>Encryption AES256 operates on 128-bit blocks and uses key lengths of 128, 192 or 256-bit
>Ciphermode Electronic Code Book, each round processes a 64-bit block and encrypts the block with the secret key. Any identical blocks will have the same encrypted value.
>PKCS#7 X.509 Certificate format, possibly relating to padding
>Key Generated from unmodified key.png were black pixels = 1, decodes to 256-bit binary: 0110000100100011101001010100111101010111000100000111010001101110001101100000110010001101011001001100010111000010101001101000101100011011010001101110110111001011011110111110101101011010111001101011111101011010100011100101100100110101111000110101110110011101
>Base64 The actual encrypted data in AES256-ECB, output to a Base64 string: (Post length limit, as seen in OP)
Jeremiah James
I'm dying to see this shit
Jackson Bailey
becareful what you wish for , you just might get it.
Rundown for new anons: >cryptic message posted on Yas Forums >some user suspects it's the key to WL insurance docs >autists start doing their thing >complete chaos >shills in damage control >nobody knows anything >could have been a larp from the very start
Cooper Lee
Translated cryptic Chinese / symbols text so far. No idea what it means. September (11th?) Left text (hotel) right text (a great place to stay?)
A question , If anons have the wikileak insurance files and multiple people do.
Why don't they just release the password to the files ? Wouldn't it be safe to assume that the key is lost never to be found or perhaps already used as blackmail?
I think you should make a new script where you try various operations (and also compose them) on the bit stream and check each obtained key if it decodes to something readable. I'm not used to do things like that in bash. Try stuff like bit ordering (first bit is LSB, i think your script handles it as MSB) (LSB 1000=1,0011=C;;MSB 1000=8,0011=3) flip none/horizontally/vertically/both rotate 0/90/180/270 transpose negate bits encrypt instead of decrypt Just from these operations you get 2 * 4 * 4 * 2 * 2 * 2 = 256 combinations.
John Wright
Pretty epic game of go
Blake Hughes
whats in there?
Benjamin Reed
It's been 4 years. Surely it only takes one person to dump the files somewhere or make a webm. or leak to media.
Are these the launch codes mendax stole and they are all pissed about?
Sebastian Garcia
Show us frazzledrip
Sebastian Jenkins
Guise I think it’s prob nothing. Maybe just some troll messing with us, no? Let’s all get some sleep! *yawn* man we could all use some rest. Let’s take a snooze
Isaac Diaz
The top is mainly Chinese and the bottom is mainly Korean. Cleaning out the shit in between (I think some of it is Arabic?) might come up with a cleaner translation.
Xavier Foster
Kys immediately
Kayden Brown
This is the "end times", moar people gon be coming here for answers now than ever before. also, cool art...
no it wasn't. this never was displayed on WL.org... it was only shown on duckduckgo for a while searching for the WL file dump (ht tps://file.wikileaks.org/file/) since DDG parsed titles for search results with missing HTML title from other results that link to it (in this case one Yas Forums thread and T_D post).
Andrew Ward
or pretend to
Nathaniel Bennett
pb In the Claudia text username ElectronSpinor posted "That escalated quickly" Maybe try his username or "That escalated quickly" if that was the key, JA would have one hell of a humor.
Why do you cunts keep talking about sleep, or nothingburger. Fuck up or fuck off
Austin Kelly
It was user. In 2016.
Gavin Rogers
Memes
Owen Kelly
it's just random anons on discord from oct 2016 and it's like babbies first step to decoding the blockchain. why do you think this log has any significance kek. i wonder why they just share these weirdly printed out "claudia" excerpts with you, clearly obfuscating them to make them seem more important, than just sharing the full discord logs everyone has..
Ian Nguyen
liar. it was only shown on the search engine duckduckgo.com and that's where the screenshot is taken from. and it linked to the WL archives. never was by or on WL.org itself.
Julian Ramirez
could any of you autists put all of this on a pasetbin page? this info needs to be in somewhere safer janies have been scrubbing a lot of shit lately even some pages in the archive have some posts suppressed/changed
Went to sleep, and I wake up to this still not solved? All yall slack jaw faggots have all these water cooled computers, but apparently yall only understand how to push the power button.
Hi, just here to shit on the parade. I've run the script that user kindly made which outputs the supposedly decrypted file to final.bin, however the results don't align with the original message, see here In the pic related, i've included two certificates and how they are detected correctly by their file types, note the top on being the PKCS#7 format and the one under a generic X.509 DER format. This needs re-visiting because I feel like something isn't lining up with the decryption stage.
Hmm not working? Maybe we should just stop trying, who knows, it may even be illegal. I def want the republicans to win too, but not need in breaking the law. Let’s just forget it and go back to bantz
Nolan Roberts
The jean scripts used blockchain.info to scrape the transaction data and combine them into a single file. Kind of like combining rar files for a large archive. I'm 100% certain blockchain.info removed opcode and other transaction data. These scripts no longer work. They would have to be rewritten to utilize some other online blockchain aggregator.
Kevin Cooper
rolling for reptilian disclosure and interstellar ayyys about to crush and pound these evil creature