Warning: mysqli::__construct(): (HY000/1203): User howardkn already has more than 'max_user_connections' active connections in D:\Inetpub\vhosts\howardknight.net\al.howardknight.net\includes\artfuncs.php on line 21
Failed to connect to MySQL: (1203) User howardkn already has more than 'max_user_connections' active connections
Warning: mysqli::query(): Couldn't fetch mysqli in D:\Inetpub\vhosts\howardknight.net\al.howardknight.net\index.php on line 66
Article <v1lvjr$1i0qk$1@dont-email.me>
Deutsch   English   Français   Italiano  
<v1lvjr$1i0qk$1@dont-email.me>

View for Bookmarking (what is this?)
Look up another Usenet article

Path: ...!weretis.net!feeder8.news.weretis.net!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: "Chris M. Thomasson" <chris.m.thomasson.1@gmail.com>
Newsgroups: sci.crypt
Subject: Re: FOSS and backdoors in the US
Date: Fri, 10 May 2024 13:21:15 -0700
Organization: A noiseless patient Spider
Lines: 52
Message-ID: <v1lvjr$1i0qk$1@dont-email.me>
References: <v0aguk$27o8c$1@dont-email.me> <20240507182057.2cb21b12@fedora>
 <v1hjbm$1nrp$2@solani.org> <v1hkoo$f7le$2@dont-email.me>
 <v1jht5$tdsr$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Fri, 10 May 2024 22:21:16 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="3e6f94937188224b64c8403807237f01";
	logging-data="1639252"; mail-complaints-to="abuse@eternal-september.org";	posting-account="U2FsdGVkX19aZSkQPlmnbZ1Q57qUukOdDlkwE+u5WRY="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:9fLrOQ/XGinr6z+PJkiFbZgYN9U=
Content-Language: en-US
In-Reply-To: <v1jht5$tdsr$1@dont-email.me>
Bytes: 2941

On 5/9/2024 3:15 PM, Rich wrote:
> Chris M. Thomasson <chris.m.thomasson.1@gmail.com> wrote:
>> On 5/8/2024 9:27 PM, Marco Moock wrote:
>>> Am 07.05.2024 18:20 Uhr schrieb Edward Teach:
>>>
>>>> Backdoors.
>>>>
>>>> When people use PRIVATE ENCRYPTION BEFORE any messaging enters a
>>>> public channel.......
>>>>
>>>> ......backdoors are the least of their worries!
>>>
>>> Isn't enough. There is a time when that message is unencrypted (e.g.
>>> when entering it to the crypto application). The operating system can
>>> then read the cleartext. If the backdoor is in the OS, X11 etc., it
>>> still works here.
>>>
>>
>> Go to a 100% "clean room", cloaked, cannot receive and/or send anything...
>>
>> Encrypt a message on a clean thumb drive.
> 
> Where did you obtain the thumb drive?
> 
> Did you build it, from the ground up, or did you bring it into the
> clean-room after purchase from a vendor?
> 
> If you purchased from a vendor, then how do you know said vendor did
> not include a hardware backdoor on that thumb drive?
> 
>> Take out the clean disk with a
>> single file on it. Destroy the computer...
> 
> How did the computer get into the clean room?  How are you sure that no
> hardware on the computer has a backdoor, or that no software running on
> the computer has a backdoor?

The computer would have to be clean. However, once its in the room, it 
cannot communicate with the outside world, and gets utterly destroyed 
after the encryption process. Turned into ashes.

Humm... Damn.


> 
>> Exit the clean room.  This disk contains an encrypted file.
>>
>> Is it safe?
> 
> The answer depends upon whether the thumbdrive and/or the computer used
> in the clean room contained a hardware or software back door.