Deutsch English Français Italiano |
<v4odcd$fg4j$1@dont-email.me> View for Bookmarking (what is this?) Look up another Usenet article |
Path: ...!news.mixmin.net!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail From: "Chris M. Thomasson" <chris.m.thomasson.1@gmail.com> Newsgroups: sci.crypt Subject: Re: FOSS and backdoors in the US Date: Sun, 16 Jun 2024 21:17:17 -0700 Organization: A noiseless patient Spider Lines: 66 Message-ID: <v4odcd$fg4j$1@dont-email.me> References: <v0aguk$27o8c$1@dont-email.me> <20240507182057.2cb21b12@fedora> <v1hjbm$1nrp$2@solani.org> <v1hkoo$f7le$2@dont-email.me> <v1jht5$tdsr$1@dont-email.me> <v1lvjr$1i0qk$1@dont-email.me> <20240605200221.1dab014b@fedora> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit Injection-Date: Mon, 17 Jun 2024 06:17:18 +0200 (CEST) Injection-Info: dont-email.me; posting-host="c5aa21a2ffdc11ceb19a167156cbaefd"; logging-data="508051"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18UhSId4eA9fCX/R28Y8epu11MJtbaFH3I=" User-Agent: Mozilla Thunderbird Cancel-Lock: sha1:t/NbuexInSnAzDgghgizFIJSEPQ= In-Reply-To: <20240605200221.1dab014b@fedora> Content-Language: en-US Bytes: 3779 On 6/5/2024 12:02 PM, Edward Teach wrote: > On Fri, 10 May 2024 13:21:15 -0700 > "Chris M. Thomasson" <chris.m.thomasson.1@gmail.com> wrote: > >> On 5/9/2024 3:15 PM, Rich wrote: >>> Chris M. Thomasson <chris.m.thomasson.1@gmail.com> wrote: >>>> On 5/8/2024 9:27 PM, Marco Moock wrote: >>>>> Am 07.05.2024 18:20 Uhr schrieb Edward Teach: >>>>> >>>>>> Backdoors. >>>>>> >>>>>> When people use PRIVATE ENCRYPTION BEFORE any messaging enters a >>>>>> public channel....... >>>>>> >>>>>> ......backdoors are the least of their worries! >>>>> >>>>> Isn't enough. There is a time when that message is unencrypted >>>>> (e.g. when entering it to the crypto application). The operating >>>>> system can then read the cleartext. If the backdoor is in the OS, >>>>> X11 etc., it still works here. >>>>> >>>> >>>> Go to a 100% "clean room", cloaked, cannot receive and/or send >>>> anything... >>>> >>>> Encrypt a message on a clean thumb drive. >>> >>> Where did you obtain the thumb drive? >>> >>> Did you build it, from the ground up, or did you bring it into the >>> clean-room after purchase from a vendor? >>> >>> If you purchased from a vendor, then how do you know said vendor did >>> not include a hardware backdoor on that thumb drive? >>> >>>> Take out the clean disk with a >>>> single file on it. Destroy the computer... >>> >>> How did the computer get into the clean room? How are you sure >>> that no hardware on the computer has a backdoor, or that no >>> software running on the computer has a backdoor? >> >> The computer would have to be clean. However, once its in the room, >> it cannot communicate with the outside world, and gets utterly >> destroyed after the encryption process. Turned into ashes. >> >> Humm... Damn. >> >> >>> >>>> Exit the clean room. This disk contains an encrypted file. >>>> >>>> Is it safe? >>> >>> The answer depends upon whether the thumbdrive and/or the computer >>> used in the clean room contained a hardware or software back door. >> > > Sorry I started this thread......in my world "private encryption" only > needs to be private for twenty-four hours.....maybe less!!! > > After that.......it doesn't matter who knows................. > http://fractallife247.com/test/hmac_cipher/ver_0_0_0_1?ct_hmac_cipher=7cd81c0eb4f827492e1f5cd2c2b8125a66c42bd7448bc55fb1fd02051f30ca503accfe75a9e5bb0adb8eb90ae15dcc3de421c3fdf43a88853dc04a5c20a8d373327fc04cb8e3b0a8f00dd2bf577e8751eacd4239769f4980eb7b4c17d620b1b3bae1d2d48bad80b1136b47bced287007efa7d19102