![]() |
![]() |
#232 | |
Undefined
"The unspeakable one"
Jun 2006
My evil lair
41·163 Posts |
![]() Quote:
The asymmetry is very apparent. Someone not in the political elite will have little to no privacy, but those in high ranking positions will be free to keep their corrupt and dirty secrets as they please, because "national security". * I use the word secure instead of strong. It is most likely IMO that the backdoored versions will still be strongly encrypted, just that they won't be secure since someone else also has the keys. |
|
![]() |
![]() |
![]() |
#233 | |
Bamboozled!
"𒉺𒌌𒇷𒆷𒀭"
May 2003
Down not across
2×3×29×67 Posts |
![]() Quote:
It is a criminal offence not to reveal access to encrypted material if a valid court order is made. In that situation a Brit will make a value judgement. |
|
![]() |
![]() |
![]() |
#234 |
6809 > 6502
"""""""""""""""""""
Aug 2003
101×103 Posts
22×7×389 Posts |
![]()
Instead of offering end to end via a service, why not a device? Plug in a Black-Box 432 display/camera/microphone into the USB of your machine. Connect via your service of choice. The recipient also uses their device and the one time code you provided separately.
|
![]() |
![]() |
![]() |
#235 | |
Bamboozled!
"𒉺𒌌𒇷𒆷𒀭"
May 2003
Down not across
2×3×29×67 Posts |
![]() Quote:
|
|
![]() |
![]() |
![]() |
#236 | |
"Jacob"
Sep 2006
Brussels, Belgium
3·5·127 Posts |
![]() Quote:
Jacob |
|
![]() |
![]() |
![]() |
#237 | |
Bamboozled!
"𒉺𒌌𒇷𒆷𒀭"
May 2003
Down not across
2D8A16 Posts |
![]() Quote:
Let us assume that you have some sensitive material which you have encrypted yourself and uploaded to a cloud service. As I understand the proposed law, which understanding may be completely wrong, your encrypted data will be fully readable, even if it is re-encrypted while in transit from you to your service provider. Assuming that you did your job properly, that encrypted data will be largely meaningless to law enforcement. How then do they get to read the sensitive plaintext? Is a court order necessary or do they just send the boys round for a session of rubber hose cryptanalysis? Here is an example of what I mean. You get to play law enforcement and I the evil hacker. I am using https for an end-to-end encrypted channel to send text to the Forum. Once it arrives which you can read that text without any problem whatsoever. pcl@thoth:~/nums$ cat ../jacob.asc -----BEGIN PGP MESSAGE----- jA0EBwMCzB+cY1vjUST/0m8BJwuOu9eSWKl7OW9YtEu58mQ3jz7k8Elgj99anVVQ 5axpVl2qMd1hN7dAIwtmOJN/auZh/gfcynJTfJI6vIhyRP07RdDGLo5MrmcbJLaw rQAPpFxO0aNfxhyoeaQPtIa/VJirAaSzYEdKkfM20eo= =Xyq1 -----END PGP MESSAGE----- How do you read the sensitive contents? Last fiddled with by xilman on 2020-06-25 at 15:25 |
|
![]() |
![]() |
![]() |
#238 |
Sep 2002
Database er0rr
23×3×11×17 Posts |
![]()
Similar question to Uncwilly's about the black box: What if you have a JavaScript program that user downloads as part of a page browse and encrypts end-to-end with another person who has also the same browsed code, over any IM channel of choice. Nothing is logged on the server except the page requests.
|
![]() |
![]() |
![]() |
#239 | |
Bamboozled!
"𒉺𒌌𒇷𒆷𒀭"
May 2003
Down not across
2×3×29×67 Posts |
![]() Quote:
LE is well aware of this. They know they will not be able to read everything, even if they had the bandwidth and storage necessary. They want to catch the lazy and incompetent, something which is becoming ever harder. Think of it as evolution in action. |
|
![]() |
![]() |
![]() |
#240 | |
Undefined
"The unspeakable one"
Jun 2006
My evil lair
1A1B16 Posts |
![]() Quote:
The real WTF here is trusting JS code to do what someone claims it does without verifying it every time you download it to make sure it hasn't changed and still performs as claimed without any unwanted "bonus" functionality. Last fiddled with by retina on 2020-06-26 at 01:57 |
|
![]() |
![]() |
![]() |
#241 | ||
∂2ω=0
Sep 2002
República de California
5×2,351 Posts |
![]() Quote:
-------------------------- Google’s Promise to Delete Your Data Has a Major Loophole | Gizmodo Quote:
|
||
![]() |
![]() |
![]() |
#242 |
Sep 2009
45728 Posts |
![]()
The only effective way is to minimise use of the internet, without being too obvious about it. A good start is to stop using it an hour or so before going to bed and tell your friends you are doing it because blue light suppresses melatonin production so using screens shortly before bedtime makes it harder to get to sleep. That is true so it's not obvious if you do it to get to sleep or to avoid being watched.
Chris |
![]() |
![]() |
![]() |
Thread Tools | |
![]() |
||||
Thread | Thread Starter | Forum | Replies | Last Post |
Cause this don't belong in the milestone thread | bcp19 | Data | 30 | 2012-09-08 15:09 |
GPU TF vs DC/LL data | bcp19 | GPU to 72 | 0 | 2011-12-02 16:41 |
Opinions/Suggestions for Data Collection thread | kar_bon | No Prime Left Behind | 19 | 2008-11-27 09:27 |
Data available? | Prime95 | LMH > 100M | 10 | 2007-06-22 23:55 |
Deutscher Thread (german thread) | TauCeti | NFSNET Discussion | 0 | 2003-12-11 22:12 |