Cablegate Database Download ##BEST##

1 view
Skip to first unread message

Kompiler Reinertson

unread,
Jan 25, 2024, 3:52:16 AM1/25/24
to cuchingnegeab

The Guardian released its coverage of the leaked cables in numerous articles, including an interactive database, starting on 28 November.[44] El País released its report[45] saying there was an agreement between the newspapers for simultaneous publication of the "internationally relevant" documents, but that each newspaper was free to select and treat those documents that primarily relate to its own country.[46] Der Spiegel also released its preliminary report, with extended coverage promised for the next day.[47] Its cover for 29 November was also leaked with the initial report.[48]

After the unredacted cables became available online, WikiLeaks added them to their searchable database. The release was condemned by WikiLeaks' media partners, the Guardian, New York Times, El Pais, Der Spiegel and Le Monde, who said it put sources at risk of dismissal, detention and physical harm.[149][150][151] The organisations published a joint statement that WikiLeaks disputed.[150]

cablegate database download


Download >>> https://t.co/jGx0kpTcLG



Cablegate Database on Google Fusion Tables
While the cables are being released slowly, in batches, in collaboration with Wikileaks' media partners, a database generated from the metadata of the entire cache was released in November by The Guardian. The database contains certain fields of metadata from all 251286 cables, including the Creation Date, the Source, the Address, and the Tags. (It does not contain the Reference IDs or the Subject Headers.) This resource is invaluable for seeing the spread of all the cables, how many are yet to be released from a certain embassy, whether there were cables at a specific time, etc. It is a good place to check claims about as yet unreleased cables, too. A .csv file is available for download from the Guardian website, and another, with some extra data, is available here, for offline perusal and data manipulation.

Privetbank Cablegate Anomaly Monitoring Site (Out of date)
The authors of PrivetBank site compare the contents of each successive release of batch torrents from the Wikileaks official site, and detect anomalies. It transpires that some torrents actually remove cables that had been released in earlier torrents, or that some cables appear with new redactions imposed on them. Privetbank documents this in painstaking detail, so that the practice can be subjected to proper scrutiny by the public. Privetbank also contains information about the "Unofficial Cables" - those cables that have been documented on the media partner sites, but that have not, as yet, been released by Wikileaks. The site is not always completely up to date, but is well made, has a sophisticated and pleasing interface, provides links to various mirrors for each cable, offers every torrent so far released for download, and offers a very useful tool for Wikileaks investigators. While the feature has, since it came out, been duplicated by xs4all and cablegatesearch, this was where we saw it first, and it appears here in more comprehensive form.

CableSearch is another excellent search engine for Cablegate, designed by journalists for journalists, CableSearch also offers a tabbed interface whereby readers can explore and search within categories defined by metadata terms. The interface is clear and pleasant to use, and information is kept on how up to date the present database is. It is often easier to see what cables have been released most recently here than on the official site. The frontpage provides a tag cloud, a word cloud based on the content of cables released to date, and a cloud generated from popular search terms.

The Bitcoin logo, hidden in the blockchain.Prayers from minersEarly on, the miner Eligius started putting Catholic prayers in English and Latin in the coinbase field of blocks they mined. Here are some samples:Benedictus Sanguis eius pretiosissimus.Benedictus Iesus in sanctissimo altaris Sacramento.Ave Maria, gratia plena, Dominus tecum. Benedicta tu in mulieribus, ......and life everlasting, through the merits of Jesus Christ, my Lord and Redeemer.O Heart of Jesus, burning with love for us, inflame our hearts with love for Thee.Jesus, meek and humble of heart, make my heart like unto thine!These prayers turned out to be surprisingly controversial, leading to insults being exchanged through the blockchain:"Oh, and god isn't real, sucka. Stop polluting the blockchain with your nonsense.","FFS Luke-Jr leave the blockchain alone!",and a rickroll in response:"Militant atheists, -- happy now?".[6]The codebase technique has since been used by many other miners as advertising. Typical messages are:Hi from 50BTC.com,For Pierce and Paul,Mined at GIVE-ME-COINS.com,EclipseMC: Aluminum Falcon?,Happy NY! Yours GHash.IO,Mined By ASICMiner,BTC Guild,Made in China,BitMinter,/bitparking,hi from poolserverj,/ozcoin/stratum/,/slush/.[7]XSS demoI've found JavaScript code in the blockchain that demonstrates a potential XSS attack.A common security hole on websites is cross-site scripting (XSS)[8], where an attacker can inject hostile JavaScript into a web page viewed by the victim. Surprisingly, such an attack was possible with Bitcoin.The transaction's output script was set to the hex corresponding to:window.alert("If this were an actual exploit, your mywallet would be empty.")Apparently some Bitcoin websites would fail to escape the tags, causing the script to run if you viewed the page.The above script just created a harmless dialog box, but a more malicious transaction could potentially steal the user's bitcoins stored on the website.Len Sassaman TributeA tribute to cryptographer Len Sassaman was put in the Bitcoin blockchain a couple weeks after his death by Dan Kaminsky.[9]---BEGIN TRIBUTE---#./BitLen::::::::::::::::::::::::::.::.::.:.::::.: :.' ' ' ' ' : ::.:'' ,,xiW,"4x, '': ,dWWWXXXXi,4WX,' dWWWXXX7" `X, lWWWXX7 __ _ X:WWWXX7 ,xXX7' "^^XlWWWX7, _.+,, _.+.,:WWW7,. `^"-" ,^-' WW",X: X, "7^^Xl. _(_x7' l ( :X: __ _ `. " XX ,xxWWWWX7 )X- "" 4X" .___.,W X :Xi _,,_WW X 4XiyXWWXd"" ,, 4XWWWWXX, R7X, "^447^R, "4RXk, _, ,TWk "4RXXi, X',xlTWk, "4RRR7' 4 XH:lWWWk, ^" `4::TTXWWi,_ Xll :..=-=-=-=-=-=-=-=-=-=LEN "rabbi" SASSAMA 1980-2011Len was our friend.A brilliant mind,a kind soul, anda devious schemer;husband to Meredithbrother to Calvin,son to Jim andDana Hartshorn,coauthor andcofounder andShmoo and so muchmore. We dedicatethis silly hack toLen, who would havefound it absolutelyhilarious.--Dan Kaminsky,Travis GoodspeedP.S. My apologies,BitCoin people. Healso would haveLOL'd at BitCoin'snew dependency upon ASCII BERNANKE:'::.:::::.:::.::.:: :.: ' ' ' ' : :'::.: _.__ '.:: _,^" "^x, :' x7' `4, XX7 4XX XX XX Xl ,xxx, ,xxx,XX( ' _,+o, ,o+," 4 "-^' X "^-'" 7 l, ( )) ,X :Xx,_ ,xXXXxx,_,XX 4XXiX'-___-`XXXX' 4XXi,_ _iXX7' , `4XXXXXXXXX^ _, Xx, ""^^^XX7,xXW,"4WWx,_ _,XxWWX7'Xwi, "4WW7""4WW7',WTXXWw, ^7 Xk 47 ,WH:TXXXWw,_ "), ,wWT:::TTXXWWW lXl WWT:----END TRIBUTE----A creature simulator in BasicI found a simple character-based simulator in Basic. The idea is 5 creatures wander around the screen eating food blocks and breeding or dying. Unfortunately the code has a bunch of bugs and doesn't work.[10]The original Bitcoin paperIn this transaction the Bitcoin blockchain contains the PDF for the original Bitcoin paper.Thumbnail of the original Bitcoin paper.RickrollsRickrolling is a popular internet prank, and Bitcoin is not immune.One rickroll was described above as part of the prayer dispute.[6]The lyrics to Never Gonna Give You Up! are found in a second rickroll.[11]A third rickroll has the song metadata and lyrics encoded in Base-64.[12]Catagory: PoetryTitle: Never Gonna Give You UpPerformer: Rick AstleyWriter: Mike Stock, Matt Aitken, Pete WatermanLabel: RCA RecordsReleased: 27, July, 1987We're no strangers to loveYou know the rules and so do IA full commitment's what I'm thinking ofYou wouldn't get this from any other guyI just wanna tell you how I'm feelingGotta make you understandNever gonna give you up,Never gonna let you downNever gonna run around and desert you...Photographs in a messaging systemRecently someone has built a message/storage system on top of Bitcoin that allows a growing sequence of messages, text, and images to be stored in the blockchain.[13]Among other things, this system contains text from the Bhagavad Gita, 1000 digits of pi, multiple JPG and PNG images, a Shel Silverstein poem, a Rumi poem, and quotes from a random party. Here are some of the images stored in the blockchain using this system:Some images found in the Bitcoin blockchain.Wikileaks cablegate dataA 2.5 megabyte Wikileak files ('cablegate-201012041811.7z') was embedded in the Bitcoin blockchain.[14]The data is followed by a message explaining how to access it.[15]Wikileaks Cablegate Backupcablegate-201012041811.7zDownload the following transactions with Satoshi Nakamoto's download tool whichcan be found in transaction 6c53cd987119ef797d5adccd76241247988a0a5ef783572a9972e7371c5fb0ccFree speech and free enterprise! Thank you Satoshi!5c593b7b71063a01f4128c98e36fb407b00a87454e67b39ad5f8820ebc1b2ad5221d900b5ac701028f9dfab7dfba326f608308386d45c05432e721b7c122cba7... 128 lines of transaction ids deleted ...Downloading the data from the blockchain is inconvenient since the download tool needs to be used on the 130 chunks of 20 KB separately. (It's much easier to download the file from the internet.)The blockchain contains the source code for Python tools to insert data into the blockchain and to download it.[16]In a weird self-referential twist, the downloader can be used to download itself.The uploader/downloader puts data into the destination address, but extends the previous technique by using Bitcoin escrow / multi-sig to put three addresses in each destination. It also uses a checksum to make storage more reliable.Here's the code in the blockchain to insert data into the blockchain. While it says it was written by Satoshi Nakamoto (the pseudonymous author of Bitcoin), that's probably not true.And here's the code to extract data from the blockchain.The download tool is slightly buggy - the crc32 has a signed-vs-unsigned problem which suggests it wasn't used extensively.Leaked firmware key and illegal primesThis transaction has a link about a leaked private key, followed by 1K of hex bytes as text, which supposedly is the private key for some AMI firmware.The change from that transaction was used forthis transaction, which references the Wikipedia page on illegal primes, followed by two supposedly-illegal primes from that page.The change from that transaction was then used for the Wikileaks Cablegate messages, implying the same person was behind all these messages.It looks like someone was trying to store a variety of dodgy stuff in the Bitcoin blockchain, either to cause trouble or to make some sort of political point.Email from Satoshi NakamotoThe following email message allegedly from Bitcoin inventor Satoshi Nakamoto appears in the blockchain.[17] (It's almost certainly not really from him.) It seems to be referring to the removal of some Script opcodes from the Bitcoin server earlier and making the corresponding change to the Electrum server. My guess is this message is someone pointing out a bug fix for Electrum in a joking way.From a3a61fef43309b9fb23225df7910b03afc5465b9 Mon Sep 17 00:00:00 2001From: Satoshi Nakamoto Date: Mon, 12 Aug 2013 02:28:02 -0200Subject:[PATCH] Remove (SINGLEDOUBLE)BYTEI removed this from Bitcoin in f1e1fb4bdef878c8fc1564fa418d44e7541a7e83in Sept 7 2010, almost three years ago. Be warned that I have notactually tested this patch.--- backends/bitcoind/deserialize.py 8 +------- 1 file changed, 1 insertion(+), 7 deletions(-)diff --git a/backends/bitcoind/deserialize.py b/backends/bitcoind/deserialize.pyindex 6620583..89b9b1b 100644--- a/backends/bitcoind/deserialize.py+++ b/backends/bitcoind/deserialize.py@@ -280,10 +280,8 @@ opcodes = Enumeration("Opcodes", [ "OP_WITHIN", "OP_RIPEMD160", "OP_SHA1", "OP_SHA256", "OP_HASH160", "OP_HASH256", "OP_CODESEPARATOR", "OP_CHECKSIG", "OP_CHECKSIGVERIFY", "OP_CHECKMULTISIG", "OP_CHECKMULTISIGVERIFY",- ("OP_SINGLEBYTE_END", 0xF0),- ("OP_DOUBLEBYTE_BEGIN", 0xF000), "OP_PUBKEY", "OP_PUBKEYHASH",- ("OP_INVALIDOPCODE", 0xFFFF),+ ("OP_INVALIDOPCODE", 0xFF), ])@@ -293,10 +291,6 @@ def script_GetOp(bytes): vch = None opcode = ord(bytes[i]) i += 1- if opcode >= opcodes.OP_SINGLEBYTE_END and i < len(bytes):- opcode

31c5a71286
Reply all
Reply to author
Forward
0 new messages