Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: DiogenesLamp; srmanuel
May interest:

https://github.com/robertdavidgraham/blxtract

blxtract Read Me

Mike Lindell is a rich American businessman who claims he has "absolute proof" the Nov 2020 election was hacked -- proof in the form of "pcaps" on the days around the election from all over the U.S. On August 10 2021 he held a "cyber-symposium" where he invited "cyber-experts" to review the pcaps.

He didn't provide pcaps. Instead, he provided almost 300 gigabytes of .bin files in a format known as "BLX" created by a guy named Dennis Montgomery.

The data included the source for a program called CExtractor that would extract data from that file format. But, this code is written in a deliberately obfuscatory manner that is very hard to read.

This project rewrites that code in a simpler manner that programmers can read. I'm in the process of removing or changing things so that it continues to produce the identical output, but in a more readable way.

The original 300 gigabytes of data is available at this BitTorrent magnet link:

magnet:?xt=urn:btih:39a9590de21e77687fdf7eacee4dd743f2683d72&dn=cyber-symposium&tr=udp://9.rarbg.me:2780/announce

The code is in Microsoft's C++/CLR language.

Specification

The extract program works like the following.

The data has been encoded with ROT3, meaning they've been rotated 3 positions to the left, meaning the number 3 has been subtracted from each character.

The data we are able to extract accounts for less than 1% of size of the files we have, like rnx-000001.bin. The remainder of the files consist of either random junk data or encrypted records that we cannot extract without the key.

The code does 4 passes over the file looking for records embedded in the file. Each pass starts at the beginning of the file proceeding to the end.

A pass looks for a start-of-record pattern, a different pass for each pattern. The list of start-of-record delimiters are:

  • "xT1y22"
  • "tx16!!"
  • "eTreppid1!"
  • "shaitan123"

Note that these are the plain-text patterns. When scanning the file for the pattern, you must either rotate-left each incoming byte, or rotate-right the bytes of the patterns. In other words, the actual start-of-record patterns in the raw file look like:

  • "{W4|55"
  • "w{49$$"
  • "hWuhsslg4$"
  • "vkdlwdq456"

When a delimiter is found, it then reads the next 1024 bytes of the file that follow the start-of-record.

ROT3 (subtract 3 from each byte) is then applied to all 1024 bytes, meaning, the value 3 is subtracted from all the bytes.

It then looks for an end-of-record delimiter of ".dev@7964" and truncates the record at that point (removing the end delimiter and everything after). This is the plain-text delimiter that matches after ROT3 conversion of the data.

The remaining record is then written to the output. Each record is written with an additional CRLF ("\r\n") at the end of the line.

It would be 4 times faster to do a single pass searching for all 4 delimiters at once, instead of 4 separate passes. However, this would produce data in a different order.

YCombinator comment by Robert Graham:

The ~20 cyberexperts in attendance were invited due to their support of Republican causes. The two independnets were myself, invited through Lead Stories (a fact-checking firm) and Harri Hursti, invited through CNN. Lindell was so certain of himself that he invited his fact-checking adversaries CNN and LeadStories to come see for themselves.

Lindell didn't give us pcaps. I think he honestly believed he had them. It's just that he's non-technical, and has no ability to judge whether somebody is technical enough to judge whether he has pcaps.


83 posted on 03/13/2024 1:16:08 PM PDT by linMcHlp
[ Post Reply | Private Reply | To 80 | View Replies ]


To: linMcHlp

Actual Pcap files are readable by any number of software tools out there, I’ve only used Wireshark, I know of others but have never personally used them.

On the legality of the situation, if you offer 5 million dollars in a challenge to computer experts to prove you wrong and state here is the file to use and the file given is not a Pcap file and is garbage, then Lindell has likely committed fraud and eventually will be forced to pay the money.

Lindell was duped by a con artist and did not do his due diligence, he should have hired real computer experts to look at the data and given him an honest answer, instead he wanted to believe so badly he went forward with bad information and now is so far into a bad situation he can’t back down.


84 posted on 03/13/2024 1:32:11 PM PDT by srmanuel ( )
[ Post Reply | Private Reply | To 83 | View Replies ]

To: linMcHlp
He didn't provide pcaps. Instead, he provided almost 300 gigabytes of .bin files in a format known as "BLX" created by a guy named Dennis Montgomery.

If you stripped all the header information off of it, (which by the way is how it comes into a Windows application in my experience) what would it look like other than a collection of bytes?

And how does he know it was "created" by Dennis Montgomery? Did someone confess?

The data has been encoded with ROT3, meaning they've been rotated 3 positions to the left, meaning the number 3 has been subtracted from each character.

This is incorrect. Rotating a number 3 places to the left does not subtract 3, it multiplies the number by 8.

rotate-left-three times. 00000001 <<< becomes 00001000. A 1 becomes an 8.

That statement above mine makes no sense. I couldn't even find a reference to "Rot3" in a search. It came back "Rot13". I thought it must have been a typo, and instead he meant "Rot13", but then you read what it actually says, and he says he's rotating 3 positions to the left, not 13.

The remainder of the files consist of either random junk data or encrypted records that we cannot extract without the key.

Encrypted or not, if you didn't understand how an application was using the data, you wouldn't be able to make any sense of it.

Anyone else out there that has written applications using data transfers through networks?

86 posted on 03/13/2024 2:53:36 PM PDT by DiogenesLamp ("of parents owing allegiance to no other sovereignty.")
[ Post Reply | Private Reply | To 83 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson