Yet.
Are you volunteering?
Yet.
So if he doesn't get killed by someone wanting the file to be released, you're right (but not yet), and if he does get killed, it was probably by someone wanting the file to be released (according to you), and you're right. Unbeatable.
Sorry, it's blackmail. And he hasn't realized it yet, but this is the sort that creates a REASON to kill him; Some people really want to know what that has in it. And they are not nice people.
Some fun facts about the file:
$ openssl enc -d -aes256 -in insurance.aes256 > out.dec
use ONION as password.
$ openssl enc -d -bf -in insurance.aes256 > out.dec
use ROUTER as password
ONION also works as password for blowfish. However, the result seems to be encrypted again. Got that from a quick peek here and here (links snipped, sorry).
I imagine it to be the entire collection of cables...
Peeking a bit further at your second link shows that these are NOT actual passwords for the file, only random words for which the encryption algorithms don't report errors. This will happen in average for one out of 256 incorrect passwords.
Yeah, real mature guy there. Of course, he's on a holy crusade! CRUSADERS, GO!
Most likely.
Because information should be free, man. No matter if it's legal, free ma*SHOT*
Sorry, I let my dumbself get access to the computer. But it's heavily the principle that secrets are bad, and a tangential belief that democracies should be crystal clear. Which uh.. is kinda good in ideal, but bad in practice. Whether or not there are too much secrets, this is *not* the way to go about fixing it.
You realize that the Text of the Bible is about 4.22 Megabytes in size and 1.4 Gigabytes of text* is about "280 Bibles" ... [if the insurance file is nothing but textfiles]
Compressed the size of the Bible is less than 1 Megabyte - so 1.4 GB of compressed text* is the size of more than 1400 Bibles. [if the insurance file contains nothing but compressed text files]
Somehow i have problems to follow your line of thought. Maybe you can explain that a bit further?
The only people who could be concerned are probably the ones that already know what could be in there. The threat of killing someone because of blackmail only works if that someone is the only one who has the information that poses a "threat". Then, by killing that person, you eliminate the threat.
However, this is not what we have here. That file is out in the public for quite a long time. You can be pretty sure that there are already some people who have the full passwords/decrypt-method for that file, given to them by Assange. So if anything happens to him, they could publish that information in turn.
Of course that assumes that there really is something useful in that file, and that it not just a huge collection of lolcat pictures.
Calling it blackmail is borderline. He is not going around saying "i want x from you, and if i don't get it, i will publish y". For me, blackmail goes hand in hand with extortion, and there is no sign of any attempt at extortion here. Does he want millions of dollars? Private jets? No. He just wants to be left unharmed.
I guess that an US ambassador telling Switzerland to think twice about granting Assange any kind of shelter does not count as an attempt at blackmail, now does it? Sorry that i have the article in German only, here it is.
Greetings,
Chris
I believe he was saying that there might be people who would be willing to kill Assange (like enemies of the US, for example) in order to find out what is on the file.
I believe he was saying that there might be people who would be willing to kill Assange (like enemies of the US, for example) in order to find out what is on the file.
Correct.
Yes, this is true, for standard text files. I'm guessing there would be a range of files in there, pdf...doc.. there could even be videos in there [Pure speculation,of course] The size of the cable collection alone was 1.6gb according to the Guardian;
"The 1.6 gigabytes of text files on the memory stick ran to millions of words: the contents of more than 250,000 leaked state department cables, sent from, or to, US embassies around the world."
http://www.guardian.co.uk/world/2010/nov/28/how-us-embassy-cables-leaked
What do you mean, "again"?
No, a life insurance policy.
You know, with all the grandstanding of the US government that Wikileaks' publications are damaging and threatening lives, can you cite one reason why Wikileaks wouldn't publish the unredacted documents? I mean, when you hear the USG, the damage has already been done anyhow.However, they've failed to yet identify a single person whose life would be threatened by the publications.
Personally, when confronted with such hypocrisy, I would be very much tempted to do just that.
IIRC, the number of people with access to documents classified as "secret" is 3 million.
I see. You also fail to identify a single person whose life has been endangered by Wikileaks' publications. Which proves my point.
In an interview with Channel 4 News, Zabihullah Mujahid, a Taliban spokesman, said they were studying and investigating the report, adding “If they are US spies, then we know how to punish them.”
http://www.telegraph.co.uk/news/wor...hanistan-Taliban-hunting-down-informants.html
That is a clear example of people lives who are now threatened due to the release, who in most cases wanted to help security in their own country. Thanks wikileaks!
Wouldn't you say, that anybody who had been an informant now has their life in greater danger than before? Would future informants be less willing to produce information which could save lives, knowing that a future leak could identify them?
Conversely, what individuals have been now indicted on corruption charges from the release of the leaks? Any warcrimes charges brought up to anybody?
Clearly there is harm done from the release, and I'm not seeing any benefit from the "increased transparency" of these documents out in public.
Life insurance policy, good way of putting "I've stolen your wallet and I have a gun. If you don't let me leave with your wallet, I will shoot you."
And going by your numbers - if 3 million have access to this, don't you think that is already putting the knowledge out broadly enough for transparency without putting it in the hands of those who would use the knowledge for nefarious purposes? Considering how few of the documents released are labled to keep them from the eyes of foreign governments, they've been seen by millions of people, thousands? of them from other countries.
What's next, should all the witness protection program records be released to the public? For a lot of the informants from the Afghanistan and Iraqi wars, that's what these documents and the protection of them amounts to.
How about extracting the informants now, giving them shelter in the US and protect them, and put fresh ones in place? Or are they not that valuable after all?
At least there is the benefit that they now know that they are doing a extremely lousy job of keeping their oh-so-important information to themselves. Which is something they always told us: that they can keep information safe. And that we should trust them, because, well, they can keep all the data they want to have safe.
You asked for an example of those endangered by the release. I provided an example of a group of people threatened directly by the organizations out to kill them.
I'm still waiting for an equivalent example (and I'll try and not move goalposts if you give one) of the benefits of these releases.
3 million people with access and *one* significant leak? I'd say that's a pretty good job.