There’s More To The Minecraft Code No One Has Solved

WATCH PART 1 HERE: https://www.youtube.com/watch?v=nz2LeXwJOyI

I covered the story of tominecon.7z in a previous video, but there were some things that I missed as well as some new information I discovered. Join me to learn even more about this captivating mystery.

Music by RetroGamingNow
“Gemini” – https://www.youtube.com/watch?v=1O9gkVTXxz8
“The Depths” – https://www.youtube.com/watch?v=mYLE1YghV1E
“Unknown Enigma” – https://www.youtube.com/watch?v=p7vshK288xY
“Ethereal Screenscape – https://www.youtube.com/watch?v=Q3bejtiESOw”
“A Secret Mission (Outro Theme)” – https://www.youtube.com/watch?v=Og02e7XFuro

#minecraft #mystery #secret #mojang #tominecon

Errata:
The text at 10:28 should say “Minecraft@Home”

32 Comments

  1. It's worth noting that the password may be a phrase or combination of words in Swedish, or involve character names from fiction.

    Most popular wordlists for crackers are taken from databreaches for english-speaking services, and while most of the 2011 Mojangstas speak fluent english, it's not their native tongue.

    Additionally, this factoid can make even simple passwords completely inaccessible to typical brute force attempts, since the program may not be accounting for Å/å, Ä/ä, and Ö/ö.

  2. Actually, quantum computers are getting closer and closer to breaking AES-256 because quantum computers can reduce the possibilities to 2^128≈3.4*10^38, which is much much less the 1.15*10^77

  3. Great video! It was really well made and interesting! The only problem was how long you spent talking about the number of possible passwords to other big numbers lol
    Still, wonderful video!

  4. Hello Retro, I really enjoy watching your Minecraft lore videos, and the last two have especially caught my attention. I am a Computer Science student at UCO, and I just completed a Cybersecurity course for the Spring semester. I wanted to chime in regarding AES encryption while the information is still fresh in my brain.

    AES is a block cipher, meaning it will encrypt an entire block of data at a single time. The block size is always 16 bytes, or 128 bits. The default mode of AES (ECB, or Electronic Code Book) has a specific weakness where identical plaintext blocks will produce identical ciphertext blocks. This is due to the same, unchanged, key being used to encrypt each block. This means that if the file is encrypted using ECB mode, the overall pattern in the data will be easily visible even without needing to decrypt.

    There are a few other modes of operation used with AES, each of which require something called an Initialization Vector (IV). This is a random number that ensures blocks will produce different ciphertext regardless if they have identical plaintext. The IV has a fixed size of 128 bits (same as block size), which means it has 2^128 different possibilities. This means that if the file is encrypted using any mode other than ECB, you would need to guess not only the key, but the IV as well, leading to a calculation requirement of 2^128 * 2^256 (depending on the key size). If the IV generator is predictable, you can easily guess it but you would need multiple messages to see a pattern in the IV generation, and since this is a single file that is not an option. Overall the computation requirement would be around 2^384 to brute force an AES-256 encrypted file that was encrypted using a mode of operation including an initialization vector.

    I hope I could provide something you didn't previously know and these past two videos have been super interesting to me! I love being able to share knowledge from school so it doesn't just go to waste!

    P.S. If you use Linux and read the file in hexadecimal format, you could probably pick out a pattern pretty easily if encryption was done using AES-256-ECB!

  5. As much as everyone wants to know what's in there, me myself included, it is probably better

    for anyone to NOT open it or talk about it. There might be everything. From loads of proprietary

    big-tech code, big time find keys for some hidden services in the corpo domain, downto smthn
    as simple as some md or doc for some speech smn held there…

    Either way, the point is that there is stuff in there that belongs to a company now owned by
    Microsoft and cracking it puts one at risk of being sued the living sht out of. And not just oneself
    but you risk it spreading and having the first wave of ppl who operated on it or began looking at
    the contents suffer the same fate.

  6. Mysteries don't get better by being unsolvable. They become frustrating and annoying. Your conclusion is stupid.

    In a related question, has anyone actually tried brute-forcing the password with every combination of 16 numbers? It's still a huge amount (100 quadrillion possibilities), but it's considerably less than the amount mentioned in the video.

  7. The idea of someone suggesting "just break the AES-256 encryption" as a solution is up there with Q suggesting "just change the gravitational constant of the Universe" as insane overkill solutions

  8. I think people underestimate how sloooooooow the 7Zip encryption algorithm is. it's not MD5, it takes FOREVER to brute force (mostly on purpose). until quantum computers reach the point of cracking AES-256, there is no way we'll ever see the contents of this file if the password is even remotely secure

  9. Edit: I understand and even expect all the swear passwords, lol. It was "cheese," "monkey," and "dragon" that made me laugh.

    I think you should start teaching badic computer science stuff, haha. I'd always wanted to learn things like that, but my brain is wired completely for artistic things, so I have a lot of trouble grasping some concepts.

    You make some really easy-to-understand analogies and quantify the concepts so that people like me can finally begin to understand it.

    I know that probably sounds super boring, but just throwing it out there. I think you'd make an amazing teacher. I'm talking just basic ideas and things, like you've demostrated in these videos. You can even use analogies related to Minecraft and such. 😊

  10. The trick to reducing the possible number of passwords is to try to figure out who chose the password and try to get information about them. If we assume it's a numeric password as the false lead said, you might try combinations of dates important to the person or organization. This is why social media scammers and social engineers will try to find personal information about you like pet names, names of family members, et cetera. If they can figure out some information you're likely to use in a password that provides a range of possibilities they can try before they result to brute force.

  11. The fact that the encription method is used by the NSA is not such a good benchmark
    Government often has not secured computers, they oftentimes even use windows xp, their security mostly comes from closed networks
    AES-256 does sound good to me, somebody that doesn't know anything about encryption and maybe it is strong but the fact that the NSA uses it is not a good indicator lol

  12. 5:42 I really enjoyed the first video, but this whole number thing was just filler my dude. Could have been a 20 second thing with the same impact.

Leave A Reply