Posted on 09/05/2013 12:14:05 PM PDT by Alter Kaker
The National Security Agency is winning its long-running secret war on encryption, using supercomputers, technical trickery, court orders and behind-the-scenes persuasion to undermine the major tools protecting the privacy of everyday communications in the Internet age, according to newly disclosed documents.
The agency has circumvented or cracked much of the encryption, or digital scrambling, that guards global commerce and banking systems, protects sensitive data like trade secrets and medical records, and automatically secures the e-mails, Web searches, Internet chats and phone calls of Americans and others around the world, the documents show.
Many users assume or have been assured by Internet companies that their data is safe from prying eyes, including those of the government, and the N.S.A. wants to keep it that way. The agency treats its recent successes in deciphering protected information as among its most closely guarded secrets, restricted to those cleared for a highly classified program code-named Bullrun, according to the documents, provided by Edward J. Snowden, the former N.S.A. contractor.
(Excerpt) Read more at nytimes.com ...
Steganography must still be a huge problem ...
So is blatant!
‘Twas brillig in the mimsywabe, and...
Not really. I store mine in PASSWORDS.txt
I leave all my secret messages just sitting on the desk.
I store mine in an encrypted Excel worksheet. Excel is AES protected, so even if someone copied it, they would have their work cut out for them reading it.
Back in the old days, we sent our secret stuff by teletype to Langley.
We had a one-time roll of random(?) stuff on one tape, and our data on another. We exclusiveored the two tapes together and sent the message.
Back at headquarters they had the same tape as we did.
When they received our encrypted data, they exclusiveored their tape against it, and the clear data then reappeared.
I know that we destroyed our encryption tape, and assume they did the same at their end.
Good!
In this S3ntAnc3 which word is my password?
Design a filter to capture passwords out of bit stream....
Require passwords to be certian way.
Just S4yin.
Safes are easier to crack, since the numbers are a bit sloppy in execution. The mechanical precision allows one to merely get close to the number needed.
http://www.wikihow.com/Crack-a-%22Master-Lock%22-Combination-Lock
Are you aware of public key encryption? Public key algorithms, unlike symmetric key algorithms, do not require a secure initial exchange of one (or more) secret keys between the parties.
The Venona decrypts were the result of “sometime” (as opposed to one-time) pads used by the Soviet Embassy in Washington. Soviet “sometime” pads consisted of books containing pages and pages of keys. Ideally, every page was unique and random. Under wartime production pressure, some pages were simply copies of pages in other books. American cryptographers noticed unlikely “collisions” (coincidences) in the headings of certain messages, and were able to deduce that the same “one time” pad had been used to “encrypt” the two or more messages. With this realization, it was apparent that searching for further coincidences would bear fruit, which, indeed, it did.
'When I use a word,' Humpty Dumpty said, in a rather scornful tone, ' it means just what I choose it to mean, neither more nor less.'
'The question is,' said Alice, 'whether you can make words mean so many different things.' 'The question is,' said Humpty Dumpty, 'which is to be master - that's all.' |
The Ministry of Truth, Winston's place of work, contained, it was said, three thousand rooms above ground level, and corresponding ramifications below.
It costs $85.
There are some silver linings, but honestly, for a bulk of “secure” Internet traffic, they know.
Buy a copy of Matt Bracken’s latest book Castigo Cay on Amazon? They know.
Buy a few crates of milsurp ammo on CTD? They know.
Buying survival supplied from Cabelas? They know.
It was revealed a month or so ago that they were very obviously collecting unsecured Internet traffic (i.e. FreeRepublic), but now the cat’s out of the bag and the revelation is that they’re collecting all traffic, regardless of security, and are able to decrypt it thanks to back doors peppered into the protocols.
We could all go the route of symmetric cryptography vs. PKI, but I don’t think it’ll make a lick of difference any more. They’re likely recruiting mathematical mensches straight out of college to put them to work on algorithmic decryption across the board.
Some idiot was saying, “Oh, well at least it’s the ‘good guys’ with the keys and not someone like China or Iran.”
Really? People have zero concept of liberty. There will come a time, very soon I believe, when we will be unable to live from when we wake to when we bed without our every breath being surveilled, watched, monitored, cataloged, and databased. “Going dark” will literally mean nothing.
Unless you completely eschew technology in all of its forms, they’ll have a way to watch you. No phones, no television, no computers. Hell, you can’t even read books without either buying them, which is tracked, or borrowing them from a library, which is tracked. There’s almost nothing in our day-to-day lives that can’t be monitored. I would challenge anyone to come up with an activity that can’t be directly monitored by some government agency.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.