Jump to content

Encryption backdoor?


Bigbiz

Recommended Posts

Would it be a good idea to have a backdoor installed in your encrypted data, for the authorities?

I sense some blackhat hacking inbound!

https://www.theregister.co.uk/2018/08/31/five_eyes_2018_meeting_encryption_terrorist_content/

 

Edited by Bigbiz
Link to comment
Share on other sites

13 hours ago, fernandoblazin said:

yeah you guys got the General Data Protection Regulation for privacy, but im sure the five eyes still have a peek whats going on in the IT world of the EU cause they don't disclosed or publicly comment on anything

Oh we know they do. The UK has had taps on the lines going out of Ireland for decades.

We just don't have our own government do it, mainly as they couldn't if they tried....they wanted to ban open source software about 3 years or so ago as you could use open source browsers to access illegal sites. That was our minister for communication. Someone pointed out that would leave Ireland non functioning.

Link to comment
Share on other sites

Bloody South Africans eating that Bunny Chow and biltong. Alot of them don't realise how precious data is, therefore security isn't even a thought, but there are gems all around the world,  like i live about 400 metres from a railway station that offers passengers wifi and just for starters all clients can see each other and is reach my from flat with the tetra.  

Link to comment
Share on other sites

  • 2 months later...
  • 4 weeks later...
On 9/5/2018 at 2:27 PM, Rkiver said:

Oh we know they do. The UK has had taps on the lines going out of Ireland for decades.

We just don't have our own government do it, mainly as they couldn't if they tried....they wanted to ban open source software about 3 years or so ago as you could use open source browsers to access illegal sites. That was our minister for communication. Someone pointed out that would leave Ireland non functioning.

I'm not really going to comment much save to say, 18 U.S. Code § 2511 - Interception and disclosure of wire, oral, or electronic communications prohibited. But NOT illegal.

(2) (a) (i) It shall not be unlawful under this chapter for an operator of a switchboard, or an officer, employee, or agent of a provider of wire or electronic communication service, whose facilities are used in the transmission of a wire or electronic communication, to intercept, disclose, or use that communication in the normal course of his employment while engaged in any activity which is a necessary incident to the rendition of his service or to the protection of the rights or property of the provider of that service, except that a provider of wire communication service to the public shall not utilize service observing or random monitoring except for mechanical or service quality control checks. (ii) Notwithstanding any other law, providers of wire or electronic communication service, their officers, employees, and agents, landlords, custodians, or other persons, are authorized to provide information, facilities, or technical assistance to persons authorized by law to intercept wire, oral, or electronic communications or to conduct electronic surveillance, as defined in section 101 of the Foreign Intelligence Surveillance Act of 1978, if such provider, its officers, employees, or agents, landlord, custodian, or other specified person, has been provided with— (A) a court order directing such assistance or a court order pursuant to section 704 of the Foreign Intelligence Surveillance Act of 1978 signed by the authorizing judge, or (B) a certification in writing by a person specified in section 2518(7) of this title or the Attorney General of the United States that no warrant or court order is required by law, that all statutory requirements have been met, and that the specified assistance is required.

The government’s investigation of Raj Rajaratnam, Galleon’s billionaire founder and manager, has been called the largest insider trading case in history. In one form or other, that investigation lasted more than a decade and consumed, at different times, the resources of the Securities and Exchange Commission, the U.S. Attorney’s Office, and the Federal Bureau of Investigation. The government’s efforts ultimately resulted in the filing of criminal charges against Rajaratnam, a two-month trial, twelve days of jury deliberations, and a jury verdict that convicted Mr. Rajaratnam on fourteen counts of conspiracy and securities fraud. Mr. Rajaratnam was sentenced to eleven years in prison, the longest sentence ever on charges of insider trading. Rajaratnam also forfeited $53 million in ill-gotten profits, and paid a $10 million fine. In addition, the SEC obtained a $92 million fine in its separate civil enforcement action against Mr. Rajaratnam. It is difficult to recall a larger or more notorious insider trading case, considering that Mr. Rajaratnam received tips of material non-public information from highly placed insiders at such reputable companies as McKinsey & Co., Intel Corporation, and IBM.

The use of wiretap communications in criminal investigations is not a novel concept; Congress specifically authorized the use of wiretaps in 1934. Government investigators, however, have traditionally not resorted to wiretaps in white collar investigations. Indeed, prosecutors have traditionally used wiretaps to investigate drug trafficking, mob-related offenses like racketeering, and other so-called “blue-collar crimes.” Eighty-six percent of the more than 2,000 federal wiretaps that were authorized between 1999 and 2009 were for crimes related to illegal drugs.

Read between the line's - in order to wire-tap one must presumably first learn how... Then not disclose such information to all and sundry, but on that subject it pays to think "Computers & Telephones" for Dummies! Obviously it exist's and the reason the US is so pissed with Assange and Snowden was they plastered the how-to all over the interwebs!

But presumably if nobody knew how it worked, then there would also be a significant short supply of people with the technical knowledge of how to do it in the first place.

Link to comment
Share on other sites

This was developed for a sensitive Government agency ie:(NSA) to ensure that media content could not be altered, modified or deleted.

Compliance Standards:  SEC Rules 17a3-17a4 - DoD 5015.2 - Dodd-Frank - HIPAA - Sarbanes-Oxley (SOX) - FINRA - CAPSTONE - NARA and OMB & White House Directives.

Oh & did I mention it's OPEN SOURCE!?

Spies should shove that in there CrAcK-pipe and smoke it!

Link to comment
Share on other sites

9 hours ago, preatorian said:

I'm not really going to comment much save to say, 18 U.S. Code § 2511 - Interception and disclosure of wire, oral, or electronic communications prohibited. But NOT illegal.

 

 

The interesting thing about US law, it means nothing outside of the US.

  • Like 1
Link to comment
Share on other sites

Agreed.

It is termed "dictatorship" because it retains the state apparatus as such, which implements it's forces and oppression, but differs only slightly from the popular notion of a dictatorship which Proletarians despise as the selfish, immoral, irresponsible and unconstitutional political rule of one man.

(ie: Mr Panama Papers - Trump - Citibank - Tax Returns!)

"Dictatorship does not necessarily mean the abolition of democracy for the class that exercises the dictatorship over other classes; but it does mean the abolition of democracy (or very material restriction, which is also a form of abolition) for the class over which, or against which, the dictatorship is exercised." - Lenin

Just finished reading an in depth article published by the intercept 43 pages long highlighting all 8 Central NSA hubs (cost of which = Trillions) distributed throughout the US all of which have been designated "Secret" facilities where analog phone calls are presumably directed into a Pen Tap & Trace register.

It's also hilarious listening to them pointing the finger at Russia accusing them of hacking there Democratic committee computer systems, when they have distributed Russian State interception technology and TCP/IP - The Communist Parties - Intellectual Property, into every single AT&T facility to accomplish there dystopian immoral goals in creating a system of state oppression against there own people.

Perhaps now, I finally understand the words "Computer Revolution" more than I ever did.

The only people who stand to loose "Millions" are Microsoft, Google, Facebook & Apple who have made it there Business "modus operandi" to sell peoples personal and private information for better advertising in the name of Profit whilst Chinese workers in factories smoke silicon fumes putting together there expensive and over-priced garbage.

There is no Cloud, there is no One-Drive, there is no Duplex, Live & Aqua... There is only Dystopia & 1984.

Take dysprosium, as an example, Atomic number 66, it has no substitute and not only is supply running Low, its expected to completely dry up by the year 2020.

The golden age of Spying on people with Apps in Mobile phones and electric cars. Is going to end faster than a lot of people perceive and then that will be the end of that!

A perfect example of what happens when "Demand" for the newest shiny must have gadgets exceeds "Supply". - The Well Dries Up!

It is an irreplaceable element, from which all technology gains it's circuits, SSD's, HDD's, etc - etc...

And all the USA accomplished and will go down in history for was diminishing the entire world supply through absolute greed and building a giant super spy center.

Edited by preatorian
additional supplemental
Link to comment
Share on other sites

All the USA & Trump could think of doing, embezzling money in off shore accounts.

All the Russians could think of doing giving it to there Tax Police!

Russia takes the internet by SORM 😉

http://9front.org/img/beheadthosewhoinsultunix.jpg

&& Why they're so pissed with Kaspersky

https://www.blackhat.com/docs/us-14/materials/us-14-Kamlyuk-Kamluk-Computrace-Backdoor-Revisited.pdf

UEFI Tiano Core Backdoor hidden in Intel CPU's - which "intel" now release the Microcode for so it can be removed and disabled.

Edited by preatorian
Link to comment
Share on other sites

  • 3 weeks later...

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...