[ / / / / / / / / / / / / / ] [ dir / arepa / builders / fa / hispint / irc / sonyeon / sunny / tacos ]

/qresearch/ - Q Research Board

Research and discussion about Q's crumbs
July 2018 Transparency Report
Comment *
Password (Randomized for file and post deletion; you may also set your own.)
* = required field[▶ Show post options & limits]
Confused? See the FAQ.
(replaces files and can be used instead)

Allowed file types:jpg, jpeg, gif, png, webm, mp4, pdf
Max filesize is 16 MB.
Max image dimensions are 15000 x 15000.
You may upload 5 per post.

First time on QResearch? 8chan? Click here, newfag.

File: ef5865111e3ed21⋯.gif (3.32 MB, 960x540, 16:9, 1479533631056.gif)

598c49  No.1722872

Wikileaks Insurance files

working thread

Oct 2016, wikileaks is compromised, Assange disappears, internet goes down to try to stop the drop of WL insurance file keys. Pre-committment hashes were dropped.

False files were loaded onto the web to obfuscate.

Encrypted passwords were also dropped, but were useless without good files.

Good filenames have been located.

The first passwords have gotten through the first layer, but it appears a second layer needs a separate password. I think qresarch has that one. WE have more than we know! But we don't know we have it.

At this moment, 4chan/pol is struggling to work on decryption but their board is overrun by shills. the general shouldn't be disrupted, so this board is for the work. Let's free Assange

34e7e8  No.1722945

File: b9232bc35923859⋯.jpg (166.69 KB, 1288x794, 644:397, 1528855912814.jpg)

File: 6a4861258a35781⋯.jpg (132.96 KB, 1325x842, 1325:842, 1528856275272.jpg)

File: 514edff765e293e⋯.jpg (206.85 KB, 1326x813, 442:271, 1528856298912.jpg)

Can someone explain what these are?

739eeb  No.1722969

>>1718098 Original Post on /qresearch/


wlinsurance-20130815-A.aes256 (3.32 GB)

HA256 Hash: 6688fffa9b39320e11b941f0004a3a76d49c7fb52434dab4d7d881dc2a2d7e02

Passcode: Berlin?A!Collection+Of#Documents@Containing~Emails%FromUSA=A0F0

wlinsurance-20130815-B.aes256 (46.48 GB)

SHA256 Hash: 3dcf2dda8fb24559935919fab9e5d7906c3b28476ffa0c5bb9c1d30fcb56e7a4

Passcode: London!Documents(Of$A:Most\Sensitive~Nature:From"Europe>USA<UK/A1F1

wlinsurance-20130815-C.aes256 (325.39 GB)

SHA256 Hash: 913a6ff8eca2b20d9d2aab594186346b6089c0fb9db12f64413643a8acadcfe3

Passcode: Jakarta(A)Emails/Images;PDFs;VideosDOCs+From[Around]The}World{A2F2

739eeb  No.1722987

>>1720346 The key works???????

0081d3  No.1723060

File: f17d6b6afb91e81⋯.jpg (102.57 KB, 1292x346, 646:173, 1527559653113.jpg)


they got the key to decrypt through the first layer

there are two sets of torrents floating on the web, the good ones and faked ones

0081d3  No.1723121


WikiLeaks insurance 20130815 - A (3.6gb)

MD5: a243f323612b86155e4c44c7efa38d90

SHA1: a3e666f7f03001ce1b6556133b5217ab0d668463

SHA256: 6688fffa9b39320e11b941f0004a3a76d49c7fb52434dab4d7d881dc2a2d7e02

SHA512: c865d260e96a654540b4ef34be4242e5105d5260059436779028f1db0324f046b11a83098d561aa855ad7cc823e9e72c59fe59e92b246889985054edfaea1ef2

MD5: 0a7f57171f4ba49e42d3cb9cd602ec72

SHA1: 7e56d7a720ba6e9b00bbb66e6f64bd46e9285361

SHA256: 3dcf2dda8fb24559935919fab9e5d7906c3b28476ffa0c5bb9c1d30fcb56e7a4

SHA512: 37f3c44c6a8b51d6c7da84386ecc9b2ef4b9d1ca6df44ebee606742772be14c53811e883bcc0e8c659c7a4fe3ecf7b170585bbdf0a0c5b305a51162ce49147e5

MD5: c735e3f7c6d0ae2cad131b5539d303b0

SHA1: e74fd2fdd5e3bc6a0cb26813746912394385422e

SHA256: 913a6ff8eca2b20d9d2aab594186346b6089c0fb9db12f64413643a8acadcfe3

SHA512: e2385bf423e7b10aae121a2cf6467d996d32814eefc70c0fe08daa66096119a202d108e199a26ab6f1cbba0c6b1bfc03e9c670b853cc346dd061ce6b49a6f819

0081d3  No.1723168


0081d3  No.1723183


0081d3  No.1723287

also being worked in this thread:


0081d3  No.1723302

File: 0ad40b668cfbb63⋯.png (307.28 KB, 2390x768, 1195:384, 1528841128256.png)

File: 8678ff75ac2dd4e⋯.png (92.64 KB, 1019x654, 1019:654, caret.PNG)

File: 1d2dd81e9a75023⋯.png (6.36 KB, 706x80, 353:40, hash.PNG)

File: 07fc1af9a69c24b⋯.png (5.84 KB, 625x93, 625:93, pgpkey.PNG)


0081d3  No.1723349

File: a462ed849ee69d7⋯.jpg (138.39 KB, 771x648, 257:216, 1528842832717.jpg)

File: da60c973cd80af2⋯.png (2.04 KB, 741x19, 39:1, 1528844676379.png)

File: 2ce1ee526063fde⋯.png (44.76 KB, 1187x150, 1187:150, 1528854364565.png)

File: 6837c2ad2cbda91⋯.png (249.11 KB, 720x1280, 9:16, 1476660143-screenshot-2016….png)

File: e7c9cb7559d8d29⋯.png (86.43 KB, 1793x1119, 1793:1119, 1528840827545.png)

0081d3  No.1723388

File: 743076dd0f7ba78⋯.png (12.24 KB, 567x222, 189:74, clue.PNG)

34e7e8  No.1723411


>25.5%, is this you?

0081d3  No.1723460

decrypting tools




no, just bringing things back and forth between the boards. Im stuck at 14% hasn't moved in 8 minutes

0081d3  No.1723485


this thread


now archived at


34e7e8  No.1723490


No worries, so once its 100% does that mean you have access to the files or just that they have been decrypted? newfag with all this stuff, its fascinating.

4daba4  No.1723499


Just trying to help. Below is a Q post from PF. I had the same question. We are told over and over "we have more than we know". Could this be a key??

Q !4pRcUA0lBE No.87 📁

May 17 2018 16:57:40 (EST)


0081d3  No.1723504

original thread


read back and forth as anons try different things–threads keep getting deleted on halfchan and good ideas might be missed

739eeb  No.1723619





c8edb9  No.1723715


Chat logs usually with the filename of "claudia.txt"

aebca0  No.1723740

File: 7a9bb590f02282f⋯.png (9.7 KB, 665x241, 665:241, insurance wl.png)

So I have the wrong ones? FML

0081d3  No.1724193


wait those look like the good ones.

Definitely the bad ones have 1984 in the filenames. sec Ill confirm

0081d3  No.1724266


its just the files, but for the first time, good files have been found

then they have to be decrypted


yes, that could be a key

it all could be a key

missing letters and spelling errors could be a key

0081d3  No.1724302


dont stop, get them anyway

file names can be changed, if you got them from the torrents posted hang onto them, we do not know all what is out there

a91b8c  No.1724308

https://www.reddit.com/r/goodlongposts/comments/5otfzi/as_of_2017_aes256_compromised_wikileaks_insurance/ fake???

0cf837  No.1724338

Ghost-CON active.

Approval 58203-JX

Tom Clancy's Ghost Recon is a series of military tactical shooter video games published by Ubisoft. In the series, the player is in charge of a fictional, newly conceived squad of U.S. Army Special Forces soldiers from Delta Company, 1st Battalion, 5th Special Forces Group (5th SFG) stationed at Fort Bragg, North Carolina. Except for the "1st Battalion, 5th SFG" designation, this reconnaissance unit is entirely fictional, as Special Forces Battalions currently only support three Companies (A, B and C). They are often referred to as "the Ghosts". Their role is not unlike other real world special operations forces, in that their operations are kept highly classified. In Tom Clancy's Ghost Recon: Future Soldier, it is shown that the Ghost's unit has multiple designations and is part of JSOC and is also known as the Group for Specialized Tactics (or GST—where the term "Ghost" comes from) much like real JSOC units like Delta Force (1st SFOD-D or CAG) and SEAL Team Six (or DEVGRU).

1e6594  No.1724523

File: fc7fe6da5a3864e⋯.png (27.66 KB, 881x431, 881:431, WikileaksInsurancePassword….PNG)


We're missing one here:


USA-Secret-Patents-List-1948-to-2009.aes256 (54.1 GB)

Passcode: Tokyo*Your_World_Has_Changed_1948_To_2009_UK_USA_Secret_PatentsA3F3

That makes a total of four files ←-> four BOOMS

I can't seem to find the torrent for this one, though.

aebca0  No.1724540


I downloaded 3/4 of them 11-2016 when the height of the podesta drops were going on

42a404  No.1725068

File: 34355fce9f99a88⋯.png (88.04 KB, 856x771, 856:771, 1528843853150.png)


a91b8c  No.1725070

These guys are stupid.

42a404  No.1725078

Look at the signature. >>1725068

a91b8c  No.1725173



>/18 (Tue) 21:40:15 a91b8c No.1725070


>These guys are stupid.


>/18 (Tue) 21:40:15 a91b8c No.1725070


>These guys are stupid.


It didn't work over a year ago, how come no one can make it work now? Why was it dropped? Why did people call it fake over a year ago WITH the same amount of legwork, REGARDLESS of WHO sent it. I've never seen Q sign with "The Q." Who knows maybe those were his early days. Or maybe if Q wanted us to dig into this, he'd post about it. IDK. Q proof needed. Q will confirm.

f06dea  No.1727202

i think they injected the reddit post recently and faked the date. i was all over this research that time and cant remember this stargate7 user posts at all.

1e6594  No.1727647

File: 7a1cd2d44f85c21⋯.jpg (76.62 KB, 1242x566, 621:283, dbefab8b6f37f09fd871de3791….jpg)

Okay anons, I think I’ve gotten the first layer off. Can’t really be sure, though—I’ve never had the faintest interest in cryptography.

Looking through Wikileak’s history of releasing insurance files, you see that there are multiple layers of encryption on each of the files. There was at least one I know of where the first level of encryption was taken off. I’m guessing that that’s what just happened here—but it doesn’t mean that we’ve got a bunch of dirty nasty secrets to dig through; it just means we’re a step closer when we’re not even sure how many steps there are. On a positive note, I think it’s much more than a coincidence that this is happening right now, of all times—so I would download these and have them on hand, because the whole key could be given out at any moment.

So here’s how you take that first step. Note pic related: these files aren't just aes encrypted—they're aes256cfb encrypted. So AES Crypt doesn’t work. You’ll need to install openssl. I’m working off of a Windows machine—I found this page helpful:


You'll need to do part a) set up a configuration file, but you won't need to do part b) generate a private key. You should also note that most of this, after installing openssl, involves working from the command line.

Once you've installed openssl and set up your configuration file, you'll go to the directory where openssl is installed, then run it. You should get an indicator that shows it's working–it'll be a prompt that looks like this in the command window:


Once you have that, you'll enter the command shown in pic related, with some adjustments. You won't need the "openssl" part, and you won't need to enter "enc" like in pic related–that would just encrypt the file even further. The command you enter should look something like this:

OpenSSL>eas-256-cfb -in C:\Downloads\wlinsurance-20130815-A.aes256 –out C:\Downloads\wl-A -pass pass:Berlin?A!Collection+Of#Documents@Containing~Emails%FromUSA=A0F0

Let's break it down:

The first part "eas-256-cfb" tells OpenSSL what you're trying to do

The "-in" part is where you enter the path to the insurance file you've just downloaded. In this case, it would be on the C: drive, in the "Downloads" folder–yours may be different.

The "-out" part tells OpenSSL what you would like the output file to be named. This isn't like unzipping a file–we have no idea what we have on our hands here. In my case, I decided to output it as "wl-A". That’s just a file without a file extension at the end…which is appropriate because we have no idea what it really is. Just for reference, I added “.zip”, “.bz2”, and “.tar”, but no dice—it wasn’t recognized as any of those. I also tried opening it in gVim and notepad++, but even the smallest is far too large for those programs to deal with.

The "-pass" part is where you enter the password. In pic related, it's

>-pass file:wl-A.pass

That's because that anon wrote the password into a file he created named "wl-A.pass". It would be the smart thing to do if you were trying to keep your password private, but that's not the case here; you should just be able to enter the password as above rather than the way it was done in pic related.

Note: if you do decide to use a password file, you should put the full path. So let’s say you wanted to put that file in the same folder as your wlinsurance file—you would enter “-pass file:C:\Downloads\wl-A.pass”

Once that’s done, I guess you’re a step closer than everyone but the ones that figured this out, maybe some well-connected people, and Wikileaks.

Again, I'm no expert. Maybe I'm missing a post somewhere, but I haven't gotten any further, and I don't have the ability to tell if I've even made progress. I guess the fact that there was some output is a good sign, but tonight wasn't the night I got to see Merkel in her dad's Nazi outfit.

6b19fd  No.1727736

I can’t find a current pol thread on this. It truly is disturbing how many autist just seem to not be anymore……

f06dea  No.1727801





and some more in the past threads. some other anons confirmed the first layer throughout last night but that's it for now.

8055f1  No.1728027



im the anon from your picture, on windows if you type in the password on commandline the control characters for enter / return can be different that is why the password is in a txt file also the enc options is a preflag to the aes type its not a command to encrypt think of it like this:

encryption type? aes-256-cfb

but your post is great to read i was met with sewwww much shills and a couple assholes who didnt understand what they were talkin about trying to push me around

always think for yourselves anon, dont be afraid, fear not and trust that little voice in your heads, it gets louder the more you listen to it


8055f1  No.1728037



also on linux ? # and ! among other special characters are commands and comments that ruin your command if you dont put a series of quotes around them or \\ before them so its way easier to make a file containing the password, on windows make sure you use notepad or even edit from dos so theres not font data and shit in there

8055f1  No.1728102

File: 9c1d527a7428e34⋯.jpg (9.55 KB, 164x255, 164:255, 12b790d4004e8537b1ca911bfb….jpg)

also i have this i think these are from ddos deadmans switch supposedly, theres also a really good irc log floating around of anons who did a lot i mean a ton of blockchain work i cant find it on my hard drive at the minute

f06dea  No.1728106



we've been through this process back in 2016/2017 dealing with shills and newfags who do not know how to handle encrypted data files and yelling phrases of concern because they cannot double-click on it

the "shill force" was immens in the last 24hours (half /pol e.g.) so better way to ignore and stick to old holding groups and other channels

8055f1  No.1728108


actually this is an anons from the other day but the wiki screen shot is like a phone picture of a dudes computer screen that looks very similiar, the thumbnail confused me, the text says something like 1/4 and 2/4 and theres a nother one with 3/4 and 4/4 i believe sorry about that sage

8055f1  No.1728137


one more thing they say pre commitment

done shitting on bread

f06dea  No.1728141



the first python script stuff jean_b.py etc. originated from there and some anons made some github repos to index the btc blockchain that time, see also archived endchan.xyz pol threads for tidbits.

other example https:// vimeo.com/215536434 how to extract cablegate.7z from the blockchain

things repeating each year i think

f06dea  No.1728156


that img was posted shortly after the happenings in oct2016, it's somewhere in the google image cache

8055f1  No.1728184


its python that analyzes blockchain and extracts data and possibly files id have to look at it closer and i will im at the last 2 monhs of a brutal methadone detox and only have so much time each day where im not completely miserable

8055f1  No.1728192


yes you know what im talking about, good, there are actually 2 and one is a terrible picture that is missing chars that are cut off but only 2 or so

8055f1  No.1728196



the chat log im talking about discuss's this, the ddos of wikileaks deadmans switch and has excellent work re: blockchain, i actually think these anons found something they were all v& or silenced 1 by one which is discussed int his log as well, i thnk this log is in a reddit thread or voat with the screenshots were talking about

f06dea  No.1728797


https:// siderus.io/ipfs/QmczBCV3zgnCGbFjw7axsKpuLcHQwkFYpj22ptfX9tZLQH/claudia.txt

830c23  No.1729440

File: eacd28bc4fbc937⋯.gif (3 MB, 480x270, 16:9, giphy.gif)

598c49  No.1729672


This is as far as I've seen anyone get. The faked files always meant dead ends. Now we've got the good files. Yes, we need to d/l everywhere possible because the rest of the keys might drop at any time. And if they do, you can be sure as hell the internet will go down just like it did in October 2016 the first time the files were dropped. When the net came back up, the originals were (mostly or entirely) scrubbed and the faked ones planted, which meant dead ends.

It is NO coincidence that the correct torrents are now out there at this time, and a crumb was dropped to revisit. That crumb from the past is the only reason anyone went relooking and revisited this.

thank you for your step by step. Even if you have had no interest in cryptography before now, it looks like you've received a calling I'd say.

There are going to be multiple layers. I've got a suspicion that somewhere in Q's drops we'd find parts of the next level key..DJT tweet misspellings etc. But eventually we'll get them. And not only Merkel as Nazi, but Obama in tribal and everything SR died to get.

That would certainly bring all the normies to the yard wouldn't it.

598c49  No.1729714

none of it is shit. every brainstorm counts. every shitty idea counts since it could spur someone to think 'that is dumb, that wouldn't work because X would have to be Y and HEY that means A!" We learn by rejecting ideas at least as often than we learn by accepting ideas.

Pre committment came out in June 2016 if I recall.


e54bdf  No.1729892

Ok I'm just copy and pasting this…

I wouldn't think much of it… but it's signed "the Q" and it's from over a year ago.


wlinsurance-20130815-A.aes256 (3.32 GB)

HA256 Hash: 6688fffa9b39320e11b941f0004a3a76d49c7fb52434dab4d7d881dc2a2d7e02


Passcode: Berlin?A!Collection+Of#Documents@Containing~Emails%FromUSA=A0F0



wlinsurance-20130815-B.aes256 (46.48 GB)

SHA256 Hash: 3dcf2dda8fb24559935919fab9e5d7906c3b28476ffa0c5bb9c1d30fcb56e7a4


Passcode: London!Documents(Of$A:Most\Sensitive~Nature:From"Europe>USA<UK/A1F1



wlinsurance-20130815-C.aes256 (325.39 GB)

SHA256 Hash: 913a6ff8eca2b20d9d2aab594186346b6089c0fb9db12f64413643a8acadcfe3


Passcode: Jakarta(A)Emails/Images;PDFs;VideosDOCs+From[Around]The}World{A2F2



USA-Secret-Patents-List-1948-to-2009.aes256 (54.1 GB)

SHA256 Hash: 12adbf23579ddaec01aadeaeac87092536e629462392aacabb341373cebce1b1


Passcode: Tokyo*Your_World_Has_Changed_1948_To_2009_UK_USA_Secret_PatentsA3F3

. .

Read'em and Enjoy!


These are EXACT codes: YOU MUST cut and paste AS IS – DO NOT CHANGE ANY CHARACTER CASE !!!!


"The Q"



StargateSG7 • 1y


Thank you and a very good night to all! .

There will be no more releases from us until "The Q" release the

1948-to-2009 Secret Patents List file when and where we see fit!


"The Q"



StargateSG7 • 1y


To those of you in the know, we have



Sometimes, the most interesting secrets

are those that are the most easily dismissed!


Now, in our case, we actually TEST what we find

and what we have found is MOST ILLUMINATING!

We also ENSURE we have conclusive video proof

and working models to show to all….


We ARE everywhere !!!!


We CAN do what we say !!!!


We will GIVE to the world !!!!


We HAVE the PROOF !!!!


"The Traveller"


speaking on behalf of


"The Q"


showmeurboobsplznthx • 1y

Is it going to happen tomorrow?


StargateSG7 • 1y

I highly suggest you READ THE DAMN ARTICLE!


Up above you are the Passcodes released EARLY!





To those of you in the know, we have



Sometimes, the most interesting secrets

are those that are the most easily dismissed!


Now, in our case, we actually TEST what we find

and what we have found is MOST ILLUMINATING!

We also ENSURE we have conclusive video proof

and working models to show to all….


We ARE everywhere !!!!


We CAN do what we say !!!!


We will GIVE to the world !!!!


We HAVE the PROOF !!!!


"The Traveller"


speaking on behalf of


"The Q"


showmeurboobsplznthx • 1y

So tomorrow at 11am?


StargateSG7 • 1y


You are beyond help….!!!


The passcodes were released YESTERDAY !!!


They are DETAILED in one of the ABOVE POSTS !!!


My Oh My!!!


The Sad Intellectual State of an American Idiot knows no bounds!




You will see the passcodes there!



(for the dummies who can't be bothered to read):


wlinsurance-20130815-A.aes256 (3.32 GB)

HA256 Hash: 6688fffa9b39320e11b941f0004a3a76d49c7fb52434dab4d7d881dc2a2d7e02


Passcode: Berlin?A!Collection+Of#Documents@Containing~Emails%FromUSA=A0F0



wlinsurance-20130815-B.aes256 (46.48 GB)

SHA256 Hash: 3dcf2dda8fb24559935919fab9e5d7906c3b28476ffa0c5bb9c1d30fcb56e7a4


Passcode: London!Documents(Of$A:Most\Sensitive~Nature:From"Europe>USA<UK/A1F1



wlinsurance-20130815-C.aes256 (325.39 GB)

SHA256 Hash: 913a6ff8eca2b20d9d2aab594186346b6089c0fb9db12f64413643a8acadcfe3


Passcode: Jakarta(A)Emails/Images;PDFs;VideosDOCs+From[Around]The}World{A2F2



USA-Secret-Patents-List-1948-to-2009.aes256 (54.1 GB)

SHA256 Hash: 12adbf23579ddaec01aadeaeac87092536e629462392aacabb341373cebce1b1


Passcode: Tokyo*Your_World_Has_Changed_1948_To_2009_UK_USA_Secret_PatentsA3F3





"The Traveller"


speaking on behalf of


"The Q"


showmeurboobsplznthx • 1y

Doesn't work.


Share this Link

Preparing your link

a91b8c  No.1729935


I hashed my files. I got the "good ones" according to the origins and the author (SG7). Dead ends. Next. You guys can hold your files, that is legit. Even attempt to crack them. Good. Until progress is made, I don't want to waste mine or anybody else's time. Keep believing, fine. There are no leads at this time.

db7143  No.1730097

File: be1e3c3586c6b18⋯.jpg (43.58 KB, 478x720, 239:360, Obama HIllary making the w….jpg)

File: f1a750a233160ab⋯.jpg (47.41 KB, 550x691, 550:691, Obama HIllary making the w….jpg)

File: 16a82c200681dd0⋯.jpg (52.59 KB, 479x720, 479:720, Obama HIllary making the w….jpg)

File: 3b1475120cdb61c⋯.jpg (48.17 KB, 493x720, 493:720, Obama HIllary making the w….jpg)


Remember when Bolton said something about Libya and Kim Jung Un freaked out? No wonder. Look at what Obama accomplished in his incompetent attempt to make the world a better place in his handling of Libya. These pics show 2000 vs 2018. However, Obama and Hillary did what you see here during Obama's 2nd year in office (2011). Compare that with what Trump just did during his 2nd year in office. And the MSM sat quiet. Even as of today.

936bb1  No.1730501


The files being downloaded are encrypted archive files filled with god knows what. They still need to be decrypted. Imo these files and the threat of their contents has kept Assange alive and not door knobbed.

I'm 100% on A … seeding and trying passwords.

936bb1  No.1730569

File: 0b8349f65607e5c⋯.png (74.79 KB, 635x419, 635:419, ClipboardImage.png)

File: ee8b963941615c3⋯.png (308.57 KB, 1021x726, 1021:726, ClipboardImage.png)

Also dont forget JA + @Snowden tweets …

Keys for keys for keys ..

703ad7  No.1730571


It's a chat log from the months after oct/2016 when JA went dark. I can attest to it's authenticity.

The programs in that chat log are simple python programs that poll blockchain.info for transaction data found within a transaction id. The original Jean.py script pulled data from a single transaction ID, but further iterations (jean3.py) followed a tree of transactions to generate much larger files. There are gigabytes of data immutably included in the Bitcoin Blockchain.

Hilariously enough, alt-coins that used a hard fork of the bitcoin blockchain, to seed their own, also contain the wikileaks data. (bitcoin cash, bitcoin gold, ect.).

In the example provided, they used the transaction number that contains data for the cablegate backup. Wikileaks shoved their entire proof of publication, AND DATA into the blockchain well before anyone knew to look. Well after it could be changed or manipulated. It's immutable. Never to go away. Forever existing as long as bitcoin remains secure.

You'll notice references to satoshi nakamoto's download tool which can be found within the transaction provided. This is a very simple tool that allows you to perform similar actions as the jean.py script.

This is a very deep and fruitful rabbit hole. Very reliant on technical programming knowledge and knowledge of the bitcoin protocol. Read between the lines. Use the examples as a guide for further research.

703ad7  No.1730611


Did anyone decide to look at the header of the decrypted file to ensure that it is or is not salted? If it's salted, it's still encrypted (either failed decrypt or another layer as you imply). However if it's not salted, then grep the file for known headers of file types often used by wikileaks. 7zip, pdf, images and video filetypes. You may be able to excise from the larger file data of use.

703ad7  No.1730771


You can create blockchain transactions from these hash codes. I'll chime in on it when I get home. I have the info archived.

Basically you need to look into how bitcoin generates it's addresses. It's a series of hashes that generates a unique ID. These hashes are from one of the steps in the creation of a bitcoin address.

Find the address and you have a starting point. The addresses have transactions related to them and can be extrapolated using jean.py or other means.

68db62  No.1731134

File: 719433fb1dc6493⋯.png (15.52 KB, 479x372, 479:372, ClipboardImage.png)

this is as far as I get.

<don't really know what I'm doing.

936bb1  No.1731266

YouTube embed. Click thumbnail to play.


JA's key [60 Chars] - fb4e568623b5f8cf7e932e6ba7eddc0db9f42a712718f488bdc0bf880dd3

@Snowden's [64 chars] - ffdae96f8dd292374a966ec8b57d9cc680ce1d23cb7072c522efe32a1a7e34b0

Have tried them both in a BTC block chain explorer - nada.

Have also been trying things here https://www.devglan.com/online-tools/aes-encryption-decryption

64 bits would work - 60 wont.

16,24,32 characters for secret key depending on 128, 192 or 256 bit encryption respectively - BOOMBBOOMBOOMBOOM + variants - no luck, but worth a try.

f06dea  No.1731326


use command line/terminal and lurk moar for this part. suggestion: install linux if you havent already (native or via VirtualBox)

f0ec0e  No.1731361


Posting some info on how to get bitcoin addresses from hashes.

Example, Snowden's tweeted hash:


To get two addresses out of it, you do (in Python):

from pybitcoin import BitcoinPrivateKey

pk = BitcoinPrivateKey('ffdae96f8dd292374a966ec8b57d9cc680ce1d23cb7072c522efe32a1a7e34b0', compressed=True)

pk = BitcoinPrivateKey('ffdae96f8dd292374a966ec8b57d9cc680ce1d23cb7072c522efe32a1a7e34b0')


And you get: 1EnDZkT8Thep9sfbAy5gwg23EHhZw7tYwg

Then you can find the address here: h ttps://blockchain.info/address/1EnDZkT8Thep9sfbAy5gwg23EHhZw7tYwg

The second address comes by using the compressed option:

pk = BitcoinPrivateKey('ffdae96f8dd292374a966ec8b57d9cc680ce1d23cb7072c522efe32a1a7e34b0', compressed=True)



Which is: h ttps://blockchain.info/address/1L3Zqv68zsXxNs53r25dKcUgjDe1119Rhj

f0ec0e  No.1731364


Bitcoin addresses from Kerry hash:









Used same procedure as with the Snowden hash tweet

936bb1  No.1731444

File: 9395c485d77fa3f⋯.png (308.9 KB, 1021x734, 1021:734, ClipboardImage.png)

File: 132bdf545dfd2f7⋯.png (36.36 KB, 1183x802, 1183:802, ClipboardImage.png)


Solid work anon, thanks. The dates though - I know BTC is slow but could you get the this much difference? Different timezone?

Give me back the days of jtr :P

f0ec0e  No.1731508


no idea. What is interesting is the amount of the first transaction. 0.000911 BTC is deliberate and meant to draw attention to the transaction.

Those two addresses that sent the 911 transaction…anything interesting about them? Anything interesting about the amounts of spent BTC from the snowden address?

936bb1  No.1731815

File: 6da0a44be9ce21c⋯.png (44.88 KB, 1250x805, 250:161, ClipboardImage.png)


Have very briefly clicked through following the money - kind of afk rl things atm … but address 1Q74VmZKZXgH58LVk32oNinU4xAJR6yiUa has been busy ..

No. Transactions 25243

Total Received 236,217.19143687 BTC

Aug 2016 BTC ~$600 …

149f32  No.1731999

File: 16488e2e534a38d⋯.png (204.53 KB, 1080x1920, 9:16, Screenshot_20180609-185728.png)

File: 06f5ff8d461d3e5⋯.png (269.68 KB, 1080x1920, 9:16, Screenshot_20180609-185618.png)

See how some transactions have extra data in them?

1e6594  No.1732453


I'm glad you posted–that command line led me right to the proper method. I was trying to use AES Crypt as well…but I noticed that it didn't recognize files that ended in "aes256" as an "AES Crypt" file.

I actually used your method of creating a file and entering the password into it, and it worked fine. I just remember how, many years ago, I was kind of blown-away at the idea that a file is just a collection of data, and the extension (such as .jpg) is what tells the operating system how it should handle the data. So I didn't want to get into having to explain to everyone that they should create a new text file (in something like notepad++ or gVIM, not Word), enter the password and the password only, save the file, exit the editor, then rename the file "wl-A.pass".

But it makes a lot of sense why you did it the way you did. I was amazed that it worked, once I got the .cfg file set up for openssl.

And I wouldn't worry about the shills, my man. I've been here for awhile, and every time I find something good all these assholes start popping out of the woodwork telling you it's worthless. It happened when I found the Treasury's OFAC ("Follow the Money"), it happened when I tried to bring people's attention to the Panama Papers at ICIJ.org (which probably aren't all that valuable, given that Soros funds the ICIJ), and it happened when I re-discovered Soros' leaks. The more the scream, the better it is for mankind.

Reading through the archived /pol thread, there were a lot of hints about something called "the end." I think that ties directly into some work elsewhere on 8ch dealing with virtual quantum computers and "P = NP." I wonder if it's a hint as to how to take the next step? I'll be taking this info to that board.

f0ec0e  No.1732815


Each transaction has a little bit of extra data. String transactions together and you can build files from the added data.

The problem is finding out which transactions are the start of the file. Also, once you find the start, where do you go from there? Usually this is done by connecting transactions based on the amount of bitcoins sent.

So for example: .000911 bitcoins would show an important file. Then ascend the amount with each transaction: .000912, then .000913, then .000914…ect.

Follow this through and you will get the complete file.

1e6594  No.1732824


Thanks. I might get into cryptography (I'm about to choose the details of my major)…but when I look at how some of the autists in that /pol thread dig away at this stuff…those are the real guys. Besides, the advent of Quantum Computing is going to change things quite rapidly–how will that change things? Will those skills become obsolete as everyone moves forward?

For me, cryptography just reminds me that people are assholes. Otherwise, why would you need it (unless you were trying to hide information on birthday presents)? When you try to decipher the mysteries of God's creation (how I think of science), you feel as if you're unwrapping a gift. When you work to decrypt man's mysteries, you feel like you're peeling the layers of a bloody bag someone found in the women's restroom.

4308e6  No.1732989


How are we doing the transaction decoding now? I can't get jean3.py to work (do i need an older version of python?)

I got the wikileaks A file decoded currently downloading C, Would it be possible you need to combine all 3 of the decoded ABC files?

5ba2fb  No.1733023


i tried to unzip the decoded A file, got a message that it was either not a zip file or was part of a multi-part archive and would need the catalog in the last file to unzip… fwiw.

f0ec0e  No.1733095


Bring the file up within a hex editor (ghex on linux for example) and look for the header of a file type.

For example, a PNG has a header that looks like this: "89 50 4E 47"

If you find that sequence within the file you've just found the beginning of a PNG. You can look at any PNG and it will have the same header. Build a list of headers for common files used by wikileaks and you can then grep for them within larger containers.

1e6594  No.1733197


One of the posts in a general thread linked to this archive:


When I'm talking about the autists that have been at this for awhile, this is what I meant.

f7eac0  No.1734009


I'm sure someone has probably covered this but in case they haven't lot of Q references to: shall we play a game = wargames = Joshua

as well as other cyber movies.

Not a cryptofag but willing to learn if others think this is worth energy.

b8e4ba  No.1734344


FYI there is a data recovery tool that automates this

PhotoRec 7.0, Data Recovery Utility, April 2015

Christophe GRENIER <grenier@cgsecurity.org>


I mounted the archive

sudo losetup /dev/loop0 wlinsurance-20130815-A.aes256.decrypt

and ran the tool over it. no luck.

I guess its encrypted multiple times?!

But anons keep PhotoRec in your mind if things like these are necessary

974edb  No.1734950


If it was encrypted a second time it would say salted in the first 8 bits of the file. I'm not seeing that.

bd1e16  No.1735731


yeah try python2

linux installs python 2.6 and 3.something simultaneously

also check first line if its #!/bin/bash/env python try chaning that to #!/bin/bash/python2 and 3 respectively

bd1e16  No.1735760



dude you should download the small file the 3.46gb one and do the hex edit thing yourself we need help as much as suggestions, really need that 1/2 2/2 and 3/4 4/4 screenshot with filenames so i can try and extract htem with command line, i will do hex edit tomorrow, tell me big indian, little indian sort by 8/16 or word? so many options, using ghex

bd1e16  No.1735786


its literally the future

bd1e16  No.1735816


i bet we need an actual gpg key file thats like at least 256 bits thats the salt perhaps in the blockchain

bd1e16  No.1735849


by the way i have powerful gpu and can do some small cracking if we are ever missing a few digits of a key or something, i use it for wifi fun, er pen testing labs, no way we cracking a whole key tho

e9b353  No.1738556

File: 530d3ec358664ae⋯.jpg (55.4 KB, 548x864, 137:216, 4cab7857t.jpg)


I don't recall there being a post with 3/4 and 4/4

but here you go.

551e2c  No.1738876







Now you're thinking.

Use snippets of the insurance files with a list of keys and go from there

Try these keys


473e1b  No.1740948

Just as a word of warning (and a consideration to the "The Q" comments, of which this does reek of advanced mil-int), AES is NIST approved, which in my book always constitutes it as being 'backdoored'.

Certain types of AES (such as NoPadding variants or ECB - Electronic Code Book) have fundamental weaknesses (NoPadding is vulnerable to 'Oracle attacks' - look it up), and my thoughts are the NSA (who likely nudged NIST into approving AES - remember, AES is used by the US government) built fundamental mathematical backdoors into it (basically, a mathematical backdoor is 'if you calculate X in a slightly different way, you get more efficient returns, EG in brute forcing attacks').

What 'StarGate' is describing sounds EXACTLY like a mathematical backdoor (the whole point of an encryption algorithm is that it's meant NOT to be 'easily brute forceable' if you change certain aspects of it), and I highly doubt they just 'casually' discovered such a backdoor in an algorithm that has been around for quite some time, which either means:

1) SG is some sort of insane genius (timing is circumspect, as is their disregard for Julian Assange's safety - they could have kept this quiet), but with no prior history establishing as such I doubt this.

2) SG works for a research body or university with the resources necessary to make solving this equation possible (IE with cryptographic experts, mathematical professors, and the like), or the most likely in my book,

3) SG is an NSA employee and the NSA, in their sheer desperation and panic over Q, and in an effort to neutralise Julian Assange in the same move, have voluntarily given up a mathematical backdoor in their own proposed encryption (note: this is a double-edged sword, ANY AES based encryption is hypothetically exposed - although I notice SG is VERY quiet on the details of how exactly he did it) and are thus publishing the passcodes in order to nullify Julian Assange's insurance policy.

If it is the third case, then we can be confident the NSA already read the insurance files, and have concluded either there was nothing of merit, or they've already solved whatever problems they've presented.

It's unclear what benefit it would have to expose this information publicly though (why not just neutralise Julian Assange and let the whole thing naturally flop?), unless their goal is to now discredit Julian Assange by basically saying 'hah, his insurance files contain nothing (because we've already purged the evidence'.

Either way, something about this reeks, and I'd advise we dig just a little further into StarGate to validate their claims. People don't just make major breakthroughs on cryptography overnight - usually specialist researchers 'chisel away' at a problem set.

473e1b  No.1741090

Just to prove I'm not the first to have thought about AES being backdoored:

"I wouldn't assume that the NSA has cracked AES ciphers. I would assume that most crypto systems that use AES have implementation flaws that the NSA exploits when they feel it is worth it. "

https://crypto.stackexchange.com/a/2252 (As early as 2010)

Maybe Julian Assange had a nonce moment in picking a government approved crypto, but I'd advise people always wrap their own data in their own crypto prior to placing it inside a 'trusted' crypto.

"Breaking into those complex mathematical shells like the AES is one of the key reasons for the construction going on in Bluffdale. That kind of cryptanalysis requires two major ingredients: super-fast computers to conduct brute-force attacks on encrypted messages and a massive number of those messages for the computers to analyze."


NIST approval:


Oracle padding attack:


Why ECB is insecure:


If you guys ever plan to do insurance files, pro-tip:

1) Use different encryption algorithms for each individual file or file groupings (this would force the NSA to give up a lot of legwork just to expose it)

2) Build your own crypto, and have that as the 'primary' layer (hardwork, but understanding crypto reaps it's own benefits). A lot of experts will say 'but yours will be flawed'. Yes, but so are the NSA's: your own flaws means a manual analysis and time has to be spent looking for those flaws (more time = more security).

3) Make sure some insurance files are kept with specific trustworthy individuals who cannot leak the information online until after a specific period.

End result:

1) Breaking one encryption does not break all of them, so some insurance remains.

2) Breaking the outer layer encryption does not break the inner layer.

3) Even if both broken, having isolated units of other insurance files that cannot be easily obtained means there's still coverage (even the thought of 'missed insurance files' as a scare-thought is still insurance)

Adage: don't put all your insurance files in one encryption basket.

a91b8c  No.1741936


THIS. ^^^^^

cb3af5  No.1742144


good job on this anon, many people have seen this man knew where it was but few would post it, lazy bastards need redbull AMIRIGHTGUISE….. kek


what do yo mean by snippets of inusrance file, surely not just cutting 10mb off from anywhere?

bffbd9  No.1742453

>>1741090 elliptical curves - make Thoth Proud

the Morphic Field, Knuth reveled

Type 1 Civilization includes EYES

"And… it's gone "

bffbd9  No.1742466

>>1735760 SLB CUBE - immersive too . Clever French men… get in there !

cb3af5  No.1742479


you got a link i understand its 3d data software but can you link me to an official site

bffbd9  No.1742505

>>1735786 only Man can change enochian quint

bffbd9  No.1742518

>>1742479 sorry - above my pay grade .

but u know WHAT to do

cb3af5  No.1742601


what do you know about quantum computing, and enochian blueprints, seals etc?

cb3af5  No.1742644


hey mr helper one more thing, does this have anything to do with c l e a r o db work i did earlier?

cb3af5  No.1742653


well considering i did a notable on oracle databases and some of this software may or not contain my name, SPOOPY i think this guys either helper or i need sleep

cb3af5  No.1742664

if i have to install windows i want a meme war metal

slb = software load balancing or the slb company for imaging? rarrrrr

cb3af5  No.1742734


have any resources from /by nsa or former member of re: bitcoin?

cb3af5  No.1742738


i know tghey did blockchain in 90s

04fd73  No.1745974


I always found it odd that it said this, why?

Bottom of page:

>If the password is ever released ("Whatever happens, even if there's video; it was murder"), the files are encrypted via OpenSSL file encryption.

Has anyone tried this, similar to the other WikiLeaks password? "Whatever_happens_even_if_there's_video_it_was_murder"

575c61  No.1746426


I predict the T word will be publicly leved against HRC by end of day.

d10f6b  No.1753524

File: fd5574f70eb85ce⋯.png (169.8 KB, 513x288, 57:32, Andrew Wiles Blackboard Eq….png)

File: aa35bf07c62554f⋯.jpg (36.56 KB, 649x400, 649:400, AndrewWiles-Qbehind.jpg)

File: 113aac33cbb947d⋯.png (9.52 KB, 418x102, 209:51, Taniyama-Shimura_Conjectur….png)

File: 113aac33cbb947d⋯.png (9.52 KB, 418x102, 209:51, Taniyama-Shimura_Conjectur….png)

File: 90e8029f2b51260⋯.png (195.04 KB, 407x389, 407:389, toldyouso-GoroShimura.png)

>>1742453 Elliptic Curves….

Let's think on that a Wiles…

1st pic - All Elliptic Curves are Modular.

2nd pic - is that a "Q" on the _board_?

- hmmm geometric algebra, "cyclotomic fields", Earst Kummer, … so, there's Shimura-Taniyama-Weil bit for the Modularity Conjecture that Wiles used.

3rd pic - a nice Q conjunction - coincidence???

4th pic - told you so..

Excellent read/flip, in powerpoint format:

https:// folk.uio.no/rognes/papers/wileskoll.pdf

Fermat, Taniyama–Shimura–Weil and Andrew Wiles

by John Rognes, University of Oslo, Norway, May 13th and 20th 2016

Short, accessible article

https:// sites.math.washington.edu/~morrow/336_14/papers/vladimir.pdf

Fermat’s Last Theorem

Vladimir Korukov, May 15, 2014

More technical getting beyond me

http:// www.numdam.org/article/AFST_2009_6_18_S2_5_0.pdf

Interesting readable abstract, but rest of this paper by Tom Lovering of Harvard is jibberish to me. Muh math skillz lacking.

https:// tlovering.files.wordpress.com/2015/02/cyclotomic-fields-and-flt5.pdf

gnite/gday anons.

c84941  No.1754145

Has anyone here thought Mirror when they typed in the passcode?

dbafa1  No.1757738

If we discover the contents of this file, Julian Assange is a dead man. This file is the reason he is alive. Don't screw that up for him

936bb1  No.1760503

File: f9b896d3835ba9b⋯.png (600.68 KB, 1921x933, 1921:933, ClipboardImage.png)


This is fascinating. Basically pulling files from the blockchain - good thing the blockchain can never be changed so whatever is there will always be there, it can't be deleted and is copied in any forks of the currency. Also did think Bitcoin GOLD (BTG).

Anons should be aware - as I am sure you are - there will be files on the blockchain that are quite likely to be the type of stuff that will get you arrested. Offline research

This is also interesting …. text embeded on the blockchain.


936bb1  No.1760906

File: afe57a3a755f80d⋯.png (508.65 KB, 1895x932, 1895:932, ClipboardImage.png)

File: e21351a8c1b3554⋯.png (44.43 KB, 242x262, 121:131, ClipboardImage.png)


Also if you do fancy some possibly mind scarring research


Downloads of the blockchains for alot of altcoins , think it is worth looking at the logos.

f6148b  No.1783882

Everybody give up already?

f06dea  No.1784612


no not really. we're stuck at the 2nd layer encryption despite digging through blockchains since >1 year. if there are holding groups with unlocked insurance files they keep their mouths shut …

965164  No.1785223


Well intentioned statements aside, telling people not to look isn't going to solve his problem because ultimately someone will look.

Right now, the best possible way to secure Julian Assange's safety is to get him another batch of 'highly explosive informative shit' to act as replacement insurance files pronto.

This time, not encrypted with any NSA approved technologies. XOR'd one-time-pad is the only secure methodology I know, but the key for it would be the same length as the file set, making it hard to remember or hide.

965164  No.1785283


SHA256 penetration won't occur for some time. I reckon the NSA are saving that mathematical backdoor for when they really want to suddenly deflate the value of BitCoin.

SHA1 family is pretty much largely broken, which doesn't inspire much confidence in the SHA2 family.

Biggest enemy right now is bad randomisation on wallet IDs.

e54bdf  No.1787045


It seems like the same people are posting the discouraging comments… I'm not saying they're wrong, but it's dumb to just stop trying. I don't think it's coincidence that these files are popping back up now AND there's an article from over a year ago signed "the Q"… Just saying

f06dea  No.1787868


i asked around if anyone remember these pw's from last year, all replied with "nope". so it seems they're planted for a reason.

908af5  No.1788080






>it decompressed because it doesnt give an error thats how linux works

I've not yet seen any evidence that decryption succeeded. I think aes-256-cfb encoding doesn't have a way for OpenSSL to know if the key is good or not. With "aes256" (aes-256-cbc) shows rejection when you try the key. I tried myself with many different encodings / key variations before coming to this thread. Since "-aes256" is a valid argument to OpenSSL, commonly used, and the insurance file's file extension, I'm inclined to think it was the encryption method used.

Try putting in a different key with aes-256-cfb. Any key at all. No complaints.

# For example, this has the "Berlin?..." key. No complaint from OpenSSL.

$ openssl enc -aes-256-cfb -d -in wlinsurance-20130815-A.aes256 -out ./wl-a3 -pass file:wl-A.pass


# Lets change the key to something we know is wrong. Again, no complaint from OpenSSL.

$ echo "Hello World" > wl-A.pass

$ openssl enc -aes-256-cfb -d -in wlinsurance-20130815-A.aes256 -out ./wl-a3 -pass file:wl-A.pass


Also, the first 8 bytes of the wlinsurance-20130815-A.aes256 file say "Salted__", followed by another 8 bytes for the salt. This is typical of a file generated by OpenSSL. The file that results from decryption using the "Berlin?" key (and the variant with a "^") does not have this, or any other recognizable file signature. You can see the first 16 bytes of a file with

$ head -c 16 <filename>

For all of "The Q" / "The Traveller" poster's rambling boastfulness, I'd think they would have taken a moment have posted decryption instructions. The writing style also seems off. It looks to me like those reddit posts are disinfo / a troll.

965164  No.1811896

When decrypting something - the whole point is incorrect passwords won't give you an error, because that would defeat the point of having encryption (brute force until machine goes ding!).

All AES will do is 'decrypt' the information based on the set of rules it has using the information (key and initialisation vector, AKA salt), which can include decrypting to absolute garbage if the password is wrong.

AES should only throw an error if the password, and salt, are not (seperately) either 16, 24 or 32 bytes (as AES divides messages into 16, 24 or 32 byte blocks). Some variations of AES (EG ECB) won't even accept a salt.

Some encryption programs might include a wrapper front-end (lowers security, warning!) to know when it has successfully decrypted a message by putting inside a container that is essentially an overglorified message basically saying 'this has been successfully decrypted'.

Summary: assuming you supply the right password length AND the right salt (if applicable) AND the right algorithm (there's a copyrighted/commercial variant, note) it will always decrypt 'successfully': whether or not it decrypts into the message you want is another thing entirely.

908af5  No.1825501



I can imagine someone may want to make it tough to tell if a brute force succeeds by going for maximum obscurity. However, I don't believe this is the case here. Having the file begin with "Salted__" points to OpenSSL being used, and what the salt is.

I'm thinking JA chose a strong enough passphrase to where he wasn't worried about brute force. It's not a big leap to assume he went with "aes256" encoding, which is the file extension's name. OpenSSL's implementation indicates an error when a wrong key is supplied for "aes256" (aes-256-cbc) decryption.

With a few steps, you can easily see that an error happens when you supply a wrong key for aes256.

# Create a sample life insurance file

$ echo "This is my secret info. Shhhh." > secret.txt


# Encrypt the sample file with "aes256" encoding (aes-256-cbc)

$ openssl enc -aes256 -k "correct key" -e -in secret.txt -out secret.aes256


# Attempt to decrypt the file with a wrong key.

$ openssl enc -aes256 -k "a wrong key" -d -in secret.aes256 -out decrypted-secret.txt

bad decrypt

139937720559256:error:06065064:digital envelope routines:EVP_DecryptFinal_ex:bad decrypt:evp_enc.c:529:


# Decrypt the file with the correct key

$ openssl enc -aes256 -k "correct key" -d -in secret.aes256 -out decrypted-secret.txt


# Since there was no complaint from OpenSSL when using the correct key, lets see what we have…

$ cat decrypted-secret.txt

This is my secret text. Shhhh.


If JA wanted the encoding secret, he could have chosen any file extension, or even no file extension.

Even if a malicious state-sponsored actor could successfully crack his AES-256 key (doubtful), maybe JA isn't concerned if they discover it. Assuming the material incriminates the malicious actor, they wouldn't want to reveal it to the public either. It wouldn't suprise me if JA secretly sent decryption instructions to his enemies. My guess is that there is no inner layer of encryption, just a zip file or something like that.

f146cc  No.1834320

Try ONION for the password

830c23  No.1834669

Praying for the Anons working on this.

Best of luck. I check in every time.

965164  No.1836473


He might have been a tad smarter than I first assumed. As you correctly observe, why even give the extension?

.ZIP (newer versions) definitely support AES-256, but they don't encrypt file hierarchy (there's a workaround: yodawg, I herd you like .zip files). I believe 7zip however does.

If he's smart, he will have obfuscated the encryption algorithm entirely.

The best cryptographers often say 'the best encryption security is when the enemy doesn't even know it's there'. Can't crack or brute force what you don't know exists.

07fe1c  No.1861902

Here's something interdasting I found.

If you take the hex dump of a block like this one https://blockchain.info/block/00000000000001d58c445bfeb80caf313c5ba03be3ce7312714566852075b8ae?format=hex and search for this string 'ffffffff' you'll notice it comes up a lot. My guess is it's some kind of padding BTC uses between tx or something like that. Now if you look at this hex dump and search for the same string 'ffffffff' https://blockchain.info/block/000000000000005136f5e629aa02a2cda32b2adfe8fef42ff5572eb2978ae9e1?format=hex you'll notice there's a huge gap where that string doesn't appear. My guess is that's some kind of file that is contained in one large tx. In not sure if it's in the OP_RETURN or input scripts or what? Any help?

4c5fc5  No.1867404


I guess it really doesn't matter where in the tx the data is. I'm gonna see if I can find any type of file header in there there and if not I'll probably try and see if I need to convert the encoding to something else. Not really sure what to do.

598c49  No.1870491


that's only slightly better than 'password'. praying for our crypto anons

598c49  No.1870501

File: 5685cff8ed00c7d⋯.jpg (464.79 KB, 998x1117, 998:1117, 5685cff8ed00c7dbd0428cb561….jpg)

forgot badge

830314  No.1872279


According to this chat log (line 727) 'ONION' unlocks one of the files. They also believe the file is wrapped in multiple layers of encryption.


b6f299  No.1873579

>> 1861902

From what I've understood reading the claudia chatlog, 'hidden' messages are within the "output scripts" of a transac (tx). They are not meant to be read at the block level.

5ac369  No.1886108

File: 48a30fbb19ef095⋯.jpg (19.78 KB, 200x275, 8:11, VFUS7VS6W3ANYPQPTKM3SPYFTC….jpg)


0db97d  No.1910496

File: bcafff4efdab88f⋯.jpg (100.9 KB, 960x819, 320:273, 244062.jpg)


36e7d9  No.1910941

Password = WWG1WGA!

52b45d  No.1923676

Wikileaks got it right, tells the truth in latest Tweets.

7d8c3a  No.1924351


Here's something odd with the claudia.txt chat log.

jeanseberg messages

>first - line 5

>last - line 577 [9:04 PM] jeanseberg

monicavitti messages

>first - line 579 [2:15 AM] monicavitti

>last - line 723 [12:03 AM] monicavitti

anakarina messages

>first - line 727 [1:53 AM] anakarina

>last - line 883 [3:41 PM] anakarina

claudiacardinale messages

>first - line 912 [4:53 PM] claudiacardinale

>last - line 1269 [3:15 AM] claudiacardinale

So all of the posters who have coding experience and who seem to have all the answers never overlap each other posts. They are all the same person. Why change up identities? To make the LARP more believable or to try and protect their identity?

Also notice the perfect grammar and spelling? The person is obv phonefag.

All the timestamps are gathered from https://archive.is/hYfqi

598c49  No.1951913

bump so we don't lose the work we've done when next step comes

0cc3f2  No.1952151


Thank You for that post! For several reasons. That slow motion video of Assange's face opened the door. And then the discussion on the false files and multiple layers of encryption made everything make sense.


598c49  No.1954594


I hope so GO GO GO!!!!!!!!!!!!!!!!!!!!!!!!!!

a43189  No.1958988


Who do you think is running the Wikileaks twitter account since Assange is 100% cut off from the outside world with no communications allowed of any type, not even phone calls? hell he's not allowed to even come to the windows any more to show proof of life. So who has been running the WL twitter ever since?

4efc89  No.1977933


Assange was allegedly extracted from the compound in 2016.

Assuming thats why hes not at the window :P

Don't worry, we believe he will show up again soon enough…

598c49  No.1979798



onions have layers. multiple layers of encryption are now confirmed.

2ef4e1  No.1981214


StargateSG7 has some interesting hints to their identity in their post history.





Ironically, some of our members ARE in fact MD's

(aka Medical Doctors - Computational Neurobiology

and some true Brain Surgeons/Neurologists)

so it wasn't ACTUALLY done in jest as some of

our work truly does have to do with medical issues!

Specifically molecular and chemical simulations of

human neural tissue (aka Whole Brain Emulation)


(the group has SOME SERIOUS MONEY and



In terms of Cryptography, I personally have DECADES

of crypto-experience designing distributed GPU/CPU node

encryption and a few of my partners have Doctorals in Mathematics

and a few Statistics and Data Analysis experts specifically relating

to cryptography and use of software/hardware cryptographics systems

in high-threat, real-time environments!


We are NOT American, Russian, French, British, Israeli or Chinese agents!

NOR do we work on their behalf! We are ALL Private/Individual Canadians!!!!

We have OUR OWN AGENDA and are exploring a specific avenue of inquiry

but these Wikileaks Insurance Files are a VIABLE TEST of our advanced

computational technology! SOME OF WHICH IS FULLY



Let's put it this way …. Who has the fastest Supercomputers in the World

based upon the T500 list specified at https://www.top500.org/ …. ???


In reality, it ain't China or the USA!


Even "The Forte" doesn't have what we have!!!


And I've personally been DOWN in "The Dungeon"……………….. :-) ;-)

(unofficially of course!)


"The Q"



2ef4e1  No.1981276


More about "The Q"





I don't know anything about datamining or deep learning?


— Yaaah Maybe!


I've only written an ITTY-BITTY combined computer graphics

and video processing systems mated to one of the largest

database management systems EVER CUSTOM CREATED where

storing, searching and "datamining" the contents of MILLIONS

of 20 Terabyte video files are mere child's play!


Does that mean my massively parallel expert-system

based 20-language speech-to-text/text-to-speech

translation system is but a mere footnote on my resume?


Are you inferring that my custom designed expert system,

and a biological/chemical simulation of a neurological

structure is considered by you to be just Junior Varsity

computer science work?


OR…do you mean the mere design BY ME of an 8192-bits

Ultra Wide Word CPU processor with onboard terabytes

of SRAM, stacked 3D layered Floating Point, Fixed Point

and Integer computation engine and and the onboard

weighted Boolean logic engine YES/NO/MORE LIKELY/


WAITING FOR RESULT inference engine is just the mere

workings of a blathering uneducated idiot?


Or perhaps my design and coding of a custom computational

fluid/electromagnetic dynamics engine is not enough for you?


Or is my unimportant work on full 3D volumetric video

compression and decompression systems not enough?


Perhaps you may try to enlighten me on my grade-school

software engineering ability by comparing my 30+ year

skills as a Multi-CPU Assembler/C/C++/ADA/Pascal/etc

programmer to your average an Comp-Sci intern!

_ Perhaps I might be mistaken as to my confidence

in my own abilities as a mere member of what

you call a Junior Varsity programming team!


Hmmm……We shall see !!!!


2ef4e1  No.1981443


Found something thing mighty interesting.




"The IBM Blue Gene/Q supercomputer located at U of T’s high performance computing facilities has been named the fastest in Canada and 67th fastest on the TOP500 list of the world’s top supercomputers."


Article was posted 2012, insurance files are from 2013.




Don't those applications sections look a lot like what this guy is talking about?


2ef4e1  No.1981652

File: 960d52681183e44⋯.jpg (242.44 KB, 950x536, 475:268, qcomputer3.jpg)

File: 52a885e33585ff1⋯.jpg (210.01 KB, 950x536, 475:268, qcomputer2.jpg)

File: 67cdb00328b7275⋯.jpg (206.82 KB, 950x536, 475:268, qcomputer.jpg)


Screenshots from the pdf cause the link is fucked.

17528d  No.1981997

File: 3095c5490916436⋯.png (76.27 KB, 739x729, 739:729, datafound.png)

File: d8586179edf44c5⋯.png (3.45 MB, 1125x2436, 375:812, DB0379CC-9229-43B5-AD54-F4….png)

File: f6c0bd558579ff8⋯.png (4.78 MB, 1125x2436, 375:812, EB072EBC-0DF3-4A2C-BE89-E3….png)

File: 5a74adffbba6031⋯.png (61.36 KB, 1125x2436, 375:812, steg-EB072EBC-0DF3-4A2C-BE….png)


used https:// github.com/varunon9/Image-Stegano

2ef4e1  No.1982001


StargateSG7 goes other places and talks a lot.





2ef4e1  No.1982090


Henry A. Eckstein

2ef4e1  No.1982111

File: 92aa341be2b23c2⋯.jpg (192.07 KB, 642x217, 642:217, henry.jpg)

121b87  No.1982275



XML:com.adobe.xmp…..<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="XMP Core 5.4.0">. <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">. <rdf:Description rdf:about="". xmlns:photoshop="http://ns.adobe.com/photoshop/1.0/". xmlns:exif="http://ns.adobe.com/exif/1.0/">. <photoshop:DateCreated>2018-05-02T19:52:05</photoshop:DateCreated>. <exif:UserComment>Screenshot</exif:UserComment>. </rdf:Description>. </rdf:RDF>.</x:xmpmeta>.

d00f6a  No.1982385


see his request to MS about some docs to run Windows on their 128bit CPU, same writing style:

https:// social.msdn.microsoft.com/Forums/windowshardware/en-US/f01665dc-595e-4d45-85b4-22b9ad3776cd/how-to-get-the-hal-hardware-abstraction-layer-and-its-api-for-a-custom-cpu-and-motherboard

b7c652  No.1983152

File: 6e397e0632570d7⋯.png (133.97 KB, 1080x1920, 9:16, Screenshot_20180701-065140.png)

File: 08a6862c2501afc⋯.png (149.34 KB, 1080x1920, 9:16, Screenshot_20180701-065204.png)

The WikiLeaks editorial office high security key says it's expired. Which means 100% confirmed that WikiLeaks and Julian are compromised correct? No argument about that now. I also find it strange under Julian's key there's an identity for "fake@fake.com fake WikiLeaks key for testing fake creation time" with a creation date of Oct. 19th 2016. Same day batch 12 of Pedosta emails were released. Anybody know what day the server timestamps changed on file.wikileaks.org?

598c49  No.1985544

File: 441d1fc790c6f4a⋯.png (26.46 KB, 982x441, 982:441, WL-Jul-14-2014.PNG)


Looking at it on the wayback machine there have been multiple timestamp changes on the file/ but not the torrents

The first archived snapshot that shows the files is Jul 14, 2014. Before that the page was a redirect. So these are the earliest located (available to find now) timestamps in pic related

4338de  No.2000997


394e73  No.2003247

Please ignore unless this is meant for you.































03d33a  No.2004776


this was just photoshop exif data, help me find the other torrent files the legit ones, gonna try this pgp message as key too need to figure out how this was salted

726a3c  No.2006562

File: 0beef7d24828d48⋯.png (52.73 KB, 845x654, 845:654, julianlogmsg.PNG)

File: 588902f4373be17⋯.png (30.55 KB, 1251x517, 1251:517, julianscommit.PNG)

Someone at qresearch told me to post these here.

Julian submitted a fix to psql.c in 1996 and someone from Twatter found it.

I think that guy is alluding that the commit hash has been used by JA for something.

598c49  No.2006577

File: 153c024bd3409e7⋯.jpg (52.3 KB, 526x492, 263:246, b1cffaf4a65661d2464c9d29c4….jpg)

File: 9d5afe7202e91b2⋯.png (17.98 KB, 1218x296, 609:148, 9d5afe7202e91b23bb985798a1….png)

File: 589c88abc892f63⋯.jpg (36.03 KB, 578x328, 289:164, ecb25f50a2fba9999f28be029d….jpg)

additional info


03d33a  No.2007716

openssl enc -aes256 -pass file:wl-A.pass -d -P -in wlinsurance-20130815-A.aes256



iv =22641ECF03183586F01EA178D5096FE9

03d33a  No.2007885


man i cant find a repo that goes back that far on github

03d33a  No.2007892


he also did work on an the linux anagram solver

03d33a  No.2007905


do YOU know the repo?

03d33a  No.2009253

File: e4ef5b70f3f2c96⋯.png (155.61 KB, 1353x589, 1353:589, xca.png)

xca tool uses databases im not sure how yet so im reading man's

726a3c  No.2009538


git clone https://git.postgresql.org/git/postgresql.git

03d33a  No.2010106

File: 730cd51e5867118⋯.png (45.79 KB, 757x340, 757:340, blue-title.png)

File: 531c1ae1a4d0727⋯.jpg (116.54 KB, 800x618, 400:309, bluewater-enabling_bw_pi_m….jpg)

File: f36a0e7fe7cd98d⋯.png (77.99 KB, 378x493, 378:493, legend.png)

File: 730cd51e5867118⋯.png (45.79 KB, 757x340, 757:340, blue-title.png)



found another cray supercomputer, wonder how many there are and at which universities, check out this map

03d33a  No.2010108

File: 5964a7c79a92073⋯.png (112.82 KB, 980x671, 980:671, blue-about.png)

03d33a  No.2010275

File: aa73f6e98244efc⋯.png (123.28 KB, 1337x812, 191:116, sql1.png)

File: 597f4acaf07039c⋯.png (140.44 KB, 1115x764, 1115:764, sql2.png)

File: 0738fbcbc61a75b⋯.png (121.4 KB, 1131x717, 377:239, sql3.png)

6c3c96  No.2018247

File: a46e8bb2b8ad193⋯.png (109.57 KB, 1080x1920, 9:16, Screenshot_20180703-163003.png)

WTF is up with tx? d279250a511af17b804a98b3e2934fca4b99a3d7d511a1fa728ce6f3ce90


d00f6a  No.2028126



you know there was no git revision tool available in 1996, right? (see cvs)

51d315  No.2029068

File: ca17f951c914f8b⋯.jpg (613.16 KB, 1366x768, 683:384, 7527f-wikileaks2bjulian2bt….jpg)

File: 628508becc7bea1⋯.jpg (29.14 KB, 559x296, 559:296, e235b-wikileaks2broger2bst….jpg)

File: d81bb6dc37afb57⋯.jpg (331.48 KB, 540x4034, 270:2017, HUH26062018084559.jpg)

File: 3bc98f4ae10958e⋯.jpg (325.89 KB, 540x2421, 60:269, q8052018102358.jpg)

0a80de  No.2030572


I see no point to that command - it will work on anything you put in wl-A.pass whether it's correct or not. It just uses wl-A.pass to generate the iv/key (using salt from the first 16 bytes of the .aes256 file). That key/iv you provided doesn't work either.

$ openssl enc -aes256 -d -in wlinsurance-20130815-A.aes256 -out wlinsurance-20130815-A.decrypted -S 0F0BDA00F0359A0F -K BC34C1DCD70AB18F3730F5E4C7F992C5A451B6542DAF0692AB1565BA867193CA -iv 22641ECF03183586F01EA178D5096FE9
bad decrypt
140647319017112:error:06065064:digital envelope routines:EVP_DecryptFinal_ex:bad decrypt:evp_enc.c:529:

0a80de  No.2030745



(linking to an older tag instead of master branch so you can see 1996 dates)



you know git can import from cvs, right?

121b87  No.2031693


This is so stupid it made me laugh. thanks



4831c1  No.2033358

File: 5c38fc79b04eae2⋯.png (87.37 KB, 228x255, 76:85, Pepe4.png)

From last night/early AM discussion about asset seizures and currency reset which may be happening worldwide. A financialanon seemed to have some inside information. It was going fast, hence many typos/misspellings. Posts are not in chronological order. All post numbers deleted for ease of reading, but have retained offline.

I keep wondering about what Donald Rumsfeld said on 9/10/01. The world needs honest accountants and whistleblowers so much.



read of thier finding over 20 mil of fake supernotes palletized in thier vault, about three days ago a small presser was released

warehouse full of pallets of american currency rendered worthless with a stroke of a pen?

I think the currency issue is real and everything you said is true, but I still think the 99% into the hospital is something more sinister, even for anons here. it's why Q is saying he needs us. Normies are gonna have broken brains, even the ones that voted for Trump

aye, a complete sudden collaspe of currency, to be replaced by us governemnt bills backed by gold?

An anon posting in the wee hours yesterday mentioned that the financial side of things was in his wheelhouse

Went on to say that Q team - he called it The Alliance - was in process of seizing trillions of dollars from many accounts worldwide.

Anybody else heard anything about this?

If so – how about we pay off the national debt, and forgive a bunch of other personal debt?

I forget which executive order but Trump signed one saying anyone imvolved in huma rigjts abuse can have all their assets seized a appropriated to America and its needs.

investigate super notes…paid from IRS, rather than Treasury. just one account shows over 800 bil loans to swiss bank..and that is just one account. JPMorgan found over 20 mil dollars of fake super notes in thier newyork vault, looks like scince we started refunding peeps in syria, they all got paid with fake super notes….swiss CB shows where its been investing 80% of what we loaned them to buy into the 4 FANG stocks…and as i say, that is just one venue…what i do say, is 17 trillion debt by Americans is mostly where past adminastration milked evry American that has evr worked.

What is a "supernote"?


Scroll down and check out the parties which produce counterfeit USD of that quality. Three letters?

e1b5f9  No.2033599


Upload what you have saved somewhere then, please.

e1b5f9  No.2033786



598c49  No.2051565


do you have something you can upload? turn it into .pdf file?

d49de7  No.2053082

Bump, what's happening to this board?

d00f6a  No.2053865


[_] comp'd

[_] infiltrated

[_] php memcache fuckup

[_] cloudflare

[_] other

598c49  No.2054947


The first layer of encryption is broken, but the next layer encryption keys have not (so far) been figured out.. This is an ongoing process since October 2016.

0ca0b2  No.2060293


598c49  No.2068274

Can someone take over looking after this thread? Its a good bit of work that would be harder to replicate if the thread dies. Im unable to do it after today. Thank you. Keep fighting!

1e9784  No.2072464

File: 2f1f185a28a5aa1⋯.png (98.48 KB, 587x592, 587:592, 2f1f185a28a5aa198cd043b7be….png)

File: a2355990aab5528⋯.png (9.53 KB, 588x115, 588:115, a2355990aab552809547df3ffb….png)

f27e69  No.2103460

File: d802fd62076730a⋯.png (287.44 KB, 1156x759, 1156:759, insurancediffs.png)

File: a2c5f74283c6fbf⋯.png (386.61 KB, 1528x963, 1528:963, msg911.png)

found the real insurance files inlcuding different filesizes, different torrent files, and the direct link to the aes256 also in the message-911 archive every name






is mentioned, you absolutely must read the 45mb file all this stuff is on archive.org and govermentattic and memory hole etc

when its said we have more than we know i believe this is what Q is referring to

you know that voicemail about dont get on the plane, not human, etc? with a bunch of numbers and callsigns??? thats in here too

f27e69  No.2103496

File: 139de061634d0c0⋯.png (144.2 KB, 476x1064, 17:38, way1.png)

File: 914be461d29ba78⋯.png (167.8 KB, 467x1039, 467:1039, way2.png)

File: 6f7fcd9d8a98476⋯.png (168.98 KB, 459x1062, 51:118, way3.png)

File: a14200bc2610bfe⋯.png (345.65 KB, 2656x596, 664:149, lllllll.png)


looking for sata cables and ide adapter gotta plug in some more drives

f27e69  No.2103510


yes and even svn! kek dude there are a million sql repos i just needed to know which one

f27e69  No.2103534


dude im just starting with what i found on the day they ddosed him and going from there, that loop was posted with 1/4 and 2/4 key deadman switch, but if you do -base64 it FUCKING DECODES JUST FINE the cut 0000 is for hex editing out line #s i guess not sure about cut 1-23, ive written like 10 versions of script, also the salt is fucked up cuz with openssl you have to cut out first 8 chars cuz it says salted, maybe switching to gpg because if ound tons of .gpg dumps today on archive

f27e69  No.2103551


and there wont be one after 2018 thanks to microsoft, kek, lesse in 1996 i had an apple][gs and 9600baud external

anyway teach me the ways of databases oh wise one, for real i only know about injections, columns rows and tables, i dont get the usefulness of it over a txt file with csv

f27e69  No.2103590


im documenting my work btw, now ill >>1981276

i found some illegal/magic primes on 2ndgen, will post when find

f27e69  No.2106513

wonder if its rubber hosed, as well,

Tell hosed to attach itself to your newly created extent file:

# hose attachextent

Tell hosed to key aspect 0 (default). This "primes" the aspect.

# hose keyaspect

Tell hosed to bind aspect 0 (default) to a disk device

# hose bindaspect

# For crypto deniability reasons, the maru device assigned is

# random. In this example, we presume /dev/maru4

Aspect 0 should now appear as one of the /dev/maru* devices. We will

now create a file-system on it. It's important for efficiency to have

the file-system block size the same as the crypto block size (defaults

to 2048 bytes, see newkeymap -b), so we will tell mke2fs to use 2048

byte blocks.

# mke2fs -b 2048 /dev/maru4

Now, mount it!

# mount /dev/maru4 /mnt

Have a look inside:

# ls -la /mnt

Try copying in /bin/sh:

# cp /bin/sh /mnt

Unmount and unbind, dekey

# umount /mnt

# hose unbindaspect

# hose dekeyaspect

# hose detachextent

# hose_modunload

man pages (quite brief at the moment) and other documentation are

in doc.

Happy Rubberhos'in!

-Julian Assange <proff@iq.org>,

Ralf-P. Weinmann <ralph@iq.org>

f27e69  No.2106534


ahem notice the domain of this decade+ email address of JA, after this it becomes proff@suburbia.something

f27e69  No.2110137

File: 8801a90478359d4⋯.png (154.68 KB, 842x823, 842:823, alice.png)

http://archive .is/gTP3

dont know how many of you have read alice and bob in regards to keys in many many IT/comp-sci books

no mention of bob here

call me a private dick anons cuz im hot on this trail kekek

d01bed  No.2115757


d01bed  No.2126335


a43189  No.2144546

bump. dont lose the work done so far. Good luck to crypto anons

d33218  No.2145312

File: 78965d25c2d89ea⋯.pdf (6.52 MB, - OUTER HEAVEN 2.pdf)

Here are some archives, have fun

Part 1

d33218  No.2145318

File: 64e687a68f4e754⋯.pdf (6.7 MB, - WL Insurance Thread.pdf)

Here are some archives, have fun

Part 2

d33218  No.2145320

File: 7dbe3b101b3ff52⋯.pdf (3.65 MB, Insurance files key testin….pdf)

Here are some archives, have fun

Part 3

d33218  No.2145327

File: c807c3de2d31ce8⋯.pdf (4.12 MB, -2 OUTER HEAVEN.pdf)

Here are some archives, have fun

Part 4

d33218  No.2145853

File: 20492493d55956f⋯.pdf (1.46 MB, Full_Thread.pdf)

Here are some archives, have fun

Part 5

d33218  No.2145862

File: cd660ce04c8d8da⋯.pdf (198.14 KB, http___oniichanylo2tsi4.pdf)

Here are some archives, have fun

Part 6

e8b94d  No.2146672


As to the StargateSg7. I do not know of the validity of this user. But it has some of the same "slang" or disregard to his posts. As well as some almost insane (litteral) talks about crypto and the likes.



eac028  No.2147184


You clearly don't understand the difference between symmetrical & asymmetrical encryption.

Like wist the differences between one-way hash/digest functions and digital signatures


a43189  No.2177695


quite a body of work

6e7789  No.2181973

File: 074e8ae3fcd7d84⋯.png (60.13 KB, 1033x318, 1033:318, wltweet.png)





58 20 3 -jx 02 B9 28 48 82 -21A3 7 8402

see what ive done so far? hex to octal + perhaps wikileaks tweet with similiar

but i dont know because 0 is null in octal or rather null is 0 so what to do about the 0000, really we should convert the whole thing to binary…..

4767 5774 6a7a 4d6c 6330 666b 314a 3453 0000 0907 84b4 f787 7616 86f7 a737 5707 5736

d9e2e0  No.2182101



Its just padding. Look elsewhere.

6e7789  No.2182153

amounts of failed tx

also the T pattern q uses in my mind i think tetrads from tetris, pattern, its so late in the game im gonna say it now, over 2 down 2 or right 2 down 2, think of an 8 bit game of snake on a grid such as the supposed pgp message above, kek those equals were tricky

5107c5  No.2182765



05f4bc  No.2203035

I have the archives of every thread that was related to the wl insurance files digging that was done at outer heaven board. If people want them I have the full html's saved in a mega.nz folder thingy. I can supply the account and password.

AssangeIsMyWaifu@outlook.com PW: WeLoveAssange1234

e64c98  No.2203443

There were 3 from Dead Man Switch

See if this is helpful.

Ive had this shit in the pocket of my wallet since oct 2016

there were 3, AB and C






C. https://wlstorage.net/torrent/w/insurance=20130815-c.aes256.torrent


e64c98  No.2203457



Correction… thats




505762  No.2216784


cd93e3  No.2244834

File: b1caaa307d02a55⋯.png (35.52 KB, 427x643, 427:643, key.png)



that was me leeching, i actually thought why dont i run strings on torrent files themselves

cd93e3  No.2244857


2nd circle possible drive letter on mounted/ fs / container / true/vera/crypt

cf2e75  No.2246460

File: 1bba514532e8296⋯.png (150.42 KB, 222x512, 111:256, 4.png)

File: 42c4e05c74efb2a⋯.png (174.84 KB, 222x512, 111:256, die.png)

File: 6453f6893217d5b⋯.jpg (30.43 KB, 222x512, 111:256, index.jpg)

File: e8105f6ba726cee⋯.png (173.26 KB, 222x512, 111:256, walet.png)

this needs to be cut and flipped as well, ends up being a bomb going down dna chain to a curled up child/fetus says stuff about 9 11, wallet, lies, and ksa depending on the offset, my kingdom to know what program this is, i have every shitty github steg program there is for past 6 years, can read most of the strings too,

cf2e75  No.2246494

File: dbfd5facfdb2159⋯.png (150.91 KB, 222x512, 111:256, 3.png)

File: d3bd29b4d9cb2f3⋯.png (173.75 KB, 222x512, 111:256, offset21.png)

File: 3d33f9559c7ff0a⋯.png (24.07 KB, 1051x235, 1051:235, hints.png)


it might make a wider panarama though because theres several pictures in there, evil wizards, etc. this image comes from a different 404 page than the site uses for others, pretty sneaky, theres urls at the end of these torrents posted above, thanks anon, just run>$ strings *.torrent on them in their own folder

someone has to be smarter/ better equiped than me to solve this, thanks megaanon and urlanon, oooo almost forgot theres a badass picture of the pyramids in there too, guess i saved it as a bmp on accident.

cf2e75  No.2246507


i bet because its only eastern hemisphere the solve is to get west dripping to east and/or vice/versa

505762  No.2249664


That's exactly what I'm trying to explain.


All the ID's in the outer heaven thread where jean first popped up are the same too. Someone asks why and they say something about OP being comped so they all used it

cf2e75  No.2250150


of course they are, they would have been frantically trying to mislead us while they ddos'd and v& everyone, i cant believe im the only person posting this shit, its not that hard to see whats hidden, how comped are posts here/bread like outer heaven? wehn i post this in bread people lose their miiiinds

cf2e75  No.2252211


kekekek,it actually is!!!! only mine is backwards mirrored did you solve it too? my solve is in black and white, recorded offsets going back thru to try for color rabbit real fast

cf2e75  No.2252220


i knew i was close i had my bios nuked yesterday had to reflash and reinstall last night, gonna take more than that

cf2e75  No.2252245

File: 8c31ce9ea7c61ee⋯.png (466.3 KB, 612x392, 153:98, 17777777777777153232606792….png)


i told those assholes in the bread but i think it will go right past them, serves them fucking right, that place is a vortex of groupthink at the moment, im going back to the frontlines of /pol just gonna leave this here and see how long it takes someone to figure it out

cf2e75  No.2252364


to be clear its spelled out

6e9f22  No.2266478

File: 36e46acad64eb0a⋯.gif (997.49 KB, 425x259, 425:259, Julian_Assange_Smile.gif)

File: b28cd026b76456b⋯.png (112.17 KB, 361x371, 361:371, dental_records.png)

./stegdetect filename

result #

extract red #

extract blue #

extract green #

combine all #

(removes alpha channel)

stereo seperate hat over head

stereo seperate using things like pixels / patterns for markers

correct path shown by markers of words from Q posts and wonderland minor character

THINK wwg1wga ExPAND

6e9f22  No.2266710

i really pray he's safe. ive seen some things that suggest he's already out of there. this is going to sound completely nuts, and it is but when i read something about the size of the embassy room he had i wanted to do something to help, but what could i do being a simple meme farmer? i flipped my bed up on side and used it as a partition to cut my room into 1/3 of its size, used the rest for storing shit my mom had no where else to put (earning extra good boy points for tendies) and slept on the couch a foot away from computer. ive told nobody why, hoping my pathetic gesture of solidarity would somehow count for bonus round with god… i'm no saint. today im putting my bed back, as a further show of faith.

inb4 jpeterson_cleanroom.jpg.

a43189  No.2282289

File: 65f5aa7dfdf42e1⋯.png (9.03 KB, 530x183, 530:183, key.PNG)

where does this key go?

34d952  No.2290852


Thanks for these pictures. It is very sad to see this. I hate to see destruction.

e11a7b  No.2292705


gonna be another day before ill have insurance files again, i straight up got nuked from orbit, can someone else who has them let me ssh in?

e11a7b  No.2292707


my isp is PISSED btw im throttled for downloading close to a terabyte twice

e11a7b  No.2292717


modem dropping out, i dont care about myself, but i cant put others here in a position….

need advice

e11a7b  No.2292726


fuck it neighbor is getting pixied

e11a7b  No.2292748


if i had a 10mb or so of each insurance file i can test, its a ssl vuln. also im thinking should be using libre

830c23  No.2294826



Subsequent post made my spidey senses tingle.

I understand you cannot speak of what you've found.

This is fine.

Just keep up the good work.

Thank you for all you do.

598c49  No.2307410



9133a1  No.2312303

9ae673  No.2319884



e775ff  No.2320444

File: 0e94c632f5058ba⋯.jpeg (50.61 KB, 500x375, 4:3, 6930C6A1-7CAD-4889-8EDF-3….jpeg)



They’ve been controlling us since Ancient Egyptian times.

eac028  No.2320545


That explains Cat Ladies

505762  No.2321928


h ttps://gofile.io/?c=V29bYY







Each one is 4.9 mb

That should be big enough to get you started then once you narrow the candidates down you can switch to an air gapped machine and try the full files



b35bd1  No.2334600


They were trying to put codes into the sarah silverman image. Not sure what progress they made, I cant find the thread anymore. Apparently a bunch of cryptofags were brute forcing it. I'll see if I can find it in the archive, it was Qresearch board about the same day as the Q post

6633ee  No.2335948

File: 8738db5073afcba⋯.jpg (39.71 KB, 677x677, 1:1, 37261501_10214111066343500….jpg)

I have the original wlinsurance-20130815-A.aes256 ABC files. I downloaded them the day they dropped and rar pw'd the set until pw dropped.

eaf87a  No.2351555

What about the hex code dropped tonight?

3d33c8  No.2358192

Why is there a thread on cuckchan saying the Deadmans switch was released?

dc17ee  No.2369421



just plenty of kek there, NOTHING more than op faggot claim

505762  No.2369557



Whats up with the hex code >>2351555 trips is talking about?

14389f  No.2415609


0897b0  No.2415976

File: 577968f3f3c1a7c⋯.jpeg (206.27 KB, 1125x512, 1125:512, E0758C3F-A2DC-4BB4-BFA2-1….jpeg)

Anything here guys?

b1009e  No.2420482


b1009e  No.2421135

Bump bump bump it up

eac028  No.2421248


Idle speculation packaged as inside info.

Timestamp say he wants credit is it comes true

Otherwise, he slinks away for another future post

David Wilcock gets away with this again and again

No negative consequesces

b1009e  No.2421812


Maybe true but wouldn’t hurt to check out the hash

eac028  No.2421962


Good idea

What did you find when you checked it out?

What is it a hash "of"

Do you have the original and hashing method that created it?

Thanks for your help

eac028  No.2422189

File: ad333432a432023⋯.png (150.33 KB, 644x554, 322:277, Fake proof.png)



ps It wasn't worth the time since no new information was provided by either bs posting

598c49  No.2441901


and another bump. can't lose the work already done

505762  No.2448427

Bumpy smalls

c53800  No.2458865


i can chime in here . Those are threads from “endchan” and the threads were called “outer heaven” and “outer heaven 2.0” — the threads — with full text of all posts — are scrubbed from the internet on all major search sites. BUT , you can find them on scribd — links are floating around places , but you could try searching for bits of the python code posted above “jean.py” … along with the Kerry transactions , and you will be able to locate the threads in question. This is very real. I was able to duplicate all of the work so far mentioned in this thread (up to this post , reading through in order) . but you will not be able to duplicate work with scripts as posted , because blockchain explorers (specifically blockchain.info) no longer contains the information you need to follow the trail. this does not mean the information is gone , it means that the blockchain explorers are hosted on a third party website , and designed for people who do not possess their own copy of the blockchain. This will next lead you to the realization that you must possess your very own copy of the blockchain , and then run the scripts . I believe this will work. However , this is where i began running into additional problems and again could not duplicate work. Long and short of it is : the btc blockchain you will download today does not contain the OP codes …that was a change quietly made by btc core during the soft fork that occurred sround July -September of last year ish. So, this next led me to the realization that I need to download a copy of the blockchain from prior to the fork, from someone that did not do the segwit upgrade … now, this is where I ran into the problems. I can not locate a copy of that blockchain. if I had had a copy of the blockchain already , prior to all this , I would be good to go. But since I didn’t , and needed to download one , i was forced to try and locate it …which is, as far as I can tell, a very difficult thing to do. This next led me to the realization that perhaps i should check out the btc forks since the data should be there , and then you’ll have to start worrying about the timing of the fork, because it has to occur before segwit. Bitcoin cash qualifies. So next, I downloaded bitcoin cash blockchain. That was a dead end. For someone reason, bitcoin cash retained all of the transaction information …but diD NOT retain the original BTC op codes, which , again, are needed to generate the files. Someone please correct me if I am wrong on that , but that is my understanding and i was unable to find the info needed using btc cash because of the op code issue. All of that took a lot of time and effort and still resulted in a dead end. As of today, this is still where I am currently at. As far as I can tell , what I need to duplicate it is a copy of the blockchain from some node that didn’t follow the fork, i don’t know how to find and download that, and I don’t know anyone who has it . I HAVE asked around , and I found many people who have a node …but all of them did the upgrade, so…no dice. At least , so far. It is definitely out there somewhere though and I will pursue further if someone can point out next steps from here. As a final note: please do read the “outer heaven” threads. That is the source of the “this is the end” type pictures you’ll find floating around places. It’s on scribd. And if you can’t find it there , I will drop them here once I can get back to a computer (72 hours away from now at least, long story) this board accepts PDFs , yeah?

c53800  No.2458969


Post your error I think I got that one also, fixed it eventually but whatever solution I had was super hacky and definitely not pythonic doctrine. but if you hit that error you’re on the right track I think. Some change must have occurred. I can help diagnose though if you post your error output

eac028  No.2458974


So this board thinks they can crack a 256-bit symmetrical encryption by brute force?

Do the math on 2^256 then calculate the number or permutation of that result.

Apply that # of possible values to the real world

Mathematically impossible or else it would be totally worthless since any serious state actor has orders of magnitude more resources that are here on 8 chan.

Come back to reality

c53800  No.2459013


the jean.pu thing is doing something where python is reading raw data and creating something like a C-struct from it , and telling it to make sure the strict is reading in integer length info …but it’s all janky because it relies on some module to do it and I think the module itself has since changed . it’d be better to translate this into C so then we could understand what the hell is actually going on when those calls get made. But I dig into the source code for those packages a while back and ultimately hacked something janky together for it. but yeah post errors I’ll orobably have to redo it myself anyway because I’m sure I forgot how I made it work by now

c53800  No.2459053


Nobody is cracking encryption here or claiming to crack encryption by “trying random keys” . the files are encrypted , getting the files takes work , and decrypting the encryption requires passwords. Files are encrypted multiple times (decrypting one reveals another file that is also encrypted). but you need the files and you need the first layer removed or you won’t be able to do anything when and if the keys are revealed (or discovered)

c53800  No.2459235


Another program that automates this is “binwalk” — the better parts of it are only available on Linux but the bits about extracting known file types from file headers will run on any Unix system (ie works on OS X also)

c53800  No.2459391


The outer heaven articles imply that there are instances of both — st the block level AND the transaction level. The oiter heaven threads also contain source code for detecting files from either level.

598c49  No.2474502



upload to mega etc

4af397  No.2483655

cure for limp dick big E[m} or little e[the original eye thru neeedle}

not cure but maintain

oi oi reading king richard 111

RICE cam e by to eat other night, no responce

henry viii, will try again if response affirm,

more pac than a fun of llahams

4af397  No.2483843


got ant problem apearantly

gonna get em with screwdriver

eac028  No.2484723


When all you have is a hammer, everything looks like a nail

When all you have is crytocurrencies, every method of encryption looks like a blockchain

Start here to understand why AES-256 symmetrical encryption is not block chain.

Cryptocurrencies Aren't 'Crypto'



As the price of Bitcoin and Ethereum skyrocket, and more and more people who are unfamiliar with technology join in the craze, words start to lose their original and correct meaning

Lately on the internet, people in the world of Bitcoin and other digital currencies are starting to use the word “crypto” as a catch-all term for the lightly regulated and burgeoning world of digital currencies in general, or for the word “cryptocurrency”—which probably shouldn’t even be called “currency,” by the way. (That’s another story.)

Excuse me, “the crypto” what? As someone who has read and written about cryptography for a few years now, and who is a big fan of Crypto, the 2001 book by Steven Levy, this is a problem. “Crypto” does not mean cryptocurrency.

Bitcoin and other technologies indeed do use cryptography: all cryptocurrency transactions are secured by a "public key" known to all and a "private key" known only to one party—this is the basis for a swath of cryptographic approaches (known as public key, or asymmetric cryptography) like PGP. But cryptographers say that’s not really their defining trait.

“Most cryptocurrency barely has anything to do with serious cryptography,” Matthew Green, a renowned computer scientist who studies cryptography, told me via email. “Aside from the trivial use of digital signatures and hash functions, it’s a stupid name.

Emin Gün Sirer, a computer scientist who teaches at Cornell University and is involved in the world of cryptocurrencies, told me in a Twitter direct message that the cryptography in cryptocurrencies is “basic and simple” and just plays “an ancillary role.” The biggest innovation, he added, is the use of blockchains (publicly viewable ledgers that record every transaction since its beginning) as “consensus protocols” and “distributed systems.”

“If people know what ‘crypto’ is, they should know it as a real technology—not as some synonym for Bitcoin,” he said.

So if you care about this, please politely correct people who incorrectly use the word “crypto.” Or maybe make fun of it, as Ryan Stortz, a security researcher in New York suggested. In a chat, he joked that he wants to start trolling people by referring to cryptocurrencies as “Block,” short for “blockchain technologies.”

Advanced Encryption Standard


AES is a subset of the Rijndael block cipher[3] developed by two Belgian cryptographers, Vincent Rijmen and Joan Daemen, who submitted a proposal[5] to NIST during the AES selection process.[6] Rijndael is a family of ciphers with different key and block sizes.

The Advanced Encryption Standard (AES), also known by its original name Rijndael (Dutch pronunciation: [ˈrɛindaːl]),[3] is a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST) in 2001.

Block cipher


8 Notable block ciphers

8.1 Lucifer / DES

8.2 IDEA

8.3 RC5

8.4 Rijndael / AES

8.5 Blowfish



A blockchain,[1][2][3] originally block chain,[4][5] is a growing list of records, called blocks, which are linked using cryptography.

Blockchain was invented by Satoshi Nakamoto in 2008 to serve as the public transaction ledger of the cryptocurrency bitcoin.[1]

edf358  No.2488970

Q !xowAT4Z3VQ ID: 13be8e No.1004880 📁

Apr 11 2018 20:22:02 (EST)

Thank you Alan.

Welcome aboard.


Juilan was picked up on the 11th of April 2017, Q keeps rubbing it into your face by saying "we have the server[s]"

Q !CbboFOtcZs No.117 📁

Aug 3 2018 16:26:29 (EST)



We have the server[S].



L.iving in



I believe in JA, 4 10 20, Ad R


466a36  No.2492444

Julian please read and respond































81a773  No.2499355


This is from the small endchan archive with the blockchain magnet URL. Not sure if it’s still good - let me know.






>here is the up to date blockchain torrent/magnet. Please consider downloading and seeding even if you have it already to help the swarm. Thanks. It's about 100GB


>Once you download copy or move the files to this location, then you can run Bitcoin core to sync it up to the minute: %APPDATA%\Roaming\Bitcoin

or C:\Users\ <YourWindowsUsername> \AppData\Roaming\Bitcoin

81a773  No.2499370


This is the block chain from 2016

81a773  No.2499424



c336d08c199ea108cd1c9e8fb3da289fc0887e85cb9fd53cb56a0b8041d05838 100.0% (.DMG) Disk Image (Macintosh) (1000/1) 2016-07-24 22:30:48

fdfd8c3c9b535551945645e212852df757763eedc2b05ae56ec6df1beb511105 100.0y% (.VC) VisiCalc spreadsheet (1000/1) 2016-07-14 08:44:12

2767c5a7386aa02b973e88304bdc12d91583146c94f90e91075042a164c93d05 100.0% (.GPG) GNU Privacy Guard public keyring (1000/1) 2016-08-26 23:23:10

eb75ada9646771a94d8c46d86f52923e2c0d2302bae73a0dda14ac842836f4ce 100.0% (.GPG) GNU Privacy Guard public keyring (1000/1) 2016-07-25 03:43:10

c336d08c199ea108cd1c9e8fb3da289fc0887e85cb9fd53cb56a0b8041d05838 100.0% (.DMG) Disk Image (Macintosh) (1000/1) 2016-07-24 22:30:48

fdfd8c3c9b535551945645e212852df757763eedc2b05ae56ec6df1beb511105 100.0% (.VC) VisiCalc spreadsheet (1000/1) 2016-07-14 08:44:12

f6046148a74fa880403c630de743f7d01736725d941e744ce0c89baa098287ec 100.0% (.FLI) FLIC FLI video (1/1) 2016-05-24 21:39:18

042c1cd09ec672e2d504b76e16398c62396fa57ab0004a793dfc68d49d3e4cc9 100.0% (.BS/BIN) PrintFox (C64) bitmap (1000/1) 2016-04-24 07:47:50

83f7a29360abe4e927ae25ad803d2a28d088d119a47941fe0c42445bb2e78730 100.0% (.VC) VisiCalc spreadsheet (1000/1) 2016-04-21 06:17:47

ad85d76b5fd006cb3f08edda4d80327f425caed83aeb20aaa0c0ed281064484b 100.0% (.VC) VisiCalc spreadsheet (1000/1) 2016-04-14 19:14:05

fa3e0d76b55e01c45dd4218a41794f39b3792310cf1a88f3502824e4afc3e867 100.0% (.VC) VisiCalc spreadsheet (1000/1) 2016-04-14 02:26:40

6ea5ff73db52591661ff7c0c7eb161594b67b8e129ccc2e1429fe0c71d69e1ff 100.0% (.VC) VisiCalc spreadsheet (1000/1) 2016-04-13 23:05:59

35bfef9b0febbf3b1cefbd8f503e90d997e55d9f3841e45f359529debd6c1bca 100.0% (.VC) VisiCalc spreadsheet (1000/1) 2016-04-13 22:07:46

7fd31fccd96a3e94c21d15b45ae1957c22fe51a1aa6cb18f054bda20966304ac 100.0% (.VC) VisiCalc spreadsheet (1000/1) 2016-04-13 04:22:39

78a013b6c857f5535b9133896d4c115d2bbe15995a28a71f63049bf3bdcb1eba 100.0% (.VC) VisiCalc spreadsheet (1000/1) 2016-04-12 22:23:58

c336d08c199ea108cd1c9e8fb3da289fc0887e85cb9fd53cb56a0b8041d05838 100.0% (.DMG) Disk Image (Macintosh) (1000/1) 2016-07-24 22:30:48

fdfd8c3c9b535551945645e212852df757763eedc2b05ae56ec6df1beb511105 100.0% (.VC) VisiCalc spreadsheet (1000/1) 2016-07-14 08:44:12

f6046148a74fa880403c630de743f7d01736725d941e744ce0c89baa098287ec 100.0% (.FLI) FLIC FLI video (1/1) 2016-05-24 21:39:18

81a773  No.2499443


042c1cd09ec672e2d504b76e16398c62396fa57ab0004a793dfc68d49d3e4cc9 100.0% (.BS/BIN) PrintFox (C64) bitmap (1000/1) 2016-04-24 07:47:50

83f7a29360abe4e927ae25ad803d2a28d088d119a47941fe0c42445bb2e78730 100.0% (.VC) VisiCalc spreadsheet (1000/1) 2016-04-21 06:17:47

ad85d76b5fd006cb3f08edda4d80327f425caed83aeb20aaa0c0ed281064484b 100.0% (.VC) VisiCalc spreadsheet (1000/1) 2016-04-14 19:14:05

fa3e0d76b55e01c45dd4218a41794f39b3792310cf1a88f3502824e4afc3e867 100.0% (.VC) VisiCalc spreadsheet (1000/1) 2016-04-14 02:26:40

6ea5ff73db52591661ff7c0c7eb161594b67b8e129ccc2e1429fe0c71d69e1ff 100.0% (.VC) VisiCalc spreadsheet (1000/1) 2016-04-13 23:05:59

35bfef9b0febbf3b1cefbd8f503e90d997e55d9f3841e45f359529debd6c1bca 100.0% (.VC) VisiCalc spreadsheet (1000/1) 2016-04-13 22:07:46

7fd31fccd96a3e94c21d15b45ae1957c22fe51a1aa6cb18f054bda20966304ac 100.0% (.VC) VisiCalc spreadsheet (1000/1) 2016-04-13 04:22:39

78a013b6c857f5535b9133896d4c115d2bbe15995a28a71f63049bf3bdcb1eba 100.0% (.VC) VisiCalc spreadsheet (1000/1) 2016-04-12 22:23:58

aa3bf652dc745e8a1265c3641858e9a75e4cd3ee85eb843033b4302e2dec5fc7 100.0% (.FLC) FLIC FLC video (1/1) 2016-04-06 05:53:04

b4c38335541fd578bdc4d45a1a4a47e3baadd2a55ae41c0e5535eb4307d49b24 100.0% (.PGC) PGN (Portable Gaming Notation) Compressed format (1000/1) 2016-03-18 18:12:19

b20ad5f8b75bae16a6d1e3de2fb25910be868f936a6e3cc3d997598dced14f89 100.0% (.FLI) FLIC FLI video (1/1) 2016-03-15 21:19:44

24b0967ecca36dd455b9a96e48d8c0f13a36acdd37290f6baae3c50b7065627e 99.9% (.MP3) MP3 audio (1000/1) 2015-11-28 09:53:31

32d71a560a965fe17ca5a652202844f5bb580d185e38485aacad8717485b0b8e 100.0% (.VC) VisiCalc spreadsheet (1000/1) 2015-11-20 21:53:12

03e8a9b1197744012af33c642671ed8eb50fd2d442d4875a3274f730ac2ca951 100.0% (.VC) VisiCalc spreadsheet (1000/1) 2015-11-19 22:16:50

2a38f95db552a52aefa82565ffd81e885103738da25627f1e894f5892a672325 100.0% (.VC) VisiCalc spreadsheet (1000/1) 2015-11-12 18:27:54

15d4f6606f7ad966e27f9628acf3c1929eb50cb2fef0ecb949fb8941b94254cc 100.0% (.MP3) MP3 audio (1000/1) 2015-11-06 10:47:37

13bd667802cc58936996dbf5defd2307b716e1f84a9908de0c77f3c1a3b4cde3 100.0% (.FLI) FLIC FLI video (1/1) 2016-11-21 18:23:36

8218ab03d82ebfa309aceedb484e695bc058f080397d7794826c9efc1d0287b7 100.0% (.) QuickBasic BSAVE binary data (1000/1) 2016-11-15 19:41:03

c06244b1da9edb9da54736c17cf8d92cc754e1cd109c5a9858d7eb107079ff31 100.0% (.FLI) FLIC FLI video (1/1) 2016-11-09 18:46:55

81a773  No.2499460







That’s the end of my archive

81a773  No.2499514


Also found this


USE THIS TIMELINE: h ttps://oxwugzccvk3dk6tj.onion/pol/res/8180723.html#q8192699










598c49  No.2532985

bump for Trump

3385c1  No.2538792


6bad5e  No.2540428

I have no idea whether this will help or not.

It may be interesting for some, and not for others.


ESIZKUR shall sit aloft in the house of prayer;

May the gods bring their presents before him, that from

him they may receive their assignments; none can without

him create artful works. Four black-headed ones are

among his creatures; aside from him no god knows the

answer as to their days.

It's a cold and wintry night here in Melbourne and the gusts of wind

and rain seem to be unusually chilling. What had I, in my search for a

cryptographic mythology, stumbled onto?

I look hard at the seven letters E-S-I-Z-K-U-R. A frown turns to

a smile and then a dead pan stare. I write down:



7b3637  No.2541085


terry davis

nist uses precommitments makes pgp keys bases on time

find the white rabbit

the playboy where don says he would "date" his daughter

find her "date" plug into nist

get key

7b3637  No.2541104


i lost 2 computers in 2 hours working on this

be careful

i only have a couple left

b6f01f  No.2541178


occam's whispers "LARP"

56cb10  No.2543396


>I can’t find a current pol thread on this.

that's because the samer info is posted over and over again as idiots running in circles make non-discoveries to announce to the world.

Assange hid the key in blockchain transactions. use the python code given above to search scrape the blockchain and find the transactions. That has been the one single task that has needed to be done since october 2016 and none of you are doing it. you're larping and don't even realize it.

b525bd  No.2543404



56cb10  No.2543451


Another massive file for people to download? Odd how people keep downloading hundreds of gigs and yet can't seem to find anything worthwhile in those files.

>write the python script

>scrape the blockchain for the encryption key

>shoot anyone that tells you to download files.

e044a3  No.2543867


Theyre fucking encrypted, of course nobody can get anything out of them yet.

56cb10  No.2544054


>of course nobody can get anything out of them yet.

except for malware. Don't download the files, dipshit. they're bogus

7b3637  No.2559077

File: 8045cb5f07ce636⋯.png (849.78 KB, 500x387, 500:387, 9community03.png)

File: 5ec87192e40ed66⋯.png (836.78 KB, 500x350, 10:7, 9community05.png)

File: afcceadcfd16d38⋯.png (380.22 KB, 500x410, 50:41, 9community06.png)

File: e2c95d6fbcc18de⋯.png (333.08 KB, 794x771, 794:771, 9community10.png)

7b3637  No.2559099

File: 33d1beef7d6fb74⋯.png (619.86 KB, 500x375, 4:3, 9frontsystem04.png)

File: e86f72f8db7b20a⋯.png (708.94 KB, 500x364, 125:91, 9frontsystem06.png)

File: b7e96fe7daf8385⋯.png (1.25 MB, 500x530, 50:53, 9frontsystem07.png)

space ayyyy

7b3637  No.2559119

File: eed792d2a894da0⋯.png (159.92 KB, 550x413, 550:413, 9the_front_fell_off_01.png)

File: cc9807c869acb93⋯.jpg (32.21 KB, 480x360, 4:3, 9titanic.jpg)

File: 0a80cbc306960a9⋯.png (35.38 KB, 602x461, 602:461, 9troll03.png)

File: 7b0b7722fda9cd1⋯.jpg (49.32 KB, 600x457, 600:457, 9troll04.jpg)

598c49  No.2574877


bamp to keep alive till additional keys drop or JA shows up

ab84fb  No.2582852

What about the 4 gpg files found right after cablegate in the blockchain?

598c49  No.2594435

SHA512 is missing:

WikiLeaks insurance 20130815 - A (3.6gb)

MD5: a243f323612b86155e4c44c7efa38d90

SHA1: a3e666f7f03001ce1b6556133b5217ab0d668463

SHA256: 6688fffa9b39320e11b941f0004a3a76d49c7fb52434dab4d7d881dc2a2d7e02

SHA512: c865d260e96a654540b4ef34be4242e5105d5260059436779028f1db0324f046b11a83098d561aa855ad7cc823e9e72c59fe59e92b246889985054edfaea1ef2

MD5: 0a7f57171f4ba49e42d3cb9cd602ec72

SHA1: 7e56d7a720ba6e9b00bbb66e6f64bd46e9285361

SHA256: 3dcf2dda8fb24559935919fab9e5d7906c3b28476ffa0c5bb9c1d30fcb56e7a4

SHA512: 37f3c44c6a8b51d6c7da84386ecc9b2ef4b9d1ca6df44ebee606742772be14c53811e883bcc0e8c659c7a4fe3ecf7b170585bbdf0a0c5b305a51162ce49147e5

MD5: c735e3f7c6d0ae2cad131b5539d303b0

SHA1: e74fd2fdd5e3bc6a0cb26813746912394385422e

SHA256: 913a6ff8eca2b20d9d2aab594186346b6089c0fb9db12f64413643a8acadcfe3

SHA512: e2385bf423e7b10aae121a2cf6467d996d32814eefc70c0fe08daa66096119a202d108e199a26ab6f1cbba0c6b1bfc03e9c670b853cc346dd061ce6b49a6f819

from here:


check the last sentence:

If the password is ever released ("Whatever happens, even if there's video; it was murder"), the files are encrypted via OpenSSL file encryption.

the password maybe something alike Whatever happens, even if there's video; it was murder

084479  No.2621087


thanks chris cuomo

2716eb  No.2624680

File: 6ea6abd8ea91d03⋯.png (383.94 KB, 752x578, 376:289, 1.png)

File: 2817b7e246f1824⋯.png (97.98 KB, 623x223, 623:223, 2.png)

nist is used to generate pgp

notice precommitment field in 1st picture

wikileaks uses precommitments

we find the time key generated, we find the key

084479  No.2646789


side note, JA often used 1984 in file names. so Im thinking its a time we've seen like 17:17

b025dd  No.2650265

File: f4ff88567095e43⋯.png (90.38 KB, 1788x436, 447:109, epoch.png)

File: 3b255af4149c43d⋯.png (11.72 KB, 543x84, 181:28, wl-epochs.png)

File: 5c0840f9a6d7272⋯.png (28.22 KB, 691x191, 691:191, wl-epochs-1.png)

b025dd  No.2650312

File: 5c0840f9a6d7272⋯.png (28.22 KB, 691x191, 691:191, wl-epochs-1.png)

File: 43f366c34c61065⋯.png (29.06 KB, 728x188, 182:47, wl-epochs-2.png)

File: 465cd173bb59aa4⋯.png (29.14 KB, 647x197, 647:197, wl-epochs-3.png)


GMT: Saturday, March 15, 2127 3:10:05.873 AM

GMT: Wednesday, March 2, 2157 8:42:26.808 PM

GMT: Wednesday, August 26, 2076 12:28:47.030 AM

im using gmt for now london is +- 0:00 gmt right? im asking clockfags for help with this as well

b025dd  No.2650327


if i set my bios clock to 1984 i wonder if ill get a different epoch date

inb4 john titor

thanks to king terry

b025dd  No.2650344


ok so using nist i can get keys with 1 timestamp no problem but clockfags said something about both the time fields and pulse, would make sense since thats how potus game works w/ deltas, etc. which btw i dont fully comprehend yet, so i guess the next step here is to redownloaded the correct aes torrents, i guess ill start with the smallest one

f53071  No.2650364


Back in October 2016, Wikileaks changed the dates on a few files to 01-01-1984.

So I followed the lead and looked up page 101 of 1984. In it, the main character has been caught and is being tortured by the secret police. The conversation references a poem where the party had unsuccessfully tried to erase the word God.

The poem is M'Andrew's Hymn by Rudyard Kipling.

The idea dawned on me, perhaps this could be the password to the wikileals files, perhaps this poem and the song Across the Green Mountain by Bob Dylan that Assange posted on twitter before he went into isolation in the embassy.

Again, the poem is M'Andrew's Hymn by Rudyard Kipling and the song is Across the Green Mountain by Bob Dylan.

If you have the files with you, do try them out, who knows, this might be the password

b025dd  No.2650390

if someone has a docker with different versions of ssl - openssl and libre and different versions that would be helpful

b025dd  No.2650485

ok so are these tweets from 2016 for the 2013 insurance files?

i guess im gonna need all of them (torrents)

ill diff and post here

b025dd  No.2650526


i also did some work on this with the 1984 book

i think i followed one of your earlier posts

theres also the whatever happens - murder password on gentoo wiki(coveffe upsidedown mirror, noticed this looking at a gentoo dvd i had sharpied label on )

b025dd  No.2650554


i noticed the magic file info on assange_smile.gif was win3.1 so i got out the 32bit 486 and 586s i had in closet after uefi bios was remotely flashed shortly after posting in here last month or so, def over target

b025dd  No.2650575


you know the flash module on recent mobos is called Q-flash? kek.

i had done a custom uefi update with newer manufacturer modules and put bios back together, running an earlier manufacturer bios atm

b025dd  No.2650580

what do you know about plan9 nein front helper?

thers a att nyc 666 connection

b025dd  No.2650593


after my bios was pwned i poked around plan9 on those old cpus for awhile, everything ive learned in linux is hard to unlearn so i had a tough time being productive but if we're around in 10 years i plan to master it, im just talking to you while these torrents download, probably wont be done until tomorrow

b025dd  No.2650614


"in academia if its good you publish in industry if its good you keep it a secret"

b025dd  No.2650640


whats up with the debian magic smoke spiral

im even wary of git these days

084479  No.2655755



crazy 'coincidences'


the murder password angle has always been a good lead, but now that you mention 'think mirror' in that way–maybe some of the other leads need looked at

339310  No.2659664


I glanced at the poem, if you have the files try these two passages as a password:

'Better the sight of eyes that see than wanderin' o' desire!'

'Mister M'Andrews, don't you think steam spoils romance at sea?'

The search continues…

339310  No.2659706


Try these two also, they're the rhyme mentioned in 1984:

'Ye'll not go back to Him again an' kiss His red-hot rod,

'But come wi' Us' (Now, who were They?) 'an' know the Leevin' God,

549d1e  No.2660080



sounds like nimrod

i just got the files - im installing truecrypt alongside openssl, theres the red herring passwords with _@! for spaces as well…. im trying to gather enough chi so to speak to do this im extremely sick in the physical sense

549d1e  No.2660089


gonna get some sun and coffee ill do some work tonight, clockfags say use est time, guess ill do both, ive already generated pgp, i dont want to post half of it and get v&, look for some posts tonite, bbl

549d1e  No.2660408

File: c9046705bf06e85⋯.png (587.48 KB, 1517x826, 1517:826, oracles.png)

well cant hold back the night forever

lets do this anon

549d1e  No.2660584

future dates are proving a problem with nist, help me think of a way thru this, ill try changing my bios clock

9133a1  No.2661478


making a note for myself kiwifarms

eac028  No.2661521


It was Nimrod - You left prints at the scene

9133a1  No.2661649


i aint pink panther

what prints

9133a1  No.2661716


usually if i leave prints its to draw attention from THE RIGHT PEOPLE, or GROUP OF PEOPLE

9133a1  No.2661718



9133a1  No.2662396


thats a pretty spoopy thing to say btw

but i understand i do get us mail ya know

[Return][Go to top][Catalog][Nerve Center][Cancer][Post a Reply]
[ / / / / / / / / / / / / / ] [ dir / arepa / builders / fa / hispint / irc / sonyeon / sunny / tacos ]