Wikileaks Releases Encrypted “Vault 7” Torrent, Will Unveil Password Tuesday 9am

Tyler Durden's picture

Last month, following a series of seemingly random tweets by Wikileaks, we reported that starting on February 4th, each day Wikileaks began sending out a series of cryptic question Tweets teasing the world about “Vault 7”. The questions were framed in Who, What, When, Where, Why, and How format (but not in that order). Each came with an image “clue”.

Here they are in chronological order starting with the earliest.

-----------------------------------------------------
It is my sincere desire to provide readers of this site with the best unbiased information available, and a forum where it can be discussed openly, as our Founders intended. But it is not easy nor inexpensive to do so, especially when those who wish to prevent us from making the truth known, attack us without mercy on all fronts on a daily basis. So each time you visit the site, I would ask that you consider the value that you receive and have received from The Burning Platform and the community of which you are a vital part. I can't do it all alone, and I need your help and support to keep it alive. Please consider contributing an amount commensurate to the value that you receive from this site and community, or even by becoming a sustaining supporter through periodic contributions. [Burning Platform LLC - PO Box 1520 Kulpsville, PA 19443] or Paypal

-----------------------------------------------------
To donate via Stripe, click here.
-----------------------------------------------------
Use promo code ILMF2, and save up to 66% on all MyPillow purchases. (The Burning Platform benefits when you use this promo code.)

While it is possible that Vault 7 is directly related to one of these pictures, these pictures may just be representative images, part of some sort of pattern, or clues about the answers to the corresponding questions. As the pictures are images of entirely different things (and no longer just pictures of vaults), each individual picture being related to the answer of the question tweeted along with it seems quite plausible.

Then, after a flurry of appearances over a month ago, the topic of “Vault 7” faded away from the Wikileaks twitter account, until Monday evening, when in a tweet around 7:30pm, Wikileaks announced that it had released an encrypted ‘torrent’ file, just over 500 MB in size and which can be downloaded now at the following URL, will be made accessible for everyone tomorrow at 9am ET when Wikileaks releases the passphrase.

ENCRYPTED RELEASE Use a ‘torrent’ downloader on: And ‘7z’ to decrypt. Passphrase will be made public at Tue 9am ET.

In subsequent tweets,  Wikileaks provides further information on how to unzip the encrypted file contained in the torrent.

How to unarchive a “.7z” (7zip) file: Use a 7zip program. Many are available for Windows/Mac/Linux. Internet search for “7zip”.

WikiLeaks Retweeted WikiLeaks

To unpack Vault 7, part one: “Year Zero”, on a Mac, you can use this ‘.7z’ unarchiver

Why unveil the contents of “Vault 7”, which some have speculated is a form of an insurance policy for Julian Assange? It may have something to do with Saturday’s report that Guillermo Lasso, the  frontrunner in Ecuador’s presidential election, whose runoff round will take place on April 2, has warned that he will ask “Assange to leave our [London] embassy.” Or it could be something totally different.

For now, there is no indication what is contained on the released torrent, although we are confident that many will have it downloaded and looking forward to tomorrow’s 9am release of the password to unlock the contents of the mysterious file.

 

Subscribe
Notify of
guest
24 Comments
James
James
March 7, 2017 7:21 am

Uh Jimbo,might I suggest a excellent STRONG cup of coffee and rethink what you have posted/asked for!

TC
TC
March 7, 2017 7:26 am

I don’t get all the cryptic theatrics. Just fuckin’ release the shit already.

Ed
Ed
  TC
March 7, 2017 7:56 am

I don’t get it either. They kept up with that shit during the election, threatening to release this or that. By the time they released anything it was too late because the Hillarytards in the media had already launched their defensive dismissals.

Anonymous
Anonymous
  TC
March 7, 2017 9:33 am

Building suspense makes otherwise bland content more exciting.

Ouirphuqd
Ouirphuqd
March 7, 2017 8:27 am

The closer to the center of the vortex, the more interesting it becomes. My perception is that someone is about to remove a corner card in the massive house of cards. Things will never be the same! Get ready to rumble!

Rise Up
Rise Up
  Ouirphuqd
March 7, 2017 11:36 am

This is all part of the apocalypse, the period of “the lifting of the veil”. Truths revealed.

hardscrabble farmer
hardscrabble farmer
March 7, 2017 9:11 am

There has been zero proof of life in regards to Julian Assange since October of 2016. Up until that date wikileaks was dropping damaging information on an hourly basis, then special ops units from the British Intelligence agencies showed up, his Internet connection was cut and he vanished from public view. The wikileaks torrent shut down and that’s where we’ve been since that time, with the exception of alleged visits by the spirit cooking enthusiast Pamela Anderson and her “box lunch”.

The closest thing to “proof” is the account of Craig Murray, the former British Ambassador to Uzbekistan, human rights activist, and writer. There was an alleged interview with Sean Hannity as well, but as we all know recorded interviews, videotapes, etc. are not the same thing as the appearance of a living body and it has been close to five months since he has appeared to the public.

I wouldn’t trust anything from wikileaks since that time.

Anonymous
Anonymous
  hardscrabble farmer
March 7, 2017 9:39 am
norman franklin
norman franklin
  Anonymous
March 7, 2017 10:09 am

I don’t really know what to think about who or what is behind this. I am however for transparency no matter how it comes about, or who brings it to us.

flash
flash
  norman franklin
March 7, 2017 11:17 am

Deep state versus US perhaps. Regardless, when it comes to use of the internet , privacy is no longer an option.

https://wikileaks.org/ciav7p1/
Vault 7: CIA Hacking Tools Revealed
CIA malware targets iPhone, Android, smart TVs

CIA malware and hacking tools are built by EDG (Engineering Development Group), a software development group within CCI (Center for Cyber Intelligence), a department belonging to the CIA’s DDI (Directorate for Digital Innovation). The DDI is one of the five major directorates of the CIA (see this organizational chart of the CIA for more details).

The EDG is responsible for the development, testing and operational support of all backdoors, exploits, malicious payloads, trojans, viruses and any other kind of malware used by the CIA in its covert operations world-wide.

The increasing sophistication of surveillance techniques has drawn comparisons with George Orwell’s 1984, but “Weeping Angel”, developed by the CIA’s Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones, is surely its most emblematic realization.

The attack against Samsung smart TVs was developed in cooperation with the United Kingdom’s MI5/BTSS. After infestation, Weeping Angel places the target TV in a ‘Fake-Off’ mode, so that the owner falsely believes the TV is off when it is on. In ‘Fake-Off’ mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.

As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks. The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.

The CIA’s Mobile Devices Branch (MDB) developed numerous attacks to remotely hack and control popular smart phones. Infected phones can be instructed to send the CIA the user’s geolocation, audio and text communications as well as covertly activate the phone’s camera and microphone.

Despite iPhone’s minority share (14.5%) of the global smart phone market in 2016, a specialized unit in the CIA’s Mobile Development Branch produces malware to infest, control and exfiltrate data from iPhones and other Apple products running iOS, such as iPads. CIA’s arsenal includes numerous local and remote “zero days” developed by CIA or obtained from GCHQ, NSA, FBI or purchased from cyber arms contractors such as Baitshop. The disproportionate focus on iOS may be explained by the popularity of the iPhone among social, political, diplomatic and business elites.

A similar unit targets Google’s Android which is used to run the majority of the world’s smart phones (~85%) including Samsung, HTC and Sony. 1.15 billion Android powered phones were sold last year. “Year Zero” shows that as of 2016 the CIA had 24 “weaponized” Android “zero days” which it has developed itself and obtained from GCHQ, NSA and cyber arms contractors.

These techniques permit the CIA to bypass the encryption of WhatsApp, Signal, Telegram, Wiebo, Confide and Cloackman by hacking the “smart” phones that they run on and collecting audio and message traffic before encryption is applied.

Rdawg
Rdawg
March 7, 2017 10:41 am

Didn’t Geraldo Rivera try this vault stuff before?

Rise Up
Rise Up
March 7, 2017 11:33 am

At the time of this comment, CNN and MSNBC are not reporting this on their websites. FOX is.

TPC
TPC
March 7, 2017 11:52 am

Its really not that hard to imagine this. Lefties will scream that trump is a fascist, conveniently ignoring that these programs have been knocking around since the Clinton era, which means their Human God Obama will be culpable as well.

No government should have this much power.

AC
AC
  Administrator
March 7, 2017 2:12 pm

So, the question now is ‘Did Obama have Brennan/CIA hack the election while pretending to be the Russians?’

This should be entertaining.

Chubby Bubbles
Chubby Bubbles
  Administrator
March 7, 2017 9:07 pm

Re: gov. infiltration into “smart” devices and TVs.. didn’t we already know this? or assume it?

RiNS
RiNS
March 7, 2017 12:30 pm
Chubby Bubbles
Chubby Bubbles
  RiNS
March 7, 2017 9:09 pm

Michael Hastings.

Arnold Ziffel
Arnold Ziffel
March 7, 2017 1:47 pm

I downloaded the files and thumbed through them. Just some manuals on software and screenshots. No real smoking gun. Maybe there will be later dump that is meaningful.

Suzanna
Suzanna
March 7, 2017 3:33 pm

Thank you Admin,
About cars: get an older car and systematically rebuild that sucker
with a conglomeration of worthwhile parts. No GPS in the package.
About phones: Do not have a smart phone (as much as you love it)
because it is a GPS and it can listen to your conversations, apparently
at will.
About computers: watch out!