Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Big Secret Makes FBI's Anti-Encryption Campaign a Big Lie
The Intercept ^ | 28 Sep 2015 | Jenna McLaughlin

Posted on 09/29/2015 6:17:31 AM PDT by Izzy Dunne

click here to read article


Navigation: use the links below to view more comments.
first previous 1-2021-33 last
To: rarestia
If they’re capturing data before it’s distributed, encryption is not at play.

Exactly. So your statement "It would be impossible to “algorithmically constrain” something without decrypting it first. is not quite true, because they don't NEED to decrypt it, they can constrain it (as if) without it.

No big deal.

21 posted on 09/29/2015 8:12:00 AM PDT by Izzy Dunne (Hello, I'm a TAGLINE virus. Please help me spread by copying me into YOUR tag line.)
[ Post Reply | Private Reply | To 13 | View Replies]

To: ctdonath2
Just the fact you’re using advanced encryption & delivery indicates you’re of the few worth scrutinizing, which doing so in turn narrows down a great deal about whether & what you’re up to.

Which is why numbers matter. The more users of encryption, the less likely the things that really are private stand out.

That's why envelopes work. Everybody uses them (at least they used to), so you can't tell the love letters to the girlfriend from the cookie recipes from grandma.

22 posted on 09/29/2015 8:15:21 AM PDT by Izzy Dunne (Hello, I'm a TAGLINE virus. Please help me spread by copying me into YOUR tag line.)
[ Post Reply | Private Reply | To 19 | View Replies]

To: rarestia

“All the more reason everyone should bone up on at least basic encryption technologies. Learn how to secure your email communications. Learn how to encrypt your local computer(s). Learn how to encrypt data on a flash drive. Learn how to avoid detection on the Internet. “

None of which help if they have OS level access.


23 posted on 09/29/2015 8:59:36 AM PDT by driftdiver (I could eat it raw, but why do that when I have a fire.)
[ Post Reply | Private Reply | To 14 | View Replies]

To: rarestia

“I shouldn’t have to be concerned about a knock at my door at 2 AM for using cryptography to secure my network traffic.”

If the post office in 1776 had said, ‘everyone don’t seal you letters to well incase we want to read them’ the founding fathers would have tarred, feathered and then strung them up. But now the feds are saying just that.


24 posted on 09/29/2015 9:06:11 AM PDT by TalonDJ
[ Post Reply | Private Reply | To 20 | View Replies]

To: driftdiver

Out-of-the-box operating systems are natively secure. It’s the user who makes an OS insecure.


25 posted on 09/29/2015 9:31:10 AM PDT by rarestia (It's time to water the Tree of Liberty.)
[ Post Reply | Private Reply | To 23 | View Replies]

To: Izzy Dunne
That's why envelopes work. Everybody uses them (at least they used to), so you can't tell the love letters to the girlfriend from the cookie recipes from grandma.

Yup. I tried for many years to get people interested in actually encrypting their email, and found that very few people are willing to take the minimal effort to do so that it requires. It annoys me mightily that email clients don't make use of PGP/GPG implementations to be painless and transparent. I have the GPG plugin for Thunderbird in my email client, but too few people are prepared to deal with encrypted mail. I have a strong suspicion that the reason email clients don't implement it as a standard feature is due to government pressure.

26 posted on 09/29/2015 11:10:53 AM PDT by zeugma (Zaphod Beeblebrox for president! Or Cruz if Zaphod is unavailable.)
[ Post Reply | Private Reply | To 22 | View Replies]

To: rarestia

lol you must work for Microsoft

I run a security company. Nothing is secure out of the box. And what use is a damn OS if users can’t use it.


27 posted on 09/29/2015 11:21:47 AM PDT by driftdiver (I could eat it raw, but why do that when I have a fire.)
[ Post Reply | Private Reply | To 25 | View Replies]

To: zeugma

Anything that requires a user to press a ‘send secure’ instead of ‘send’ to encrypt it won’t be secure. Users make mistakes.

But I’d agree the govt is putting pressure on software companies to limit encryption.


28 posted on 09/29/2015 11:23:38 AM PDT by driftdiver (I could eat it raw, but why do that when I have a fire.)
[ Post Reply | Private Reply | To 26 | View Replies]

To: Izzy Dunne
the government has a Plan B: it’s called hacking.

This is why the US Dept of Commerce requires software publishes to tell the federal government exactly the kind of ciphers used in their software and the key lengths. You have to submit your software to the https://www.bis.doc.gov/ to get an Export Registration Number (ERN).

When the FBI or NSA wants to hack you, it simply looks up the ERN for the app and applies the corresponding hack/decryption tool.

An ERN is required for any software published in the US that uses encryption and might be shipped overseas (basically anything published on the Internet).

In some cases you don't need an ERN (e.g., you use an encryption key shorter than 64 bits). The rules are rather complicated. See https://www.bis.doc.gov/index.php/policy-guidance/encryption/encryption-faqs.

29 posted on 09/29/2015 11:46:42 AM PDT by Gideon7
[ Post Reply | Private Reply | To 1 | View Replies]

To: Izzy Dunne
An is ERN required for exporting 'encryption products' outside the US. Originally 'encryption products' meant a product or library whose primary purpose was encryption (e.g., a software library). If you merely used ssleay in your own communication utility (e.g., in ssh) you were exempt.

Not any more. 'Encryption products' has since been redefined to cover any app that encrypts user data, except for license keys and product activation codes. So, for example, if you use ssleay in an embedded app to encrypt photos on your laptop you still need to get an ERN for the app. (It is not clear if passwords are covered under the new interpretation, but I am guessing they are.)

30 posted on 09/29/2015 11:59:59 AM PDT by Gideon7
[ Post Reply | Private Reply | To 1 | View Replies]

To: driftdiver

Don’t work for Microsoft, but I do hold certifications.

We build our MS servers from a “golden image” that is patched monthly and scanned by several vulnerability engines. We remediate vulnerabilities through group policy or at the firewall/proxy.

I suppose I should’ve said that a patched-to-current, net-new install of most modern operating systems is secure.


31 posted on 09/29/2015 4:06:22 PM PDT by rarestia (It's time to water the Tree of Liberty.)
[ Post Reply | Private Reply | To 27 | View Replies]

To: rarestia

OK that I would mostly agree with. Although there are significant configuration assumptions.

My original comment was not a dig on MS. It was a comment on the police state we live in.


32 posted on 09/29/2015 5:22:25 PM PDT by driftdiver (I could eat it raw, but why do that when I have a fire.)
[ Post Reply | Private Reply | To 31 | View Replies]

To: driftdiver

Installing anything that makes web presentations “pretty” will pretty much tear down the veil. Java and most Adobe products are cancers on most platforms. HTML5 can’t be adopted quick enough.


33 posted on 09/30/2015 4:04:35 AM PDT by rarestia (It's time to water the Tree of Liberty.)
[ Post Reply | Private Reply | To 32 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-33 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson