0x2c ,0x1a ,0x1b ,0x6e ,0x5a ,0xa0 ,0x52 ,0x3b ,0xd6 ,0xb3 ,0x29 ,0xe3 ,0x2f ,0x84
,0x53 ,0xd1 ,0x00 ,0xed ,0x20 ,0xfc ,0xb1 ,0x5b ,0x6a ,0xcb ,0xbe ,0x39 ,0x4a ,0x4c ,0x58 ,0xcf
,0xd0 ,0xef ,0xaa ,0xfb ,0x43 ,0x4d ,0x33 ,0x85 ,0x45 ,0xf9 ,0x02 ,0x7f ,0x50 ,0x3c ,0x9f ,0xa8
,0x51 ,0xa3 ,0x40 ,0x8f ,0x92 ,0x9d ,0x38 ,0xf5 ,0xbc ,0xb6 ,0xda ,0x21 ,0x10 ,0xff ,0xf3 ,0xd2
,0xcd ,0x0c ,0x13 ,0xec ,0x5f ,0x97 ,0x44 ,0x17 ,0xc4 ,0xa7 ,0x7e ,0x3d ,0x64 ,0x5d ,0x19 ,0x73
,0x60 ,0x81 ,0x4f ,0xdc ,0x22 ,0x2a ,0x90 ,0x88 ,0x46 ,0xee ,0xb8 ,0x14 ,0xde ,0x5e ,0x0b ,0xdb
,0xe0 ,0x32 ,0x3a ,0x0a ,0x49 ,0x06 ,0x24 ,0x5c ,0xc2 ,0xd3 ,0xac ,0x62 ,0x91 ,0x95 ,0xe4 ,0x79
,0xe7 ,0xc8 ,0x37 ,0x6d ,0x8d ,0xd5 ,0x4e ,0xa9 ,0x6c ,0x56 ,0xf4 ,0xea ,0x65 ,0x7a ,0xae ,0x08
,0xba ,0x78 ,0x25 ,0x2e ,0x1c ,0xa6 ,0xb4 ,0xc6 ,0xe8 ,0xdd ,0x74 ,0x1f ,0x4b ,0xbd ,0x8b ,0x8a
,0x70 ,0x3e ,0xb5 ,0x66 ,0x48 ,0x03 ,0xf6 ,0x0e ,0x61 ,0x35 ,0x57 ,0xb9 ,0x86 ,0xc1 ,0x1d ,0x9e
,0xe1 ,0xf8 ,0x98 ,0x11 ,0x69 ,0xd9 ,0x8e ,0x94 ,0x9b ,0x1e ,0x87 ,0xe9 ,0xce ,0x55 ,0x28 ,0xdf
,0x8c ,0xa1 ,0x89 ,0x0d ,0xbf ,0xe6 ,0x42 ,0x68 ,0x41 ,0x99 ,0x2d ,0x0f ,0xb0 ,0x54 ,0xbb ,0x16};

public static void Init() {

private static void InitSBox() {
s_box = new byte[256]; ''//''256 = 2^8
byte p = 1, q = 1;

do {
p = multiply(p, 3);
q = multiply(q, 246);

int transform = q ^ cls(q, 1) ^ cls(q, 2) ^ cls(q, 3) ^ cls(q, 4);
s_box[p] = (byte) (transform ^ 99);

} while (p != 1);

s_box [0] = 99;

/* Circular left shift
* returns x <<< y
private static byte cls(byte x, byte y) {

y = (byte) (y % 8);

byte a = (byte) (x << y);
byte b = (byte) (x >> (8 - y));
return (byte) (a | b);

/* GF(2^8) multiplication method taken from https:''//''en.wikipedia.org/wiki/Rijndael_MixColumns */
private static byte multiply(byte a, byte b) {
byte p = 0;

for (int counter = 0; counter < 8; counter++) {
if ((b & 1) != 0) {
p ^= a;

bool hi_bit_set = (a & 128) != 0;
a <<= 1;
if (hi_bit_set) {
a ^= 27; /* x^8 + x^4 + x^3 + x + 1 */
b >>= 1;

return p;

public static void Main (string[] args)
Console.WriteLine("[{0}]", string.Join(", ", s_box));
Console.WriteLine("[{0}]", string.Join(", ", s_box_hardcode));

2b954a  No.5838525

Important to understand this modular arithmetic to understand AES. The reason multiplication has to have its own method is because multiplication over a nonprime Galois field GF(2^8) is not the same as multiplying two integers and moduloing the result to the modulus (as in a prime Galois field). It requires the use of a polynomial.


Above is implementation of this article in C#: https://en.wikipedia.org/wiki/Rijndael_S-box

2b954a  No.5838549

Will append the generation of the inverse s_box soon.

45d390  No.5840405

File: 930ce7bd46938ce⋯.png (124.32 KB, 679x265, 679:265, ClipboardImage.png)


NSA deleted tweet…same initial sequence…


a7ad7d  No.5843576

File: 1d8cfa044895df5⋯.jpg (23.12 KB, 468x204, 39:17, WL-Insurance-Capture 1.JPG)


Is this of any interest?


827241  No.5860296




(Primitive root modulo n = generator)

A multiplicative inverse is a number that undoes multiplicative by a certain number, it is the replacement division operation in modular arithmetic. For example, if we are operating in GF(61), that is, all integers modulo 61, and we calculate some modular inverses:

modular inverse of 5 (% 61) = 49; (5 * 49) % 61 = 1

modular inverse of 29 (% 61) = 40; (29 * 40) % 61 = 1

Then we can use them to multiply and undo multiplication like so:

(5 * 29) % 61 = 23

(23 * 40) % 61 = 5

(23 * 49) % 61 = 29

By multiplying by the multiplicative inverse of each factor, we undid the multiplication.

The Rijndael s-box (substitution box; lookup table) is an array created using a generator. A generator in modular arithmetic is a value that when squared by consecutive powers continues to produce a unique value until every number in the modular field has been exhausted, thus, it is said to have a periodicity of the modulus minus one. Its purpose in AES serves to obscure the relationship between key and ciphertext.

In our code to generate the s-box, p starts out equalling 3, which means by multiplying it by 3 (over GF(2^8)) we are squaring it over and over again to generate a seemingly randomly placed but unique value <= 256. Our q value is the same thing, except we are going through its series of unique values backwards by squaring the multiplicative inverse of 3 (246 under our Galois field) over and over again. So with each unique value from the generator, we then calculate a circular left shift on q by 1, then the value by cls(q,2), then xor by cls(q,3), then xor by cls(q,4), then xor by 99. This entire design was developed with the cryptographical concept of nonlinearity in mind - obscuring the correlation between input and output. This is how it resists linear and differential cryptanalysis.

Once we have generated our s-box, we create our inverse s-box simply by switching index and value (ie s_box[0] = 99, inverse_s_box[99] = 0).

827241  No.5860313


Correction: < 256

Correction: then xor the value by cls(q,2)

827241  No.5860321

using System;

namespace AES
class AESLib
/* Tables */
public static byte[] s_box;

public static byte[] inverse_s_box;

public static byte[] inverse_s_box_hardcode = {
0x52, 0x09, 0x6A, 0xD5, 0x30, 0x36, 0xA5, 0x38, 0xBF, 0x40, 0xA3, 0x9E, 0x81, 0xF3, 0xD7, 0xFB,
0x7C, 0xE3, 0x39, 0x82, 0x9B, 0x2F, 0xFF, 0x87, 0x34, 0x8E, 0x43, 0x44, 0xC4, 0xDE, 0xE9, 0xCB,
0x54, 0x7B, 0x94, 0x32, 0xA6, 0xC2, 0x23, 0x3D, 0xEE, 0x4C, 0x95, 0x0B, 0x42, 0xFA, 0xC3, 0x4E,
0x08, 0x2E, 0xA1, 0x66, 0x28, 0xD9, 0x24, 0xB2, 0x76, 0x5B, 0xA2, 0x49, 0x6D, 0x8B, 0xD1, 0x25,
0x72, 0xF8, 0xF6, 0x64, 0x86, 0x68, 0x98, 0x16, 0xD4, 0xA4, 0x5C, 0xCC, 0x5D, 0x65, 0xB6, 0x92,
0x6C, 0x70, 0x48, 0x50, 0xFD, 0xED, 0xB9, 0xDA, 0x5E, 0x15, 0x46, 0x57, 0xA7, 0x8D, 0x9D, 0x84,
0x90, 0xD8, 0xAB, 0x00, 0x8C, 0xBC, 0xD3, 0x0A, 0xF7, 0xE4, 0x58, 0x05, 0xB8, 0xB3, 0x45, 0x06,
0xD0, 0x2C, 0x1E, 0x8F, 0xCA, 0x3F, 0x0F, 0x02, 0xC1, 0xAF, 0xBD, 0x03, 0x01, 0x13, 0x8A, 0x6B,
0x3A, 0x91, 0x11, 0x41, 0x4F, 0x67, 0xDC, 0xEA, 0x97, 0xF2, 0xCF, 0xCE, 0xF0, 0xB4, 0xE6, 0x73,
0x96, 0xAC, 0x74, 0x22, 0xE7, 0xAD, 0x35, 0x85, 0xE2, 0xF9, 0x37, 0xE8, 0x1C, 0x75, 0xDF, 0x6E,
0x47, 0xF1, 0x1A, 0x71, 0x1D, 0x29, 0xC5, 0x89, 0x6F, 0xB7, 0x62, 0x0E, 0xAA, 0x18, 0xBE, 0x1B,
0xFC, 0x56, 0x3E, 0x4B, 0xC6, 0xD2, 0x79, 0x20, 0x9A, 0xDB, 0xC0, 0xFE, 0x78, 0xCD, 0x5A, 0xF4,
0x1F, 0xDD, 0xA8, 0x33, 0x88, 0x07, 0xC7, 0x31, 0xB1, 0x12, 0x10, 0x59, 0x27, 0x80, 0xEC, 0x5F,
0x60, 0x51, 0x7F, 0xA9, 0x19, 0xB5, 0x4A, 0x0D, 0x2D, 0xE5, 0x7A, 0x9F, 0x93, 0xC9, 0x9C, 0xEF,
0xA0, 0xE0, 0x3B, 0x4D, 0xAE, 0x2A, 0xF5, 0xB0, 0xC8, 0xEB, 0xBB, 0x3C, 0x83, 0x53, 0x99, 0x61,
0x17, 0x2B, 0x04, 0x7E, 0xBA, 0x77, 0xD6, 0x26, 0xE1, 0x69, 0x14, 0x63, 0x55, 0x21, 0x0C, 0x7D};

public static void init() {

private static void init_s_box() {
s_box = new byte[256]; ''//''256 = 2^8
inverse_s_box = new byte[256];
byte p = 1, q = 1; ''//''first values in the loop are 3 and 246

do {
p = multiply(p, 3);
''//''values of p begin as: 3, 5, 15, 17, 51, 85, 255
''//''Console.WriteLine("p = " + p);

/* dividing q by 3 = multiplying by 246 in GF(2^8) */
''//''values of q begin as: 246, 82, 199, 180, 108, 36, 28
q = multiply(q, 246);
''//''Console.WriteLine("q = " + q);

int shift = q ^ cls(q, 1) ^ cls(q, 2) ^ cls(q, 3) ^ cls(q, 4);
byte xor = (byte) (shift ^ 99);

/* The inverse s box is the opposite of the s-box, simply generated by switching value and index. */
s_box[p] = xor;
inverse_s_box[xor] = p;

} while (p != 1);

s_box [0] = 99;
inverse_s_box [99] = 0;

/* Circular left shift
* returns x <<< y
private static byte cls(byte x, byte y) {

y = (byte) (y % 8);

byte a = (byte) (x << y);
byte b = (byte) (x >> (8 - y));
return (byte) (a | b);

/* GF(2^8) multiplication method taken from https:''//''en.wikipedia.org/wiki/Rijndael_MixColumns */
private static byte multiply(byte a, byte b) {
byte p = 0;

for (int counter = 0; counter < 8; counter++) {
if ((b & 1) != 0) {
p ^= a;

bool hi_bit_set = (a & 128) != 0;
a <<= 1;
if (hi_bit_set) {
a ^= 27; /* x^8 + x^4 + x^3 + x + 1 */
b >>= 1;

return p;

public static void Main (string[] args)
Console.WriteLine("[{0}]", string.Join(", ", inverse_s_box));
Console.WriteLine("[{0}]", string.Join(", ", inverse_s_box_hardcode));

73e33a  No.5886101

Say clock fag one more time, I dare you

06f874  No.5957238



BTW I have 2 or 3 insurance files. I have to dig them out of my hdd but im not sure what to do next. or if you guys want them

598c49  No.5958152


yes we want them

redundancy is never redundant

and they might be good ones that fill in some of our holes

808848  No.5958938

I keep seeing this same stupid fucking larp thread over and over again. The passwords haven't been released.

808848  No.5958942


>redundancy is never redundant

true Qcultist dipshittery.

ce30f1  No.5969121


That's why I'm releasing them

d8b2b5  No.5969381


Test, don’t think I’m getting through

016cf5  No.5974605

File: 12b5dc6bc4872fd⋯.png (560.21 KB, 656x801, 656:801, sakula-yuki.png)

Patriots remember!!

2c09dd  No.6035291

File: a1dd1f3f59ffd9e⋯.png (1.87 MB, 1652x10050, 826:5025, VQC-map5-2.png)

Does this belong here?

598c49  No.6120503

Bun on JA/Wikileaks


e16143  No.6133258

File: 404e3bdcd53dd3e⋯.png (559.61 KB, 638x662, 319:331, ClipboardImage.png)



cf762b  No.6134361


If this was done for any reason other than to start setting him free, then it's unforgivable.

50badf  No.6139861

File: 7d4adf5dd19091d⋯.png (208.27 KB, 853x733, 853:733, icarus.png)


Blackmail can be rendered worthless without having to use it.

Find the weakness. Free the world

7710a6  No.6140885


It wasn't. It is what Trump and all the other establishment want. He has dirt on everyone.

They all want JA dead. Q is a fucking pansyAss trying to shame anyone on the mark with the larp label.

The only things Q got right is "PRAY"…but many already do that, so it's no great revelation. Future proves Q is and was all SHIT.

Trump is shitting all over us and fake patriots are shilling for him. Wunderbar!

3b77d3  No.6144623


nah. Trump wants JA ON THE RECORD :-)

'cause tards aren't ready to know how much Trouble DEM in…


b579cf  No.6144801


64619f  No.6144933



What do?

598c49  No.6145492

File: 637e5d8ce819229⋯.jpg (398.3 KB, 1080x1560, 9:13, 0a9227a855804a6da56aafb42c….jpg)

File: 43bf480708ab3a3⋯.jpg (140.64 KB, 1177x946, 107:86, 43bf480708ab3a38999f0a0311….jpg)

File: 99a4faa56923a1f⋯.jpg (61.12 KB, 449x530, 449:530, 620a805e1ee9130f985a0b770d….jpg)

File: dbb4467b8c00607⋯.jpg (763.54 KB, 1080x1774, 540:887, b2b9b65e3d1a667f2a992a4be0….jpg)

File: 3aa5765321aff85⋯.jpg (77.9 KB, 494x728, 19:28, c66faf36b427013a555bb51b79….jpg)

for those that missed them on the first pass

ea9eeb  No.6145672

JA was today (4/11) arrested on an extradition order…7 years…

This is for eleven = 9/11.

46338f  No.6145729


ok encryption makes this less than obvious (would this be a truism? kek). is there a link to readme.md or is it in the link i just search page for keyword to get explainer?

46338f  No.6145762


so this guy wasnt just fucking around… I'll wonder later whether or not elihu priest is similar (guy with knowledge of blackop accounts under name white spiritual boy)

598c49  No.6146714

Independent work so far confirms concurrent work here










Further reading:










Cryptic Tweets and potential key clues

pre-commitment 1: John Kerry 4bb96075acadc3d80b5ac872874c3037a386f4f595fe99e687439aabd0219809

pre-commitment 2: Ecuador eae5c9b064ed649ba468f0800abf8b56ae5cfe355b93b1ce90a1b92a48a9ab72

pre-commitment 3: UK FCO f33a6de5c627e3270ed3e02f62cd0c857467a780cf6123d2172d80d

eta numeris 392D8A3EEA2527D6AD8B1EBBAB6AD

sin topper D6C4C5CC97F9CB8849D9914E516F9

project runway 847D8D6EA4EDD8583D4A7DC3DEEAE

7FG final request 831CF9C1C534ECDAE63E2C8783EB9

fall of cassandra 2B6DAE482AEDE5BAC99B7D47ABDB3

Insurance File 1 Partial Decrypt

This was the first insurance file distributed by wikileaks back in 2010 :


This file can be partially decrypted - take one layer of the onion off with this command

openssl enc -d -aes-256-cbc -in insurance.aes256 -out insurance -k "ONION"

bbd470  No.6149582

File: 095fa7927bbf9d9⋯.jpg (133.13 KB, 549x825, 183:275, electric jullian.jpg)

File: 028466f33dac7a9⋯.jpg (134.91 KB, 549x825, 183:275, pain.jpg)

File: 4c5be3f5228b2e3⋯.jpg (135.83 KB, 549x825, 183:275, panic.jpg)

File: 52f4985d253dcfe⋯.jpg (140.89 KB, 549x825, 183:275, the source.jpg)

bbd470  No.6149597

File: d50b881f6287292⋯.jpg (137.93 KB, 549x825, 183:275, level up.jpg)

File: 45e045d54fa08a6⋯.jpg (142.14 KB, 549x825, 183:275, stealth bomber.jpg)

File: 7c18025a7893f02⋯.jpg (141.04 KB, 549x825, 183:275, over target.jpg)

File: 5a2ac1ae717e08d⋯.jpg (139.92 KB, 549x825, 183:275, bombs away.jpg)

bbd470  No.6149608

File: 6075699b270f1f6⋯.jpg (140.9 KB, 549x825, 183:275, night shift.jpg)

File: b04d71e99e77e5f⋯.jpg (140.64 KB, 549x825, 183:275, reeee.jpg)

File: 8fd1a0ab54638fb⋯.jpg (141 KB, 549x825, 183:275, brt.jpg)

File: 8bfd4b60301bd9d⋯.jpg (139.02 KB, 549x825, 183:275, comfey.jpg)

bbd470  No.6149616

File: 7bfb21033e2e7a2⋯.jpg (134.04 KB, 549x825, 183:275, Julian 2.jpg)

File: b560e734d733f1c⋯.jpg (144.36 KB, 549x825, 183:275, wizard.jpg)

File: 86cf000b6df629b⋯.jpg (141.14 KB, 549x825, 183:275, perfect.jpg)

bbd470  No.6149624

File: efd1c0dda1179c2⋯.jpg (29.8 KB, 459x600, 153:200, level up2.jpg)

File: 02c92f53917f1fd⋯.jpg (39.96 KB, 460x600, 23:30, est and pepe.jpg)

File: b6f97801dbcc344⋯.jpg (29.75 KB, 442x600, 221:300, j sauce.jpg)

File: 2793974bae458b0⋯.jpg (32.91 KB, 442x600, 221:300, based sauce.jpg)

File: 43c568ca56b4d51⋯.jpg (82.68 KB, 531x852, 177:284, 411.jpg)

bbd470  No.6149631

File: 3bcd2f361597c74⋯.jpg (86.05 KB, 531x852, 177:284, jaw.jpg)

File: 40f849c603b918d⋯.jpg (91.28 KB, 531x852, 177:284, wb.jpg)

46338f  No.6149661


these are gonna be like rare pepes in the years to come

46338f  No.6149669


can i get a pew pew pew?

dc17ee  No.6149678


they are gonna be cringey shitpost moment they posted

46338f  No.6149712


Gonna be handy when the bakers wants to wrap shit up and lets us drop the memes for funsies

e35bbc  No.6158738

a ram clear dump


possibly the original 2012 64Gb file






5abb35  No.6161213

File: 94debf2757836a1⋯.jpg (73.87 KB, 872x924, 218:231, pepe kek.jpg)



Pew pew pew?

70eb51  No.6162905

Lawyer was very specific Assange wanted me to thank his supporters blah blah.. he said "I told you so"

LSt is Out of place. Also many homonyms

I tolled you sow … etc.

e35bbc  No.6168457

620ec1c72a087f39da0ed4544b13661959243861d94de32bc467e22bd156b2c8 2016-06-03_insurance.aes256.torrent

0c7fcd70aea059af6afede372a35f41e5cd4d745a08e94a9e47b6b3bb932b081 wikileaks-insurance-20120222.tar.bz2.aes.torrent

c8adcb0f0a066d77d2850046849d6c6ddcc52a73d4a4280eb845745e885489d2 wlinsurance-20130815-A.aes256.torrent

56ada05ed025d135db3e5ee0762bcf7116a3e5c66354b37fb507a4d57add2923 wlinsurance-20130815-B.aes256.torrent

1f1c20edb6e4c69300a198ea8c5c85de5b3680d7841d82c93ab875c2e9f472da wlinsurance-20130815-C.aes256.torrent

Those files dispute twitter yes?? You need proofs??? Super critical must checks.

Timestamping!!!!! See https://petertodd.org/2016/opentimestamps-announcement See https://github.com/opentimestamps/opentimestamps-client


WikiLeaks MEGA Pack - October 2016 - 558.16GB

MAGNET LINK: magnet:?xt=urn:btih:bfdapmx6ctlmvklazao6wtiyrei5jplt



1. Every WikiLeaks insurance file released to date:

File: WikileaksWarDiaryInsurance/insurance.aes256 – 1.49GB

SHA256 Hash: 15bac5e815a38a998f4705945bd41975b736e7c723cfe851b9ed0e50c49316b4

File: wikileaks-insurance-20120222.tar.bz2.aes – 64.32GB

SHA256 Hash: 61a70c6062ab1712948381d4bd35cbf67aad6365a5bb4723c259fd1e253344c3

File: wlinsurance-20130815-A.aes256 – 3.32GB

SHA256 Hash: 6688fffa9b39320e11b941f0004a3a76d49c7fb52434dab4d7d881dc2a2d7e02

File: wlinsurance-20130815-B.aes256 – 46.48GB

SHA256 Hash: 3dcf2dda8fb24559935919fab9e5d7906c3b28476ffa0c5bb9c1d30fcb56e7a4

File: wlinsurance-20130815-C.aes256 – 325.39GB

SHA256 Hash: 913a6ff8eca2b20d9d2aab594186346b6089c0fb9db12f64413643a8acadcfe3

File: 2016-06-03_insurance.aes256 – 87.63GB

SHA256 Hash: 1df5bcfa13d1e728e6f37a15ba7cd1354e3d1e41b46b1295c3ab835542528bec

e35bbc  No.6168491

File: e9ea94c131036a4⋯.png (183.83 KB, 1876x781, 1876:781, ClipboardImage.png)

Concise timeline of events concerning the Wikileaks Blockchain search and explanation of why it has been impossible to publicly share the keys to the insurance files.

Archived Concise timeline of events concerning the Wikileaks Blockchain search and explanation of why it has been impossible to publicly share the keys to the insurance files


pic related

dfd02d  No.6168690

4chan/pol is struggling to work on decryption

Has anyone tried the code JA tweeted out a couple years ago?

dfd02d  No.6168727

File: f1c2e0813c1c8b8⋯.png (85.04 KB, 1228x512, 307:128, f1c2e0813c1c8b89df99b1ceed….png)

e35bbc  No.6168904

File: d2c4a14985452e7⋯.png (52.98 KB, 644x439, 644:439, ClipboardImage.png)

e35bbc  No.6169078

File: f3494275f9ab7b3⋯.png (921.37 KB, 1902x3184, 951:1592, ClipboardImage.png)


e35bbc  No.6169110

File: 595ebf7dae78a88⋯.png (40.13 KB, 826x181, 826:181, ClipboardImage.png)

3ce342  No.6169144


nuclear-noob question: what are those keys used for?

46338f  No.6169904

File: 90c80be728342eb⋯.jpg (131.92 KB, 558x558, 1:1, beee43299ebbb5ef90d2fc2c83….jpg)


yeah youve not seen the memes with pew pew pew? heres a death blossom pew pew pew. its like brrrrrrtt

46338f  No.6169923


theres another with fembots shooting from boobguns in autin powers. I'll correct its low grade scifi meme version of brrrrrt. think it would rock on pic of floating head assange wizard

46338f  No.6169946


over in things that do not deserve own thread thread someone just posted from halfchan. looks precisely related to what you are saying.

46338f  No.6169965


>>6169084 (stamped 1 hour ago)

>stop spamming /pol/

>Someone from your board was spamming /pol/ recently via Tor and he got all of Tor banned. So now I will shitpost in retaliation. Stick to your containment board and do not bother us again. I know you boomers cannot resist the urge to attack white people on behest of your jewish masters, but next time maybe think of the consequences to yourself before you lash out against a group that is only trying to defend itself from a mass orchestrated genocide.


6cb8cf  No.6170138


This exchange was allegedly between people employed by David Brock.

9de42e  No.6171610

What does Assange use as a password?

9de42e  No.6171637

Does it look like



9de42e  No.6171689

File: 759357762ffa100⋯.png (1.44 MB, 1049x1574, 1049:1574, History of The National Se….png)

File: ffbe5bc615847a3⋯.pdf (2.1 MB, History of The National Se….pdf)

What did Assange walk (re: get dragged) out of the embassy with, again?

9de42e  No.6171814


So we have 10 words

A Collection Of Original interviews With Acclaimed Author Gore Vidal

And now our task is to find out which "collection" of symbols (plus a possible extra word) unlocks some insurance file.

9de42e  No.6172120

It should be obvious why the password is not some 800 character string of random letters - it's not exactly a dead man's switch if you can't even remember the fucking password.

9de42e  No.6172369

Just to get this out of the way, all of these are disinfo and don't work.





9de42e  No.6172401


However, they contain a grain of truth in how Wikileaks passwords are (very likely) structured. A book synopsis makes the most sense. It is possible to be remembered and easily covertly transferred, and if the exact string is lost, it can still be dictionary'd.

9de42e  No.6172502

The file Wikileaks sent to the journalist who leaked Cablegate was a 7z encrypted by gpg. While insurance files are encrypted by openssl and not gpg (see the file analysis on a unix system), it can be safely assumed that WL insurance files are encrypted 7zips, because it would not be a dead man's switch if you could not open it with a simple, predictable process. Not only this, but 7z provides the best level of lossless compression.

Here is a command to decrypt Wikileaks insurance files provided you have the password.

openssl enc -d -aes256 -in wlinsurance-20130815-A.aes256 -out wlinsurance-20130815-A.7z -k "YourFavorite_Disinfo_PasswordHere#"

9de42e  No.6172571


Since there's only one place an adjective similar to "Diplomacy" fits into our book synopsis, (onto Collection), it may be safe to say we don't have to add any extra words. And that would also make sense with this being the DMS. With that in mind, testing our series of words against combinations of special characters becomes feasible.

9de42e  No.6172596

From the password to the secret archive, we know that at the very least, underscores and a pound sign are being used, but there could be other symbols.

Here is where it gets interesting - our book synopsis has the same amount of words as that password minus one. We may not even have to brute force.

9de42e  No.6172612

A Collection Of Original interviews With Acclaimed Author Gore Vidal


That is a really interesting coincedence. Let's try putting them together using our assumption "if it is a dead man's switch, the process to open will be clearly disclosed."


To add to the already MOUNTING evidence we are on the right track, both "with" and "since" are prepositions.

9de42e  No.6172634


We might actually be missing a word still. However, we can try THIS to make the word count exactly the same.


b1096f  No.6172707

File: caabbb99f6f4201⋯.png (874.39 KB, 662x429, 662:429, image.png)

File: 9d19cb4dfe41ed8⋯.png (43.56 KB, 844x649, 844:649, image.png)

9de42e  No.6172793

I currently do not have enough hard drive space to test any passwords against insurance file C yet. Any help with this would be greatly appreciated. Note that you will need 2x the space of that file to decrypt it.

aa5c35  No.6172799


Building secure machine to read files.. but cannot locate the file in the image.

9de42e  No.6172843

File: 02db491c4e07b3c⋯.png (186.18 KB, 612x774, 34:43, puzzle-piece.png)


9de42e  No.6172905

File: 81b75f8835401a8⋯.jpg (4.14 MB, 5000x3333, 5000:3333, 190411192822-pba-assange-a….jpg)

I believe we are getting very close. Test this permutation:


9de42e  No.6172937

"You have more than you know."


b1096f  No.6172963

File: 03862f7497fefc8⋯.png (3.65 MB, 1536x2048, 3:4, image.png)


I don't know how accurate the info is.

I just remember outer heaven and everything being fked up at the time. Still have the origional endchan outer.png somwhere about 40mb.

e949db  No.6173085

Any help welcome.


Version: OpenPGP.js v4.4.10

Comment: https://openpgpjs.org






























8133d4  No.6173144

File: 234b9354c7f1266⋯.jpg (83.72 KB, 864x874, 432:437, ja AST pew pew pew.jpg)

File: f1147f62a57ab95⋯.jpg (49.27 KB, 682x388, 341:194, ja pew.jpg)

abd02c  No.6173182


I don't know if it matters but if you look closely he was carried out. You can see the guys in the back holding his ankles.

838164  No.6173739

File: 1ee4688accf4508⋯.jpg (143.54 KB, 500x400, 5:4, stevejobsaids.jpg)

3f11cf  No.6173788


Illegally Illigally

i before e….gives Illiegally

Il lie gally

his "arrest" is a lie

you are watching a movie, it's a twist in the plot

b1096f  No.6173812


I'm remembering now. That's about similar timeframe when archive.org got comped. A,load of shit got buried in there incl pizza stuff. Trying to remember timelines of stuff. I think the file could of been renamed after the fact but it was a wiki archive with 2016 in the path.

That file I think is the key. I realise that sounds cryptic, that's the way my brain works.

e5f415  No.6173862


The CIA took over wikileaks in 2016 and put up fake files there are 2 versions of the files. The original file can be openned but it triggers Xkeyscore and the fed come if you open it on a internet connected machine.

b1096f  No.6173896


It triggered xkeyscored, internet disconnected.

Rebooted Cisco all good back online.

Thing is, no Feds round here, however they are very where.

e5f415  No.6173927

some one posted about a failsafe being triggered and ie dead man switch as assange was arrested 4pm pst is go hour on it.. we shall see.

b1096f  No.6174037

>>6173862 pb maybe

>>6173896 pb unsure don't click if it's going to piss you off.

Sorry forgot mention that was in 2016

Life travels quickly, but rewinding is good.

b1096f  No.6174118

Anons, anyone know where I can get a modern day Norton disc doctor. I felz I have some files too retrieve. Hdd and sdd plox. -paywall.

594145  No.6174211

File: e6ee93e23524cb2⋯.png (2.88 MB, 1440x1080, 4:3, 28B8690D-D155-4E1D-826E-12….png)

I’m not an autist and this has probably been suggested before…The missing letters and extra letters in Q posts and DJT Tweets..in order from the beginning, could that be a password?

e5f415  No.6174238