SR2 DB Leak Update: 10% of The Data Released
Posted by: DeepDotWeb
February 13, 2015
(This is a short news update) Note that we have not verified this – just reporting as a newsflash: Background – New post: https://bitcointalk.org/index.php?topic=952177.msg10447311#msg10447311
Original Post:
Block 343278 has appeared.
http://btc.blockr.io/block/info/343278
Block hash: 00000000000000000b4996f90ee1f1a7a5eb1bf07c235d31a7fa3d3276e4a36c
Here are the secrets for 10 random chunks.
</div>
To unlock use
</div>
I’ll allow some time for everybody (or 10% of you) to find themselves in here. As I said, this first dump only contains usernames, internal user IDs, some basic account type information and hashed passwords. The method of hashing is sha1(salt + password) with a single static universal strong salt. PM me if you are interested in purchasing a peek at the salt.
More?
Once you are all satisfied that the dump is authentic I will start with these chunks if you find yourself wanting more.
1 1FPpCtfaUZ4nc7cHhCdZpVMtvEvz7nGzG4
2 1QEkzYq6pqhUbKFW33Rvs4pAYwHeSodHzC
3 1EyV1KeA2yXMxZNBrvVj8oZWqdf2jY5Lep
4 15G9D7rvCqHsFW76y5GWeqEL5gx9HX3WFF
5 1ArryDakqVZqjDfQahojj6QMpoh2LS7PY5
If these addresses receieve a total of 2.5 BTC I will release the keys for the first five blocks by spending the received Bitcoins.
Updated: 2015-02-13