UPDATE: Assange Safe in Embassy; Call Tweet a Hoax

UPDATE: We are monitoring things with Julian Assange, but accidentally reported that Assange had been removed from the Ecuadoran embassy. This has not been confirmed.

A strange code was tweeted by WikiLeaks. I had no idea what it was, so I followed the WikiLeaks threads. It appears that a kill order may have been put out on Julian Assange.

According to some this is an authentication code that the communiques coming are indeed real. Further, if something were to happen to Julian Assange, say a kill order executed, then a document dump will happen automatically.

Remember who “jokingly” said, [pp] “Why don’t just drone Julian Assange?” Perhaps Hillary Clinton wasn’t joking!

take our poll - story continues below

Should Jim Acosta have gotten his press pass back?

  • Should Jim Acosta have gotten his press pass back?  

  • This field is for validation purposes and should be left unchanged.
Completing this poll grants you access to The Black Sphere updates free of charge. You may opt out at anytime. You also agree to this site's Privacy Policy and Terms of Use.

Trending: Hillary Panicked After New Federal Court Ruling

When I went back to Twitter, there were different codes for the UK, Ecuador, and so on. Ecuador is important, as that is where Julian Assange is currently under asylum.

 

This communique from “Anonymous” is perhaps the most disturbing.

wikileaks-authentication-codes

Let’s see if WikiLeaks decides to speed up a few more leaks that lead to the downfall of Hillary Clinton. Who knows, as the scandals seem to have more arms than a hydra.

From a friend:

Wikileaks tweeted out 3 tweets with encryption. Encryption keys or hashes are to prove docs haven’t been altered from now to release. It’s basically a key that proves the unadulterated provenance of a file!

Whats a hash value?

It is a “fingerprint” of a file or text string that is easy to compute if you have the source content, but impossible to reverse.

Example: the SHA265 hash for “Make America Great Again” (without the quotes) is 10672cb3457840cd94be313e91691ce3017095c4eb917a111f537943ec2624c9. It is impossible to retrieve the original information just from the hash (except for simple words with few characters), but it is very easy to verify that the original string or file is indeed some given hash.

The hash values posted by Wikileaks could be used in two ways:
there is some sort of leak being released in the next few days and those hash values belong to those files. That way anyone who downloads that release can calculate the hash for that file and verify they its the real deal and the release has not been messed with (if a single bit is changed in the archive, it results in a entirely different hash value)

it could be some statement that was hashed. It contains knowledge/proof of something. For Example, if he releases the hash of the string: “Hillary Clinton killed Scalia” (again, without the quotes)… he can later proof that he already had written this string at the time he released the hash value.

Again: the hashes itself are not some encrypted message. Also, they are not a “key” for anything. They are proof/verification for something upcoming.

BRING IT ON LIBERALS! Julian has you beat!

 

 

 

 

Join the conversation!

We have no tolerance for comments containing violence, racism, profanity, vulgarity, doxing, or discourteous behavior. If a comment is spam, instead of replying to it please hover over that comment, click the ∨ icon, and mark it as spam. Thank you for partnering with us to maintain fruitful conversation.