The National Forum   Donate   Your Account   On Line Opinion   Forum   Blogs   Polling   About   
The Forum - On Line Opinion's article discussion area



Syndicate
RSS/XML


RSS 2.0

Main Articles General

Sign In      Register

The Forum > General Discussion > Can ASIO?Police ever Crack Terrorist Cypher ?

Can ASIO?Police ever Crack Terrorist Cypher ?

  1. Pages:
  2. 1
  3. 2
  4. Page 3
  5. 4
  6. 5
  7. 6
  8. 7
  9. 8
  10. All
Bazz history is full of advances in finding ways around such things even from ww2
In time, if we can keep the PC mice out of the way we will see this in this case too
We can only hope we evolve enough to over come the thought personal freedom is or ever will be a shield used against us by people who do not believe in such things even for their own
Posted by Belly, Tuesday, 27 November 2018 4:51:36 AM
Find out more about this user Recommend this comment for deletion Return to top of page Return to Forum Main Page Copy comment URL to clipboard
Indeed Yuyutsu, messages can be embedded in such things as photographs.
At normal resolutions the characters in the photo are not visable.
However it would only take seconds for software to find the characters
in the photo. One time pads can be used to encrypt what is in the photo.
However you do know that there is a message hidden which is half the battle.
To stop anyone sending encrypted messages you would have to stop the
transmission of all binary files.
The fact that a person is sending encrypted files would be of interest
but the chances of ever being able to decrypt them because of the time
it would take, even if you guess what software was used, it would be too late.

I think the only way in would be to work out the way the program works
but having done that, you would would have to do the arithmetic in reverse.
Probably impossible !
Posted by Bazz, Tuesday, 27 November 2018 8:38:46 AM
Find out more about this user Recommend this comment for deletion Return to top of page Return to Forum Main Page Copy comment URL to clipboard
Nick, the lady uou mentioned made a gate. It is a long way from there
to a functioning computer.
Posted by Bazz, Tuesday, 27 November 2018 8:40:56 AM
Find out more about this user Recommend this comment for deletion Return to top of page Return to Forum Main Page Copy comment URL to clipboard
Bazz ( alias Xb 45-bytesize)

We can read the canberra code ( DuttonVmUpgradHelpere.exeX-Tunnel) and they know something. Would they mislead us ?
Posted by nicknamenick, Tuesday, 27 November 2018 9:10:31 AM
Find out more about this user Recommend this comment for deletion Return to top of page Return to Forum Main Page Copy comment URL to clipboard
Then there is the simple book code,
A and B have access to thousands of books, via their local libraries.
They agree on a particular book for next weeks messages, et al, page and the number of letters in from the left or right margins etc. and it's uncrackable without knowing the book; permutations are virtually endless as well.
Posted by Is Mise, Tuesday, 27 November 2018 9:33:31 AM
Find out more about this user Recommend this comment for deletion Return to top of page Return to Forum Main Page Copy comment URL to clipboard
Some OLO posters use broken English or enigmas in agw denial.
Posted by nicknamenick, Tuesday, 27 November 2018 9:37:28 AM
Find out more about this user Recommend this comment for deletion Return to top of page Return to Forum Main Page Copy comment URL to clipboard
  1. Pages:
  2. 1
  3. 2
  4. Page 3
  5. 4
  6. 5
  7. 6
  8. 7
  9. 8
  10. All

About Us :: Search :: Discuss :: Feedback :: Legals :: Privacy