2
19

[–] TFP191 [S] 2 points 19 points (+21|-2) ago  (edited ago)

Bad title, sorry. Seems like I am actually way behind, and there is alot going on here. I'll post a summary from the thread because, this is mostly technical information on decoding the leaks.

edit: been looking over this information for awhile now. I have minimal programming knowledge. So this could be adults playing pretend for all i know. Wikileaks has been strange lately to say the least. May not know anything until Snowden or someone prolific pipes up. This is possibly bad info YOU HAVE BEEN WARNED

1
47

[–] TFP191 [S] 1 points 47 points (+48|-1) ago 

if you read the threads inside that png you will able to see everything that happened that was saved before deletion. rushed summary:

oct 17: strange activity is noticed at the embassy, first responders investigate, periscope is killed, twitter goes full orwell, archive.org is changed to no longer save sites properly.something that is instantly deleted is posted several times on pleddit, halfchan, fullchan, onion links and darkweb. it is all wiped. people regroup in several places since there is no way to post without threads being deleted or sites going down. a lot end up here.

oct 21: as the director of wikileaks is dying a huge ddos takes down most sites. blockchain is attacked. lot of stuff gets deleted.

oct 24: someone finds the wikileaks backups in the blockchain and posts instructions and code to decode the data.

oct 27: the deletions get too severe. sites begin being flooded with illegal content or going down. people create their own private channel to discuss progress. the keys and all hidden data in the blockchain are found. the group pushes the information into a few cryptocurrencies. blockchain is flooded. mempool graphs now have a giant spike on oct 27. soft fork for bitcoin begins. onion threads with the info get instantly wiped. everyone involved goes silent except one of two people. this group is then referred to as 'group 1'. first finding of the keys as 'first impact'. few days later: one of the people following the progress of group 1 starts teaching others how to retrace the steps.

late oct: people figure out that unlocking the data gets you xkeyscored'd making you lose internet connection and makes sites get attacked if the stuff is not deleted.

early nov: focus changes to teaching others how to find the information on airgapped computers to avoid deletion and sacrificing public channels of communication. threads that have progress start being flooded with illegal content every morning.

nov 8: wikileaks.org begins being changed. some files are deleted. checksum hashes start not matching older backups.

some point in nov: irs asks bitcoin to give them the identities of all transactions. copies of the blockchain start showing 'undecodable' or empty transactions not seen before.

mid nov: 'group 2' doxxes the people pretending to be wikileaks and tried to spread more detailed instructions for getting the files. posts did not last more than a few minutes. it seems like they tried to push to blockchain but apparently the data did not make it in. group 2 goes silent. they start calling this day the 'second impact'. Anonymous 12/21/2016 (Wed) 01:05:45 [Preview] No. 120 [X] del >>121

119 nov 25: third impact. files are found by a new group that seems to not be american. they post instructions all the place but they don't last more than a few hours. they tried to encode data into cryptocurrencies but it is not clear if it made it. this day is the second spike visible on the mempool graph.

at some point after this people agree to stop using the endchan thread for this because admins have to deal with too much illegal content floods and site going down. it becomes clear that any channel used to discuss this is 'sacrificed', in other words, it starts going down a lot, they flip the mods, deletion, illegal spams, etc. this thread is created for that reason. you can figure out what is special about this thread if you read the logs in the png. most progress after this point is exclusively on channels with no logs on darkweb. most of these eventually go down. the endchan thread is eventually locked. everyone that posted is blocked to this day. it is then deleted.

dec: planning for d-day begins. all holding groups spend all of december teaching others how to find the files.

mid dec: someone allegedly speaking on behalf of appelbaum posts links to code he wrote to find and repair keys in memory. new teams are told to use it. obama starts talking about a cyber war with russia.

dec 18: files are found in japan. a meshnet using ps3s is created to spread the files but it does not seem to last too long.

dec 19: d-day. happenings all over the world. most ISPs, torrent communities and major sites go down. wikileaks releases a new insurance file. uk, ec, and us insurance files from before no longer show on wikileaks.org unless you have IPs from specific countries. it is one of the biggest internet outages in history and it is not reported in a single news site that i have been able to find. holding groups go silent. some members are now trying to find their old teams.

tl;dr blockchain has backups for all wikileaks files since 2013. it also has checksum hashes and upload proofs for all files. there is a lot of stuff in there that triggers xkeyscore or echelon and is virtually impossible to share or even talk about. three months have been spent trying to teach others how to recreate the steps. there is a noticeable pattern. group finds it, start teaching others how to do it, then everything is deleted and people go silent. then a new group finds the breadcrums and starts over. it's not clear what happened yesterday or what will happen next but there are people from all the world trying to investigate. at this point and there is no part of the internet where it is allowed

0
25

[–] chrisman01 0 points 25 points (+25|-0) ago 

"people figure out that unlocking the data gets you xkeyscored'd making you lose internet connection and makes sites get attacked if the stuff is not deleted."

This is why you should NOT download the torrents announced over the Twitter account until Julian is proven alive by showing himself.

All the audio interviews can be easily faked with modern software, including any unique maneurisms. There was a visual interview a while ago, but it was very odd as you could see his collar changing as the visual was tweened between frames.

0
10

[–] bikergang_accountant 0 points 10 points (+10|-0) ago 

How would onion threads get instantly wiped unless they have a pull-lever solution for taking down onions? Unless all the onions were from one person and they were bad at their job.

0
9

[–] Hey_Sunshine 0 points 9 points (+9|-0) ago 

Damn it op! I want to know what's in the letter but I'm no techno Wizard and don't know how to do half the shit thats listed in that big ass image of yours.

2
8

[–] Broc_Lia 2 points 8 points (+10|-2) ago 

Holy god, I had no idea it ran that deep. The internet is truly and utterly compromised.

0
9

[–] New_years_day 0 points 9 points (+9|-0) ago 

There is a fuck ton going on with this, there was 3-4 or more 200+ comment threads on 4chan yesterday related to this information.

0
1

[–] bitbybitbybitcoin 0 points 1 points (+1|-0) ago 

Thanks for this!

0
16

[–] Warfather 0 points 16 points (+16|-0) ago 

They've taken the Internet from us. Our home.

What will you do? I don't have the technical expertise to fight a battle on this front but when the shooting war happens my friends I will be ready to defend you.

0
17

[–] Rainy-Day-Dream 0 points 17 points (+17|-0) ago 

do a little research on meshnets and the deep web. You don't need to become an expert but knowledge is power

2
10

[–] ibepokey 2 points 10 points (+12|-2) ago 

The internet was originally a military project. no reason to be surprised they can know everything you do on it.

0
6

[–] smellyfinger 0 points 6 points (+6|-0) ago 

You can encrypt the data going through it though, then decrypt it when you get it on ur pc. But there are a lot of ways to be compromised :S

0
9

[–] smifft 0 points 9 points (+9|-0) ago 

There is some very real, very scary state sponsored battles happening. Big shit, involving big players is in progress. Tread cautiously. Lots of people will be getting framed for heinous shit

0
14

[–] TFP191 [S] 0 points 14 points (+14|-0) ago  (edited ago)

If i don't post anything in a month. Tell people i didn't commit suicide

0
7

[–] pessimisticsteel 0 points 7 points (+7|-0) ago 

HIS NAME WAS TFP191!

0
3

[–] ashekchum 0 points 3 points (+3|-0) ago 

I've been looking at your post history and it appears you might have severe depression, please don't commit Clinton.

[–] [deleted] 0 points 2 points (+2|-0) ago 

[Deleted]

[–] [deleted] 0 points 9 points (+9|-0) ago 

[Deleted]

0
4

[–] Warfather 0 points 4 points (+4|-0) ago 

Awesome username btw. Very clever

0
7

[–] Von_Neumann 0 points 7 points (+7|-0) ago  (edited ago)

I bet the Russians and Chinese have already fully decrypted everything that JA has ever posted online. Only us amateurs are struggling with this.

[–] [deleted] 1 points 1 points (+2|-1) ago 

[Deleted]

0
1

[–] mvrak 0 points 1 points (+1|-0) ago 

Which is fine because that is the point? It is "dangerous" for the public to know, and the governments have to get whats in the files to understand how dangerous.

0
0

[–] ashekchum 0 points 0 points (+0|-0) ago 

If that where the case they would likely have been anonymously released already. If the information didn't have anything implicating them, or maybe China would trust the firewall and do it anyways. Or they would only release snipits to media than would help them.

I think the keys are still good, for now. Probably in 10-15 years they will discover a problem in the crypto program like usual and be able to brute force the key. Thus stuff would be high priority info so nationd have likely already tried to break it.

0
7

[–] pr0nw4r 0 points 7 points (+7|-0) ago 

I dont get it entirely, whats so difficult in all of this if the keys to the files are released already?

1
33

[–] TFP191 [S] 1 points 33 points (+34|-1) ago 

I think Julian and his team got nabbed so quickly that they were able to partially nullify his dead man's switch. Now opposition is in full damage control mode with honey pots, shills, and censorship.

0
15

[–] New_years_day 0 points 15 points (+15|-0) ago 

I think you are spot fucking on.

1
8

[–] SaneGoatiSwear 1 points 8 points (+9|-1) ago 

yeah i thought this exact shit since the fucking po went up to the embassay with no fucking natn'l markings on.

1
7

[–] SaneGoatiSwear 1 points 7 points (+8|-1) ago 

seriously this is most important post all fucking year on voat.

0
5

[–] Arrvee 0 points 5 points (+5|-0) ago 

If these people think something is blocking them from posting info on the net, they should go down to Office Depot and pick up a bunch of cheap USB drives and mail them out to everybody they can think of who might be interested. Old media, new media, feds, army, politicians, businessmen, teachers, preachers, whoever. That will at least get the info out.

[–] [deleted] 0 points 3 points (+3|-0) ago 

[Deleted]

0
8

[–] anonnynonny 0 points 8 points (+8|-0) ago  (edited ago)

That doesn't make sense to me. Doesn't seem like that would be a terribly difficult obstacle to route around.

Wouldn't a simple a>b substitution scheme bypass string detection?

Or breaking it into chunks?

Initial char on a page of unrelated text, spread across hundreds of individual web pages?

The DVD encryption scheme was coded into a poem.

Embed in an image, every 69th char being a piece of the puzzle?

Putting it out via HAM for god's sake.

There are infinite ways to get around string detection. Either something else is going on or this is a ruse.

0
2

[–] TimberWolfAlpha 0 points 2 points (+2|-0) ago 

man... Just think, if you knew what the key was, you'd have an ion cannon for the internet. just paint your target with the key and the government obliterates it for you.

0
2

[–] Arrvee 0 points 2 points (+2|-0) ago 

That's what rot13 is for. Or they can write it in hex. Or write a simple program that prints it out. There are solutions to this problem.

It's hard to tell exactly what they are talking about. The conversation is opaque to anyone who has not been following along from previous conversations.

0
4

[–] Devious1 0 points 4 points (+4|-0) ago  (edited ago)

To Soon.

In the previous threads there are instructions on what to do. Be aware, you need to take precautions. If anyone is going to pursue this, I strongly recommend you read this article from the same thread as op has mentioned

https://endchan(dot)xyz/.media/ccdfd444c624cda937caeb1119b978f8-applicationpdf.pdf

0
1

[–] pessimisticsteel 0 points 1 points (+1|-0) ago 

Archive?

[–] [deleted] 0 points 0 points (+0|-0) ago 

[Deleted]
load more comments ▼ (11 remaining)