Skip to comments.
Julian Assange death scare! ‘Dead man’s switch’ triggered after internet was intentionally severed
Bizpack Review ^
| October 17, 2016
| Michael Dorstewitz
Posted on 10/17/2016 8:22:14 AM PDT by Cheerio
click here to read article
Navigation: use the links below to view more comments.
first previous 1-20, 21-40, 41-47 last
To: Thumper1960
Best election, EVA! It’s like a James Bond thriller.
Go Julian, GO!
41
posted on
10/17/2016 9:33:21 AM PDT
by
poconopundit
(When the people shall become so corrupted as to need despotic government. Franklin, Const. Conv.)
To: sheikdetailfeather
“I have been monitoring Binsacks site overnight and people were asking him if Assange is dead. He did not answer right away. This morning he put the news out on twitter and facebook.”
Short of a live video from Julian Assange Showing Stating his situation then you can not trust any comments coming from any source. Even including wiki leaks itself.
42
posted on
10/17/2016 9:50:21 AM PDT
by
Revel
To: Liz
It seems the Clinton/Soros/MuslimBH Cabal is still building steam on retaliation and spew.
43
posted on
10/17/2016 10:40:45 AM PDT
by
KC Burke
(Consider all of my posts as first drafts. (Apologies to L. Niven))
To: KC Burke
The Clintons will do anything...suck-up to anything....to retain power.
44
posted on
10/17/2016 11:12:39 AM PDT
by
Liz
(SAFE PLACE? A liberal's mind. Nothing's there. Nothing penetrates it.)
To: Pearls Before Swine
A hash would only validate one document. A hash that authenticate two documents would represent a collision. Not likely at all for a 256-bit hash. I suspect it is a hash to either authenticate a future message, or is a key to unlock an archive.
45
posted on
10/17/2016 2:51:59 PM PDT
by
zeugma
(Welcome to the "interesting times" you were warned about.)
To: InterceptPoint
You can do some really nifty things with a hash. I've used them as a key to encrypt a specific volume. It works like this: you have a document you want to encrypt with a symmetric cypher like AES or 3DES. You want to have a really strong password for it, but dont have to remember the long string of characters of the password itself. So you get the hash of a phrase. For example, you take a sha512 hash of the phrase 'I was born in texas.' This produces a string of gibberish that will be impossible to guess using all the computing power that exists on the planet untilnthe heat death of the universe. Howver, and this is important ... you don't have to remember the huge strig of characters. Instead, when you need the key, you just generatenthe hash ofnthe phrase, remembering not to capitalize the state name (grin). You now have the pass, and can decrypt the file. There are many, many variations of the same thing that you can use. For example, there are many mathematical oddities out there that follow a special form. Mersene numbers are a good example.
Let's say that Alice had an encrypted file of Bobs. She doesnt know the password. So Bob sends Alice a messagenwith a subjectmline of '412'. Well 412 could mean anything. However, in this case, Alice knowa that Bob means that he is really talkimg about the number represented by 2^412-1. Thw password could either be the number itself, or an agreed upon hash of same. The hash is actually better because it is always the same number of characters, whereas the mersene number (look it up) of 412 is 125 digits long and these Mersene number for 912 would be 2748 digits.
The key here, if you'll pardon the pun is that the two parties have to agree on the form to be used ahead of time in order for it to work. Unfortunately, a system like this is very much succeptable to being beaten out of you with rubber hoses. That is a big drawback, but there are an infinite number of ways to make dead drops on the internet. If people are even somewhat creatice, it doesnt take much to come up with a system like this.
46
posted on
10/17/2016 3:21:33 PM PDT
by
zeugma
(Welcome to the "interesting times" you were warned about.)
To: Revel
Thanks for the good advice. Just to clarify though, I did not intend to say Binsack said he was dead.
47
posted on
10/17/2016 3:39:10 PM PDT
by
sheikdetailfeather
(Trump is exposing the fifth column in the U.S.)
Navigation: use the links below to view more comments.
first previous 1-20, 21-40, 41-47 last
Disclaimer:
Opinions posted on Free Republic are those of the individual
posters and do not necessarily represent the opinion of Free Republic or its
management. All materials posted herein are protected by copyright law and the
exemption for fair use of copyrighted works.
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson