Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article


1 posted on 05/10/2009 5:43:05 PM PDT by A Navy Vet
[ Post Reply | Private Reply | View Replies ]


Navigation: use the links below to view more comments.
first 1-2021-31 next last
To: A Navy Vet; Neil E. Wright; Jim Robinson

FYI


2 posted on 05/10/2009 5:43:48 PM PDT by A Navy Vet (An Oath is Forever.)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: A Navy Vet

How about sitting down and writing them a snail mail letter?


3 posted on 05/10/2009 5:47:33 PM PDT by Tucker39 (I Tim. 1:15b " .....Christ Jesus came into the world to save sinners, of whom I am chief.")
[ Post Reply | Private Reply | To 1 | View Replies ]

To: A Navy Vet

PGP isn’t all that buggy but it does have a back door, as will most other publicly available encryption tools. Any cipher can be broken given enough computer time.

Likewise you could very well be a plant looking to make a list of who is interested in this stuff.


5 posted on 05/10/2009 5:51:51 PM PDT by driftdiver (I could eat it raw, but why do that when I have a fire.)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: A Navy Vet

If you can generate a truly random key - and get a copy to your partner, it is not decodable. It would have to be long enough to not repeat for a good while - easy if you’re just using text. Your text is simply exclusive Or’d with the key. The reverse is done on the other side. The only plaintext is the location where the key is to start for each message.

You could generate a random key via sampling the output of a “noise circuit”. Nope, not digital noise (pseudo random sequences) - those can be undone quite easily.

Others have had this thought. We’re going to need it in the upcoming fight with the Obamaloons.


6 posted on 05/10/2009 5:52:13 PM PDT by Da Coyote
[ Post Reply | Private Reply | To 1 | View Replies ]

To: A Navy Vet

I’ve used proxy servers before and encryption tools for my pc, but in the end, I have changed my Ip address on a couple of occasions which is not difficult. (No, I don’t do it on FR but when Dling “stuff”):)


7 posted on 05/10/2009 5:54:25 PM PDT by max americana
[ Post Reply | Private Reply | To 1 | View Replies ]

To: A Navy Vet

10 posted on 05/10/2009 5:56:05 PM PDT by VeniVidiVici (Sprechen sie Austrian? Happy Quatro de taco!)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: A Navy Vet

any program such as “hide it” or “stash it.” they scramble text messages within an image. probably easy to decrypt if “they” know where to look though. ;)


11 posted on 05/10/2009 5:56:21 PM PDT by robomatik
[ Post Reply | Private Reply | To 1 | View Replies ]

To: A Navy Vet

I would call a local reporter. If the news was important enough, a story would run the next day.


13 posted on 05/10/2009 6:00:06 PM PDT by GOPJ (If Nixon had been a Democrat, Woodward and Bernstein would have been Linda Tripp.)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: A Navy Vet

14 posted on 05/10/2009 6:00:32 PM PDT by mysterio
[ Post Reply | Private Reply | To 1 | View Replies ]

To: A Navy Vet

Basically anything on a PC (Windows, MAC, Linux) is not 100% secure.


15 posted on 05/10/2009 6:02:55 PM PDT by driftdiver (I could eat it raw, but why do that when I have a fire.)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: A Navy Vet

The trick is to make your message so unimportant that no one wants to know what you’re saying. There is no technology known that can capture every phone message to every number.


16 posted on 05/10/2009 6:03:23 PM PDT by count-your-change (You don't have be brilliant, not being stupid is enough.)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: A Navy Vet

17 posted on 05/10/2009 6:05:49 PM PDT by VeniVidiVici (Sprechen sie Austrian? Happy Quatro de taco!)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: A Navy Vet
carrier pigeon?
19 posted on 05/10/2009 6:07:10 PM PDT by smokingfrog ( Don't mess with the mockingbird! /\/\ http://tiny.cc/freepthis)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: A Navy Vet
You need to use GnuPG, it is free.

http://www.gnupg.org/

Once you get it, generate your personal key pair. Keep the private key on your computer, and don't give it to anyone (they don't need it.) But make your public key known to anyone you care about. Then other people can encrypt messages using your public key that only you, using your private key, can decrypt.

If you use Thunderbird for email then it has a plugin for GnuPG. If you use something else, or a webmail like Google, then you can decrypt just by copy and paste. Encrypted messages look like random text.

Here are some examples and instructions. But GnuPG has plenty of manuals, on the same Web site where you download it.

21 posted on 05/10/2009 6:08:39 PM PDT by Greysard
[ Post Reply | Private Reply | To 1 | View Replies ]

To: A Navy Vet
telepathy?

Even that can be hacked, but at least there is no evidence...

Maybe telepathy in code.
It'd be fun to watch the thought police decipher it! LOL

25 posted on 05/10/2009 6:11:23 PM PDT by 1_Rain_Drop
[ Post Reply | Private Reply | To 1 | View Replies ]

To: A Navy Vet
Bounce through multiple proxy servers, 3 should due to mask who you are.....This doesn't help who is receiving the message if they are being monitored....

All commercial encryption methods are already compromised by NSA.....

I'm a telecom engineer so that is why I know these things....we get a lot of fraud we need to trace....

27 posted on 05/10/2009 6:12:58 PM PDT by nevergore ("It could be that the purpose of my life is simply to serve as a warning to others.")
[ Post Reply | Private Reply | To 1 | View Replies ]

To: A Navy Vet

Fax!


28 posted on 05/10/2009 6:14:40 PM PDT by FReepapalooza (Joshua 3:4 ..."for ye have not passed this way heretofore.")
[ Post Reply | Private Reply | To 1 | View Replies ]

To: A Navy Vet
Correct, Ham can be intercepted, but a true code, as opposed to a cipher - what most people think is code - can be made virtually unbreakable without years of pattern analysis.

and you can change the code book faster than that.
Hundreds of codes would drive people trying to intercept you nuts.

Study up on codes and ciphers.

31 posted on 05/10/2009 6:16:31 PM PDT by bill1952 (Power is an illusion created between those with power - and those without)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: A Navy Vet

STU III ?


32 posted on 05/10/2009 6:16:50 PM PDT by Sylvester McMonkey McBean
[ Post Reply | Private Reply | To 1 | View Replies ]

To: A Navy Vet
Depending on how much info you need to exchange, steganography might help. Part of the appeal of steganography is that it isn't clear to an outside observer that what you are sending contains encoded information.
37 posted on 05/10/2009 6:22:31 PM PDT by Nervous Tick (Party? I don't have one anymore.)
[ Post Reply | Private Reply | To 1 | View Replies ]


Navigation: use the links below to view more comments.
first 1-2021-31 next last

Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson