🦑.fun -

Hunter Biden Hacks

Do you want the real uncensored version that requires some work, or do you want the censored version quickly?

Just show me the censored version(s), I don't want any work

Work for the real uncensored version(s)

There are ≥3 noteworthy hacks/leaks available

  • The ~400GB laptop drive
  • iPhone & iPad backup
  • iCloud backup

Prerequisite knowledge: How to use magnet-links to torrent/download

  1. Download, install, and open a bittorrent client (e.g. qBittorrent, for this tutorial).
  2. Supply the bittorrent client with one of the forthcoming magnet links
    1. In qBittorrent, click "File > Add Torrent Link" (not to be mistaken with option "Add Torrent File"), a window "Download from URL" appears.
    2. In the window "Download from URL", enter the magnet-link. (note: If you already had it coppied / in your clipboard, then it may have been automatically entered in this box already).
    3. Click "Download"
    4. It will ask where on your computer to download it to; It defaults to your Downloads folder, click OK, the popup windows will disappear.
    5. The main qbittorrent window will show the torrent downloading, it may take some time to complete the download.
  3. When the torrent/download completes, either ...
    1. In the main qbittorrent window, right-click the torrent entry, and then click "Open destination folder".
    2. Or open your file explorer, and navigate to the location that you downloaded/torrented to.

The ~400GB laptop drive

The iPhone and iPad backup

  1. Use this magnet-link (the boxed yellow text below) to download/torrent the "iphone_ipadBackup.zip" (26.57GiB):
    magnet:?xt=urn:btih:ba031f1b19eb501808b6145641ea1a49e41bb6bd&dn=iphone_ipadBackup.zip&tr=udp%3a%2f%2ftracker.tiny-vps.com%3a6969%2fannounce&tr=https%3a%2f%2fopentracker.i2p.rocks%3a443%2fannounce&tr=http%3a%2f%2fopentracker.i2p.rocks%3a6969%2fannounce&tr=udp%3a%2f%2fopentracker.i2p.rocks%3a6969%2fannounce&tr=udp%3a%2f%2fipv4.tracker.harry.lu%3a80%2fannounce&tr=udp%3a%2f%2f9.rarbg.com%3a2810%2fannounce&tr=udp%3a%2f%2fwww.torrent.eu.org%3a451%2fannounce&tr=udp%3a%2f%2fopen.stealth.si%3a80%2fannounce&tr=http%3a%2f%2ftracker.openbittorrent.com%3a80%2fannounce&tr=udp%3a%2f%2ftracker.openbittorrent.com%3a6969%2fannounce&tr=udp%3a%2f%2fexodus.desync.com%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.torrent.eu.org%3a451%2fannounce
    • This ^ text is the magnet-link. Enter it into the bittorrent client to download the compressed/zipped (and encrypted) backup
  2. Extract it (after it finished downloading)
    • open your file manager / file explorer, find the newly downloaded "iphone_ipadBackup.zip", right-click and extract/unzip it (this changes it from a ".zip" file into becoming a folder "iphone_ipadBackup")
  3. The password is "Juliais26!" (without the quotes). This is needed for the next step. (Credit to anon 386000711 for cracking it)
  4. Decrypt & Read the data
    • Option 1: Use a program
      To the best of my knowledge (though I may be incorrect), all programs that can do this appear to require payment (some have free trials)(I plan to request a refund or do a charge-back afterwards)
      • Download, install, and open program "iPhone backup extractor" (or similar).
      • File > Preferences
      • In the newly opened window "Prefer ences", click "Backups"
      • Click the "+" button, and enter the location of the extracted folder "iphone_ipadBackup"
      • Close the preferences window
      • wait a moment for it to load the backup(s)
      • on the left pane, under "Local Backup", two new entries should appear within a minute, "Hunter's iPad" & "iPhone". Click "iPhone", it will prompt for the password to decrypt it.
    • Option 2: If your have the technical know-how, Try this Python script (source: http://ix.io/44d7)

      #!/usr/bin/env python3

      # afterwards, use zgrep to find interesting files
      # find folder -type f -exec zgrep "big guy" {} \;

      from iphone_backup_decrypt import EncryptedBackup, RelativePath, RelativePathsLike
      import argparse
      import sqlite3
      import pathlib

      def getFiles(path):
         ## Connects to the Manifest.db and returns a list of files paths

         files = []
         ## Conect to the Manifest.db
         conn = sqlite3.connect(path)

         ## Creating a cursor object
         cur = conn.cursor()

         ## iterate over the files
         for row in cur.execute("select relativePath FROM Files;"):
             if len(row[0]) != 0:
                 files.append(row[0].strip())
         return files
      def decryptFiles(backupObj, files, outputPath):
         ## Decrypt files from a list and put them into a directory
         for f in files:
             rpath = pathlib.Path(outputPath, f)
             try:
                 backupObj.extract_file(relative_path=f, output_filename=rpath)
             except TypeError:
                 ## Not sure whats the hold up here
                 pass
             except KeyboardInterrupt:
                 exit(0)
             except Exception:
                 pass
                 ## again, I'm getting the files rom the db, wtf is this?
      def main():
         parser = argparse.ArgumentParser()
         parser.add_argument("-d", "--directory", help="Path to the Encrypted backup")
         parser.add_argument("-p", "--password", help="Password ")
         parser.add_argument("-o", "--output", help="Path to output directory")
         args = parser.parse_args()

         backup = EncryptedBackup(backup_directory=args.directory, passphrase=args.password)
         backup.save_manifest_file(pathlib.Path(args.output, "Manifest.db"))
         backup.extract_file(relative_path=RelativePath.CALL_HISTORY,
                         output_filename="./output/call_history.sqlite")

         files = getFiles(pathlib.Path(args.output, "Manifest.db"))
         print(f"Found {len('files')} to export!")
         decryptFiles(backup, files, args.output)

      if __name__ == "__main__":
         main()

      afterwards, use zgrep to find interesting files
      find folder -type f -exec zgrep "big guy" {} \;

The iCloud backup

For possible future updates

https://rentry.org/nps34