Re: How true can this be?
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Janusz A. Urbanowicz wrote: > On Sun, Jan 27, 2008 at 04:23:06PM -0500, John W. Moore III wrote: >> -BEGIN PGP SIGNED MESSAGE- >> Hash: SHA512 >> >> - Original Message ---- >> Subject: Re: How true can this be? >> From: Janusz A. Urbanowicz <[EMAIL PROTECTED]> >> To: Raygene <[EMAIL PROTECTED]> >> Cc: gnupg-users@gnupg.org >> Date: Sunday, January 27, 2008 1:39:04 PM >> >> >>> if a), then b) would land him in jail, quickly >> More likely a fatal traffic accident or victim of a street mugging with >> similar outcome. People communicate in and from Jails. > > Blabbering about classified stuff is a breach of security procedures and > NDA-s, that leads to administrative action, prosecution and usually jail > sentence (or a hefty fine). Long ago I had a secret security clearance. The secrets were laughable, but I have never disclosed them. Mine had nothing to do with encryption. When getting the clearance, I had to read some of the laws that pertained. In addition to jail and fines, another punishment option was death. But I imagine it would be done officially. > > The approach you mention would be probably used on someone who would like to > play the game (as in sell the info to another country), not for some random > blabberer. > > Alex - -- .~. Jean-David Beyer Registered Linux User 85642. /V\ PGP-Key: 9A2FC99A Registered Machine 241939. /( )\ Shrewsbury, New Jerseyhttp://counter.li.org ^^-^^ 12:50:01 up 16 days, 2:36, 2 users, load average: 5.02, 5.03, 4.68 -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.5 (GNU/Linux) Comment: Using GnuPG with CentOS - http://enigmail.mozdev.org iD8DBQFHrejkPtu2XpovyZoRAgC9AJ9DknvNBSUr0NU7jxdHUr3PGWHKYACgg2Lo eVMtegDw54+UQDnlz+fGK+8= =YzkQ -END PGP SIGNATURE- ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: How true can this be?
On Sun, Jan 27, 2008 at 04:23:06PM -0500, John W. Moore III wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA512 > > - Original Message > Subject: Re: How true can this be? > From: Janusz A. Urbanowicz <[EMAIL PROTECTED]> > To: Raygene <[EMAIL PROTECTED]> > Cc: gnupg-users@gnupg.org > Date: Sunday, January 27, 2008 1:39:04 PM > > > > if a), then b) would land him in jail, quickly > > More likely a fatal traffic accident or victim of a street mugging with > similar outcome. People communicate in and from Jails. Blabbering about classified stuff is a breach of security procedures and NDA-s, that leads to administrative action, prosecution and usually jail sentence (or a hefty fine). The approach you mention would be probably used on someone who would like to play the game (as in sell the info to another country), not for some random blabberer. Alex -- JID: [EMAIL PROTECTED] PGP: 0x46399138 od zwracania uwagi na detale są lekarze, adwokaci, programiści i zegarmistrze -- Czerski ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: How true can this be?
John W. Moore III wrote: More likely a fatal traffic accident or victim of a street mugging with similar outcome. People communicate in and from Jails. I hate to rain on people's parades, but that sort of James Bond stuff tends to draw a lot more attention. Assassination is an extremely ineffective form of censorship. Historically speaking, effective governments have relied on discredit more than death for controlling their secrets--if someone gets a reputation in the field for being crazy, for being unstable, for being whatever, then nobody will listen to them anyway, so who cares if they're blabbing secrets? That said, I agree with the claim that it's very unlikely that someone with the clearance to know about the NSA's latest crypto research would talk about it with others who weren't cleared. Far, far more likely that someone was trying to impress others with a "if only you knew what I knew" fish story. ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: How true can this be?
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 - Original Message Subject: Re: How true can this be? From: Janusz A. Urbanowicz <[EMAIL PROTECTED]> To: Raygene <[EMAIL PROTECTED]> Cc: gnupg-users@gnupg.org Date: Sunday, January 27, 2008 1:39:04 PM > if a), then b) would land him in jail, quickly More likely a fatal traffic accident or victim of a street mugging with similar outcome. People communicate in and from Jails. JOHN ;) Timestamp: Sunday 27 Jan 2008, 16:22 --500 (Eastern Standard Time) -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.9-svn4675: (MingW32) Comment: Public Key at: http://tinyurl.com/8cpho Comment: Gossamer Spider Web of Trust: https://www.gswot.org Comment: Homepage: http://tinyurl.com/9ubue iQEcBAEBCgAGBQJHnPY4AAoJEBCGy9eAtCsPXI4H/Ryk+Mb9sn8yPhVH+igLsVwj SjEmdYlZlzFnynqZCNFih8R/XBxGTPnpcpdcPWJEOx8MKvrfavg8diAv3qfTEGxO csUXaBjWi+xuUyzoJs1iwBCAE+ycibUbWX3X/nHDCYC29QHoZGVMxTraNDxf0/7r sakxRn3TqihbLND5/1ACohRctCfxuqCyl1U5aMRQqcxC42THmB1ZcYJjnjnnbkJe u+RR2dmDY/k8zX53O4Y8rHzWGw5Dt6XkMXqpADBnYMiep5j8mhX0Qc/DwIwzIk6g saycj1YjtEc/JEnp5EHawTk6bk+dWfUEHdwRMmcMZWIasS5hVAKJvofL5gekdkA= =gTY2 -END PGP SIGNATURE- ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: How true can this be?
On Sat, Jan 26, 2008 at 01:15:23PM -0800, Raygene wrote: > > While discussing GnuPG on MacNN forum, someone posted the following message: > > Tonight I met this guy who works for an internet security company. they help > governments/law agencies, what he told me is so depressing. apparently, big > brother has the decryption keys for most internet algorithms, they basically > can record the information and decrypt it in %95 of the cases... I am no > security/privacy expert, but its shocking to know that. The guy did not want > to speak much, but he said that mac is the most secure platform from all > operating systems?. does anyone know more about this? > > Does this hold water or was that so-called security expert full of it? both yes and no spooks don't need to break your ciphers to get your encrypted stuff, the simplest technical measure is to inject a trojan into your system that will siphon off what's needed, then there is traffic analysis, TEMPEST, etc etc BTW: I really doubt that if there is a classified shortcut to solve RSA, a random guy from a random security firm would a) know it (COMSEC/INFOSEC is usually classified TOP SECRET as it is conidered of vital importance to state security), and b) he would blabber about it to anyone who would care to listen if a), then b) would land him in jail, quickly Alex -- JID: [EMAIL PROTECTED] PGP: 0x46399138 od zwracania uwagi na detale są lekarze, adwokaci, programiści i zegarmistrze -- Czerski ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: How true can this be?
Robert J. Hansen-3 wrote: > >> I sent you (off-list) a link to a web page that talks about this in some >> detail: the Landauer Bound, the Margolus-Levitin Limit, the >> thermodynamic and quantum information theoretical limits of crypto. You >> may find some useful information in there. I would suggest two things: > >> ~ 1. Read it skeptically. >> ~ 2. Whatever else, don't believe it just because I wrote it. > Thanks Robert. Just read the following about the Echelon Project: National Security Agency (US) The prime mover in the UKUSA arrangement is undeniably the National Security Agency (NSA). The majority of funds for joint projects and facilities (discussed below) as well as the direction for intelligence gathering operations are issued primarily through the NSA. The participating agencies frequently exchange personnel, divide up intelligence collection tasks and establish common guidelines for classifying and protecting shared information. However, the NSA utilizes its role as the largest spy agency in the world to have its international intelligence partners do its bidding. President Harry Truman established the NSA in 1952 with a presidential directive that remains classified to this day. The US government did not acknowledge the existence of the NSA until 1957. Its original mission was to conduct the signal intelligence (SIGINT) and communications security (COMSEC) for the US. President Ronald Reagan added the tasks of information systems security and operations security training in 1984 and 1988 respectively. A 1986 law charged the NSA with supporting combat operations for the Department of Defense.<7> Headquartered at Fort George Meade, located between Washington D.C. and Baltimore, Maryland, the NSA boasts the most enviable array of intelligence equipment and personnel in the world. The NSA is the largest global employer of mathematicians, featuring the best teams of codemakers and codebreakers ever assembled. The latter's job is to crack the encryption codes of foreign and domestic electronic communications, forwarding the revealed messages to their enormous team of skilled linguists to review and analyze the messages in over 100 languages. The NSA is also responsible for creating the encryption codes that protect the US government’s communications. In its role as gang leader for UKUSA, the NSA is primarily involved with creating new surveillance and codebreaking technology, directing the other cooperating agencies to their targets, and providing them with training and tools to intercept, process and analyze enormous amounts of signals intelligence. By possessing what is arguably the most technologically advanced communications, computer and codebreaking equipment of any government agency in the world, the NSA serves as a competent and capable taskmaster for UKUSA. http://home.hiwaay.net/~pspoole/echelon.html The Echelon Project Darn it, we sure live in dangerous times, don't we... Thanks, Gene -- View this message in context: http://www.nabble.com/How-true-can-this-be--tp15112665p15115629.html Sent from the GnuPG - User mailing list archive at Nabble.com. ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: How true can this be?
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Raygene wrote: | I do admit that this is all random and anyone can claim to be a | so-called expert on something or other (then again, there are the | know-it-alls and phonies) but how true is that claim? ~ 1. Completely true. ~ 2. Completely false. ~ 3. Somewhere in between. ~ 4. A quixotically jocular zephyr named "oblong threnody". ~ 5. Colorless green ideas sleep furiously. ~ 6. The business of the book sleeps eternally. There is signal and there is noise. At present, you do not have any way of distinguishing the two. That means it's all noise, and the last three answers are just as meaningful as the first three. You are looking for simple and pat answers. They do not exist. You need to do a good bit of reading if you want to have a good handle on this question. | We all know that the various "Agencies" have super computers and some | of the best programmers and internet security experts in the country | ... have you ever heard of some agency actually cracking a lot of | people's encrypted emails or files? Is encryption as safe as claimed? I sent you (off-list) a link to a web page that talks about this in some detail: the Landauer Bound, the Margolus-Levitin Limit, the thermodynamic and quantum information theoretical limits of crypto. You may find some useful information in there. I would suggest two things: ~ 1. Read it skeptically. ~ 2. Whatever else, don't believe it just because I wrote it. -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.8 (Darwin) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iFYEAREIAAYFAkebwAMACgkQf2XByo0Cu7NHOADffx0SSCJzSDqT+nrMvTMDxPki tnRRZxDwtd9oGwDgk0jZPqh4FNWRWUSfztXWUiQQE7vv6BsRfdt5GIkBHAQBAQgA BgUCR5vAAwAKCRC3APSC/q+BCVL8B/0THUOdaBInO13oMgAlm6J9aft9sXWy7pJB /8qqOAL/gJZ1zBAPhBb6j5Txgfz1PDkTOl10A4hK8YxktNZTqJ5iKM8rmHmindfZ wtq1ZdyEhTbsCXK1hVkQMxPjNDsghhdnygo0tPeipD9Wu9jdyjG+llBWL+CXcXbO ZwqL0wNgJynvvGhkkiwUMqHFCdU4F5xbpe49pCHmMGcIZGFJYLvCqTpZvaw+/Evu U/+Hj+WMAJ6HGnwnEjrMdHhfXYTJ1pCeFqgt4db3HL87VqgJfMVD799I6fu/XZWX f1+ehTsNGFrsEzNKajyx8aGNYIKyA5MHXR4v2/FosH1v2lrQDutm =YRas -END PGP SIGNATURE- ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: How true can this be?
David Shaw wrote: > > On Sat, Jan 26, 2008 at 01:15:23PM -0800, Raygene wrote: >> >> While discussing GnuPG on MacNN forum, someone posted the following >> message: >> >> Tonight I met this guy who works for an internet security company. they >> help >> governments/law agencies, what he told me is so depressing. apparently, >> big >> brother has the decryption keys for most internet algorithms, they >> basically >> can record the information and decrypt it in %95 of the cases... I am no >> security/privacy expert, but its shocking to know that. The guy did not >> want >> to speak much, but he said that mac is the most secure platform from all >> operating systems?. does anyone know more about this? >> >> Does this hold water or was that so-called security expert full of it? > >>> On the whole, the words of some random guy on some random web page >>> quoting some other random guy that he just happened to meet might not >>> be your best source of information. > > Thanks David, > > I do admit that this is all random and anyone can claim to be a so-called > expert on something or other (then again, there are the know-it-alls and > phonies) but how true is that claim? We all know that the various > "Agencies" have super computers and some of the best programmers and > internet security experts in the country, have you ever heard of some > agency actually cracking a lot of people's encrypted emails or files? Is > encryption as safe as claimed? > > Newbie paranoia, just installed MacPG and playing around with it... :-/ > > Cheers, > Gene > > > _______________ > Gnupg-users mailing list > Gnupg-users@gnupg.org > http://lists.gnupg.org/mailman/listinfo/gnupg-users > > -- View this message in context: http://www.nabble.com/How-true-can-this-be--tp15112665p15113566.html Sent from the GnuPG - User mailing list archive at Nabble.com. ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: How true can this be?
On Sat, Jan 26, 2008 at 01:15:23PM -0800, Raygene wrote: > > While discussing GnuPG on MacNN forum, someone posted the following message: > > Tonight I met this guy who works for an internet security company. they help > governments/law agencies, what he told me is so depressing. apparently, big > brother has the decryption keys for most internet algorithms, they basically > can record the information and decrypt it in %95 of the cases... I am no > security/privacy expert, but its shocking to know that. The guy did not want > to speak much, but he said that mac is the most secure platform from all > operating systems?. does anyone know more about this? > > Does this hold water or was that so-called security expert full of it? On the whole, the words of some random guy on some random web page quoting some other random guy that he just happened to meet might not be your best source of information. David ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
How true can this be?
While discussing GnuPG on MacNN forum, someone posted the following message: Tonight I met this guy who works for an internet security company. they help governments/law agencies, what he told me is so depressing. apparently, big brother has the decryption keys for most internet algorithms, they basically can record the information and decrypt it in %95 of the cases... I am no security/privacy expert, but its shocking to know that. The guy did not want to speak much, but he said that mac is the most secure platform from all operating systems?. does anyone know more about this? Does this hold water or was that so-called security expert full of it? Cheers RG -- View this message in context: http://www.nabble.com/How-true-can-this-be--tp15112665p15112665.html Sent from the GnuPG - User mailing list archive at Nabble.com. ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users