frizla

As for Rule41 it'll probably just put you on a list of VPN/Tor users. They can't hack everyone who uses it, because almost every bussines firm uses a VPN. Tor on the other hand, well, Tor network is painted as a criminal dark net, but still they can't just go into peoples computers because they use Tor, are they that bored?

Milksteak3

Probably. Theyre already doing it

pitenius

Wikileaks is compromised. You could tell from the hashes. That's why they're there.

superpewpew

Explain it like I'm 5.

pitenius

A hash function takes a computer file and generates a "fingerprint" for it, in the form of a number. Every file should have a unique fingerprint. Change the file and the fingerprint changes. You can publicly state the hash of a file and other people can use the same hash-generating-program to check. This way we can check that we are both talking about the same file.

Around Nov. 14, the Wikileaks insurance files started returning different hashes than the ones which had been publicized. The simplest explanation is that someone edited the files.

superpewpew

Any chance they would have just been different files meant to be additional insurance files?

pitenius

Why would this be?

Here's the analogy: I give you a copy of The Anarchists Cookbook . I tell you the hash is FACEB00C. You take the book and generate your own hash, which is BA5EBA11. What's your conclusion? That I lied about what book I gave you, or that I gave you a copy of *The Complete Calvin and Hobbes" because it's also a good book?

If something is fucky with the hashes, something is fucky. I don't care about their reasons. You're dealing with a liar or an incompetent. Walk away.

Milksteak3

How did they know to release hashes

pitenius

Standard security procedure. I take it you don't check hashes when you install new software. Would you like to download stuff from my site?

Milksteak3

Sure.

RedditCensorshipOP

yep. this.