Free Republic
Browse · Search
General/Chat
Topics · Post Article

The referenced article or the excerpt are from a Conde Nast source (cannot be posted to FR). Please use the link above to go to the original.
1 posted on 09/07/2013 2:44:34 AM PDT by markomalley
[ Post Reply | Private Reply | View Replies ]


To: markomalley
Consider all civilian crypto schemes broken - the only ones not broken are military ... Russian and Chinese military primarily. A lot of what makes a particular crypto scheme secure is the method and means of transmission. For instance - back in the day - Russian mil used a 4 channel PPM system.

I believe that channel 3 carried the timer signal, while channel one was for voice - usually used for maintenance and some times clear reading of one time 5 day pad code, while the 4th channel was high level encrypted data and voice.

All of that on a single carrier wave - which was complex to break out, however some guy who was a ham in civi life hand-wound copper coils which split the channels into discrete recordable signals.

With the Internet, there are other ways to hide data - like in images. But, that is found in military-like orgs not civi business and personal transactions.

Some guys like to prattle on about this or that distro, but that is all it amounts to - prattle. Each civi scheme is either already broken prior to public release or has built-in backdoors.

Only big mils have the will and money to make and brake secure crypto which only lasts for a while before come other mil breaks it. NSA does not spend major efforts and money on low priority crypto schemes. All traffic is graded according to particular classes - with business ranked just lower than mil air, with civi personal at the bottom.

2 posted on 09/07/2013 5:34:42 AM PDT by PIF (They came for me and mine ... now it is your turn ...)
[ Post Reply | Private Reply | To 1 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson