maltespier

Wikileaks claim that they are under attack and unable to broadcast, why would they not just release a pre-recorded video of Assange discussing this latest leak?

Weightstone

7 is considered God's (hebrew: YHWH or Jehovah) number or Gods perfect number.

thisHoCwilltumble

yes, but there is thought it may have been compromised.

FuckReddit69

good catch. 7 7 7. this might be code for: we're throwing you guys a bone.

crystalclearme

And I would hope- and am absolutely willing to do the same for others who download it- we would have each other's backs, right? No there is safety in numbers and I am ready to go and seeding it now

SickofRedditsShit

I'm not afraid. These pedo fuckers are pussies. I'm a real man. We will destroy them.

pizzagater99

I wonder how many 0-day exploit are in that 7zip file

r3dtr1x

0

EndThePizza

Think about it. If YOU'VE been compromised, even by accident, why can't Podesta claim the same?

Because he'll be the one in the videos? Lol

Oldno7

CAUSE ALL MY O-FACES THE NSA HAS ON FILE ARE FROM NORMAL GROWN ASS MAN PORN! hahahaha

r3dtr1x

I ain't scared. Downloaded and ready to put in the password. Game on! I EVEN DID IT BARE IP WITH NO DISK ENCRYPTION!

ciitizenone

Same. Anyone wanna come knock on my door I'm just gonna pull my dick out and stare em down.

LostandFound

Badass how large is download?

r3dtr1x

515 megs or so

LostandFound

Ta

awarenessadventurer

I COULDNT AGREE MORE. any naysayers are naive. Just look at twitter... people downloading left and right with no idea whatsoever what they are doing. (like me, therefore I will NOT download)This is the perfect cover for the evil ones. Haters STFU. this is correct logic.

alanna

I worry it's a set up too. Time specific. Seems out of the ordinary for wikileaks

EricVikingurr

Sounds like a threat not a warning.

dougG

Oh man, you guys need to get out of the house more

4thDaGrymReaper

Learn how to use virtual machine software children. ---"Thanks Chef"

Psalm144-1

From the Wikileaks website in regards to the FRENCH ELECTIONS.... "The revelations are contained within three CIA tasking orders published today by WikiLeaks as context for its forth coming CIA Vault 7 series" Are we being played?

https://wikileaks.org/cia-france-elections-2012/

r3dtr1x

The media has started reporting that the Russians are pulling the same election interference crap in France - so even if it's stuff about the French election, if it proves the CIA is trying to frame Russia for election interference in France, it could very well open the door to proving the Trump-Russia connection is absolutely false.

TRUTHWARRIOR

I was thinking the exact same thing the major news outlets if they choose to download the file or other professional researchers should have the resources and the insurance in the ways to do this then of a small-time people have and we would be wise to let them report on what they find versus try to download something completely unknown

madhatter67

Right....Because the major news outlets are really going to. Investigate ....Like they have with other recent wikileaks ....

The more of us download it the safer it becomes for everyone

TRUTHWARRIOR

Please post your findings 😉

shoosh

cryptic shit, could they make a game more obvious? //sarcasm

nothing more than a cat and mouse play toy.

Basharalassad

please explain

sleepingbeautycan

Well, the series of tweets announcing what was coming was pretty cryptic. The pictures of the seed vault, nazi vault...etc.

It could be that they are trying to keep us busy on other stuff to distract us from our work.

shoosh

not to mention terms like 'year zero' and 'vault 7'.

They're turning this into a childhood game of clue. The problem is This is real life and I don't appreciate the cryptic terms like in game usage.

SpikyAube

I think there are too many of us now to make that worth doing, even if half of us go looking into this, therell be a huge amount of people focusing on the other work.

shoosh

Those who control have used these bag of tricks many times before and it's worked.

I recently watched The Common Sense show with Dave Hodges, his take on it is similar to mine. There are bio-chemical warfare to herd the public. Genocide is a common bag of tricks. genocide or mass annehilation was foreshadowed on the Georgia GuideStones.

Touchdown50

Ohhhhj shit. Thats right. Double edge sword theory. Just get a burner phone. Throw the phone away after

awarenessadventurer

are there still throwaway phones that you dont have to register online? if so, do tell... cuz I dont know of a single one that you dont have to register first.

Touchdown50

Boost mobile

Touchdown50

Yes go to a pay as you go store in a Latino populated part of town and you can buy a burner phone for 50.00 to 100 bucks.

awarenessadventurer

wish i was even close to a town. and tacos. so far from anything... question for you. i just learned how to look up who is accessing my computer via IP geo locator. LOTS of access form other states on a regular basis. shocking. what is the best VPN provider (safe) I just learned waht that was too... i need it. having strange things happen like video record coming on. or microphone record coming up. mouse moving independently... things like that. any recs?

Touchdown50

No paper trail

Touchdown50

Well think this. Most folks who buy those phones are illegals from mexico. Many dont have a cc or a perm home address. All you need is a email address. Can be any and thats it. You pay with cash only for the phone and you pay for the Pay as you go with cash.

Weightstone

just so you know... aye is pronounced the same as eye. its how we Scotts say 'to the affirmative' 'yes' 'agreed' etc...

Proii_Pariah

This was my very first thought upon reading of the Vault 7 download. Definitely a worthwhile reminder toward caution.

throwaway89209834

While this post comes off as concern trolling, I still recommend to use full disk encryption (FDE) on your drives, even if you dont keep personal information there, it makes it much harder for someone to plant or tamper data with physical access. Even so, "evil maid" attacks have been demonstrated to sniff FDE passwords and get around that if they can get physical access, but that is much more complex to pull off.

For windows I recommend - https://veracrypt.codeplex.com/

If you are on linux, i'd go with LUKS and these steps generally work - http://www.pavelkogan.com/2014/05/23/luks-full-disk-encryption/

You should have a backup of critical data on a separate storage media (separate HDD/SSD) that is encrypted as well. You should encrypt personal data on cloud storage also.

And always use a VPN to avoid further traffic analysis from your ISP, I prefer PIA because their claim of not keeping logs was proven in court - https://www.privateinternetaccess.com/

mysecretidentity

meh pia is hosted in the us so even if they don't keep logs they could be forced to cooperate with active profiling etc. also with FDE you may be obligated to give them access or maybe face an obstruction charge or something, not sure how it works in usa. Another option is a truecrypt hidden volume, they wouldn't even know it existed without the password.

bikergang_accountant

The other value of FDE is that nothing touches your hard drive in a form that is readable. So when you delete something it is properly deleted. The reason why planting on a non-FDE disk is an issue is that even if you delete something the second you see what it is it still touched your disk in a way that could match a hash of known illegal material.