wethepizza_the2ndGuy | 328 points | Nov 20 2016 22:15:32

Here is the encrypted client list for We The Pizza! Need help decrypting it

Backstory, I stole 2GB of highly sensitive pedo data from a pizza restaurant called "We Are Pizza" with the help of a friend from a 3 letter agency (they took their website down 2 hours after my friend who is MIA action made his first post). The place is HIGHLY suspect, please go down the rabbit hole. Anyway, my friend posted as evidence because no one believed him, about 10 photos I stole from the place of children being brutally raped. Reddit deleted the photos.

More importantly, I stole their software they use for keeping track of their clients, it is a pretty shitty piece of software and I think it phones home to a website to do the actually encryption LMFAO, but I have no experience with PGP and here this week's list of people who are going to be raping and murdering children. Here is the message:

-----BEGIN PGP MESSAGE-----

Version: OpenPGP.js v.1.20140106

Comment: http://openpgpjs.org

wYwDBEs+Sjb8WNoBA/0Yo2kIjHZ+OufZZzXGzZNnFoUl/aYiwnfdHv2fXAhj 6tbVUWUYgIUCvNEKySNpGLt385hJ5LpEL9UHsmbNKWlYHWpNc0e9lJJgebr3 6ZlLmqf/FUcTQlM7uU5HdadgbaX2OtOiFF3bxSc0rt04/1qCPgLf5k1UuSk+ wd94/L5DidLApgFLz9nImLvia+oTM5tYoQ4oW8yiTVB/RwoBZlRCGdQtBEVm D/jQn0Ike26L76IcmwdQakfLr0zETOthkpXizPgAvmx0Zko6Dduiwj0YrCZk OrnopmhVNvK374wv7WJoECNhReCaAFG6prCNbWuHFmC+pAP0fqbMhxn2sCE5 N9o4jHSI1JwycRJlDCZamuQSvkbsuyQGG8fz/YOEv4l24ZGgAsyoaORpOg7/ XlUotBUYsfeVJm+CeKO/RXl/X9xqLooQ/dopP9qXoTfeYxq5uOW0LI8LiQXf JapqTyMUwHSu4KyBMY1vtOqZZJTuULDmquSdgVyP5EttOXIRAd5ciQtCZDvF 300m7lBKsegZIQQ9w583BQ7QKK/cKVt+qReyIQXUl68FfaYecYa9Z8ObaB7S C1jRq2xzaMzrB2kaM43gAmSuYsavFGAXLwMj41wrZIetc3V82yyJ0dWGCjsQ /jWN98JHVMA= =Xy+W

-----END PGP MESSAGE-----

I have had no luck finding the private key, does anybody have anything powerful enough to brute force it?

permalink

debtrevolution2016 | 65 points | Nov 20 2016 22:21:05

How do you know this is the client list if you haven't decrypted it?

permalink

nihilistigon | 26 points | Nov 20 2016 22:22:44

Exactly.

permalink

wethepizza_the2ndGuy | 43 points | Nov 20 2016 22:29:01

I cloned their Hard drives. They are still using Windows XP (not joking). On the desktop is an .exe that reads "Monthly client list.exe".

permalink

valet_bonum | 54 points | Nov 20 2016 22:53:55

First,

over 2GB of sensitive pedo information on a USB drive

now

I cloned their Hard drives.

Right. This guy is full of shit.

permalink

a-SynKronus | 21 points | Nov 20 2016 23:33:08

The thing is, most skids don't really know what they're doing and can't express it very clearly anyway. Doesn't mean that they can't do it

source: time spent on hacking forums

permalink

sheik_yerbouti_jr | 7 points | Nov 21 2016 00:22:05

He's a troll.

permalink

CaptnMeowMix | -1 points | Nov 20 2016 23:17:48

Implying a business hard drive should be up to it's full capacity in cp

permalink

valet_bonum | 4 points | Nov 20 2016 23:42:11

A full hard drive clone includes the OS, and everything on the drive. It will vastly exceed 2 GB.

permalink

CaptnMeowMix | 2 points | Nov 20 2016 23:57:56

Yes, but who ever said the 2GB was the cloned data? The first OP only said that he had 2gb of pedo data, not that it was an entire cloned drive. Could've easily just been a subdirectory in the main drive.

Don't get me wrong, I think the OP is likely full of shit, but due to the fishy pattern of communication he's been taking, not his claims. Might not even be related to the first guy for all we know.

The problem is how absurdly lazy the arguments against this are getting. It's like everyone got all emotional and threw logic out the window the second the first post dropped. That's how irrational witch hunts start.

permalink

valet_bonum | 5 points | Nov 21 2016 00:05:15

The fact that he mentioned a USB stick with 2GB of data, but NOT the fact that he cloned the hard drive is just sketchy as hell.

The point is, he's pretty obviously just making this up as he goes along. But it has been an hour with no response, so who knows. Maybe he really is uploading something. I'm extending him this one, final chance to prove himself.

permalink

CaptnMeowMix | 3 points | Nov 21 2016 00:06:42

Which is why I said that this OP is probably full of shit. Did you notice that the guy who mentioned the 2GB was different from the guy who mentioned the cloned drive?

Nobody's actually heard from the first OP since that initial thread.

permalink

valet_bonum | 3 points | Nov 21 2016 00:14:42

Oh, right. We can't be absolutely sure this guy has anything to do with OP #1. But

  1. OP #1 is almost as bad (not quite, but almost)
  2. OP #2 is baloney at this point, until he proves otherwise.

permalink

foreskinremovalcream | 1 points | Nov 21 2016 09:12:38

To be pedantic, especially with 7z it isn't actually unreasonable for windows XP.

permalink

[deleted] | -2 points | Nov 20 2016 23:25:41

[deleted]

permalink

Kaisernegro | 3 points | Nov 20 2016 23:49:14

yeah but they knew who you were before you even looked at the page or came cross the name pizza gate. It's fine.

permalink

sheik_yerbouti_jr | 1 points | Nov 21 2016 00:23:19

Could be something else: a diversion from another story.

permalink

GodEmpire | 1 points | Nov 21 2016 00:30:40

Look at my post history, where is assange?

permalink

Sparkling_Poo_Dragon | 37 points | Nov 20 2016 22:30:41

Okay, upload the data.

permalink

z3r0117x | 39 points | Nov 20 2016 22:58:00

DO NOT FUCKING RUN A .EXE FILE YOU WILL BE FUCKED

permalink

Xenepa | 7 points | Nov 20 2016 22:59:29

pffft. IDA Pro on the exe ;)

permalink

foreskinremovalcream | 3 points | Nov 21 2016 06:45:29

Only a professional would be able to get away with running it.

You do that with a dedicated box, VM dedicated host and on it's own LAN with one secure gateway. You can make it buffer traffic for you to inspect and optionally permit or deny. Routing it through tor or something is probably a good idea.

What the hacker should really do though, after cloning everything is to squeeze the box for all they can get. If it has a camera or mic, record the users. Check what else is on the network, phones on wireless for example, MAC addresses. Screen record actual use. Even interfere with data to set them up or call the cops on them doing shit in the act.

permalink

nihilistigon | 28 points | Nov 20 2016 22:34:14

Then upload the .exe so we can examine where it phones home. You have about 2 more posts until everyone calls you a troll.

permalink

z3r0117x | 15 points | Nov 20 2016 22:58:17

DO NOT click a .exe

permalink

sceneredacted | 7 points | Nov 20 2016 23:58:30

There are people with skills to pick it apart. Some are on reddit.

That said, this 2nd dude is the fakest fake I've seen in a while.

permalink

SillySnoot | 3 points | Nov 21 2016 03:13:01

Just sounds like an unexperienced person in terms of IT and hacking. They had an opportunity to walk in there, grab the data and get out. Who knows whether its true, we won't know until we see the client list. But the images they showed and previous file was legit, so stop trying to shut down something that coul dbe a legitimate solid lead. They are obviously going about this wrong and it is suspicious, so we should treat it carefully, but this by no means makes this a fake outright. Just an unexperienced person with some scary, sensitive information about an extremely scary level of corruption.

permalink

imightbewrongwhateve | 5 points | Nov 21 2016 03:39:53

this is so obviously fake.

They previously said they downloaded 2gb of files to a USB, now they say they 'cloned' an entire hard drive, and then claim they have an (unencrypted?) exe file which was on the desktop (which makes no fucking sense at all), and then to top it off they are asking for a random stranger on reddit to "brute force a PGP pub key".

this is without touching all of the retarded bullshit about "im tired and i need to get drunk, but first ill make a reddit post lol"

This is so retarded on so many levels im worried it might develop retarded sentience and become a retard version of skynet

permalink

SillySnoot | 2 points | Nov 21 2016 04:06:31

You're doing what we all accuse liberals of, taking stuff out of context and spinning it to fit your opinion. What we know is 1) They have no idea what they are doing and 2) They leaked some legitimate CP. What we don't know is what the source of it was, and whether it legitimately is from wethepizza. Thus we are remaining skeptical, but don't completely write it off as conspiracy, that is how we have been shut down about pizzagate for years.

What made this click for me was thinking back to the time the apparant "fake" ctr discord chatlog involving david brock, mentioning the Seth Rich murder. Right above where they say they they talk about wethepizza. Here: http://puu.sh/spgcW/183c2b5886.jpg

permalink

Little_chicken_hawk | 16 points | Nov 20 2016 22:32:49

Why is it an executable file?

permalink

hazeleyedwolff | 36 points | Nov 20 2016 22:39:10

They downloaded it from Limewire.

permalink

therealcatspajamas | 12 points | Nov 20 2016 22:44:26

I didn't come here for lulz, but I got lulz

permalink

tridentgum | 11 points | Nov 20 2016 22:55:10

Because it's not real.

permalink

Cc99910 | 5 points | Nov 20 2016 23:02:39

Its a spooky war games creepypasta

permalink

PuffyHerb | 14 points | Nov 20 2016 22:38:43

Upload the .exe, I'll analyze it.

permalink

p_za | 8 points | Nov 20 2016 22:36:57

you are yet to post anything remotely backing up this story, please do so soon before you derail this further.

permalink

whatiswalnutsauce | 7 points | Nov 20 2016 22:37:14

Torrent the hard drive

permalink

GhostOfRobertMichels | 7 points | Nov 20 2016 22:37:32

I'm guessing this will be one of your last posts as people are asking for more concrete proof. Either upload the executable along with other data you've acquired, or give up.

permalink

coulditbe223 | 3 points | Nov 20 2016 22:31:54

What you say you did, and what we know can be two different things

If we cannot verify the client list (w/o the other half of the key) how are we ever to know you're telling the truth? I want to believe you, because this all seems very suspicious, but at the moment your biggest lead was a dead end (If what I'm being told by /pol and everyone else is true, that we cannot get into the file due to pgp)

permalink

JimmyDeSanta | 3 points | Nov 20 2016 23:56:40

Aye, I'm not trying to discredit you, but do you think that might be credit card info of people who actually bought pizza? And it's sending info to charge the cards? You gotta remember that they legitimately sell pizza, as well..

Edit: I don't know a damn thing about hacking, and I certainly know nothing about pedophilia.. Soooo.. Just playing devils advocate.

permalink

Haplo781 | 1 points | Nov 21 2016 01:48:35

Rip multiple copies onto DVD-ROMs. Send them anonymously to the FBI, NYPD, DC police, InfoWars, Breitbart News, Fox News, WikiLeaks, Interpol, etc.

permalink

TooM3R | 1 points | Nov 21 2016 06:44:57

There are still many companys that are using windows XP its not that uncommon.

permalink

GhostOfRobertMichels | 10 points | Nov 20 2016 22:27:02

Plus, that's a pretty small client list, provided it is one. We're talking about encryption here, not compression. We can still get a rough idea of the length of the plaintext by looking at the encrypted message. This is quite short.

permalink

[deleted] | 7 points | Nov 20 2016 22:28:54

[deleted]

permalink

GhostOfRobertMichels | 5 points | Nov 20 2016 22:31:07

Yup. Seems like a troll, unfortunately. Based on the story, there's other more damning, but still legal, stuff that could be posted. Somebody under duress wouldn't waste their time with this.

permalink

hildass | 1 points | Nov 20 2016 23:21:01

Yes. I was thinking that too.

permalink

nihilistigon | 41 points | Nov 20 2016 22:20:26

You are posting an encrypted message without the private key??? Are you retarded? There is no such thing as brute forcing this. It would take 100 years. Do you have anything besides encrypted files. If not, everything you have is absolutely useless.

permalink

[deleted] | 63 points | Nov 20 2016 22:24:31

I mean he has the videos of the children being brutally tortured, this was a customer list which would make sense to have a basic level of encryption like this. No need to call him retarded when he explicitly states that he has no experience with PGP.

According to their previous posts the usb drive with the information wasn't even obtained through hacking, which would explain their lack of PGP knowlege. Anyways just speculating, not sure why a post calling OP retarded gets tons of upvotes immediately. I honestly don't see what kind of motivation OP would have for making this stuff up, aside from some crazy honeypot effort which I don't think they'd go about in this way.

permalink

Lunnes | 43 points | Nov 20 2016 22:41:07

  • He posted pics of CP, doesn't mean he obtained them from the pizza place.

  • Guy #1 said that he had seen the names and the price list, and now suddenly everything is encrypted ? That doesn't make any sense

permalink

[deleted] | 14 points | Nov 20 2016 22:51:39

I know they could be from anywhere, just what would be the endgame to that? Anyways I'll be honest I have no clue where the fuck this is heading, they just made a new post https://www.reddit.com/r/pizzagate/comments/5e0njl/monthly_client_listexe_is_leaking_the_private_key/ which I have no idea what to make of lol, at this point I'm gonna just sit back and watch. Been following this pizza shit for a few weeks and it really starts getting to your head.

permalink

koolmagicguy | 21 points | Nov 20 2016 23:47:41

The motive for getting unsuspecting Reddit users to dl CP would be locking up anyone involved with this forum, thereby shutting down any outside investigation and silencing anyone who dares challenge the political elites.

permalink

[deleted] | 6 points | Nov 20 2016 23:50:53

There we go, this actually makes a lot of sense, solid point.

permalink

Lunnes | 7 points | Nov 20 2016 22:55:01

Basically his whole encrypted message story doesn't make any sense. Read this : https://www.reddit.com/r/pizzagate/comments/5e0i3m/here_is_the_encrypted_client_list_for_we_the/da8per8/

permalink

nihilistigon | 15 points | Nov 20 2016 22:29:14

Then he needs to post evidence of what he actually has. Blur out the children if he needs to, but for fuck's sake he needs to post some evidence before he gets killed or discredited.

permalink

[deleted] | 17 points | Nov 20 2016 22:31:56

Blurring things out would be a good idea, probably the best way to spread the information. Then providing proof the pictures came from WeThePizza.

permalink

foreskinremovalcream | 1 points | Nov 21 2016 06:50:47

Hash it as well perhaps. There's algorithms used for that to detect those pictures.

permalink

CaptnMeowMix | 10 points | Nov 20 2016 22:37:34

I swear, it's like everyone's emotions have just been on high alert today. Everyone's been so damn quick to raise pitchforks and cry BS, that they throw their investigative logic and composure out the window instead of trying to propose alternate solutions.

Here's an idea, how about we ask OP what other possible connecting evidence he has instead of just shitting on this one bit that he admitted to not knowing about? Perhaps they took screenshots of the site's backend at least or something?

permalink

whatiswalnutsauce | 6 points | Nov 20 2016 22:46:06

Maybe OP should provide evidence on the communications between him and the pizza place. Was OP smart enough to record their conversation on the phone?

permalink

RasputinButte | 2 points | Nov 20 2016 22:52:41

Exactly, and have him explain what he meant by "social engineering". However, I think it was the other OP from the other thread associated with it that said that, but still, it's critical.

permalink

peyton_montana | 1 points | Nov 21 2016 06:09:22

Good idea.

permalink

nihilistigon | 2 points | Nov 20 2016 22:37:42

He has videos?

Really, and you know this how? Because he told you he did, or because he posted evidence?

permalink

CaptnMeowMix | 9 points | Nov 20 2016 22:40:24

The guy posted actual cp images. Regardless of where he got them from, if he has that, are you really betting on him not having access to videos to go along with those? Please.

Either way, releasing more cp isn't going to help his case anyway, cause it's the connection to the pizza place that matters.

permalink

nihilistigon | 2 points | Nov 20 2016 22:52:40

The first guy did, not this OP.

permalink

[deleted] | 4 points | Nov 20 2016 22:46:04

I mean he did post evidence of the photos (because people kept crying for more proof) which were pretty quickly taken down by reddit. I didn't look at the photos.

permalink

SkullSoupBowl | 1 points | Nov 20 2016 22:52:45

I read an inventory of what was posted. Nothing significant that could be tied to the pizza place logos, signs, etc. Just children being tortured in what appeared to be different residences.

permalink

newfoundland_urth | 32 points | Nov 20 2016 22:27:41

If he is trying to discredit the entire sub, he is doing an excellent job.

permalink

MiniLurkette | 3 points | Nov 20 2016 22:44:44

Hi,

Please don't jump on me, I have real questions and thought you might take the time to answer them. Right now, re: We the Pizza, I don't know what to think in light of actual child porn appearing and their site being down. It seems like either this is legit or a fucked up person is messing with everyone, right?

So I am wondering what kind of proof could someone provide that this came from the pizza website and not the darkweb? And also speculation on why pedophiles would put this directly on their front-facing business website? Wouldn't it make more sense to keep it as far away from public use as possible?

Not trying to discredit--really asking.

permalink

coulditbe223 | 9 points | Nov 20 2016 22:54:41

The story so far is.... Blurred.

Originally the first guy claimed they hacked it from the website. However, guy #2 says that was disinformation to throw people off, and claims that his friend in a three letter agency has helped him to walk into the pizza joint and copy a harddrive containing the images/videos and a client list (apparently).

The reason this is gaining ANY traction at all is becuase the website for wethepizza went down literally 20-40 minutes after the first guy's post. Almost as if it were a reaction to said post...But that remains to be confirmed.

The real issue here is like you said, proof of the correlation between the images/videos and the pizza place where they supposedly lifted it from. How they will provide that information remains to be said

If you'd like to read some of the things I'm talking about I suggest visiting these:

https://www.reddit.com/r/pizzagate/comments/5dzwji/hi_i_am_the_guy_guy_2_that_hacked_wethepizzacom/

http://boards.4chan.org/pol/thread/99483242 (4chan thread about this topic, can be...hard to read becuase of all the dumbass trolls on 4chan, check this last if you are bored)

I reccomend visiting this thread: People laid it out here pretty good (as the situation was developing, this thread was made about the first guy, and might still have a link to the original guy's thread)

https://www.reddit.com/r/pizzagate/comments/5dzgif/about_the_2_gb_cp_hacker_i_dont_know_who_to/

At this point: Without a way to confirm whatever was encrypted, we have exactly zero confirmed evidence of the pizza place being implicated with the original pictures that the first guy uploaded, or the supposed other files that (might) exist.

I cannot confirm whether the first images were actually CP, but from what other comments have said in various threads.....To put it lightly...It was brutal torture and rape.

permalink

MiniLurkette | 3 points | Nov 20 2016 22:59:21

Thank you! I've read it all, and while I don't know much about the technical aspects at play here, I guess I was wondering if there were some standard sort of proof--someone mentioned screenshots, I guess?

And also just a general discussion on whether we think a pedophile ring would keep damning evidence on a front-facing website. The website going down definitely caught my attention, too. But it's also hard for me to believe that's where they would keep the evidence, though maybe there are reasons I'm not aware of.

Either way, the fact that this person truly posted CP makes this all so important to figure out--whether they are honest or just messed up people who are trolling.

permalink

coulditbe223 | 3 points | Nov 20 2016 23:04:17

So like I said, (If the second guy is to be believed) they did not put the images/files on the website, but had them stored on a harddrive at the pizza place. I assume after the first post, the back end of the website took it down becuase they (! Im speculating here) thought that someone had somehow gotten ahold of the files via the website. So , the website comes down, however that is not how they got the files (according to guy#2), which highlights the sketchiness of the whole situation because a seemingly independent website went down JUST as someone reveals this information, and like you said, REAL cp was posted(Supposedly, I did not view these pics...I'd never click that shit)

As of right now, guy #2 is actively posting, but many users are very skeptical. You can read his posts on his page: I am actively following the situation as best I can. Big revelations if it's all true.

https://www.reddit.com/user/wethepizza_the2ndGuy

permalink

MiniLurkette | 1 points | Nov 20 2016 23:07:52

Okay, so you're saying this second person's account doesn't correlate with a reason for the website being down, but we also don't have verification that person 2 is related to person 1, or that either are legit. Or maybe 1 is but not 2.

Would there be a way to prove that the hard drive was from the pizza place? I also have that tab open and am following.

permalink

coulditbe223 | 4 points | Nov 20 2016 23:13:40

You're correct in that we cannot know either account is real. The first guy did mention a second partner that they're working with. So yea. It could be

A. They're both fake accounts and are leading the entire sub on a massive waste of time. (at this point, i believe most people think option A)

B. One is real, and the other is not (whether it be guy 1 is real and guy 2 is fake, or vice versa) (this seems unlikely, but entirely possible)

or C. They're both real and telling the truth and we will find out very soon that its all true. (Doubtful, yet, extremely scary if this case)

The website (wethepizza) originally went down roughly 15-30 mins after the first post from guy #1 (where in, he claimed that he or someone got into their website and found the images/files of rape/torture etc). I watched that happen in real time, and yes the site was working fine and then suddenly went into its current state.

Someone on 4chan also posted a link to wethepizza with an admin login page, however obviously it does not go anywhere unless you have the credentials to log in. I believe that to be a cold trail anyway and the only hope we really have is if guy #2 somehow posts ACTUAL damning evidence which somehow proves correlation between pizza place and CP, OR, can prove that the photos were taken in people's houses (He stated the photos are geotagged for blackmail purposes? Who knows if true or bullshit).

So ye. Idk, At this point I'm really skeptical.

permalink

gia257 | 1 points | Nov 21 2016 02:52:09

website is up so it was just "slashdotted", I browsed their site too

the rest sounds like larping, except for the part where he allegedly got his hands on images that can land him on jail if the fbi wants to do their job, be careful with your larping people dont end up on the news ;)

Having said that, if hes for real all he has to do is release the data, all of it, that exe for instance (obv. do not execute it..., load it on an editor to analyze), if it was a honeypot then its obv a trojan. If its for real then it would find files/data ELSEWHERE and process them, outputting the monthly client list. So copying just it is sorta dumb, should analyze to find what files/data sources it tries to obtain.

permalink

debora111 | 1 points | Nov 21 2016 08:41:04

To answer your question look here https://np.reddit.com/r/pizzagate/comments/5e0kox/how_could_a_pizzagate_hacker_prove_shes_not_full/

permalink

Colek38 | 24 points | Nov 20 2016 22:23:12

Someone's going to run bruteforce on that message for 100 years just to find out hidden rick roll link in it.

permalink

CredAndBercuses | 9 points | Nov 20 2016 22:26:39

Seems like a great distraction tactic.

permalink

anotre | 4 points | Nov 20 2016 22:22:12

Oh, is that the encrypted message? Big lol. How can these guys be so hackerz and don't even know how pair encryption works?

permalink

[deleted] | 33 points | Nov 20 2016 22:30:22

[deleted]

permalink

illBoopYaHead | 11 points | Nov 20 2016 22:32:12

Be careful.

permalink

valet_bonum | 7 points | Nov 21 2016 00:07:44

If it's absolutely no trouble at all, you could just casually swing by and check to verify the name of the WiFi network the first guy posted. I mean, they could have taken it down/renamed it, or 1st guy might have been making it up. But if it turned out to be a match, that would lend the tiniest bit of evidence to a story that desperately needs it.

You're not gonna get murdered or abducted, lol. They don't stay open by gunning down customers in broad daylight.

permalink

Truthplease5 | 3 points | Nov 20 2016 23:32:11

Could be the business itself is acting normal but the site may be just (?) a sinister host - good idea to check!

permalink

p_za | 30 points | Nov 20 2016 22:25:28

too many inconsistencies in story unfortunately, still no real proof linking this guy to guy #1...

there is so much mis/dis-information going on in this subreddit now, we have definitely got some peoples attention, and I think this means we're on to something big.. keep going guys

permalink

nihilistigon | 1 points | Nov 20 2016 22:30:19

Can you link to an archive of the #1 Guy's post? Did it have any evidence?

permalink

p_za | 7 points | Nov 20 2016 22:31:47

not enough evidence, but they took their site down within 30mins of him posting so read into that what you will..

link to deleted thread: https://www.reddit.com/r/pizzagate/comments/5dykv3/i_have_cracked_into_an_unidentified_pizza/

permalink

nihilistigon | 2 points | Nov 20 2016 22:35:15

Is his post still up on this sub?

permalink

valet_bonum | 26 points | Nov 20 2016 22:18:35

Okay, well, this is either going to be earth-shattering, or extremely anti-climactic.

permalink

Xenepa | 24 points | Nov 20 2016 22:22:17

You cannot brute force it. It's encrypted to key 0x044B3E4A36FC58DA not a passphrase.

Also this message is so short its likely ~20 chars MAX.

permalink

a-SynKronus | 1 points | Nov 20 2016 23:35:12

finally :)

permalink

2penniesrus | 24 points | Nov 20 2016 22:29:38

Go back and ask for the key

permalink

grlldcheese87 | 3 points | Nov 20 2016 22:57:53

Rofl!!

This was honestly the hardest I've laughed since this shit started.

permalink

peechag8 | 21 points | Nov 20 2016 22:42:40

Troll or not, it's still weird as shit that wethepizza's website and chiefspike's website is down after OP made his announcement.

permalink

extraspoke | 2 points | Nov 20 2016 22:44:54

I know very little about these things, is it possible for someone to take down a website like that? If so then this should be an open and shut case

permalink

neverNotFlexing | 8 points | Nov 20 2016 22:46:07

WTP website didnt go down, they just put a filler message on the homepage. unless an attacker gained access to the server, we can assume that WTP altered their own website.

permalink

whatiswalnutsauce | 4 points | Nov 20 2016 23:01:01

Well, it didn't go down thought. The website was changed to a "coming soon" page. This was something done within the design of the website

permalink

whitedeer27 | 1 points | Nov 21 2016 21:06:04

Exactly

permalink

RobertRandom | 2 points | Nov 21 2016 00:00:29

Very easy, they would need to have phished their admin password (An educated guess: their username was admin@wethepizza.com)

After that, they would just need to upload a pre-made error page to the index.

This could all be easily done by anyone who knows anything about web design.

What you have to ask yourself now is: Why?

Think about how much effort would have gone into this, then think about the mind of a troll, whilst it's not unbelievable, as we know there are committed trolls, it's improbable: Why?

No troll would openly distribute child pornography on a subreddit that's drawing as much attention as this. It just makes no sense, especially when no internet protection is foolproof when you hack a server. Why would someone risk being caught, then registered as a sex offender for the rest of their life?

permalink

irufema | 1 points | Nov 20 2016 22:49:03

Maybe these trolls attacked it somehow and they made up this shitty story.

permalink

Dutch4Trump | 20 points | Nov 20 2016 22:19:28

Get guys from 4chan involved.

permalink

havoc802 | 24 points | Nov 20 2016 22:20:52

as if this isn't all over pol already

permalink

SkrubrekkerJames | 11 points | Nov 20 2016 22:22:22

It is for fuck's sake.

permalink

coulditbe223 | 4 points | Nov 20 2016 22:24:22

I dont know about encryption but from what I see people saying, unless this dude has the other part of the key, it is essentially useless as we cannot ever hope to brute force a pgp? Am I understanding that correct?

permalink

nihilistigon | 3 points | Nov 20 2016 22:35:35

Yes

permalink

coulditbe223 | 6 points | Nov 20 2016 22:38:20

Welp. This is useless then. It could be a fucking recipe for tomato sauce for all we know. Unless OP somehow redeems his proof in some other way.

permalink

Ohmz27 | 3 points | Nov 20 2016 22:51:49

The 'client list' is useless, but apparently they have CP and claim they got it from WTP. Videos of rape, some with the abusers face in apparently. And geo-tagged images of child abuse, with the geo info believed to be the houses of clients, for use as blackmail. It would make sense and would be big if all true. Not sure what the best next move is here though. Uploading and sharing the CP seems like a crappy idea.

Perhaps OP should securely upload it to multiple places, then email a summary of what they've found to multiple police departments across the US, and possibly abroad too. Include links to the securely uploaded data and explain that the passwords will be sent separately, and proof of the email has been made available to the public. Send different departments links to the data from different hosting areas for contingency/protection.

permalink

Lunnes | 5 points | Nov 20 2016 22:23:40

You can't brute force this, it would take 100 years

permalink

riverjustice | 14 points | Nov 20 2016 22:22:37

This looks like a honeypot to fuck people over... It's impossible to decrypt that without the key.

permalink

SarahAssange | 14 points | Nov 20 2016 22:23:30

At least post the pricing sheet now ! please

permalink

RIGGED_ELECTION | 14 points | Nov 20 2016 22:28:44

False alarm people. This guy is either trolling or just managed to fuck his whole life up by stealing encrypted data from the bad men.

permalink

GhostOfRobertMichels | 11 points | Nov 20 2016 22:23:19

Post the software, not an encrypted message. Otherwise, this is a waste of time.

permalink

TiddiesNBeer | 11 points | Nov 20 2016 22:45:24

CTR is on this shit like crazy lmfao. OP is doing Kek's work. Godspeed retards.

permalink

whitedeer27 | 1 points | Nov 21 2016 21:05:21

Agree

permalink

Sparkling_Poo_Dragon | 9 points | Nov 20 2016 22:25:36

This is a pretty obvious troll.

permalink

irufema | 9 points | Nov 20 2016 22:25:46

we will do this, we will do that... I can't figure this out and I don't know what to do, help!

LOL.

permalink

gammavice | 8 points | Nov 20 2016 22:18:17

I am a skeptic.

permalink

havoc802 | 8 points | Nov 20 2016 22:36:08

Disregard, it's nothing. What happened to the pdf that one of you two has seen? It's suddenly encrypted?

permalink

that_70s_kid | 8 points | Nov 20 2016 22:41:27

this has to be a setup for disinfo. I can see the media picking up this "story" and therefore discrediting everything else that has been achieved here.

It would be enough to have 'joe public' disassociate.

permalink

youwillnotgetaway | 8 points | Nov 20 2016 22:44:53

why is it being tainted by a "honeypot/hoax" heading? That may be true but we dont need your influence to lead us to a conclusion.

permalink

Lunnes | 7 points | Nov 20 2016 22:23:08

Can't brute force this, it's useless without a key. I thought your Guy #1 had seen the names and everything why don't you have this information ?

permalink

illBoopYaHead | 7 points | Nov 20 2016 22:23:37

You can't bruteforce PGP.

permalink

Xenepa | 4 points | Nov 20 2016 22:26:32

Or to be precise: one that's encrypted to proper key. If it was using symmetric encryption it would be possible (and only if they used eg. "password" password).

They use some openpgpjs which is almost certainly bad implementation, due to lack of proper entropy source for example, but unless someone knows a VERY serious vulnerability in the implementation (eg. IV set to 000's for all messages) its impossible to break anyways.

permalink

Escape_TheMatrix | 7 points | Nov 20 2016 22:29:45

Why not post the client list and the price list you supposedly found? you're not making any sense here. and now you ran a program in a virtual machine and all it does is return a PGP encrypted message? Either post the client list and price list and all the other stuff you found, even the program that returns a PGP encrypted message. or you are basically confirming you are full of shit.

permalink

templeofluxor | 7 points | Nov 20 2016 22:39:25

guys we fucking knew before the shills would come to try and screw with us. we fucking know they have connections to wethepizza. have you ever thought its them doing this to fuck with us, honeypot a few, make it look like they rushed to clean out their website, then have us exhaust ourselves with new leads. fuck you op. you will die like the rest of us.

permalink

whatiswalnutsauce | 2 points | Nov 20 2016 22:44:22

Thought maybe We the Pizza could be involved, if CTR were common customers couldn't they all just be doing this as a hoax?

permalink

templeofluxor | 6 points | Nov 20 2016 22:28:35

you are a legitimate fuck. is this honestly amusing to you? if your conscience isnt already dead, i hope this haunts you.

permalink

androssfox | 6 points | Nov 20 2016 22:31:43

If the first guy wasn't disinfo this one sure seems like it lol

permalink

Tha_Dude_Abidez | 6 points | Nov 20 2016 22:35:20

I'd say he was a troll but if he is he's fucking nuts with what he posted. Also, they did take their website offline.

permalink

anotre | 5 points | Nov 20 2016 22:19:22

So, where is the file?

permalink

wethepizza_the2ndGuy | 0 points | Nov 20 2016 22:22:58

That is the PGP message. We either need the private key to decrypt it (or someone to bruteforce the passphrase). I am 100% certain within that PGP message is this month's clients list.

Let's ask these guys for help: https://www.reddit.com/r/GPGpractice/

permalink

Xenepa | 15 points | Nov 20 2016 22:30:23

It's not a list, it's far too short. In fact encrypting a word "test" yields a pgp message that has 886 characters. Your message has 744.

If I encrypt some fake list, for example

1,e2b2ba@gmail.com
2,b4b8b4@gmail.com
3,0e676c@gmail.com
4,93d625@gmail.com
5,14d725@gmail.com
6,7e8575@gmail.com
7,0a4f46@gmail.com
8,e9f9d0@gmail.com
9,d22e06@gmail.com
10,6d7ac3@gmail.com
11,aea8b5@gmail.com
12,c5babf@gmail.com
13,112d55@gmail.com
14,32adcf@gmail.com
15,426ed9@gmail.com
16,0927b5@gmail.com
17,dd1253@gmail.com
18,1029f6@gmail.com
19,0af69d@gmail.com
20,f850de@gmail.com

that list would yield a PGP message that is 1113 chars long. And from this point it will only grow in size.

permalink

VaskatKontoNummer1 | 3 points | Nov 21 2016 01:13:04

Bet you it only says "42".

permalink

benedius | 1 points | Nov 21 2016 06:27:39

I just encrypted your list in GPA and it came to 722 characters.

"test" creates a 522 character long message.

This might vary based on platform to some degree, but if my tests aren't erroneous somehow, it would indicate that there MIGHT be some data of substance in the message. Of course, actually decoding it is impossible so this is all for naught.

permalink

Xenepa | 1 points | Nov 21 2016 09:15:25

Interesting. I did it using normal gnupg2 and effects were as in my previous post. Did you use -a (armor) option?

permalink

benedius | 1 points | Nov 21 2016 10:14:11

I think I figured out the discrepancy, I was just encrypting it against a public key and was not signing it with my own private key as well. Signing the message brings the character count to 1196.

A distribution model like this would involve the communications being signed most likely, as opposed to re-encrypting the message against a number of recipients public keys. So yeah, unless they're doing it really weird you totally got a point.

permalink

wethepizza_the2ndGuy | -3 points | Nov 20 2016 22:36:07

Tested your theory, and it's wrong. But I think I found where it's sending (unencrypted the private key!)

permalink

neverNotFlexing | 35 points | Nov 20 2016 22:40:45

"unencrypted the private key" is a nonsense sentence from a technical perspective.

the only thing giving guy1 credibility was that WTP website went down after he came public. you havent even proven any connection to guy1 and the technical shit you're spewing out is completely wrong/nonsensical.

permalink

PuffyHerb | 3 points | Nov 20 2016 22:43:49

Yea I was skeptical to begin with, now even moreso. Sounds more like he is trying to rope people back in by a magic discovery. But I hope I'm wrong and that he posts something real (the encrypted file, or the .exe even). Something we can get to work with.

permalink

wahoosjw | 1 points | Nov 20 2016 22:45:06

Yep, but these guys said they aren't techs and have no pgp experience.

permalink

neverNotFlexing | 3 points | Nov 20 2016 22:49:18

Funny that with no pgp experience he's claiming to have "unencrypted the private key" which makes no sense because private keys will be stored as is depending on what pgp client is used (exported as plaintext).

permalink

eM_aRe | 1 points | Nov 20 2016 23:58:01

If english is his second language this mix up seems plausible. "The private key unencrypted" makes plenty of sense. Especially when talking about a program transmitting shit.

permalink

eM_aRe | 1 points | Nov 20 2016 23:54:18

"Transmitting the key in clear text" is the phrasd i assume he was looking for.

permalink

valet_bonum | 21 points | Nov 20 2016 22:47:13

100% done with you. I was a big believer at the beginning of the day, and I'm a sucker.

  • First, your friend supposedly hacked the WiFi network.
  • Then, it was actually you who got a tip from an intelligence agency, and social kung-fooed your way into getting a 2 GB USB stick with proof on it.
  • Then, you have a "client list" which is actually just a tiny block of forever encrypted nothing.
  • Then, you actually cloned their hard drives (which would OBVIOUSLY require more than 2GB of memory)
  • Now, you've found out "where it's sending" (UNENCRYPTED THE PRIVATE KEY!)
  • And for some reason, you won't share any of this. Not the key, not "where it's sending", not a screenshot of the cloned machine, not a torrent of the image, nothing.

You're a troll, and you're dragging this out for lulz. Shame on you for using a fictitious, morbid story to manipulate a genuinely concerned community.

permalink

Sparkling_Poo_Dragon | 7 points | Nov 20 2016 22:37:20

wow amazing

post it

upload fucking something

permalink

Xenepa | 4 points | Nov 20 2016 22:37:35

It's not a theory. And what private key and how did you decrypt it?

permalink

bonejump | 4 points | Nov 20 2016 22:39:29

It would be helpful if you could provide screenshots, and maybe some other files/whatever that you've managed to copy from their disks.

permalink

GhostOfRobertMichels | 6 points | Nov 20 2016 22:41:15

He doesn't have anything, and an encrypted message (one encrypted with a noob-friendly web-based client, at that) is the best he can forge.

permalink

GhostOfRobertMichels | 3 points | Nov 20 2016 22:39:47

No it's not. The length of an encrypted message typically reveals the length of the plaintext message.

permalink

coulditbe223 | 2 points | Nov 20 2016 22:41:34

Please post something relevant and damning, or I fear the entire sub will lose faith. I understand you're under duress right now. Buy you really need to step this up to the next level, or this entire thread may be deleted and everyone will forever disbelieve your claims.

permalink

Lunnes | 2 points | Nov 20 2016 22:43:34

Pack it up boys, we're done here.

permalink

p_za | 1 points | Nov 20 2016 22:41:30

'theory'?

permalink

nihilistigon | 11 points | Nov 20 2016 22:26:32

Dude stop. You have no idea how encryption works. You don't "brute force" encryption. Either you have the private key or everything is useless. Answer this: how do you know what is in these files if they are encrypted? Post proof of that or else you are wasting everyone's time.

permalink

eM_aRe | 1 points | Nov 21 2016 00:00:08

He asked to brute force a passphase. That shit happens all the time. Encrypt a bitcoin wallet with a shitty passphase and it will be insta cracked

permalink

nihilistigon | 3 points | Nov 21 2016 00:41:56

A PGP private key is not a passphrase.

permalink

LazeyJ | 8 points | Nov 20 2016 22:24:30

Have you tried sharing this through 4chan I am of no assistance here...

permalink

thispizzaiswhack | 6 points | Nov 20 2016 22:26:56

its up on chan

permalink

that_70s_kid | 3 points | Nov 20 2016 22:38:52

could you please link?

permalink

coulditbe223 | 3 points | Nov 20 2016 22:42:40

Here is a link to a newer thread. So far I have seen 4+ threads (4 that were archived from being too large) http://boards.4chan.org/pol/thread/99483242

However, you're not missing alot. most of the comments are typical 4chan troll people saying stupid shit, or responding to the stupid shit with more stupid shit.

maybe 1 in 10 comments is worth reading.

You know how these things go.

permalink

thispizzaiswhack | 1 points | Nov 20 2016 22:41:41

http://boards.4chan.org/pol/thread/99481347

permalink

anotre | 8 points | Nov 20 2016 22:26:08

You do realize that different passphrases generate different files right?

That's the idea of a key-pair encryption.

You can't just expect to "hack" it to an unecrypted state if you can't confirm later that the state is indeed true.

Cracked passphrase "onepass" could give info on "Cheryl"

Cracked passphrase "anotherpass" could give, on the same bits, info on "Rotteo"

This is, it is unhackable so to say.

EDIT:

To further explain for those non-tech savvy, there is not such a thing as "DING DING DING": File cracked because the computer has no idea what you are looking for.

You could input password "inr3q3o2" and the computer would tell you

"with that I got Dogebrnaamentifmen for line 22 of the file"

or you could input password "akfmaemfnaE22" and the computer would tell you

with that I got Bill Clinton for line 22 of the file"

But the computer does not know what you want to have or what makes sense . The only "impossibility" for this would be to have a computer analyse every possible file unecrypted for every possible password with the computer knowing what you want to look at .

You will have to wait for quantum computing for such a thing.

permalink

Xenepa | 2 points | Nov 20 2016 22:40:41

Actually gpg WILL tell you if you got proper passphrase or not. Some checksum I suppose.

In this case, it will tell you about missing secret key and thats about it.

permalink

anotre | 1 points | Nov 20 2016 22:46:56

It would, considering the file is only under a layer of encryption... Otherwise the checksum will have false positives.

Anyway, bruteforcing this is pretty impossible but OP found a workaround apparently

permalink

Xenepa | 1 points | Nov 20 2016 22:55:35

No, gpg will always tell you if the password is correct or not. I do not care enough to find the exact technical data on how it assures that, but finding collision would be likely as hard as actually cracking the decryption.

To demonstrate, take this message:

-----BEGIN PGP MESSAGE-----
jA0ECQMCY3bcehzzQCPh0lYBBsMtbShvnivFl0+6mciBgXNnIrYQcs1CXBwgbGC3
QhQKGdLqHz50cbkd2bo7RmXpeGE3gSvvddShIi/WcowRa+xXun/Q9aijx+u1s8xs
hFRg8bRJ0g==
=H8oS
-----END PGP MESSAGE-----

Try decrypting it (gpg -d message.asc) with various passwords. Then try "hello" as a password.

It doesn't matter what's inside. Can be binary, can be another decrypted file. You will know if it's good or not.

permalink

coulditbe223 | 1 points | Nov 20 2016 22:44:23

So essentially, the only REAL way to unencrypt the messaage, is to know for a FACT what the original key was, which unveils the message. yes?

permalink

illBoopYaHead | 7 points | Nov 20 2016 22:25:02

What makes you so certain it's this month's client list?

permalink

BasedPolarBear | 3 points | Nov 20 2016 22:26:09

Do you have anything else but this? This is impossible to bruteforce.

permalink

GhostOfRobertMichels | 3 points | Nov 20 2016 22:28:46

To repost what I said elsewhere in this thread:

"[T]hat's a pretty small client list, provided it is one. We're talking about encryption here, not compression. We can still get a rough idea of the length of the plaintext by looking at the encrypted message. This is quite short."

permalink

thispizzaiswhack | 2 points | Nov 20 2016 22:28:07

dude, what else u got? this is almost imposs to brute

permalink

trabidius | 4 points | Nov 20 2016 22:44:57

I hate that this person is probably the real definition of a shill. Distracted us for a good chunk of time. I wonder what from.

permalink

[deleted] | 4 points | Nov 20 2016 22:45:01

[deleted]

permalink

SarahAssange | 3 points | Nov 20 2016 22:20:36

is there any nerd subreddit we can submit this to ?

permalink

havoc802 | 3 points | Nov 20 2016 22:24:15

it wouldn't be on reddit, like it or not this whole site is censoring anything they don't like so all the best people who want to discuss controversial topics have moved elsewhere. This isn't something some nerd can just decrypt by the way.

permalink

demos74dx | 1 points | Nov 20 2016 22:54:12

Contact the EFF?

permalink

TedsEmporiumEmporium | 3 points | Nov 21 2016 00:34:52

For fuck's sake this is so transparently fake.

permalink

[deleted] | 2 points | Nov 20 2016 22:21:47

Don't think anyone here would have the means to crack a PGP encryption unfortunately. Tons of respect to your efforts OP, these are uncharted territories for sure.

permalink

Beneficial1 | 2 points | Nov 20 2016 22:31:06

Fuck man, this was exciting now I dunno, frustrating for one.

permalink

muzgmen | 2 points | Nov 20 2016 22:44:02

I can't believe how gullible people can be.

permalink

youwillnotgetaway | 2 points | Nov 20 2016 22:51:28

Do you all really think picking We the Pizza would be a good place to pick to troll??? Theyre a block away from the capital and all the pieces connect to people implicated in child kidnap/slavery..

permalink

manly_ | 2 points | Nov 21 2016 00:10:53

You can't brute force pgp. No really. It's purposefully using keys containing more possibilities than the number of atoms in the universe. If it could be cracked it would be completely useless.

permalink

RobertRandom | 2 points | Nov 21 2016 00:43:58

So

permalink

manly_ | 1 points | Nov 21 2016 01:17:24

Well, technically you could get the luck of gods and just land on the private key right away.

Typical 8192 bits key 2 ^ (8192) = 109,074,813,561,941,592,946,298,...,997,186,505,665,475,715,792,896 (2,467 digits)

That's how many combinations there are. It would easily take the heat death of the universe using every computer on the planet to not even process 1% of the number of combinations.

permalink

RobertRandom | 1 points | Nov 21 2016 01:27:04

But OP said we could brute force it, we all know an OP can't lie; that's forbidden ..

Also, thanks for confirming my suspicion with actual empirical evidence.

r/theydidthemath

permalink

sheik_yerbouti_jr | 2 points | Nov 21 2016 00:25:44

This is utter bullshit. This isn't even a honeypot, it's childish trolling.

First they "stole 2GB of data".

Then the webserver went down - what does it have to do with the "windows xp" at the pizza place? The webserver is in Texas. This could be completely coincidental.

Now they are talking of an "exe" with the client list.

Nothing makes sense here.

permalink

DonaldTrump45thPOTUS | 1 points | Nov 20 2016 22:34:59

Liar!

permalink

pizzathrowaway777 | 1 points | Nov 20 2016 23:02:56

UPDATE

The level of incompetence in this "hack" is extremely concerning. I am not sure what OP was trying to accomplish, but without the private key this is useless

Please provide all of the data/files/html as evidence to MULTIPLE PDs (local or otherwise including the NYPD) before posting on the internet. You need to protect yourself, and establish a chain of evidence. Contacting an attorney is also very critical. If you do not have an attorney, get one asap.

If you do provide "evidence" on the web do it in an encrypted dump in bittorrent, all users should be careful and protect themselves, this could be a honeypot

No one cry wolf without validating OP's "evidence". Bringing false leads to the authorities is a surefire way to lose all credibility for this sub.

edit: Other users have pointed out, with good reason that local PD alone may be complicit and may not be the course of action. Simply linking on the internet is not how you bust these people though. You need to get as many eyes on the evidence as possible and make sure they understand you want to establish a chain of evidence and that your life is in danger.

edit2: added request for encrypted bittorrent dump, and piece about false reporting to authorities

edit3: contact attorney

permalink

spontaneousspectator | 1 points | Nov 20 2016 23:20:04

Their website went down now it's back up with the supposed hack spot now removed.

permalink

TQQ | 3 points | Nov 21 2016 00:18:03

what WAS the supposed hack spot?

permalink

InvestigatePizzaGate | 1 points | Nov 21 2016 03:16:39

SPAM @h3h3productions twitter to INVESTIGATE #PizzaGate They have a mass audience on Youtube and can wake up many people #HELP

permalink

J_O_N_Y_ | 1 points | Nov 21 2016 06:13:23

remove all of these threads. they are a derail and a waste of time. be smart

permalink

FateBender | 1 points | Nov 21 2016 10:20:37

In my opinion this is real because no sentient being would be stupid enough to endanger themselves legally so much by posting CP just to troll some deplorables on Reddit and 4chan. Just my 2ยข

permalink

aLi3nZw00t | 1 points | Nov 21 2016 10:27:28

Well, it is quite a disappointing and frustrating development.

Quite a lot of incompetence and failed promises. If he is in fact seeding on torrent, why not even post a link to the torrent?

permalink

FateBender | 1 points | Nov 21 2016 10:32:10

No idea. However, if he's not their plant sent to intentionally discredit this sub, he'll pay for it because spreading CP is illegal. The only one that's going to get trolled is him :)

permalink

that_70s_kid | 0 points | Nov 20 2016 23:01:20

I bet this makes it to the NYT tomorrow. The timing is pretty spot on.

permalink

_PizzaGate_ | 0 points | Nov 20 2016 23:02:44

Oh, hello James Alefantis... nice try trying to keep us from researching ur pizzeria... hahaha

permalink

safetythrowaway1234 | 0 points | Nov 20 2016 23:09:27

nice try...James Alefantis... (yes, i know it's not actually him)

permalink