Rise up hustlers, wikileaks password cracking time

>findagrave.com/memorial/7579974/william-ryland-jeter
archive.fo/AfPrm

You're seeing double, so see an optician.
W. R. JETER

Need to know vics make, model, and approx year if you can.

ITT: Feds try to trick user into helping crack some unrelated person's password by utilizing the resourcefulness of this particular group

There is no reason why Assange would have used anything less than random characters with the maximum allowable length under AES256 (32 chars.) That is of course, IF he really used AES256. AES256 is how the insurance files are labeled, but other algos such as Twofish would have allowed a 64-byte (512 bit) key. In theory, AES256 is plenty secure in its own right, but the object is not to crack it if you're the government. Granted, they likely have attempted it, but I think the whole object for them has been to prevent the release of the keys.

The fact the keys have not been released yet indicates one of two things. Either, A.) Assange's instructions to his allies were to release the keys only in the event of his death or B.) A TAO was convened in order to assess which individuals possessed the keys and erase them surreptitiously from their drives along with any backups. If B., then the mission must have been successful since of course we haven't seen the keys.

If you're the government, yes, it would be nice to know what is and isn't in the insurance files, but it the main objective. Another possibility is that the insurance files are not real and he never had any secrets beyond the cables he already published.

It isn't the main objective*

akshually

If the keys are something easy to remember or broadcast or publicize to the media it would be so much more effective than if they're just random characters

Of course if Assange is going down anyway he might as well drop the bomb

Could it be the three numbers on assanges head?

66
6

Or the length of his penis
One_inch

Password is - smear_shit_on_walls