Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article

Skip to comments.

PRIVACY: HOW TO COMMUNICATE?
self ^ | 5/10/09 | A Navy Vet

Posted on 05/10/2009 5:43:05 PM PDT by A Navy Vet

With the ever encroaching Fedgov looking in and trying to control our personal lives, I'm looking for way that Americans can still communicate privately.

I understand that any answers given on this public forum, may alert the various gov agencies to a new work-around. I'm hoping someone can provide a fool proof answer even on this public board.

Internet e-mail and forums are easily compromised (ISP's easliy traceable); phone conversations, well, we all know about taps; Ham radio can be intercepted; CB radio the same. And no, face to face comms and devised codes are not the answer I'm looking for - too cumbersome and too slow. Same as snail-mail.

Although there are a few encrypted Internet programs out there such as PGP phone, that particular one is buggy depending on your computer setup (power, memory, firewalls, anti-virus, etc.).

Is anyone aware of any other encrypted Internet programs that the average person doesn't need an expensive doomsday program and a $10,000 server that will simply facilitate privacy? If not Internet, how can anyone possibly have a private conversation? What am I missing...???


TOPICS: Computers/Internet; Education; Miscellaneous
KEYWORDS: communication; privacy
Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-80 ... 101-113 next last
To: A Navy Vet
You need to use GnuPG, it is free.

http://www.gnupg.org/

Once you get it, generate your personal key pair. Keep the private key on your computer, and don't give it to anyone (they don't need it.) But make your public key known to anyone you care about. Then other people can encrypt messages using your public key that only you, using your private key, can decrypt.

If you use Thunderbird for email then it has a plugin for GnuPG. If you use something else, or a webmail like Google, then you can decrypt just by copy and paste. Encrypted messages look like random text.

Here are some examples and instructions. But GnuPG has plenty of manuals, on the same Web site where you download it.

21 posted on 05/10/2009 6:08:39 PM PDT by Greysard
[ Post Reply | Private Reply | To 1 | View Replies]

To: driftdiver; Jim Robinson; Neil E. Wright
"PGP isn’t all that buggy but it does have a back door, as will most other publicly available encryption tools. Any cipher can be broken given enough computer time."

PGP was buggy for me, but if it has a "back door", then it's usless.

So your point is that "most...publicly available encryption tools" that are not easily decrypted are expensive? Do I have that correct? If so, what would be the cost of a safe private encryption program that takes time to break?

Likewise you could very well be a plant looking to make a list of who is interested in this stuff."

I knew that would be an immediate concern...good for you for questioning my intent so quickly. However, just ask the owner of this forum (JR)to verify my bona fides. I used to work with him in person, face to face, and we are still both members of a Veterans organization, although not as close as we used to be. But he knows who and what I'm about. Just send him a Freepmail or personal e-mail or call him at his forum number.

Again, I appreciate your response.

22 posted on 05/10/2009 6:08:42 PM PDT by A Navy Vet (An Oath is Forever.)
[ Post Reply | Private Reply | To 5 | View Replies]

To: VeniVidiVici

There are numerous software programs which understand morse code.


23 posted on 05/10/2009 6:09:25 PM PDT by driftdiver (I could eat it raw, but why do that when I have a fire.)
[ Post Reply | Private Reply | To 17 | View Replies]

To: A Navy Vet
What's wrong with a public conversation?

If this is not the End of Times, this socialistic movement will resolve itself...because the human love of freedom cannot be defeated.

Until and unless (this is), that is...The End of Times.

If Obama is really "The One" (i.e. the muslim messiah as proclaimed by Louie Farrakhan) and is supported by "supernatural forces"...well, normal expectations cannot be, er, expected.

The question is, of course, is Obama the one all of us have been awaiting.

Is he the Messiah to the hell bound and the Beast to worshipers of the One True God?

IMHO, the jury is still out...but, as time passes, the odds are increasing that Obama is the awaited One.

He certainly believes he is (and so do Oprah, Louie, et al).

In the end, we may be separated from our heads for speaking the Truth...but that shouldn't stop us from communicating!

Sounds like an honorable duty...bare your neck for your witness of Jesus!

Rev 20:4

"...and [I saw] the souls of them that were beheaded for the witness of Jesus, and for the word of God, and which had not worshipped the beast, neither his image, neither had received [his] mark upon their foreheads, or in their hands..."


24 posted on 05/10/2009 6:10:32 PM PDT by SonOfDarkSkies
[ Post Reply | Private Reply | To 2 | View Replies]

To: A Navy Vet
telepathy?

Even that can be hacked, but at least there is no evidence...

Maybe telepathy in code.
It'd be fun to watch the thought police decipher it! LOL

25 posted on 05/10/2009 6:11:23 PM PDT by 1_Rain_Drop
[ Post Reply | Private Reply | To 1 | View Replies]

To: driftdiver
There are numerous software programs which understand morse code

LOL! Ok. Tell me what that says.

26 posted on 05/10/2009 6:12:42 PM PDT by VeniVidiVici (Sprechen sie Austrian? Happy Quatro de taco!)
[ Post Reply | Private Reply | To 23 | View Replies]

To: A Navy Vet
Bounce through multiple proxy servers, 3 should due to mask who you are.....This doesn't help who is receiving the message if they are being monitored....

All commercial encryption methods are already compromised by NSA.....

I'm a telecom engineer so that is why I know these things....we get a lot of fraud we need to trace....

27 posted on 05/10/2009 6:12:58 PM PDT by nevergore ("It could be that the purpose of my life is simply to serve as a warning to others.")
[ Post Reply | Private Reply | To 1 | View Replies]

To: A Navy Vet

Fax!


28 posted on 05/10/2009 6:14:40 PM PDT by FReepapalooza (Joshua 3:4 ..."for ye have not passed this way heretofore.")
[ Post Reply | Private Reply | To 1 | View Replies]

To: Da Coyote
Not sure I understand all you said, but it sounds like a cipher with a keyword. Those can be broken if the wrong people get the keyword. But then, I may not get your entire concept. I will forward this to a friend.

And yes, you get my drift, as I'm sure the Fed agencies do also after reading this. However, we still have the 1st Amendment right to speak in privacy. Thank you for your input.

29 posted on 05/10/2009 6:15:08 PM PDT by A Navy Vet (An Oath is Forever.)
[ Post Reply | Private Reply | To 6 | View Replies]

To: neal1960

Killing me!


30 posted on 05/10/2009 6:15:52 PM PDT by A Navy Vet (An Oath is Forever.)
[ Post Reply | Private Reply | To 8 | View Replies]

To: A Navy Vet
Correct, Ham can be intercepted, but a true code, as opposed to a cipher - what most people think is code - can be made virtually unbreakable without years of pattern analysis.

and you can change the code book faster than that.
Hundreds of codes would drive people trying to intercept you nuts.

Study up on codes and ciphers.

31 posted on 05/10/2009 6:16:31 PM PDT by bill1952 (Power is an illusion created between those with power - and those without)
[ Post Reply | Private Reply | To 1 | View Replies]

To: A Navy Vet

STU III ?


32 posted on 05/10/2009 6:16:50 PM PDT by Sylvester McMonkey McBean
[ Post Reply | Private Reply | To 1 | View Replies]

To: GOPJ
As I mentioned above, "snail mail" is too slow.

"Why would snail mail be too slow? Flesh out the scenario some..."

I have. Sometimes people need immediate comms. Maybe I missing something in your "scenario".

33 posted on 05/10/2009 6:17:58 PM PDT by A Navy Vet (An Oath is Forever.)
[ Post Reply | Private Reply | To 9 | View Replies]

To: bill1952; driftdiver
Correct, Ham can be intercepted, but a true code, as opposed to a cipher - what most people think is code - can be made virtually unbreakable without years of pattern analysis.

Thank you.

One time pad with a random key generator. Drop back 100 years and punt. Would drive them nuts.

34 posted on 05/10/2009 6:19:39 PM PDT by VeniVidiVici (Sprechen sie Austrian? Happy Quatro de taco!)
[ Post Reply | Private Reply | To 31 | View Replies]

To: GOPJ
"I would call a local reporter. If the news was important enough, a story would run the next day."

That's all good for some circumstances and who knows if the liberal media would even bother to run it. Mostly, I'm talking about PRIVATE communications that we should have access to. Thanks.

35 posted on 05/10/2009 6:21:59 PM PDT by A Navy Vet (An Oath is Forever.)
[ Post Reply | Private Reply | To 13 | View Replies]

To: A Navy Vet

“So your point is that “most...publicly available encryption tools” that are not easily decrypted are expensive? Do I have that correct? If so, what would be the cost of a safe private encryption program that takes time to break?”

No, most (read all) publicly available encryption programs are fine for normal everyday use. PGP is pretty cheap and will defeat most anyone except the USG, Chinese, or Russians.

All (that I know of) programs are most likely compromised by the USG and have backdoors built into them that only USG can use. There have been numerous public stories about this. The govt does not like people having secrets they cannot access.

Straight encryption using random numbers is not that secure. Encryption algorithms are used in conjunction with a random number to make it much more difficult. The longer the key the more secure it will be. All currently known encryption algorithms have been broken. It can take a lot of processing power and time but then sometimes it won’t take all that long. I know several Chinese nationals who work at a major US bank that break 3DES encryption for fun.

“However, just ask the owner of this forum (JR)to verify my bona fides”

This is a public forum full of people DHS considers a threat because most of us are conservatives and don’t support the current administration.

As an aside the Chinese installed modified chips which were used in networking equipment. These chips provided them a hidden connection into any network using that equipment. The most well known was Cisco and the hardware ended up in major US companies and govt agencies.


36 posted on 05/10/2009 6:22:22 PM PDT by driftdiver (I could eat it raw, but why do that when I have a fire.)
[ Post Reply | Private Reply | To 22 | View Replies]

To: A Navy Vet
Depending on how much info you need to exchange, steganography might help. Part of the appeal of steganography is that it isn't clear to an outside observer that what you are sending contains encoded information.
37 posted on 05/10/2009 6:22:31 PM PDT by Nervous Tick (Party? I don't have one anymore.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: GOPJ

“I would call a local reporter. If the news was important enough, a story would run the next day.”

The press has never printed the truth in this story:

http://www.youtube.com/watch?v=oBpHSyuueMU


38 posted on 05/10/2009 6:23:15 PM PDT by BILL_C (Those who don't understand the lessons of history will repeat, repeat and repeat.)
[ Post Reply | Private Reply | To 13 | View Replies]

To: mysterio

Ha! Good one! But what if someone were to tap into the string? Sneaking out the window days would be over!


39 posted on 05/10/2009 6:23:34 PM PDT by A Navy Vet (An Oath is Forever.)
[ Post Reply | Private Reply | To 14 | View Replies]

To: VeniVidiVici

Its been a long time since I studied morse code and was never that good. This old guy who taught me could exceed 40 words per minute. He was one of those guys who used it for the rail roads in the early 1900’s.

As for that code, I don’t know what it says. I remember seeing it somewhere and know it was broken.

I think the only code that wasn’t broken was the Navajo Indians in WWII.


40 posted on 05/10/2009 6:25:25 PM PDT by driftdiver (I could eat it raw, but why do that when I have a fire.)
[ Post Reply | Private Reply | To 26 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-80 ... 101-113 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson