So basically the allegations are primarily that Manning provided Assange with a hashed password, and Assange tried, and failed, to determine the corresponding plain text password. This somehow involved Manning using a Linux OS (off a CD). I'm not clear how a fresh Linux OS would help bypass admin privileges and access a hashed password.
Manning did not have administrative-level privileges and used special software, namely a Linux operating system, to access the computer file and obtain the portion of the password provided to Assange.
...
ACTS IN FURTHERANCE OF THE CONSPIRACY
23. ... Manning copied a Linux operating system to a CD...
So basically the allegations are primarily that Manning provided Assange with a hashed password, and Assange tried, and failed, to determine the corresponding plain text password. This somehow involved Manning using a Linux OS (off a CD). I'm not clear how a fresh Linux OS would help bypass admin privileges and access a hashed password.
-------------------------------------------------------------
Manning did not have administrative-level privileges and used special software, namely a Linux operating system, to access the computer file and obtain the portion of the password provided to Assange.
...
ACTS IN FURTHERANCE OF THE CONSPIRACY
23. ... Manning copied a Linux operating system to a CD...