UPDATE: We are monitoring things with Julian Assange, but accidentally reported that Assange had been removed from the Ecuadoran embassy. This has not been confirmed.
A strange code was tweeted by WikiLeaks. I had no idea what it was, so I followed the WikiLeaks threads. It appears that a kill order may have been put out on Julian Assange.
According to some this is an authentication code that the communiques coming are indeed real. Further, if something were to happen to Julian Assange, say a kill order executed, then a document dump will happen automatically.
pre-commitment 1: John Kerry 4bb96075acadc3d80b5ac872874c3037a386f4f595fe99e687439aabd0219809
— WikiLeaks (@wikileaks) October 16, 2016
Remember who “jokingly” said, [pp] “Why don’t just drone Julian Assange?” Perhaps Hillary Clinton wasn’t joking!
Is Biden's Vaccine Mandate Unconstitutional?
Trending: Poor Hillary! She’s the TRUE Victim
When I went back to Twitter, there were different codes for the UK, Ecuador, and so on. Ecuador is important, as that is where Julian Assange is currently under asylum.
its a dead mans code. if something happens to wikileaks it will free all documents into the system.
— Liz 4Real (@AwakenOne16) October 17, 2016
— Yarnie ???? (@TweetingYarnie) October 17, 2016
This communique from “Anonymous” is perhaps the most disturbing.
Let’s see if WikiLeaks decides to speed up a few more leaks that lead to the downfall of Hillary Clinton. Who knows, as the scandals seem to have more arms than a hydra.
From a friend:
Wikileaks tweeted out 3 tweets with encryption. Encryption keys or hashes are to prove docs haven’t been altered from now to release. It’s basically a key that proves the unadulterated provenance of a file!
Whats a hash value?
It is a “fingerprint” of a file or text string that is easy to compute if you have the source content, but impossible to reverse.
Example: the SHA265 hash for “Make America Great Again” (without the quotes) is 10672cb3457840cd94be313e91691ce3017095c4eb917a111f537943ec2624c9. It is impossible to retrieve the original information just from the hash (except for simple words with few characters), but it is very easy to verify that the original string or file is indeed some given hash.
The hash values posted by Wikileaks could be used in two ways:
there is some sort of leak being released in the next few days and those hash values belong to those files. That way anyone who downloads that release can calculate the hash for that file and verify they its the real deal and the release has not been messed with (if a single bit is changed in the archive, it results in a entirely different hash value)
it could be some statement that was hashed. It contains knowledge/proof of something. For Example, if he releases the hash of the string: “Hillary Clinton killed Scalia” (again, without the quotes)… he can later proof that he already had written this string at the time he released the hash value.
Again: the hashes itself are not some encrypted message. Also, they are not a “key” for anything. They are proof/verification for something upcoming.
BRING IT ON LIBERALS! Julian has you beat!
If you like what you read here, then SIGN-UP to get our posts sent directly to your INBOX! We promise to provide information, insight, and a few chuckles. Also, YOU will be supporting a FEARLESS CONSERVATIVE WARRIOR!