Quote from: kmfkewm on March 16, 2013, 01:18 amActually GPG ciphertexts usually have key ID embedded in them so they don't even need to brute force decrypt the messages they can look for the messages that are encrypted to the key ID that they have by virtue of having the private key. Pretty easy to tell if a message is encrypted with a corresponding key considering that by default GPG ciphertexts have key ID they are encrypted to embedded in them. It would seem that a whole lot of people who should know this, don't know this. They think if they encrypt a file or message then nothing leads back to themselves, but if they have their public key on a keyserver or other public place then...Time for a new thread! Quote from: kmfkewm on March 16, 2013, 01:18 amUnless you have 2^128 ciphertexts on your server, that seems like it will not be very good to rely on. I've previously suggested (in combination with the 'private city' thing mentioned already) that the entire SR apparatus could easily (well, at least the idea is simple, implementation is always tricky :D) setup dummy ciphertext transmission, dummy accounts, dummy vendors (since many vendors aren't visible), dummy buyers, further frustrating the efforts of the state at getting a clean kill/take down for the press. The judges in SR cases to date are of one mind when it comes to handing down stiffer than normal sentencing as a deterrent. Seems to me they're not the only ones that can hand down a deterrent. Soundbite: Don't just launder bitcoin! Launder *everybody* :DThe result may be that the balance of negotiations between a plea and a jury favor the jury route. Plea bargaining is absurd anyway, once the jury understands that 1 out of a billion transactions on SR is credible, they'll be forced to look askance at the lot. Alternatively everybody goes inside for a thousand years since they're apparently part of a network that exceeds the GDP of Planet Earth :D Probably needs more thought, complexity can be alluring for the sake of it.Quote from: onetwothree on March 16, 2013, 02:23 amQuote from: d0z3r on March 15, 2013, 05:46 pmI would be ore interested in an app that automatically uses pgp to encrypt text messages. Preferably one that would work on both androids and iphones. I have never paid for an app before in my life but would shell out some money for an app like this.The problem is even the smallest of PGP messages/keys would take several hundred characters which means many text messages. Even if you did send it across many messages, it would probably be difficult to parse what is message and what is noise (i.e. "(3/5)" that some phones add). That is the only reason I had mine store them with a webservice.Look into steganography, or messaging hiding within images, video and other multimedia. Make your PGP message, encrypt, stick it into a container like a image file and then steg it. Better yet, do the above, and then upload it to anonymously as a torrent (e.g. the latest pirated stuff, or porn, something popular).This would make for an great app! In general I dislike the use of phones though, more trouble than they are worth on a number of levels.