Posted on 02/09/2018 1:44:19 PM PST by bitt
Mark Warner was texting a Russian oligarch using an encrypted app, Signal, and his messages were set to automatically delete.
FoxNews broke a huge story about Senator Mark Warner, which has been discussed elsewhere.
What I havent seen anyone else cover is the fact that the text messages were not ordinary messages. Warner was communicating via Signal, an encrypted app. Moreover, Warner had his messages set to disappear. (The hour glass icon in the text exchange.)
You must operate on the theory that the NSA can crack any encryption.
They’re all at a YUGE disadvantage because they’re operating from the position that they believe in Trump’s guilt, WHEN IN FACT, DONALD TRUMP IS TOTALLY INNOCENT!
THERE IS NO THERE, ANYWHERE.
Pro, I doubt the House and Senate could comply with Sarb-Ox, let alone Dodd-Frank or possibly even pass a U-4 background check. And they are giving everybody in the "biz" all this compliance garbage when they can't even comply themselves? The hypocrisy is stunning...
SEC/FINRA does not ban text or email, they simply require archiving and oversight.
I think these are false flags ...... or incredibly ignorant polidiots and presstitutes caught using such as Signal, Tor, 12P or simple steganography ...... my amateur opinion only.
No firm or bd allows reps to use text in client communication. I can assure you of that.
Sessions also recused from investigating Hillary because he would be viewed as having animus toward her.
Both are forms of "conflict of interest." The first one (campaign) is covered directly by DOJ conflict regulation.
How about how they limited, or eliminated licensed advisors from donating to political campaigns? Im required to disclose any contribution to my bd and have to file a report every quarter whether I did or didnt. I suspect its because they know we are a very conservative group.
Yes, and if you are a officer or board member of a 501c3 you have to put it on your U4, if my memory is correct, seriously, your an officer on the board of a PTA, how is that threat to your performing your fiduciary responsibility, ya think they’d welcome your civic engagement. IMHO Newt’s idea of finance reform of unlimited funds and posting of who’s giving in 24 hrs to see who they are bought and sold too works in my book, if they are gonna give everyone else an “exam”, they need one too.
If that were the case we wouldn’t trust any financial transaction. In know encryption, I’ve a background applying it in software systems. Yes, there’s a brute force approach to cracking a *specific* device/message but you’d want to have an extremely good reason to put the computing horsepower behind doing so. You couldn’t do it for everything you capture. Even then, depending on the encryption used, it could take a long time. Capturing encrypted content is a long way from knowing the decrypted content.
Remember that the Germans also believed that their Enigma machines were unbreakable.
How the NSA can break trillions of encrypted Web and VPN connections
Article 2.5 years old........
________________
Mark Warner is worse than pond scum.
Mark Warner is the smelly crap stuck to a drunk's underwear for three week.
He is the foul smelly urine of a man who hasn't changed his underwear in two months.
Mark Warner is the septic tank odor of the Congress.
_______
TAKE A SIMPLE LOOK AT MARK WARNER............ HE IS A SICKENING, SH*T-FOR-BRAINS, LYING SLIMEBAG.
Think about it, if it were that easy our entire infrastructure would fall apart. Have there been significant vulnerabilities found over the last few years? Yes - and they’re fixed (Spectre would be very difficult to really abuse). We’re a large software house and use a lot of open source software. There’s no built-in backdoor in anything we ship. We pay 3rd parties to try to hack into our stuff.
I just don’t buy into these articles because they’re just hypothesizing - they don’t really know...along with the landscape changing all the time. There’s well proven encryption libraries that are open sourced and have had very serious people look at them for a long time.
The fact that the government wants device manufacturers to be required to provide some form of backdoor is the biggest indicator that they’re challenged by them.
Not true.
For a “how to” see - http://www.smarsh.com/whitepapers/financial-firms-guide-compliant-text-messaging
FINRA TEXT MESSAGING GUIDANCE
In light of the emerging technologies and communications, in 2017 FINRA published Regulatory Notice 1718: Social Media and Digital Communications, providing further guidance on the rules governing social media and text-message
communications for member firms.
Key points from this FINRA guidance include:
Firms are reminded of their obligation to keep records of business communications under SEC Rule 17a-4(b)(4). Also, firms must train and educate their advisors regarding the distinction between business and personal communications, and the requirements to retain, supervise, and produce business communications.
Firms that communicate or allow advisors to communicate through text messaging or chat services for business purposes must retain records of those communications, in compliance with SEC and FINRA rules.
“How about how they limited, or eliminated licensed advisors from donating to political campaigns?”
You have to follow rules, but you can still usually donate.
#2: Bypassing Encryption
You know how all these companies promise encryption and some even charge more for the service? Guess what? It doesnt matter! Vault 7 leaked docs shows that the CIA is getting audio files before they get encrypted. The CIA can hack into your phone, compromise your operating system and suck up your messages before theyre encrypted and sent. It doesnt matter what precautions youve taken. Encrypted messaging apps like WhatsApp, Signal, Telegram and many more are vulnerable.
https://wakeup-world.com/2017/03/15/wikileaks-cia-vault-7-leaks-the-top-15-discoveries-and-implications-so-far/
Choose to believe that if you wish. I’m not saying the CIA hasn’t worked with corporations to build-in security compromising backdoors.
In the millions of devices that I’ve been involved in getting to market, using open source software, this has never been the case however. Secure boot, private key encryption, digitally signed images, filesystem tamper detection (dm-verity), SE-Linux enforcement, with open for-all-to-see source code (middleware, encryption libraries, kernels, drivers, ...) ...it is not possible to “easily compromise” without the software vendor knowing it. I’m in a position where I would know.
I know how this stuff works. Those making assertions like this are aiming at those that don’t know. This may not all be true for closed-source OS’s (Windows/iOS) - although they’d be risking the company if they deliberately compromised security for the CIA and their customer base found out about it.
You could build your own encryption algorithm/library-of-choice directly into an application. There’s nothing that can just “bypass” it. If you have the source code, you can guarantee it. The only vulnerability would be a security flaw that only the CIA understands, that is unknown to the entire hacking world, which I don’t believe. It’s just not that simple.
bump
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.