NerdyNoodle

But there is no reason someone can't get the WL torrents and then try the keys in the key file.

I am not enough of an expert to attempt this myself.

In fact it is all just mumbo jumbo to me.

NerdyNoodle

No I really really want someone to try this on a throwaway computer. I don't have the expertise nor the spare computer to try it.

There is a slight chance this is real. The first two hashes in the hash file are checksum hashes to verify a file's authenticity. These were tweeted out to Wikileaks by User @TuringThe2nd on October 17th & 18th according to this page.

http://archive.is/MaPga

NerdyNoodle

Nope, tried to download veracrypt and it contained a virus. If someone wants to download it and run it on a throwaway computer maybe it has the insurance files built in. But far far far more likely, this is the work is an adolescent LARPER with a worm to spread.

Annon365

I smell BS