Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

How to protect your PC from PRISM surveillance
PC World ^ | June 7, 2013 | Mark Hachman, PC World

Posted on 06/11/2013 11:48:04 AM PDT by Nachum

click here to read article


Navigation: use the links below to view more comments.
first previous 1-2021-4041-59 last
To: MeganC

Also.. keep your messages short. Even the best cryptanalyst in the world can’t crack a cipher if it is too short to analyze for patterns.


41 posted on 06/11/2013 12:40:44 PM PDT by Boogieman
[ Post Reply | Private Reply | To 19 | View Replies]

To: caww
Actually... I saw this days ago (on FR) and it has been in development for a long, long time. It's just that the equipment to do so has been reduced to an integrated part of a single chip and the cost reduced as well.

You don't have to be 'in the room' near the device to remotely control your TV. It can 'see' through walls, which your last sentence indicated.

Furthermore, you can actually be 'seen' through walls. Even if you stand still. The equipment for this hasn't been reduced to a single chip... yet. But it is in use by our government.

42 posted on 06/11/2013 12:46:44 PM PDT by UCANSEE2 (The monsters are due on Maple Street)
[ Post Reply | Private Reply | To 36 | View Replies]

To: UCANSEE2

I saw it either by Chinese or Japanese...I forget....sometimes they are ahead of our guys.

At any rate...if they want to know you, hear you, see you, they will...and basically always have to some extent.


43 posted on 06/11/2013 12:59:44 PM PDT by caww
[ Post Reply | Private Reply | To 42 | View Replies]

To: Principle Over Politics
Who invented TOR?

Inventors: Reed; Michael G. (Bethesda, MD), Syverson; Paul F. (Silver Spring, MD), Goldschlag; David M. (Silver Spring, MD)
Assignee: The United States of America as represented by the Secretary of the Navy (Washington, DC)

See US Patent No. 6266704 (1998).

44 posted on 06/11/2013 12:59:50 PM PDT by cynwoody
[ Post Reply | Private Reply | To 12 | View Replies]

To: cynwoody

Yep


45 posted on 06/11/2013 1:00:25 PM PDT by caww
[ Post Reply | Private Reply | To 44 | View Replies]

To: Chickensoup

That’s right...I couldn’t remember how they do that...but I knew they could. Thanks.


46 posted on 06/11/2013 1:01:31 PM PDT by caww
[ Post Reply | Private Reply | To 38 | View Replies]

To: Principle Over Politics

> Who invented TOR?

DARPA


47 posted on 06/11/2013 1:35:58 PM PDT by BuffaloJack (Gun Control is the Key to totalitarianism and genocide.)
[ Post Reply | Private Reply | To 12 | View Replies]

To: Boogieman
Also.. keep your messages short. Even the best cryptanalyst in the world can’t crack a cipher if it is too short to analyze for patterns.

Use a one-time pad. That's the only method that absolutely, positively cannot be broken.

For the pad, you need a source of true random numbers, e.g., from thermal noise. For instance, if Paul and Alice need to communicate, they each generate a four-gigabyte pad. Then they put both pads on each of a pair of 8 gb USB sticks. If Paul needs to send Alice a 100K message, he XORs his message with the next unused 100K of his pad and sends it to Alice. She decrypts it by XORing it with the next 100K of her copy of Paul's pad. And vice-versa. This lasts until one of them has sent 4 gb. Then they have to meet again and generate more keys (and buy bigger sticks).

More practical methods replace the pads with pseudo-random numbers generated from long keys using algorithms such as RC4. That avoids the need to generate, store, and exchange lengthy pads. However, there is still the need to meet and exchange keys.

Modern methods use public-private key pairs to eliminate the need to meet and exchange keys. Instead, Paul sends his public key to Alice, she generates a long random number (called a session key) and sends it to Paul encrypted with his public key. He decrypts it with his private key (which only he has, unless the NSA has performed a bag job). Then the rest of the session is conducted under the session key. The session key is for performance: session key methods like RC4 are computationally cheap, whereas public-private is expensive.

The other cool thing about public key cryptography is key signing. That is, Paul's key can be digitally signed by a certificate authority (CA) whom Alice trusts. That allows her to verify that the key Paul is presenting is really Paul's and not the NSA's. Of course, that assumes the NSA hasn't compromised the certificate authority.

The above is called transport layer security (TLS). It's what's in effect whenever you use HTTPS in your browser. When you log into your bank, your browser verifies the bank's public key by requiring it to be properly signed by one of a list of trusted CAs pre-stored on your computer. If it doesn't match, you'll have to blow past a warning dialog in order to complete the connection. In that case, your connection will still be secure, but it might not be with your bank.

48 posted on 06/11/2013 1:38:38 PM PDT by cynwoody
[ Post Reply | Private Reply | To 41 | View Replies]

To: Revolting cat!
Disconnect from the internet, which is what I’ve done.

So, you're posting by snail mail, now?

49 posted on 06/11/2013 2:07:20 PM PDT by TangoLimaSierra (To the left the truth looks like Right-Wing extremism.)
[ Post Reply | Private Reply | To 4 | View Replies]

To: Revolting cat!

a self-refuting post.


50 posted on 06/11/2013 2:13:01 PM PDT by SoFloFreeper
[ Post Reply | Private Reply | To 4 | View Replies]

To: servo1969

I’ve come to believe that we are taped everywhere we go. Just like PERSON OF INTEREST. Every cell phone has a camera. The computer monitor I’m looking at right now has a camera looking back at me. There is no privacy anywhere unless you live in a cave. And if you do that you’d better de-bug it.


51 posted on 06/11/2013 2:54:41 PM PDT by VerySadAmerican
[ Post Reply | Private Reply | To 16 | View Replies]

To: Nachum

52 posted on 06/11/2013 3:08:19 PM PDT by hawkboy
[ Post Reply | Private Reply | To 1 | View Replies]

To: Revolting cat!

So you post with 2 tin cans and some string ?


53 posted on 06/11/2013 3:38:22 PM PDT by Kozak (The Republic is dead. I do not owe what we have any loyalty, wealth or sympathy.)
[ Post Reply | Private Reply | To 4 | View Replies]

To: Principle Over Politics

USNavy....


54 posted on 06/11/2013 3:41:13 PM PDT by Kozak (The Republic is dead. I do not owe what we have any loyalty, wealth or sympathy.)
[ Post Reply | Private Reply | To 12 | View Replies]

To: Revolting cat!
Disconnect from the internet, which is what I’ve done.

Um, how do you post comments on FR then?

55 posted on 06/11/2013 4:49:43 PM PDT by BfloGuy (Don't try to explain yourself to liberals; you're not the jackass-whisperer.)
[ Post Reply | Private Reply | To 4 | View Replies]

To: Boogieman

True. Very good advice. I’ve also been told to skip using the word “the” in all encrypted communications in order to increase the complexity of potential decryption.


56 posted on 06/12/2013 8:23:37 AM PDT by MeganC (A gun is like a parachute. If you need one, and don't have one, you'll never need one again.)
[ Post Reply | Private Reply | To 41 | View Replies]

To: MeganC

Another trick is to include intentional mispellings in the plaintext. The message will still be readable once decrypted, but it even just a few typos sprinkled in will make decryption a bit harder, especially if you do it on words that the decrypter might guess would be related to your subject matter.


57 posted on 06/12/2013 8:46:44 AM PDT by Boogieman
[ Post Reply | Private Reply | To 56 | View Replies]

To: BfloGuy

He sits in a van outside your house and posts through your unsecured wi-fi network :)


58 posted on 06/12/2013 8:48:38 AM PDT by Boogieman
[ Post Reply | Private Reply | To 55 | View Replies]

To: MeganC

If you use AES-128 and up and a long 14+ character random password they won’t crack it. If you use RSA or any other public key method for the password, make sure it’s at least 4096 bit if RSA or 521 bit for Elliptic curve. The 2nd method’s far better in that scenario.

Until quantum computers really get going, AES-128 should be ok. If you think they’ve got them, then go with AES-256 for sure.


59 posted on 06/12/2013 8:52:19 AM PDT by Monty22002
[ Post Reply | Private Reply | To 19 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-59 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson