There’s More To The Minecraft Code No One Has Solved
WATCH PART 1 HERE: https://www.youtube.com/watch?v=nz2LeXwJOyI
I covered the story of tominecon.7z in a previous video, but there were some things that I missed as well as some new information I discovered. Join me to learn even more about this captivating mystery.
Music by RetroGamingNow
“Gemini” – https://www.youtube.com/watch?v=1O9gkVTXxz8
“The Depths” – https://www.youtube.com/watch?v=mYLE1YghV1E
“Unknown Enigma” – https://www.youtube.com/watch?v=p7vshK288xY
“Ethereal Screenscape – https://www.youtube.com/watch?v=Q3bejtiESOw”
“A Secret Mission (Outro Theme)” – https://www.youtube.com/watch?v=Og02e7XFuro
#minecraft #mystery #secret #mojang #tominecon
Errata:
The text at 10:28 should say “Minecraft@Home”
32 Comments
man imagine being named john s and seeing this 😂
It's worth noting that the password may be a phrase or combination of words in Swedish, or involve character names from fiction.
Most popular wordlists for crackers are taken from databreaches for english-speaking services, and while most of the 2011 Mojangstas speak fluent english, it's not their native tongue.
Additionally, this factoid can make even simple passwords completely inaccessible to typical brute force attempts, since the program may not be accounting for Å/å, Ä/ä, and Ö/ö.
Voynich manuscript? get out of here. we need to crack tominecon.7z more than that book
Was fun to watch.
Actually, quantum computers are getting closer and closer to breaking AES-256 because quantum computers can reduce the possibilities to 2^128≈3.4*10^38, which is much much less the 1.15*10^77
Great video! It was really well made and interesting! The only problem was how long you spent talking about the number of possible passwords to other big numbers lol
Still, wonderful video!
Disappointing video.
Hello Retro, I really enjoy watching your Minecraft lore videos, and the last two have especially caught my attention. I am a Computer Science student at UCO, and I just completed a Cybersecurity course for the Spring semester. I wanted to chime in regarding AES encryption while the information is still fresh in my brain.
AES is a block cipher, meaning it will encrypt an entire block of data at a single time. The block size is always 16 bytes, or 128 bits. The default mode of AES (ECB, or Electronic Code Book) has a specific weakness where identical plaintext blocks will produce identical ciphertext blocks. This is due to the same, unchanged, key being used to encrypt each block. This means that if the file is encrypted using ECB mode, the overall pattern in the data will be easily visible even without needing to decrypt.
There are a few other modes of operation used with AES, each of which require something called an Initialization Vector (IV). This is a random number that ensures blocks will produce different ciphertext regardless if they have identical plaintext. The IV has a fixed size of 128 bits (same as block size), which means it has 2^128 different possibilities. This means that if the file is encrypted using any mode other than ECB, you would need to guess not only the key, but the IV as well, leading to a calculation requirement of 2^128 * 2^256 (depending on the key size). If the IV generator is predictable, you can easily guess it but you would need multiple messages to see a pattern in the IV generation, and since this is a single file that is not an option. Overall the computation requirement would be around 2^384 to brute force an AES-256 encrypted file that was encrypted using a mode of operation including an initialization vector.
I hope I could provide something you didn't previously know and these past two videos have been super interesting to me! I love being able to share knowledge from school so it doesn't just go to waste!
P.S. If you use Linux and read the file in hexadecimal format, you could probably pick out a pattern pretty easily if encryption was done using AES-256-ECB!
As much as everyone wants to know what's in there, me myself included, it is probably better
for anyone to NOT open it or talk about it. There might be everything. From loads of proprietary
big-tech code, big time find keys for some hidden services in the corpo domain, downto smthn
as simple as some md or doc for some speech smn held there…
Either way, the point is that there is stuff in there that belongs to a company now owned by
Microsoft and cracking it puts one at risk of being sued the living sht out of. And not just oneself
but you risk it spreading and having the first wave of ppl who operated on it or began looking at
the contents suffer the same fate.
I think it’s a version of Minecraft that could have source code or removed features that’s why it was tooken down
Mysteries don't get better by being unsolvable. They become frustrating and annoying. Your conclusion is stupid.
In a related question, has anyone actually tried brute-forcing the password with every combination of 16 numbers? It's still a huge amount (100 quadrillion possibilities), but it's considerably less than the amount mentioned in the video.
The idea of someone suggesting "just break the AES-256 encryption" as a solution is up there with Q suggesting "just change the gravitational constant of the Universe" as insane overkill solutions
This has got to be my favorite kind of video you make! Keep it going!
solution: travel back in time to when notch (or whoever else) made the file and peer over their shoulder
imagine someone finally gets the password for the 7z after nearly 15 years, and realize that mojang wasnt lying when they said it was just 1.0
1hr ago
7am
Fri 17 may 2024
+4gmt
PART 2!!!!!
I think people underestimate how sloooooooow the 7Zip encryption algorithm is. it's not MD5, it takes FOREVER to brute force (mostly on purpose). until quantum computers reach the point of cracking AES-256, there is no way we'll ever see the contents of this file if the password is even remotely secure
Just finished the other video and this popped up. Ain't that something.
How about a distributed network of hundred of computers to brute force it lol
lets go!
Edit: I understand and even expect all the swear passwords, lol. It was "cheese," "monkey," and "dragon" that made me laugh.
I think you should start teaching badic computer science stuff, haha. I'd always wanted to learn things like that, but my brain is wired completely for artistic things, so I have a lot of trouble grasping some concepts.
You make some really easy-to-understand analogies and quantify the concepts so that people like me can finally begin to understand it.
I know that probably sounds super boring, but just throwing it out there. I think you'd make an amazing teacher. I'm talking just basic ideas and things, like you've demostrated in these videos. You can even use analogies related to Minecraft and such. 😊
Honestly even if the file is literally just the 1.0 release I still hope it gets cracked just for the novelty of it
The trick to reducing the possible number of passwords is to try to figure out who chose the password and try to get information about them. If we assume it's a numeric password as the false lead said, you might try combinations of dates important to the person or organization. This is why social media scammers and social engineers will try to find personal information about you like pet names, names of family members, et cetera. If they can figure out some information you're likely to use in a password that provides a range of possibilities they can try before they result to brute force.
Yea, no to this whole vid. We absolutely must use all the resources of the collective internet community to find out what's inside.
We need Kamala Khan to crack the code.
The fact that the encription method is used by the NSA is not such a good benchmark
Government often has not secured computers, they oftentimes even use windows xp, their security mostly comes from closed networks
AES-256 does sound good to me, somebody that doesn't know anything about encryption and maybe it is strong but the fact that the NSA uses it is not a good indicator lol
I wis i knew it
I thought the password must be 'rickroll' because it have 8-letter and the password is 16-letter long so may be twice of it… It's just a guess 🤔
5:42 I really enjoyed the first video, but this whole number thing was just filler my dude. Could have been a 20 second thing with the same impact.
I like that you’re honest about things that don’t bother me. Good honesty!
Just mine the password like Bitcoin.