Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: Blood of Tyrants
"The real bad guys will simply use encrypting. "

I suspect that's exactly what the NSA looks for in the billions of messages sent every hour. Encryption tags probably cause the message to be directed to queues for brute force decryption and examination. If you're a bad guy, encryption is probably the worst thing you can do.

9 posted on 05/31/2002 6:45:42 AM PDT by elfman2
[ Post Reply | Private Reply | To 7 | View Replies ]


To: elfman2
I heard that one of the ways that the Taliban sent instructions and messages was to encrypt the message in a porno jpeg file and post it on the some porn website. The recipient simply downloaded it and decrypted it. Anyone else just got a porn picture.
14 posted on 05/31/2002 7:47:02 AM PDT by Blood of Tyrants
[ Post Reply | Private Reply | To 9 | View Replies ]

To: elfman2
I agree clear text beal type coding is excellent and nearly impossible to break. I bet they are using the koran or parts of it as a key. PGP, and xxxk computer bit is easy prey, just takes time and effort (but not that much).
15 posted on 05/31/2002 8:22:36 AM PDT by CJ Wolf
[ Post Reply | Private Reply | To 9 | View Replies ]

To: elfman2
brute force decryption and examination

ROFL. Brute force doesn't get you anywhere.

See http://senderek.de/security/secret-key.protection.html

But the point of this vote would be to ensure that anyone who used this security was a criminal just for doing so, whether or not they were hiding anything criminal. Or, as the page says about this very legislation:

The British Government has pushed the Regulations of Investigative Powers Act (RIPA) through legislation which provides for orders to disclose private encryption keys and threatens everyone served with those orders with two or even five years of jail who fails to comply with the demands. While some are still figuring out how far the powers provided by this act will reach - - - - the conditions under which orders may be served or surveilance devices can be installed seem pretty much stretchable - others begin to protest while other EU governments seem to show the political will to adopt this famous legislation. The unequivocal obligation to reveal your private communication by law is an effective method to tempt the uninformed public into not using cryptography to protect their privacy and to criminalize those who do.

(boldface mine)

Similarly, over here FBI can now get no-notification warrants to tap your keyboard; all the fancy crypto means nothing if you hand over your keys without knowing it. But that at least requires a warrant, which means they're not simply sitting back watching everyone at once but forced to identify wrongdoers first and then proving it (and best wishes to FBI, too, when they stick to this normal approach).

17 posted on 05/31/2002 8:35:40 AM PDT by No.6
[ Post Reply | Private Reply | To 9 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson