Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Meet the “Dark Mail Alliance” Planning to Keep the NSA Out of Your Inbox
Slate ^ | OCT. 30 2013 12:01 PM | Ryan Gallagher

Posted on 11/02/2013 6:19:49 PM PDT by SandwicheGuy

Email might be on the verge of a radical makeover. And the NSA is not going to like it.

On Wednesday, two American companies with a track record of offering encrypted private communications are set to join forces in an unprecedented bid to counter dragnet Internet spying. Some of the world’s top cryptographers are behind the secure communications provider Silent Circle,

(Excerpt) Read more at slate.com ...


TOPICS: Business/Economy; News/Current Events
KEYWORDS: darkmail; email; nsa; security
Where there is need, someone will supply it. The small group of colleagues who set up the first email accounts can hardly be faulted for not implementing security for chat among themselves. They were probably so ecstatic that email worked at all to think of security. This new method of email encryption fixes that lack, and is the way it has to be.
1 posted on 11/02/2013 6:19:50 PM PDT by SandwicheGuy
[ Post Reply | Private Reply | View Replies]

To: SandwicheGuy

I’m still waiting to hear about a StartMail account.


2 posted on 11/02/2013 6:22:53 PM PDT by null and void (I'm betting on an Obama Trifecta: A Nobel Peace Prize, an Impeachment, AND a War Crimes Trial...)
[ Post Reply | Private Reply | To 1 | View Replies]

To: SandwicheGuy; CodeToad; Joe Brower; Lazamataz
Lavabit was shut down for doing it.


3 posted on 11/02/2013 6:22:58 PM PDT by Travis McGee (www.EnemiesForeignAndDomestic.com)
[ Post Reply | Private Reply | To 1 | View Replies]

To: vette6387; mazda77; flat; unkus; gonzo; Nachum; justiceseeker93; overbore; freekitty; ...

PING


4 posted on 11/02/2013 6:28:13 PM PDT by ExTexasRedhead
[ Post Reply | Private Reply | To 1 | View Replies]

To: SandwicheGuy

bookmark


5 posted on 11/02/2013 6:29:33 PM PDT by dadfly
[ Post Reply | Private Reply | To 1 | View Replies]

To: SandwicheGuy

I seriously doubt the power elite will allow it


6 posted on 11/02/2013 6:33:41 PM PDT by drypowder
[ Post Reply | Private Reply | To 1 | View Replies]

To: drypowder
I seriously doubt the power elite will allow it

We are the power. When the time has come, it will happen.

7 posted on 11/02/2013 6:39:21 PM PDT by SandwicheGuy (*The butter acts as a lubricant and speeds up the CPU*ou)
[ Post Reply | Private Reply | To 6 | View Replies]

To: SandwicheGuy

Sort of related.

Seed entreprenours sought for the Isher Company.

First up, two items.

Aerial denial weapon. Will physically take down anything inside a perimeter cheaply, passively and undetectably.

Area denial weapon. Will deny access to any land area for hundreds of years or with an expiry date, all in the size of a cigarette box. No countermeasures with todays technology.


8 posted on 11/02/2013 6:45:11 PM PDT by Hardraade (http://junipersec.wordpress.com/2013/10/04/nicolae-hussein-obama/)
[ Post Reply | Private Reply | To 1 | View Replies]

To: SandwicheGuy

bump


9 posted on 11/02/2013 6:45:31 PM PDT by clintonh8r (Don't twerk me, Bro!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: SandwicheGuy

the feds leaned on the founder/prez of Lavabit and he was given an ultimatum: give up the cyrptokeys or fold. He folded. They’ll do the same to SC.


10 posted on 11/02/2013 7:00:44 PM PDT by max americana (fired liberals in our company last election, and I laughed while they cried (true story))
[ Post Reply | Private Reply | To 1 | View Replies]

To: max americana

From the article: “the secret keys generated to encrypt the communications will be ephemeral, meaning they are deleted after each exchange of messages.”

Meaning it’s public key and there are no encryption keys to give up. To break it the NSA or another attacker either has to be able to break the protocol without the key or mount a man-in-the-middle attack — feasible against particular targets, probably not feasible against the whole internet.


11 posted on 11/02/2013 7:12:02 PM PDT by The_Reader_David (And when they behead your own people in the wars which are to come, then you will know...)
[ Post Reply | Private Reply | To 10 | View Replies]

To: The_Reader_David
Meaning it’s public key and there are no encryption keys to give up. To break it the NSA or another attacker either has to be able to break the protocol without the key or mount a man-in-the-middle attack — feasible against particular targets, probably not feasible against the whole internet.

You got it. Good gauge, as my Marine buddy says.

12 posted on 11/02/2013 7:22:20 PM PDT by SandwicheGuy (*The butter acts as a lubricant and speeds up the CPU*ou)
[ Post Reply | Private Reply | To 11 | View Replies]

To: Hardraade

The tales I heard about artificial ionization shields required great power.

They were used in the Fauklands battle. We supplied the Brits from what I was told.

Cannot imagine a generator that is small and portable.


13 posted on 11/02/2013 7:24:26 PM PDT by Texas Fossil
[ Post Reply | Private Reply | To 8 | View Replies]

To: SandwicheGuy

Maybe they will create a truly private and protected product. But if they do, the NSA will offer the company a boat-load for ‘back doors’. The government has all the fiat money in the world.
Any company that does this has to be backed by governments that oppose US spying.


14 posted on 11/02/2013 7:27:16 PM PDT by grumpygresh (Democrats delenda est. New US economy: Fascism on top, Socialism on the bottom.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Texas Fossil

Nope. Passive. And cheap.

Just a matter of rearranging cutting edge tech ;).

The Brits didn’t have *anything* in the Falklands, getting themselves blown up by Exocets.


15 posted on 11/02/2013 7:30:14 PM PDT by Hardraade (http://junipersec.wordpress.com/2013/10/04/nicolae-hussein-obama/)
[ Post Reply | Private Reply | To 13 | View Replies]

To: Hardraade

Those are interesting products!

Watch your back.:-)


16 posted on 11/02/2013 7:30:52 PM PDT by Nervous Tick (Without GOD, men get what they deserve.)
[ Post Reply | Private Reply | To 8 | View Replies]

To: grumpygresh

When there is a need, someone will supply it. Drugs, money, sex, fast food... smile. This is a grass roots movement, like the Tea Party in a way. Our government stands in the way at the administration’s peril.


17 posted on 11/02/2013 7:33:10 PM PDT by SandwicheGuy (*The butter acts as a lubricant and speeds up the CPU*ou)
[ Post Reply | Private Reply | To 14 | View Replies]

To: Nervous Tick

Well, here’s the thing. Once the knowledge is out, they can be made by anyone, or the tech will accomodate that path, like with 3D printing.

No way of putting the genie back in the bottle, and I’ve decided it’s time for an open bottle. Would be nice if we could ride the genie to some profit, though.

And no worries, the knowledge is already distributed.


18 posted on 11/02/2013 7:38:53 PM PDT by Hardraade (http://junipersec.wordpress.com/2013/10/04/nicolae-hussein-obama/)
[ Post Reply | Private Reply | To 16 | View Replies]

To: Hardraade
Available soon at your nearest Weapons Shop.



19 posted on 11/02/2013 7:44:00 PM PDT by Tawiskaro
[ Post Reply | Private Reply | To 8 | View Replies]

To: grumpygresh
"Any company that does this has to be backed by governments that oppose US spying. "

Felix Dzerzhinsky comes to mind...

20 posted on 11/02/2013 7:48:26 PM PDT by SuperLuminal (Where is another agitator for republicanism like Sam Adams when we need him?)
[ Post Reply | Private Reply | To 14 | View Replies]

To: SandwicheGuy
Rock on, encryption folks. It's cat and mouse, bat and moth, forever.

The State has more/better armaments (firepower and legal) but is reluctant to use them against citizens in a way that paints the administration as the Bad Guys. This opens a small window in time in which one can act on something like this.

In a year it will become impossible. Move quickly, and know your contacts.

21 posted on 11/02/2013 7:49:20 PM PDT by dayglored (Listen, strange women lying in ponds distributing swords is...sounding pretty good about now.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: grumpygresh

If they do what they say they plan to do — make the project open source — there’s nowhere to hide the back doors, since every hacker and security expert in the world will be able to go over the code and find anything that isn’t implementing exactly the advertised public key encryption algorithm.


22 posted on 11/02/2013 7:50:03 PM PDT by The_Reader_David (And when they behead your own people in the wars which are to come, then you will know...)
[ Post Reply | Private Reply | To 14 | View Replies]

To: Hardraade

You mean....something the size of a cigarette box that will stop...what? A person? A vehicle? And how? I admit confusion.


23 posted on 11/02/2013 7:53:35 PM PDT by hoagy62 ("Tyranny, like hell, is not easily conquered..."-Thomas Paine. 1776)
[ Post Reply | Private Reply | To 8 | View Replies]

To: Hardraade

>Once the knowledge is out, they can be made by anyone, or the tech will accomodate that path, like with 3D printing.

Yes, it’s just a matter of time. The Chinese invented gunpowder, and tried to keep it to themselves. How’d that work out?

Corollary: nuclear weapons. They heve existed for < 70 years. During that interval they have been used twice. How long will that degree of control last? Be prepared in the future for “routine” use of nuclear weapons, however long that takes and whatever “routine” comes to mean.

Finally, the technology certainly exists to build a cruise missile in your garage. Ref http://www.interestingprojects.com/cruisemissile/


24 posted on 11/02/2013 7:54:13 PM PDT by Nervous Tick (Without GOD, men get what they deserve.)
[ Post Reply | Private Reply | To 18 | View Replies]

To: hoagy62

Person or persons entering the area will die.


25 posted on 11/02/2013 7:56:33 PM PDT by Hardraade (http://junipersec.wordpress.com/2013/10/04/nicolae-hussein-obama/)
[ Post Reply | Private Reply | To 23 | View Replies]

To: Nervous Tick

Lol. The trick is to be ten to twenty to fifty years ahead of the curve.

Always doable.


26 posted on 11/02/2013 8:00:20 PM PDT by Hardraade (http://junipersec.wordpress.com/2013/10/04/nicolae-hussein-obama/)
[ Post Reply | Private Reply | To 24 | View Replies]

To: Hardraade

Intriguing. Will you be talking more about this, or this your one and only announcement? I’d very much like to hear more.


27 posted on 11/02/2013 9:30:24 PM PDT by Windflier (To anger a conservative, tell him a lie. To anger a liberal, tell him the truth.)
[ Post Reply | Private Reply | To 8 | View Replies]

To: Hardraade

Never said they did.

Report I got was we helped, by ending como to mainland.


28 posted on 11/02/2013 10:05:23 PM PDT by Texas Fossil
[ Post Reply | Private Reply | To 15 | View Replies]

To: SandwicheGuy

If I was NSA, I’d set up encryption companies. And encrypted internet companies. And secure communications companies.

Saves me the trouble of having to go find people who need to be encrypted. They find me. And pay me.

If you need to be encrypted from your competitors, its one thing. If you need to be encrypted from the US government, you have to assume they are reading everything you type and hearing every word you say, encrypted or not.

Maybe its time to just relocate your headquarters and your servers out of the US geographic space. And if they are interested in you, you still have to assume they read every line and hear every word. So the most important thing is to make yourself exceedingly uninteresting.


29 posted on 11/02/2013 10:16:51 PM PDT by marron
[ Post Reply | Private Reply | To 1 | View Replies]

To: marron
If I was NSA, I’d set up encryption companies. And encrypted internet companies. And secure communications companies.

Saves me the trouble of having to go find people who need to be encrypted. They find me. And pay me.

Now THAT is a textbook example of thinking out of the box! Hmmm, if you think of it, could it already have been done? I'll bet it has.

30 posted on 11/03/2013 1:17:52 AM PDT by SandwicheGuy (*The butter acts as a lubricant and speeds up the CPU*ou)
[ Post Reply | Private Reply | To 29 | View Replies]

To: Windflier; MestaMachine

Oh, I will. Been doing this for many, many years and had some things stolen (by the Norwegian .mil, for example), and some things given away (TrackingPoint was neither first nor the most advanced, there was a better item back in aroound 2000 that was given away to another military). There’s a few entries on our blog about over the edge tech.

But as I said: now is the time we really need *stuff*.


31 posted on 11/03/2013 1:41:20 AM PDT by Hardraade (http://junipersec.wordpress.com/2013/10/04/nicolae-hussein-obama/)
[ Post Reply | Private Reply | To 27 | View Replies]

To: Hardraade
The next power grab is control of food production... genetically modified organisms.

GMObama

32 posted on 11/03/2013 1:44:49 AM PDT by Sir Francis Dashwood ("Arjuna, why have you have dropped your bow???")
[ Post Reply | Private Reply | To 8 | View Replies]

To: Sir Francis Dashwood

GMO is just a hook, and easy enough to avoid.


33 posted on 11/03/2013 2:05:25 AM PST by Hardraade (http://junipersec.wordpress.com/2013/10/04/nicolae-hussein-obama/)
[ Post Reply | Private Reply | To 32 | View Replies]

To: Hardraade

It is biological warfare...


34 posted on 11/03/2013 2:30:20 AM PST by Sir Francis Dashwood ("Arjuna, why have you have dropped your bow???")
[ Post Reply | Private Reply | To 33 | View Replies]

To: SandwicheGuy

I “understand” why this has become necessary, BUT....for $9.95 a month, we’ll hide your terrorist chatter from the NSA.

Besides, noting is unhackable and I’m sure the NSA has white, gray and black hats lined up to take a stab at this


35 posted on 11/03/2013 4:09:05 AM PST by Farnsworth (Now playing in America: "Stupid is the new normal")
[ Post Reply | Private Reply | To 1 | View Replies]

To: The_Reader_David

” probably not feasible against the whole internet.”

What if the NSA has taps on the entire Internet?


36 posted on 11/03/2013 5:55:33 AM PST by CodeToad (Liberals are bloodsucking ticks. We need to light the matchstick to burn them off. -786 +969)
[ Post Reply | Private Reply | To 11 | View Replies]

To: CodeToad

Sure, they could in practice *tap* the whole internet, but a man-in-the-middle attack is active, it means spoofing the encryption procedures to both parties of the communication. But if everyone were communicating with a public key scheme they couldn’t break computationally, to mount a man-in-the-middle attack on the whole internet, they would need to have processing power sufficient to simultaneously do the key agreement protocols with two parites, decrypt and re-encrypt every message. Massive though their resources are, they don’t have the computing power to do that. They’d need to actually pick targets on which to mount m-i-m attacks.


37 posted on 11/03/2013 6:34:39 AM PST by The_Reader_David (And when they behead your own people in the wars which are to come, then you will know...)
[ Post Reply | Private Reply | To 36 | View Replies]

To: The_Reader_David

“they couldn’t break computationally,”
“Massive though their resources are, they don’t have the computing power to do that. “

I wouldn’t be so hasty as to say that. First, not everyone will use such a system. Second, for the very few that do, they’ve got all the computing and crypto power they need.


38 posted on 11/03/2013 6:56:17 AM PST by CodeToad (Liberals are bloodsucking ticks. We need to light the matchstick to burn them off. -786 +969)
[ Post Reply | Private Reply | To 37 | View Replies]

To: ExTexasRedhead

Would like this.


39 posted on 11/03/2013 7:06:14 AM PST by freekitty (Give me back my conservative vote; then find me a real conservative to vote for)
[ Post Reply | Private Reply | To 4 | View Replies]

To: Travis McGee

NSA’s Jewish Spy Masters
Brother Nathanael

https://www.youtube.com/watch?v=vsAIG9W3iE4


40 posted on 11/03/2013 8:59:37 AM PST by Sir Francis Dashwood ("Arjuna, why have you have dropped your bow???")
[ Post Reply | Private Reply | To 3 | View Replies]

To: Farnsworth; dayglored
Besides, noting is unhackable and I’m sure the NSA has white, gray and black hats lined up to take a stab at this

As was noted earlier by FReeper dayglored, it is a cat and mouse game. Or like a lock, it keeps honest folk out, and most petty thieves will find easier pickings. But you have enough interest, like a rogue government agency, or high value, like some art galleries... Well, the experts come out. Ninety-nine point fourty-four out of a hundred people never have a concern.

41 posted on 11/03/2013 2:10:23 PM PST by SandwicheGuy (*The butter acts as a lubricant and speeds up the CPU*ou)
[ Post Reply | Private Reply | To 35 | View Replies]

To: CodeToad

Well then, we’ll just need to see to it that end-to-end public-key encryption for e-mail becomes the de facto standard.

In the meantime, I’m hoping someone makes an improvement on ScareMail, that instead of appending pseudo-English text full of words selected from the DHS keyword list, appends the text, “If you were expecting an encrypted message from me, it is in the first attachment,” to every e-mail, automatically creates a first attachment with at random an encrypted version of a file from a user-specified folder, an encrypted message about the Fourth Amendment, or a file of random bits (with the encryption chosen at random from a selection of different algorithms with a (pseudo-)random key for the first two options), then allows the user to substitute a real encrypted message if he wants.

If I had modern coding skills I’d work on it myself, but I don’t think an app programmed in Fortran, Pascal or LISP would cut it these days.


42 posted on 11/04/2013 7:04:30 AM PST by The_Reader_David (And when they behead your own people in the wars which are to come, then you will know...)
[ Post Reply | Private Reply | To 38 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson