No I really really want someone to try this on a throwaway computer. I don't have the expertise nor the spare computer to try it.
There is a slight chance this is real. The first two hashes in the hash file are checksum hashes to verify a file's authenticity. These were tweeted out to Wikileaks by User @TuringThe2nd on October 17th & 18th according to this page.
Nope, tried to download veracrypt and it contained a virus. If someone wants to download it and run it on a throwaway computer maybe it has the insurance files built in. But far far far more likely, this is the work is an adolescent LARPER with a worm to spread.
NerdyNoodle ago
But there is no reason someone can't get the WL torrents and then try the keys in the key file.
I am not enough of an expert to attempt this myself.
In fact it is all just mumbo jumbo to me.
NerdyNoodle ago
No I really really want someone to try this on a throwaway computer. I don't have the expertise nor the spare computer to try it.
There is a slight chance this is real. The first two hashes in the hash file are checksum hashes to verify a file's authenticity. These were tweeted out to Wikileaks by User @TuringThe2nd on October 17th & 18th according to this page.
http://archive.is/MaPga
NerdyNoodle ago
Nope, tried to download veracrypt and it contained a virus. If someone wants to download it and run it on a throwaway computer maybe it has the insurance files built in. But far far far more likely, this is the work is an adolescent LARPER with a worm to spread.
Annon365 ago
I smell BS