"It appears each line of the "poem" for "I Ask Papacy" is some sort of puzzle. I'm not sure if they're all anagrams or a mixture of anagrams and clues. I wonder if the final password is also the first letter of each decoded line"
This was the very first thought I had when I started reading your post.
Excellent work pede, I shall take a look when I get to work and also spread the clues around my colleagues (without telling them what they are solving ;) )
I've been trying to get to pgp key stores but my company firewall is blocking me.
Is anyone able to check to see if the emial address for Isaac comes up with any stored keys?
BTW I read the bit about the wikileaks public key being available, but no private key. Note: pgp is symmetric. You can decrypt a file with the public key if it was encrypted with the private key.
It certainly points that way, so we are probably right to assume all the other lines are clues.
For example, the one about folding space? That's from Frank Herbert's 'Dune' series, the Guildsman were humans that have become mutated by the spice melange to fold space, i.e. moving, without moving.
KJV 2 Kings 23:10: And he defiled Topheth, which is in the valley of the children of Hinnom, that no man might make his son or his daughter to pass through the fire to Molech.
Easy to see, just a reminder to what this is all for.
Ok now its even more clear why they went after Assange so hard. Yes he has been a pain for them. However with those files Wikileaks can take down the entire system
The password is known. The password, as presented, has been verified by matching the string to the hash. That's how we know it's the password.
I'm getting the feeling you don't know how one-way encryption/hashing works.
Actually, what's weird about this is that the hash is equivalent to the password as far as decryption is concerned. If you know the hash you can get in. Posting/finding the password becomes irrelevant.
You're not making sense. The "key" is the password. The hash is what you get when you put the password through a specific hashing algorithm.
The hash is what's missing from the encryption key that resides in the file. Once you provide the password, the hash is generated, and provided to the file. If it is correct, the contents can be decrypted.
The password is known.
If you had the file on your computer and tried to open it are you saying you believe you don't know what to type into the field? Are you saying this string that's been provided by Lin is NOT the password that decrypts the file even though it's called out as being the password?
While I think the truth must be found out i would never ever attempt to decode these files man. First of all all the illegsl traumatic disgusting shit in there and also you would have to worry about getting killed or kidnapped by secret agents any minute
Five Star Trust — MonkeyWerx
Search domain www.monkeywerxus.com/blog/five-star-trusthttps://www.monkeywerxus.com/blog/five-star-trust
The objective of the Five Star Trust was to setup the largest drug and money laundering system the world had ever seen. It was called Operation Studebaker and Operation Clean Room (these were the money laundering systems). This was run out of Kentucky by a gentleman named Marion Horne.
Silicon valley is modeled after Crassus = Triumvirate
Marcus Licinius Crassus, (born c. 115 BC—died 53), politician who in the last years of the Roman Republic formed the so-called First Triumvirate with Julius Caesar and Pompey to challenge effectively the power of the Senate. His death led to the outbreak of the Civil War between Caesar and Pompey (49–45).
yeah, reading that image posting reveals I am a long way behind the curve. Still, I'm locked up in my home even though I committed no crime, so I might as well take a look.
This is the part of the movie where we need the cute, nerdy, chick back at headquarters to take a look “ and see what she finds’
Yesssss!
Too much NCIS for you
"It appears each line of the "poem" for "I Ask Papacy" is some sort of puzzle. I'm not sure if they're all anagrams or a mixture of anagrams and clues. I wonder if the final password is also the first letter of each decoded line"
This was the very first thought I had when I started reading your post.
Excellent work pede, I shall take a look when I get to work and also spread the clues around my colleagues (without telling them what they are solving ;) )
I've been trying to get to pgp key stores but my company firewall is blocking me.
Is anyone able to check to see if the emial address for Isaac comes up with any stored keys?
BTW I read the bit about the wikileaks public key being available, but no private key. Note: pgp is symmetric. You can decrypt a file with the public key if it was encrypted with the private key.
I just came across these tweets recorded from Lin Wood, and the phrase used looked to be along the same lines as the 'cultstate' password phrase..
https://i0.wp.com/steverotter.com/wp-content/uploads/2021/01/Arrests-and-Executions-of-famous-people.png?resize=720%2C424&ssl=1
I was digging around the site and I think the files are in a bucket referenced somewhere in here: https://web.archive.org/web/20200930210315/https://github.com/Emblem21-OpenSource/wasabi-store-sdk
file isn't a truecrypt volume and it doesn't work with openssl. Openssl files start with "salted' in the file and that isn't there.
looks like it is a gpg file.. passwords don't work :(
alright. calling it quits. this isn't going anywhere.
after some digging, emblem21 appeared to be a github repository that is no longer active, at least that's what the url pointed at
edit: and yes, it was linked in my searches to patrick ryan. there is a nitter account for cultstate.com
It certainly points that way, so we are probably right to assume all the other lines are clues.
For example, the one about folding space? That's from Frank Herbert's 'Dune' series, the Guildsman were humans that have become mutated by the spice melange to fold space, i.e. moving, without moving.
So is this puzzle resolved? The 4pleb thread about this kinda dropped off. I'm wondering if I should throw in my time trying to crack this?
Pi as kapacy.
KJV 2 Kings 23:10: And he defiled Topheth, which is in the valley of the children of Hinnom, that no man might make his son or his daughter to pass through the fire to Molech.
Easy to see, just a reminder to what this is all for.
Thank you for jump starting this.
STICKY
Ok now its even more clear why they went after Assange so hard. Yes he has been a pain for them. However with those files Wikileaks can take down the entire system
Make sense
No, it if they password. That password matches the hash that represents the password. It is the password.
The problem is not the password. It's the files. No one knows who has them.
Yes. This is already known.
The password is known. The password, as presented, has been verified by matching the string to the hash. That's how we know it's the password.
I'm getting the feeling you don't know how one-way encryption/hashing works.
Actually, what's weird about this is that the hash is equivalent to the password as far as decryption is concerned. If you know the hash you can get in. Posting/finding the password becomes irrelevant.
You're not making sense. The "key" is the password. The hash is what you get when you put the password through a specific hashing algorithm.
The hash is what's missing from the encryption key that resides in the file. Once you provide the password, the hash is generated, and provided to the file. If it is correct, the contents can be decrypted.
The password is known.
If you had the file on your computer and tried to open it are you saying you believe you don't know what to type into the field? Are you saying this string that's been provided by Lin is NOT the password that decrypts the file even though it's called out as being the password?
While I think the truth must be found out i would never ever attempt to decode these files man. First of all all the illegsl traumatic disgusting shit in there and also you would have to worry about getting killed or kidnapped by secret agents any minute
How did u know to look at the poem? This is awesome. I know it's an isaac anagram but how did someone have this poem on their radar? So curious
Saw this weeks ago. Figured out the I Ask Papacy part but the rest is out of my area of know anything lol
You're no gonna like the truth! And they will remove it here instantly
Can someone fill me in in smooth brain terms?
I’m gathering that we have the key, just not the lock
Here it is. Let’s go.
Also, I was looking for emblem 21. It was mentioned in a GitHub repo by Patrick
https://github.com/emblem21-opensource
Can’t add much really but fold space sounds like the einstein-Rosen bridge to me/time travel through creation of a wormhole, achieved by folding space
How many stars are needed to build trust? Five
Five Star Trust
Five Star Trust — MonkeyWerx Search domain www.monkeywerxus.com/blog/five-star-trusthttps://www.monkeywerxus.com/blog/five-star-trust The objective of the Five Star Trust was to setup the largest drug and money laundering system the world had ever seen. It was called Operation Studebaker and Operation Clean Room (these were the money laundering systems). This was run out of Kentucky by a gentleman named Marion Horne.
The paradox of fermi is our only hope = SETI???
Search for Extraterrestrial Intelligence??
https://waitbutwhy.com/2014/05/fermi-paradox.html
Second kings twenty three ten = Molech??
2 Kings 23:10
New King James Version
And he defiled Topheth, which is in the Valley of the Son of Hinnom, that no man might make his son or his daughter pass through the fire to Molech.
Oprah Winfrey and the Mediterranean
https://www.tmz.com/2015/08/07/oprah-gayle-billionaire-yacht-vacation-photos/
The Rising Sun?? or Eclipse??
Thanks, I'm still looking :-) .....
Silicon valley is modeled after Crassus = Triumvirate
Marcus Licinius Crassus, (born c. 115 BC—died 53), politician who in the last years of the Roman Republic formed the so-called First Triumvirate with Julius Caesar and Pompey to challenge effectively the power of the Senate. His death led to the outbreak of the Civil War between Caesar and Pompey (49–45).
https://www.britannica.com/biography/Marcus-Licinius-Crassus
Shit. You know you want to see it but you also know your regret it
There was another series of insurance files just posted on greatawakening. Maybe it's one of those files instead ?
take the last letters of the poem lines
and use that to make the hash
This has all the feeling of a dog chasing its tail. Seems like when this file is opened it’s gonna be this in a loop. https://youtu.be/dQw4w9WgXcQ
It's not a larp.
Just paste Lin's password into a SHA512 generator and it matches the hash that Isaac posted before his death.
So the files ARE located now but nobody tried the PW? Maybe im behind? Lol i did do a beer run so possibly missed some action
Aaahhh ok ok. I didnt initially realize that poem is right there on that site
Oh ok. Guess im most confused about how they, or you, were led to that exact poem
Guess im jealous someone saw that so fast? Lol. Thanks!! Usually i can figure it out but this had me not thinking of the totally obvious
Bye 48 day old account glowie.
Me thinks thou doth protest too much.
Oh my the glowie farmed for fake internet points so he thinks he's people.
That's cute.
yeah, reading that image posting reveals I am a long way behind the curve. Still, I'm locked up in my home even though I committed no crime, so I might as well take a look.
Sometimes the obvious can be overlooked.