Advertisement
Guest User

Untitled

a guest
Jun 25th, 2019
71
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.37 KB | None | 0 0
  1. During the DDoS attack a few hashes and keys were posted on several sites for a few minutes and then deleted without a trace (http://i.imgur.com/undefined.png is one of them).
  2.  
  3. Additionally, the Wikileaks site showed "The Insurance files may have just been released" for a few minutes as well. (see http://i.imgur.com/6IMYfUK.png)
  4.  
  5. I have begun trying some of the candidate keys. I could use some help. I think the least we can do is try them and keep track of the results and what has been tried.
  6.  
  7. Files:
  8. https://file.wikileaks.org/torrent/2016-06-03_insurance.aes256.torrent
  9. https://file.wikileaks.org/torrent/wikileaks-insurance-20120222.tar.bz2.aes.torrent
  10. https://file.wikileaks.org/torrent/wlinsurance-20130815-A.aes256.torrent
  11. https://file.wikileaks.org/torrent/wlinsurance-20130815-B.aes256.torrent
  12. https://file.wikileaks.org/torrent/wlinsurance-20130815-C.aes256.torrent
  13.  
  14. Candidate for file A (see http://i.imgur.com/undefined.png for how to generate it):
  15.  
  16. eta-numeris: f22d 7304 8224 8ad6
  17. sin-tropper: 48ab b7eb ceda f42d
  18. 7FG: 6f46 30e1 c6f3 385d
  19. project-runway: da46 2913 216c 9a0d
  20. fall-of-cassandra: 07d6 db54 f3c2 7d4a
  21.  
  22. (The order might be incorrect, see https://archive.fo/pMEmC)
  23.  
  24. f22d730482248ad648abb7ebcedaf42d6f4630e1c6f3385dda462913216c9a0d07d6db54f3c27d4a
  25.  
  26. Candidate for file B:
  27.  
  28. eta-numeris: 52f3 436e 82db 1fde
  29. sin-topper: b1a0 64d4 0004 8865
  30. project-runway: a10a 3571 a17b 8898
  31. 7FG: fde0 5ea5 34a9 c372
  32. fall-of-cassandra: ca1c c808 dfbd 0d23
  33.  
  34. 52f3436e82db1fdeb1a064d400048865a10a3571a17b8898fde05ea534a9c372ca1cc808dfbd0d23
  35.  
  36. The candidate for C is in pic related as well but it has to be typed down manually. We should also rerun the commands shown there and verify that we get the same result. Moreover, I believe something similar can be done with the hashes tweeted recently.
  37.  
  38. Other unknown candidates:
  39. http://imgur.com/pve7F5I
  40.  
  41. Staying safe:
  42.  
  43. OS: For maximum security, Tails OS on a computer with no hard drive is recommended. https://tails.boum.org/
  44. Burner email: http://slippery.email/
  45. Burner phone number: http://www.burnerapp.com/
  46. Tor Browser: https://www.torproject.org/projects/torbrowser.html.en
  47. Chat: Cryptocat https://crypto.cat/index.html, other options http://blogmedia.whoishostingthis.com/wp-content/uploads/2015/04/True-Private-Messaging-final.jpg
  48. Encryption: Truecrypt 7.1 http://filehippo.com/download_truecrypt/10519/
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement