Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Julian Assange death scare! ‘Dead man’s switch’ triggered after internet was intentionally severed
Bizpack Review ^ | October 17, 2016 | Michael Dorstewitz

Posted on 10/17/2016 8:22:14 AM PDT by Cheerio

click here to read article


Navigation: use the links below to view more comments.
first previous 1-2021-4041-47 last
To: Thumper1960

Best election, EVA! It’s like a James Bond thriller.

Go Julian, GO!


41 posted on 10/17/2016 9:33:21 AM PDT by poconopundit (When the people shall become so corrupted as to need despotic government. Franklin, Const. Conv.)
[ Post Reply | Private Reply | To 34 | View Replies]

To: sheikdetailfeather

“I have been monitoring Binsacks site overnight and people were asking him if Assange is dead. He did not answer right away. This morning he put the news out on twitter and facebook.”

Short of a live video from Julian Assange Showing Stating his situation then you can not trust any comments coming from any source. Even including wiki leaks itself.


42 posted on 10/17/2016 9:50:21 AM PDT by Revel
[ Post Reply | Private Reply | To 24 | View Replies]

To: Liz

It seems the Clinton/Soros/MuslimBH Cabal is still building steam on retaliation and spew.


43 posted on 10/17/2016 10:40:45 AM PDT by KC Burke (Consider all of my posts as first drafts. (Apologies to L. Niven))
[ Post Reply | Private Reply | To 39 | View Replies]

To: KC Burke

The Clintons will do anything...suck-up to anything....to retain power.


44 posted on 10/17/2016 11:12:39 AM PDT by Liz (SAFE PLACE? A liberal's mind. Nothing's there. Nothing penetrates it.)
[ Post Reply | Private Reply | To 43 | View Replies]

To: Pearls Before Swine

A hash would only validate one document. A hash that authenticate two documents would represent a collision. Not likely at all for a 256-bit hash. I suspect it is a hash to either authenticate a future message, or is a key to unlock an archive.


45 posted on 10/17/2016 2:51:59 PM PDT by zeugma (Welcome to the "interesting times" you were warned about.)
[ Post Reply | Private Reply | To 10 | View Replies]

To: InterceptPoint
You can do some really nifty things with a hash. I've used them as a key to encrypt a specific volume. It works like this: you have a document you want to encrypt with a symmetric cypher like AES or 3DES. You want to have a really strong password for it, but dont have to remember the long string of characters of the password itself. So you get the hash of a phrase. For example, you take a sha512 hash of the phrase 'I was born in texas.' This produces a string of gibberish that will be impossible to guess using all the computing power that exists on the planet untilnthe heat death of the universe. Howver, and this is important ... you don't have to remember the huge strig of characters. Instead, when you need the key, you just generatenthe hash ofnthe phrase, remembering not to capitalize the state name (grin). You now have the pass, and can decrypt the file. There are many, many variations of the same thing that you can use. For example, there are many mathematical oddities out there that follow a special form. Mersene numbers are a good example.

Let's say that Alice had an encrypted file of Bobs. She doesnt know the password. So Bob sends Alice a messagenwith a subjectmline of '412'. Well 412 could mean anything. However, in this case, Alice knowa that Bob means that he is really talkimg about the number represented by 2^412-1. Thw password could either be the number itself, or an agreed upon hash of same. The hash is actually better because it is always the same number of characters, whereas the mersene number (look it up) of 412 is 125 digits long and these Mersene number for 912 would be 2748 digits.

The key here, if you'll pardon the pun is that the two parties have to agree on the form to be used ahead of time in order for it to work. Unfortunately, a system like this is very much succeptable to being beaten out of you with rubber hoses. That is a big drawback, but there are an infinite number of ways to make dead drops on the internet. If people are even somewhat creatice, it doesnt take much to come up with a system like this.

46 posted on 10/17/2016 3:21:33 PM PDT by zeugma (Welcome to the "interesting times" you were warned about.)
[ Post Reply | Private Reply | To 13 | View Replies]

To: Revel

Thanks for the good advice. Just to clarify though, I did not intend to say Binsack said he was dead.


47 posted on 10/17/2016 3:39:10 PM PDT by sheikdetailfeather (Trump is exposing the fifth column in the U.S.)
[ Post Reply | Private Reply | To 42 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-47 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson