Free Republic
Browse · Search
General/Chat
Topics · Post Article

To: LittleLinda

Side Channel Analysis for Reverse Engineering (SCARE) — An Improved Attack Against a Secret A3/A8 GSM Algorithm
___________________________________________________

That’s an interesting find. I’m sorry it took me awhile to respond to you. A3 and A8 GSM algorithms have to do with phone security. GSM is supposed to be the most secured cellular telecommunications system available today. A3 is the user authentication algorithm and A8 is the ciphering key generating algorithm. GSM maintains end-to-end security by retaining the confidentiality of calls and the anonymity of the GSM subscriber.

If the black hats were the subscribers and the white hats figured out how to attack the GSM algorithms, then the WH would have access to the identities of the phone users and their phone comms. Didn’t Q post photos lifted from their phones or am I conflating two events?

If this is accurate, then the [SCARE] event could be referring to the hacking of their phones. I haven’t noodled out why SCARE is in square brackets yet, except maybe to provide some deniability.

______________________________________________

No need to apologize. I wasn’t even really expecting you to respond. I just put this out there in case the computer/tech/sciency types on this thread might understand what this even meant and could comment upon it. No offense, but I didn’t expect you to be the one to break it apart. I didn’t think you had that technical of a background.

I think I might have put this out there on a thread eons ago and got no takers, but it would have been a few months before your sign up date on FR.


1,381 posted on 08/07/2021 2:59:48 PM PDT by CheshireTheCat ("Forgetting pain is convenient.Remembering it agonizing.But recovering truth is worth the suffering")
[ Post Reply | Private Reply | To 1230 | View Replies ]


To: CheshireTheCat

I just put this out there in case the computer/tech/sciency types on this thread might understand what this even meant and could comment upon it. No offense, but I didn’t expect you to be the one to break it apart. I didn’t think you had that technical of a background.
_________________________________________________________

I don’t. “computer/tech/sciency” - sciency - that’s me. And, moreover, a researcher. No offense taken. Some skills are useful across many disciplines, provided their jargon doesn’t get in the way of comprehension.

Cletus.D.Yokel suggested that Q’s use of square brackets suggests the contents of the brackets are under the control of WH. That fits very nicely with the idea that BH phones were hacked using SCARE technology. Great teamwork! Hard to know if the theory has merit.


1,401 posted on 08/07/2021 3:44:55 PM PDT by LittleLinda
[ Post Reply | Private Reply | To 1381 | View Replies ]

To: CheshireTheCat

“If the black hats were the subscribers and the white hats figured out how to attack the GSM algorithms, then the WH would have access to the identities of the phone users and their phone comms. Didn’t Q post photos lifted from their phones or am I conflating two events?

_______________________________________

I don’t know that Q posted photos taken from the phones of Black Hats. I know Q posted photos of Trump on Air Force One and the like, taken, I assume, from phones of the White Hats. Q also posted photos of Black Hats in different countries taken, I would assume, by White Hat surveillance teams.

I would tend to think that the Q team would make better uses of photos taken by the phones of Black Hats than posting them for Anons to see.

For instance, I could see Q taking the photos Black Hats used to blackmail people and presenting them to the blackmailed as a way of “persuading” them as to which team- White or Black - to work with, as in, “Hey, the bad guys aren’t the only people to have these photos of you. We got them from them and can use them against you if you don’t cooperate with us.”

I can also see Q sending the photos right back to the person who took them, saying “Hey, we have this photo you took of the lab in Wuhan from your own phone. Why were you in this lab? You had no legitimate reason to be there.”

Finally, Q might have photos taken from the phones of one bad set of actors who were conducting surveillance on other bad actors and might use these photos and their sources to play mind games with them.


1,410 posted on 08/07/2021 4:20:29 PM PDT by CheshireTheCat ("Forgetting pain is convenient.Remembering it agonizing.But recovering truth is worth the suffering")
[ Post Reply | Private Reply | To 1381 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson