Minecraft's greatest mystery was just solved!

Ойындар

An ancient Minecraft leak, tominecon.7z, was lost for 13 years. But now, for the first time ever, we found it - and cracked it open. What's inside this mysterious file? Let's find out.
Watch RGN's videos on tominecon.7z for more! ➵ • The tominecon.7z Saga
💟 Become a member for exclusive videos, early access, and more! ➵ kzread.infojoin
🎙️ Subscribe to the live channel for streams every weekend! ➵ / @mcbytlive
🤖 Join the Discord and chat with my community! ➵ / discord
🐦 Follow my Twitter for, idk, memery I guess ➵ / mcbytt
[SOUNDTRACK]
Craft Case - Interruption
Hideki Naganuma - That's Enough
Machine Girl - Heaven Central Authority
Van Sandano - Amalthea
Koji Kondo - River Safari
Koji Kondo - Volcano
pink - amelia
C418 - Chris
and one more I promise I'll add soon but I forgot the name
[CHAPTERS]
0:00 - Intro
0:22 - Let's catch up.
1:38 - tominecon.7z is found.
3:36 - The second hunt.
4:40 - From Dinnerbone, with love.
7:14 - Cracking the code.
8:48 - Inside tominecon.7z.
10:46 - Outro
bye love u

Пікірлер: 524

  • @mcbyt
    @mcbyt21 күн бұрын

    Here's some important links you might want to check out! My Discord: discord.gg/rY4unvn RetroGamingNow Discord: discord.gg/retrogamingnow Tominecon.7z Team Discord: discord.gg/Q2BU69AN3S Download tominecon.7z: buu.sh/u/tominecon.7z

  • @YozoraFN

    @YozoraFN

    21 күн бұрын

    Password: boxpig41

  • @Kat21

    @Kat21

    21 күн бұрын

    thank you mcbyt

  • @pewdiepiezzzzz124

    @pewdiepiezzzzz124

    21 күн бұрын

  • @Jelly_shy_guy_man

    @Jelly_shy_guy_man

    21 күн бұрын

    No

  • @user-cv5hl4iy6s

    @user-cv5hl4iy6s

    10 күн бұрын

    How to get minecraft edu

  • @Ciguato
    @Ciguato21 күн бұрын

    I like how Doge just casually has a bunch of leaked Mojang passwords like its nothing

  • @EnigmaFR.

    @EnigmaFR.

    21 күн бұрын

    He also has arround 30 minecon's

  • @lightningmc-09

    @lightningmc-09

    21 күн бұрын

    just a databreach?

  • @Zudexa

    @Zudexa

    21 күн бұрын

    Thats the account community for you

  • @xbizydown

    @xbizydown

    21 күн бұрын

    Me having 1.16.200 Minecraft Bedrock, reversed code. Some people just not talking about it Everywhere

  • @eVCANN

    @eVCANN

    21 күн бұрын

    Not necessarily, he probably just knows where to find it

  • @suzuaiki8007
    @suzuaiki800721 күн бұрын

    All community: we finally cracked a decoy for 10 years !! Doge: pull outs an all old mojang pass word and did it in 1 day.

  • @_Ecliptic

    @_Ecliptic

    21 күн бұрын

    1 second according to the image

  • @parinuser

    @parinuser

    21 күн бұрын

    @@_Ecliptic ​and that's probably ceiled, and even if it wasn't, that must be rounded so if it's rounded it would take 1 second to 0.5 SECONDS. yet with like 100 passwords, and at least 1 TOP (trillions of operations per second), it WOULD take less than 0.1... like, c'mon! Just how! Computers are so advanced it's hard to fathom. And now I made a long comment for no reason

  • @Toasty_videos

    @Toasty_videos

    20 күн бұрын

    @@parinuserand no one liked your comment except me

  • @_Ecliptic

    @_Ecliptic

    20 күн бұрын

    @@Toasty_videos I liked it

  • @its_arxin

    @its_arxin

    20 күн бұрын

    Hey guys the real password is boxpig41 enjoy :) idk what ur gonna enjoy but idk just take it

  • @255ping4
    @255ping421 күн бұрын

    Please don't say "way back in 2020". It makes me feel old

  • @ZoofyZoof

    @ZoofyZoof

    21 күн бұрын

    It's been 4 years.

  • @255ping4

    @255ping4

    21 күн бұрын

    ​@@ZoofyZoof still tho, it feels like 2020 was yesterday

  • @ZoofyZoof

    @ZoofyZoof

    21 күн бұрын

    @@255ping4 I don't understand how, and I don't understand anyone who says anything like this

  • @decoy3211

    @decoy3211

    21 күн бұрын

    @@ZoofyZoofjust say u were born after 2007

  • @ZoofyZoof

    @ZoofyZoof

    21 күн бұрын

    @@decoy3211 I was born in 2001, on the 12th of April. I am 23 years old. My KZread account also states it was made in September of 2012. It's extremely unlikely I would have made a YT account at 5 years old.

  • @RetroGamingNow
    @RetroGamingNow20 күн бұрын

    Thank you so much for introducing me to this mystery! I had a blast learning about it and discussing it with everyone!

  • @mcbyt

    @mcbyt

    20 күн бұрын

    Of course! And thank you for introducing so many people to the mystery - wouldn't have been cracked without you

  • @nakoo

    @nakoo

    20 күн бұрын

    so glad this story has gotten so much attention!! you both did a huge part in publicizing it, good stuff yall!

  • @LNLenost

    @LNLenost

    19 күн бұрын

    So long...

  • @engtilde

    @engtilde

    19 күн бұрын

    @@nakoogotten lmao

  • @slicedlime
    @slicedlime21 күн бұрын

    I can't believe you listed totally real passwords on screen like that. Anyway, gg!

  • @Mateo-zi8ub

    @Mateo-zi8ub

    21 күн бұрын

    The 4th password is completely real

  • @TheDeceptiveCooler

    @TheDeceptiveCooler

    21 күн бұрын

    nice

  • @NeunEinser

    @NeunEinser

    21 күн бұрын

    Yeah, had to change mine (PleaseAddTermitesYouPromised91). You will never guess the new one tho.

  • @Illuminati_HD

    @Illuminati_HD

    21 күн бұрын

    @@Mateo-zi8ub Nr.17, "thatwasarealonetho" 8:25

  • @discussions.

    @discussions.

    21 күн бұрын

    old mojang are so real for these. it just goes to show we're all human

  • @treidex
    @treidex21 күн бұрын

    10:15 your data will still be encrypted. It's just that you wouldn't know the key so the data will just be garbage and unusable

  • @asp-uwu

    @asp-uwu

    21 күн бұрын

    +1. That ending explaination really came out of nowhere and wasn't at all substantiated lol

  • @MagmaMac

    @MagmaMac

    20 күн бұрын

    It's also all wrong... Minecraft didn't have encryption for client server communication until snapshot 12w17a (For version 1.3.1) after the Netty rewrite! This part of the client hello packet was only used for authentication.

  • @ZockerAxel

    @ZockerAxel

    20 күн бұрын

    Also, Long.parseLong will just throw a NumberFormatException if the String that's to be parsed contains letters outside of the radix. So you probably wouldn't even be able to connect in the first place I think.

  • @loyc12

    @loyc12

    20 күн бұрын

    Yeah, even having never looked at minecraft code I could tell that explanation was untrue lol

  • @mcbyt

    @mcbyt

    20 күн бұрын

    Well yeah, the data is still encrypted, just the wrong way, so it "breaks" the process of encrypting the data on the server end and decrypting it on the client end. I'm not a professional at encryption by any means - this was just how I made sense of the process in my head and I wanted to explain it briefly, so it may not be 100% accurate

  • @sicktaiz
    @sicktaiz21 күн бұрын

    i just finished watching a video talking about how it will never be cracked, WHAT THE

  • @eglol

    @eglol

    21 күн бұрын

    Lol, KZread algorithm works that way I guess. On videos talking about how good something is, I often get recommended videos talking about how bad it is too

  • @ninamercer6807

    @ninamercer6807

    21 күн бұрын

    Sometimes people lie.

  • @afunnyman

    @afunnyman

    21 күн бұрын

    because having a poorly informed passwords list makes it exponentially less likely to crack via brute force

  • @TheFantasticJ

    @TheFantasticJ

    20 күн бұрын

    ​@@afunnymanand 7z files are insanely hardware expensive to brute force

  • @afunnyman

    @afunnyman

    20 күн бұрын

    @@TheFantasticJ all modern 256 bit encryption methods are essentially impossible to brute force.

  • @Derk_Mage
    @Derk_Mage19 күн бұрын

    This was solved because 2 people had random info lying around.

  • @Deductive
    @Deductive21 күн бұрын

    Alright but seriously, why wasn't "boxpig41" bruteforced sooner?

  • @enriktigasna

    @enriktigasna

    21 күн бұрын

    7z encryption is extremely slow to crack, and they only had about a year

  • @MaakaSakuranbo

    @MaakaSakuranbo

    21 күн бұрын

    @@enriktigasna Slow in what way?

  • @afunnyman

    @afunnyman

    21 күн бұрын

    @@MaakaSakuranbo because having a poorly informed passwords list makes it exponentially less likely to crack via brute force. brute force methods with modern encryption do not attempt every possible character combination possible, that would take billions of years. cracking things is often far more successful with some level of research or enumeration.

  • @MaakaSakuranbo

    @MaakaSakuranbo

    21 күн бұрын

    @@afunnyman Well in this case it wouldn't have been that long, unless a single try takes long

  • @afunnyman

    @afunnyman

    20 күн бұрын

    @@MaakaSakuranbo surprisingly even simple passwords can be hard to crack if they're not in major wordlists. the research used to crack the tominecon.7z archive was simply that there was already a pre-existing list of cracked mojang passwords, that only certain people would have had access to. (particularly those who hack minecraft accounts because of their unique names).

  • @AshishXMC
    @AshishXMC21 күн бұрын

    GGs to Doge who somehow decided to keep the old leaked passwords, then to Dinnerbone who helped have this spread further, and of course, the original user who had sent the real thing and not a decoy.

  • @Notchjrgaming1269

    @Notchjrgaming1269

    21 күн бұрын

    Keeping old stuff is not that hard i never delete my old files still have stuff from 5th grade I put on a drive

  • @AshishXMC

    @AshishXMC

    21 күн бұрын

    @@Notchjrgaming1269 Unless your PC crashes and requires a reset to be fixed… 😔

  • @afunnyman

    @afunnyman

    21 күн бұрын

    @@AshishXMC Windows recovery has managed to keep drive contents for years via reset recoveries, reformatting is very rarely needed

  • @AshishXMC

    @AshishXMC

    20 күн бұрын

    @@afunnyman Man, I wish time traveling existed, lol. Awesome though!

  • @tomikun8057

    @tomikun8057

    20 күн бұрын

    ​​@@AshishXMCjust get a thumbdrive, back up your data, and reinstall windows in worst case

  • @mimifurwalker
    @mimifurwalker21 күн бұрын

    it was just 1.0 version of minecraft with minimal differences biggest differences being the extra files

  • @billybobjankens12

    @billybobjankens12

    21 күн бұрын

    ...except the fact that what you send to servers can be easily used to hack your system and cause chaos...

  • @mimifurwalker

    @mimifurwalker

    21 күн бұрын

    I have your location /j

  • @billybobjankens12

    @billybobjankens12

    21 күн бұрын

    @@mimifurwalker what is it?

  • @Zanophane_Gaming

    @Zanophane_Gaming

    21 күн бұрын

    @@billybobjankens12 they said /j 💀

  • @billybobjankens12

    @billybobjankens12

    21 күн бұрын

    @@Zanophane_Gaming what's that mean

  • @Moresteck
    @Moresteck21 күн бұрын

    great video! the only thing missing here is a mention that the server files are in fact different builds from the final 1.0.0. while code-wise (and even content-wise) they're identical, the final 1.0.0 server was built 6 hours after the tominecon 1.0.0 server, making them have different file hashes.

  • @mcbyt

    @mcbyt

    20 күн бұрын

    Yeah, I've got that on-screen at 8:58 but didn't mention it in the voiceover since I thought it'd be a pretty long tangent for a smaller detail.

  • @TheKd8lvt
    @TheKd8lvt20 күн бұрын

    That explanation about encryption is.... entirely wrong. The parts about hex and dec are correct, but everything else is completely off the mark. 1. The server only ever sends _encrypted_ data. Your client only ever sends _encrypted_ data. There is no way for the game to do anything else, _by design_ . It would be a massive security risk if the opposite were the case, not only for your account details, but both your computer _and_ the server machine. 2. There is no way for encryption to "break" and be left completely open while in transit. That's not how encryption works, unless someone very stupid implements a fallback to plaintext which defeats the point of encrypting that data in the first place, as you could just force one side or the other to fail, receiving all that data without needing to decrypt it. 3. The server ID being parsed in the wrong base wouldn't initially cause an issue. In fact, you'd be able to _try_ to connect just fine. You wouldn't be able to fully connect, but you could try. 4. The reason it appears that multiplayer is completely disabled is because of a related (but different) problem. The first time the server (or your client, on modern versions it's the client) would try to send a packet the other would receive, what appears to them as, a garbled mess of incorrectly encrypted data. As such, they'd immediately close the connection, since trying to proceed would be a waste of time. The decryption fails because the encryption keys (in this case, the server id) would be different on either end, like trying to log in with the wrong password.

  • @mcbyt

    @mcbyt

    20 күн бұрын

    1. Yes, that's what I'm saying. I said it would be a huge security risk if it let you send the data unencrypted, so instead, it fails to encrypt your data and multiplayer doesn't function. 2. I didn't mean it would unencrypt the data and send it, just that, well, it breaks the encryption, it makes the whole "sending encrypted data" process not function properly. The visual does make it seem more like it actually sends unencrypted data though, I admit. I wasn't really sure how else to visualize that for someone who's not familiar with encryption, which includes most people that have watched this video so far. 3. Also what I tried to say in the video, though maybe I explained it poorly. Connecting to any servers on 1.0 immediately fails. You can enter the IP and press enter, yes, but it never will connect you. 4. Possibly, yeah. I don't know the process for this super well - I was mostly focused on the process of discovering the file, and just wanted to briefly touch on why the difference between 1.0 and tominecon is so important.

  • @TheKd8lvt

    @TheKd8lvt

    19 күн бұрын

    @@mcbyt Sorry if that sounded harsh, I did enjoy the video - I'm a CS nerd at heart so the inaccuracy rubbed me the wrong way lol Just about everything to do with encryption is hard to explain, so kudos for giving it a shot :)

  • @mcbyt

    @mcbyt

    16 күн бұрын

    @@TheKd8lvt All good (sorry I didn't see this till just now)! I appreciate being held accountable for stuff like this, I never want to be putting the wrong info in videos ofc :)

  • @DartMonkey2
    @DartMonkey220 күн бұрын

    10:15 No, parseInt would just throw an exception, which would then be caught by the try-catch blocks surrounding that code, which would then disconnect. I don't even think the serverid is used for encryption, but if it is, the encryption wouldn't be "broken", it'd just fail to decrypt/encrypt anything because the keys don't match up.

  • @mcbyt

    @mcbyt

    20 күн бұрын

    Yeah, which on the client-side means multiplayer doesn't function at all since you're disconnected before you ever get into the server. Server ID is used during the encryption process, but not to actually encrypt anything itself, just as data that gets encrypted sent to the client to allow the client to start decrypting the info and play the server

  • @zekihvh

    @zekihvh

    14 күн бұрын

    idk why that explanation was added to the video if they had no clue if that explanation was right or not

  • @kuhluhOG
    @kuhluhOG21 күн бұрын

    7:09 "unless you have time travel and use it to connect to the office WiFi." Ok, another use of the password that we know now too.

  • @Emerald29
    @Emerald2920 күн бұрын

    The fact that it was broken in such a simple way without some expert cia level shit like that methods, along with the only difference of it between the offical 1.0 being 4 characters in the code feels so anticlimactically funny

  • @Lampe2020
    @Lampe202021 күн бұрын

    Kinda strange all the mobs in the sounds folder had names in singular (blaze, ghast, magmacube, etc.) but endermen are listed there as "endermen"…

  • @ACMBitz7
    @ACMBitz718 күн бұрын

    *Gives up after 13 years* "So, I cracked this password in just a second now this is public information."

  • @Evie
    @Evie21 күн бұрын

    haha I have been waiting for this video since the password got cracked lmao

  • @mctogo001

    @mctogo001

    21 күн бұрын

    same - little timmy, born in 2019

  • @00Cubic

    @00Cubic

    21 күн бұрын

    how are you verified with 2k subs?

  • @Swaxol

    @Swaxol

    21 күн бұрын

    cool

  • @mctogo001

    @mctogo001

    21 күн бұрын

    @@00Cubic it's when u have another channel which is verified and share the same ad revenue thru google ads

  • @Evie

    @Evie

    21 күн бұрын

    @@mctogo001 not quite

  • @rodrigoqteixeira
    @rodrigoqteixeira16 күн бұрын

    I'm so disappointed nobody cracked an 8 character long password of printable ascii.

  • @BJJPlays
    @BJJPlays20 күн бұрын

    I feel like Minecraft’s greatest mystery get solved every week now…

  • @UNKNOWOOD
    @UNKNOWOOD16 күн бұрын

    he sugarcoats a pointless thing the video

  • @MrBelles104
    @MrBelles10421 күн бұрын

    3:36 Oh my God, I just love seeing other KZreadrs I watch being mentioned in videos, this mystery would have gone in a very different direction if any of you didn't cover it! From the seeds of panoramas, to paintings, now passwords to files.

  • @RedStoneMatt
    @RedStoneMatt20 күн бұрын

    10:14 This is a very bold statement obviosuly made by someone who doesn't know how programming works. If encryption fails on a software, the device doesn't go "Oh well, guess I'm just gonna send everything unencrypted then!" for OBVIOUS reasons. At worse it may send junk data instead of actually readable encrypted data that may or may not be possible to reverse depending of the encryption scheme used assuming that incorrectly encrypting the data by ommiting the hex parts of the server ID makes the process reversible without further keying, but I HIGHLY doubt it. The most likely scenario is just that the server will go "wtf?" and reject the connection during the handshake step, and assuming it didn't, the client would just send irreversibly unreadable junk data. Also, not encrypting some data during an internet transfer doesn't mean that the average joe can see what you're sending. You still need to be on the same network as the person or have higher authority to spy on national or international internet transfers (like some countries do to catch torrent-ers)

  • @mcbyt

    @mcbyt

    20 күн бұрын

    "If encryption fails on a software, the device doesn't go "Oh well, guess I'm just gonna send everything unencrypted then!" for OBVIOUS reasons." - Yeah, that's the whole point. Like I said in the video, that would be a huge security problem, so instead, it just fails and disables multiplayer since joining any multiplayer server doesn't work. 99% of people that watch this video don't know anything about encryption, so I do have to oversimplify it a bit. And the average joe could potentially see that data, since you'd be joining a public server. I mean, if it's a small, whitelisted server with a few friends you're fine, but joining Hypixel without your data being encrypted, for example, would be bad.

  • @RedStoneMatt

    @RedStoneMatt

    20 күн бұрын

    @@mcbyt Minecraft fails to connect to the server likely during the handshake process that sets up the connection and encryption, you make it sound like it's some failsafe your client triggers to avoid problems but it's really not like that. Also no, if you were to connect to hypixel without encryption, no one on the server would be able to see your data still. You send your encrypted packets to the Hypixel server, which acts as a central node and redistribute information such as your position and actions to other nearby players, but not things like private messages and stuff. To have someone intercept the packet, you would need to perform a "man-in-the-middle" attack which would require you either to be on the same network as your target or have higher authority to access the country's whole internet traffic (which under normal circumstances only governments do). So no, even if you were to connect without encryption by some obscure impossible method that the very core of the minecraft server packet protocol doesn't make possible, your data would still be safe from most people, besides your government and people on your home network. And it just makes sense: when you send a packet to Hypixel, it goes to Hypixel, not to every person on the public internet. At worst it might go though routers that are on the way that'll forward the data to its destination if needed but that's it.

  • @LightslicerGP
    @LightslicerGP19 күн бұрын

    Doge: "so i just happen to have a list of mojang passwords that *might* work, dont ask how or where i got it tho" 😭😭

  • @chromacat248
    @chromacat24821 күн бұрын

    would personally never have guessed the password to be 6 letters and 2 numbers, one would think that would’ve shown up in people’s dictionary attacks by now

  • @rosiepixel
    @rosiepixel21 күн бұрын

    this is so absolutely roaring.. GOOD EPIC MOMENT!

  • @hy_mc

    @hy_mc

    21 күн бұрын

    top 10 roarer moments of all time (4K ULTRA HD)

  • @barrybenbart

    @barrybenbart

    21 күн бұрын

    khibo moment

  • @johnthemannn
    @johnthemannn14 күн бұрын

    10:16 no, the data would be encrypted, the encrypted data just wouldn't be able to be read by the server since it didn't have the right decryption key. this would cause the client to be disconnected. also, passwords aren't sent to the server, your Mojang session ID was sent to the server. sending your password unhashed to an unofficial server is a huge no-no.

  • @00Cubic
    @00Cubic21 күн бұрын

    damn 13 years ggs guys

  • @WatercraftGames

    @WatercraftGames

    16 күн бұрын

    It cost everything.

  • @Micha-Hil
    @Micha-Hil19 күн бұрын

    >Cracks a file >"16" That's... That's it?

  • @JoBot__
    @JoBot__21 күн бұрын

    It's crazy that someone named Doge did this considering the dog we all know as Doge (Kabosu) just passed away.

  • @RacistDolphin
    @RacistDolphin21 күн бұрын

    HOLY SPLAUGENSPLUGEN

  • @OverseerYT1_
    @OverseerYT1_21 күн бұрын

    13 years ago with this video being 13 hours ago

  • @noskillpureandy
    @noskillpureandy11 күн бұрын

    9:37 : it's not a "server id", it's an encryption key. the code literally says right there that if it fails to parse the "server id" it will stop and say "The server responded with an invalid server key". 10:09 : no, it couldn't. of course it couldn't. where in the world did you get that idea from? right in the oracle docs: Throws: NumberFormatException - if the String does not contain a parsable long. 10:13 : wrong again, the code says right there that if it fails to parse the "server id" it will stop and say "The server responded with an invalid server key". even if it *did* try to communicate without the right key, all of the data between the server and client would be garbled and a connection would never be established. did you run this section by someone who knows anything?

  • @CloudzDa
    @CloudzDa21 күн бұрын

    I love content like this about mysteries or old minecraft there all just really fun to watch ty MCBYT

  • @ideac.
    @ideac.21 күн бұрын

    this channel is just consistently good like seriously the amount of stuff that minecraft has undiscovered that you somehow find about and make thousands also be interested in is crazy

  • @GamingMasterAnthony
    @GamingMasterAnthony17 күн бұрын

    Yeah… I can see why no one wanted the password out there in the early days of the hunt (Even the people who claimed to have cracked the password said they probably shouldn’t have done it) if it was the making email password

  • @sunmoonfx8251
    @sunmoonfx825121 күн бұрын

    The fact we not only cracked the password but learned TONS of stuff about the files is nuts. First, the contents of the file, and the fact it IS different from an actual release of 1.0 Minecraft- albeit very, VERY slightly. And yet that slight change was such a massive problem... quite interesting, honestly. Second, the password, which is amusingly only 8 characters long... go figure. No wonder they were so worried about the password... in fact, using the password strength checker shown earlier in the video, the password for the original file is WEAKER than the password for the decoy! Third, the two things the password was used for. Since it was originally for their email account, it makes sense why it was so worrying. But with that changed, it's a lot safer now. Dinnerbone wasn't kidding when he said that. And fourth, the fact that when many people are curious, nothing can stop them. This was probably the craziest thing that could have happened... but I'm glad that there's finally a concrete end to this saga. (Let's not go trying to crack any more files unless given advance knowledge that it's for an ARG or something.)

  • @KirssarGames
    @KirssarGames21 күн бұрын

    just boxpig41? that'd be literally the 41st thing I would've tried

  • @alexisverity47
    @alexisverity4721 күн бұрын

    i remember watching the original video on this,its good to see it come to completion

  • @otistically
    @otistically16 күн бұрын

    Jeez. I too would've want to encrypt this version if it was that troublesome.

  • @appllefritteryt
    @appllefritteryt20 күн бұрын

    hey thanks for this video this is super cool! im part of the RGN community and thought it was cool that you were the one who kinda was behind it popping up again!

  • @CiggyRat
    @CiggyRat21 күн бұрын

    I thought it was weird how RGN tried to imply that it was impossible to crack in his follow up videos after the first video blew up. I mean, weirder and more difficult things have been achieved before. It seemed like a matter of time and boy that was fast

  • @Sabagegah
    @Sabagegah17 күн бұрын

    This episode of MCBYT was brought to you by the number 16.

  • @FyonixYT
    @FyonixYT21 күн бұрын

    whats shader are you using

  • @mcbyt

    @mcbyt

    20 күн бұрын

    At the very end I use BSL, but for most shots I used Sildur's Enhanced Default :)

  • @FyonixYT

    @FyonixYT

    19 күн бұрын

    @@mcbyt oh, thought it was a different one

  • @grayslicer09
    @grayslicer0921 күн бұрын

    Dude this is AWESOME! I heard about the update from Dinnerbone, but I had no idea the password itself was actually cracked shortly after!

  • @cosmoIogic
    @cosmoIogic21 күн бұрын

    I was wondering about it just now

  • @therealjjjay
    @therealjjjay2 күн бұрын

    if only someone brought this to my attention way earlier...

  • @SrNerd
    @SrNerd13 күн бұрын

    I was hoping it would have some secret art that would be used in minecon

  • @jossefyoucef4977
    @jossefyoucef497721 күн бұрын

    Good video, I'm glad youtube just randomly recommended this

  • @user-dx3px4iv8p
    @user-dx3px4iv8p17 күн бұрын

    Pls stop the clickbait, it's not a "great mystery" or "some mystical code", is just Minecraft 1.0 in password-protected archive with a lame password. A great mystery would be if someone reverse-engeneered the Minecraft binaries and found some advanced and complicated code that send encrypted data to Mojang servers for example. That would 100x more interesting than this nonsense.

  • @paulwesley3862

    @paulwesley3862

    13 күн бұрын

    well that's not a mystery, that's the truth? It's called analytics and when Microsoft bought they introduced more intrusive logging which you weren't able to disable (I think that changed since then)

  • @AlienXtream1
    @AlienXtream121 күн бұрын

    such chill folks at mojang. and the interesting part is that, while the skills and methods may have malicious applications, by publically stating and engaging with the process they effectively give permission for users to try. as if its a challenge to them. ergo, while the tools may potentially be questionable, the act is not considered in violation of the law than if you added a randomised password to an empty file and then tried to get into it. it goes from an illegal act to one of grey legality.

  • @teun_
    @teun_21 күн бұрын

    Another classic MCBYT banger .

  • @cubebit8508
    @cubebit850820 күн бұрын

    Finally! Always suprised what a community can do if everyone shows enough interest :)

  • @ElectroEnd
    @ElectroEnd21 күн бұрын

    Everyone involved in the search: This file will take years to be cracked, due to its- Doge: I solve this in 1 day

  • @IzapcThunder
    @IzapcThunder21 күн бұрын

    0:05 Is that ren-diggidy-dog on the right?

  • @WindsorYeh

    @WindsorYeh

    20 күн бұрын

    Yaaaaas

  • @sdf52165
    @sdf5216517 күн бұрын

    we could see whats inside even faster if someone used android unpack feature😭

  • @gamingchickenstudios
    @gamingchickenstudios18 күн бұрын

    Well done , everyone. I wasnt expecting this to be solved yet it was.

  • @xXRealXx
    @xXRealXx21 күн бұрын

    wow, I didn't expect it to be cracked!

  • @RealMadtalks1
    @RealMadtalks121 күн бұрын

    this is so absolutely insane, EPIK!

  • @Rubyopossum
    @Rubyopossum21 күн бұрын

    I guess that some things need 13 years to be solved lol

  • @bokoblinlogic1619
    @bokoblinlogic161919 күн бұрын

    I love how the first password was a Dune reference

  • @thanhvinhle2893
    @thanhvinhle289313 күн бұрын

    TLDR: Dinnerbone said the pw was used for other thing in Mojang years ago and Doge just happen to have a list of old passwords used by Mojang

  • @WATERfang132
    @WATERfang13221 күн бұрын

    now its wifies turn to make a vid about tominecon being solved XD

  • @DamageMaximo
    @DamageMaximo13 күн бұрын

    IMO Minecraft's greatest mystery that has already been solved will forever be the seed for the pack.png image

  • @sefsefsef1492
    @sefsefsef149221 күн бұрын

    But there are a few other questions, for example when you are in .minecraft/bin, there is a file that contains all the md5 hashes of the .jar files First, this file mentions a file called windows_natives.jar.lzma, which I couldn't find Second, all hashes match the hash of the file, except for minecraft.jar

  • @mcbyt

    @mcbyt

    20 күн бұрын

    Minecraft.jar doesn't match because that's the modified file I discussed in the video. Not sure what you mean about the windows natives jar or where that's mentioned - if you mean it's in the code of Minecraft.jar, then it's probably elsewhere in the 1.0 files or possibly something that's located in Windows itself.

  • @testtest66165

    @testtest66165

    20 күн бұрын

    The md5 hashes are in the tominecon File at .minecraft/bin. In this File is a Line which refferenced in a windows_natives.jar.lzma file I will Check later If the Hash mached the original Minecraft version

  • @Akira-Aerins
    @Akira-Aerins14 күн бұрын

    mans with that JSRF tune

  • @basix250
    @basix25014 күн бұрын

    Cool, a great file for my endless data hoarding base

  • @shapeswitch_mood7221
    @shapeswitch_mood722120 күн бұрын

    I wouldn't call a few digits of code the "Minecraft Greatest Mystery"...

  • @albertchosenko8514

    @albertchosenko8514

    20 күн бұрын

    The mystery is not about what was in the file. It was about the process and the excitement of finally answering one of Minecraft most asked questions. You witnessed history. Be proud.

  • @mcbyt

    @mcbyt

    20 күн бұрын

    Less so the content of the file, moreso the hunt to crack it like albert said. I mean, there's been millions of eyes on this random file for over a decade now!

  • @batuemirseven
    @batuemirseven20 күн бұрын

    8:44 we cracked **continues to add the lock sound**

  • @bazookabrooze1925
    @bazookabrooze192520 күн бұрын

    how did people tried harshly to crack the password without any results if it was only 8 characters??

  • @engtilde

    @engtilde

    19 күн бұрын

    they didn’t know that.

  • @AugustRenders
    @AugustRenders21 күн бұрын

    Thank goodness that version of the game was never released. Our multiplayer data could have been in so much danger!

  • @TheWildling20
    @TheWildling2021 күн бұрын

    This is a very well and incredibly made video! Very informative

  • @JC747
    @JC74719 күн бұрын

    so i remember being on a trying be on a server back in right after minecraft got it's 1.0 release, some friends and i was trying to get in to a server, kept giving us errors trying to join but invalid server key kept popping up, I believe somebody got it fixed during that time, sk89q released a class file, are you saying we actually might've had this issue right after the 1.0 release? it was quickly fixed, but still that was annoying trying to join a server.

  • @kerokayat2
    @kerokayat221 күн бұрын

    getting an ad at 8:48 sucks bro 😭😭

  • @MVP_Ryry
    @MVP_Ryry21 күн бұрын

    Always a great day when MCBYT posts

  • @FArire
    @FArire13 күн бұрын

    0:24 Good music choice ! A bit nostalgic.

  • @mcbyt

    @mcbyt

    13 күн бұрын

    dj professor k executive produced this video

  • @FArire

    @FArire

    13 күн бұрын

    @@mcbyt This video is officially the new target of agent Onishima

  • @deepwokenmongoose9133
    @deepwokenmongoose913321 күн бұрын

    What a high quality video! I wonder why so little views

  • @crimsonamogsus7351
    @crimsonamogsus735118 күн бұрын

    Well, Mojang must be pissed

  • @asuracrescent1191
    @asuracrescent119118 күн бұрын

    4:10 Tonight, RGN (and his followers) join the hunt

  • @ZakWithTwoZs
    @ZakWithTwoZs16 күн бұрын

    Shit like this makes me wonder what other mysteries could be solved if the right person stumbled across it.

  • @landermortier2245
    @landermortier224521 күн бұрын

    They accually got it

  • @LandonEmma
    @LandonEmma21 күн бұрын

    RIP Doge and hooray other Doge!

  • @VY_Canis_Majoris
    @VY_Canis_Majoris21 күн бұрын

    I heard the actual file wasn't able to be brute-forced like the decoy because it didn't use a common password, but "boxpig41" looks even more simple than the decoy's password???

  • @crimsoncuttlefish8842
    @crimsoncuttlefish884216 күн бұрын

    what shader are you using in your footage?

  • @mcbyt

    @mcbyt

    16 күн бұрын

    Mostly Sildur's Enhanced Default - I used BSL for the final shot and MollyVX for the outro though :)

  • @kettu9943
    @kettu994319 күн бұрын

    I feel so good right now Finally - after ten years - inner peace 🙏

  • @Siqnin
    @Siqnin21 күн бұрын

    Minecraft mysteries are lowkey fun again!

  • @itsarian.
    @itsarian.21 күн бұрын

    Been waiting for this

  • @kirpalor74
    @kirpalor7415 күн бұрын

    The video starts at 8:48

  • @WeebRemover4500
    @WeebRemover45006 күн бұрын

    mr. lahey?? oh god

  • @UmarBlox5124
    @UmarBlox512420 күн бұрын

    lol its just minecraft 1.0 but with an authenication bug

  • @JackCavis

    @JackCavis

    15 күн бұрын

    for over 10 minutes

  • @YoBlurry
    @YoBlurry16 күн бұрын

    i like the way your minecraft looks

  • @mcbyt

    @mcbyt

    16 күн бұрын

    Thank you :)

  • @mykramusic
    @mykramusic19 күн бұрын

    wait, so it was all a Dune reference? Always was.

  • @SophieEevee
    @SophieEevee21 күн бұрын

    When I saw the notification first I thought this was RetroGamingNow

  • @alexanderheubel7366
    @alexanderheubel736621 күн бұрын

    I still feel as if pack.png was a larger mystery

  • @jonus5331
    @jonus533115 күн бұрын

    Soo we new that its the password they used for something else, we has a list of their leaked old passwords and no one before dodge thought abut using it?

  • @PillowFillow
    @PillowFillow21 күн бұрын

    Bro I rember this

  • @cloudedarctrooper
    @cloudedarctrooper13 күн бұрын

    What's funny is (at least my interpretation of it is) that dinnerbone essentially says it's fine to pirate this single instance of minecraft 1.0.0, like, that's just funny to me.

  • @QuackCow144
    @QuackCow14419 күн бұрын

    so what did Dinnerbone say about the discovery?

Келесі