Posted on 11/02/2013 6:19:49 PM PDT by SandwicheGuy
Email might be on the verge of a radical makeover. And the NSA is not going to like it.
On Wednesday, two American companies with a track record of offering encrypted private communications are set to join forces in an unprecedented bid to counter dragnet Internet spying. Some of the worlds top cryptographers are behind the secure communications provider Silent Circle,
(Excerpt) Read more at slate.com ...
The State has more/better armaments (firepower and legal) but is reluctant to use them against citizens in a way that paints the administration as the Bad Guys. This opens a small window in time in which one can act on something like this.
In a year it will become impossible. Move quickly, and know your contacts.
If they do what they say they plan to do — make the project open source — there’s nowhere to hide the back doors, since every hacker and security expert in the world will be able to go over the code and find anything that isn’t implementing exactly the advertised public key encryption algorithm.
You mean....something the size of a cigarette box that will stop...what? A person? A vehicle? And how? I admit confusion.
>Once the knowledge is out, they can be made by anyone, or the tech will accomodate that path, like with 3D printing.
Yes, it’s just a matter of time. The Chinese invented gunpowder, and tried to keep it to themselves. How’d that work out?
Corollary: nuclear weapons. They heve existed for < 70 years. During that interval they have been used twice. How long will that degree of control last? Be prepared in the future for “routine” use of nuclear weapons, however long that takes and whatever “routine” comes to mean.
Finally, the technology certainly exists to build a cruise missile in your garage. Ref http://www.interestingprojects.com/cruisemissile/
Person or persons entering the area will die.
Lol. The trick is to be ten to twenty to fifty years ahead of the curve.
Always doable.
Intriguing. Will you be talking more about this, or this your one and only announcement? I’d very much like to hear more.
Never said they did.
Report I got was we helped, by ending como to mainland.
If I was NSA, I’d set up encryption companies. And encrypted internet companies. And secure communications companies.
Saves me the trouble of having to go find people who need to be encrypted. They find me. And pay me.
If you need to be encrypted from your competitors, its one thing. If you need to be encrypted from the US government, you have to assume they are reading everything you type and hearing every word you say, encrypted or not.
Maybe its time to just relocate your headquarters and your servers out of the US geographic space. And if they are interested in you, you still have to assume they read every line and hear every word. So the most important thing is to make yourself exceedingly uninteresting.
Saves me the trouble of having to go find people who need to be encrypted. They find me. And pay me.
Now THAT is a textbook example of thinking out of the box! Hmmm, if you think of it, could it already have been done? I'll bet it has.
Oh, I will. Been doing this for many, many years and had some things stolen (by the Norwegian .mil, for example), and some things given away (TrackingPoint was neither first nor the most advanced, there was a better item back in aroound 2000 that was given away to another military). There’s a few entries on our blog about over the edge tech.
But as I said: now is the time we really need *stuff*.
GMObama
GMO is just a hook, and easy enough to avoid.
It is biological warfare...
I “understand” why this has become necessary, BUT....for $9.95 a month, we’ll hide your terrorist chatter from the NSA.
Besides, noting is unhackable and I’m sure the NSA has white, gray and black hats lined up to take a stab at this
” probably not feasible against the whole internet.”
What if the NSA has taps on the entire Internet?
Sure, they could in practice *tap* the whole internet, but a man-in-the-middle attack is active, it means spoofing the encryption procedures to both parties of the communication. But if everyone were communicating with a public key scheme they couldn’t break computationally, to mount a man-in-the-middle attack on the whole internet, they would need to have processing power sufficient to simultaneously do the key agreement protocols with two parites, decrypt and re-encrypt every message. Massive though their resources are, they don’t have the computing power to do that. They’d need to actually pick targets on which to mount m-i-m attacks.
“they couldnt break computationally,”
“Massive though their resources are, they dont have the computing power to do that. “
I wouldn’t be so hasty as to say that. First, not everyone will use such a system. Second, for the very few that do, they’ve got all the computing and crypto power they need.
Would like this.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.