Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

China's Conquest of Internet, ICANN + Quantum Encryption
FR research, please share w. others | Arthur March

Posted on 09/24/2016 9:40:29 AM PDT by Arthur Wildfire! March

click here to read article


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-80 ... 101-118 next last
To: palmer

Another post you made is relavent here too:

“China has a couple goals: domination of their parts of the world. Control of natural resources wherever they can control. Controlling the internet for their population. Profit (as it supports the other goals). If they can gain financially from controlling the internet they will, maybe by charging those dictators for disabling parts of the internet they don’t like. They also have to allow access to the internet or lose out on physical product sales, but more importantly lose on encryption and every other software endeavor.”

And I learned of a new place China is adding to its umbrella: Europe.

[In article ...]

“China’s quantum network could soon span two continents, thanks to a satellite launched earlier today ... the Quantum Science Satellite is designed to distribute quantum-encrypted keys between relay stations in China and Europe. When working as planned, the result could enable unprecedented levels of security between parties on different continents. [snip]

“That was written in August 15 — mid-August of this year, the same time that Strickling boasted of his criminal transition plan of ICANN.”


41 posted on 09/24/2016 3:49:02 PM PDT by Arthur Wildfire! March (Trump Opposed to ICANN reform --China's conquest of internet, Hillary's gatekeeper)
[ Post Reply | Private Reply | To 39 | View Replies]

To: Arthur Wildfire! March

What about the dark web or deep web? Isn’t there talk of an alternate web opening up just because of the ICANN debate?


42 posted on 09/24/2016 3:49:09 PM PDT by disndat
[ Post Reply | Private Reply | To 31 | View Replies]

To: The Westerner

That’s one thing I’m hoping for — this could be a powerful issue to spring on Hillary. Trump would most likely blindside her.


43 posted on 09/24/2016 3:50:44 PM PDT by Arthur Wildfire! March (Trump Opposed to ICANN reform --China's conquest of internet, Hillary's gatekeeper)
[ Post Reply | Private Reply | To 40 | View Replies]

To: disndat

That might be something I posted. I speculated that China could start up ‘shadow TLDs’.

But it would probably be easier to simply hack into a TLD’s system and mix it up however they like. They could also take out the communication satellites and simply erase our wireless communications.

This is the role ICANN plays — it’s easier to build an alliance against the US if they sign a contract with ICANN. It adds a sense of legitimacy.


44 posted on 09/24/2016 3:58:26 PM PDT by Arthur Wildfire! March (Trump Opposed to ICANN reform --China's conquest of internet, Hillary's gatekeeper)
[ Post Reply | Private Reply | To 42 | View Replies]

To: disndat
Just looked up the terms you referenced. I'm guessing those are software tactics which depend on good encryption by the TLD. And if you want wireless, it depends on the satellite. And don't forget, each TLD is required by law to abide by ICANN's Registry Operator Code of Conduct. Deep web - Wikipedia https://en.wikipedia.org/wiki/Deep_web‎ Not to be confused with Dark web. The deep web, invisible web, or hidden web are parts of the World Wide Web whose contents ... ‎Deep web https://en.wikipedia.org/wiki/Dark_web‎ SimilarThe dark web is the World Wide Web content that exists on darknets, overlay networks which use the public Internet but which require specific software, configurations or authorization to access. The dark web forms a small part of the deep web, the part of the Web not ... ‎Camgirl - ‎All Things Vice - ‎Botnet - ‎Clearnet
45 posted on 09/24/2016 4:04:55 PM PDT by Arthur Wildfire! March (Trump Opposed to ICANN reform --China's conquest of internet, Hillary's gatekeeper)
[ Post Reply | Private Reply | To 42 | View Replies]

To: The Westerner

“Everybody has access to the same encryption algorithms. If we did not, then we would have security by obscurity which always fails eventually.”

Nope. Not even close. The entire purpose of the NSA was to secure our cryptography systems. We all do NOT use the same algorithms.

The phrase “security by obscurity” isn’t what you stated. It means to secure something by keeping it a secret. Our algorithms are not secure because no one knows them. Heck, we could publish them and they would still be secure. We don’t publish them because we don’t want our enemies to use such good stuff. That would make breaking their messages that much harder.

I think asking Hillary about cyber security would be a great line of questions. Trump knows the answers. Hillary violates every rule in the book.


46 posted on 09/24/2016 4:18:00 PM PDT by CodeToad
[ Post Reply | Private Reply | To 40 | View Replies]

To: Arthur Wildfire! March

I am (obviously) going to have to read up on this. I read something about the alternate web. Not necessarily the dark or deep web. Sure it has to rely on the same satellites but someone else controlling our satellites surely is a doubled-edged sword. You know China recently unveiled the biggest supercomputer yet. So even without the quantum aspect they can do some serious crunching.


47 posted on 09/24/2016 4:25:36 PM PDT by disndat
[ Post Reply | Private Reply | To 45 | View Replies]

To: Arthur Wildfire! March

Thank You !


48 posted on 09/24/2016 4:48:26 PM PDT by Squantos ( Be polite, be professional, but have a plan to kill everyone you meet ...)
[ Post Reply | Private Reply | To 35 | View Replies]

To: Arthur Wildfire! March
Additionally, the complexity of quantum mechanics makes it virtually impossible to reverse engineer the quantum key generated through quantum entanglement.

It's also virtually impossible to reverse engineer an ordinary AES256 key. When I talked about public algorithms on the other thread, that's what I meant. AES was selected through an open and public process of selecting an encryption algorithm. Every cryptographer on the planet had their chance to find weaknesses. Of course there could be Chinese cryptographers who know some weaknesses. Or NSA might know about a weaknesses. But that is unlikely because many top ranked cryptographers looked at it.

The sole strength of the public algorithm, by design, is the secret key. If the algorithm is used properly there is virtually no realistic computing power that could reverse engineer the key given any amount of captured ciphertext (encrypted material). We expect that our adversaries are always snooping and eavesdropping but no matter how much ciphertext they gather they cannot figure out the key and decrypt the ciphertext.

That is quite different from quantum entanglement for a comms channel where my understanding matches what you quoted, namely that the channel cannot be eavesdropped, it is physically impossible to observe without altering it.

I think the advantage of quantum computing will eventually be very rapid parallel testing of keys so that algorithms like AES that are now quite safe may not be so safe (from reverse engineering the key). That quantum computing is different from the quantum entanglement although it uses the same underlying principles.

49 posted on 09/24/2016 5:57:24 PM PDT by palmer (turn into nonpaper w no identifying heading and send nonsecure)
[ Post Reply | Private Reply | To 38 | View Replies]

To: Arthur Wildfire! March

Yes, and there a ton of Chinese in the US and other countries that could go back to China. Right now most of them see much better opportunities here and Europe, but that could change.


50 posted on 09/24/2016 5:58:53 PM PDT by palmer (turn into nonpaper w no identifying heading and send nonsecure)
[ Post Reply | Private Reply | To 39 | View Replies]

To: Arthur Wildfire! March
Both deep web and dark web are somewhat immune to some country mucking with the DNS.

Dark web is the primary means by which dissident Chinese get around internet blockages and censorship by their government. Specifically they use TOR. Using DNS is considered a type of vulnerability for TOR because it tips off the authorities. But the TOR network obfuscates the users' DNS lookups. I think that's because the actual lookup is done somewhere way off in the TOR network far away from your computer. So the authorities cannot trace that lookup to you. But the other advantage is that if they have broken the DNS server you use, that won't matter much. Might mean you have to connect to TOR with an IP address instead of a name, but I'm not sure

Deep web could be easily made immune to DNS problems simply by using IP addresses for all the deep web access points. Those aren't linked from anywhere to keep them invisible. Instead someone could hand them to you on a sheet of paper. Instead of domain names on the paper, there would be IP addresses. Your browser certainly won't care and it will save a step not having to look up an IP from a domain name.

51 posted on 09/24/2016 6:14:55 PM PDT by palmer (turn into nonpaper w no identifying heading and send nonsecure)
[ Post Reply | Private Reply | To 45 | View Replies]

To: CodeToad; Arthur Wildfire! March; palmer
Thanks, C.T. for this information. However, I wasn't in on the discussion about algorithms. I'll ping those folks here.

In your opinion, is the NSA doing what it's supposed to? Didn't Wikileaks hack their emails? I'm not even sure what I'm asking because I don't know much about codes and things. Better question, can Trump, with his understanding and know how, improve the security of our security agencies?

52 posted on 09/24/2016 6:18:25 PM PDT by The Westerner (Will Free Republic exist when ICANN controls the web?)
[ Post Reply | Private Reply | To 46 | View Replies]

To: CodeToad; The Westerner
This was my quote:

“Everybody has access to the same encryption algorithms. If we did not, then we would have security by obscurity which always fails eventually.”

We all do NOT use the same algorithms.

Most of the world does. I think the Chinese have some of their own but that was 10 years ago, I don't know the current status.

The phrase “security by obscurity” isn’t what you stated. It means to secure something by keeping it a secret. Our algorithms are not secure because no one knows them. Heck, we could publish them and they would still be secure. We don’t publish them because we don’t want our enemies to use such good stuff.

That is completely incorrect. Here is AES, made 100% public so it could be vetted by the best cryptographers on the planet: http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf

53 posted on 09/24/2016 6:23:53 PM PDT by palmer (turn into nonpaper w no identifying heading and send nonsecure)
[ Post Reply | Private Reply | To 46 | View Replies]

To: palmer

US export regulations require that any exported software package that encrypts data other than passwords (e.g., SSH, VPN, TLS) and uses nonstandard encryption algorithms to do so must disclose the algorithms to the federal govt. The penalties are pretty severe if you don’t.

‘Export’ includes simply putting your app on the Internet for free download.


54 posted on 09/24/2016 6:51:40 PM PDT by Gideon7
[ Post Reply | Private Reply | To 53 | View Replies]

To: disndat

“I am (obviously) going to have to read up on this.”

Good. People get tired of one viewpoint, and ‘fresh eyes’ would be helpful. I’m running out of curiosity on this.

“I read something about the alternate web.”

One thing I still keep wondering about is a kind of ‘Doppleganger’ TLD.

.com is a TLD as is .mil and .gov.

Each TLD has its own database.

If China were to create a doppleganger, it could prepare a massive amount of code to ‘take over’ key websites.

Of course, all of that is assuming that the official TLD is either hacked or disabled or cut off from its satellite feed.

“You know China recently unveiled the biggest supercomputer yet.”

Just the fuzziest of memories about that. I hardly paid attention at the time.

Please keep thinking and posting.

— FRegards ....


55 posted on 09/25/2016 1:51:32 AM PDT by Arthur Wildfire! March (Trump Opposed to ICANN reform --China's conquest of internet, Hillary's gatekeeper)
[ Post Reply | Private Reply | To 47 | View Replies]

To: CodeToad

Thank you for your input.

If you notice an inconsistancy in my writing, I readily admit that I am bran new to this kind of information.

One thing I’ve always assumed about encryption and codes is that it takes many more man hours to crack a code than to make one.

Is that true? Reason to hope?

So far Trump’s never been hacked. I wonder if China could hack him, or if they simply don’t want to alarm us during the election?


56 posted on 09/25/2016 1:56:04 AM PDT by Arthur Wildfire! March (Trump Opposed to ICANN reform --China's conquest of internet, Hillary's gatekeeper)
[ Post Reply | Private Reply | To 46 | View Replies]

To: palmer

So we could essentially ‘match’ China as being immune to hacking, although with us it would be 99% secure while China is 100%. Close enough to be ‘in the fight’, especially if each satellite and TLD had unique safeguards.


57 posted on 09/25/2016 2:00:53 AM PDT by Arthur Wildfire! March (Trump Opposed to ICANN reform --China's conquest of internet, Hillary's gatekeeper)
[ Post Reply | Private Reply | To 49 | View Replies]

To: palmer; disndat; CodeToad; The Westerner

So — China’s dissidents use the ‘dark web’.

And ‘deep web’ could be secret IP addresses like you talked about.

Let me see if I have it right: currently any domain name owner can go to his TLD and get numerous IP addresses, a number sequence that works the same as his domain name.

So we punch in ‘39643’ [in the web address box] and go to china_dissident.com for example.

[No idea where that would take you BTW.]

I am AMAZED that China, being as advanced as it is with encyrption/decryption, still has that kind of thing going on.

But of course, the TLD could be based in Australia or Japan or the US and thus China has not been able to shut them out yet.

However, if ICANN subjects a TLD to a new “Registry Operator Code of Conduct” [due to a new globalist contract that favors China of course], that backdoor could be slammed shut.

Otherwise, China has a cassis belli to escalate cyber-attacks.


58 posted on 09/25/2016 2:11:17 AM PDT by Arthur Wildfire! March (Trump Opposed to ICANN reform --China's conquest of internet, Hillary's gatekeeper)
[ Post Reply | Private Reply | To 51 | View Replies]

To: Gideon7; The Westerner; palmer

So when NSA got hacked, all legal US algorithms [required to register them] might have been copied by the hackers then.

One thing, if we are ever reduced to going ‘old school’, here is a ‘poor man’s encryption’:

In the old fashioned text document [the very most basic one], I sometimes ‘auto-replace’ several misspelled words at once.

You can use that for the opposite purpose — to encrypt.

You could replace ‘a’ with xyz

You could replace ‘e’ with zzz

Every vowel with constanants and every constenant with vowels. And that’s just the simplist way of doing it.

You could have multiple translations for each ‘a’, such as either xyz or yyy.

Or you could replace one letter with another single letter, but that takes more work.

Then reverse the process with auto-correct.

A lot of work unfortunately.


59 posted on 09/25/2016 2:23:40 AM PDT by Arthur Wildfire! March (Trump Opposed to ICANN reform --China's conquest of internet, Hillary's gatekeeper)
[ Post Reply | Private Reply | To 54 | View Replies]

To: Gideon7

YAHOO sued for gross negligence over huge hacking...

https://www.yahoo.com/news/yahoo-sued-gross-negligence-over-huge-data-breach-213708408—finance.html

[Even though NSA had their algorithm filed away. Might be NSA’s fault when NSA got hacked.]


60 posted on 09/25/2016 2:46:33 AM PDT by Arthur Wildfire! March (Trump Opposed to ICANN reform --China's conquest of internet, Hillary's gatekeeper)
[ Post Reply | Private Reply | To 59 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-80 ... 101-118 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson