The National Forum   Donate   Your Account   On Line Opinion   Forum   Blogs   Polling   About   
The Forum - On Line Opinion's article discussion area



Syndicate
RSS/XML


RSS 2.0

Main Articles General

Sign In      Register

The Forum > General Discussion > Can ASIO?Police ever Crack Terrorist Cypher ?

Can ASIO?Police ever Crack Terrorist Cypher ?

  1. Pages:
  2. 1
  3. 2
  4. 3
  5. 4
  6. Page 5
  7. 6
  8. 7
  9. 8
  10. All
Dear Bazz,

For information within a sound recording to be found, first one needs to suspect the sound-recording. Say you have 100's or 1000's of these on your computer and they all sound reasonable, then how would you come to suspect them in the first place?

Then of course, the files within can be encrypted as well, and if you are good at it, then it will be using your own encryption and embedding programs on both levels rather than commercially-available ones, then your opponent would even need to suspect that you have such a program then find where it is (which would probably reside on the cloud and even be encrypted itself).

On top of this, I would time-bomb my encryption/embedding programs, so for example they take 36 hours to download, but are automatically destroyed within 24 hours unless two different people in different locations do something positive at least once a day to tell the cloud server to keep the files.

Those who have a serious reason will go through the trouble - the rest of us will have our own files used as evidence against us for jaywalking.
Posted by Yuyutsu, Tuesday, 27 November 2018 11:28:43 PM
Find out more about this user Recommend this comment for deletion Return to top of page Return to Forum Main Page Copy comment URL to clipboard
Bazz asked the question can it be done, I answered one he never asked should it be done.
Knowing Bazz,s background he knows a bit about the subject, it will not be easy
But it is my view it can be done, may already have been
And we will never know
Posted by Belly, Wednesday, 28 November 2018 4:42:49 AM
Find out more about this user Recommend this comment for deletion Return to top of page Return to Forum Main Page Copy comment URL to clipboard
Enigma was a doddle compare to what they face today.
Bazz,
That goes without saying, it is the mentality rather than the available technology. The real kick up the prverbial is yet to come though.
Because our insipd tax system all technology has been forwarded to China to produce goods cheaply.
Now this of course has handed China every trump card except the Trump card & they now have every bit of western technology at their fingertips. Just wait for the moment when all phones, computers etc will have a built-in worm activated.
Our incompetent & greedy bureaucrats have laid us bare to this in the insidious pursuit of the $.
Posted by individual, Wednesday, 28 November 2018 6:31:08 AM
Find out more about this user Recommend this comment for deletion Return to top of page Return to Forum Main Page Copy comment URL to clipboard
Philip S & Yuyutsu,
The problem is not deciding which file to attack but the one emailed
to another person. Someone knowledgeable about what software was
available would not take long to work out which was used.
They could then mount an attack on the emailed file.
It comes back to the old story, if it takes too long the info is useless.
I do not know how vulnerable the cloud sites are but anyone monitoring
would see it uploaded.
Which gets me back to the original question, is it mission impossible ?
If so why the legislation request ?
Posted by Bazz, Wednesday, 28 November 2018 12:13:53 PM
Find out more about this user Recommend this comment for deletion Return to top of page Return to Forum Main Page Copy comment URL to clipboard
Using the book system beats all the high tech stuff and if instead of a book an agreed daily newspaper is used then there is no need to mention the method ever, sequences can be memorized etc.
Posted by Is Mise, Wednesday, 28 November 2018 5:33:13 PM
Find out more about this user Recommend this comment for deletion Return to top of page Return to Forum Main Page Copy comment URL to clipboard
Dear Bazz,

Only amateurs would send just a single file by E-mail and only amateurs would use standard encryption programs. Professionals would have a bag of tricks, including at least to send or point to heaps of large files (such as movies) that look legitimate and normal and encrypt+embed (in just one of them) their secrets using their own software, itself hidden. Also, while even professionals might disclose their secrets under torture, an enforced delay in producing the keys will allow their colleagues (in other countries) to destroy the cloud-files before they can be downloaded.

So to catch real professionals, is mission-impossible, but that's not what government wants: they want to scare the rest of us into obeyance of their laws, ordinary people whose biggest crimes could be to fail to recycle their garbage or to illegally poison a tree in their yard or a possum on their roof. Yes, the proposed legislation will indeed help the councils to book them.
Posted by Yuyutsu, Wednesday, 28 November 2018 5:43:11 PM
Find out more about this user Recommend this comment for deletion Return to top of page Return to Forum Main Page Copy comment URL to clipboard
  1. Pages:
  2. 1
  3. 2
  4. 3
  5. 4
  6. Page 5
  7. 6
  8. 7
  9. 8
  10. All

About Us :: Search :: Discuss :: Feedback :: Legals :: Privacy