Silk Road forums
Discussion => Security => Topic started by: kittenfluff on April 29, 2013, 10:00 am
-
Someone in this thread:
http://dkn255hz262ypmii.onion/index.php?topic=153092.0
Dropped a bomb:
I want you people to realize something. There is software on the market that can crack PGP. Some of you already know of it. LE has it. If Atlantis is a DEA honeypot, then even if you use PGP when transferring your personal information, they could still be saving and decrypting every single one of your messages.
I believe that Atlantis is a DEA honeypot and that the DDOS attacks are being made in order to drive users to Atlantis, where the DEA will have access to all of their communications due to the fact that they can crack your PGP.
http://www.elcomsoft.com/efdd.html
That's the software. If you put in an order over Atlantis, then they can store your PGP message and decrypt it at their leisure using this software.
By Overjoyed
:o :'(
And I shit my knickers. I had never heard of this and was ever so slightly worried someone had gotten round the P vs NP problem or some other such thing. Maybe some kind of statistical analysis... dunno... anyhow, I had a quick nose around and thought I'd post this here - there's no need to worry, but some need to alter behavior!
First, good news - public key encryption is still totally safe! You can send PGP encrypted msgs to each other without worrying about others reading it; this software does not even claim to be able to do this!
;D ;D ;D ;D ;D ;D ;D ;D
Now the bad news - apparently there are IT based hacks to obtain encryption keys from PCs running encrypted volumes/drives. AFAIK from what I've just read (links at bottom of post) their software obtains the encryption keys from memory sources in the computer; hibernation memory, memory dumps, RAM etc. Biggest weakness seems to be having your computer running or in hibernation/sleep mode. I'm going to scout about for a definitive list of how to prevent having your discs read, but it seems that LE would actually have to have your PC in their physical possession and have it running and logged in - probably if you're in that situation it's already too late :-\
Like I say, I will be looking to post better, more detailed info ASAP. But TBH I suspect that most encryption software that's effected and is open source will have new versions released that plug the loopholes.
Let me re-iterate - LE CANNOT CRACK PGP MESSAGES THAT WE SEND. THE SOFTWARE IS ONLY USEFUL FOR DECRYPTING VOLUMES/DRIVES UNDER SPECIFIC SETS OF CIRCUMSTANCES.
Check out these pages:
https://mocana.com/blog/tag/elcomsoft-forensic-disk-decryptor/
There are caveats. For example, the computer must already be running and must be able to provide a memory dump. Thus the real danger might be when the laptop is left in hibernation, when both conditions are true.
The workaround, therefore, is to not put your encrypted hard drive into hibernation, or at least unmount the encrypted drives before it slips into hibernation mode if using any of the encryption packages mentioned above.
http://it.slashdot.org/story/12/12/20/1850201/elcomsoft-tool-cracks-bitlocker-pgp-truecrypt-in-real-time
Yeah, this is really just exploiting retarded key control. The encryption standards themselves are still secure
http://community.spiceworks.com/topic/285302-would-anyone-take-this-threat-seriously-enough-to-switch-encryption-software
It says it pulls the key from a ram dump. So yes it could [work] but not in a real world environment.
https://www.informationweek.com/security/encryption/forensic-tool-cracks-bitlocker-pgp-truec/240145127
"BitLocker, PGP and TrueCrypt set [an] industry standard in the area of whole-disk and partition encryption," said ElcomSoft CEO Vladimir Katalov in a blog post. "All three tools provide strong, reliable protection, and offer a perfect implementation of strong crypto." As a result, he said that if a user of those tools picks a long, complex password, cracking the encryption container outright would likely be impossible.
-
Somebody claiming that RAM dumps are == to breaking encryption?! It must be a day ending in y.
ALL encryption systems are weak to this sort of attack. If your private keys are compromised, so is the encryption. There are techniques you can use to make this sort of attack harder to pull off, but an attacker who can do this has already severely pwnt you. Either they have gained remote access to your OS, meaning you have been hacked and pwnt, or they have physical access to your computer, meaning the police kicked your door down and they are standing next to your system. Even in these cases you are not 100% weak to this sort of attack, but given that one of these two requirements must be met for you to be weak to this attack at all, you can sleep soundly still. The biggest worry would be Atlantis (or someone who compromises SR, on the seemingly reasonable assumption that we can trust DPR) doing a MITM attack on key exchange.
-
Yeah - without access to the hard drive of the machine that generated the key, I don't think they have any way of decrypting encrypted messages...
-
I am so sick of seeing this stupid piece of software mentioned on this forum... ugh. Drives me bloody insane every time.
-
I am so sick of seeing this stupid piece of software mentioned on this forum... ugh. Drives me bloody insane every time.
Sorry, first I'd seen it. Only been let out of noob-pergatory recently....
-
There are techniques you can use to make this sort of attack harder to pull off
Presumably you're talking about TRESOR. Another reason Linux > Windows. You can hack it to make it safer, if you're competent enough to do so.
-
I am so sick of seeing this stupid piece of software mentioned on this forum... ugh. Drives me bloody insane every time.
Sorry, first I'd seen it. Only been let out of noob-pergatory recently....
Eh, it's alright... I ignore the search function too; the stupid "last search 5 seconds fuck you blah-blah" message you get half the time is just too aggravating when it takes 5 seconds just to find out it didn't work. I'm just moody today. I think I need more drugs... yes, definitely need more drugs...