Jeffrey Epstein Case Files
Oral arguments have been over for weeks. Anyone know when the court might reach a decision about releasing the records? Is the Dead Judge conflicting the process?
Maxwell v. Giuffre
Jeffrey Epstein Case Files
Oral arguments have been over for weeks. Anyone know when the court might reach a decision about releasing the records? Is the Dead Judge conflicting the process?
Maxwell v. Giuffre
SALTS:
insurance.aes256 DE 18 1B 73 EF F3 5E 39 DA
wlinsurance-20130815-A.aes256 OF OB DA 00 FO 35 9A OF C8
wlinsurance-20130815-B.aes256 AB C2 04 75 66 AB 85 BE 30
wlinsurance-20130815-C.aes256 73 6B 46 4C 2F 84 9A C2 A4
INSURANCE SNIPPETS:
http://gateway.glop.me/ipfs/QmUUMMKLshZBQWHDt8yVaabHdMjJA2g1md7YS8qsvMci/insurance.aes256.5120 http://gateway.glop.me/ipfs/QmZHmQrNuBL1MJEi3cSn7bYoLShLiqGue5oeqZmcvHtBD6/wlinsurance-20130815-A.aes256.5120 http://gateway.glop.me/ipfs/QmRRAnoHgZGqMrJodHA3Nj6GeQ5j4y1AHUbG81V1gVXWshMH/wlinsurance-20130815-B.aes256.5120
http://gateway.glop.me/ipfs/QmPCPmGwyCghyMrVENUB1AEbzkZ9dULE9rBJcVMqc5RG1M/wlinsurance-20130815-C.aes256.5120
http://gateway.glop.me/ipfs/QmNdwpvqVVXkYsxPnjoL8rSZZpVDRDNu3YYvddsQ7dLdrEC/2016-06-03_insurance.aes256.5120 http://gateway.glop.me/ipfs/QmcDMXxr99F1583oZKYqFzg8TwomugeV49oFkMrtGHEJ6Z/2016-11-07_WL-Insurance_EC.aes256.5120
http://gateway.glop.me/ipfs/QmPAoxkRcJERJEyj3uXsnKwe819WkqnX2Gp1VgpoaxLtys/2016-11-07_WL-Insurance_UK.aes256.5120
http://gateway.glop.me/ipfs/QmaYUUco1VtVurovbrtboMvu6kvFp9pdz6CEA97fixojy5/2016-11-07_WL-Insurance_US.aes256.5120
And why are salts important?
How does OPENSSL hash keys?
EVP_BytesToKey
MD5(KEYS + SALT)
NAME
EVP_BytesToKey - password based encryption routine
SYNOPSIS
#include <openssl/evp.h>
int EVP_BytesToKey(const EVP_CIPHER type,const EVP_MD md,
const unsigned char *salt,
const unsigned char *data, int datal, int count,
unsigned char key,unsigned char iv);
DESCRIPTION
EVP_BytesToKey() derives a key and IV from various parameters. type is the cipher to derive the key and IV for. md is the message digest to use. The salt paramter is used as a salt in the derivation: it should point to an 8 byte buffer or NULL if no salt is used. data is a buffer containing datal bytes which is used to derive the keying data. count is the iteration count to use. The derived key and IV will be written to key and iv respectively.
NOTES
A typical application of this function is to derive keying material for an encryption algorithm from a password in the data parameter.
Increasing the count parameter slows down the algorithm which makes it harder for an attacker to peform a brute force attack using a large number of candidate passwords.
If the total key and IV length is less than the digest length and MD5 is used then the derivation algorithm is compatible with PKCS#5 v1.5 otherwise a non standard extension is used to derive the extra data.
Newer applications should use more standard algorithms such as PKCS#5 v2.0 for key derivation.
KEY DERIVATION ALGORITHM
The key and IV is derived by concatenating D_1, D_2, etc until enough data is available for the key and IV. D_i is defined as:
D_i = HASH^count(D_(i-1) || data || salt)
where || denotes concatentaion, D_0 is empty, HASH is the digest algorithm in use, HASH^1(data) is simply HASH(data), HASH^2(data) is HASH(HASH(data)) and so on.
The initial bytes are used for the key and the subsequent bytes for the IV.
RETURN VALUES
EVP_BytesToKey() returns the size of the derived key in bytes, or 0 on error.
We can easily implement this with python code. or we could even possibly find it already in the open source implementation.
83GB - https://file.wikileaks.org/torrent/2016-12-09_WL-Insurance.aes256.torrent
294MB - https://file.wikileaks.org/torrent/2017-01-25_WL-Insurance.aes256.torrent
2nd
2017-01-25 Vaul7 (All of CIAs shit)
https://file.wikileaks.org/torrent/2017-01-25_WL-Insurance.aes256.torrent
2016-06-03 (UNNAMED)
https://file.wikileaks.org/torrent/2016-06-03_insurance.aes256.torrent
2016-12-09 Shadowbrokers (Alleged Aliens and Projects)
https://file.wikileaks.org/torrent/2016-12-09_WL-Insurance.aes256.torrent
2013-08-16 Snowden Cache (NSA Projects that were only mentioned in the Snowden revelations)
https://file.wikileaks.org/torrent/wlinsurance-20130815-A.aes256.torrent
https://file.wikileaks.org/torrent/wlinsurance-20130815-B.aes256.torrent
https://file.wikileaks.org/torrent/wlinsurance-20130815-C.aes256.torrent
2012-02-22 Stratfor (Military/Regime change)
https://file.wikileaks.org/torrent/wikileaks-insurance-20120222.tar.bz2.aes.torrent
Key Dump
eta numeris
392D8A3EEA2527D6AD8B1EBBAB6AD
sin topper
D6C4C5CC97F9CB8849D9914E516F9
project runway
847D8D6EA4EDD8583D4A7DC3DEEAE
7FG final request
831CF9C1C534ECDAE63E2C8783EB9
fall of cassandra
2B6DAE482AEDE5BAC99B7D47ABDB3
echo "392D8A3EEA2527D6AD8B1EBBAB6AD" eta-numeris.hex
echo "D6C4C5CC97F9CB8849D9914E516F9" sin-topper.hex
echo "847D8D6EA4EDD8583D4A7DC3DEEAE" project-runway.hex
echo "831CF9C1C534ECDAE63E2C8783EB9" 7FG-final-request.hex
echo "2B6DAE482AEDE5BAC99B7D47ABDB3" fall-of-cassandra.hex
openssl enc -aes256 -in eta-numeris.hex -out eta-numeris.key
openssl enc -aes256 -in sin-topper.hex -out sin-topper.key
openssl enc -aes256 -in project-runway.hex -out project-runway.key
openssl enc -aes256 -in 7FG-final-request.hex -out 7FG-final-request.key
openssl enc -aes256 -in fall-of-cassandra.hex -out fall-of-cassandra.key
for w in $(ls *.aes256); do
for k in $(ls keys/*.key); do
echo "$w, $k, $(echo "$(openssl enc -d -aes256 -in $w -kfile $k -bufsize 8 | xxd -l 8 | sed s/00000000://g)" | cut -c 1-23)";
done;
done;
wlinsurance-20130815-A.aes256, keys/7FG-final-request.key, 6f46 30e1 c6f3 385d
wlinsurance-20130815-A.aes256, keys/eta-numeris.key, f22d 7304 8224 8ad6
wlinsurance-20130815-A.aes256, keys/fall-of-cassandra.key, 07d6 db54 f3c2 7d4a
wlinsurance-20130815-A.aes256, keys/project-runway.key, da46 2913 216c 9a0d
wlinsurance-20130815-A.aes256, keys/sin-topper.key, 48ab b7eb ceda f42d
wlinsurance-20130815-B.aes256, keys/7FG-final-request.key, fde0 5ea5 34a9 c372
wlinsurance-20130815-B.aes256, keys/eta-numeris.key, 52f3 436e 82db 1fde
wlinsurance-20130815-B.aes256, keys/fall-of-cassandra.key,ca1c c808 dfbd 0d23
wlinsurance-20130815-B.aes256, keys/project-runway.key, a10a 3571 a17b 8898
wlinsurance-20130815-B.aes256, keys/sin-topper.key, b1a0 64d4 0004 8865
wlinsurance-20130815-C.aes256, keys/7FG-final-request.key, 998a f677 3d20 33da
wlinsurance-20130815-C.aes256, keys/eta-numeris.key, 5aec a6e6 5de9 dfdb
wlinsurance-20130815-C.aes256, keys/fall-of-cassandra.key, 197f 378d 63b0 3e54
wlinsurance-20130815-C.aes256, keys/project-runway.key, acb3 a582 a477 75c6
wlinsurance-20130815-C.aes256, keys/sin-topper.key, d0f1 6154 a193 8905