There's More To The Minecraft Code No One Has Solved

Sdílet
Vložit
  • čas přidán 15. 05. 2024
  • WATCH THE tominecon.7z SERIES HERE: • The tominecon.7z Saga
    I covered the story of tominecon.7z in a previous video, but there were some things that I missed as well as some new information I discovered. Join me to learn even more about this captivating mystery.
    Link to the RGN Discord: / discord
    Music by RetroGamingNow
    "Gemini" - • "Gemini" - Music by Re...
    "The Depths" - • "The Depths" - Music b...
    "Unknown Enigma" - • "Unknown Enigma" - Mus...
    "Ethereal Screenscape - • "Ethereal Screenscape"... "
    "A Secret Mission (Outro Theme)" - • "A Secret Mission (Out...
    #minecraft #mystery #secret #mojang #tominecon
    Errata:
    The text at 10:28 should say "Minecraft@Home"
  • Hry

Komentáře • 1,4K

  • @RetroGamingNow
    @RetroGamingNow  Před 14 dny +659

    So uh...in the 19 hours since this video was released, there has been a HUGE update which makes this video at least partially obsolete. Watch Part 3 here: czcams.com/video/veIy1pJJ4Ow/video.html

    • @etaraz7966
      @etaraz7966 Před 14 dny +16

      Hope we get an update soon! Keep up with the good work man.

    • @soiten
      @soiten Před 14 dny +13

      i'll be watching videos about minecraft misteries for three days in a row 😭 (they're good tho)

    • @ZackLuquettte
      @ZackLuquettte Před 14 dny +2

      Already😂

    • @sesameoil0009
      @sesameoil0009 Před 14 dny +2

      bruh hahahahahahaha

    • @zixea3318
      @zixea3318 Před 14 dny +6

      Bro got smashed by the power of human will. 💀

  • @cjab__
    @cjab__ Před 15 dny +2799

    "Hey, RetroGamingNow, this is Mojang. We saw your video about the 7z thing. It seems to be... Popular... How much money can we pay you to make another video telling people not to crack the password?"

    • @Jake28
      @Jake28 Před 15 dny +113

      LOL

    • @thatwelshman2713
      @thatwelshman2713 Před 15 dny +168

      Lol, it sounds like it for someone who loves mysteries he's really trying to get people to give up cracking it.
      To be honest do I think it's anything big? probably not lol but it's stil funny.

    • @SparkingSparks
      @SparkingSparks Před 15 dny +102

      This feels extremely out of place, and a weird follow up I just don't see the thought process for creating this video the way he did, if he was slightly less leaning on "don't solve it guys, not worth it" I'd find it less strange but it's like the sole purpose for this video was discouraging people from solving it. Maybe he really just thinks it's not worth it or too risky? Idk it's odd.

    • @CrateSauce
      @CrateSauce Před 15 dny +24

      Hi mean he explains it in his video. It's most likely a crime. Big risk, small reward.

    • @GhostGlitch.
      @GhostGlitch. Před 15 dny +17

      ​@@CrateSauce It being a crime only really matters if Mojang were to push back on it. And if it does get cracked and really is nothing valuable, it'd be a problem disaster for them to do so

  • @phoebus86
    @phoebus86 Před 15 dny +1666

    The fact there was never concrete proof of anyone opening and proving the files is 1.0 will always perpetuate the mystery no matter how mundane it is.

    • @Reyes-zq9qv
      @Reyes-zq9qv Před 15 dny +57

      True. But if the contents of the file are as mundane as they say, it makes me think there's a small chance that a former Mojang developer might come forward and publish the password somewhere. Since there isn't anything secret inside the file, there would be no reason to keep the mystery alive. Or perhaps that is exactly what they wanted from the beginning - a hoax. This whole mystery has brought a lot of attention to the game and united the community in the common goal of trying to crack the password and solve the darn mystery, which makes me think it might've been intentional.

    • @Russellsauce
      @Russellsauce Před 15 dny +9

      when we put our minds together, humans have achieved many seemingly impossible accomplishments throughout history, and I think cracking this code is in some way, shape, or form as possible as erecting a mile tall skyscraper, but what do i know : /

    • @dumbprotogen
      @dumbprotogen Před 15 dny +8

      ​@Reyes-zq9qv The devs has said repeat that they forgot the password. So even if it is as mundane, it's probably they just don't remember. Of course, they could be lying but I don't think they're trying to create a hoax assuming that is it just minecraft 1.0

    • @twta_
      @twta_ Před 15 dny +4

      ​@@Russellsauceyeah but this aint worth anybody's time

    • @_Shay_
      @_Shay_ Před 15 dny +7

      @@Reyes-zq9qv Like RGN said it’s very likely no one at Mojang remembers the password.
      The decoy swap and that talk show video clip was the hoax and entertainment not the original. Someone at Mojang (most likely Tobias) saw the traction the topic was getting on the forums and had an idea to actually turn it into a game for the community. Which I think even further proves the OG file had nothing special.

  • @l0lLorenzol0l
    @l0lLorenzol0l Před 15 dny +1183

    The idea of someone suggesting "just break the AES-256 encryption" as a solution is up there with Q suggesting "just change the gravitational constant of the Universe" as insane overkill solutions

    • @JK-gm6kk
      @JK-gm6kk Před 15 dny +18

      "I don't need your fantasy women!" Commander William T Riker

    • @drmonkeys852
      @drmonkeys852 Před 15 dny +8

      Queue the bill gates with an overly large pin pong racket meme

    • @GhostGlitch.
      @GhostGlitch. Před 15 dny +57

      Yea, just completely destroy modern cryptography. NBD

    • @VixYW
      @VixYW Před 15 dny +35

      Give it to the 2b2t community. They are the masterminds of overkill methods when it comes to minecraft. They'll break the encryption wide open in a week with the right incentive, regardless of the consequences.

    • @JmbFountain
      @JmbFountain Před 15 dny +14

      Probably more likely to try and break the encryption implementation of 7zip

  • @signbear999
    @signbear999 Před 15 dny +663

    7:47 I am devastated that "admin" is not among the top 96 passwords.

    • @snowrose124
      @snowrose124 Před 15 dny +51

      by any chance, would your password happen to be admin?

    • @XarmenKarshov
      @XarmenKarshov Před 15 dny +49

      The general userbase probably don't know what admin means honestly. You have to think, one of the only things people keep admin as the password for is their internet router because the ISP puts it there.

    • @justanew
      @justanew Před 15 dny +7

      lol first things i saw were f###me and f### lol

    • @applesource8261
      @applesource8261 Před 15 dny +12

      @@snowrose124 probably not but since most standartpasswords are admin its probably likely. Just the amount of companies that probably never set up their passwords along should have made the list

    • @hariranormal5584
      @hariranormal5584 Před 14 dny

      @@applesource8261 Yeah. vendors now are randomizing passwords. newer routers and appliances do not use admin as logins anymore because people do not change passwords.

  • @dinnerbone
    @dinnerbone Před 15 dny +502

    12:55 - For what it's worth, I just downloaded the original file and decrypted it no problem. Some of us remember the password. 😉

    • @tameranian
      @tameranian Před 14 dny +61

      evil

    • @IQorJustQForShort
      @IQorJustQForShort Před 14 dny +17

      WHAT!?!?!??!???

    • @Gufler_
      @Gufler_ Před 14 dny +1

      YO

    • @zenreeio13IIIlI
      @zenreeio13IIIlI Před 14 dny +78

      If someone wanted proof RetroGamingNow was asked by Mojang to incentivise people to NOT decipher the password. There it is

    • @AstoriaGaming
      @AstoriaGaming Před 14 dny +23

      you have the chance to do the funniest thing ever and tell people some clues
      also hello Nathan!

  • @jloran244
    @jloran244 Před 15 dny +765

    I don't know why people haven't tried this yet but the password is most likely in Swedish. Mojang at the time was mostly comprised of a very small development team.

    • @Shock_Treatment
      @Shock_Treatment Před 15 dny +191

      We've tried many Swedish wordlists.

    • @ceqell
      @ceqell Před 15 dny +52

      @@Shock_Treatment really? srry if i sound a bit uneducated i havent been in the discord yet

    • @user-cm5uk6ei6p
      @user-cm5uk6ei6p Před 15 dny +14

      Isn't it only numbers

    • @PlanetDoong
      @PlanetDoong Před 15 dny +138

      @@user-cm5uk6ei6pthe video establishes that these claims were mostly trolls

    • @caedenmolloy
      @caedenmolloy Před 15 dny +9

      Also most of Sweden speaks english

  • @ThunderCube3888
    @ThunderCube3888 Před 15 dny +1049

    Ok so this time I've actually figured it out. Tominecon is actually not the words "To MineCon," it is the words "Tom in Econ." The file contains the Economy Class notes of a student named Tom. His friend who worked at Mojang accidentally uploaded it to the Mojang servers and was unable to figure out how to remove it, so he encrypted it to prevent anyone from accessing Tom's Econ notes. Why are they so sensitive? Well, they actually contain a brand-new economic model distinct from any conceived before, where all money is given to Entity 303, who eats it and in exchange hacks the code of the simulation of reality to give people food and other basic necessities. Tom didn't want his idea getting out because he was not ready to reveal it himself and couldn't have anyone claiming the idea for themselves. I have to type quickly because Tom has Entity 303 himself going after anyone who knows the truth, but the key to open the file is-

  • @disgruntledwookie369
    @disgruntledwookie369 Před 14 dny +105

    As a software developer I feel reasonably confident that someone who worked for mojang and was at minecon needed some files from the mojang private file server which couldnt be reached from outside the network. As a workaround someone in the office zipped the files with a password and slapped it on the public server so it could be downloaded, sent the password to the person who minecon who downloaded the file, got what they needed, and then deleted the password from their chat history to be safe and no one remembered to go back and delete the file from the public server.

    •  Před 13 dny +9

      That's what I thought of as well. After all it's called tominecon and not forminecon. To me, that sounds like sending some information to someone else.

    • @LavaCreeperPeople
      @LavaCreeperPeople Před 13 dny +1

      nice

    • @giin97
      @giin97 Před 12 dny +5

      100% what I expected. Network restrictions, email attachment limits way to small, throw it on a public server with a password.

    • @leakingamps2050
      @leakingamps2050 Před dnem

      Dinnerbone said that he had to go through his old emails, but still had the password

  • @Mosnar23
    @Mosnar23 Před 15 dny +503

    I’m calling it now, somebody is going to comment “As someone named John S., I feel personally called out.”

    • @memorymanxd
      @memorymanxd Před 15 dny +43

      As someone named John S., I feel personally called out.

    • @Sploobicious
      @Sploobicious Před 15 dny +5

      He knows who he is

    • @DukeOfLasagna
      @DukeOfLasagna Před 15 dny +7

      Well, that's technically my dad's name 😂 should I tell him to subscribe?

    • @ichangedmynamenow3478
      @ichangedmynamenow3478 Před 15 dny +7

      YOU KNOW WHO YOU ARE JOHN

    • @jonskillings1258
      @jonskillings1258 Před 15 dny +6

      ​@@ichangedmynamenow3478 Me, breathing a sigh of relief that I'm Jon

  • @laugherdose655
    @laugherdose655 Před 15 dny +34

    bros being held at gunpoint while recoding this video for sure

  • @Cheato64
    @Cheato64 Před 15 dny +443

    The actual responses in your server were so damn funny. Nobody knew what they were talking about LMAO.

    • @adansmith5299
      @adansmith5299 Před 15 dny +133

      i got a headache from that discord user talking about infiltrating the file with a virus

    • @a-bombmori7393
      @a-bombmori7393 Před 15 dny

      ​@@adansmith5299 AI deep learning is what does it for me

    • @pieru
      @pieru Před 15 dny +32

      digital natives at work

    • @Wyattporter
      @Wyattporter Před 15 dny +47

      @@adansmith5299same, I was like “and how, pray tell, would you do that?”

    • @pianoboyedm4829
      @pianoboyedm4829 Před 15 dny +17

      do people not realize half of them were being sarcastic

  • @MoDrama_BandDqw4
    @MoDrama_BandDqw4 Před 15 dny +192

    imagine someone finally gets the password for the 7z after nearly 15 years, and realize that mojang wasnt lying when they said it was just 1.0

    • @Kibutsuji_Muzan7
      @Kibutsuji_Muzan7 Před 15 dny +18

      The things Dinnerbone said about the file are terrifying , if its true , means all the others were lying

    • @FAB1150
      @FAB1150 Před 14 dny +6

      Well sure, I think it's something mundane. But now it's become a challenge to crack it, less for the content and more for the act of cracking it:)

    • @MoDrama_BandDqw4
      @MoDrama_BandDqw4 Před 14 dny +2

      @@FAB1150 but still, that would be so dissapointing and underhwleming

    • @plasmachicken
      @plasmachicken Před 14 dny

      ​@@Kibutsuji_Muzan7 Dinnerbone posted the content 😮

  • @kirkix4125
    @kirkix4125 Před 15 dny +257

    I usually don't comment anywhere but i really gotta say this. 1.0 was compiled on the 14th of November 2011. This means that even release 1.0 is older than this mysterious file. Everyone can find that out by just opening the 1.0 jar file with any kind of zip or rar program.
    If it is not the 1.0 jar file, which i doubt that it isn't, then it is definitely just some presentation data from Minecon 2011. Whatever is in that file it is probably not that special but it probably has some historical value to some archivists.
    I personally don't care about the contents but it is interesting to learn about passwords and how they work

    • @zane49er51
      @zane49er51 Před 15 dny +20

      I wonder how large a minecraft release is with all the debug headers and such kept in. It could both be "the minecraft 1.0 release" and also something exciting - it would be cool to get a slightly better glimpse into how miencraft devs named functions and variables at the time, or as the original video theorized, some kind of proprietary tooling

    • @orclev
      @orclev Před 14 dny +4

      @@zane49er51 Wasn't Minecraft still written in Java at the time? If so there really isn't debug headers (or debugging symbols) in the traditional way, it's all just class files and there's no difference between release and debug builds. If there's anything sensitive in that archive, I think the most likely scenario is some signing certificates. That said unless Mojang were morons on a scale that boggles the mind, there's no way they would actually put signing certificates into an archive that was uploaded to the internet even IF it was password protected. Signing certificates are treated like nuclear launch codes, ideally air gapped and entirely offline.

    • @LosFarmosCTL
      @LosFarmosCTL Před 14 dny +5

      @@orclevmojang obfuscates all the classes and functions in the released jar
      they might’ve not done that during the 1.0 time, no idea anymore too long ago, but if they did and the archive contains one without the obfuscation that could be pretty cool for 3rd party devs

    • @zane49er51
      @zane49er51 Před 14 dny +2

      @@orclev Yeah it was. I still only play Java so hearing it like that sounds so off lol. You're right, I forgot the JVM worked that way. Still, they obfuscate as losfarmos said. They also don't resist deobfuscation in their EULA so it would be cool to use the official names in forge/fabric

    • @zane49er51
      @zane49er51 Před 14 dny +1

      Plus there are some bits that don't get as much deobfuscation work done on them like most of the minecart related code. It would help get a baseline everywhere that the old version included

  • @Seedx
    @Seedx Před 15 dny +211

    Guess we'll just have to wait until they get quantum computers to work.

    • @U20E0
      @U20E0 Před 15 dny +33

      The thing is, AES is a symmetric cipher.

    • @Blarttttt
      @Blarttttt Před 15 dny +27

      AES is resistant against quantum computers

    • @plankera
      @plankera Před 15 dny +11

      @@BlartttttFor now, soon (as in a maybe a couple decades) they will surpass AES 256 which is why people are working on new encryption algorithms that neither binary nor quantum computers can crack.

    • @JK-gm6kk
      @JK-gm6kk Před 15 dny +1

      absolute zero to cool a quantum cpu has to be an enormous pain as it is

    • @drmonkeys852
      @drmonkeys852 Před 15 dny +4

      @@plankera Well the algorithms actually are already done and have been published in the new TLS 1.3 standard. It's now on the developers to update software so the encryption is quantum proof

  • @MrFallout984
    @MrFallout984 Před 15 dny +147

    Trying to teach minecraft kids Cybersecurity is a fruitless effort. Just crack the encryption, hur dur
    Also Dinnerbones is just trying to scare you. A publicly uploaded file is perfectly legal to crack.

    • @Zikiro
      @Zikiro Před 15 dny +15

      In USA law this is not true. Even if something is public, unless you are given specific permission it is still considered illegal. Otherwise they couldn't go after people who publicly accessible directories that some company left public, but contained sensitive info like passwords, one time passwords, personally identifiable information or just general sensitive information.

    • @schwingedeshaehers
      @schwingedeshaehers Před 15 dny +4

      it is not. it can also be illegal to share a password of a uploaded file.

    • @wedoalittletrolling723
      @wedoalittletrolling723 Před 15 dny +5

      @@schwingedeshaehers it's not illegal if you're already a wanted fugitive
      (jk it's still is, but you just end up with additional charges + you prob have the police or feds on your tail)

    • @schwingedeshaehers
      @schwingedeshaehers Před 15 dny

      @@wedoalittletrolling723
      (in the case i thought about, that wouldn't be a good decision) (i thought that a whistleblower uploads an encrypted file with evidence/secret information, and passes the password for security to another person, you don't want that they have any reason to jail them before they can release the password, if something happens)

    • @shauas4224
      @shauas4224 Před 15 dny +12

      Its legal to crack but the moment you give password out - you commited a crime. I doubt mojang will care but nonetheless

  • @datonerussiandood
    @datonerussiandood Před 15 dny +189

    Start: Minecraft
    Middle: Vsause
    End: Minecraft

    • @gregoryturk1275
      @gregoryturk1275 Před 15 dny +13

      I’m outside your home. Or am I?

    • @kianchristopher7704
      @kianchristopher7704 Před 14 dny +3

      @@gregoryturk1275 This is a funeral for michael's unfortunate passing, or is it?

    • @gregoryturk1275
      @gregoryturk1275 Před 14 dny +2

      @@kianchristopher7704 I’m dead. Or am I?

    • @acemany
      @acemany Před 14 dny +1

      Oh yes, Michael here

    • @resphantom
      @resphantom Před 14 dny +4

      Hey Michael, vsauce here. What are fingers?

  • @pablocardona8158
    @pablocardona8158 Před 14 dny +14

    Bro really filled half the video with a summary of the last one

    • @seriouscat2231
      @seriouscat2231 Před 8 dny +1

      He's in love with his own voice. I hope other videos on this channel are better.

  • @thenamelesschannel1463
    @thenamelesschannel1463 Před 14 dny +19

    7:46 The fact that passwords like "penis", "fuckme", "fuck", "fuckyou" and "asshole" are considered some of the most popular passwords is hilarious to me.

  • @2002jmf
    @2002jmf Před 15 dny +93

    it's like a lootbox that you know sucks but are still willing to spend $20 on

    • @vnc.t
      @vnc.t Před 14 dny +2

      you don't know it sucks, someone said it sucks maybe it does maybe it doesn't

  • @warlordish
    @warlordish Před 15 dny +25

    As someone named John S., I feel personally called out.

  • @probablyaxenomorph5375
    @probablyaxenomorph5375 Před 15 dny +36

    The most baffling thing to me is that if it's so mundane, why don't they just... tell us what's in there? Dinnerbone obviously knows something, and if it's as unexciting as he claims it is, what's the point in keeping it a secret? It's just weird and dodgy how secretive he's being about something so "uninteresting".
    Edit: Huh. Alright.

    • @martijnalblas1761
      @martijnalblas1761 Před 15 dny +10

      They did tell us; minecraft 1.0

    • @lagomoof
      @lagomoof Před 15 dny +8

      My bet is that it also contains the authentication server code for 1.0 which would have been top secret at the time, but has long since been replaced. Imagine they wanted to create a stand-alone, no Internet version of Minecraft that works like the real Minecraft to run at Minecon. That would be one way to do it.

    • @zacknattack
      @zacknattack Před 15 dny

      ​@@martijnalblas1761 but if it's just that, why not just give up the password and let people see it for themselves?

    • @darklex5150
      @darklex5150 Před 14 dny +5

      Probably because he doesn't want the mystery to die, if dinnerbone told you exactly what's inside the file and gave you the password, and it indeed turns out to be as mundane as he says then the mystery would die pretty quickly, in fact, you wouldn't be watching this video because this video wouldn't exist.
      The mystery is a mystery because we don't know what's inside, and the fact that IT IS A MYSTERY is the entertaining part, not what's inside, that's the boring part.
      Some mysteries are better left unsolved, this one in particular is that case.
      Edit: he apparently did want the mystery to die so people would stop nagging him about it lol.

    • @probablyaxenomorph5375
      @probablyaxenomorph5375 Před 13 dny +2

      @@darklex5150 Idk man, I'm more frustrated than amused at this point 😅 I personally find mysteries most interesting when they finally have a conclusion.

  • @Arnut.Mapping
    @Arnut.Mapping Před 14 dny +6

    Isnt it funny how the guy saying “thats illegal territory” is the same guy who said “brute force it”

  • @ethanfogarty9540
    @ethanfogarty9540 Před 15 dny +107

    Hello Retro, I really enjoy watching your Minecraft lore videos, and the last two have especially caught my attention. I am a Computer Science student at UCO, and I just completed a Cybersecurity course for the Spring semester. I wanted to chime in regarding AES encryption while the information is still fresh in my brain.
    AES is a block cipher, meaning it will encrypt an entire block of data at a single time. The block size is always 16 bytes, or 128 bits. The default mode of AES (ECB, or Electronic Code Book) has a specific weakness where identical plaintext blocks will produce identical ciphertext blocks. This is due to the same, unchanged, key being used to encrypt each block. This means that if the file is encrypted using ECB mode, the overall pattern in the data will be easily visible even without needing to decrypt.
    There are a few other modes of operation used with AES, each of which require something called an Initialization Vector (IV). This is a random number that ensures blocks will produce different ciphertext regardless if they have identical plaintext. The IV has a fixed size of 128 bits (same as block size), which means it has 2^128 different possibilities. This means that if the file is encrypted using any mode other than ECB, you would need to guess not only the key, but the IV as well, leading to a calculation requirement of 2^128 * 2^256 (depending on the key size). If the IV generator is predictable, you can easily guess it but you would need multiple messages to see a pattern in the IV generation, and since this is a single file that is not an option. Overall the computation requirement would be around 2^384 to brute force an AES-256 encrypted file that was encrypted using a mode of operation including an initialization vector.
    I hope I could provide something you didn't previously know and these past two videos have been super interesting to me! I love being able to share knowledge from school so it doesn't just go to waste!
    P.S. If you use Linux and read the file in hexadecimal format, you could probably pick out a pattern pretty easily if encryption was done using AES-256-ECB!

    • @MrBlueBonez
      @MrBlueBonez Před 15 dny +6

      u should get a hold of the file and read the file in hexadecimal format using linux then

    • @alphonse5686
      @alphonse5686 Před 15 dny

      @@MrBlueBonez here's the first bit of it in hex:
      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
      (way too huge to send the entire thing)
      i don't really see any patterns tbh

    • @etaoinwu
      @etaoinwu Před 15 dny +12

      Using ecb would be considered a fundamentally flawed implementation. 7zip uses aes-256-cbc. you also don't need to brute force the iv; iv is attached with the ciphertext (otherwise a user with the correct password would not be able to decrypt.)

    • @ethanfogarty9540
      @ethanfogarty9540 Před 15 dny +7

      ​@@etaoinwu You are correct! The IV can be sent in clear text in the case of CBC (Cipher Block Chaining) mode. This is because the IV is only used as an input to AES for the first block of data. The resulting ciphertext / plaintext block is then "chained" to the input of AES for the next block, along with the symmetric key.
      It is cool to know that the file was encrypted using CBC! Thank you for pointing that out.

    • @vitulus_
      @vitulus_ Před 14 dny +1

      It's CBC, so its a lot more preferable to check passwords. The IV is not a secret -- and often isn't. Unfortunately, 7zip uses 2^19-times (~500k) iterated SHA256 on the password.

  • @45545videos
    @45545videos Před 15 dny +39

    "why dont we try breaking the encryption" LMAO

    • @QUBIQUBED
      @QUBIQUBED Před 14 dny +2

      its almost as if...
      if we've been trying just that!!!

    • @Rustmilian
      @Rustmilian Před dnem

      ​​​@@QUBIQUBED Every single nation state actor in the world has been trying to do that, and they failed... You can't crack AES like that.

  • @presentfactory
    @presentfactory Před 15 dny +91

    One should remember Dinnerbone is not a Mojang spokesperson nor were they even there at the creation of the original file so they really have no authority to tell people what they should do around this manner.
    Also, while it is true no one has given explicit permission to try and open the file, the fact that in 13 years no one with authority over the matter has said /not/ to is all the confirmation one needs to know it's fine. If this ever changes then yeah it'll be different, but it is plainly obvious that this is something the creators of the file are fine with and have been fine with ever since the initial community interest in the file in 2012, because as the "decoy" file indicates probably all of Mojang has been aware of this at one point or another back when it was actually relevant.

    • @zixea3318
      @zixea3318 Před 14 dny +3

      This is exactly what I was trying to say. Dinnerbone has absolutely no authority on the file. I think he’s only concerned about people getting arrested

    • @sharp14x
      @sharp14x Před 14 dny +1

      Telling people not to would be make it far more compelling to do so.

    • @vombgrillz
      @vombgrillz Před 13 dny

      Crazy idea, maybe the content is illegal, and they can't rely on legal matters to protect the file, their only chance of keeping it hidden is to make people uninterested or afraid.

  • @ferenccseh4037
    @ferenccseh4037 Před 14 dny +6

    If it's so boring why don't they just *actually* tell us what's inside? As RGN pointed out in the last video, Minecraft 1.0 is too small by itself. So just tell us what else is in there

  • @BytePix_
    @BytePix_ Před 14 dny +38

    I like it how you kept talking about the odds of finding the password for the 7z file for a solid ~5 minutes

  • @Ashnurazg
    @Ashnurazg Před 15 dny +12

    Cracking the file's password is worthless as the time bruteforcing the password is simply not possible at the time. There are 3 ways to approach this:
    1) A weakness in SHA256 that reduces the entropy of the encryption key generation (even if broken that is just the key generation, not the encryption broken)
    2) A weakness in AES256 that makes it easier to break. 7zip seems to use the CBC cipher mode and a 64 bit or 128bit long random IV (very unlikely atm)
    3) If parts of the plaintext are known that helps in a known-plaintext attack on the encryption. We don't know what's inside, so that's not applicable
    We can only wait until we have the computational power for trying to bruteforce it or the encryption algorithm itself is broken. As long as we don't have it even trying to break it is not worth it

    • @lnro4494
      @lnro4494 Před 15 dny +1

      Could we really not throw quantum compute at this? The version of AES-256 used here was built way before quantum conputing was something people realistically had to worry about in 2011-2012. IBM also has publicly accessible albeit not free (most likely) access to qcompute. Perchance ?

    • @ScarredToons
      @ScarredToons Před 14 dny

      Has anyone done any kind of frequency analysis of the data? As I understand the CBC mode of operation is susceptible to this (just some textbook knowledge, so no idea on the practical side). Perhaps we can convince a state sponsored entity to care...

    • @Iwasneverevenhere
      @Iwasneverevenhere Před 14 dny

      ​@@lnro4494no, for multiple reasons.
      (keep in mind that I don't know that much about it, so all the information below is what I've been able to piece together from quick Google searches - take it with a grain of salt!)
      One is that with the best currently known theoretical attack (Grover's quantum search), it would still take 2^128 operations (much less than 2^256, but enough to still be considered secure).
      The other is that this algorithm would require 256 qubits, if I understand it correctly. While machines with more than that exist (although I'm not sure how many qubits can be involved in any single operation), using just a single physical qubit would lead to unusably high error rates.
      Therefore, you need to represent one "logical" qubit with multiple physical ones, which also makes your operations much more complex. The highest I've been able to find with a quick search is 48 logical qubits. The highest for a successful Grover search seems to be much lower still.
      It will be interesting to see how fast these numbers will grow in the next few years.
      Finally, a comment: when people currently worry about post-quantum security, it's not because anyone is worried that it's currently possible to crack encryption with quantum computers, but because it's at least plausible that it might be possible within 20-30 years. Therefore, the risk is that encrypted communication that is still secure right now could be stored to be cracked as soon as it is possible, so we should be switching to post-quantum secure encryption as soon as possible.

    • @mega_gamer93
      @mega_gamer93 Před 14 dny

      @@ScarredToons The file is also compressed so there's probably very little non unique data

    • @mega_gamer93
      @mega_gamer93 Před 14 dny

      @@lnro4494 there is no such thing as a new version of AES. New implementations of an algorithm exist, and new algorithms exist as well, but there is no such thing as an "older version of AES"
      Besides, quantum computers are not some ultra powerful computing device that can do whatever you want it to. They can solve _specific_ problems extremely fast compared to conventional computers, and others very slowly. From what I know there is no known algorithm that can make cracking even AES-128 viable, much less AES-256. And besides, how would you get access to a quantum computer?

  • @Dinoguy1000
    @Dinoguy1000 Před 15 dny +59

    Just because the original tominecon.7z is uncrackable doesn't mean that's the end of the mystery: there's still the supposedly "junk data" binary blob in the decoy, which may turn out to be more meaningful upon closer examination (if no one has looked at it more closely yet).

    • @wedoalittletrolling723
      @wedoalittletrolling723 Před 15 dny

      If you somehow crack it, i think you have the NSA after you because you'd be a risk to national security so the file would be the least of your concern as now you are a wanted fugitive.
      So don't bother, there is nothing interesting in it anyway. No source code or anything, just 1.0 release

    • @LavaCreeperPeople
      @LavaCreeperPeople Před 14 dny +1

      ok

    • @CuteistFox
      @CuteistFox Před 14 dny

      As a security expert, even long "secure" passwords are easy to crack if you combine the kaonashi wordlist (uses human phsycholagy) and the unicorn ruleset. You can probly crack it in 2 weeks with a RTX 4090 and hashcat.

    • @Rarisma
      @Rarisma Před 14 dny +3

      the file is encrypted.
      we can't make sense of anything in the zip until its cracked.

    • @Hacker_Kamyko
      @Hacker_Kamyko Před 14 dny +17

      ​@@RarismaThey're talking about the "junk" data in the decoy version which has been successfully cracked, with it's password being "thespicemustflow" (I think)

  • @badger273
    @badger273 Před 15 dny +65

    I feel like this is just a microcosm of the human condition. You tell a human something's impossible they're like "bet, lemme try I'm built different." We want to overcome impossible odds just to say we can, and we continue to try ad infinitum because that's the only way it *could* happen. And I think there's something beautiful in that. But it can also get very silly sometimes

    • @GhostGlitch.
      @GhostGlitch. Před 15 dny

      Yea. Same shit that lead the US to land a man on the moon just to prove we were cooler.

    • @Supahdenning
      @Supahdenning Před 15 dny +2

      Known as the Faustian spirit

    • @GoGicz
      @GoGicz Před 15 dny

      Well this Is possible to crack you just need a lot of time on your hand, Its easier to just find different way at that point, i seen many talented people make something impossible to possible, though IT was much smaller deal than this.

    • @nescafeblend43
      @nescafeblend43 Před 15 dny +3

      i love humanity 🥹

    • @mulhollandoverdrive
      @mulhollandoverdrive Před 15 dny +1

      @@GoGicz you would literally need more time than is available to you. this is just functionally impossible with current means and knowledge.

  • @OnePoundBird
    @OnePoundBird Před 15 dny +42

    Perhaps in the furture the encryption system is broken down. And then, instead of looking at what governments were hiding, we can look at what some long lost cave game had hidden in it.

  • @Draconicfish2679
    @Draconicfish2679 Před 15 dny +104

    Funnily enough, after you mentioned the number of cells in the human body, my immediate guess was that the number of atoms in the observable universe was close to the number of possible passwords

    • @xxGreenRoblox
      @xxGreenRoblox Před 15 dny +7

      well technically him and you were completely off the mark because they aren't the same number of zeros i'm pretty sure the number of atoms in the observable universe was about 100 times larger

    • @Draconicfish2679
      @Draconicfish2679 Před 15 dny +14

      @@xxGreenRoblox yeah but it was still the closest thing he did as a comparison

    • @ElysetheEevee
      @ElysetheEevee Před 15 dny +9

      ​@xxGreenRoblox
      He never said it was the same number of zeros. His exact wording was actually along the lines of "This is the closest we've gotten" as far as the number of combinations. The comparisons were less to find the exact number in something else and more to give viewers a direct idea of how insanely huge that number is. Humans have a limited ability to internalize large numbers like this, so it's difficult for most everyday humans to truly grasp how large that amount is.
      I always find it baffling how people like you, who thrive on pointing out peoples' "errors" don't ever take context and truly listen to what a person says into consideration. He made it incredibly clear the entire time that getting the same immense number would be very difficult, so he got the closest he could to establish the difficulty in getting to that amount.

    • @gugoluna
      @gugoluna Před 15 dny

      Same

    • @mulhollandoverdrive
      @mulhollandoverdrive Před 15 dny +2

      @@ElysetheEevee context doesn't matter when there's an opportunity to correct someone on the internet

  • @Sollace
    @Sollace Před 14 dny +4

    3:12 You don't need to guess the 256-bit key, though, just the password that was used to generate it. In the last video you said we knew the length and that it only has numbers. That's fairly easy to brute-force by trying every combination, and that's not even considering the possibility of a key collision.

    • @therealwisemysticaltree
      @therealwisemysticaltree Před 14 dny +1

      It was already discussed in the video that most of those comments were just trolls, so the password could be anything longer, shorter, with and without letters. It's been tracked down to literally anything

    • @Izerion
      @Izerion Před 13 dny

      @@therealwisemysticaltree Yes, but who is going to use a 256 character password on a file they would decrypt manually? It is much more likely to be short, even if it is not simply 16 characters and numbers you can go through few character passwords in a microscopic fraction of the time it takes to go through all 256 character combinations

    • @therealwisemysticaltree
      @therealwisemysticaltree Před 13 dny

      @@Izerion mcdonlads mcchiken bunger

  • @hatyyy
    @hatyyy Před 15 dny +39

    If they removed the file, people would definetly notice, and people with the file would continue to share it, making it easier to access.

    • @social_ghost
      @social_ghost Před 15 dny +10

      This is what I said in my comment on the first video. Totally agree, if they had just deleted the file it would have drawn way more attention to it from parties outside the Minecraft community. To imply otherwise seems like willful ignorance or deception.

  • @Elimentox
    @Elimentox Před 15 dny +34

    I wanted to go to sleep just now, there goes my sleep schedule

  • @user-pu4kt1mb4x
    @user-pu4kt1mb4x Před 14 dny +11

    i swear if this file gets opened billions of years in the future to just be a rick roll or something similar, my atoms will come back from the dead and i'll detonate the sun out of rage

  • @VoidPelt
    @VoidPelt Před 15 dny +36

    THERES A CONTINUATION. YEAAAAAAAAAAH!
    Edit: Imagine the original file gets cracked, and it’s just a fucking Rick Roll and they planned this entire thing lmao

  • @VixYW
    @VixYW Před 15 dny +4

    Just a heads up, it is not a crime to crack it if the file was publicly available.
    Also, I disagree that taking down the file would be a better approach to keep people away from it. By taking it down, people that had it would feel an instant urge to preserve and look further into it. But replacing it is a whole different story. Not everyone will notice it was replaced, and even if they do, they might not have it downloaded, and the ones that do might not be aware that the file can no longer be obtainable and might not preserve it. The fact that one guy happened to have it lying around is almost a miracle after all those years. If not for that, Mojang would have successfully erased the file from history forever, which seemed to be the goal.

  • @ItsJoeyG
    @ItsJoeyG Před 15 dny +136

    two videos in less than a week?! blink twice if you need help

  • @spaghetti_man3807
    @spaghetti_man3807 Před 14 dny +3

    i just realized the file was uploaded on 11/11/11

  • @JaimieWFYT
    @JaimieWFYT Před 15 dny +138

    Given the odd amount of War Thunder stories about leaking US documentation, I can’t say I’d be surprised if AES-256 encoding would somehow be broken over a Minecraft mystery

    • @Crawldragon
      @Crawldragon Před 15 dny +42

      Well it kind of is, because as RGN says there's technological methods in the way making it mathematically unviable to try to crack the password. The reason US documents keep getting leaked to War Thunder forums is because of human error, and unless someone at Mojang accidentally leaks the password it's unlikely that human error will overcome those technological methods. Remember: Humans are the weakest point in any security system, because humans make mistakes and humans are nice. Computers don't care.

    • @45545videos
      @45545videos Před 15 dny +12

      Not remotely similar

    • @VixYW
      @VixYW Před 15 dny +7

      @@Crawldragon It is mathematically unviable to crack the password, but this might not be the case to reverse engineer it if they broke the encryption method itself and managed to get the key.

    • @Seedx
      @Seedx Před 14 dny +5

      @@VixYW nobody's broken AES

    • @mega_gamer93
      @mega_gamer93 Před 14 dny +7

      @@VixYW If every group of/individual mathematician(s) and computer scientist(s) who has tried to crack AES failed a bunch of minecraft kids aren't going to achieve it

  • @illuminate4
    @illuminate4 Před 14 dny +2

    I do think it is odd that dinnerbone will not explicitly say what the file contains. he always refers to it vaguely.

  • @monke7611
    @monke7611 Před 14 dny +8

    "90% of gamblers quit right before they hit big".
    Now that's motivation

  • @crazydud2432
    @crazydud2432 Před 15 dny +24

    my theory for the extra file size is that it is minecraft 1.0 but possibly with revision history, showing what changes where made when and dead branches off the main code that where bugged, didn't work, or where simply chosen to be completed later.

    • @Dovenchiko
      @Dovenchiko Před 14 dny +2

      Was thinking it was the 1.0 compiled .jar and the source code. Java uses a VM so it shouldn't matter but it's industry standard to include the source and a script to compile the game on the presentation machine in case the exe fails to run.
      That or it could have a mod or program to script the demo and avoid the inherent RNG of the game with perfect inputs.

  • @ChevronTango
    @ChevronTango Před 13 dny +3

    My bet is that its not only the 1.0 build but a load of dependencies such as the jre that would have been needed to get a basic machine working from scratch. I suspect that it was likely placed in the public assets so that it could easily be pulled down by staff members at the con to setup any machine they needed.

    • @ifeigen
      @ifeigen Před 13 dny

      Precisely what I've been thinking. Idk shit about game dev but it's probably dependencies and source codes. Did git exist back in 2012? Maybe it's also some kind of version control?

  • @XxFayssalxX
    @XxFayssalxX Před 15 dny +33

    Actually, quantum computers are getting closer and closer to breaking AES-256 because quantum computers can reduce the possibilities to 2^128≈3.4*10^38, which is much much less the 1.15*10^77

    • @soniablanche5672
      @soniablanche5672 Před 15 dny +3

      that's still too much possibilities

    • @GoGicz
      @GoGicz Před 15 dny +1

      Not to mention realistically we can cut lot of IT Down cause Chance of IT having to go through every single password And the last possible number being the password we needed Is nearly impossible just As the password being Brute forced in seconds.

    • @schwingedeshaehers
      @schwingedeshaehers Před 15 dny

      i still don't think that your guess is correct. there is AES 128, which still counts as practical secure, (with 126,1 buts security) (but it needs a bit of storage, over 9000 tb of storage to be exact)
      so if aes 128 is secure against current attacks, aes 258 should just fall to aes 128 with quantum computers.
      yes, it will make it much easier, but it is still out of reach until something is found, that helps a bit

    • @schwingedeshaehers
      @schwingedeshaehers Před 15 dny

      ​@@GoGiczin average it is half the time, so it doesn't help in that case. does ut make a difference if it is 100000 years or 50000?

    • @Sehyo
      @Sehyo Před 14 dny

      ​@@schwingedeshaehersWhere do you get half from?

  • @zincberg
    @zincberg Před 14 dny +1

    "In todays marketing class, we would like to show you how to create conversation and interest in your brand with this one simple trick..."

  • @qIiphah
    @qIiphah Před 15 dny +7

    best feeling ever, i just watched the first video of this and checked to see if there was another video not expecting to see anything and then i see this video posted 35 minutes ago
    (havent watched it yet but im sure its awesome since i really enjoyed the first)

  • @CBG0315
    @CBG0315 Před 15 dny +32

    I don’t even think a NASA supercomputer could go through each and every single key in a persons lifetime

    • @doctorsarcasm.
      @doctorsarcasm. Před 15 dny +29

      Hold on hold on brother just hear me out, TWO nasa supercomputers.

    • @davidchalmers6753
      @davidchalmers6753 Před 15 dny +6

      The likelihood that the very last attempt would give you the password is extremely small. You don't have to try every combination. You just have to try combinations until you find the correct one.
      Without knowing the length, this is pretty much impossible.

    • @45545videos
      @45545videos Před 15 dny +3

      If I'm not mistaken, all the computing power in the world put together working until the heat death of the universe wouldn't be enough to break it

  • @overlyconducktive
    @overlyconducktive Před 14 dny +1

    I will wait until quantum computing comes around and just say "Hey google, crack this password"

  • @Nightcaat
    @Nightcaat Před 15 dny +16

    Why can’t we just do a Minecraft@Home-type effort narrowed down to characters available on the Swedish Windows keyboard layout? It’s unlikely the password uses anything else

    • @BallisticWistfully
      @BallisticWistfully Před 14 dny

      Minecraft@Home said they wont do that for legal reasons

    • @mega_gamer93
      @mega_gamer93 Před 14 dny

      the length is still infinite, brute forcing would be similiarly hard. Also, how is it unlikely for the password to not use characters in the swedish keyboard layout? It's still very likely to be using english characters

    • @Nightcaat
      @Nightcaat Před 14 dny +2

      @@mega_gamer93 The layout still contains the Latin alphabet

  • @AveryChow
    @AveryChow Před 15 dny +29

    I think people underestimate how sloooooooow the 7Zip encryption algorithm is. it's not MD5, it takes FOREVER to brute force (mostly on purpose). until quantum computers reach the point of cracking AES-256, there is no way we'll ever see the contents of this file if the password is even remotely secure

    • @shauas4224
      @shauas4224 Před 15 dny

      Thats what im saying

    • @a_few_species
      @a_few_species Před 14 dny

      But it's not like it is 100% impossible as could be made seem by the video, thought. Just not possible today.

    • @mega_gamer93
      @mega_gamer93 Před 14 dny

      It actually isn't. It uses 1000 PKBDF iterations of sha256, which is not a cryptographically secure/slow algorithm, in fact, dedicated hardware acceleration for it exists on consumer computers

    • @cralo2569
      @cralo2569 Před 13 dny

      not really

    • @amogus3
      @amogus3 Před 9 dny

      ​@@mega_gamer93 this is interesting. do you have more info on that?

  • @WindowsEnthusiast
    @WindowsEnthusiast Před 15 dny +5

    The bee movie script. Nothing else. THE BEE MOVIE SCRIPT.

  • @matthewdemarey4762
    @matthewdemarey4762 Před 14 dny +1

    Something to mention that I think makes it most likely the 1.0 build of Minecraft is the fact that it was likely used to showcase the 1.0 build at Minecon in 2011.
    - First, it's just about twice the size of a compressed build of 1.0 Minecraft. This makes sense even if the file doesn't contain any sample content as it's common practice to include the source code, SDKs, and editors in internal builds of any piece of software as well as ALL licenses.
    - This makes sense even though the file isn't exactly twice the size of the 1.0 build. The 7-Zip software, as well as any other compression software, has various different options when compressing stuff. We don't know the exact settings they used to compress the original, so it's not hard to imagine the compression settings you used in your last video were just not the same as the settings used for the oringal file. Hell, maybe they didn't compress it at all. 7-Zip does in fact have the option to zip files but not compress them afterall.
    All in all, it's likely only really interesting to developers, and mostly for historical education on game development. There's almost certainly nothing in it of any more use to developers today, especially not when we have much more modern tools to help us actually make games. This was programmed in Java of all languages, which I would NOT want to use personally to make a game. lol

  • @Jan12700
    @Jan12700 Před 14 dny +3

    2:20 If I got a Penny for every time some big Security risk happened because of someone in the Minecraft Community tryed something, I had a couple of Pennys. I happens more often than you think. Most Botfarm are just there because some Trolls wanted to DDOS Minecraft Servers and Log4J was only found because of someone how tryed to Hack a Minecraft Server. If anyone can find a security flaw in AES-256, than it would be someone from the Minecraft community.

  • @lapislazers2373
    @lapislazers2373 Před 15 dny +4

    Mojang is unintentionally giving people ideas for Minecraft horror CZcams series

  • @asharfirdaus4147
    @asharfirdaus4147 Před 15 dny +4

    The content of the archive might be the friends we made along the way

  • @FerousFolly
    @FerousFolly Před 14 dny +2

    yall remember the Minecraft@Home project?
    perhaps it's time for Tominecon@Home

  • @phoenixwright5545
    @phoenixwright5545 Před 15 dny +1

    Two RGN videos released so shortly after one another! What an absolute treat. Thanks RGN

  • @A_cool_man
    @A_cool_man Před 15 dny +11

    As a mojang developer, i can confirm we are hiding obamas last name in that file

  • @PlanetDoong
    @PlanetDoong Před 15 dny +5

    I think that the contents of the file are interesting, even if on their own they are boring, the fact that they are the contents of this mysterious file is what makes it interesting, at least to me anyway

  • @SwervingLemon
    @SwervingLemon Před 13 dny +1

    My theory is that there's customer info in there and the decoy was meant to be a red herring. They had hoped that, once cracked, people wouldn't realize it wasn't the original and would file it away under "solved" and move on.
    Except someone noticed that it's not the same file.

  • @Hexra_
    @Hexra_ Před 13 dny +1

    RGN: "I have scattered 500 special atoms throughout the universe"
    Me, an immortal: "Bet"

  • @CakedW5
    @CakedW5 Před 15 dny +33

    imagine more stuff being unfolded in a part 2 of the hit video about tominecon.

  • @letsgoaway
    @letsgoaway Před 15 dny +4

    imagine it gets found and then its another password protected 7z

  • @Midaspl
    @Midaspl Před 14 dny +2

    There is more to cracking passwords you could use, like rainbow tables. 7Z is actually not that secure because it does not use salt in their hashes. However, it is difficult to crack because it does not actually use password verification. It just decrypts and tries to extract the file and if the data is bullshit, then the password was wrong. This makes the process way longer than usual approach.

  • @iplayminecraft2248
    @iplayminecraft2248 Před 15 dny +1

    This is my favorite mystery, especially the fact that it’s a real thing and not an arg (or at least it’s one by mojang themselves)
    So glad you’re making a follow up

  • @ferusgrim6226
    @ferusgrim6226 Před 15 dny +3

    So, you're telling me that @RetroGamingNow is in on the conspiracy?

  • @CollisionUniverse
    @CollisionUniverse Před 15 dny +28

    Its crazy how deep minecraft versions are and how much lore they have

  • @pedersenlasse
    @pedersenlasse Před 3 dny +1

    The most fascinating thing about this is how intent people are to look for mysteries where there is none to be found. This is not to criticise your video, which is well made. But I see zero indication that this file is anything more than the equivalent of me uploading my files to Dropbox to access them before a presentation.

  • @archer4424
    @archer4424 Před 15 dny +2

    I'm emotionally a big fan of finding lost media, archiving, and documenting things - especially digital things - and I think mysteries like this are a great example of why. If tominecon were a physical item, locked in a safe in some developer's basement, even if the key were lost and the developer forgot about it entirely, it's still relatively simple to find the contents again assuming there's proof of it existing somewhere (yes, things can be destroyed physically, but if its being protected/guarded like this, its less likely lol). But with digital things like this, if its lost... its lost. Like you said, there's just no reasonable way to crack the safe. We will likely never know what's in there, and if the developers forget how to access it too, then there's an entire piece of minecraft's history lost forever, even if its a mundane and functionally worthless piece, its still a piece of history that will forever be undocumented. Idk. I think far too much about stuff like this. Hopefully I've explained the parallels or differences I'm seeing, Maybe this comment isn't even coherent at all, who knows lmao. Great video either way.

  • @chelledavis-hull5116
    @chelledavis-hull5116 Před 15 dny +8

    Imagine the end is a Rick Roll 😂

  • @ocococococococococococococ3267

    dam perfect timing just finished the first video, hope this mystery is solved

  • @itsophishle7044
    @itsophishle7044 Před 15 dny +2

    I find it odd they (in round-about-way) make threats with "you start entering into a territory that I think is an actual crime"-- but the developers themselves told the public to "Just brute force it" previously.. now that everyone is actually hardcore curious about the actual contents- even after a decade,. they start shelling out blanket threats?? It can't be considered a crime when developers themselves told the public to brute force the file open- regardless the contents...

    • @mulhollandoverdrive
      @mulhollandoverdrive Před 14 dny +1

      I mean, back when the devs said that I think Mojang was an independent company, and now they're a Microsoft subsidiary. I don't think Dinnerbone is threatening anyone, but he can't guarantee that Microsoft won't get grumpy about it and it's a weird legal grey area too. Even if the stuff in the file is unimportant, you're technically trying to force open a file not meant for you.

    • @mega_gamer93
      @mega_gamer93 Před 14 dny

      jokingly encouraging someone to do something illegal does not make the action legal suddenly

  • @alphacentary
    @alphacentary Před 15 dny +2

    Alright lets dig out the quantum computer to crack this in about 2 seconds. XD

  • @alister917
    @alister917 Před 15 dny +3

    I think its some old defunct arg honestly. Why would they make a decoy otherwise? But even then, it was probably just teasing some new update from 10 years ago or something.

  • @user-xy4wu2vi1b
    @user-xy4wu2vi1b Před 15 dny +22

    Does anyone else think it's weird how RGN is suddenly acting as if we shouldn't try to crack it? He seemed really interested in it and by making the video, wanted someone else that may know more about it solve it. (Reminds me of the pvplegacy mystery vid by arcn, if I can remember correctly, a while back). Suddenly all was silent. I wonder if RGN was approached by someone that wanted him to make a video that tries to discourage people from attempting to crack the file...

    • @JustPlayerDE
      @JustPlayerDE Před 15 dny +11

      AES is one of the most secure encryption standards today, because it is symetric it is also quantum computer resistent.
      good luck 'cracking' the unknown length and unknown pattern password on this one.

    • @presentfactory
      @presentfactory Před 15 dny +1

      @@JustPlayerDE The security of AES has nothing to do with the ability to crack it in this instance. The question is how easy the password is to crack not the encryption itself, and since the password was created by a human that is a much more reasonable possibility.

    • @JustPlayerDE
      @JustPlayerDE Před 15 dny +4

      @@presentfactory guess how long a good to remember password based on 8 words (a passphrase) takes to crack
      just 8 words, spaces in between
      you also dont know if they used a password generator or not, if you really think its that easy why not try it yourself then

    • @45545videos
      @45545videos Před 15 dny

      It's moreso that it's impossible to crack. God himself couldn't do it. All the computers in the world combined for 100 billion years couldn't do it.

    • @presentfactory
      @presentfactory Před 15 dny

      @@JustPlayerDE People do not use 8 words in a password frequently, especially not in 2011 and especially for something which was likely not thought to be a high security file.

  • @louisrobitaille5810
    @louisrobitaille5810 Před 13 dny +2

    11:07 Cracking a password on a public site isn't illegal, at least in the US. Sharing a password that's not public is though. It falls into breach of privacy go figure how/why 🤷‍♂️. A password to a public site is like a nightclub with a bouncer at the door. If you have a valid pass, you can enter. Otherwise, you're denied access. If you start distributing valid passes to everyone, the bouncer kill kick your ass. That's about it.

  • @ichangedmynamenow3478
    @ichangedmynamenow3478 Před 15 dny +1

    Plot Twist: the 7z file is actually just Herobrine's diary, he put it in the amazon bucket and forgot to remove it and didn't know to. So he just encrypted it for no one to see. It's why Archy did not want anyone else accessing this valuable information, Herobrine's diary contains extremely suspicious activities.

  • @chaseddraco
    @chaseddraco Před 15 dny +16

    It’s here! The update video!
    I’m currently participating in something similar to the Minecraft@home project for cracking the file, it’s pretty cool.

    • @Cheato64
      @Cheato64 Před 15 dny +2

      Wait what? I thought cactus and DannyDorito said that they wouldn't do it anymore in mc@home.

    • @hatyyy
      @hatyyy Před 15 dny +2

      @@Cheato64 ITs something similar to it, not mc@home

    • @Cheato64
      @Cheato64 Před 15 dny +1

      @@hatyyy oh I see. Yeah I might be familiar with that.

    • @45545videos
      @45545videos Před 15 dny

      Cracking the file is literally impossible, you're wasting energy

    • @MightyAlex200
      @MightyAlex200 Před 15 dny

      what's the project? i'd like to contribute, too

  • @ironheavenz
    @ironheavenz Před 15 dny +15

    The fact that the encription method is used by the NSA is not such a good benchmark
    Government often has not secured computers, they oftentimes even use windows xp, their security mostly comes from closed networks
    AES-256 does sound good to me, somebody that doesn't know anything about encryption and maybe it is strong but the fact that the NSA uses it is not a good indicator lol

    • @andrewpinedo1883
      @andrewpinedo1883 Před 15 dny +4

      True. And quantum computers are getting closer to cracking AES-256, they have narrowed down the possibilities to 2^128.

    • @lintee_12
      @lintee_12 Před 15 dny +2

      They use it because it’s the best encryption on the planet… there is no better options lmao

    • @lintee_12
      @lintee_12 Před 15 dny

      @@andrewpinedo1883with quantum computers there will be quantum encryption

    • @Kai-oz9gr
      @Kai-oz9gr Před 15 dny +1

      its not only the NSA but the entire internet is depending on this algorithm. It's really well studied and can be trusted.

    • @mega_gamer93
      @mega_gamer93 Před 14 dny

      @@andrewpinedo1883Could you cite your sources?
      Also, a quantum computer cannot reduce the number of possible keys, those too things are completely unrelated. Perhaps you are talking about time complexity of cracking a key?

  • @axblockbuilder4459
    @axblockbuilder4459 Před 15 dny +1

    I love these types of videos, Minecraft and cold case mysteries are some of my favorite videos!

  • @_Shay_
    @_Shay_ Před 15 dny +1

    The decoy swap and that talk show video clip was the “ARG” and entertainment not the original. Someone at Mojang (most likely Tobias) saw the traction the topic was getting on the forums and had an idea to actually turn it into a game for the community. Which I think even further proves the OG file had nothing special.

  • @CuteistFox
    @CuteistFox Před 14 dny +7

    As a security expert, even long "secure" passwords are easy to crack if you combine the kaonashi wordlist (uses human phsycholagy) and the unicorn ruleset. You can probly crack it in 2 weeks with a RTX 4090 and hashcat.

    • @Rustmilian
      @Rustmilian Před dnem

      And if the password doesn't use any words?

    • @CuteistFox
      @CuteistFox Před 14 hodinami +1

      @@Rustmilian A wordlist isnt a list of words anymore. You can tell the security of a password you might use (not a real one obviusly) by sending the md5 of it and ill try and crack it

    • @Rustmilian
      @Rustmilian Před 14 hodinami

      @@CuteistFox I don't use words... Good luck.
      2a663a021f59ecc46ca3ae9942e0c2c5

    • @Rustmilian
      @Rustmilian Před 14 hodinami

      @@CuteistFox I'll be genuinely surprised if you manage to get it.
      If you do manage it, I'll challenge you with a much much harder password.

  • @underfale8742
    @underfale8742 Před 15 dny +9

    Babe wake up, RetroGamingNow uploaded a sequel

  • @B_B_
    @B_B_ Před 14 dny +1

    really love that you made this video. it intersects with a major issue I have in regards to the entire concept of digging into things that others did not intend or want people to really look into. especially with lost media; people can get very caught up in the mystery aspect and forget that boundaries exist. humans are curious creatures, after all. I respect that. but some things are best left alone and moreso best left alone when the people behind the "mysteries" really didn't want their stuff dug through to begin with. at what point does solving a "mystery" become blatant disrespect for the wishes and intentions of others? that's a rhetorical question, of course. the decoy was placed to placate the curiosity of those who were adamant on breaking into something they really had no business seeing regardless of how mundane the files are contained within. I highly respect that they made that decoy file instead of becoming irate or deleting the original file fully (which would have only made people more interested in the 7zip, thus worsening the issue). and I respect you even more for acknowledging that some things are best left to stay mysteries. great video!

  • @MessedUpZucchini
    @MessedUpZucchini Před 6 dny

    Why are your videos so eerie? I love them to death, and I binge your channel for hours on end, but I can’t watch in the dark, or with my doors open. I’m really not an easily scared person, and I consider myself desensitized to most horror, but for some reason, your videos just kind of give me chills. I get the creepy music in the background, and I’m usually not sensitive to that, but you’re an exception. If you end up seeing this, I’d really love to know what your strategy is, and what you do to achieve this, or even if this effect is intentional at all, because it’s really incredible. Keep it up, dude!

  • @MishaGold
    @MishaGold Před 15 dny +8

    It seems to me that the information stored in this archive may be legitimately confidential (for example, personal data of Minecon visitors). Decoy and disinformation can provide cover for it so it is not going to become a temptation for actual malicious hackers seeking for personal data. This is why Dinnerbone mentioned that attempts of cracking may be considered illegal.

    • @Crawldragon
      @Crawldragon Před 15 dny +4

      I appreciate your concern, but that's not likely to take up 80 megabytes of data unless they have a bunch of scans of peoples' drivers licenses or something. Besides, if it were something that serious then it's likely that Mojang would have used some kind of legal means to take down public archives like the one on Reddit to try and mitigate the liability risk to them.

    • @MishaGold
      @MishaGold Před 15 dny

      @@Crawldragon it still can be something like txt file of people's full names and age. Not that much but still legally confidential.

    • @drmonkeys852
      @drmonkeys852 Před 15 dny +2

      @@MishaGold That would be a few kilobytes at most as millions of people don't visit minecon

    • @vvstwo
      @vvstwo Před 15 dny

      its nothing its literally a 1.0 minecraft build and a waste of time

    • @cralo2569
      @cralo2569 Před 13 dny

      @@MishaGold it's very likely that anyone serious enough to crack it won't go crazy and start spreading sensitive information around like this.

  • @luccadeahl5340
    @luccadeahl5340 Před 15 dny +4

    3:10 JEEZ THAT'S CRAZY

  • @ShayaanAhmad-om8pz
    @ShayaanAhmad-om8pz Před 15 dny +1

    RetroGaminNow thank you soo much for making me remember about my nostalgic 5th and 6th grades. You have gotten me back to mc. Thanks

  • @fireloop69
    @fireloop69 Před 13 dny +1

    if they didn't want people to try and crack they password, it shouldn't have been uploaded to a publicly accessible archive

  • @petamericangaming6177
    @petamericangaming6177 Před 15 dny +5

    Last time I was this early, Minecraft 1.7 was the shit, and the Covenant still had their raggedy-ass fleet!

  • @BritishBoy
    @BritishBoy Před 15 dny +4

    The main thing that keeps running through my head is that most passwords are made to be both memorable and secure. This is often done by replacing letters with other characters that represent the letters. Why not create a brute-force algorithm that prioritizes real words with multiple different character variations? It would start with English, then Swedish, and go down the list of languages. I'm certain that just aimlessly brute-forcing is ridiculous, but educated guesses can be surprisingly useful.

    • @Riksterify
      @Riksterify Před 15 dny

      There already exist programs that do that, they slightly modify a password. This itself is a beast on its own, because to create a program like that you need a lot of data from already existing passwords, possible machine learning, string matching algorithms, and knowledge about human psychology.
      If the password is secure, such a program won't help at all. And if the program fails, it might be that it wasn't good enough to find all variations of a password. Again, this is incredibly difficult. If the password was insecure, it would have already been found to be honest. It's more likely the password is secure.
      I think you would have much better chance if you start looking at "side channels". For example, metadata information about the file. Its compressed size is an indicator of what might be inside. Other metadata like time created, if present, might also be helpful.
      Other ways are to convince Mojang to release the content of the archive without leaking the password. Or to somehow obtain the password through other means. But trying to break the encryption algorithm or brute force the password is imho the worst way to get to the content inside at this point.

    • @mega_gamer93
      @mega_gamer93 Před 14 dny

      subsistuting characters in a password for recognizable similar characters is terrible at adding entropy to a password. I don't know if "most" passwords are written this way, but writing them this way gives you none/minimal additional security to not doing that

  • @Jx_-
    @Jx_- Před 13 dny +1

    This was just an elaborate PSA on cybersecurity. Go change your passwords, everyone.

  • @FusilinAlgMe
    @FusilinAlgMe Před 15 dny

    This has got to be my favorite kind of video you make! Keep it going!

  • @ocococococococococococococ3267

    But what is the second weird file that was in the decoy version. you passed on it very fast on the last episode but we still don't know, and it was intended to be found

  • @cayder7485
    @cayder7485 Před 15 dny +4

    let’s goooo new video

  • @ButterFromDiscord
    @ButterFromDiscord Před 13 dny +1

    I mean, just because the file is 7z doesn’t mean you can’t just create a 7z process and then forget about it and move onto the next one
    And there’s always the option of pulling a minecraft@home if the interest increases enough and enough people are willing to contribute their processing power

  • @zenverak
    @zenverak Před 15 dny

    I like that you’re honest about things that don’t bother me. Good honesty!