Jump to content

Recommended Posts

Posted

Hmmm, very skeptical about all of that, I shall have to send my crypto-fu to that later today. A number of things already worry me from just reading the first page.

Posted

here is a who is look up for the domain name.

--------------------------------------------------------------------------------------

Registrant:

Hard Guard Ltd

P.o.box 2658

Yokneam Eilit,

IL, 20692

Registrar: DomainTheNet.com

Domain Name: privacyinside.com

Created on ............. 2004-09-14 16:08:00

Expires on ............. 2010-09-14 16:08:00

Record last updated on . 2008-07-16 16:03:00

Status .................LOCK

Administrative Contact:

privacyinside ltd.

Roy Cohen

P.o.box 2658

Yokneam Eilit,

IL, 20692

972-54-4467460

972-54-4467460

q@quantom.cjb.net

Technical Contact:

privacyinside ltd.

roy cohen

P.o.box 2658

Yokneam Eilit,

IL, 20692

972-54-4467460

972-54-4467460

q@quantom.cjb.net

Billing Contact:

privacyinside ltd

Roy Cohen

P.o.box 2658

Yokneam Eilit,

IL, 20692

972-54-4467460

972-54-4467460

q@quantom.cjb.net

Domain servers in listed order:

DNS.NETVISION.NET.IL

NYPOP.ELRON.NET

(privacyinside.com)

Register your domain name at http://www.domainthenet.com

-------------------------------------------------------------------------------

the site doesn't seem to be trust worthy to me.. what do u guys think??

Posted

Why is the DNS info suspicious? Nothing looks out of place to me.

Now that I have the afternoon off because of the snow I'll have a look at what they are proposing.

Posted

my mistake. i didnt mean that the dns info looked suspicious, i meant that the site seemed suspicious i just offered the dns info for anyone else who wanted it for easy reference.

Posted

Well I was going to have a look at, except there is no code or algorithm to look at.

They have only provided a sample file and encrypted version, plus an visualization of apparent randomness, all of which is useless, as it provides nothing but proof of being able to sample a random data stream.

Given what they talk about is just an implementation of a one time pad which is generated by two factors, input from the user, much like what TrueCrypt uses when generating random numbers, eg movement of the mouse and sampling a random number generator. This is nothing new and nothing interesting.

More to the point, they have done nothing about key distribution, so if it was really so super I still would probably have to use a asymmetric key cryptography system to distribute the keys to people.

Given the lack of other information all this seems to be is a load of propriety crap (they mention that it will be open source but don't give reference to it) that has no cryptanalysis done on it and will most likely end up like the MiFare crypto issue.

Finally as the thread owner is a new user with this as a signal post, it points to this being a shameless plug for their pitiful work and highly incredible.

Steer clear and stick to AES or your favorite tried and tested algorithm.

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...