Advertisement
Guest User

Untitled

a guest
Oct 15th, 2017
189
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 7.24 KB | None | 0 0
  1. ------------------------------------------------------
  2. Even if the keys were released, where would you post any information about the contents of the files. No place exists that is not a controlled, opposition space.
  3.  
  4. Facebook, Twitter, Reddit? You get the idea. The whole internet is built on backdoored standards. The existing internet is completely corporate controlled and in the hands of the enemy.
  5.  
  6. We have seen evidence of websites being intercepted and content being removed in real time. They will let some leaks out, but there is not a channel for mass dissemination and media for this type of leak.
  7.  
  8. - The insurance files should be downloaded quitely to as many people as possible.
  9. - We should verify the hashes of the wikileaks files (multiple hashes and verifications). Expecially for the newer files and the saudi file that was modified
  10. - We should build up or fortify our distribution system for messages
  11. - We should build up a toolchain for writing messages to the blockchain and retrieving the messages (as a stop gap in case Bitmessage comes under complete exploitation)
  12. - The enemy has a nuke button and can dump 10 GB per day into bitmessage and make it unusable if needed
  13. - We should prepare for the private key distribution (which is expected to happen by Christmas if it has not already happened)
  14. - We should each individually be able to decrypt the files. We should not expect that the files will be allowed on websites or public internet
  15. - If we cannot post files on Bitmessage and the clearnet is jammed, how will we even distribute the worst of the files? We wont be able to. Each person needs to get the files themselves, decrypt them and may have to do sneakernet or we may have to distribute the worst information on USB sticks.
  16. - We need tools to posting to the blockchain as a last resort
  17.  
  18. Sending a message on the blockchain may cost us 10 cents or $5 but if it is important enough, that may be the only way.
  19.  
  20. In the long term, we need to develop new media platforms and communication platforms that are more resilliant.
  21. - more difficult to jam
  22. - more difficult to modify content once published
  23. - ability to detect jamming if it is occuring.
  24.  
  25. We need distributed blogging and messaging platforms. We need a safe and secure way of distributing files.
  26.  
  27. ------------------------------------------------------
  28. ------------------------------------------------------
  29. Hi everyone.
  30.  
  31. I realize that this message might not go through but just in case -- this will be my final message sent to BM. Anyone claiming to be updating my situation is lying.
  32.  
  33. I've been working with another person on this since the original thread in October 17. This is our third attempt at spreading the information. I don't think it will be possible for anyone to upload the keys and the files. It really seems like the only way is for everyone to get them from the blockchain separately. Some of you might think this is not the case but you'll be able to see it first hand when you try soon. It should be fairly straight forward for everyone to extract the keys and files with the information on this BM.
  34.  
  35. On our end, we can confirm that the script can be used to extract the following files:
  36. 2016 Disk Image, Spreadsheet, BIN, multiple videos, mp3s, emails, pdf documents
  37. 2015 Disk Image, Spreadsheet, multiple videos, mp3s
  38. 2014 Disk Image, Spreadsheet, multiple videos
  39. 2013 several backups in zipfiles
  40. Hash and time stamp text for what seems like all uploads to Wikileaks.org
  41.  
  42. The following files can be unlocked so far:
  43. 2016-06-03_insurance.aes256.torrent
  44. wlinsurance-20130815-A.aes256
  45. wlinsurance-20130815-B.aes256
  46. wlinsurance-20130815-C.aes256
  47.  
  48. We have not been able to unlock:
  49. 2016-11-07_WL-Insurance_US.aes256
  50. 2016-11-07_WL-Insurance_UK.aes256
  51. 2016-11-07_WL-Insurance_UK.aes256
  52. wikileaks-insurance-20120222.tar.bz2.aes
  53.  
  54. Allegedly unlocked by others:
  55. 2016-06-03_insurance.aes256
  56. wikileaks-insurance-20120222.tar.bz2.aes
  57.  
  58. There is clearly a lot more information that we haven't gotten to yet.
  59.  
  60. The file pieces have to be combined so a bit more code is needed. The Cablegate Backup should be used as an example to do it. Some groups are now going through the same issues we've seen. Our experience was that we lose internet connection, we are unable to copy paste or keep anything on our clipboards, all attempts at encoding transactions into BTC get delayed and do not happen, files on computers connected to the Internet are deleted or moved, etc. That is why I think the best way to spread this is to teach others how to do it and possibly to encode what you feel comfortable making permanent in some crypto currency other than BTC.
  61.  
  62. I expect that in the next few days the media will be forced to cover this. The spin will be that these files cannot be verified, do not come from Wikileaks and that no one can recreate the steps to get them. They will probably push false steps that do not work. From what we have seen, most people will not bother to check and believe it. Because the blockchain is permanent and many have copies, I do not think that it will be possible to spin this in this way forever. Anyone can do it in their own homes. However, they have been preparing for this for months. Damage control will be very easy for them because there are really no sites that can be used to discuss this anymore. I'm a still a bit concerned because the steps on how to get the information were available since mid October and very few people tried to do it. It was practically impossible for us to try to discuss this with others on any site. Everyone seems to react violently to the suggestion but I am not sure if these were even real responses.
  63.  
  64. The easiest way to collect the information is on a computer that is not connected to the internet and has no wifi cards. Making a database with relational information of the transactions helps a lot as well. It might be necessary for someone to create a very easy to follow tutorial with code that allows anyone to do this. To this day many people refuse try on their own and simply chose to believe that it is not real. If you care about this, you should spend some time showing people the evidence and guiding them through of process of getting the files themselves.
  65.  
  66. My personal opinion is that the most crucial thing that should happen when this is finally out in the open is that the people pretending to be Wikileaks should be exposed. It should be clear to everyone that people are paying attention. The people that sold out and did as they were told should also be exposed. I still don't understand why it was so easy to get most people to play along and allow their sites to be controlled. It is alarming that talking about this is practically forbidden everywhere. During the past few months we have witnessed a possible end of a free internet. People in power have the resources to fool the entire world into agreeing with them through censorship, paid posts, bots, etc. There is not even a way to verify the history of a page anymore since they now control the only site that allowed it. I think this is the perfect opportunity to guarantee that this is stopped and does not happen again. However, everyone should see the information and decide by themselves what they want to do.
  67.  
  68. Thanks to all of you that helped.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement