Close
Page 3 of 4 FirstFirst 1234 LastLast
Results 21 to 30 of 33
  1. #21
    "Beef Bacon" Commie Grant H.'s Avatar
    Join Date
    Jul 2007
    Location
    Longmont
    Posts
    2,443

    Default

    Christopher Glenn used Truecrypt, and the feds still got into it.

    There is speculation among those that have followed it that he gave up his password, but the reality of it is that no encryption is "unbreakable".
    Living the fall of an empire sucks!
    For your convenience, a link to my Feedback

  2. #22
    Rebuilt from Salvage TFOGGER's Avatar
    Join Date
    Dec 2008
    Location
    Aurora
    Posts
    7,789

    Default

    Encryption is like a cheap padlock: It'll keep honest people honest, until they get curious about what's inside. Mandating a back door is just begging someone to find it and pick the lock.
    Light a fire for a man, and he'll be warm for a day, light a man on fire, and he'll be warm for the rest of his life...

    Discussion is an exchange of intelligence. Argument is an exchange of
    ignorance. Ever found a liberal that you can have a discussion with?

  3. #23
    Finally Called Dillon Justin's Avatar
    Join Date
    Sep 2007
    Location
    Colorado Springs
    Posts
    1,877

    Default

    Certain forms of encryption are not breakable with realistic levels of hardware or in short time frames.

    In that case, they will simply use an alternate method to get the data.


  4. #24
    QUITTER Irving's Avatar
    Join Date
    Nov 2008
    Location
    Denver, CO
    Posts
    46,527
    Blog Entries
    1

    Default

    You can always opt-out.

    "There are no finger prints under water."

  5. #25
    At least my tag is unmolested
    Join Date
    Oct 2010
    Location
    CANON CITY, CO
    Posts
    3,133

    Default

    The FCC does not regulate encryption algorithms in general. They do regulate the forms used in wireless communication over regulated entities like cellular phone systems.

    The NSA has the mandate to help US companies develop encryption algorithms that protect things like financial transactions, and its widely accepted that they have worked hard to cripple such encryption methods to protect their own ability to decrypt communications. The most heavy-handed of the NSA's attempts was the notorious and truly stupid Clipper Chip. The concept was introduced in 1993 and dead within a year or two.

    What is the subject of great debate is whether or not the NSA has either found algorithmic methods to crack the large key encryption methods in the public domain or whether they have the computing power to brute force crack such methods. Usually the easiest routes to break into such communications involve human error in exposing keys rather than attacking the encryption algorithm itself. Or a $5 wrench from the Randall Monroe comic that Justin links.

    The Dept of State claims the authority to control the export of encryption technology, as its classified as a munition under ITAR regulations but that's pretty much horse and barn door time. Open source Public key crypto systems like PGP are well distributed.

    Amusingly, there is a theoretical way to use "backdoored" encryption systems - where the government has the ability to read all plaintext messages - to still have an encryption communication. Discussed here https://www.schneier.com/blog/archiv...ting_back.html

    Bruce Schneier's blog has some other encryption related discussions and he has one of the better overview texts on the topic.

    Large state military encryption systems are broken using ordinary old-fashioned espionage - see the Walker family espionage ring. Real terrorists use more primitive methods of just hiding their communications such as sharing a web based email or forum and leaving messages in draft folders. Other unsophisticated techniques, one of which actually appears in a Netflix TV series "Occupied" are to use things like multi-player online games to meet and chat in agreed game servers.
    Last edited by spqrzilla; 04-12-2018 at 23:47.
    Sayonara

  6. #26
    Thinks Gravy Boats are SEXY ASF! izzy's Avatar
    Join Date
    Jun 2015
    Location
    Centennial
    Posts
    1,630

    Default

    Most people who are concerned about their privacy willingly/naively give up access to their "private" conversations and more. Not to sound like a luddite or a hipster but it seems like an "analog" conversation is probably more simple to keep private than any digital one. Maybe being esoteric on top of it is even better. Who can read smoke signals or understand Sanskrit these days anyways? Time to brush up on my cuneiform lol

  7. #27
    "Beef Bacon" Commie Grant H.'s Avatar
    Join Date
    Jul 2007
    Location
    Longmont
    Posts
    2,443

    Default

    Quote Originally Posted by izzy View Post
    Most people who are concerned about their privacy willingly/naively give up access to their "private" conversations and more. Not to sound like a luddite or a hipster but it seems like an "analog" conversation is probably more simple to keep private than any digital one. Maybe being esoteric on top of it is even better. Who can read smoke signals or understand Sanskrit these days anyways? Time to brush up on my cuneiform lol
    Absolutely true.
    Living the fall of an empire sucks!
    For your convenience, a link to my Feedback

  8. #28
    Possesses Antidote for "Cool" Gman's Avatar
    Join Date
    Oct 2005
    Location
    Puyallup, WA
    Posts
    17,848

    Default

    The reason that social engineering is still used....is because it continues to work. People never learn.
    Liberals never met a slippery slope they didn't grease.
    -Me

    I wish technology solved people issues. It seems to just reveal them.
    -Also Me


  9. #29
    At least my tag is unmolested
    Join Date
    Oct 2010
    Location
    CANON CITY, CO
    Posts
    3,133

    Default

    Many decades ago, a bank was hacked for very large sums of money via wire transfers. The vice presidents who had the authority to make such transfers had elaborate methods of bonded couriers carrying the daily authorization codes to each VP, secure methods of holding those codes for the VP to access and elaborate methods of verifying the identity of the VP when they called in the transfer to the bank's operation center.

    Then the operators at the operation center wrote the daily authorization code on a giant whiteboard in view of a glass window to the hallway.
    Sayonara

  10. #30
    Thinks Gravy Boats are SEXY ASF! izzy's Avatar
    Join Date
    Jun 2015
    Location
    Centennial
    Posts
    1,630

    Default

    I did that as a project in college. Could encrypt anything into the header of an image. At the time it was pretty unbreakable these days I'd guess the average cellphone has the power to crack it.

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •