Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Leaked NSA Doc Says It Can Collect And Keep Your Encrypted Data
Forbes ^

Posted on 06/20/2013 8:48:59 PM PDT by chessplayer

...The simple fact that the data is encrypted and that the NSA wants to crack it may be enough to let the agency keep it indefinitely.

...In other words, privacy advocates may be facing a nasty Catch-22: Fail to encrypt your communications, and they’re vulnerable to any eavesdropper’s surveillance. But encrypt them, and they become legally subject to eavesdropping by the most powerful surveillance agency in the world.

(Excerpt) Read more at forbes.com ...


TOPICS: News/Current Events
KEYWORDS: benghazi; fastandfurious; impeachnow; irs; nsaleak; nsawhistleblower; russelltice; russtice
Navigation: use the links below to view more comments.
first 1-2021-22 next last

1 posted on 06/20/2013 8:48:59 PM PDT by chessplayer
[ Post Reply | Private Reply | View Replies]

To: chessplayer

Tired of their leaks. Isn’t it time we leaked on them?


2 posted on 06/20/2013 8:54:54 PM PDT by schm0e ("we are in the midst of a coup.")
[ Post Reply | Private Reply | To 1 | View Replies]

To: chessplayer

It curiouser and curiouser. Big Brother goes through the looking glass.


3 posted on 06/20/2013 8:55:39 PM PDT by metafugitive
[ Post Reply | Private Reply | To 1 | View Replies]

To: chessplayer

Generate a truly random file, encrypt it, and send it. Make your “random” files much more frequent than your data files.

Won’t stop them, but will slow them down as they try to “crack” randomness.


4 posted on 06/20/2013 8:56:01 PM PDT by DBrow
[ Post Reply | Private Reply | To 1 | View Replies]

To: DBrow
Won’t stop them, but will slow them down as they try to “crack” randomness.

LOL -- That's a amusing idea.

5 posted on 06/20/2013 8:59:31 PM PDT by OneWingedShark (Q: Why am I here? A: To do Justly, to love mercy, and to walk humbly with my God.)
[ Post Reply | Private Reply | To 4 | View Replies]

To: chessplayer

PGP or stega.


6 posted on 06/20/2013 9:03:10 PM PDT by RockyTx
[ Post Reply | Private Reply | To 1 | View Replies]

To: DBrow

“This bill is an abomination!” said Rep. Gwen Moore, D-WI.

Trying to interpret her statement is harder than ‘cracking’ randomness.


7 posted on 06/20/2013 9:05:00 PM PDT by Scrambler Bob ( Concerning bo -- that refers to the president. If I capitalize it, I mean the dog.)
[ Post Reply | Private Reply | To 4 | View Replies]

To: chessplayer

Well, can I obtain and keep 0mama’s stash?


8 posted on 06/20/2013 9:07:32 PM PDT by Paladin2 (;-))
[ Post Reply | Private Reply | To 1 | View Replies]

To: Paladin2

9 posted on 06/20/2013 9:10:03 PM PDT by Paladin2 (;-))
[ Post Reply | Private Reply | To 8 | View Replies]

To: DBrow
Generate a truly random file, encrypt it, and send it. Make your “random” files much more frequent than your data files. Won’t stop them, but will slow them down as they try to “crack” randomness.

Do it again and again. Have everyone you know do it again and again.

Suddenly we have a stimulus program that puts people back to work in high tech, high paying jobs. Whether Utah is big enough state to warehouse all the metadata may be problematic. There is some hope and change I can believe in.

10 posted on 06/20/2013 9:10:17 PM PDT by metafugitive
[ Post Reply | Private Reply | To 4 | View Replies]

To: DBrow

They can keep it, but they might have to hang on to it for a while...it doesn’t take much to encrypt something that would take all of the computing power on Earth the remainder of time and all the ergs of energy in the universe to decrypt - unless they get something real out of quantum computing.


11 posted on 06/20/2013 9:34:59 PM PDT by The Antiyuppie ("When small men cast long shadows, then it is very late in the day.")
[ Post Reply | Private Reply | To 4 | View Replies]

To: chessplayer

Well, if the NSA says so it’s settled. No need to ponder this any longer.

In other news, Jeoffrey Dahlmer says human flesh is okay to eat.


12 posted on 06/20/2013 9:38:11 PM PDT by DoughtyOne (Kennedy: Today I am a Berliner / Reagan: Gorbachev tear down this wall / Obama: I can't read this...)
[ Post Reply | Private Reply | To 1 | View Replies]

To: DBrow
Generate a truly random file, encrypt it, and send it. Make your “random” files much more frequent than your data files.

Won’t stop them, but will slow them down as they try to “crack” randomness.

Nothing is truly uncrackable, but given the fact that data is sent in packets over the Internet, there is a way to make it extremely difficult to do.

Basically, you need to have a "scratch pad" - for one time only use.

Here is how it works:

1. Both the sender and receiver initally have to have each other's encryption keys.

2. When sending a file, the sender's encryption program includes a new randomly-generated 128-bit encryption key with each packet [along with the data]. 256-bit encryption keys are even better.

3. The new encryption key tells the receiver's encryption program what the new key is for the NEXT packet.

4. This process continues until the entire file is sent.

While not truly uncrackable, the NSA would have to decrypt on a pack-by-packet basis. MAJOR HEADACHE !!!

13 posted on 06/20/2013 9:59:50 PM PDT by Lmo56 (If ya wanna run with the big dawgs - ya gotta learn to piss in the tall grass ...)
[ Post Reply | Private Reply | To 4 | View Replies]

To: chessplayer

Anyone remember the old usenet days? 1993 or so? It seemed a regular occurrence that a thread would start about this key or that. PGP as I recall was a favorite. It would never take long before some newcomer who seemed to know a hell of a lot about encryption and would assure everyone their stuff was private. I tried to tell folks back then that if the NSA was the source of their code they didn’t have to “crack it”. As the old saw goes, the only way three folks can keep a secret is if two of em are dead.


14 posted on 06/20/2013 10:18:43 PM PDT by wastoute (Government cannot redistribute wealth. Government can only redistribute poverty.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: chessplayer
"In other words, [bureaucrats] may be facing a nasty Catch-22: Fail to [decrypt] your communications, and they’re vulnerable to [loss of vanity.] But [decrypt] them, and [the high costs will help to speed us toward smaller government by way of default.]"


15 posted on 06/21/2013 12:42:03 AM PDT by familyop (We Baby Boomers are croaking in an avalanche of rotten politics smelled around the planet.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: chessplayer

Interesting. How many people will encrypt garbage and send it back and forth with friends?


16 posted on 06/21/2013 12:58:50 AM PDT by familyop (We Baby Boomers are croaking in an avalanche of rotten politics smelled around the planet.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: DBrow
I typically use GPG the encrypt things like web pages, poems random blocks of text. My friends and I periodically sent these to each other just to give the government scum something to do, and BTW GPG if you use the larger key sizes is unbreakable even by the NSA. That is why the government HATES GPG and its commercial twin PGP. They want full access to everything you do, but don't want you to have access to anything they do. Seems to me that defines a slave/master relationship rather than a citizen and "government of the people" relationship. I also routinely encrypt anything of a non-trivial financial nature that I send via email. I'll send clear "I paid $13 for a new shirt at Penny's" But I'll encrypt something like "I sold 1500 shares of XYZ at $120."

I strongly recommend everyone download GPG now before the government forces them to install a backdoor. thank God for the Bill of Rights even if the government regards it as a minor historical triviality and doesn't let it get in the way of their ongoing goal to rule every aspect of our lives.

17 posted on 06/21/2013 3:47:59 AM PDT by from occupied ga (Your government is your most dangerous enemy)
[ Post Reply | Private Reply | To 4 | View Replies]

To: from occupied ga

How many of your friends play this little game? I’ve been banging the encryption drum with respect to email for years to little effect. Nearly all of my friends are technical and none of them want to bother with encryption in the slightest. That makes the use of encryption really stand out. And if the person on the other end won’t play, well...

Unencrypted email has all of the privacy of a postcard. Anybody who has access to any of the many machines that handle the mail can read it with ease.


18 posted on 06/21/2013 4:21:17 AM PDT by Mycroft Holmes (<= Mash name for HTML Xampp PHP C JavaScript primer. Programming for everyone.)
[ Post Reply | Private Reply | To 17 | View Replies]

To: DBrow
Generate a truly random file, encrypt it, and send it. Make your “random” files much more frequent than your data files. Won’t stop them, but will slow them down as they try to “crack” randomness.

Heck - generate lots of them of various sizes. Encrypt them with one algorithm, re-encrypt them with another, using 20 character randomized strong passwords for each ... do it about 5 times to keep them really busy.

19 posted on 06/21/2013 4:38:54 AM PDT by trebb (Where in the the hell has my country gone?)
[ Post Reply | Private Reply | To 4 | View Replies]

To: Mycroft Holmes

Three with two more on rare occasions Like anything interest waxes and wanes depending on boredom levels


20 posted on 06/21/2013 5:01:16 AM PDT by from occupied ga (Your government is your most dangerous enemy)
[ Post Reply | Private Reply | To 18 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-22 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson