Anonymous ID: 1dce61 April 12, 2019, 5:10 a.m. No.6149722   🗄️.is 🔗kun   >>9831

Jeffrey Epstein Case Files

 

Oral arguments have been over for weeks. Anyone know when the court might reach a decision about releasing the records? Is the Dead Judge conflicting the process?

 

Maxwell v. Giuffre

Anonymous ID: 1dce61 April 12, 2019, 6:10 a.m. No.6149966   🗄️.is 🔗kun   >>9969

>>6149889

SALTS:

insurance.aes256 DE 18 1B 73 EF F3 5E 39 DA

wlinsurance-20130815-A.aes256 OF OB DA 00 FO 35 9A OF C8

wlinsurance-20130815-B.aes256 AB C2 04 75 66 AB 85 BE 30

wlinsurance-20130815-C.aes256 73 6B 46 4C 2F 84 9A C2 A4

INSURANCE SNIPPETS:

http://gateway.glop.me/ipfs/QmUUMMKLshZBQWHDt8yVaabHdMjJA2g1md7YS8qsvMci/insurance.aes256.5120 http://gateway.glop.me/ipfs/QmZHmQrNuBL1MJEi3cSn7bYoLShLiqGue5oeqZmcvHtBD6/wlinsurance-20130815-A.aes256.5120 http://gateway.glop.me/ipfs/QmRRAnoHgZGqMrJodHA3Nj6GeQ5j4y1AHUbG81V1gVXWshMH/wlinsurance-20130815-B.aes256.5120

http://gateway.glop.me/ipfs/QmPCPmGwyCghyMrVENUB1AEbzkZ9dULE9rBJcVMqc5RG1M/wlinsurance-20130815-C.aes256.5120

http://gateway.glop.me/ipfs/QmNdwpvqVVXkYsxPnjoL8rSZZpVDRDNu3YYvddsQ7dLdrEC/2016-06-03_insurance.aes256.5120 http://gateway.glop.me/ipfs/QmcDMXxr99F1583oZKYqFzg8TwomugeV49oFkMrtGHEJ6Z/2016-11-07_WL-Insurance_EC.aes256.5120

http://gateway.glop.me/ipfs/QmPAoxkRcJERJEyj3uXsnKwe819WkqnX2Gp1VgpoaxLtys/2016-11-07_WL-Insurance_UK.aes256.5120

http://gateway.glop.me/ipfs/QmaYUUco1VtVurovbrtboMvu6kvFp9pdz6CEA97fixojy5/2016-11-07_WL-Insurance_US.aes256.5120

And why are salts important?

How does OPENSSL hash keys?

EVP_BytesToKey

MD5(KEYS + SALT)

NAME

EVP_BytesToKey - password based encryption routine

SYNOPSIS

#include <openssl/evp.h>

int EVP_BytesToKey(const EVP_CIPHER type,const EVP_MD md,

const unsigned char *salt,

const unsigned char *data, int datal, int count,

unsigned char key,unsigned char iv);

DESCRIPTION

EVP_BytesToKey() derives a key and IV from various parameters. type is the cipher to derive the key and IV for. md is the message digest to use. The salt paramter is used as a salt in the derivation: it should point to an 8 byte buffer or NULL if no salt is used. data is a buffer containing datal bytes which is used to derive the keying data. count is the iteration count to use. The derived key and IV will be written to key and iv respectively.

NOTES

A typical application of this function is to derive keying material for an encryption algorithm from a password in the data parameter.

Increasing the count parameter slows down the algorithm which makes it harder for an attacker to peform a brute force attack using a large number of candidate passwords.

If the total key and IV length is less than the digest length and MD5 is used then the derivation algorithm is compatible with PKCS#5 v1.5 otherwise a non standard extension is used to derive the extra data.

Newer applications should use more standard algorithms such as PKCS#5 v2.0 for key derivation.

KEY DERIVATION ALGORITHM

The key and IV is derived by concatenating D_1, D_2, etc until enough data is available for the key and IV. D_i is defined as:

D_i = HASH^count(D_(i-1) || data || salt)

where || denotes concatentaion, D_0 is empty, HASH is the digest algorithm in use, HASH^1(data) is simply HASH(data), HASH^2(data) is HASH(HASH(data)) and so on.

The initial bytes are used for the key and the subsequent bytes for the IV.

RETURN VALUES

EVP_BytesToKey() returns the size of the derived key in bytes, or 0 on error.

We can easily implement this with python code. or we could even possibly find it already in the open source implementation.

Anonymous ID: 1dce61 April 12, 2019, 6:10 a.m. No.6149969   🗄️.is 🔗kun

>>6149966

83GB - https://file.wikileaks.org/torrent/2016-12-09_WL-Insurance.aes256.torrent

294MB - https://file.wikileaks.org/torrent/2017-01-25_WL-Insurance.aes256.torrent

 

2nd

2017-01-25 Vaul7 (All of CIAs shit)

https://file.wikileaks.org/torrent/2017-01-25_WL-Insurance.aes256.torrent

2016-06-03 (UNNAMED)

https://file.wikileaks.org/torrent/2016-06-03_insurance.aes256.torrent

2016-12-09 Shadowbrokers (Alleged Aliens and Projects)

https://file.wikileaks.org/torrent/2016-12-09_WL-Insurance.aes256.torrent

2013-08-16 Snowden Cache (NSA Projects that were only mentioned in the Snowden revelations)

https://file.wikileaks.org/torrent/wlinsurance-20130815-A.aes256.torrent

https://file.wikileaks.org/torrent/wlinsurance-20130815-B.aes256.torrent

https://file.wikileaks.org/torrent/wlinsurance-20130815-C.aes256.torrent

2012-02-22 Stratfor (Military/Regime change)

https://file.wikileaks.org/torrent/wikileaks-insurance-20120222.tar.bz2.aes.torrent

 

 

 

 

Key Dump

eta numeris

392D8A3EEA2527D6AD8B1EBBAB6AD

sin topper

D6C4C5CC97F9CB8849D9914E516F9

project runway

847D8D6EA4EDD8583D4A7DC3DEEAE

7FG final request

831CF9C1C534ECDAE63E2C8783EB9

fall of cassandra

2B6DAE482AEDE5BAC99B7D47ABDB3

echo "392D8A3EEA2527D6AD8B1EBBAB6AD" eta-numeris.hex

echo "D6C4C5CC97F9CB8849D9914E516F9" sin-topper.hex

echo "847D8D6EA4EDD8583D4A7DC3DEEAE" project-runway.hex

echo "831CF9C1C534ECDAE63E2C8783EB9" 7FG-final-request.hex

echo "2B6DAE482AEDE5BAC99B7D47ABDB3" fall-of-cassandra.hex

openssl enc -aes256 -in eta-numeris.hex -out eta-numeris.key

openssl enc -aes256 -in sin-topper.hex -out sin-topper.key

openssl enc -aes256 -in project-runway.hex -out project-runway.key

openssl enc -aes256 -in 7FG-final-request.hex -out 7FG-final-request.key

openssl enc -aes256 -in fall-of-cassandra.hex -out fall-of-cassandra.key

 

for w in $(ls *.aes256); do

for k in $(ls keys/*.key); do

echo "$w, $k, $(echo "$(openssl enc -d -aes256 -in $w -kfile $k -bufsize 8 | xxd -l 8 | sed s/00000000://g)" | cut -c 1-23)";

done;

done;

wlinsurance-20130815-A.aes256, keys/7FG-final-request.key, 6f46 30e1 c6f3 385d

wlinsurance-20130815-A.aes256, keys/eta-numeris.key, f22d 7304 8224 8ad6

wlinsurance-20130815-A.aes256, keys/fall-of-cassandra.key, 07d6 db54 f3c2 7d4a

wlinsurance-20130815-A.aes256, keys/project-runway.key, da46 2913 216c 9a0d

wlinsurance-20130815-A.aes256, keys/sin-topper.key, 48ab b7eb ceda f42d

wlinsurance-20130815-B.aes256, keys/7FG-final-request.key, fde0 5ea5 34a9 c372

wlinsurance-20130815-B.aes256, keys/eta-numeris.key, 52f3 436e 82db 1fde

wlinsurance-20130815-B.aes256, keys/fall-of-cassandra.key,ca1c c808 dfbd 0d23

wlinsurance-20130815-B.aes256, keys/project-runway.key, a10a 3571 a17b 8898

wlinsurance-20130815-B.aes256, keys/sin-topper.key, b1a0 64d4 0004 8865

wlinsurance-20130815-C.aes256, keys/7FG-final-request.key, 998a f677 3d20 33da

wlinsurance-20130815-C.aes256, keys/eta-numeris.key, 5aec a6e6 5de9 dfdb

wlinsurance-20130815-C.aes256, keys/fall-of-cassandra.key, 197f 378d 63b0 3e54

wlinsurance-20130815-C.aes256, keys/project-runway.key, acb3 a582 a477 75c6

wlinsurance-20130815-C.aes256, keys/sin-topper.key, d0f1 6154 a193 8905