Page 2 of 5 FirstFirst 1234 ... LastLast
Results 11 to 20 of 49

Thread: Cell Phone eNcRyPtIoN

  1. #11
    Join Date
    Sep 2008
    Location
    Texas
    Posts
    1,316
    Feedback Score
    33 (100%)
    What is the best one for computer security, anonymity?

  2. #12
    Join Date
    Nov 2007
    Location
    Utah
    Posts
    8,685
    Feedback Score
    4 (100%)
    Quote Originally Posted by HOPLOETHOS View Post

    (Response is not meant to diminish HOP's message, as the message is a good one and you need to be aware)

    The thing that was "cracked" was the 2G GSM protocol encryption. In 2009, it was what most calls used in the US. Now, most calls use 3G technology, with a fallback to 2G in areas without 3G coverage, so most calls today (2012) will be using an enhanced 128 bit scheme, which pushes the bar out a little. Still something to keep on the radar as that will eventually be cracked as well.

    -
    • formerly known as "eguns-com"
    • M4Carbine required notice/disclaimer: I run eguns.com
    •eguns.com has not been actively promoted in a long time though I still do Dillon special
    orders, etc. and I have random left over inventory.
    •"eguns.com" domain name for sale (not the webstore). Serious enquiries only.

  3. #13
    Join Date
    Oct 2010
    Posts
    2,246
    Feedback Score
    5 (100%)
    I just have one question.

    Are you typing the word "encryption" like a teenage girl (enCrypTion) and adding the underscores (_) because you're worried that "they" will lock onto a keyword and track you or something?

    Or are you just doing a bit of wordplay / onomableva (an unofficial term for words that look like what they mean)?

    I hope and assume it's the second one but I'm curious.


    ETA: I'm not saying encryption isn't a good idea, especially with recent judicial precedents regarding warrentless inspection and surveillance. I'm just curious how deep your suspicion runs.
    Last edited by a0cake; 06-20-12 at 17:27.

  4. #14
    Join Date
    Feb 2009
    Location
    Florida
    Posts
    16,086
    Feedback Score
    5 (100%)
    Quote Originally Posted by chadbag View Post
    (Response is not meant to diminish HOP's message, as the message is a good one and you need to be aware)

    The thing that was "cracked" was the 2G GSM protocol encryption. In 2009, it was what most calls used in the US. Now, most calls use 3G technology, with a fallback to 2G in areas without 3G coverage, so most calls today (2012) will be using an enhanced 128 bit scheme, which pushes the bar out a little. Still something to keep on the radar as that will eventually be cracked as well.

    -
    How about something with specs of:

    •AES 256 bit
    •Elliptic Curve Diffie-Hellman 571 bit key generation protocol
    •256 bit keys generated by the user or through KMS
    •Algorithm AES256, SHA2, RDNG, DH compliant to FIPS specifications
    •Smartcard certified CC EAL5+
    •Tamper-proof module for secure storage of keys, algorithms and contacts

    "The security encryption is performed with AES 256 algorithm executed on the hardware by SlingSecure® SecurCard and the keys are generated with Elliptic Curve Diffie-Hellman 571 bit protocol. Keys are created at the beginning of each call and destroyed at the end of it each call.

    User-defined shared keys can also be used, either in place of the dynamic keys or in combination with them.

    The algorithms of the SlingSecure® SecurCard are certified for the highest security standards.

    SMS text messages are encrypted using the AES256 algorithm with keys generated by the Diffie-Hellman protocol during the first encrypted call to the contact. These keys are associated to the contact and remain in use until the next encrypted call generates a new pair of keys.

    Sling Secure SecurCard can be used worldwide provided that GSM/UMTS/Wi-Fi/Sat network is available.
    "


    I won't pretend I know the significance of all the above, but I can put people in touch with someone who can confirm and answer Qs on the above, etc. if interested. See:

    http://absolutesecrecy.com/

    They make products for phone and comps.

    For details, contact Dave at:

    Dave@absolutesecrecy.com for additional details, tell him I sent you.
    - Will

    General Performance/Fitness Advice for all

    www.BrinkZone.com


    “Those who do not view armed self defense as a basic human right, ignore the mass graves of those who died on their knees at the hands of tyrants.”

  5. #15
    Join Date
    Apr 2007
    Location
    Texas
    Posts
    10,888
    Feedback Score
    44 (100%)
    Interesting stuff if you have a Droid:

    http://www.whispersys.com/

    Moxie Marlinspike is the geek behind this company. If you are also a geek, that should interest you.

  6. #16
    Join Date
    Nov 2007
    Location
    US
    Posts
    2,707
    Feedback Score
    7 (100%)
    Quote Originally Posted by QuietShootr View Post
    You'd have to have a screw loose to use the Israeli one. Why bother, at that point.
    To true
    "Intelligence is not the ability to regurgitate information. It is the ability to make sound decisions on a consistent basis "--me

    "Just remember, when you are talking to the average person, you are talking to a television set"--RDJB

    One Big Ass Mistake America

  7. #17
    Join Date
    Aug 2010
    Posts
    11,706
    Feedback Score
    43 (100%)
    Quote Originally Posted by a0cake View Post
    I just have one question.

    Are you typing the word "encryption" like a teenage girl (enCrypTion) and adding the underscores (_) because you're worried that "they" will lock onto a keyword and track you or something?

    Or are you just doing a bit of wordplay / onomableva (an unofficial term for words that look like what they mean)?

    I hope and assume it's the second one but I'm curious.


    ETA: I'm not saying encryption isn't a good idea, especially with recent judicial precedents regarding warrentless inspection and surveillance. I'm just curious how deep your suspicion runs.
    So s1ll_Y!!!
    Why do the loudest do the least?

  8. #18
    Join Date
    Jul 2006
    Posts
    4,177
    Feedback Score
    3 (100%)
    I use things like this because **** you, that's why, not because I have anything to hide - except for business, where the money is there for the threat to be very real.

    The real problem now is that now that EVERYTHING going across the net can and is being saved, something that is unbreakable now probably will be readable at some point in the future, so all they have to do is store it until whatever system you used to encrypt it is crackable. That's a game changer. And it pisses me off that anyone thinks they have the right to read my private correspondence just in case I might be planning something. **** you, Department of Pre-crime.

    And just wait - all these "I lost all my guns in a tragic boating accident" guys are going to be really surprised when the hammer finally falls and the PTB produce audio of their phone calls from 10 years prior where they are talking about where they hid their shit.

  9. #19
    Join Date
    Dec 2010
    Location
    Texas
    Posts
    3,064
    Feedback Score
    37 (100%)
    Quote Originally Posted by QuietShootr View Post
    The real problem now is that now that EVERYTHING going across the net can and is being saved, something that is unbreakable now probably will be readable at some point in the future, so all they have to do is store it until whatever system you used to encrypt it is crackable. That's a game changer.
    This right here has really been my question since I read this thread yesterday.

    What does it really matter whether you use encryption or not? If they want to read something that you wrote, they will at some point break the encryption/code and you'll be an open book anyway. Why go through the trouble?

  10. #20
    Join Date
    Jul 2006
    Posts
    4,177
    Feedback Score
    3 (100%)
    Quote Originally Posted by Ironman8 View Post
    This right here has really been my question since I read this thread yesterday.

    What does it really matter whether you use encryption or not? If they want to read something that you wrote, they will at some point break the encryption/code and you'll be an open book anyway. Why go through the trouble?
    Because **** you, that's why. That's all.

Page 2 of 5 FirstFirst 1234 ... LastLast

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •