Free Republic 2nd Qtr 2024 Fundraising Target: $81,000 Receipts & Pledges to-date: $13,290
16%  
Woo hoo!! And we're now over 16%!! Thank you all very much!! God bless.

Keyword: encryption

Brevity: Headers | « Text »
  • FBI seized personal cell phone of Trump Supporter, Rep. Scott Perry: Does that indicate the search for documents at Trump’s home was also about Jan. 6?

    08/09/2022 9:22:10 PM PDT · by SeekAndFind · 28 replies
    Hotair ^ | 08/10/2022 | John Sexton
    One day after the search at Trump’s home, the FBI has taken the personal cell phone of Rep. Scott Perry, a Republican from Pennsylvania. Rep. Perry gave an exclusive statement to Fox News about what happened.“This morning, while traveling with my family, 3 FBI agents visited me and seized my cell phone. They made no attempt to contact my lawyer, who would have made arrangements for them to have my phone if that was their wish. I’m outraged — though not surprised — that the FBI under the direction of Merrick Garland’s DOJ, would seize the phone of a sitting...
  • Deep State Treasury Leaker Arrested

    10/17/2018 1:24:57 PM PDT · by BeauBo · 46 replies
    Conservative Treehouse ^ | 17 Oct 2018 | Sundance
    You might remember back in May 2018 when sketchy porn lawyer Michael Avenetti was releasing U.S. Treasury notifications on Michael Cohen received from an unknown source within the Treasury Department. You might also remember when New Yorker’s Ronan Farrow wrote a sympathetic article after talking to the leaking treasury official. As a result the Treasury Inspector General began an investigation. Today, a U.S. Treasury employee named Natalie Mayflower Sours-Edwards was arrested and charged with leaking to numerous reporters multiple financial reports about suspicious financial transactions related to: Paul Manafort, Richard Gates, Maria Butina, and others.
  • Encrypted email website ProtonMail passes user’s IP address to French authorities, leading to arrest of climate activist

    09/09/2021 7:22:45 PM PDT · by dynachrome · 17 replies
    RT ^ | 9-7-21 | RT
    A French climate activist has been arrested after the private email service ProtonMail cooperated with authorities after a court ruling, logging details of a user before providing it to the police to identify a French citizen. On Monday, Andy Yen, the founder and CEO of Proton, the company behind the Swiss email provider ProtonMail, published a statement saying that he deplored the way legal tools had been used to bring about the arrest of a French climate change activist, but claimed his service was still secure. “In this case, Proton received a legally binding order from Swiss authorities which we...
  • A backdoor in mobile phone encryption from the '90s still exists

    06/16/2021 9:24:55 AM PDT · by Red Badger · 4 replies
    https://techxplore.com ^ | 16 JUNE 2021 | by Ruhr-Universitaet-Bochum
    Although the insecure algorithms are still implemented in modern mobile phones, the researchers do not expect them to pose a significant threat to users. Credit: RUB, Marquard ================================================================================== The encryption algorithm GEA-1 was implemented in mobile phones in the 1990s to encrypt data connections. Since then, it has been kept secret. Now, a research team from Ruhr-Universität Bochum (RUB), together with colleagues from France and Norway, has analyzed the algorithm and has come to the following conclusion: GEA-1 is so easy to break that it must be a deliberately weak encryption that was built in as a backdoor. Although the...
  • Stealthy Linux backdoor malware spotted after three years of minding your business

    04/30/2021 8:55:20 AM PDT · by ShadowAce · 34 replies
    The Register ^ | 29 April 2021 | Thomas Claburn
    Chinese security outfit Qihoo 360 Netlab on Wednesday said it has identified Linux backdoor malware that has remained undetected for a number of years.The firm said its bot monitoring system spotted on March 25 a suspicious ELF program that interacted with four command-and-control (C2) domains over the TCP HTTPS port 443 even though the protocol used isn't actually TLS/SSL."A close look at the sample revealed it to be a backdoor targeting Linux X64 systems, a family that has been around for at least three years," Netlab researchers Alex Turing and Hui Wang said in an advisory.An MD5 signature for the...
  • Researchers build the fastest laser-based random number generator

    03/01/2021 7:22:56 AM PST · by BenLurkin · 10 replies
    Engadget ^ | 03.01.21
    It can generate 250 terabytes of random bits per second. In fact, it was so fast that the team behind it struggled to record its output using a high-speed camera. According to the researchers, their system trumps physical random number generators both in speed and through its ability to create many bitstreams simultaneously. The results are published in the journal Science. The new invention utilizes a tiny laser, just one millimeter long, which bounces light between mirrors positioned at either end of an hourglass-shaped cavity before exiting the device, reports Science News. Unlike previous laser-based systems, the new process can...
  • Lost Passwords Lock Millionaires Out of Their Bitcoin Fortunes

    01/12/2021 9:14:26 AM PST · by Theoria · 66 replies
    The New York Times ^ | 12 Jan 2021 | Nathaniel Popper
    Bitcoin owners are getting rich because the cryptocurrency has soared. But what happens when you can’t access that wealth because you forgot the password to your digital wallet? Stefan Thomas, a German-born programmer living in San Francisco, has two guesses left to figure out a password that is worth, as of this week, about $220 million. The password will let him unlock a small hard drive, known as an IronKey, which contains the private keys to a digital wallet that holds 7,002 Bitcoin. While the price of Bitcoin dropped sharply on Monday, it is still up more than 50 percent...
  • Never Relent – Why Did The DOJ Release SSCI Vice-Chairman Mark Warner’s Text Messages on February 9, 2018?…

    07/10/2020 10:10:06 PM PDT · by bitt · 23 replies
    CONSERVATIVE TREEHOUSE ^ | 7/9/2020 | SUNDANCE
    Everything is disconnected until somebody connects it. On February 9, 2018, the DOJ released a batch of captured text messages between Senate Intelligence Committee Vice-Chairman Mark Warner and the lawyer for Christopher Steele, Adam Waldman. At the time the texts were released the media narrative surrounded the top-line story that Senator Warner was having back channel discussions to communicate with the author of the now famous Trump dossier, Chris Steele. However, no-one seemed to wonder why these messages were captured, and even more curiously why they were released. Immediately following the release, SSCI member Marco Rubio, the current acting chairman...
  • TRT [Turkish state media] broadcasting Hillary Clinton used encrypted messaging sys [Bylock] to communicate with Deep State [Gülen Movement]

    06/14/2020 1:32:40 PM PDT · by ransomnote · 10 replies
    Twitter ^ | 6/14/2020 | Vanity, @Frank26689741, Joe Hoft, NeonRevolt
    Saturday, May 23, 2020 President Trump had a phone call with Erdogan (I confirmed  the call per an article in Bloomberg). On June 13, some on Twitter were excited about claims being made about that call.  12:36 PM · Jun 13, 2020 https://twitter.com/Frank26689741/status/1271889209629032448 Tweeter FiestyQgrl @FQgrl  provided this Google translation of the Turkish news broadcast message "Met for the first time with Hillary Clinton (former US foreign minister and presidential candidate). He looks and loves us positively. If selected, the services here will be more comfortable. republicans are seriously against us."Another Twitter account, Scrappy-Doo aka Harpazo-girl#̷̧̢̼̤͈̼̫̋̾Q̸̼͔͕̗͚̟̉̄̄ @Scrappy94546226, offers the following...
  • Firefox turns controversial new encryption on by default in the US

    02/27/2020 2:16:36 PM PST · by ransomnote · 14 replies
    theverge.com ^ | Feb 25, 2020 | Jon Porter
    Starting today, Mozilla will turn on by default DNS over HTTPS (DoH) for Firefox users in the US, the company has announced. DoH is a new standard that encrypts a part of your internet traffic that’s typically sent over an unencrypted plain text connection, and which could allow others to see what websites you’re visiting, even when your communication with the website itself is encrypted using HTTPS. Mozilla says it is the first browser to support the new standard by default, and will be rolling it out gradually over the coming weeks in order to address any unforeseen issues.Whenever you...
  • Assange tried to call White House, Hillary Clinton over data dump, his lawyer says

    02/25/2020 8:40:55 AM PST · by yesthatjallen · 39 replies
    Reuters ^ | 02 25 2020 | Michael Holden
    Julian Assange tried to contact Hillary Clinton and the White House when he realized that unredacted U.S. diplomatic cables given to WikiLeaks were about to be dumped on the internet, his lawyer told his London extradition hearing on Tuesday. Assange is being sought by the United States on 18 counts of hacking U.S. government computers and an espionage offense, having allegedly conspired with Chelsea Manning, then a U.S. soldier known as Bradley Manning, to leak hundreds of thousands of secret documents by WikiLeaks almost a decade ago. On Monday, the lawyer representing the United States told the hearing that Assange,...
  • WikiLeaks-Inspired Developer Behind Game-Changing “SecureDrop” Found Dead

    01/09/2018 5:58:10 PM PST · by CincyRichieRich · 21 replies
    Gateway Pundit ^ | 1-9-18 | Joshua Caplan
    The developer behind the game-changing, WikiLeaks inspired submission system “SecureDrop,” has allegedly committed suicide. “Second developer of WikiLeaks inspired submission system “SecureDrop”, security expert James Dolan, aged 36, has tragically died. He is said to have committed suicide. The first, Aaron Swartz, is said to have taken his own life at age 26, after being persecuted by US prosecutors,” tweeted WikiLeaks’ official Twitter account.
  • Feds: Harvard fellow hacked millions of papers

    07/19/2011 2:15:04 PM PDT · by Hunton Peck · 28 replies
    Associated Press ^ | Tuesday, July 19, 2011 4:33 PM EDT | JAY LINDSAY
    BOSTON (AP) — A Harvard University fellow who was studying ethics was charged with hacking into the Massachusetts Institute of Technology's computer network to steal nearly 5 million academic articles. Aaron Swartz, 24, of Cambridge, was accused of stealing the documents from JSTOR, a popular research subscription service that offers digitized copies of more than 1,000 academic journals and documents, some dating back to the 17th century. In an indictment released Tuesday, prosecutors say Swartz stole 4.8 million articles between September 2010 and January after breaking into a computer wiring closet on MIT's campus. Swartz, then a student at the...
  • The intelligence coup of the century

    02/11/2020 11:37:48 AM PST · by posterchild · 16 replies
    Washington Post ^ | Feb 11, 2020 | Greg Miller
    or more than half a century, governments all over the world trusted a single company to keep the communications of their spies, soldiers and diplomats secret. The company, Crypto AG, got its first break with a contract to build code-making machines for U.S. troops during World War II. Flush with cash, it became a dominant maker of encryption devices for decades, navigating waves of technology from mechanical gears to electronic circuits and, finally, silicon chips and software. The Swiss firm made millions of dollars selling equipment to more than 120 countries well into the 21st century. Its clients included Iran,...
  • Encryption battle reignited as US govt at loggerheads with Apple

    01/16/2020 5:02:28 AM PST · by DTAD · 31 replies
    Apple and the US government are at loggerheads for the second time in four years over unlocking iPhones connected to a mass shooting, reviving debate over law enforcement access to encrypted devices. Attorney General Bill Barr said Monday that Apple failed to provide "substantive assistance" in unlocking two iPhones in the investigation into the December shooting deaths of three US sailors at a Florida naval station, which he called an "act of terrorism."
  • Report : The FBI recently unlocked an iPhone 11 Pro with GreyKey, raising more doubts about the Pensacola case.

    01/15/2020 6:13:33 PM PST · by House Atreides · 36 replies
    9to5Mac ^ | January 15, 2020 | Chance Miller
    As Apple stands firm against requests to break iPhone encryption, many people have questioned why the FBI needs Apple’s help in the first place. There are plenty of tools available from third-party companies that are more than capable of unlocking the iPhone 5 and iPhone 7 used by the Pensacola gunman. Further emphasizing that point, a new report from Forbes says that the FBI recently used one of those black/gray market tools to unlock the newest — and theoretically the most secure — iPhone that Apple sells. According to the report, FBI investigators in Ohio used the GrayKey hardware box...
  • Donald Trump Calls on Apple to 'Step Up to the Plate' and Unlock iPhones Used by Florida Mass Shooter

    01/14/2020 8:46:59 PM PST · by House Atreides · 43 replies
    MacRumors ^ | 1/14/1920 | Forum
    Apple previously said that it had provided all of the information in its possession (such as iCloud backups) to the FBI earlier in the month after the FBI asked for assistance obtaining the shooter's data. Law enforcement officials are not satisfied with the iCloud data, however, and want Apple to provide a way to unlock the shooter's iPhones, which is not possible without a backdoor into the software. After Barr's request, Apple issued another statement and provided further detail on the data that has been provided, as well as once again stating that there is "no such thing as a...
  • Barr Asks Apple to Unlock Pensacola Killer’s Phones, Setting Up Clash

    01/13/2020 7:23:50 PM PST · by Theoria · 182 replies
    The New York Times ^ | 13 Jan 2020 | Katie Benner
    Attorney General William P. Barr declared on Monday that a deadly shooting last month at a naval air station in Pensacola, Fla., was an act of terrorism, and he asked Apple in an unusually high-profile request to provide access to two phones used by the gunman.Mr. Barr’s appeal was an escalation of a continuing fight between the Justice Department and Apple pitting personal privacy against public safety. “This situation perfectly illustrates why it is critical that the public be able to get access to digital evidence,” Mr. Barr said, calling on technology companies to find a solution and complaining that...
  • Opinion: Burr-Feinstein antiencryption bill a firing offense

    04/23/2016 11:13:34 AM PDT · by Clintonfatigued · 17 replies
    Christian Science Monitor ^ | April 19, 2016 | Sascha Meinrath
    The Burr-Feinstein antiencryption bill isn't just bad, it's evidence of a dangerous incompetence in congressional leadership that is undermining America’s security. In fact, the draft bill, leaked two weeks ago and now officially released, is compelling evidence that Senate leadership should strip – or at least not reappoint – Senators Burr and Feinstein of their positions on the Senate Select Committee on Intelligence. Amongst its many provisions, the draft bill mandates that tech companies make all of our online data "intelligible" when presented with a court order. The bill defines intelligible as "decrypted, deciphered, decoded, demodulated, or deobfuscated" to "the...
  • Here’s how AG Barr is going to get encryption 'backdoors'

    08/06/2019 6:33:47 PM PDT · by softengine · 55 replies
    Engadget ^ | July 31, 2019 | Violet Blue
    If you heard the reverberation of a few thousand heads exploding last week, it was the sound of information security professionals reacting to US Attorney General Barr saying that Big Tech "can and must" put backdoors into encryption. In his speech for a cybersecurity conference at Fordham University, Barr warned tech companies that time was running out for them to develop ways for the government to break encryption. FBI Director Christopher Wray agreed with him. At this week's big meeting of the "Five Eyes" countries, Barr was in attendance. His demands that internet companies break safe security standards of encryption...