Deutsch   English   Français   Italiano  
<9af21ecb5f46aa81e2ad32a1f03ac867c564ea42@i2pn2.org>

View for Bookmarking (what is this?)
Look up another Usenet article

Path: nntp.eternal-september.org!news.eternal-september.org!eternal-september.org!feeder3.eternal-september.org!i2pn.org!i2pn2.org!.POSTED!not-for-mail
From: Stefan Claas <stefan@mailchuck.com>
Newsgroups: sci.crypt
Subject: Re: AI's take on my cipher...
Date: Mon, 14 Jul 2025 21:19:36 +0200
Organization: i2pn2 (i2pn.org)
Message-ID: <9af21ecb5f46aa81e2ad32a1f03ac867c564ea42@i2pn2.org>
References: <1049c0q$10d0c$1@dont-email.me> <104mj60$dltj$1@dont-email.me> <4b6e233e7c3fb669fa324151f627c4addbfc9f70@i2pn2.org> <104r7eo$1i08p$1@dont-email.me> <95a6f265f6bdddcd037a7e48cf5258e77cec9b15@i2pn2.org> <104uecv$2ak1k$1@dont-email.me> <8e54a93978459bb7baa6896adc62508b9deb7d78@i2pn2.org> <104uqme$2cu71$1@dont-email.me> <1050ffb$2q09e$2@dont-email.me> <da6f83987b8b26ab31d7548607aaa6529a7a0f06@i2pn2.org> <10536me$3fgpt$1@dont-email.me> <49d6be48c0d398c0f4e4f95d0566ff9a98e94353@i2pn2.org> <1053kh8$3imh3$1@dont-email.me>
MIME-Version: 1.0
Injection-Date: Mon, 14 Jul 2025 19:19:36 -0000 (UTC)
Injection-Info: i2pn2.org;
	logging-data="627890"; mail-complaints-to="usenet@i2pn2.org";
	posting-account="ieSrCjSDShpZNyqIW52mlwIkg76Hsp+TOOO6KTdfCN8";
User-Agent: flnews/1.3.0pre31 (for GNU/Linux)
Cancel-Lock: sha1:ZHnGR9+dtEKEPLbM7QsrVT5MXDI=
X-Spam-Checker-Version: SpamAssassin 4.0.0
X-Date: It's Mon Sep 11640 09:19:36 PM CEST 1993, the September that never ends.
X-Ed25519-Pub: c0ffee5a36e581eb10f60b2831b3cdb955d2e7ef680dd282a8d43ad8b84b357a
X-Ed25519-Sig: 4ae8e07bff3fc36477d0d25c559e275eb2cc7ac2cd31e104850ef8be688e86b8
 2c7f7bbd617bceac29fd447c4de628493cd9264349561c7a65750b688d6bac05

Rich wrote:
> Stefan Claas <stefan@mailchuck.com> wrote:
> > Rich wrote:
> > > Stefan Claas <stefan@mailchuck.com> wrote:
> > > > Rich wrote:
> > > > 
> > > > > And, how accurately do you think the average person who wants to send 
> > > > > an encrypted message will be at typing this:
> > > > > 
> > > > > KqHtqbSca2hvI02pCMHtdKQLfHhW6OeN7iK1Fg45nMpoT+to8XpwpvARkW6UziY0iyZWUEgP/gol
> > > > > gz5p3XpGCe0hZbYV2IYYLDvvRjGWj1k5IHkDX4WshBZvI5fhVssJOqVI3bzqdEW3XLD4NoGKVQg3
> > > > > ZeNaSJs2hBySnkBoKGI=
> > > > > 
> > > > > That's 128 random bytes, base64 encoded.  128 bytes is right about the 
> > > > > original "tweet length" of tweets on shitter, so there is a severe 
> > > > > limit of the amount of information that can be transferred.
> > > > 
> > > > That why I have my az and ug program for people available, but it uses 2
> > > > bytes, which should be no problem.
> > > > 
> > > > $ openssl rand 128 | az | ug -g
> > > > ZMAXT OPNWC LZWIF OQIMR PNNQV BFQLC BRZDA RUFBT ROLQS GOLKA
> > > > KKNJF ULBLO WINNL IIVVK FWTEE XRGBS UJCYS DCMWH JUMAA VLLNX
> > > > MJMYS LHSKG ENKLL LUGBN YNDSP AJYMO OXUBC YQNOY QMFYW ABOPH
> > > > NUVCJ KMFCM XKDVM EEXYL LVUKO VVGAU UACYV OHKUG GTVAA MWDLO
> > > > KCPYN HOWVM DPNHA ZMGHV MFIKW DILNO FYQHK VQELK OMFNL EOLTL
> > > > ETMPL S
> > > 
> > > Yes, easier to enter than raw base64.  But in this case this "easier" 
> > > is like the fact that it is "easier" to move 10,000kg of sand 1km by 
> > > hand than it is to move one single 10,000kg rock 1km by hand.  "Easier?" Yes, 
> > > but no one will actually want to do so either by hand if they have 
> > > other alternatives.
> > > 
> > > No one, except for the very very truly determined (a tiny sized 
> > > population), will want to hand type that to maintain proper 
> > > air-gapping.  So they will use USB sticks or other methods to "move" 
> > > the data, opening up the possibility of transfer of an exploit via that 
> > > same USB stick.
> > > 
> > 
> > A 3.5 ich disk drive and disk for it come in handy, because you hear
> > every read/write process
> 
> You hope.  A NSA level attack could hide a microcontroller and several 
> GB of non-volatile memory on an otherwise normal looking interface 
> board.  Some of the read/writes could then be redirected to/from that 
> non-volatile memory.
> 
> Far fetched -- certianly not when such CPU's can be had from Amazon for 
> $10.00.
> 
> Likely to happen to any individual - well, very unlikely, unless they 
> happen to also be in the NSA's crosshairs.
> 
> > and can quickly examine the sectors with a disk editor.
> 
> The same exploited drive could perform a VW Dieselgate detection to 
> detect likely access by a disk editor (the access patterns will differ 
> vs. filesystem accesses) and return alternate contents or modify the 
> actual return from the disk surface to make you believe anything was 
> written to the sectors.  So you'd have to disk edit read on another 
> machine that itself was not compromised in some way (and hope the NSA 
> didn't swap the drive in that machine for another comprimised one).
> 
> And -- I'm ignoring the fact that buying a newly manufactured in 2025 
> 3.5" drive mechanism is all but impossible today.
> 

What you always forget. the NSA can't snoop on onffline devices in Eurasia.

They can do that with US citizens in the US.

Regards
Stefan