/pol/ - Politically Incorrect

Political discussion of ideology, history, and [current] events

Posting mode: Reply

Name
Email
Subject
Comment
Password
Drawing x size canvas
File(s)

Remember to follow the rules

Max file size: 350.00 MB

Max files: 5

Max message length: 4096

Manage Board | Moderate Thread

Return | Catalog | Bottom


ALL META DISCUSSION GOES IN THE STICKIES
Logs can be found here: https://endchan.xyz/logs.js

Expand All Images


(11.48 KB 212x155 th.jpeg)
Wikileaks blockchain investigation Anonymous 03/18/2017 (Sat) 21:25:49 Id: 5e691d [Preview] No. 34716
What happened to the wikileaks blockchain investigation? Everyone was saying it was a larp… In fact too many people were saying this and it was weird. I found some pockets of intense activity and there were some very strange things that happened. Now nobody talks about it anymore. What happened???


Anonymous 03/18/2017 (Sat) 21:35:56 Id: 59b1fc [Preview] No. 34718 del
I think >>>/POLAK/ was on it, not sure what happened to them. They got all frantic and kind of fucked off after a while.
Sorry m8, I never followed that even though it was interesting. Way above my head.


Anonymous 03/18/2017 (Sat) 21:36:34 Id: 59b1fc [Preview] No. 34719 del
shit, board got wiped by goons. What the fuck. Something definitely fishy going on.


Anonymous 03/18/2017 (Sat) 22:02:29 Id: 5e691d [Preview] No. 34725 del
All I am trying to do is get more info since I am not a programmer. I tried posting this on 4chan and 8chan and got shilled or the thread got shut down. anybody know what is currently happening on this investigation?


Anonymous 04/06/2017 (Thu) 02:02:37 Id: 37a896 [Preview] No. 37852 del
Delet this!


Anonymous 04/06/2017 (Thu) 02:35:56 Id: 128549 [Preview] No. 37858 del
>>34718
>>34725
Goons are nothing more but useful shabbos goyim, fucking autistic faggots.


Anonymous 04/06/2017 (Thu) 19:44:10 Id: 9bdb0a [Preview] No. 37941 del
3spoopy5me
Last I recall, a bunker board was posted on here for phase6 or phase 5, I can't recall. All bunker boards and threads on endchan have been off the catalog due to inactivity and because it was suspected alphabets had compromised those threads. If you really want to know, you're gonna have to go to changolia. Last post on there was someone claiming that the blockchain had celebrity nudes. Obviously, it's a low effort demoralizing psy-op to discourage people from digging in the block chain or celebrity nudes were added to the blockchain so it could easily be (((shut down))).

I do heavily regret having a dumb phone and not having an airtight opsec setup so I could've helped out digging. I imagine the brave souls still continuing with this can only spread the information through irl means. It was shown repeatedly that any of the keys or files posted from the insurance files are quickly scrubbed online, clear net and dark web. Furthermore it's suspected they get X-Keyscored.

I guess the 8cuck refugees are technically correct when they say all chans are comprised, but they're still cucks for using it as an excuse for continuing to use pigchan.

Anyone can help out digging by downloading the insurance files before they were tampered with along with the blockchain. The instructions are in the archived threads on how to find the keys through the blockchain and in the text files posted in them.
You just need to make sure your opsec is airtight and not leave ANY trace while you're doing it
Stay offline when extracting the insurance files
Make sure to use Tails OS

I can only speculate that the current phase in progress involves irl means to spread the keys and files.

Godspeed to the anons continuing. I'm not a religious man, but I'll send out another prayer for them to see through the enormous undertaking they're doing.

Also RIP Assange
Scary times ;_;


Anonymous 04/06/2017 (Thu) 21:45:35 Id: f4dda2 [Preview] No. 37959 del
>>37941
Are we talking about the three original insurances files that were released from wikileaks?


Anonymous 04/06/2017 (Thu) 21:53:51 Id: 47279e [Preview] No. 37962 del
I tried to follow it, but neither have the technical know-how or the secure setup to do so. Below is some of the stuff I gathered while it was happening. I remember something freaky happening with the transaction IDs after they were tampered with, and a HUGE cyberattack coming from DynCorp(?). Please DO NOT run any python scripts, open any zips, etc without good OpSec. Attachments wouldn't parse, 4096 char limit here we go:

HOW TO GET THE KEYS (AND MORE) FROM THE BLOCKCHAIN:
The goal is to make very simple code that is easy to use and understand so that everyone can do this. This is a rough explanation of how it works.
There are two main approaches users are taking to decode messages in the blockchain. Scanning transactions, let's call this 'tx scanning', and scanning blocks, let's call this 'block scanning'. The main reason users are not yet able to see meaningful content is because both approaches have to be combined.
TX SCANNING: When you scan by transactions, you look for a transaction number (tx id), and decode its contents. When you know the tx id, you can easily see which wallets were involved. Some messages require you to combine the decoded data from multiple tx ids. You can identify which tx ids are relevant by looking at transaction histories of the wallets involved. This strategy is used for the 'Cablegate Backup'. In that case, the list of tx ids is directly told to the readers in the first message. However, you can compile this list on your own by 'tx crawling'. To do this, follow these steps: . For each tx, look at the wallets that received money and find those that spend it (in this case it is only one per tx). . For that wallet, look at its transaction history and find a transaction that follows a similar pattern, i.e., it involves multiple wallets and only one spends the funds. . Continue doing this until you are not able to see the pattern repeat itself.
BLOCK SCANNING: When you scan by block, you will be able to find encoded data more easily but it is harder to extract the tx id and wallets. One benefit of block scanning is that you can explicitly search for file headers and important strings. For example you can directly search for the magic numbers in GPG files. When you find one of these, you can then tx crawl from that starting point in order to get all pieces of the file. More concretely, if you want to find the Cablegate Backup with a block scanner, you could search for the magic number of Zip files. Then, when one is found, you can find the tx id that contains it, and finally tx crawl to get all the pieces. Yet, file headers are just one of the many other patterns that can be used to find important transactions. Examples of others are: . Magic numbers: Look for the first bytes in different types of file. 'file' can be used in UNIX. . Ability to compress: Compress the decoded output. If the size is reduced, the output is possibly a message or part of a file. . Text: If the decoded output has text, it might have information. . Keywords (Very important): Search for relevant keywords, e.g., checksums for files in Wikileaks.org, checksums for the insurance files, hashes, dates, names, time stamps, etc. . Reversibility: Some messages are in reverse and need to be flipped. This should be tried both before and after decoding. Both scanners have to be used. The starting points for the searches should be Wikileak's wallet, important dates (for example, during the DDoS attacks), previous messages and checksum hashes. The Cablegate Backup was a bit simpler than the more recent messages. In that case, only one wallet spent the funds in each transaction, and simply looking at wallet's next transaction was enough to find all the pieces. Newer messages are bit more complicated. Some of the wallets that receive money make multiple transactions with no encoded data before proceeding with the 'real' transaction. Moreover, in a lot of cases, all wallets involved spend the funds (not just one). 1/3


Anonymous 04/06/2017 (Thu) 21:54:07 Id: 47279e [Preview] No. 37963 del
Therefore, the crawler has to keep track of all wallets that receive funds, and all future transactions of that wallet while using techniques (like those above) to detect encoded data. A transaction tree should be kept and the pieces of each files should be combined in multiple orderings.
If you implement the process described above you will find all the keys, other backups and other files that are not released. One way to test your code is to search for checksum hashes for files that have already been published at a specific date. There are multiple messages in the blockchain that include file hashes and dates. [/spoiler]Use the leads in this thread.[/spoiler]
I recommend you use a local copy of the blockchain and carry out the search on a computer that has no internet access. Work in groups and share the process. Remember to look at other cryptocurrencies as well and to encode your findings into the blockchain yourself.
Good luck!


h ttps://blockchain.info/tx/0166db6053f1969c28de8b1f9a8fa4ec890cc4bdfee7602757993b306bb7f295?show_adv=true
follow the spent


python jean.py 7379ab5047b143c0b6cfe5d8d79ad240b4b4f8cced55aa26f86d1d3d370c0d4c > out1

python jean.py d3c1cb2cdbf07c25e3c5f513de5ee36081a7c590e621f1f1eab62e8d4b50b635 > out2

python jean.py cce82f3bde0537f82a55f3b8458cb50d632977f85c81dad3e1983a3348638f5c > out3

./trid out1
100.0% (.PGP/GPG) PGP symmetric key encrypted message (salted+iterated) (3001/2)

./trid out2
100.0% (.PGP/GPG) PGP symmetric key encrypted message (salted+iterated) (3001/2)

./trid out3
100.0% (.PGP/GPG) PGP symmetric key encrypted message (salted+iterated) (3001/2)

keep crawling from there and you'll find a lot more




Scan the entire blockchain and save everything, that means all:
decoded input
input hex
decoded output
output hex

After you save the entire thing, use these cheat codes:

sudo apt-get install rsakeyfind
sudo apt-get install aeskeyfind
sudo apt-get install aesfix

Take the entire stuff you got from blockchain and put it in a memory image. Then:

Run rsakeyfind on data to find RSA keys
Run aeskeyfind on data to find AES keys
If you find a corrupted AES key, try using aesfix

You'll get all the RSA and AES keys in the blockchain. Then search for all these checksums:

h ttps://zerobinqmdqd236y.onion/?0663280c2bcd12ce#1fIcSERfAIqbq4/sM3D6GuguSbQ1HdYy3q0x9oFmT+k=
h ttps://zerobinqmdqd236y.onion/?56b4c8c49c62c7b5#VEFaK7MBuyDAyJmg/GDgoIEV2PZ1ZXxfMJYtexFA+Zw=
h ttps://zerobinqmdqd236y.onion/?5677061058c45134#KAQgvYoulFti4AHXQJXdQPmnlb4+tE9bTRQxi7r2NxY=

h ttps://zerobinqmdqd236y.onion/?47efdb06b80fccfa#oI74/sbXomHCVsZ+Ux0T4iZi0LYOtjyPzndqAOgkLb4=
h ttps://zerobinqmdqd236y.onion/?7e446df674013eba#nvIXrvcdLi7iKsM16mX/4OJDgaeS9kZU9l+85qpf5yY=
h ttps://zerobinqmdqd236y.onion/?0d05f8455e9b8d88#fSjEocuR+D1YSB2dDcVeqYda7Bz/LbpYzIx9oEuMZD4=

At that point you will have found the upload evidence for all 10 million documents.

Finally, use the instructions in the deleted endchan thread and you'll find all the leaks that haven't gotten out.

If you do this and are able to figure out a way to spread the information (maybe an interpretative dance that can be used to get the info somehow) then congratulations you just saved the world.


Use linux Get bitcoin Rent a VPS with bitcoin SSH into the VPS (over a VPN connection) Use RSYNC (which uses SSH) to move the files to the vpn Use command line to create a torrent from the directory Get the magnet link for the torrent Have several other VPS servers setup who can seed the magnet link immediately. The IP address will show the VPS server - there is no relationship between the VPS server IP and the bitcoin you paid for it - they would have to contact host and get records - if you connect to them over VPN, then the records will just give the IP of a VPN endpoint or IP address used by thousands of people - the public torrent address would only identify the VPN IP address You have to get a lot of copies of the files out, to as many people. You can ask for servers to upload the files to, or get an invite only intial seed group for the torrent. 2/3


Anonymous 04/06/2017 (Thu) 22:00:42 Id: 47279e [Preview] No. 37965 del
Then you can post to piratebay and 4chan and 8chan after you have enough seeders. For paranoid - get new laptop ($200 to $400) or raspberry pi ($40) and external hard disc - run linux. alpine is best. mint is ok. Ubuntu is going with systemd so beware but is fine for your purposes - run commercial VPN software - run tor on top of the VPN, to do the SSHing DO NOT USE WINDOWS 10. It uploads all your key strokes to the NSA/govt and all your computer conections. - Big pedo daddy can backdoor your computer with windows auto update (if they can find it) Today, I would use a raspberry pi or smaller computer with a cell phone processor. I would avoid intel or amd CPUs if its critical. There are different levels of security. The people trying to crush pizzagate have limited resources and even the people with unlimited resources are sandbagging. So anyone who takes reasonable measures will be safe. The danger is that the documents are not distributed widely enough.

Meshnet: h ttps://w ww.s6424n4x4bsmqs27.onion/POLAK/res/102.html

h ttps://bitfossil.com/

12/21/2014 7:38 PM : DEAR VISITORS WE ARE MONITORING NOW
12/22/2014 12:28 AM : This moment, this love, comes to rest in me many beings in one being In one wheat grain a thousand sheep stacks Inside the needle's eye a turning night of stars There is a light seed grain inside you fill it with yourself or it dies I am caught in this curling energy, your hair who ever is calm and sensible is insane! ~Rumi
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h ttps://archive.fo/0oVo3
h ttps://archive.li/uGEHQ
h ttps://archive.4plebs.org/pol/thread/89123693/#89123693
h ttps://endchan.xyz/POLAK/res/15.html#422
h ttps://bitfossil.com/
h ttps://bitfossil.com/Build.aspx
h ttps://boards.4chan.org/pol/thread/103839903
h ttps://archive.is/JEXOo
h ttps://archive.fo/0oVo3#selection-19569.10-19573.53
h ttps://w ww.reddit.com/r/WhereIsAssange/comments/5jh5au/endchan_post_detailing_supposed_progress_in/
3/3


Anonymous 04/06/2017 (Thu) 23:06:29 Id: 47279e [Preview] No. 37969 del
(176.19 KB 725x673 assad syria sarin.png)
This is a fucking slide thread isn't it.
>>37852 I fell for it.

h ttps://endchan.xyz/pol/res/37796.html


Anonymous 04/21/2017 (Fri) 00:49:50 Id: 7d592e [Preview] No. 39473 del
Did anyone find the passwords to the 10 doge aes files?


Anonymous 04/21/2017 (Fri) 00:50:30 Id: 7d592e [Preview] No. 39474 del
>>39473
etherpad.mit.edu/p/r.e33d2e7230fafc0612a0f2e7ebc87bae


Anonymous 04/21/2017 (Fri) 01:52:44 Id: 59b1fc [Preview] No. 39478 del
>>37969
How is this a slide thread m8?


Anonymous 04/21/2017 (Fri) 01:53:26 Id: 59b1fc [Preview] No. 39479 del
I can see how it might be a time-sink / distraction but it's one that teaches them about crypto. Better than sitting around one thumb up ass one thumb on joystick.


Anonymous 04/23/2017 (Sun) 21:51:10 Id: 99514e [Preview] No. 39681 del
>>34725
I've saved some archive links of lots of the threads, here:
h ttps://archive.fo/M1qVM = “/pol/ WL insurance Thread”
h ttps://archive.fo/dtfiR = “/POLAK/ OUTER HEAVEN”
h ttps://archive.fo/6JGwQ = “/bunker/ data”
h ttps://archive.fo/HakHo = “/POLAK/ OUTER HEAVEN 2.0”
h ttps://archive.fo/CII3m = “/pol/ WL Insurance Thread Pt. 2”
h ttps://archive.fo/pL95K = “/POLAK/ OPERATION INSULAR AMBIENCE”
h ttps://archive.fo/pMEmC = “Possible insurance key dump.. please help. The_Donald”
h ttps://archive.fo/RpwwX = “/pol/ Insurance files key testing”


Anonymous 04/23/2017 (Sun) 22:15:16 Id: 99514e [Preview] No. 39683 del
>>37941
Regarding the sharing of keys or decrypted content files, could it be possible to distribute the content safely this way?
1) find key and decrypt files on airgapped machine
2) re-encrypt the files with some obvious password like "password", maybe even put it in the filename
3) distribute this new encrypted file relatively safely, because the detectors won't recognize the new encrypted file contents
4) at the right time, tell others to decrypt the new set of files, or have some automatic decryption function or something, idk

Would this kind of strategy work?


Anonymous 04/23/2017 (Sun) 22:45:24 Id: 99514e [Preview] No. 39684 del
>>37963
would this work for spreading the information?
>>39683



Top | Return | Catalog | Post a reply