>>1721051
>>1719772
>it decompressed because it doesnt give an error thats how linux works
I've not yet seen any evidence that decryption succeeded. I think aes-256-cfb encoding doesn't have a way for OpenSSL to know if the key is good or not. With "aes256" (aes-256-cbc) shows rejection when you try the key. I tried myself with many different encodings / key variations before coming to this thread. Since "-aes256" is a valid argument to OpenSSL, commonly used, and the insurance file's file extension, I'm inclined to think it was the encryption method used.
Try putting in a different key with aes-256-cfb. Any key at all. No complaints.
# For example, this has the "Berlin?..." key. No complaint from OpenSSL.
$ openssl enc -aes-256-cfb -d -in wlinsurance-20130815-A.aes256 -out ./wl-a3 -pass file:wl-A.pass
$
# Lets change the key to something we know is wrong. Again, no complaint from OpenSSL.
$ echo "Hello World" wl-A.pass
$ openssl enc -aes-256-cfb -d -in wlinsurance-20130815-A.aes256 -out ./wl-a3 -pass file:wl-A.pass
$
Also, the first 8 bytes of the wlinsurance-20130815-A.aes256 file say "Salted__", followed by another 8 bytes for the salt. This is typical of a file generated by OpenSSL. The file that results from decryption using the "Berlin?" key (and the variant with a "^") does not have this, or any other recognizable file signature. You can see the first 16 bytes of a file with
$ head -c 16 <filename>
For all of "The Q" / "The Traveller" poster's rambling boastfulness, I'd think they would have taken a moment have posted decryption instructions. The writing style also seems off. It looks to me like those reddit posts are disinfo / a troll.