What is the best one for computer security, anonymity?
|
||||||||||||||||||||||||||||||||||||||
What is the best one for computer security, anonymity?
(Response is not meant to diminish HOP's message, as the message is a good one and you need to be aware)
The thing that was "cracked" was the 2G GSM protocol encryption. In 2009, it was what most calls used in the US. Now, most calls use 3G technology, with a fallback to 2G in areas without 3G coverage, so most calls today (2012) will be using an enhanced 128 bit scheme, which pushes the bar out a little. Still something to keep on the radar as that will eventually be cracked as well.
-
• formerly known as "eguns-com"
• M4Carbine required notice/disclaimer: I run eguns.com
•eguns.com has not been actively promoted in a long time though I still do Dillon special
orders, etc. and I have random left over inventory.
•"eguns.com" domain name for sale (not the webstore). Serious enquiries only.
I just have one question.
Are you typing the word "encryption" like a teenage girl (enCrypTion) and adding the underscores (_) because you're worried that "they" will lock onto a keyword and track you or something?
Or are you just doing a bit of wordplay / onomableva (an unofficial term for words that look like what they mean)?
I hope and assume it's the second one but I'm curious.
ETA: I'm not saying encryption isn't a good idea, especially with recent judicial precedents regarding warrentless inspection and surveillance. I'm just curious how deep your suspicion runs.
Last edited by a0cake; 06-20-12 at 17:27.
How about something with specs of:
•AES 256 bit
•Elliptic Curve Diffie-Hellman 571 bit key generation protocol
•256 bit keys generated by the user or through KMS
•Algorithm AES256, SHA2, RDNG, DH compliant to FIPS specifications
•Smartcard certified CC EAL5+
•Tamper-proof module for secure storage of keys, algorithms and contacts
"The security encryption is performed with AES 256 algorithm executed on the hardware by SlingSecure® SecurCard and the keys are generated with Elliptic Curve Diffie-Hellman 571 bit protocol. Keys are created at the beginning of each call and destroyed at the end of it each call.
User-defined shared keys can also be used, either in place of the dynamic keys or in combination with them.
The algorithms of the SlingSecure® SecurCard are certified for the highest security standards.
SMS text messages are encrypted using the AES256 algorithm with keys generated by the Diffie-Hellman protocol during the first encrypted call to the contact. These keys are associated to the contact and remain in use until the next encrypted call generates a new pair of keys.
Sling Secure SecurCard can be used worldwide provided that GSM/UMTS/Wi-Fi/Sat network is available."
I won't pretend I know the significance of all the above, but I can put people in touch with someone who can confirm and answer Qs on the above, etc. if interested. See:
http://absolutesecrecy.com/
They make products for phone and comps.
For details, contact Dave at:
Dave@absolutesecrecy.com for additional details, tell him I sent you.
- Will
General Performance/Fitness Advice for all
www.BrinkZone.com
“Those who do not view armed self defense as a basic human right, ignore the mass graves of those who died on their knees at the hands of tyrants.”
Interesting stuff if you have a Droid:
http://www.whispersys.com/
Moxie Marlinspike is the geek behind this company. If you are also a geek, that should interest you.
"Intelligence is not the ability to regurgitate information. It is the ability to make sound decisions on a consistent basis "--me
"Just remember, when you are talking to the average person, you are talking to a television set"--RDJB
One Big Ass Mistake America
I use things like this because **** you, that's why, not because I have anything to hide - except for business, where the money is there for the threat to be very real.
The real problem now is that now that EVERYTHING going across the net can and is being saved, something that is unbreakable now probably will be readable at some point in the future, so all they have to do is store it until whatever system you used to encrypt it is crackable. That's a game changer. And it pisses me off that anyone thinks they have the right to read my private correspondence just in case I might be planning something. **** you, Department of Pre-crime.
And just wait - all these "I lost all my guns in a tragic boating accident" guys are going to be really surprised when the hammer finally falls and the PTB produce audio of their phone calls from 10 years prior where they are talking about where they hid their shit.
This right here has really been my question since I read this thread yesterday.
What does it really matter whether you use encryption or not? If they want to read something that you wrote, they will at some point break the encryption/code and you'll be an open book anyway. Why go through the trouble?
Bookmarks