Howdy, Stranger!

It looks like you're new here. If you want to get involved, click one of these buttons!


Encryption isn't secure anymore? - Page 2
New on LowEndTalk? Please Register and read our Community Rules.

All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.

Encryption isn't secure anymore?

2»

Comments

  • c0yc0y Member
    edited September 2013

    @sman said:
    That's a nice shiny tin foil hat you have there.

    You're an idiot who has heard that word here and there and now abuse it in every post you make.

  • @sman you are an idiot who thinks that its government has the right to spy the whole world.

  • @sman said:
    Oh boy. This should keep the security porn addicts and tinfoil hat crowd occupied. If you are not doing anything highly illegal then I don't see why you should be concerned. They don't read anything they don't suspect of being big time bad guy stuff.

    If you are doing something highly illegal then I hope you believe all the hyperbole about it which causes a lot of sleepless nights and makes you consider a change of occupation.

    You're not looking at the big picture. Or maybe you're trolling. Either way, you're wrong (IMO). First, with respect to your 'highly illegal' qualification: in theory, it's sound...assuming there are adequate procedural safeguards in place to prevent the dissemination of data suggesting relatively benign criminal activity. But there's not. Second, with respect to 'they don't read anything they don't suspect...'. Erm, I'm not sure what you've read to inspire such confidence, but you're misinformed. The three-degrees of Kevin Bacon strategy they employ means that they invariably will reach material and persons that have nothing to do with "big time bad guy stuff."

    Again, the problem here isn't bad faith. I don't doubt that the analysts who have access to this data have anything but the best intentions. The problem is the inadequacy of the procedural safeguards. People naturally test the limits of their authority, particularly when that authority is critical to the public welfare. That's to say: IMO, it's not the NSA who's to blame; it's the legislators and FISA court that enabled them.

  • smansman Member
    edited September 2013

    @richardpwnsner said:
    Again, the problem here isn't bad faith. I don't doubt that the analysts who have access to this data have anything but the best intentions. The problem is the inadequacy of the procedural safeguards. People naturally test the limits of their authority, particularly when that authority is critical to the public welfare. That's to say: IMO, it's not the NSA who's to blame; it's the legislators and FISA court that enabled them.

    Maybe it's time you moved on to the whmcs source code conspiracy theory thread. I mean it's been like 48 hours already so time for a new shiny object for your outrage addiction.

  • nunimnunim Member
    edited September 2013

    I wonder if I can get back the $1.99 that I paid for an SSL cert :) The weakest link of the chain is still the part in between the chair and the keyboard.

  • GiulioGiulio Member
    edited September 2013

    @sman: have you ever read 1985 by George Orwell? Or do you just remember V for Vendetta?
    Total control is never something good.

  • MaouniqueMaounique Host Rep, Veteran

    Maybe 1984 ?

    @Giulio said:
    sman: have you ever read 1985 by George Orwell? Or do you just remember V for Vendetta?
    Total control is never something good.

    Thanked by 1ihatetonyy
  • smansman Member
    edited September 2013

    @Giulio said:
    sman: have you ever read 1985 by George Orwell? Or do you just remember V for Vendetta?
    Total control is never something good.

    You would have to be crazy sane not to worry about fictional book plots coming true.

  • @trexos said:
    What is your opinion?

    Without using quantum supercomputers, AFAIK, it's really hard to "break" symmetric key encryption using really long key.

    Don't get worried about that. If it were a mathematical work with theoretical proof of concept, I would be interested. Mass media 'hot news' are mostly junk.

  • ihatetonyyihatetonyy Member
    edited September 2013

    More out from Der Spiegel: http://www.spiegel.de/international/world/a-920971.html

    The documents also state that the NSA has succeeded in accessing the BlackBerry mail system, which is known to be very secure. This could mark a huge setback for the company, which has always claimed that its mail system is uncrackable.
    In response to questions from SPIEGEL, BlackBerry officials stated, "It is not for us to comment on media reports regarding alleged government surveillance of telecommunications traffic." The company said it had not programmed a "'back door' pipeline to our platform."
    
    The material viewed by SPIEGEL suggests that the spying on smart phones has not been a mass phenomenon. It has been targeted, in some cases in an individually tailored manner and without the knowledge of the smart phone companies.
  • typh0ntyph0n Member
    edited September 2013

    Encryption standards like AES and Blowfish are still secure. Just don't use encryptions like RC4. I guess the NSA puts more effort into breaking these old ones because they know that decrypting AES256 is mostly a waste of time. Trust the mathematics!

  • GiulioGiulio Member
    edited September 2013

    @Maounique said:
    Maybe 1984 ?

    Sorry man, mistyping from the phone

  • smansman Member
    edited September 2013

    @typh0n said:
    Encryption standards like AES and Blowfish are still secure. Just don't use encryptions like RC4. I guess the NSA puts more effort into breaking these old ones because they know that decrypting AES256 is mostly a waste of time. Trust the mathematics!

    No no, don't trust the math. Trust some people who make a living posting click bait on the internet and cannot balance their check book. Yes even the NYT is to blame for this hyperbole quite often. They know nobody will care after 24hrs when credible scientists disprove the story.

    You should not believe everything your read on the internet regardless of the source.

  • MaouniqueMaounique Host Rep, Veteran

    @sman said:
    You should not believe everything your read on the internet regardless of the source.

    You are right, I dont believe you.

    Thanked by 2c0y typh0n
  • This is an interesting thread in its own right, and I did not want to hijack it for my own purposes, so I started another thread. I am interested in learning more about the threats and mitigations from a VPS customer point of view, where the VPS provider may be untrusted. My thread is about tools, techniques, and risk management. If you are interested in the practical aspects of securing your customer VPS from your VPS provider, please join me there.

    http://lowendtalk.com/discussion/13275/securing-your-unmanaged-vps-vps-provider-threats-and-mitigations

  • @sman said:
    Maybe it's time you moved on to the whmcs source code conspiracy theory thread. I mean it's been like 48 hours already so time for a new shiny object for your outrage addiction.

    You're right. My post was insane. Clearly, my paranoid outrage got the better of me.

Sign In or Register to comment.