Anonymous ID: 5ade1d April 12, 2019, 6:30 a.m. No.6150108   🗄️.is 🔗kun   >>0140 >>0657

>>6150056

Phantom Time Hypothesis: Was A 300-Year Chunk Of Europe’s ‘Dark Ages’ Completely Made Up?

 

https://thoughtcatalog.com/jeremy-london/2018/09/phantom-time-hypothesis-was-a-300-year-chunk-of-europes-dark-ages-completely-made-up/

 

Phantom Time Hypothesis claims that the years 614-911 never happened and that we’re actually living in the 1700s right now.

 

You think you’ve heard every conspiracy theory? Have you heard the one about how the years 614-911 never happened and were part of a secret plot by a Catholic pope who thought it’d be cool to reign during the year 1000? No? Well, strap yourself in to learn about the three “missing centuries.”

 

According to the historical record, not much happened in Europe during the early Middle Ages. There is scant archeological evidence that can be pinpointed to the years 600-900 CE and very little evidence of new literature and technological advancements. Most historians refer to this time as the “Dark Ages” and blame it on a cultural decline throughout Europe following the fall of the Roman Empire.

 

But according to the Phantom Time Hypothesis, this era wasn’t merely “dark”—it never happened at all.

Anonymous ID: 5ade1d April 12, 2019, 7:07 a.m. No.6150387   🗄️.is 🔗kun

'They're in our heads': TV series tackles big-tech nightmare

 

https://news.yahoo.com/theyre-heads-tv-series-tackles-big-tech-nightmare-113616810.html

 

Cannes (France) (AFP) - Channing Powell, the creator of the hit horror television series "The Walking Dead", is not someone who is easily spooked.

 

But Powell is scared, "terrified actually" of what big tech might be up to.

 

And critics were too after watching her spine-chilling new series, "The Feed", premiere in Cannes this week.

 

The Amazon show is set in the near future when we can share emotions, thoughts and what we see with our eyes on a social network embedded in our brains.

 

If that sounds as far fetched as the post-apocalyptic zombies of "The Walking Dead", Powell has news for you.

 

"Elon Musk and Facebook are already trying to develop the technology portrayed in the show," she told AFP at the Canneseries festival in the French Riviera resort.

 

The Tesla boss and sometime Twitter warrior "is developing a neuro lace (computer) that covers the entire brain that you would control with thought," Powell said.

 

"Facebook has been working on something similar in some place called 'Building 8' where it has all its secret projects."

 

Both are very quiet about what precisely they are doing, said Powell.

 

  • Chips controlled by thought -

 

However, "people at MIT have already created something you can attach to your ear that is controlled by thought.

 

"It can tell you the time and how much groceries are when you walk through the aisles of a supermarket," she added.

 

"The Feed" – which will screen later this year – is based on Nick Clark Windo's 2018 novel of the same name.

 

Told from inside the fabulously wealthy family who invented "The Feed" and now effectively control the world, the story doesn't end well.

 

Given what we have learned about the harvesting and misuse of personal data from the Cambridge Analytica scandal, and how Google can seem to predict our needs before we search for it on our smartphone, that should not be too surprising.

 

"We have seen dystopian shows before but never like this," Powell insisted, who cast British actor David Thewlis as the tech guru patriarch of the seemingly well-meaning clan.

 

"It was a very realistic portrayal of what happens when we let technology control us – and we are heading in that direction.

 

"We cannot let go of our iPhones, we need to check Instagram every hour or minute. The notion that you would put something inside your head is really frightening to me," the 39-year-old said.

 

  • 'Terrifying' -

 

But it is where tech companies are going, she insisted, the next logical step from Google's smart glasses.

 

Powell said workers in some companies in Belgium and Sweden already have chips implanted in their bodies.

 

"What is happening around us right now is so scary. When somebody like Elon Musk (a radical libertarian) – who is inside this – is telling the government, 'You need to regulate us, and stop us from doing what we are doing', that is terrifying. Because he knows way more than we know," she said.

 

Paranoia about new technology is nothing new, Powell admitted, dating back beyond the Industrial Revolution.

 

But what we are living through now, and with little or no regulation to hold tech companies back, is of a different order, she argued.

 

"Technology has brought us so much…. but there are also these negative undertones to it. Facebook is watching you and selling your information. They own Instagram and WhatsApp, and (Amazon's) Alexa is in every room of your house. Siri can pop up on your phone when you didn't even call her. You cannot ignore that side of it."

 

Set in England, "The Feed" has British actor Guy Burnet play Thewlis' psychologist son and Nina Toussaint-White his daughter-in-law.

 

Burnet told AFP that the series' vision of the near future "was far from crazy… and it is amazing it hasn't been done before" when you see Beijing's plans for its social credit system.

 

From next year all Chinese citizens will be ranked and either punished or rewarded according to their "social credit" score.

 

"I think we're not on the precipice, we may have already passed it," the actor warned.

 

In "The Feed", a handful of people control the code on which the world relies, and it is they, said Powell, who get to decide what the public need to know.

 

"Which is effectively where we are now" in the real world too, the writer warned.

Anonymous ID: 5ade1d April 12, 2019, 7:12 a.m. No.6150427   🗄️.is 🔗kun   >>0560

>>6150402

What you cannot accomplish with money, you can with coercion. Mueller may face charges until the day he is released. He may be convicted of something far lessor than he is probably guilty of. He may be pardoned. All things are on the table until they are taken off or the deal is done.

Anonymous ID: 5ade1d April 12, 2019, 7:14 a.m. No.6150441   🗄️.is 🔗kun   >>0447 >>0453

>>6150412

SALTS:

insurance.aes256 DE 18 1B 73 EF F3 5E 39 DA

wlinsurance-20130815-A.aes256 OF OB DA 00 FO 35 9A OF C8

wlinsurance-20130815-B.aes256 AB C2 04 75 66 AB 85 BE 30

wlinsurance-20130815-C.aes256 73 6B 46 4C 2F 84 9A C2 A4

INSURANCE SNIPPETS:

http://gateway.glop.me/ipfs/QmUUMMKLshZBQWHDt8yVaabHdMjJA2g1md7YS8qsvMci/insurance.aes256.5120 http://gateway.glop.me/ipfs/QmZHmQrNuBL1MJEi3cSn7bYoLShLiqGue5oeqZmcvHtBD6/wlinsurance-20130815-A.aes256.5120 http://gateway.glop.me/ipfs/QmRRAnoHgZGqMrJodHA3Nj6GeQ5j4y1AHUbG81V1gVXWshMH/wlinsurance-20130815-B.aes256.5120

http://gateway.glop.me/ipfs/QmPCPmGwyCghyMrVENUB1AEbzkZ9dULE9rBJcVMqc5RG1M/wlinsurance-20130815-C.aes256.5120

http://gateway.glop.me/ipfs/QmNdwpvqVVXkYsxPnjoL8rSZZpVDRDNu3YYvddsQ7dLdrEC/2016-06-03_insurance.aes256.5120 http://gateway.glop.me/ipfs/QmcDMXxr99F1583oZKYqFzg8TwomugeV49oFkMrtGHEJ6Z/2016-11-07_WL-Insurance_EC.aes256.5120

http://gateway.glop.me/ipfs/QmPAoxkRcJERJEyj3uXsnKwe819WkqnX2Gp1VgpoaxLtys/2016-11-07_WL-Insurance_UK.aes256.5120

http://gateway.glop.me/ipfs/QmaYUUco1VtVurovbrtboMvu6kvFp9pdz6CEA97fixojy5/2016-11-07_WL-Insurance_US.aes256.5120

And why are salts important?

How does OPENSSL hash keys?

EVP_BytesToKey

MD5(KEYS + SALT)

NAME

EVP_BytesToKey - password based encryption routine

SYNOPSIS

#include <openssl/evp.h>

int EVP_BytesToKey(const EVP_CIPHER type,const EVP_MD md,

const unsigned char *salt,

const unsigned char *data, int datal, int count,

unsigned char key,unsigned char iv);

DESCRIPTION

EVP_BytesToKey() derives a key and IV from various parameters. type is the cipher to derive the key and IV for. md is the message digest to use. The salt paramter is used as a salt in the derivation: it should point to an 8 byte buffer or NULL if no salt is used. data is a buffer containing datal bytes which is used to derive the keying data. count is the iteration count to use. The derived key and IV will be written to key and iv respectively.

NOTES

A typical application of this function is to derive keying material for an encryption algorithm from a password in the data parameter.

Increasing the count parameter slows down the algorithm which makes it harder for an attacker to peform a brute force attack using a large number of candidate passwords.

If the total key and IV length is less than the digest length and MD5 is used then the derivation algorithm is compatible with PKCS#5 v1.5 otherwise a non standard extension is used to derive the extra data.

Newer applications should use more standard algorithms such as PKCS#5 v2.0 for key derivation.

KEY DERIVATION ALGORITHM

The key and IV is derived by concatenating D_1, D_2, etc until enough data is available for the key and IV. D_i is defined as:

D_i = HASH^count(D_(i-1) || data || salt)

where || denotes concatentaion, D_0 is empty, HASH is the digest algorithm in use, HASH^1(data) is simply HASH(data), HASH^2(data) is HASH(HASH(data)) and so on.

The initial bytes are used for the key and the subsequent bytes for the IV.

RETURN VALUES

EVP_BytesToKey() returns the size of the derived key in bytes, or 0 on error.

We can easily implement this with python code. or we could even possibly find it already in the open source implementation.

Anonymous ID: 5ade1d April 12, 2019, 7:14 a.m. No.6150447   🗄️.is 🔗kun

>>6150441

83GB - https://file.wikileaks.org/torrent/2016-12-09_WL-Insurance.aes256.torrent

294MB - https://file.wikileaks.org/torrent/2017-01-25_WL-Insurance.aes256.torrent

 

2nd

2017-01-25 Vaul7 (All of CIAs shit)

https://file.wikileaks.org/torrent/2017-01-25_WL-Insurance.aes256.torrent

2016-06-03 (UNNAMED)

https://file.wikileaks.org/torrent/2016-06-03_insurance.aes256.torrent

2016-12-09 Shadowbrokers (Alleged Aliens and Projects)

https://file.wikileaks.org/torrent/2016-12-09_WL-Insurance.aes256.torrent

2013-08-16 Snowden Cache (NSA Projects that were only mentioned in the Snowden revelations)

https://file.wikileaks.org/torrent/wlinsurance-20130815-A.aes256.torrent

https://file.wikileaks.org/torrent/wlinsurance-20130815-B.aes256.torrent

https://file.wikileaks.org/torrent/wlinsurance-20130815-C.aes256.torrent

2012-02-22 Stratfor (Military/Regime change)

https://file.wikileaks.org/torrent/wikileaks-insurance-20120222.tar.bz2.aes.torrent

 

 

 

 

Key Dump

eta numeris

392D8A3EEA2527D6AD8B1EBBAB6AD

sin topper

D6C4C5CC97F9CB8849D9914E516F9

project runway

847D8D6EA4EDD8583D4A7DC3DEEAE

7FG final request

831CF9C1C534ECDAE63E2C8783EB9

fall of cassandra

2B6DAE482AEDE5BAC99B7D47ABDB3

echo "392D8A3EEA2527D6AD8B1EBBAB6AD" eta-numeris.hex

echo "D6C4C5CC97F9CB8849D9914E516F9" sin-topper.hex

echo "847D8D6EA4EDD8583D4A7DC3DEEAE" project-runway.hex

echo "831CF9C1C534ECDAE63E2C8783EB9" 7FG-final-request.hex

echo "2B6DAE482AEDE5BAC99B7D47ABDB3" fall-of-cassandra.hex

openssl enc -aes256 -in eta-numeris.hex -out eta-numeris.key

openssl enc -aes256 -in sin-topper.hex -out sin-topper.key

openssl enc -aes256 -in project-runway.hex -out project-runway.key

openssl enc -aes256 -in 7FG-final-request.hex -out 7FG-final-request.key

openssl enc -aes256 -in fall-of-cassandra.hex -out fall-of-cassandra.key

 

for w in $(ls *.aes256); do

for k in $(ls keys/*.key); do

echo "$w, $k, $(echo "$(openssl enc -d -aes256 -in $w -kfile $k -bufsize 8 | xxd -l 8 | sed s/00000000://g)" | cut -c 1-23)";

done;

done;

wlinsurance-20130815-A.aes256, keys/7FG-final-request.key, 6f46 30e1 c6f3 385d

wlinsurance-20130815-A.aes256, keys/eta-numeris.key, f22d 7304 8224 8ad6

wlinsurance-20130815-A.aes256, keys/fall-of-cassandra.key, 07d6 db54 f3c2 7d4a

wlinsurance-20130815-A.aes256, keys/project-runway.key, da46 2913 216c 9a0d

wlinsurance-20130815-A.aes256, keys/sin-topper.key, 48ab b7eb ceda f42d

wlinsurance-20130815-B.aes256, keys/7FG-final-request.key, fde0 5ea5 34a9 c372

wlinsurance-20130815-B.aes256, keys/eta-numeris.key, 52f3 436e 82db 1fde

wlinsurance-20130815-B.aes256, keys/fall-of-cassandra.key,ca1c c808 dfbd 0d23

wlinsurance-20130815-B.aes256, keys/project-runway.key, a10a 3571 a17b 8898

wlinsurance-20130815-B.aes256, keys/sin-topper.key, b1a0 64d4 0004 8865

wlinsurance-20130815-C.aes256, keys/7FG-final-request.key, 998a f677 3d20 33da

wlinsurance-20130815-C.aes256, keys/eta-numeris.key, 5aec a6e6 5de9 dfdb

wlinsurance-20130815-C.aes256, keys/fall-of-cassandra.key, 197f 378d 63b0 3e54

wlinsurance-20130815-C.aes256, keys/project-runway.key, acb3 a582 a477 75c6

wlinsurance-20130815-C.aes256, keys/sin-topper.key, d0f1 6154 a193 8905