Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - kmfkewm

Pages: 1 ... 204 205 [206] 207 208 ... 249
3076
Off topic / Re: The Death Lottery
« on: March 31, 2012, 08:25 pm »
I think there would be some massive issues with this. First of all, the people running it would have to be incredibly trustworthy. They could just up ship and steal the cash. And also, who nominates who gets put on there? It could easily just turn into attacking any random rich person.

Not to mention, let's say some guy bets the banker will die on 5th March 2015, and plans to kill him on that day - the bankers have the money to invest in incredible security, so first of all you'd have to get past that, and also, if the banker did get killed on that day, LE would know right where to look.

I think it would be just as successful for a group of people to go around killing bankers. If a banker was being murdered every week it would make them think twice about engaging in such malpractice, and companies would be swift to prove that they are pro-people, pro fairness and aren't in the business to scam people, as to avoid having their staff killed off.

But really what's the difference between this and terrorism?

terrorism targets innocent people this targets enemy agents

also terrorism is not real , terrorism is the propaganda word that the big forces made up to call the smaller forces to make the citizens all afraid

the number of innocent people who were killed by atom bomb makes 9-11 look like nothing, USA is the biggest terrorist force in the world

3077
Off topic / Re: What's Ketamine like? Opinions?
« on: March 31, 2012, 07:21 pm »
DXM feels like a dirtier shittier version of ketamine. I have used a lot of DXM, but after trying ketamine I entirely switched over to it. IMO ketamine is a lot like DXM, but better in every single way. Given the choice between the two I would go with ketamine every single time.

3078
Off topic / Re: What's Ketamine like? Opinions?
« on: March 31, 2012, 07:07 pm »
I think ketamine models psychosis better than any other drug does, especially on epic binges. Last time I binged on it I was hearing voices / having delusions with auditory hallucinations playing into them and thinking far out shit like I was Jesus and all kinds of crazy shit, it really fit the exact description of psychosis. And was awesome :) but not something to do forever.

It was actually not that bad, because even though I was hearing voices and hallucinating audio pretty heavily, I knew that it was not real in the back of my mind and could keep my shit together. Even though I thought I was the second coming of Jesus, I also knew that I wasn't. It was like my mind experienced vivid psychosis to the exact detail, every criteria, but like I was watching this psychosis from an isolated part of my brain that maintained sanity, almost like a split mind.

3079
Security / Re: Assistance in Technical Security
« on: March 31, 2012, 06:50 pm »
well the conclusion on this was that you are better off using OS virtualization or paravirtualization than hardware virtualization, but non virtualized hardware isolation is the clear win

3080
And it makes it far more likely for MITM attacks imo, good luck authenticating every single key with every single customer versus just posting a single static key publicly. I don't understand how a different key for each customer is supposed to protect from mitm attacks?

kmf:

We have addressed this to an extent and I would like to address our reasons for this even further. However, there are many variables involved in our theory that will take some time to explain. We do feel however many of the primary reasons why this policy reduces the chances of MITM attacks are self-evident.

Being a new vendor, we are very busy at the moment. It is however a topic we would very much like to share our theory behind, and also receive further input from the community and knowledgable members such as yourself about, at a later point when we have a little more time.

But thank you all for your input. We look forward to continuing this disscussion at a (sooner rather than later) point. :)

Peace

The Flipside Crew


Well you were wrong they are not self evident. In fact it seems self evident that your policy greatly increases the chance of MITM not being detected.

3081
(I doubt they can decrypt pgp, unless they figured out that one)..

Actually I have first hand information, for a FACT, that PGP has been broken by a US government agency
Even worse, is it was cracked way back in 2002

However along with that fact, I can tell you, that its not easy to crack even for said agency... at least of 2005 (I know nothing new past 2005)

Not to freak you out, I dont think its much to worry about in all honesty.  One problem with spying on information, is without a 'lead'.. its just TONS AND TONS AND TONS of data.. until AI is truely perfected (as in Sci-FI style, where a computer can think like a human).. its just alot of information.. ALOT of information.  Without a team of infinite monkeys to search through every last piece of information.. its actually pretty useless.  Unless they are trying to focus on ONE persons communication. ... even then you've still got this needle haystack problem.

However I have been telling people for years that PGP is not nearly as fool proof as they think it is.. only because I know for a fact, its broken.

Which PGP algorithms have been broken (after all PGP is just a suite of algorithms, it can't really be broken)? RSA? ELG? DSA? 3DES? CAST5? BLOWFISH? AES(128? 192? 256?)? TWOFISH? CAMELLIA(128? 192? 256?)? MD5? SHA1? RIPEMD160? SHA(256? 384? 512? 224?) For that matter what about the key sizes of the asymmetric algorithms? Anyway I just humor you I already know you are just trolling because you seem to think that PGP is in itself an encryption algorithm lol.

Was there a mathematic breakthrough in factoring large composite numbers into primes? Are all of the non-government cryptographers from academia in on the conspiracy? Why have you not sold this information to foreign governments, that is some pretty valuable intelligence!

Bruce Schneier said he doesn't think NSA can pwn strong crypto in response to that wired article. He thinks they can hack into computers and steal keys. He thinks they can do timing analysis and other fancy attacks to steal plaintexts and keys. Implementation is a lot more than using a good password. It is really something that must be done correctly by the person who makes the software. There are a lot of ways that implementation can be fucked up, for example in a streaming encryption program maybe it takes longer for the CPU to do one type of operation involved than another, and by measuring timing characteristics of input/output the attacker can slowly or quickly gain bits of the key (because the person who implemented it didn't make sure to use constant rate operation time set at the maximum time any of the operations could potentially take). Pseudo random number generators have a pretty established history of frequently being poorly implemented, and if your PRNG doesn't really randomly pick a number from a range it will potentially greatly reduce your keyspace (for example one PRNG always generated numbers from certain planes instead of even distribution through out the entire range, when represented in a certain dimensional space, I really don't know math well enough to talk about this though....). Also PRNGs need a random seed and entropy accumulation is not a perfected art. There are a lot of ways that encryption systems can be compromised, but the actual algorithms being compromised is pretty much the *least likely* way for modern strong encryption algorithms to be pwnt.

I talk with a few cryptographers on occasion. One of them did speculate that it is possible that some previously published attack on AES-128 was implemented by the NSA (talking about the same wired article) and that they may be able to compromise *some* things encrypted with it. I really don't know enough about crypto to even relay the highly technical things he was saying on without fucking it up, but I am pretty sure a less than ideal PRNG was a prerequisite to the attack. Bruce also said that he wouldn't be totally blown away if he found out that NSA has enough classical computing power to brute force 1,024 bit RSA keys, but he said he leans towards side channel attacks.

So in short, it still seems as unlikely as ever that NSA can directly break strong encryption algorithms, and in the worst case scenario they might be able to break a small amount of ciphertexts encrypted with AES-128 under certain circumstances, and they might be able to brute force RSA-1,024 when they want to bad enough to focus their resources on it. I guess it is possible that they made a quantum computing breakthrough, but none of the professionals seem to think this is very likely.

GPG works like this. First a PRNG is seeded with randomness and used to generate a random string. I am not sure how its entropy accumulation works but it probably hooks into the OS entropy pool cryptgenrandom on windows and /dev/urandom on unix, which are always gathering entropy from events like you moving your mouse and typing on your keyboard etc. The output from the seeded PRNG is then hashed to create a session key. Your message to whoever is then encrypted with a symmetric algorithm using the previously generated hash as the key to decrypt it, and also a randomly generated initialization vector which is used to initiate cipher block chaining mode (CBC mode) (without an IV the word "dog" will always encrypt to the same ciphertext....not good...especially since if you have an image that is black and white the black and white pixels will all encrypt into the same respective ciphertexts !..look up ECB mode....)  . The session key is then asymmetrically encrypted with whoevers public asymmetric key. The final message is then base64 encoded to make it into text that can be worked with (ie: sent through email). Then when whoever gets the block, they base64 decode it, use their passphrase as a key to decrypt their symmetrically encrypted private asymmetric key, use the private asymmetric key to decrypt the session key and then use the session key to decrypt the symmetrically encrypted message.

All that said, I could really not give a fuck less if NSA can pwn strong encryption. NSA doesn't share information with federal police except in matters of terrorism and espionage, and even then they rarely do and it seems only with FBI. Since I am not a major international terrorist, am not safe guarding foreign military secrets and am not commiting espionage against the USA or its allies, I can be pretty confident that NSA will never target me and will never share the dragnet intelligence they have gathered on me with any of my adversaries.

3082
kmfkewm,
 what are your thought on the key per customer approach as it pertains to deniability? I can't get past the thought that having a "public" key that only customer A has access to would be quite damning if public key A were found on John Smith's computer. Doesn't that kind of prove that John Smith is customer A, since nobody else has access to the custom "public" key created just for them?  now individual emails...meh I understand how that would help to cut off scam buyers to avoid spam to the main account, but it also kind of makes it easy to scam and run, by just shutting down email account B. but the public key thing seems to be a way to take away the "anyone could have sent that to me" defense.

Well it goes both ways. If they see you have a public key from a vendor who uses the same public key for every customer, they can link you to that vendor. If the vendor has a different public key for every customer, they can't link you to the vendor. But you should have your entire drive encrypted anyway. And it makes it far more likely for MITM attacks imo, good luck authenticating every single key with every single customer versus just posting a single static key publicly. I don't understand how a different key for each customer is supposed to protect from mitm attacks?

3083
Off topic / Re: help
« on: March 31, 2012, 08:23 am »
Sniff a fat line of ketamine

3084
Off topic / Re: What's Ketamine like? Opinions?
« on: March 31, 2012, 08:19 am »
Ketamine is like transforming into Jesus Christ Superman and flying through hyper-mega-space in fifteen dimensions on an urgent mission from God to fight some mysterious evil force that you can't quite identify, but then the 6th dimension bends over on itself and you break through the multiverse into a new meta-dimension where you are on a space ship that is flying at near light speed through vast empty space and then you wake up on the floor of your bathroom drooling on yourself in the fetal position and feel like somebody shot you in the gut

3085
Off topic / Re: The Death Lottery
« on: March 30, 2012, 09:40 am »
I think it is an interesting idea and would not complain about it. It was originally designed with the intention of creating de-facto anarchy, as anyone who attempted to gain political power over others would quickly have a massive anonymously payable bounty on their head. I have little doubt the people who made bitcoin were aware of assassination politics, it is quite a popular idea in certain cryptoanarchist circles that I imagine they are not far removed from. It wont work if it is run from a hidden service though, needs something more anonymous. If you make such a site it will attract attention from intelligence agencies.

3086
Off topic / Re: How old are you?
« on: March 30, 2012, 09:25 am »
what i mean is le is not using your age to profile you....

if u get busted its gonna be because someone set you up not because you fit some dea profile list....cmon really.

I understand not revealing personal information as it could incriminate you somehow..... i just dont see how a post revealing your age is gonna be the cause of your downfall! LMAO!!

Identity fingerprinting only requires a few bits of information, and is a popular way to deanonymize people (pretty much the only way that people who take strong technical precautions are located)

https://www.eff.org/deeplinks/2010/01/primer-information-theory-and-privacy

3087
Off topic / Re: How old are you?
« on: March 30, 2012, 09:17 am »
19-24

3088
Encrypting mail with GPG and using the built in encryption of SR is not the same thing. 99% chance SR is just running things out of an encrypted mounted container. Mounted is the key word here. It is pretty much worthless to use encryption in this way without also having tamper resistant systems protecting the servers memory as well as physical intrusion detection systems. Even if SR also has these systems in place, it still isn't as good considering if the server is rooted an attacker can get the messages in plaintext, unlike with GPG encrypted messages where they would need to root the clients they are interested in.

3089
Drug safety / Re: Illicit drugs that can safely be done every day
« on: March 29, 2012, 07:04 am »
Ketamine was used recreationally for decades, by some very heavy users at that, before any reports of bladder damage started to surface. It is far more likely that a by product of clandestine ketamine synthesis causes bladder damage, than ketamine actually causing it. Most ketamine is diverted from pharmacies, but at least some percentage of it is clandestinely manufactured. One friend had Chinese synthesized ketamine analyzed and it was only 80% pure, versus diverted pharmaceutical ketamine which is 99.99% pure unless it is cut.

Ketamine may cause bladder damage in a very small percentage of users with the recently reported cases being due to its increase in popularity, or it could be a by product of clandestinely synthesized batches, but when a drug has been used heavily for decades before the first reports of it causing bladder damage surface, it really must make you question things.

3090
Drug safety / Re: Illicit drugs that can safely be done every day
« on: March 29, 2012, 06:59 am »
Ketamine. Can't think of any others.
Ketamine DEFINITELY causes serious liver damage in chronic users.

[citation needed]

Pages: 1 ... 204 205 [206] 207 208 ... 249