全 52 件のコメント

[–]baseball220[S] 67ポイント68ポイント  (2子コメント)

Someone should check the block chain data for around the approx. Time wikileaks twitter tweeted " activating contingency plans"

[–]y4my4m 42ポイント43ポイント  (0子コメント)

I made a tutorial to help people decrypt the blockchain hidden messages.

Feel free to contribute to this: https://np.reddit.com/r/WhereIsAssange/comments/5e4o70/tutorial_how_to_decode_btc_blockchain_hidden/

Also I don't care about Karma, this is really just to help out that I'm hijacking your top comment.

Cheers.

[–]WillWorkForLTC 8ポイント9ポイント  (0子コメント)

I X-Post this on /r/Bitcoin and credited you. Please look there for any useful info. Many people there know the Satoshi papers inside out.

Here is the link: https://www.reddit.com/r/bitcoin/comments/5e4vhy/_/

[–]Astronomist 38ポイント39ポイント  (0子コメント)

Nice, Kelly was the same dude who deleted his tweet back in October. Thought he was quoting Rage for a minute.

"ALLLLL FEDDSS CANT STOP US NOWWWW"

[–]Cpt9captain 20ポイント21ポイント  (1子コメント)

Thanks for relaying my finds. They might contain something, since they had weird names. Unlikely I know, but I was inspired by the recent "WERE FINE 8CHAN POST FAKE" situation.

Keep in mind I only searched for things that were very recent, Oct 14th and above. I can search for older transactions that look weird later, currently not at home.

Anyone who's got any skill in the matter, please do check the transactions I found above, but perhaps we need to look for older stuff.

I think a rather crude but potentially effective search method is to CTRL F and search for any transactions that say DMS or SMD. Hiding in plain sight could be the key here.

[–]AnthemofChaos 0ポイント1ポイント  (0子コメント)

Could it be something in the amounts as well?

[–]_UsUrPeR_ 18ポイント19ポイント  (1子コメント)

Today He dies.

Where'd you get that part from?

I don't see that anywhere, and it's not part of any quote...

[–]BrutallySilent 12ポイント13ポイント  (0子コメント)

Yeah, I didn't get that either. It's not a sentence that follows the actual quote to my knowledge.

[–]INVISIBLEAVENGER 31ポイント32ポイント  (7子コメント)

We got any other weaponized autists we can pull in on this?

Get this to /pol/ and halfchan, bruh.

Make sure they get their autists on this shit.

We've got a LOT of info on the blockchain to review, and more all the time.

Let's get going and wade in deep ASAP.

Maybe we can pull a couple more people off r/pizzagate for the time being?

[–]AnthemofChaos 5ポイント6ポイント  (0子コメント)

Think this warrants a look at? 7 days ago posted, after all other fake accounts were purged except for 7 that contain celebrities and what looks like BS.

This one is different, I can't locate the picture on image search, the loc is set to anywhere, and it's the only other profile on there.

https://www.toddandclare.com/personal/widowed-1365-i-am-looking-for-you/

[–]438498967 4ポイント5ポイント  (5子コメント)

Everyone can help. Please see this tutorial:

1 Decoding one transaction:

Download http://gateway.glop.me/ipfs/QmSU67Ei3TerNe32CcZTgd48jKqsVvBTgera1qBWFjKK9V/jean.py

(or http://gateway.glop.me/ipfs/QmburFHeUtM3wdrEj3rmUuBkx6iDmYpreyGCvHijgJhZnh/jean_b.py)

Usage:

python jean.py transaction_number

Example:

python jean.py 691dd277dc0e90a462a3d652a1171686de49cf19067cd33c7df0392833fb986a

Returns:

"Wikileaks Cablegate Backup

cablegate-201012041811.7z

Download the following transactions with Satoshi Nakamoto's download tool which can be found in transaction 6c53cd987119ef797d5adccd76241247988a0a5ef783572a9972e7371c5fb0cc Free speech and free enterprise! Thank you Satoshi!"

2 Downloading a transaction that generates a file:

A nice example is the original Bitcoin paper. It can be found in transaction 54e48e5f5c656b26c3bca14a8c95aa583d07ebe84dde3b7dd4a78f4e4186e713.

python jean.py 54e48e5f5c656b26c3bca14a8c95aa583d07ebe84dde3b7dd4a78f4e4186e713 > paper.pdf

Once it is done you will be able to see a pdf was generated in that directory.

Note that the transaction that generates the Bitcoin paper is related to the transaction that describes the Wikileaks cable dump, the cable dump itself, and many other transactions that have other content. Some has yet to be completely decrypted. These transactions are all related because they have common addresses involved or the money resulting from the transaction was used.

For example, take a look at this transaction: https://blockchain.info/tx/08654f9dc9d673b3527b48ad06ab1b199ad47b61fd54033af30c2ee975c588bd

If you do

python jean.py 08654f9dc9d673b3527b48ad06ab1b199ad47b61fd54033af30c2ee975c588bd

You will get a key that was leaked.

Now, if you look at the addresses involved, you can see one at the bottom, below Wikileaks. It does not show 'Escrow'. Go to that address and see its transactions. You will then find another message. Keep doing this and you'll eventually find the cable dump again. This is the process of 'following the change'.

Using this method we've found several transactions that involve Wikileaks that we don't quite understand. One good strategy is to generate a file from a transaction and then look at its 'magic numbers' to figure out what it could be.

Some of them are:

7379ab5047b143c0b6cfe5d8d79ad240b4b4f8cced55aa26f86d1d3d370c0d4c

d3c1cb2cdbf07c25e3c5f513de5ee36081a7c590e621f1f1eab62e8d4b50b635

cce82f3bde0537f82a55f3b8458cb50d632977f85c81dad3e1983a3348638f5c

2a14783f74796ace53e0a6859a7012723d3d6cd9dacf72d4e90a3394484093df

657aecafe66d729d2e2f6f325fcc4acb8501d8f02512d1f5042a36dd1bbd21d1

05e6c80d9d6469e7d1328e89b9d971b19972594701586bbcbd70070f2be799db

623463a2a8a949e0590ffe6b2fd3e4e1028b2b99c747e82e899da4485eb0b6be

5143cf232576ae53e8991ca389334563f14ea7a7c507a3e081fbef2538c84f6e

Testing the file type again with the Bitcoin paper transaction.

If you do

python jean.py 54e48e5f5c656b26c3bca14a8c95aa583d07ebe84dde3b7dd4a78f4e4186e713 > output

and then do,

file -b output

You will get:

PDF document, version 1.4

For:

python script.py 7379ab5047b143c0b6cfe5d8d79ad240b4b4f8cced55aa26f86d1d3d370c0d4c > output

file -b output

you should get

GPG symmetrically encrypted data (CAST5 cipher)

3 Merging multiple transactions into one file:

Download http://gateway.glop.me/ipfs/QmafUK8hYKztKD3hNNzF4EsW3N5nUcNvHZ4auEidjLkqJd/jean2.py

and http://gateway.glop.me/ipfs/QmY7D4bgMtq3Ysuso94ATdJgLx5YEFSgT3NTJLCeknU4cf/tx_list.txt

If you 'follow the change' as we did above you will arrive at the 130 transactions (which are also printed out in the first message). Take all these transactions and save them into text file called tx_list.txt.

Then do,

python jean2.py tx_list.txt > cables.zip

you will get a zipfile with the cables.

Read more here: http://8ch.net/tech/res/679042.html

Python3 version: https://www.reddit.com/r/Bitcoin/comments/5dqufl/blockchain_experts_the_world_needs_your_help_the/da7mf7b/

C version: http://gateway.glop.me/ipfs/QmRWjFfGzhtxMLdrHXeCAPFvqyrQPRebpEzpNANfhfTMxA/block-reader.c

/* A simple Blockchain .dat file reader.

Dumps the fields from a local Blockchain file.

To use:

gcc block-reader.c -o block-reader

./block-reader ~/.bitcoin/blocks/blkXXXXX.dat

Remove the usleep() calls to make it dump faster, but it's

not worth it because the program will spit it out way

too much information. The next version will actually

do something with the information, but for now this is

a good starting point. */

[–]unsubstantiateduser 2ポイント3ポイント  (2子コメント)

Is there any way to do this safely on TAILS?

[–]438498967 1ポイント2ポイント  (1子コメント)

You should be able to run these on Tails OS. Please let me know if you have trouble with them.

[–]unsubstantiateduser 1ポイント2ポイント  (0子コメント)

Sorry to be a bother, is there anyway to be sure these downloads are safe? They're not even https. I really wanna help out, just trying to stay safe.

[–]INVISIBLEAVENGER 2ポイント3ポイント  (0子コメント)

I R apparently dumb AF, fam.

I will try to re-read and absorb this until I understand it, though.

You sound like you're way way way up on coding and crypt-analysis.

I appoint you project manager/lead info-disperser.

[–]eyeh8 13ポイント14ポイント  (2子コメント)

Do you have a quick ELI5 for bitcoin? At least how it incorporates with WL & JA? Mostly wanted to know;

  1. How to tell where the bitcoin payment came from?

  2. How to tell who the payment is meant for?

  3. How to name a transaction? (ex. Were Fine 8chan Post Fake)

[–]y4my4m 9ポイント10ポイント  (0子コメント)

That's the magic about bitcoin, you don't know who's the sender or recipient (unless they've stated their wallet's address publicly).

Here is Wikileaks wallet address: https://blockchain.info/address/1HB5XMLmzFVj8ALj6mfBsbifRoD4miY36v

I've made a tutorial just now about how to decrypt the messages in the hashes.

[–]carpetjuice 5ポイント6ポイント  (0子コメント)

  1. ALL bitcoin transactions are recorded in a public ledger. Forever. That's what a 'block-chain' is. You can browse it online here: http://blockchain.info
  2. That's why the bitcoin was invented. You cannot. No relation between an address or a person.
  3. That's a vanity address. Here's a tool: https://en.bitcoin.it/wiki/Vanitygen

[–]MultiMediaWill 6ポイント7ポイント  (2子コメント)

ELI5 what this means? Are you suggesting the key to the dead man switch files are already released?

[–]Luanne_Lucky 6ポイント7ポイント  (4子コメント)

 

b0007ba4685e0b4d2b670fe78b12b14630545109ae006d6fb8e671833dea86cd

2016-10-15 01:14:29

19DESKUUw1YxnunynJXnAQCSe9MXGatTe2

1AV7h5m6dXXmwnNxSxY7AWtkf5YcWFNdqt

1P2KUPkd2mstU9yEwYKQ4mJz8EmL3XjyqQ

14DP7RgjMjW96GzFBqkw6b8ebYC7PRBzvx

1WhK9nA2K1z9rEAJL4oPje3fSRvt1KERE

This one from the paste in looks weird to me. Desk, p2k, and KERE, but maybe here? I'm glancing it all over so I could be wrong, sorry for mobile formatting.

[–]LovingJudas -1ポイント0ポイント  (2子コメント)

KERE might be Kerry?

[–]Luanne_Lucky 1ポイント2ポイント  (1子コメント)

Might be. I figured P2K might be the WPA P2K encryption but what would Wi-Fi have to do with it?

Bah

[–]jmw74 -1ポイント0ポイント  (0子コメント)

Looks like nothing to me. If you generate bitcoin addresses you'll find many of them have what appear to be words or fragments in them. Here you have two that do and three that don't. That's about average. It's just random noise.

[–]dpa 6ポイント7ポイント  (0子コメント)

hey guys, there is a way to store arbitrary data on the blockchain, see: https://en.bitcoin.it/wiki/OP_RETURN

There are several sites which leverage the OP_RETURN value, one of which i was browsing: https://eternitywall.it/

The interesting thing is that most messages people send are garbage, but on october 28th, there was a series of messages which look to be part of one large hash: http://imgur.com/a/i0AqD

I havent done further research on this, but i think if you are looking for hidden messages in the block chain, the OP_RETURN field is most likely where you would find it

[–]px403 8ポイント9ポイント  (1子コメント)

tl;dr: nothing to see here

I'm doubtful of the significance of the other ones, but that Embassy transaction looks really interesting. It's associated with an old site called "Bitcoin 100" which set up bitcoin donations for charities, and the top one on their list is Wikileaks.

https://blockchain.info/tx/901736b274a8f41b3914365cb6b5c9cba6f81bd97e8fbc9e9837221635ea65cc

https://web.archive.org/web/20150703132845/http://bitcoin100.org/charities/

edit:

Digging a bit deeper, it looks like the address belongs to the Bitcoin Embassy, which is a bitcoin business outreach program in Montreal.

https://airbitz.co/biz/432/bitcoin-embassy-montreal/

For some reason, the bitcoinembassy's website doesn't seem to be accepting donations, though it looks like they've been getting them regularly since 2013.

http://bitcoinembassy.ca/about-us/

Also, protip, if you want to find messages in the bitcoin blockchain, use bitcoinstrings.com : https://bitcoinstrings.com/. It's really good at pulling out messages that get jammed in there.

[–]Cpt9captain 3ポイント4ポイント  (0子コメント)

That embassy thing is really fishy but so far nothing sticks.

Thanks for digging, Godspeed.

[–]fuckyou9292 2ポイント3ポイント  (1子コメント)

I wish I had time to dig into this. Pretty sure this is where the DMS would be.

You can hide a lot of stuff in the blockchain. Messages, images, etc. It's just a matter of where??!

http://www.righto.com/2014/02/ascii-bernanke-wikileaks-photographs.html

[–]brexitshmexit 3ポイント4ポイント  (0子コメント)

here's a quick ruby script & current tx and hashes in csv for people who want to dig. i guess the more ppl read it the better, everyone focuses on different things...

http://wikileaks-bchain.rhcloud.com/

[–]BlueberryMangoWeed 1ポイント2ポイント  (0子コメント)

Is it still possible to download the original file dump? Or anyone has a copy? Because if they were compromised, I guess torrent files no longer authentic.

Edit: word

[–]unsubstantiateduser 0ポイント1ポイント  (0子コメント)

Question: How might we know if we've come across a key? Sorting through all these blockchain hashes, how could we know if we're uncovering just more randomly generated data, or the keys to the insurance files? Do we know how many bits they'lll be at least? Also, if it's possible to create "vanity addresses", like the "Were OK" shit, is it possible that the keys might be in plain sight in some of those addresses?

[–]TFC4104 1ポイント2ポイント  (0子コメント)

Follow the money.

[–]Rock_Julio 1ポイント2ポイント  (0子コメント)

I know everyone's eager to know what's in the DMS package but to me this is at best simply confirmation that when the DMS package is released, we should look to the blockchain for info-- not that it's already been released and can be found in the blockchain history.

[–]damiana9 0ポイント1ポイント  (2子コメント)

13LBgLZ24X55mr8LqKddy9DusJtba17NCC the recent big TX's that WL is sending is going to this addy. im wondering if theres something here... some things i noticed that but could be nothing or something or me overthinking completely are: 13LBgLZ24X55mr8LqKddy9DusJtba17NCC TBA? TBA17? 24x55... (if you google that you get a bunch of results for Tape and locks) or maybe its muliplication... MR, MR8? LqK=leak maybe? DusJ- us dept of justice?

just throwing ideas out here.. maybe these arent what meets the eye and we need to decipher the meanings of the letters and numbers

[–]FJHUAI 12ポイント13ポイント  (1子コメント)

I think you might be reading too much into that random generated bitcoin address.

Vanity addresses start with words but don't have words contained in them.

Like helloworldhahfnedjcufjejsndj55tnfn is a vanity address

But not djvjsmfndkshelloworldnfjdhdjd

[–]damiana9 1ポイント2ポイント  (0子コメント)

thanks for the info! i didn't know that. i figured i was reading too much into it.

[–]siem 2ポイント3ポイント  (0子コメント)

Maybe the Wikileaks Twitter account is not compromised, but they are using the fake key in order to point to something in the blockchain. I cannot verify this now, but perhaps someone else does?

[–]Frfr111 0ポイント1ポイント  (0子コメント)

I really wish I was technologically smart 💔 all these terms just go over my head lol

[–]jmw74 1ポイント2ポイント  (0子コメント)

Um, guys, as a bitcoin enthusiast I can tell you that most of the transactions listed in that pastebin are completely ordinary.

I mean, the letters "Mi5" or "Jew" appearing in a bitcoin address do not mean anything. 3-letter words appear in bitcoin addresses very frequently. See for yourself:

http://bitaddress.org/

That generates bitcoin addresses. Keep clicking "generate" and you'll see a fair number of them contain small words. Maybe 5% of them or so. There are tons of them in the blockchain and nearly all of them are completely coincidental.

In order to have any degree of confidence that it's not random, you'd have to have some kind of meaningful message, and a 3-letter word is just not enough.

[–]KinOfMany -2ポイント-1ポイント  (3子コメント)

This block chain is from 7 months ago. And these are completely random.

It's very reasonable that this was generated 7 months ago by sheer randomness considering how many of these transactions there are.

[–]PM-ME-YOUR-SEXTAPE -2ポイント-1ポイント  (2子コメント)

Fuck off jitr

[–]KinOfMany 0ポイント1ポイント  (1子コメント)

Just occam's razor.

This is from 7 months ago, even if they somehow managed to change the bitcoin hash, it could be referring to anything. A lot has changed in 7 months.

He was very much alive and kicking, doing interviews and everything.

Unless they somehow expected him to disappear + know 8ch would talk about it. 7 months in advance.

[–]PM-ME-YOUR-SEXTAPE -1ポイント0ポイント  (0子コメント)

U bitch I work in bitcoin this shit doesn't change, ever, fuck off. Go suck a dick