Добро пожаловать, Гость. Пожалуйста авторизуйтесь здесь.
FGHIGate на GaNJa NeTWoRK ST@Ti0N - Просмотр сообщения в эхоконференции ENET.SYSOP
Введите FGHI ссылку:


Присутствуют сообщения из эхоконференции ENET.SYSOP с датами от 10 Jul 13 21:42:12 до 13 Sep 24 12:11:54, всего сообщений: 12549
Ответить на сообщение К списку сообщений Предыдущее сообщение Следующее сообщение
= Сообщение: 1922 из 12549 ====================================== ENET.SYSOP =
От   : Alexey Vissarionov               2:5020/545         11 Jan 15 15:40:40
Кому : Henri Derksen                                       11 Jan 15 15:40:40
Тема : encryption
FGHI : area://ENET.SYSOP?msgid=2:5020/545+54b26f49
На   : area://ENET.SYSOP?msgid=2:280/1208@FidoNet+050b1101
= Кодировка сообщения определена как: CP866 ==================================
==============================================================================
Good ${greeting_time}, Henri!

10 Jan 2015 13:31:00, you wrote to me:

BP>>> geeks use golded with rot13 :)
AV>> Real geeks use GOST 28147-89. Or at least Blowfish...
HD> What about ENIGMA? It is an old technique, but stil usable.

It's easily breakable (as any other polynomial cipher).

HD> But how do you secure transport a key via a unsecure route to the
HD> destination for the very first time,

Using the Diffie-Hellman key exchange algorithm, of course.

HD> without having noticed by others, i.e. NSA.

Here we have FSB: they aren't that technology-addicted, however being very professional.

HD> Because at the first time every connection is "open".
HD> And even if the information is encrypted, the link alone gives
HD> also information, like; from, to, time, date and places etc.

Connection between hosts != communication between people.

HD> Sending a key via photsteg then? A message in a bottle or via avian
HD> is also "traceable". Or if you leave a message on a paper in the
HD> waste bin of a park, and the other party picks that up is vissible
HD> to others.

Public (or improperly secured) WiFi is much more convenient, and properly configured GPG (RSA4096+Twofish+SHA2) would provide all necessary protection.

HD> Think about (ir)camera's,

Don't forget of high-power lasers. Pointing them to a camera will kill it in a several milliseconds.

HD> wearing GSM's, drones who follow you etc.

And all other Sci-Fi devices...

HD> So 100% security is not available ;-).

I'd be quite happy with 0.999999999 one - say, if no-one would be able to intercept my private communications in 100...200 years.

HD> There's always a (first) link.

You are welcome to take my public key ID from the tagline.

HD> In some ways that's good, to stop childporn for instance.

It is not, and can't be good for never reason. Once you justify privacy violation for anything, you justify it for everything.

HD> If some one wants to cath you, they will succeed ones.

So I'd like them not to want catching me.

HD> Not at every price, but some have money enough for that purpose.

For what reason?

HD> That's why terrorism is so hard to stop. 12 people died in Paris ;-(

Terrorism has nothing common with privacy (except letters "i" and "r", of course). If you want to stop terrorism, you'd better begin with stopping religious sects and reducing the tolerance.


--
Alexey V. Vissarionov aka Gremlin from Kremlin
gremlin.ru!gremlin; +vii-cmiii-cmlxxvii-mmxlviii

... GPG: 8832FE9FA791F7968AC96E4E909DAC45EF3B1FA8 @ hkp://keys.gnupg.net
--- /bin/vi
* Origin: http://openwall.com/Owl (2:5020/545)

К главной странице гейта
Powered by NoSFeRaTU`s FGHIGate
Открытие страницы: 0.075607 секунды