Fri Apr 8, 2022, 03:37 PM
SmallFry (349 posts)
Is anyone able to open this or make sense of what it is?
The text on a google search shows up as...
A=1; B=2, C=3; etc @ darpa.mil "source code" to obtain names...https://www.d emocraticunderground.com › ... daily daimler daintier dainties daintiest daintily daintiness dainty daiquiri ... mail mailbag mailbags mailboat mailboats mailbox mailboxes mailed mailing https://www.democraticunderground.com/ 10025856281 This is the link in question. I HAVE BROKEN BOTH LINKS WITH A SPACE AS TWO REPIES HAVE WARNED OF POTENTIAL DANGER Thanks
|
13 replies, 2176 views
![]() |
Author | Time | Post |
![]() |
SmallFry | Apr 2022 | OP |
taxi | Apr 2022 | #1 | |
SmallFry | Apr 2022 | #3 | |
CloudWatcher | Apr 2022 | #5 | |
SmallFry | Apr 2022 | #6 | |
CloudWatcher | Apr 2022 | #8 | |
taxi | Apr 2022 | #9 | |
PJMcK | Apr 2022 | #2 | |
Celerity | Apr 2022 | #12 | |
CloudWatcher | Apr 2022 | #4 | |
Celerity | Apr 2022 | #13 | |
lapfog_1 | Apr 2022 | #7 | |
SmallFry | Apr 2022 | #10 | |
Celerity | Apr 2022 | #11 |
Response to SmallFry (Original post)
Fri Apr 8, 2022, 03:49 PM
taxi (1,686 posts)
1. stuxnet - be careful
Response to taxi (Reply #1)
Fri Apr 8, 2022, 03:56 PM
SmallFry (349 posts)
3. Shit. I've clicked on it multiple times.
Thanks.
![]() |
Response to SmallFry (Reply #3)
Fri Apr 8, 2022, 03:58 PM
CloudWatcher (1,672 posts)
5. worry not
There's nothing hidden in that post. Just nonsense at the start and a long list of words.
|
Response to CloudWatcher (Reply #5)
Fri Apr 8, 2022, 03:59 PM
SmallFry (349 posts)
6. Thank you for following up.
I have a pretty solid system I work off of but the link wouldn't open for me. Just spins and spins.
|
Response to SmallFry (Reply #6)
Fri Apr 8, 2022, 04:02 PM
CloudWatcher (1,672 posts)
8. it's big
The word list is 839,058 bytes. That will take a while to load, and some smaller browsers/devices might not be able to handle it well.
|
Response to SmallFry (Reply #3)
Fri Apr 8, 2022, 04:03 PM
taxi (1,686 posts)
9. I couldn't help help myself
Glad you knew it was a joke. I was thinking about how something I'd seen earlier had reminded me of what happened with the Iranian nuclear ambitions. Poof! Immediate response!
|
Response to SmallFry (Original post)
Fri Apr 8, 2022, 03:54 PM
PJMcK (19,947 posts)
2. Garbage, potentially dangerous
Delete it.
|
Response to PJMcK (Reply #2)
Wed Apr 13, 2022, 11:38 AM
Celerity (35,541 posts)
12. only the site owners can delete it and I have asked before that it be binned
Response to SmallFry (Original post)
Fri Apr 8, 2022, 03:57 PM
CloudWatcher (1,672 posts)
4. it's just junk
It's nothing.
Someone posted a 80,282 English word list (sorted). Lists like this are often useful when trying to decode encrypted text. The rest of the OP appears to be some ramblings of someone off their meds. |
Response to CloudWatcher (Reply #4)
Wed Apr 13, 2022, 11:39 AM
Celerity (35,541 posts)
13. yes, 'off their meds' gets my vote
![]() ![]() |
Response to SmallFry (Original post)
Fri Apr 8, 2022, 04:00 PM
lapfog_1 (27,561 posts)
7. no not really
It looks like an attempt to explain a word coding system...
secure communications takes two general forms... encryption which will transmute the plain text into meaningless symbols based on sometimes rather sophisticated algorithm. A simple (trivial) example is "rot13" where the letters of the plain text are "rotated 13 positions" such that "a" becomes "m" and "b" becomes "n" and so on. The other method is coding... where both sides of a secure communication have a plain text to coded message dictionary so that a word like "dictionary" becomes "glop" and so on. The problem with coding is that all possible words that may occur in the message have to be agreed upon by sender and receiver and the translation dictionary or "key" becomes a thing that must be secured. more sophisticated coding schemes use things like a "one time pad" dictionary... where every message is encoded with a new translation. My favorite technique is steganography... where the message (usually already encrypted using a strong algorithm ) is chopped into very small bits (in computer world, actual bits). These bits are appended to something else and are hiding in plain site. For example... lets suppose I send you a video file. In that video file format, every pixel is represented by some number of computer bits... each group of bits represents a color. Now suppose I take the least significant bit and "flip" it to represent 1 bit of the encrypted message. The video will still play... and a casual observer won't even notice any issues with the video. But if the receiver knows that the video contains a message... they can decode it by stripping the least significant bit from every pixel and then decrypting the result. A video file describes millions to billions of pixels... and so the sender can transmit very complex messages. If they also code the message then even if the intercept KNOWS that this is an encrypted stegograph, it doesn't help them understand what is being sent. Not sure what the poster was trying to communicate with the posting. |
Response to lapfog_1 (Reply #7)
Fri Apr 8, 2022, 04:29 PM
SmallFry (349 posts)
10. Thank you for this. Very much. NT
Response to SmallFry (Original post)
Wed Apr 13, 2022, 11:34 AM
Celerity (35,541 posts)
11. I have been begging that OP be deleted for ages
https://upload.democraticunderground.com/125619446
please delete this (locked) insane post, I am so so so sick of it showing up in DU search for years ![]() ![]() ![]() it is a list of thousands of words A=1; B=2, C=3; etc @ darpa.mil "source code" to obtain names... This discussion thread was locked as off-topic by hlthe2b (a host of the General Discussion forum). Sun Nov 23, 2014, 09:20 AM https://www.democraticunderground.com/10025856281 advanced numerological code made easy with revised code keys...[Because FBI online agents are inefficient at code, darpa.mil offers an easy way to obtain complete information on coordinators of eavesdroppers at military bases, now that names and other information is easly revealed on these eavesdropping crime syndicate organizers. These organizers who pay eavesdroppers can be identified and arrested, after this easily deciphered code is translated into Russian @ darpa.mil where source code offered bY RUSSIAN SATELLITE TEAMS THAT KEEP THEIR BARGAINS AT ESPA CENTERS UNLIKE DOD TRAITORS @NSA.gov = Tiddosm gs;dr g;sh 1=a; 2=b; 3=c; 01=aa; 010=aaa; etc...] a aa aaa aaas aarhus aaron ababa abaci aback abacus abacuses abaft abalone abandon abandoned abandoning abandonment abandons abase abased abasement abases abash abashed abashes abashing abasing abate abated abatement abater abates abating abattoir abattoirs abbas abbe abbes abbess abbesses abbey abbeys abbot abbots abbott abbreviate abbreviated abbreviates abbreviating abbreviation abbreviations abcs snip it goes on and on and on and on ![]() |