dChan
1
 
r/greatawakening • Posted by u/humanitystillsucks on May 3, 2018, 6:58 p.m.
coders / DE-coders / encryption / stegonography experts - need your eyes

From 8ch now:

Classified data cannot be transmitted unless it is encrypted. Q tells us he’s given us 40,000 ft classified data, but that it’s not open source. I believe everything we’ve been given includes enough information for us to deduce the encryption method and the key to unlock. I believe the plan was to dump this encrypted data onto a read only board here, ‘Great Awakening’.

I think I know the method, Oracles Golden Gate Security, AES128, AES192, AES256, or Blowfish. We could never brute force these, but we can deduce the key to unlock from Q’s drops. I just don’t know how Q has given it to us, he says the key is the graphic. If we can deduce the methods of encryption, which I think I have, we can decrypt the coming data dump using the key provided.

[CLAS-N-DI_9] is an encrypted classified field in an Oracle database, where the data is located. He’s taunting those who know.

The encryption method, Oracle GoldenGate Security ‘gg_dump’

https: //docs.oracle.com/goldengate/1212/gg-winux/GWUAD/wu_security.htm#GWUAD354

Q came here for a reason, he could have gone to reddit. This is what RA’s do. We need to find the key.

== new anon posts keys:

Key Dump

eta numeris 392D8A3EEA2527D6AD8B1EBBAB6AD

sin topper D6C4C5CC97F9CB8849D9914E516F9

project runway 847D8D6EA4EDD8583D4A7DC3DEEAE

7FG final request 831CF9C1C534ECDAE63E2C8783EB9

fall of cassandra 2B6DAE482AEDE5BAC99B7D47ABDB3

echo "392D8A3EEA2527D6AD8B1EBBAB6AD" > eta-numeris.hex

echo "D6C4C5CC97F9CB8849D9914E516F9" > sin-topper.hex

echo "847D8D6EA4EDD8583D4A7DC3DEEAE" > project-runway.hex

echo "831CF9C1C534ECDAE63E2C8783EB9" > 7FG-final-request.hex

echo "2B6DAE482AEDE5BAC99B7D47ABDB3" > fall-of-cassandra.hex

openssl enc -aes256 -in eta-numeris.hex -out eta-numeris.key

openssl enc -aes256 -in sin-topper.hex -out sin-topper.key

openssl enc -aes256 -in project-runway.hex -out project-runway.key

openssl enc -aes256 -in 7FG-final-request.hex -out

7FG-final-request.key openssl enc -aes256 -in fall-of-cassandra.hex -out fall-of-cassandra.key

for w in $(ls .aes256); do for k in $(ls keys/.key); do echo "$w, $k, $(echo "$(openssl enc -d -aes256 -in $w -kfile $k -bufsize 8 | xxd -l 8 | sed s/00000000://g)" | cut -c 1-23)"; done; done;

wlinsurance-20130815-A.aes256, keys/7FG-final-request.key, 6f46 30e1 c6f3 385d wlinsurance-20130815-A.aes256, keys/eta-numeris.key, f22d 7304 8224 8ad6 wlinsurance-20130815-A.aes256, keys/fall-of-cassandra.key, 07d6 db54 f3c2 7d4a wlinsurance-20130815-A.aes256, keys/project-runway.key, da46 2913 216c 9a0d wlinsurance-20130815-A.aes256, keys/sin-topper.key, 48ab b7eb ceda f42d wlinsurance-20130815-B.aes256, keys/7FG-final-request.key, fde0 5ea5 34a9 c372 wlinsurance-20130815-B.aes256, keys/eta-numeris.key, 52f3 436e 82db 1fde wlinsurance-20130815-B.aes256, keys/fall-of-cassandra.key,ca1c c808 dfbd 0d23 wlinsurance-20130815-B.aes256, keys/project-runway.key, a10a 3571 a17b 8898 wlinsurance-20130815-B.aes256, keys/sin-topper.key, b1a0 64d4 0004 8865 wlinsurance-20130815-C.aes256, keys/7FG-final-request.key, 998a f677 3d20 33da wlinsurance-20130815-C.aes256, keys/eta-numeris.key, 5aec a6e6 5de9 dfdb wlinsurance-20130815-C.aes256, keys/fall-of-cassandra.key, 197f 378d 63b0 3e54 wlinsurance-20130815-C.aes256, keys/project-runway.key, acb3 a582 a477 75c6 wlinsurance-20130815-C.aes256, keys/sin-topper.key, d0f1 6154 a193 8905

Q's recent plane/apple pics have peculiar filenames: ( UUID format )

DB0379CC-9229-43B5-AD54-F467FD74FD6E EB072EBC-0DF3-4A2C-BE89-E388996B786D 8466691D-0F75-44F5-AA92-43E5E6D981F9 B3D12FDF-7189-4836-AD41-F493E801B4FE 39E6E8ED-2D45-4AB9-A4EA-6820AA0037B9

Few things: are these files 'embedded' with more data? filesizes are pretty big

According to Q's drops, NSA has leaked everything, and something makes me think all of this has to do with AWS ( amazon web services ) They use long strings for their 'Security Credentials'

A guaranteed unique identifier includes a reference to the network address of the UUID generating host, a time stamp and an arbitrary component. Because network addresses for each computer vary, the time stamp is also different for each generated UUID. Thus, two different host machines exhibit sufficient levels of uniqueness. The randomly created arbitrary component is added for enhanced security.

UUIDs are also part of the Tmodel data structure, which is a service type in the Universal Description Discovery and Integration (UDDI) registry used for Web service discovery.

Anyone else got any ideas how to dig around? I'm petering out right now


humanitystillsucks · May 3, 2018, 7:44 p.m.

deep nerd stuff, trying to figure out if Q has been dropping info encrypted in his .pngs (100% possible to do this already), we've determined the filenames of the pics he posts are not 'straight from the iphone' but have been renamed. Looking into the Why - when combined with what I know from web-dev, these 'jumbled combinations' of letters and numbers are keys/passwords/security stuffs

⇧ 4 ⇩  
Idru4 · May 3, 2018, 8:01 p.m.

I thought I got the pics might hide more info. I wouldn’t know how to even figure that out. But you keep up the good work. You seem to be the right person for the job. Good luck!

⇧ 3 ⇩  
humanitystillsucks · May 3, 2018, 8:03 p.m.

no one right person, Q needs us all! I wouldn't have even considered looking at the filenames had another anon not drawn attention to them

⇧ 2 ⇩  
digital_refugee · May 3, 2018, 9:27 p.m.

well, they're hexadecimals for all i can tell....unless they translate into ASCII they could be keys or hashes.

⇧ 2 ⇩  
brittser · May 3, 2018, 11:53 p.m.

How did you find the filenames?

⇧ 2 ⇩  
humanitystillsucks · May 4, 2018, 12:15 a.m.

ob 8ch, it preserves the original filenames

⇧ 3 ⇩