wethepizza_the2ndGuy | 328 points
Here is the encrypted client list for We The Pizza! Need help decrypting it
Backstory, I stole 2GB of highly sensitive pedo data from a pizza restaurant called "We Are Pizza" with the help of a friend from a 3 letter agency (they took their website down 2 hours after my friend who is MIA action made his first post). The place is HIGHLY suspect, please go down the rabbit hole. Anyway, my friend posted as evidence because no one believed him, about 10 photos I stole from the place of children being brutally raped. Reddit deleted the photos.
More importantly, I stole their software they use for keeping track of their clients, it is a pretty shitty piece of software and I think it phones home to a website to do the actually encryption LMFAO, but I have no experience with PGP and here this week's list of people who are going to be raping and murdering children. Here is the message:
-----BEGIN PGP MESSAGE-----
Version: OpenPGP.js v.1.20140106
Comment: http://openpgpjs.org
wYwDBEs+Sjb8WNoBA/0Yo2kIjHZ+OufZZzXGzZNnFoUl/aYiwnfdHv2fXAhj 6tbVUWUYgIUCvNEKySNpGLt385hJ5LpEL9UHsmbNKWlYHWpNc0e9lJJgebr3 6ZlLmqf/FUcTQlM7uU5HdadgbaX2OtOiFF3bxSc0rt04/1qCPgLf5k1UuSk+ wd94/L5DidLApgFLz9nImLvia+oTM5tYoQ4oW8yiTVB/RwoBZlRCGdQtBEVm D/jQn0Ike26L76IcmwdQakfLr0zETOthkpXizPgAvmx0Zko6Dduiwj0YrCZk OrnopmhVNvK374wv7WJoECNhReCaAFG6prCNbWuHFmC+pAP0fqbMhxn2sCE5 N9o4jHSI1JwycRJlDCZamuQSvkbsuyQGG8fz/YOEv4l24ZGgAsyoaORpOg7/ XlUotBUYsfeVJm+CeKO/RXl/X9xqLooQ/dopP9qXoTfeYxq5uOW0LI8LiQXf JapqTyMUwHSu4KyBMY1vtOqZZJTuULDmquSdgVyP5EttOXIRAd5ciQtCZDvF 300m7lBKsegZIQQ9w583BQ7QKK/cKVt+qReyIQXUl68FfaYecYa9Z8ObaB7S C1jRq2xzaMzrB2kaM43gAmSuYsavFGAXLwMj41wrZIetc3V82yyJ0dWGCjsQ /jWN98JHVMA= =Xy+W
-----END PGP MESSAGE-----
I have had no luck finding the private key, does anybody have anything powerful enough to brute force it?
nihilistigon | 41 points
You are posting an encrypted message without the private key??? Are you retarded? There is no such thing as brute forcing this. It would take 100 years. Do you have anything besides encrypted files. If not, everything you have is absolutely useless.
[deleted] | 63 points
I mean he has the videos of the children being brutally tortured, this was a customer list which would make sense to have a basic level of encryption like this. No need to call him retarded when he explicitly states that he has no experience with PGP.
According to their previous posts the usb drive with the information wasn't even obtained through hacking, which would explain their lack of PGP knowlege. Anyways just speculating, not sure why a post calling OP retarded gets tons of upvotes immediately. I honestly don't see what kind of motivation OP would have for making this stuff up, aside from some crazy honeypot effort which I don't think they'd go about in this way.
Lunnes | 43 points
He posted pics of CP, doesn't mean he obtained them from the pizza place.
Guy #1 said that he had seen the names and the price list, and now suddenly everything is encrypted ? That doesn't make any sense
[deleted] | 14 points
I know they could be from anywhere, just what would be the endgame to that? Anyways I'll be honest I have no clue where the fuck this is heading, they just made a new post https://www.reddit.com/r/pizzagate/comments/5e0njl/monthly_client_listexe_is_leaking_the_private_key/ which I have no idea what to make of lol, at this point I'm gonna just sit back and watch. Been following this pizza shit for a few weeks and it really starts getting to your head.
koolmagicguy | 21 points
The motive for getting unsuspecting Reddit users to dl CP would be locking up anyone involved with this forum, thereby shutting down any outside investigation and silencing anyone who dares challenge the political elites.
[deleted] | 6 points
There we go, this actually makes a lot of sense, solid point.
Lunnes | 7 points
Basically his whole encrypted message story doesn't make any sense. Read this : https://www.reddit.com/r/pizzagate/comments/5e0i3m/here_is_the_encrypted_client_list_for_we_the/da8per8/
nihilistigon | 15 points
Then he needs to post evidence of what he actually has. Blur out the children if he needs to, but for fuck's sake he needs to post some evidence before he gets killed or discredited.
[deleted] | 17 points
Blurring things out would be a good idea, probably the best way to spread the information. Then providing proof the pictures came from WeThePizza.
foreskinremovalcream | 1 points
Hash it as well perhaps. There's algorithms used for that to detect those pictures.
CaptnMeowMix | 10 points
I swear, it's like everyone's emotions have just been on high alert today. Everyone's been so damn quick to raise pitchforks and cry BS, that they throw their investigative logic and composure out the window instead of trying to propose alternate solutions.
Here's an idea, how about we ask OP what other possible connecting evidence he has instead of just shitting on this one bit that he admitted to not knowing about? Perhaps they took screenshots of the site's backend at least or something?
whatiswalnutsauce | 6 points
Maybe OP should provide evidence on the communications between him and the pizza place. Was OP smart enough to record their conversation on the phone?
RasputinButte | 2 points
Exactly, and have him explain what he meant by "social engineering". However, I think it was the other OP from the other thread associated with it that said that, but still, it's critical.
nihilistigon | 2 points
He has videos?
Really, and you know this how? Because he told you he did, or because he posted evidence?
CaptnMeowMix | 9 points
The guy posted actual cp images. Regardless of where he got them from, if he has that, are you really betting on him not having access to videos to go along with those? Please.
Either way, releasing more cp isn't going to help his case anyway, cause it's the connection to the pizza place that matters.
[deleted] | 4 points
I mean he did post evidence of the photos (because people kept crying for more proof) which were pretty quickly taken down by reddit. I didn't look at the photos.
SkullSoupBowl | 1 points
I read an inventory of what was posted. Nothing significant that could be tied to the pizza place logos, signs, etc. Just children being tortured in what appeared to be different residences.
newfoundland_urth | 32 points
If he is trying to discredit the entire sub, he is doing an excellent job.
MiniLurkette | 3 points
Hi,
Please don't jump on me, I have real questions and thought you might take the time to answer them. Right now, re: We the Pizza, I don't know what to think in light of actual child porn appearing and their site being down. It seems like either this is legit or a fucked up person is messing with everyone, right?
So I am wondering what kind of proof could someone provide that this came from the pizza website and not the darkweb? And also speculation on why pedophiles would put this directly on their front-facing business website? Wouldn't it make more sense to keep it as far away from public use as possible?
Not trying to discredit--really asking.
coulditbe223 | 9 points
The story so far is.... Blurred.
Originally the first guy claimed they hacked it from the website. However, guy #2 says that was disinformation to throw people off, and claims that his friend in a three letter agency has helped him to walk into the pizza joint and copy a harddrive containing the images/videos and a client list (apparently).
The reason this is gaining ANY traction at all is becuase the website for wethepizza went down literally 20-40 minutes after the first guy's post. Almost as if it were a reaction to said post...But that remains to be confirmed.
The real issue here is like you said, proof of the correlation between the images/videos and the pizza place where they supposedly lifted it from. How they will provide that information remains to be said
If you'd like to read some of the things I'm talking about I suggest visiting these:
https://www.reddit.com/r/pizzagate/comments/5dzwji/hi_i_am_the_guy_guy_2_that_hacked_wethepizzacom/
http://boards.4chan.org/pol/thread/99483242 (4chan thread about this topic, can be...hard to read becuase of all the dumbass trolls on 4chan, check this last if you are bored)
I reccomend visiting this thread: People laid it out here pretty good (as the situation was developing, this thread was made about the first guy, and might still have a link to the original guy's thread)
https://www.reddit.com/r/pizzagate/comments/5dzgif/about_the_2_gb_cp_hacker_i_dont_know_who_to/
At this point: Without a way to confirm whatever was encrypted, we have exactly zero confirmed evidence of the pizza place being implicated with the original pictures that the first guy uploaded, or the supposed other files that (might) exist.
I cannot confirm whether the first images were actually CP, but from what other comments have said in various threads.....To put it lightly...It was brutal torture and rape.
MiniLurkette | 3 points
Thank you! I've read it all, and while I don't know much about the technical aspects at play here, I guess I was wondering if there were some standard sort of proof--someone mentioned screenshots, I guess?
And also just a general discussion on whether we think a pedophile ring would keep damning evidence on a front-facing website. The website going down definitely caught my attention, too. But it's also hard for me to believe that's where they would keep the evidence, though maybe there are reasons I'm not aware of.
Either way, the fact that this person truly posted CP makes this all so important to figure out--whether they are honest or just messed up people who are trolling.
coulditbe223 | 3 points
So like I said, (If the second guy is to be believed) they did not put the images/files on the website, but had them stored on a harddrive at the pizza place. I assume after the first post, the back end of the website took it down becuase they (! Im speculating here) thought that someone had somehow gotten ahold of the files via the website. So , the website comes down, however that is not how they got the files (according to guy#2), which highlights the sketchiness of the whole situation because a seemingly independent website went down JUST as someone reveals this information, and like you said, REAL cp was posted(Supposedly, I did not view these pics...I'd never click that shit)
As of right now, guy #2 is actively posting, but many users are very skeptical. You can read his posts on his page: I am actively following the situation as best I can. Big revelations if it's all true.
https://www.reddit.com/user/wethepizza_the2ndGuy
MiniLurkette | 1 points
Okay, so you're saying this second person's account doesn't correlate with a reason for the website being down, but we also don't have verification that person 2 is related to person 1, or that either are legit. Or maybe 1 is but not 2.
Would there be a way to prove that the hard drive was from the pizza place? I also have that tab open and am following.
coulditbe223 | 4 points
You're correct in that we cannot know either account is real. The first guy did mention a second partner that they're working with. So yea. It could be
A. They're both fake accounts and are leading the entire sub on a massive waste of time. (at this point, i believe most people think option A)
B. One is real, and the other is not (whether it be guy 1 is real and guy 2 is fake, or vice versa) (this seems unlikely, but entirely possible)
or C. They're both real and telling the truth and we will find out very soon that its all true. (Doubtful, yet, extremely scary if this case)
The website (wethepizza) originally went down roughly 15-30 mins after the first post from guy #1 (where in, he claimed that he or someone got into their website and found the images/files of rape/torture etc). I watched that happen in real time, and yes the site was working fine and then suddenly went into its current state.
Someone on 4chan also posted a link to wethepizza with an admin login page, however obviously it does not go anywhere unless you have the credentials to log in. I believe that to be a cold trail anyway and the only hope we really have is if guy #2 somehow posts ACTUAL damning evidence which somehow proves correlation between pizza place and CP, OR, can prove that the photos were taken in people's houses (He stated the photos are geotagged for blackmail purposes? Who knows if true or bullshit).
So ye. Idk, At this point I'm really skeptical.
gia257 | 1 points
website is up so it was just "slashdotted", I browsed their site too
the rest sounds like larping, except for the part where he allegedly got his hands on images that can land him on jail if the fbi wants to do their job, be careful with your larping people dont end up on the news ;)
Having said that, if hes for real all he has to do is release the data, all of it, that exe for instance (obv. do not execute it..., load it on an editor to analyze), if it was a honeypot then its obv a trojan. If its for real then it would find files/data ELSEWHERE and process them, outputting the monthly client list. So copying just it is sorta dumb, should analyze to find what files/data sources it tries to obtain.
debora111 | 1 points
To answer your question look here https://np.reddit.com/r/pizzagate/comments/5e0kox/how_could_a_pizzagate_hacker_prove_shes_not_full/
Colek38 | 24 points
Someone's going to run bruteforce on that message for 100 years just to find out hidden rick roll link in it.
anotre | 4 points
Oh, is that the encrypted message? Big lol. How can these guys be so hackerz and don't even know how pair encryption works?
[deleted] | 33 points
[deleted]
valet_bonum | 7 points
If it's absolutely no trouble at all, you could just casually swing by and check to verify the name of the WiFi network the first guy posted. I mean, they could have taken it down/renamed it, or 1st guy might have been making it up. But if it turned out to be a match, that would lend the tiniest bit of evidence to a story that desperately needs it.
You're not gonna get murdered or abducted, lol. They don't stay open by gunning down customers in broad daylight.
Truthplease5 | 3 points
Could be the business itself is acting normal but the site may be just (?) a sinister host - good idea to check!
p_za | 30 points
too many inconsistencies in story unfortunately, still no real proof linking this guy to guy #1...
there is so much mis/dis-information going on in this subreddit now, we have definitely got some peoples attention, and I think this means we're on to something big.. keep going guys
nihilistigon | 1 points
Can you link to an archive of the #1 Guy's post? Did it have any evidence?
p_za | 7 points
not enough evidence, but they took their site down within 30mins of him posting so read into that what you will..
link to deleted thread: https://www.reddit.com/r/pizzagate/comments/5dykv3/i_have_cracked_into_an_unidentified_pizza/
valet_bonum | 26 points
Okay, well, this is either going to be earth-shattering, or extremely anti-climactic.
Xenepa | 24 points
You cannot brute force it. It's encrypted to key 0x044B3E4A36FC58DA not a passphrase.
Also this message is so short its likely ~20 chars MAX.
peechag8 | 21 points
Troll or not, it's still weird as shit that wethepizza's website and chiefspike's website is down after OP made his announcement.
extraspoke | 2 points
I know very little about these things, is it possible for someone to take down a website like that? If so then this should be an open and shut case
neverNotFlexing | 8 points
WTP website didnt go down, they just put a filler message on the homepage. unless an attacker gained access to the server, we can assume that WTP altered their own website.
whatiswalnutsauce | 4 points
Well, it didn't go down thought. The website was changed to a "coming soon" page. This was something done within the design of the website
RobertRandom | 2 points
Very easy, they would need to have phished their admin password (An educated guess: their username was admin@wethepizza.com)
After that, they would just need to upload a pre-made error page to the index.
This could all be easily done by anyone who knows anything about web design.
What you have to ask yourself now is: Why?
Think about how much effort would have gone into this, then think about the mind of a troll, whilst it's not unbelievable, as we know there are committed trolls, it's improbable: Why?
No troll would openly distribute child pornography on a subreddit that's drawing as much attention as this. It just makes no sense, especially when no internet protection is foolproof when you hack a server. Why would someone risk being caught, then registered as a sex offender for the rest of their life?
Dutch4Trump | 20 points
Get guys from 4chan involved.
SkrubrekkerJames | 11 points
It is for fuck's sake.
coulditbe223 | 4 points
I dont know about encryption but from what I see people saying, unless this dude has the other part of the key, it is essentially useless as we cannot ever hope to brute force a pgp? Am I understanding that correct?
nihilistigon | 3 points
Yes
coulditbe223 | 6 points
Welp. This is useless then. It could be a fucking recipe for tomato sauce for all we know. Unless OP somehow redeems his proof in some other way.
Ohmz27 | 3 points
The 'client list' is useless, but apparently they have CP and claim they got it from WTP. Videos of rape, some with the abusers face in apparently. And geo-tagged images of child abuse, with the geo info believed to be the houses of clients, for use as blackmail. It would make sense and would be big if all true. Not sure what the best next move is here though. Uploading and sharing the CP seems like a crappy idea.
Perhaps OP should securely upload it to multiple places, then email a summary of what they've found to multiple police departments across the US, and possibly abroad too. Include links to the securely uploaded data and explain that the passwords will be sent separately, and proof of the email has been made available to the public. Send different departments links to the data from different hosting areas for contingency/protection.
riverjustice | 14 points
This looks like a honeypot to fuck people over... It's impossible to decrypt that without the key.
RIGGED_ELECTION | 14 points
False alarm people. This guy is either trolling or just managed to fuck his whole life up by stealing encrypted data from the bad men.
GhostOfRobertMichels | 11 points
Post the software, not an encrypted message. Otherwise, this is a waste of time.
TiddiesNBeer | 11 points
CTR is on this shit like crazy lmfao. OP is doing Kek's work. Godspeed retards.
irufema | 9 points
we will do this, we will do that... I can't figure this out and I don't know what to do, help!
LOL.
havoc802 | 8 points
Disregard, it's nothing. What happened to the pdf that one of you two has seen? It's suddenly encrypted?
that_70s_kid | 8 points
this has to be a setup for disinfo. I can see the media picking up this "story" and therefore discrediting everything else that has been achieved here.
It would be enough to have 'joe public' disassociate.
youwillnotgetaway | 8 points
why is it being tainted by a "honeypot/hoax" heading? That may be true but we dont need your influence to lead us to a conclusion.
Lunnes | 7 points
Can't brute force this, it's useless without a key. I thought your Guy #1 had seen the names and everything why don't you have this information ?
illBoopYaHead | 7 points
You can't bruteforce PGP.
Xenepa | 4 points
Or to be precise: one that's encrypted to proper key. If it was using symmetric encryption it would be possible (and only if they used eg. "password" password).
They use some openpgpjs which is almost certainly bad implementation, due to lack of proper entropy source for example, but unless someone knows a VERY serious vulnerability in the implementation (eg. IV set to 000's for all messages) its impossible to break anyways.
Escape_TheMatrix | 7 points
Why not post the client list and the price list you supposedly found? you're not making any sense here. and now you ran a program in a virtual machine and all it does is return a PGP encrypted message? Either post the client list and price list and all the other stuff you found, even the program that returns a PGP encrypted message. or you are basically confirming you are full of shit.
templeofluxor | 7 points
guys we fucking knew before the shills would come to try and screw with us. we fucking know they have connections to wethepizza. have you ever thought its them doing this to fuck with us, honeypot a few, make it look like they rushed to clean out their website, then have us exhaust ourselves with new leads. fuck you op. you will die like the rest of us.
whatiswalnutsauce | 2 points
Thought maybe We the Pizza could be involved, if CTR were common customers couldn't they all just be doing this as a hoax?
templeofluxor | 6 points
you are a legitimate fuck. is this honestly amusing to you? if your conscience isnt already dead, i hope this haunts you.
Tha_Dude_Abidez | 6 points
I'd say he was a troll but if he is he's fucking nuts with what he posted. Also, they did take their website offline.
anotre | 5 points
So, where is the file?
wethepizza_the2ndGuy | 0 points
That is the PGP message. We either need the private key to decrypt it (or someone to bruteforce the passphrase). I am 100% certain within that PGP message is this month's clients list.
Let's ask these guys for help: https://www.reddit.com/r/GPGpractice/
Xenepa | 15 points
It's not a list, it's far too short. In fact encrypting a word "test" yields a pgp message that has 886 characters. Your message has 744.
If I encrypt some fake list, for example
1,e2b2ba@gmail.com
2,b4b8b4@gmail.com
3,0e676c@gmail.com
4,93d625@gmail.com
5,14d725@gmail.com
6,7e8575@gmail.com
7,0a4f46@gmail.com
8,e9f9d0@gmail.com
9,d22e06@gmail.com
10,6d7ac3@gmail.com
11,aea8b5@gmail.com
12,c5babf@gmail.com
13,112d55@gmail.com
14,32adcf@gmail.com
15,426ed9@gmail.com
16,0927b5@gmail.com
17,dd1253@gmail.com
18,1029f6@gmail.com
19,0af69d@gmail.com
20,f850de@gmail.com
that list would yield a PGP message that is 1113 chars long. And from this point it will only grow in size.
benedius | 1 points
I just encrypted your list in GPA and it came to 722 characters.
"test" creates a 522 character long message.
This might vary based on platform to some degree, but if my tests aren't erroneous somehow, it would indicate that there MIGHT be some data of substance in the message. Of course, actually decoding it is impossible so this is all for naught.
Xenepa | 1 points
Interesting. I did it using normal gnupg2 and effects were as in my previous post. Did you use -a (armor) option?
benedius | 1 points
I think I figured out the discrepancy, I was just encrypting it against a public key and was not signing it with my own private key as well. Signing the message brings the character count to 1196.
A distribution model like this would involve the communications being signed most likely, as opposed to re-encrypting the message against a number of recipients public keys. So yeah, unless they're doing it really weird you totally got a point.
wethepizza_the2ndGuy | -3 points
Tested your theory, and it's wrong. But I think I found where it's sending (unencrypted the private key!)
neverNotFlexing | 35 points
"unencrypted the private key" is a nonsense sentence from a technical perspective.
the only thing giving guy1 credibility was that WTP website went down after he came public. you havent even proven any connection to guy1 and the technical shit you're spewing out is completely wrong/nonsensical.
PuffyHerb | 3 points
Yea I was skeptical to begin with, now even moreso. Sounds more like he is trying to rope people back in by a magic discovery. But I hope I'm wrong and that he posts something real (the encrypted file, or the .exe even). Something we can get to work with.
wahoosjw | 1 points
Yep, but these guys said they aren't techs and have no pgp experience.
neverNotFlexing | 3 points
Funny that with no pgp experience he's claiming to have "unencrypted the private key" which makes no sense because private keys will be stored as is depending on what pgp client is used (exported as plaintext).
eM_aRe | 1 points
If english is his second language this mix up seems plausible. "The private key unencrypted" makes plenty of sense. Especially when talking about a program transmitting shit.
valet_bonum | 21 points
100% done with you. I was a big believer at the beginning of the day, and I'm a sucker.
You're a troll, and you're dragging this out for lulz. Shame on you for using a fictitious, morbid story to manipulate a genuinely concerned community.
bonejump | 4 points
It would be helpful if you could provide screenshots, and maybe some other files/whatever that you've managed to copy from their disks.
GhostOfRobertMichels | 6 points
He doesn't have anything, and an encrypted message (one encrypted with a noob-friendly web-based client, at that) is the best he can forge.
GhostOfRobertMichels | 3 points
No it's not. The length of an encrypted message typically reveals the length of the plaintext message.
coulditbe223 | 2 points
Please post something relevant and damning, or I fear the entire sub will lose faith. I understand you're under duress right now. Buy you really need to step this up to the next level, or this entire thread may be deleted and everyone will forever disbelieve your claims.
nihilistigon | 11 points
Dude stop. You have no idea how encryption works. You don't "brute force" encryption. Either you have the private key or everything is useless. Answer this: how do you know what is in these files if they are encrypted? Post proof of that or else you are wasting everyone's time.
eM_aRe | 1 points
He asked to brute force a passphase. That shit happens all the time. Encrypt a bitcoin wallet with a shitty passphase and it will be insta cracked
LazeyJ | 8 points
Have you tried sharing this through 4chan I am of no assistance here...
thispizzaiswhack | 6 points
its up on chan
that_70s_kid | 3 points
could you please link?
coulditbe223 | 3 points
Here is a link to a newer thread. So far I have seen 4+ threads (4 that were archived from being too large) http://boards.4chan.org/pol/thread/99483242
However, you're not missing alot. most of the comments are typical 4chan troll people saying stupid shit, or responding to the stupid shit with more stupid shit.
maybe 1 in 10 comments is worth reading.
You know how these things go.
anotre | 8 points
You do realize that different passphrases generate different files right?
That's the idea of a key-pair encryption.
You can't just expect to "hack" it to an unecrypted state if you can't confirm later that the state is indeed true.
Cracked passphrase "onepass" could give info on "Cheryl"
Cracked passphrase "anotherpass" could give, on the same bits, info on "Rotteo"
This is, it is unhackable so to say.
To further explain for those non-tech savvy, there is not such a thing as "DING DING DING": File cracked because the computer has no idea what you are looking for.
You could input password "inr3q3o2" and the computer would tell you
"with that I got Dogebrnaamentifmen for line 22 of the file"
or you could input password "akfmaemfnaE22" and the computer would tell you
with that I got Bill Clinton for line 22 of the file"
But the computer does not know what you want to have or what makes sense . The only "impossibility" for this would be to have a computer analyse every possible file unecrypted for every possible password with the computer knowing what you want to look at .
You will have to wait for quantum computing for such a thing.
Xenepa | 2 points
Actually gpg WILL tell you if you got proper passphrase or not. Some checksum I suppose.
In this case, it will tell you about missing secret key and thats about it.
anotre | 1 points
It would, considering the file is only under a layer of encryption... Otherwise the checksum will have false positives.
Anyway, bruteforcing this is pretty impossible but OP found a workaround apparently
Xenepa | 1 points
No, gpg will always tell you if the password is correct or not. I do not care enough to find the exact technical data on how it assures that, but finding collision would be likely as hard as actually cracking the decryption.
To demonstrate, take this message:
-----BEGIN PGP MESSAGE-----
jA0ECQMCY3bcehzzQCPh0lYBBsMtbShvnivFl0+6mciBgXNnIrYQcs1CXBwgbGC3
QhQKGdLqHz50cbkd2bo7RmXpeGE3gSvvddShIi/WcowRa+xXun/Q9aijx+u1s8xs
hFRg8bRJ0g==
=H8oS
-----END PGP MESSAGE-----
Try decrypting it (gpg -d message.asc) with various passwords. Then try "hello" as a password.
It doesn't matter what's inside. Can be binary, can be another decrypted file. You will know if it's good or not.
coulditbe223 | 1 points
So essentially, the only REAL way to unencrypt the messaage, is to know for a FACT what the original key was, which unveils the message. yes?
GhostOfRobertMichels | 3 points
To repost what I said elsewhere in this thread:
"[T]hat's a pretty small client list, provided it is one. We're talking about encryption here, not compression. We can still get a rough idea of the length of the plaintext by looking at the encrypted message. This is quite short."
trabidius | 4 points
I hate that this person is probably the real definition of a shill. Distracted us for a good chunk of time. I wonder what from.
[deleted] | 4 points
[deleted]
SarahAssange | 3 points
is there any nerd subreddit we can submit this to ?
havoc802 | 3 points
it wouldn't be on reddit, like it or not this whole site is censoring anything they don't like so all the best people who want to discuss controversial topics have moved elsewhere. This isn't something some nerd can just decrypt by the way.
[deleted] | 2 points
Don't think anyone here would have the means to crack a PGP encryption unfortunately. Tons of respect to your efforts OP, these are uncharted territories for sure.
youwillnotgetaway | 2 points
Do you all really think picking We the Pizza would be a good place to pick to troll??? Theyre a block away from the capital and all the pieces connect to people implicated in child kidnap/slavery..
manly_ | 2 points
You can't brute force pgp. No really. It's purposefully using keys containing more possibilities than the number of atoms in the universe. If it could be cracked it would be completely useless.
RobertRandom | 2 points
manly_ | 1 points
Well, technically you could get the luck of gods and just land on the private key right away.
Typical 8192 bits key 2 ^ (8192) = 109,074,813,561,941,592,946,298,...,997,186,505,665,475,715,792,896 (2,467 digits)
That's how many combinations there are. It would easily take the heat death of the universe using every computer on the planet to not even process 1% of the number of combinations.
RobertRandom | 1 points
But OP said we could brute force it, we all know an OP can't lie; that's forbidden ..
Also, thanks for confirming my suspicion with actual empirical evidence.
sheik_yerbouti_jr | 2 points
This is utter bullshit. This isn't even a honeypot, it's childish trolling.
First they "stole 2GB of data".
Then the webserver went down - what does it have to do with the "windows xp" at the pizza place? The webserver is in Texas. This could be completely coincidental.
Now they are talking of an "exe" with the client list.
Nothing makes sense here.
pizzathrowaway777 | 1 points
UPDATE
The level of incompetence in this "hack" is extremely concerning. I am not sure what OP was trying to accomplish, but without the private key this is useless
Please provide all of the data/files/html as evidence to MULTIPLE PDs (local or otherwise including the NYPD) before posting on the internet. You need to protect yourself, and establish a chain of evidence. Contacting an attorney is also very critical. If you do not have an attorney, get one asap.
If you do provide "evidence" on the web do it in an encrypted dump in bittorrent, all users should be careful and protect themselves, this could be a honeypot
No one cry wolf without validating OP's "evidence". Bringing false leads to the authorities is a surefire way to lose all credibility for this sub.
edit: Other users have pointed out, with good reason that local PD alone may be complicit and may not be the course of action. Simply linking on the internet is not how you bust these people though. You need to get as many eyes on the evidence as possible and make sure they understand you want to establish a chain of evidence and that your life is in danger.
edit2: added request for encrypted bittorrent dump, and piece about false reporting to authorities
edit3: contact attorney
spontaneousspectator | 1 points
Their website went down now it's back up with the supposed hack spot now removed.
InvestigatePizzaGate | 1 points
SPAM @h3h3productions twitter to INVESTIGATE #PizzaGate They have a mass audience on Youtube and can wake up many people #HELP
FateBender | 1 points
In my opinion this is real because no sentient being would be stupid enough to endanger themselves legally so much by posting CP just to troll some deplorables on Reddit and 4chan. Just my 2ยข
aLi3nZw00t | 1 points
Well, it is quite a disappointing and frustrating development.
Quite a lot of incompetence and failed promises. If he is in fact seeding on torrent, why not even post a link to the torrent?
FateBender | 1 points
No idea. However, if he's not their plant sent to intentionally discredit this sub, he'll pay for it because spreading CP is illegal. The only one that's going to get trolled is him :)
_PizzaGate_ | 0 points
Oh, hello James Alefantis... nice try trying to keep us from researching ur pizzeria... hahaha
debtrevolution2016 | 65 points | Nov 20 2016 22:21:05
How do you know this is the client list if you haven't decrypted it?
permalink
nihilistigon | 26 points | Nov 20 2016 22:22:44
Exactly.
permalink
wethepizza_the2ndGuy | 43 points | Nov 20 2016 22:29:01
I cloned their Hard drives. They are still using Windows XP (not joking). On the desktop is an .exe that reads "Monthly client list.exe".
permalink
valet_bonum | 54 points | Nov 20 2016 22:53:55
First,
now
Right. This guy is full of shit.
permalink
a-SynKronus | 21 points | Nov 20 2016 23:33:08
The thing is, most skids don't really know what they're doing and can't express it very clearly anyway. Doesn't mean that they can't do it
source: time spent on hacking forums
permalink
sheik_yerbouti_jr | 7 points | Nov 21 2016 00:22:05
He's a troll.
permalink
CaptnMeowMix | -1 points | Nov 20 2016 23:17:48
permalink
valet_bonum | 4 points | Nov 20 2016 23:42:11
A full hard drive clone includes the OS, and everything on the drive. It will vastly exceed 2 GB.
permalink
CaptnMeowMix | 2 points | Nov 20 2016 23:57:56
Yes, but who ever said the 2GB was the cloned data? The first OP only said that he had 2gb of pedo data, not that it was an entire cloned drive. Could've easily just been a subdirectory in the main drive.
Don't get me wrong, I think the OP is likely full of shit, but due to the fishy pattern of communication he's been taking, not his claims. Might not even be related to the first guy for all we know.
The problem is how absurdly lazy the arguments against this are getting. It's like everyone got all emotional and threw logic out the window the second the first post dropped. That's how irrational witch hunts start.
permalink
valet_bonum | 5 points | Nov 21 2016 00:05:15
The fact that he mentioned a USB stick with 2GB of data, but NOT the fact that he cloned the hard drive is just sketchy as hell.
The point is, he's pretty obviously just making this up as he goes along. But it has been an hour with no response, so who knows. Maybe he really is uploading something. I'm extending him this one, final chance to prove himself.
permalink
CaptnMeowMix | 3 points | Nov 21 2016 00:06:42
Which is why I said that this OP is probably full of shit. Did you notice that the guy who mentioned the 2GB was different from the guy who mentioned the cloned drive?
Nobody's actually heard from the first OP since that initial thread.
permalink
valet_bonum | 3 points | Nov 21 2016 00:14:42
Oh, right. We can't be absolutely sure this guy has anything to do with OP #1. But
permalink
foreskinremovalcream | 1 points | Nov 21 2016 09:12:38
To be pedantic, especially with 7z it isn't actually unreasonable for windows XP.
permalink
[deleted] | -2 points | Nov 20 2016 23:25:41
[deleted]
permalink
Kaisernegro | 3 points | Nov 20 2016 23:49:14
yeah but they knew who you were before you even looked at the page or came cross the name pizza gate. It's fine.
permalink
sheik_yerbouti_jr | 1 points | Nov 21 2016 00:23:19
Could be something else: a diversion from another story.
permalink
GodEmpire | 1 points | Nov 21 2016 00:30:40
Look at my post history, where is assange?
permalink
Sparkling_Poo_Dragon | 37 points | Nov 20 2016 22:30:41
Okay, upload the data.
permalink
z3r0117x | 39 points | Nov 20 2016 22:58:00
DO NOT FUCKING RUN A .EXE FILE YOU WILL BE FUCKED
permalink
Xenepa | 7 points | Nov 20 2016 22:59:29
pffft. IDA Pro on the exe ;)
permalink
foreskinremovalcream | 3 points | Nov 21 2016 06:45:29
Only a professional would be able to get away with running it.
You do that with a dedicated box, VM dedicated host and on it's own LAN with one secure gateway. You can make it buffer traffic for you to inspect and optionally permit or deny. Routing it through tor or something is probably a good idea.
What the hacker should really do though, after cloning everything is to squeeze the box for all they can get. If it has a camera or mic, record the users. Check what else is on the network, phones on wireless for example, MAC addresses. Screen record actual use. Even interfere with data to set them up or call the cops on them doing shit in the act.
permalink
nihilistigon | 28 points | Nov 20 2016 22:34:14
Then upload the .exe so we can examine where it phones home. You have about 2 more posts until everyone calls you a troll.
permalink
z3r0117x | 15 points | Nov 20 2016 22:58:17
DO NOT click a .exe
permalink
sceneredacted | 7 points | Nov 20 2016 23:58:30
There are people with skills to pick it apart. Some are on reddit.
That said, this 2nd dude is the fakest fake I've seen in a while.
permalink
SillySnoot | 3 points | Nov 21 2016 03:13:01
Just sounds like an unexperienced person in terms of IT and hacking. They had an opportunity to walk in there, grab the data and get out. Who knows whether its true, we won't know until we see the client list. But the images they showed and previous file was legit, so stop trying to shut down something that coul dbe a legitimate solid lead. They are obviously going about this wrong and it is suspicious, so we should treat it carefully, but this by no means makes this a fake outright. Just an unexperienced person with some scary, sensitive information about an extremely scary level of corruption.
permalink
imightbewrongwhateve | 5 points | Nov 21 2016 03:39:53
this is so obviously fake.
They previously said they downloaded 2gb of files to a USB, now they say they 'cloned' an entire hard drive, and then claim they have an (unencrypted?) exe file which was on the desktop (which makes no fucking sense at all), and then to top it off they are asking for a random stranger on reddit to "brute force a PGP pub key".
this is without touching all of the retarded bullshit about "im tired and i need to get drunk, but first ill make a reddit post lol"
This is so retarded on so many levels im worried it might develop retarded sentience and become a retard version of skynet
permalink
SillySnoot | 2 points | Nov 21 2016 04:06:31
You're doing what we all accuse liberals of, taking stuff out of context and spinning it to fit your opinion. What we know is 1) They have no idea what they are doing and 2) They leaked some legitimate CP. What we don't know is what the source of it was, and whether it legitimately is from wethepizza. Thus we are remaining skeptical, but don't completely write it off as conspiracy, that is how we have been shut down about pizzagate for years.
What made this click for me was thinking back to the time the apparant "fake" ctr discord chatlog involving david brock, mentioning the Seth Rich murder. Right above where they say they they talk about wethepizza. Here: http://puu.sh/spgcW/183c2b5886.jpg
permalink
Little_chicken_hawk | 16 points | Nov 20 2016 22:32:49
Why is it an executable file?
permalink
hazeleyedwolff | 36 points | Nov 20 2016 22:39:10
They downloaded it from Limewire.
permalink
therealcatspajamas | 12 points | Nov 20 2016 22:44:26
I didn't come here for lulz, but I got lulz
permalink
tridentgum | 11 points | Nov 20 2016 22:55:10
Because it's not real.
permalink
Cc99910 | 5 points | Nov 20 2016 23:02:39
Its a spooky war games creepypasta
permalink
PuffyHerb | 14 points | Nov 20 2016 22:38:43
Upload the .exe, I'll analyze it.
permalink
p_za | 8 points | Nov 20 2016 22:36:57
you are yet to post anything remotely backing up this story, please do so soon before you derail this further.
permalink
whatiswalnutsauce | 7 points | Nov 20 2016 22:37:14
Torrent the hard drive
permalink
GhostOfRobertMichels | 7 points | Nov 20 2016 22:37:32
I'm guessing this will be one of your last posts as people are asking for more concrete proof. Either upload the executable along with other data you've acquired, or give up.
permalink
coulditbe223 | 3 points | Nov 20 2016 22:31:54
What you say you did, and what we know can be two different things
If we cannot verify the client list (w/o the other half of the key) how are we ever to know you're telling the truth? I want to believe you, because this all seems very suspicious, but at the moment your biggest lead was a dead end (If what I'm being told by /pol and everyone else is true, that we cannot get into the file due to pgp)
permalink
JimmyDeSanta | 3 points | Nov 20 2016 23:56:40
Aye, I'm not trying to discredit you, but do you think that might be credit card info of people who actually bought pizza? And it's sending info to charge the cards? You gotta remember that they legitimately sell pizza, as well..
Edit: I don't know a damn thing about hacking, and I certainly know nothing about pedophilia.. Soooo.. Just playing devils advocate.
permalink
Haplo781 | 1 points | Nov 21 2016 01:48:35
Rip multiple copies onto DVD-ROMs. Send them anonymously to the FBI, NYPD, DC police, InfoWars, Breitbart News, Fox News, WikiLeaks, Interpol, etc.
permalink
TooM3R | 1 points | Nov 21 2016 06:44:57
There are still many companys that are using windows XP its not that uncommon.
permalink
GhostOfRobertMichels | 10 points | Nov 20 2016 22:27:02
Plus, that's a pretty small client list, provided it is one. We're talking about encryption here, not compression. We can still get a rough idea of the length of the plaintext by looking at the encrypted message. This is quite short.
permalink
[deleted] | 7 points | Nov 20 2016 22:28:54
[deleted]
permalink
GhostOfRobertMichels | 5 points | Nov 20 2016 22:31:07
Yup. Seems like a troll, unfortunately. Based on the story, there's other more damning, but still legal, stuff that could be posted. Somebody under duress wouldn't waste their time with this.
permalink
hildass | 1 points | Nov 20 2016 23:21:01
Yes. I was thinking that too.
permalink