Jump to content

Recommended Posts

Posted
Interesting discussion over at Slashdot...

 

Slashdot Ask Slashdot Story | How Did Wikileaks Do It?

 

Makes you wonder, if a voluntary organisation like that can pool the resources to brute force military encryption, what the governments have probably been able to do for a long while...

 

Thanks to those who donate $cpu

 

Twitter / WikiLeaks: Finally cracked the encryp ...

 

 

Shocking video, usually gets one column in the newspapers, even when journos get shot.

 

"Pickup the gun."

Posted

Other projects have used volunteer CPU time but never something of this calibre nor potentially something they can get in trouble for, I don't think the US will take this lightly... they have serious beef with wikileaks as it is, they will make/find a scapegoat.

 

Good on wikileaks, terrible video - needed to be shown to the world. I would love to see what happened in the friendly fire cases based on the content of this.

Posted
if a voluntary organisation like that can pool the resources to brute force military encryption

 

The first time Julian Assange (the key wikileaks bloke) came to my attention it was on crypto lists way back and he was touting a relatively novel idea for back then called Plausibly Deniable Encryption... it could all be one big anonymity protecting smokescreen, but if not then I'd assume the encryption was conventional i.e. not some top-secret special "military" stuff.

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now



  • 158 What is your preferred operating system (PC)

    1. 1. Operating systems:


      • MacOS
      • Windows 10
      • Windows 11
      • Windows Vista
      • ChromeOS
      • Other (reply)

×
×
  • Create New...