HomeLatest ThreadsGreatest ThreadsForums & GroupsMy SubscriptionsMy Posts
DU Home » Latest Threads » Forums & Groups » Main » General Discussion (Forum) » Greenwald interview: NSA ...

Mon Aug 26, 2013, 12:21 PM

Greenwald interview: NSA cannot break the code on Miranda's thumb drives.

JF: [ed. note: Miranda was apparently carrying large amounts of encrypted documents and communications when stopped in Heathrow.] Why are you so confidant the world’s best code breakers can’t break the encryption in [Miranda’s] seized computers?

GG: Because I have read the documents of the world’s best code breakers, and they have talked about their inability to crack certain types of encryption.

JF: How do you think history will remember this whole affair? It is still unfolding but nonetheless, a lot has already gone down. What is Glenn Greenwald’s prediction on the historic legacy of all this?

GG: I think this will be the time the world realizes that the US and its closest allies are trying to build a surveillance system that has as its primary objective the elimination of privacy globally, by which I mean that everyone’s communications electronically will be collected, stored, analyzed and monitored by the US government.
I think it will be seen as the moment that the United States showed its true face to the world in terms of attacks on journalism and their desire to punish anyone who brings transparency.

JF: What precautions would you give to the average internet user vis-a-vis encryption?

GG: I think encryption is vital; I hope that people will use encryption in every way possible. It helps prevent intervening in their private communications, and they should definitely start using encryption.

http://truth-out.org/news/item/18402-i-wont-be-kept-out-of-my-country-for-doing-journalism-exclusive-glenn-greenwald-truthout-interview

203 replies, 38842 views

Reply to this thread

Back to top Alert abuse

Always highlight: 10 newest replies | Replies posted after I mark a forum
Replies to this discussion thread
Arrow 203 replies Author Time Post
Reply Greenwald interview: NSA cannot break the code on Miranda's thumb drives. (Original post)
Luminous Animal Aug 2013 OP
riqster Aug 2013 #1
formercia Aug 2013 #3
riqster Aug 2013 #4
pnwmom Aug 2013 #9
Recursion Aug 2013 #10
formercia Aug 2013 #42
Shivering Jemmy Aug 2013 #96
Aerows Aug 2013 #99
EOTE Aug 2013 #14
VanillaRhapsody Aug 2013 #40
Paulie Aug 2013 #51
VanillaRhapsody Aug 2013 #64
EOTE Aug 2013 #82
VanillaRhapsody Aug 2013 #85
EOTE Aug 2013 #95
VanillaRhapsody Aug 2013 #97
Aerows Aug 2013 #100
VanillaRhapsody Aug 2013 #103
Aerows Aug 2013 #105
Logical Aug 2013 #153
Aerows Aug 2013 #188
Logical Aug 2013 #192
Aerows Aug 2013 #193
Logical Aug 2013 #194
Aerows Aug 2013 #195
VanillaRhapsody Aug 2013 #164
Logical Aug 2013 #154
Logical Aug 2013 #152
Aerows Aug 2013 #187
Aerows Aug 2013 #120
Gravitycollapse Aug 2013 #160
Aerows Aug 2013 #175
Aerows Aug 2013 #177
EOTE Aug 2013 #5
Recursion Aug 2013 #8
EOTE Aug 2013 #16
Recursion Aug 2013 #19
Egnever Aug 2013 #128
Aerows Aug 2013 #136
Recursion Aug 2013 #156
riqster Aug 2013 #11
EOTE Aug 2013 #13
Aerows Aug 2013 #25
longship Aug 2013 #45
Aerows Aug 2013 #47
longship Aug 2013 #61
Aerows Aug 2013 #65
DanTex Aug 2013 #123
longship Aug 2013 #125
DanTex Aug 2013 #129
longship Aug 2013 #132
Aerows Aug 2013 #134
Aerows Aug 2013 #170
Aerows Aug 2013 #88
greiner3 Aug 2013 #89
Logical Aug 2013 #155
Recursion Aug 2013 #157
Aerows Aug 2013 #173
Xithras Aug 2013 #54
Aerows Aug 2013 #57
Xithras Aug 2013 #70
Aerows Aug 2013 #71
EOTE Aug 2013 #59
Aerows Aug 2013 #69
Leopolds Ghost Aug 2013 #130
Recursion Aug 2013 #161
Aerows Aug 2013 #167
Recursion Aug 2013 #6
riqster Aug 2013 #15
Recursion Aug 2013 #18
Aerows Aug 2013 #26
Erose999 Aug 2013 #31
EOTE Aug 2013 #34
hueymahl Aug 2013 #38
EOTE Aug 2013 #83
creeksneakers2 Aug 2013 #67
Aerows Aug 2013 #117
Recursion Aug 2013 #158
Aerows Aug 2013 #171
railsback Aug 2013 #2
Aerows Aug 2013 #178
railsback Aug 2013 #179
Aerows Aug 2013 #180
railsback Aug 2013 #181
Aerows Aug 2013 #182
railsback Aug 2013 #184
Aerows Aug 2013 #185
railsback Aug 2013 #189
Aerows Aug 2013 #191
Spider Jerusalem Aug 2013 #7
Recursion Aug 2013 #12
formercia Aug 2013 #48
Thinkingabout Aug 2013 #17
Recursion Aug 2013 #20
Aerows Aug 2013 #27
Thinkingabout Aug 2013 #72
Aerows Aug 2013 #77
Thinkingabout Aug 2013 #94
Aerows Aug 2013 #98
Thinkingabout Aug 2013 #102
Aerows Aug 2013 #109
Thinkingabout Aug 2013 #110
Aerows Aug 2013 #112
Thinkingabout Aug 2013 #113
Aerows Aug 2013 #114
Thinkingabout Aug 2013 #118
Aerows Aug 2013 #119
Thinkingabout Aug 2013 #124
Aerows Aug 2013 #126
Jamastiene Aug 2013 #145
Aerows Aug 2013 #146
Jamastiene Aug 2013 #147
Aerows Aug 2013 #148
Jamastiene Aug 2013 #149
Aerows Aug 2013 #150
Jamastiene Aug 2013 #159
Aerows Aug 2013 #183
Aerows Aug 2013 #104
Thinkingabout Aug 2013 #107
Aerows Aug 2013 #108
Thinkingabout Aug 2013 #111
Tierra_y_Libertad Aug 2013 #21
Thinkingabout Aug 2013 #22
hootinholler Aug 2013 #23
Tierra_y_Libertad Aug 2013 #24
Aerows Aug 2013 #35
Leopolds Ghost Aug 2013 #138
Aerows Aug 2013 #140
Leopolds Ghost Aug 2013 #142
NYC_SKP Aug 2013 #166
Leopolds Ghost Aug 2013 #176
Aerows Aug 2013 #29
Tierra_y_Libertad Aug 2013 #36
Aerows Aug 2013 #37
Aerows Aug 2013 #39
hootinholler Aug 2013 #46
Aerows Aug 2013 #49
Vanje Aug 2013 #141
Luminous Animal Aug 2013 #116
Warren Stupidity Aug 2013 #106
Blue Owl Aug 2013 #28
Rex Aug 2013 #30
Rstrstx Aug 2013 #41
Rex Aug 2013 #43
Rstrstx Aug 2013 #50
Aerows Aug 2013 #53
Rex Aug 2013 #56
Aerows Aug 2013 #186
Ohio Joe Aug 2013 #32
tridim Aug 2013 #33
Aerows Aug 2013 #44
backscatter712 Aug 2013 #52
Puzzledtraveller Aug 2013 #174
Aerows Aug 2013 #55
backscatter712 Aug 2013 #66
Dustlawyer Aug 2013 #58
truth2power Aug 2013 #75
Vanje Aug 2013 #143
NealK Aug 2013 #165
truth2power Aug 2013 #60
AngryAmish Aug 2013 #62
DisgustipatedinCA Aug 2013 #92
Leopolds Ghost Aug 2013 #133
War Horse Aug 2013 #63
madrchsod Aug 2013 #79
War Horse Aug 2013 #84
Aerows Aug 2013 #137
deurbano Aug 2013 #90
Whisp Aug 2013 #93
nadinbrzezinski Aug 2013 #101
madrchsod Aug 2013 #68
saidsimplesimon Aug 2013 #73
saidsimplesimon Aug 2013 #74
arcane1 Aug 2013 #76
Aerows Aug 2013 #80
arcane1 Aug 2013 #86
Aerows Aug 2013 #87
arcane1 Aug 2013 #151
Recursion Aug 2013 #163
Aerows Aug 2013 #190
Recursion Aug 2013 #196
Aerows Aug 2013 #197
Recursion Aug 2013 #198
Aerows Aug 2013 #199
Luminous Animal Aug 2013 #115
Aerows Aug 2013 #131
Recursion Aug 2013 #162
saidsimplesimon Aug 2013 #78
Aerows Aug 2013 #121
blackspade Aug 2013 #81
DevonRex Aug 2013 #91
Zorra Aug 2013 #122
Aerows Aug 2013 #127
Leopolds Ghost Aug 2013 #135
jmowreader Aug 2013 #139
Leopolds Ghost Aug 2013 #144
Aerows Aug 2013 #168
Aerows Aug 2013 #169
Puzzledtraveller Aug 2013 #172
SidDithers Aug 2013 #200
Andy823 Aug 2013 #201
dkf Aug 2013 #202
jmowreader Aug 2013 #203

Response to Luminous Animal (Original post)

Mon Aug 26, 2013, 12:23 PM

1. Hahahahaha, that is funny.

Dream on, Greenwald.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to riqster (Reply #1)

Mon Aug 26, 2013, 12:52 PM

3. Even if the NSA is able to break Strong Encryption

it will take Time and Assets to do so, thus the NSA will have to focus on important targets, rather than wasting Time with Bulk Collection.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to formercia (Reply #3)

Mon Aug 26, 2013, 12:55 PM

4. Anybody can break any encryption given time and resources.

Now, had he said "It will take them a long time to break....", he'd not have been talking out of a suboptimal orifice.

But he said what he said.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to riqster (Reply #4)

Mon Aug 26, 2013, 01:01 PM

9. Well, he's such a computer expert. He knows everything Laura taught him. nt

Reply to this post

Back to top Alert abuse Link here Permalink


Response to riqster (Reply #4)

Mon Aug 26, 2013, 01:01 PM

10. In cryptography, we usually don't call exhaustive key searching "breaking"

I mean, just forcing your way through the keyspace isn't really "breaking" the cipher (for one thing, you never really "know" you've done it if that's all you're doing); breaking it is about finding bit correlations, which (thanks to the NSA, ironically enough) we have ciphers that are impervious to.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Recursion (Reply #10)

Mon Aug 26, 2013, 02:17 PM

42. Just using a common term

I think most people get the point. Sometimes it's better not to be so smart.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Recursion (Reply #10)

Mon Aug 26, 2013, 03:56 PM

96. They aren't impervious to quantum decryption

And there is reason to think the NSA has some hardware that can do this.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Shivering Jemmy (Reply #96)

Mon Aug 26, 2013, 04:04 PM

99. #1 reason to think that they don't?

 

They have had three tries to get out in front of it, but instead, failed miserably by being shown as telling untruths to the American people.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to riqster (Reply #4)

Mon Aug 26, 2013, 01:05 PM

14. Sure. Get back to us after the few millenia it takes to crack AES-256.

Considering that there is no possibility it could be cracked in his lifetime or even his great-great-great-great-great-great-grandson's life, it's a pretty safe bet that GG said it "can't" be broken, rather than for it to take a very long time to break.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to EOTE (Reply #14)

Mon Aug 26, 2013, 02:11 PM

40. sorry but never say never...

 

in my lifetime computers have gone from room size to palm size...

Just sayin'

Reply to this post

Back to top Alert abuse Link here Permalink


Response to VanillaRhapsody (Reply #40)

Mon Aug 26, 2013, 02:24 PM

51. Unless there is a math breakthrough

The Sun will go nova before that happens.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Paulie (Reply #51)

Mon Aug 26, 2013, 02:41 PM

64. Math processing is the issue...not math

 

processing speeds have dramatically increased in the years (since the mid 80's) that I have been on computers and the Internet. You cannot even fathom what even 20 yrs of technology will bring.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to VanillaRhapsody (Reply #64)

Mon Aug 26, 2013, 03:13 PM

82. Let's assume that Moore's law remains constant another 20 years (it most likely won't).

That means that we'll have another 13 or so periods where potential processing power will double (240 months/18 months). That means that potential processing power will be about 8192 times greater than it is today. All that means is that AES 256 could potentially be cracked within a few millenia rather than a few million years using some of the best technology of the day. Using conventional computing methods, we are extremely far away from breaking AES 256. Now, if we see some breakthroughs in Quantum Computing in the next few decades, machines like that might come quite a bit closer.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to EOTE (Reply #82)

Mon Aug 26, 2013, 03:22 PM

85. still not good enough....

 

you cannot even grok what it will be and Moore's Law is no judge. Just ask the folks that sold the framework for Windows to Bill Gates. Who could have guessed?

Reply to this post

Back to top Alert abuse Link here Permalink


Response to VanillaRhapsody (Reply #85)

Mon Aug 26, 2013, 03:53 PM

95. You're right, Moore's Law IS no judge.

Moore's Law has recently been proven to be too optimistic, processors haven't been keeping pace. Again, barring some massive quantum leap in processing power (such as large scale quantum computing), AES 256 won't be crackable for a very long time. As it stands, no one needs to worry about the NSA accessing their documents if they're encrypted using AES 256.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to EOTE (Reply #95)

Mon Aug 26, 2013, 03:57 PM

97. there will be.....believe that!

 

Remember I told you so!

Reply to this post

Back to top Alert abuse Link here Permalink


Response to VanillaRhapsody (Reply #97)

Mon Aug 26, 2013, 04:06 PM

100. There will be

 

I doubt any of us will be on this message board when it happens.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Aerows (Reply #100)

Mon Aug 26, 2013, 04:18 PM

103. IRC has been around since I started...long before the WWW even existed!

 

so ...you never know...

Reply to this post

Back to top Alert abuse Link here Permalink


Response to VanillaRhapsody (Reply #103)

Mon Aug 26, 2013, 04:20 PM

105. I've been here on the WWW for nearly 25 years.

 

It will be here long after I am not. I was here when I got an upgrade for my 2400 baud modem to a 14400 and thought I was godlike.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Aerows (Reply #105)

Mon Aug 26, 2013, 10:23 PM

153. LOL, me too. I miss the old modem noise. It seemed so cool. When I got a cable modem I thought I....

 

was in heaven.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Logical (Reply #153)

Tue Aug 27, 2013, 08:02 PM

188. I will never ever take it for granted

 

when Katrina blew in and destroyed all the infrastructure for months, it was a wake up call. I have a back up for back ups, these days.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Aerows (Reply #188)

Tue Aug 27, 2013, 09:00 PM

192. I bet. n-t

 

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Logical (Reply #192)

Tue Aug 27, 2013, 09:09 PM

193. I think I've griped and moaned

 

in every way possible about how horrible it was, but it taught me some things.

And I *still* wouldn't want to go through it despite what it taught me because it sucked ass for weeks on end. I was thrilled when I got my first taste of Taco Bell 5 months after the storm hit, and I still had to go 30 miles to get it. That's how bad it sucked.

When you realize how damn much you love milk, can't get it except in tiny quantities, that's pretty much when you know how bad it sucked.

When you celebrate that you can finally flush a toilet? It's like Christmas and you run around flushing all of them just because YOU CAN. That's how you know it sucked.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Aerows (Reply #193)

Tue Aug 27, 2013, 09:15 PM

194. I know how much I take for granted.....

 

and have never lost it. I can imagine how eye opening it must be.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Logical (Reply #194)

Tue Aug 27, 2013, 09:20 PM

195. I will never take running water

 

and flushing a toilet for granted -ever- again.

But I'm also steel-spined enough to actually ride out a disaster, all that comes with it and rebuild, while bitching about it incessantly.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Aerows (Reply #105)

Tue Aug 27, 2013, 12:00 AM

164. So have I....

 

900 baud in fact...I was one of damn few females with the hobby back then....

could we even think then that such powerful computer processors would be in the very pockets of most people as they are now?

Reply to this post

Back to top Alert abuse Link here Permalink


Response to VanillaRhapsody (Reply #97)

Mon Aug 26, 2013, 10:23 PM

154. Well, you are really wrong on this. But I love the confidence. n-t

 

Reply to this post

Back to top Alert abuse Link here Permalink


Response to VanillaRhapsody (Reply #85)

Mon Aug 26, 2013, 10:21 PM

152. " Just ask the folks that sold the framework for Windows to Bill Gates"? What the hell....

 

does that mean?

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Logical (Reply #152)

Tue Aug 27, 2013, 08:00 PM

187. I wondered.

 

I didn't take too much time trying to figure it out, but if you get an answer that is intelligible, let me know LOL.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Paulie (Reply #51)

Mon Aug 26, 2013, 05:40 PM

120. I'm going to wave, too

 

get back to me when you have the computing power of a star, sitting in a black hole vacuum to cool it.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to riqster (Reply #4)

Mon Aug 26, 2013, 11:34 PM

160. "...given time and resources..." - Not exactly a true statement.

http://en.wikipedia.org/wiki/Landauer%27s_principle

http://en.wikipedia.org/wiki/Brute-force_attack#Theoretical_limits

There is a physical argument that a 128-bit symmetric key is computationally secure against brute-force attack. The so-called Landauer limit implied by the laws of physics sets a lower limit on the energy required to perform a computation of kT · ln 2 per bit erased in a computation, where T is the temperature of the computing device in kelvins, k is the Boltzmann constant, and the natural logarithm of 2 is about 0.693. No irreversible computing device can use less energy than this, even in principle.[2] Thus, in order to simply flip through the possible values for a 128-bit symmetric key (ignoring doing the actual computing to check it) would theoretically require 2128 − 1 bit flips on a conventional processor. If it is assumed that the calculation occurs near room temperature (~300 K) the Von Neumann-Landauer Limit can be applied to estimate the energy required as ~1018 joules, which is equivalent to consuming 30 gigawatts of power for one year. This is equal to 30×109 W×365×24×3600 s = 9.46×1017 J or 262.7 TWh (more than 1/100th of the world energy production).[citation needed] The full actual computation – checking each key to see if you have found a solution – would consume many times this amount.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Gravitycollapse (Reply #160)

Tue Aug 27, 2013, 01:30 PM

175. "The full actual computation - checking each key to see if you have found a solution"

 

Would definitely take many more times that amount, because it doesn't take into account necessary maintenance of the machine, downtime due to excessive heat, and backup to store the keys that were non-functional while the machine was down for necessary maintenance.

I love efficient hardware probably more than is healthy, but even in the best case scenario, you have to always add at least 5% downtime/suboptimal functionality to any box on the planet at BEST. That's provided that there never is a hardware failure or a power interruption. Or that you need to move it somewhere in it's 20 year life span. Or that it's rack needs to be re adjusted. Or that it's switching interface died. Or that it got too cold one day in the server room, or too hot.

All of that shit happens.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Gravitycollapse (Reply #160)

Tue Aug 27, 2013, 07:17 PM

177. Cool that you thought about it and explained it like I did.

 

There are some things that it takes about 10 people to explain so that people GET IT. Particularly when they are invested in not understanding and not getting it as a function of their profession.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to riqster (Reply #1)

Mon Aug 26, 2013, 12:56 PM

5. What information do you have that some of the world's smartest security experts don't?

AES-192 and AES-256 will remain pretty much crack proof for a rather long time to come. 2^256 is an almost incomprehensibly large number.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to EOTE (Reply #5)

Mon Aug 26, 2013, 12:59 PM

8. Assign a key to every atom in the universe

And you still are talking about maybe 1/3rd of the keyspace

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Recursion (Reply #8)

Mon Aug 26, 2013, 01:07 PM

16. I guess we'd need to use more than one universe. nt

Reply to this post

Back to top Alert abuse Link here Permalink


Response to EOTE (Reply #16)

Mon Aug 26, 2013, 01:17 PM

19. Quantum Shmantum

That would be cool, though.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Recursion (Reply #8)

Mon Aug 26, 2013, 07:47 PM

128. Well there's a bs claim

 

We don't even know how big the universe is let alone how many atoms in it.

" target="_blank">

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Egnever (Reply #128)

Mon Aug 26, 2013, 08:05 PM

136. "We discovered

 

that we occupy a tiny place in the heavens."

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Egnever (Reply #128)

Mon Aug 26, 2013, 11:23 PM

156. We've got some pretty good upper and lower bounds

Reply to this post

Back to top Alert abuse Link here Permalink


Response to EOTE (Reply #5)

Mon Aug 26, 2013, 01:01 PM

11. Nothing is "crack proof". As you yourself say,

It's just a matter of time.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to riqster (Reply #11)

Mon Aug 26, 2013, 01:02 PM

13. It IS currently crackproof.

All of the worlds computers could be working in concert and it would STILL take thousands of years to crack AES-256. So, for all intents and purposes, it IS uncrackable.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to riqster (Reply #11)

Mon Aug 26, 2013, 01:46 PM

25. A "matter of time"

 

is rather relative. If there is no back door to AES-256 encryption, which is highly unlikely but could be possible as a very long shot, breaking it even with GPU's, which far eclipse CPU's in parallel processing necessary to brute force a key, you are looking at maybe your children's children getting it. And that's with intelligent algorithms and Moore's law on GPU's.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Aerows (Reply #25)

Mon Aug 26, 2013, 02:17 PM

45. No back door to public key encryption.

The mathematics is well known and actually kind of simple.

It depends on mathematical functions that are one way, lacking an analytical solution to the inverse function except for exhaustive search.

If the key space is large enough there is not enough computer resources on the planet to crack the code in any reasonable amount of time.

Since the mathematics is fairly simple, usually depending on the product of very large prime numbers -- finding prime factors is not analytically solvable, the algorithms are fairly simple as well. The security is inherent because the functions are designed to be one way trap doors.

Many encryption programs are released in open source which cannot credibly be claimed has back doors. If there were the hundreds of programmers all over the world working on these programs would be aware of it. If you believe there are back doors, get the source code yourself and point it out.

And No! Strong encryption -- available on any home computer -- is not crackable either. So, it's secure.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to longship (Reply #45)

Mon Aug 26, 2013, 02:21 PM

47. Every mathematician and every CS geek

 

has searched for one, and as I said, it's a very long shot. I should have said to the nearest black hole long shot.

I've inspected and compiled the source, and like you, I know there isn't. I always leave the door open for the possible, no matter how out of this world improbable it is.

Practically speaking, though, I agree.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Aerows (Reply #47)

Mon Aug 26, 2013, 02:38 PM

61. Correct.

It would be easier to find security holes in the protocols than sneak in a back door. But as you point out, CS majors and such are ever tightening up those protocols and eliminating those holes.

In short, I am pretty damned sure that strong encryption is fairly impervious to systematic attacks. The math isn't that complex; it's number theory after all. (Integer arithmetic, for those who don't know.) It works because things like factoring very large numbers has no analytic solution.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to longship (Reply #61)

Mon Aug 26, 2013, 02:42 PM

65. We're on the same page

 

If it could have been done, it would have been done long ago, and protocol exploits to get to the machine data storehouse that has the clear data is far easier than cracking it once it gets anywhere.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to longship (Reply #45)

Mon Aug 26, 2013, 06:02 PM

123. Minor correction.

It's true that there is currently no efficient factoring algorithm, and it is probably true that there will never be one, at least until quantum computers become workable.

However, there is no proof that factoring can't be solved efficiently. The only "proof" is that people have been trying to find an algorithm for ages and haven't been able to. Then again, people have also been trying for ages to prove that factoring can't be solved efficiently, and they haven't been able to do that either.

Still, I agree with you. For practical purposes, public key encryption is unbreakable.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to DanTex (Reply #123)

Mon Aug 26, 2013, 07:00 PM

125. Granted.

But as you point out, there's no reason to expect that such a reverse solution exists. And that's exactly why these particular algorithms are chosen for implementing the trap door.

But I stand corrected. You are of course correct.

I grovel at your feet and beg forgiveness.



Reply to this post

Back to top Alert abuse Link here Permalink


Response to longship (Reply #125)

Mon Aug 26, 2013, 07:48 PM

129. I wouldn't be much of a math nerd if I didn't nitpick about technicalities...


Reply to this post

Back to top Alert abuse Link here Permalink


Response to DanTex (Reply #129)

Mon Aug 26, 2013, 07:51 PM

132. Me neither.

But as a former math teacher I understand people's resistance. I dumb things down a bit to make it easier while still getting the point across.

But sometimes pedantry is called for. It certainly isn't objectionable.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to longship (Reply #132)

Mon Aug 26, 2013, 07:58 PM

134. None of us would be

 

Math nerds aren't the most efficient of folk, but we are the most explicit of folk, and do expend our resources.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to DanTex (Reply #123)


Response to riqster (Reply #11)

Mon Aug 26, 2013, 03:35 PM

88. Try this one

 

The!quick@brown#fox$jumps%over^the&lazy*dog(

Easiest sentence in the world to remember, as are the spacers. You just have to know what those spacers are and that sentence is.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to riqster (Reply #11)

Mon Aug 26, 2013, 03:35 PM

89. As of 2011, the top 10 uncrakced codes and/or cyphers are;

 

" 1. The Phaistos Disk is considered the most important example of hieroglyphic inscription from Crete. Discovered in 1903, both sides of the clay disc are covered with hieroglyphs arranged in a spiral zone, impressed on the clay when it was damp. Forty five different types of signs have been distinguished, of which a few can be identified with the hieroglyphs in use in the Proto- palatial period.

2. Linear A is one of two linear scripts used in ancient Crete discovered and named by Arthur Evans. Linear B was deciphered in 1952 by Michael Ventris and was used to write Mycenaean Greek. Linear A is partially understood but parts of it produce works unrelated to any known language.

3. Kryptos is a sculpture by the American artist James Sanborn, located on the grounds of the Central Intelligence Agency in Langley, Virginia. Since its dedication in 1990, there has been much speculation about the meaning of the encrypted messages it bears.

4. Chinese Gold Bar Cipher. In 1933, seven gold bars allegedly issued to a General Wang in Shanghai, China. These gold bars, which contain pictures, Chinese writing, some form of script writing, and cryptograms in Latin letters, appear to represent metal certificates related to a bank deposit with a U.S. Bank and the Chinese writing has been translated, and discusses a transaction in excess of $300,000,000."

http://www.telegraph.co.uk/news/newstopics/howaboutthat/8293375/Top-10-uncracked-codes.html

Alan Turing allegedly built the first computer in order to break the German's code used in WWII recently made famous in the movie U-571.

If the Germans had not been so methodical, the code may never have been broken, but hooray for our side, there was this one lapse of anal retentiveness.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to greiner3 (Reply #89)

Mon Aug 26, 2013, 10:26 PM

155. Interesting, thanks for posting. n-t

 

Reply to this post

Back to top Alert abuse Link here Permalink


Response to greiner3 (Reply #89)

Mon Aug 26, 2013, 11:26 PM

157. Nobody's even sure if the Voynich manuscript is actually a code

Some people think it's just complete gibberish written by a quack to impress his patients.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Recursion (Reply #157)

Tue Aug 27, 2013, 11:54 AM

173. And it isn't like that hasn't happened before

 

in history. But typically, when people go to extremes to ensure data, it usually has high-value.

At this point, anyone claiming that Snowden does not possess high-value data is an idiot, naive, or both.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to EOTE (Reply #5)

Mon Aug 26, 2013, 02:29 PM

54. You rarely need to brute force the entire keyspace to crack AES-256

A dictionary attack using all known words in common languages, including all possible spelling variations (including l33t), word combinations, capitalization variations, injected numbers, potential reversals, etc., etc., will break 95% of encrypted documents using a key count in the tens of billions. That still sounds like an incredibly large number, but the NSA has the equipment to crack that relatively quickly.

256-bit AES is only "uncrackable" if your password looks like this:
6D4;502e44412e33694@3a445d752G53225c2^7e3821274a4E5d5e7d70+

A typical password, created by a user trying to come up with something "complicated, will look like this:
"E$t@c0ntRa$eñA3smVyD|fí<il"
("this password is very hard", in a foreign language, using random casing and character replacement).

Most people want passwords that they can remember, which typically means words, names, or numbers that have meaning to them. This narrows the keyspace to a more manageable subset of possible keys. That first password could take a hundred million years to crack. I'd be shocked if it took the NSA two days to crack the second.

The weakness in AES isn't the technology, but the humans who use it.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Xithras (Reply #54)

Mon Aug 26, 2013, 02:36 PM

57. Rainbow tables and arrays

 

make things easier, but there are ways of making it a hell of a lot harder. Just one salt can make a difference. Distributing the salt throughout the pw with a pattern only known to a few can make it worse - it becomes easy to know the password, but without the correct salt, hard to break. It seems naive that Snowden and company wouldn't know this.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Aerows (Reply #57)

Mon Aug 26, 2013, 02:48 PM

70. Yes, salting can be an effective countermeasure.

IF the user bothers to actually use it and generate a useful salt. In my experience, most don't.

Most security problems can be directly attributed to user laziness. Encryption is no different.

And even when the user is paying attention, there's always the rubber hose method.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Xithras (Reply #70)

Mon Aug 26, 2013, 02:49 PM

71. We aren't talking about average users in this case, though

 

We are talking about people that probably gave a great deal of thought to it, considering who they work for. And then left for Russia so they can't be rubber hosed.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Xithras (Reply #54)

Mon Aug 26, 2013, 02:37 PM

59. Most strong passwords WOULD look like that.

But let's assume he chose a 256 bit encryption key that's solely comprised of commonly used words and phrases. Well then, maybe all of the world's computers working in concert would be able to find the encryption key within a hundred or so years instead of millions.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to EOTE (Reply #59)

Mon Aug 26, 2013, 02:48 PM

69. Put in a key within the password

 

in that you distribute, say, a number within a few characters of the password on an ultra-long. You not only have to know the password, you have a salt, too. That's about as easy to remember as tying your shoes if it is something like a birthday distributed, say, over every 3 characters of a bunch of easy words to remember to separate them.

Johnny1Likes2granny3smith4apples5to6go7with8his9pancakes

Hard to remember? Not really. Hard to brute-force? Incredibly.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Xithras (Reply #54)

Mon Aug 26, 2013, 07:50 PM

130. Doesn't include gibberish words that only the encryptor remembers.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Xithras (Reply #54)

Mon Aug 26, 2013, 11:37 PM

161. Except often the passcode you type in just unlocks the actual key

with no indication of success or failure except whether or not the final decryption makes sense. So you're (conceivably) shrinking the keyspace at the cost of greatly increasing the time per trial.

Though this gets somewhat into the weeds of what particular system he's using.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Recursion (Reply #161)

Tue Aug 27, 2013, 11:13 AM

167. In the weeds

 

but really what is the reality of what strong encryption is about. You can decrypt, and still have gibberish because there are layers of encryption. It's like the old Russian eggs with an egg holding a smaller egg, holding yet another smaller egg until you get to the real thing.

And it's not really in the weeds. It's causing more time to be used to decrypt. Reverse engineering to rebuild data blocks would be so ugly that it is more time consuming than pure decrypting, but then decrypting becomes worse than just finding the person, beating the hell out of them and getting the keys.

It's truly no surprise why Snowden fled and why they want to get their hands on him personally.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to riqster (Reply #1)

Mon Aug 26, 2013, 12:59 PM

6. If it's a big enough keyspace, he's right

With a good block cypher and a long enough key we're talking "more combinations than there are atoms in the universe" kind of stuff.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Recursion (Reply #6)

Mon Aug 26, 2013, 01:05 PM

15. But one does not have to try an infinite number of combinations

Indeed, the chances of getting anywhere near the theoretical maximum before cracking the cipher are remote.

The theory says it'll take forever. But redo life is different.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to riqster (Reply #15)

Mon Aug 26, 2013, 01:16 PM

18. Model it as a Bernoulli process

At 1,000,000 attempts per second, each having 2^-256 p of success, my cocktail napkin calculation tells me E(t) for hitting the correct key is several trillion years.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Recursion (Reply #18)

Mon Aug 26, 2013, 01:47 PM

26. I believe he is thinking intelligent algorithms

 

and rainbow tables. Even with those you are looking at 100 years.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Recursion (Reply #18)

Mon Aug 26, 2013, 01:57 PM

31. Thats supposing you don't hit it on the 1,210th try thru dumb luck, lol.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Erose999 (Reply #31)

Mon Aug 26, 2013, 02:00 PM

34. Sure, you could even hit it on the first try.

Your chances are a good deal better of winning Powerball a good 30 or so times in a row, but it could happen.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to EOTE (Reply #34)

Mon Aug 26, 2013, 02:07 PM

38. I appreciate your input on this

It's hard for most folks (myself included), to comprehend numbers this large. One of the reasons lotteries make so much money, but I digress.

Your examples are spot on. Thanks.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to hueymahl (Reply #38)

Mon Aug 26, 2013, 03:15 PM

83. Sure thing, any time.

I have a very hard time comprehending numbers of that size as well. I just know that numbers like that are several orders of magnitude beyond the point where my head begins to spin. There are really no practical applications for numbers of that size unless you are speaking of encryption keys or in terms of the total number of particles in the universe.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to riqster (Reply #15)

Mon Aug 26, 2013, 02:46 PM

67. Do the odds change

if they know what they are looking for? They could use common terms from the documents. Maybe some of them even have letterhead.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to creeksneakers2 (Reply #67)

Mon Aug 26, 2013, 05:19 PM

117. That relies on the random element of the human beings doing encryption

 

to use passwords found in the documents. No one with any sense would. They would just do a long string sentence broken up with symbols and numbers so that it is easy to remember, but hard to crack.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to creeksneakers2 (Reply #67)

Mon Aug 26, 2013, 11:28 PM

158. No

There's no partial decryption of a modern block cipher; every part of the document is mixed in with every other part.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Recursion (Reply #158)

Tue Aug 27, 2013, 11:49 AM

171. And if you pad it, too

 

it's a pretty impossible task.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Luminous Animal (Original post)

Mon Aug 26, 2013, 12:31 PM

2. Greenwald is seriously ate up

 

Yet people STILL believe him.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to railsback (Reply #2)

Tue Aug 27, 2013, 07:22 PM

178. I'm not sure about your definition of "ate up" but if you believe

 

he is dealing with encryption at amateur levels, I suggest that you are probably not as aware of how encryption works as many are. It's nice to try to play him as an idiot, though. It helps everyone sort out them very easily. .

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Aerows (Reply #178)

Tue Aug 27, 2013, 07:26 PM

179. Do you really think those massive buildings going up are to house hard drives?

 

Ever see the size of a D-Wave and the amount of space it needs to keep cool?

Yes, certainly is amateur hour.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to railsback (Reply #179)

Tue Aug 27, 2013, 07:31 PM

180. I think there is amateur hour, and then there is

 

... really amateur hour. Railsback, you are playing in the wrong schoolyard if you think that is going to convince and sway.

Truly, hon. Try harder, though.

It is entertaining.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Aerows (Reply #180)

Tue Aug 27, 2013, 07:33 PM

181. Ah, so you have no idea what a D-Wave is

 

Why not just say so instead of looking ridiculous?

Reply to this post

Back to top Alert abuse Link here Permalink


Response to railsback (Reply #181)

Tue Aug 27, 2013, 07:39 PM

182. I have no need to prove myself.

 

I have done so many times over. But I think you have failed, and are grasping on every single shred of illusion to keep from drowning in ridicule.

Nothing will save you from yourself, after all, since you realize you don't really know what you are claiming you know. That's where it starts and where it ends.

Once you get over that, you put on the big boy/girl pants and start being a real IT professional.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Aerows (Reply #182)

Tue Aug 27, 2013, 07:53 PM

184. Good Gawd

 

Tom Brady is a professional quarterback. So is Tim Tebow. One is brilliant, one sucks bad… but both are professional quarterbacks. I deal with corporate 'pro' graphic designers who don't even know how to use channels in PS. They, too, toot their own horns. Believe me, its a common problem.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to railsback (Reply #184)

Tue Aug 27, 2013, 07:56 PM

185. So, Tim Tebow, are you?

 

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Aerows (Reply #185)

Tue Aug 27, 2013, 08:08 PM

189. toot!

 

Reply to this post

Back to top Alert abuse Link here Permalink


Response to railsback (Reply #189)

Tue Aug 27, 2013, 08:13 PM

191. Get him to write the encryption codes beneath...

 

oh wait. He sucks so bad as a quarterback, they would use a high school student. Why doesn't he just play tight end, a position he would be good at? Oh wait. Egotistical to the point of detriment of his team by not playing in a position that he would be good at.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Luminous Animal (Original post)

Mon Aug 26, 2013, 12:59 PM

7. If it's encrypted with 256-bit AES, they can't

 

or rather, they can't do it in any kind of reasonable time.

50 supercomputers that could check a billion billion (10¹⁸ ) AES keys per second (if such a device could ever be made) would, in theory, require about 3×10⁵¹ years to exhaust the 256-bit key space.

http://en.wikipedia.org/wiki/Brute-force_attack#Theoretical_limits

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Spider Jerusalem (Reply #7)

Mon Aug 26, 2013, 01:02 PM

12. And twofish and blowfish take even longer

(Those are what I use, personally)

Reply to this post

Back to top Alert abuse Link here Permalink



Response to Luminous Animal (Original post)

Mon Aug 26, 2013, 01:11 PM

17. Yada Yada Yada, what the hell, since the files was stolen from NSA who would they think would not be

Able to break the code. It has probably furnished the key information from what the data was to what it is now, it would be easy to break the code. Again GG tried to play with the big boys and again he has been played. Someone needs,to put up the money for him and his gang to go to basic spy school, maybe then he will not be caught making dumb statements like this one. Mark another untruth up to GG, integrity down even more.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Thinkingabout (Reply #17)

Mon Aug 26, 2013, 01:19 PM

20. No, he probably just used openssl

It's good stuff, that.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Thinkingabout (Reply #17)

Mon Aug 26, 2013, 01:49 PM

27. You mistake encryption after the fact

 

for encryption done before the acquisition of the documents. After the fact, it's not in the hands of the NSA anymore.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Aerows (Reply #27)

Mon Aug 26, 2013, 02:50 PM

72. Are you kidding me? They know every key stroke Snowden made while her husband as at NSA, they

Know the files he stole, they will break the code using both the encrypted and the files and then they will have the code they need for future reference.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Thinkingabout (Reply #72)

Mon Aug 26, 2013, 02:57 PM

77. I believed that up until the 3rd press conference.

 

Then I realized that they have no clue, because getting in front of this story didn't work. Now they are doing a disinformation campaign (hiring Cass Sunstein) and having the UK try to pass information off to the Independent in hope that they report erroneous things to shield the GCHQ. They can shout - Bad data! must be wrong!

Truth is, the trust has been shattered, and trying to generate more false information is going to end with all agencies involved look like liars and untrustworthy mouthpieces to the government than they already do. It's going to harm the newspapers. How long before they get tired of not making a profit because they are no longer credible due to being force fed erroneous information?

Oh, I'm sorry, my friend, but this genie is very much out of the lamp, and shoving toothpaste back in the tube has never worked very well.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Aerows (Reply #77)

Mon Aug 26, 2013, 03:52 PM

94. Since i have not seen frequent news reports out of the NSA in the years they have been in operation

It does not surprise me we are not seeing frequent news articles written. They are in the security business and nit the news reporting business. I don't know why it is important to put the toothpaste back in the tube which came out in 2005. The NSA should just sit back and let GG and his cronies do whatever they choose and continue to do the work needed by the NSA. All the reporting has not convinced me there is a problem except for some to make a mountain out of an ant hill.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Thinkingabout (Reply #94)

Mon Aug 26, 2013, 03:59 PM

98. You mistake me

 

The three news conferences by the President, and all the other ones attempting to placate the American public that they aren't being spied upon.

Each time, their talking points have been decimated as blatant untruths. That's why I know they really don't know.

Funny you should mention a mountain and an ant hill, when it is usually a mountain and a mole hill.

This really is a Mountain of an fire-ant hill, and a lot of people have tried sitting on it to make it stop.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Aerows (Reply #98)

Mon Aug 26, 2013, 04:15 PM

102. Yes I know about the mountain out of a mole hill but an ant hill but a regular ant hill is smaller

Than a mole hill, just to put a more proper perspective on this situation.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Thinkingabout (Reply #102)

Mon Aug 26, 2013, 04:41 PM

109. I guess you aren't familiar with fire-ant hills

 

smaller, but one hell of a lot worse. You must not be from the US.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Aerows (Reply #109)

Mon Aug 26, 2013, 04:49 PM

110. Guess I am familiar with fire ant hills, are you familiar with common red a t hills. Which is

Smaller?

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Thinkingabout (Reply #110)

Mon Aug 26, 2013, 05:01 PM

112. Where are you from with red ants that don't sting?

 

Not the US.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Aerows (Reply #112)

Mon Aug 26, 2013, 05:05 PM

113. I was referring to the size of the ant hills, the common red ant hill is small and shallow,

Fire ant hills are large and go very deep.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Thinkingabout (Reply #113)

Mon Aug 26, 2013, 05:08 PM

114. Like this?

 

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Aerows (Reply #114)

Mon Aug 26, 2013, 05:29 PM

118. would you say the common ant hill is larger or smaller than fire ant hill?

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Thinkingabout (Reply #118)

Mon Aug 26, 2013, 05:36 PM

119. I'm asking if that is a common ant hill

 

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Aerows (Reply #119)

Mon Aug 26, 2013, 06:13 PM

124. Not in my area but this is a classic example of making a mountain out of an ant hill.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Thinkingabout (Reply #124)

Mon Aug 26, 2013, 07:40 PM

126. What is your area, which Indian province do you hale from, sir?

 

We could be neighbors and friends.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Aerows (Reply #114)

Mon Aug 26, 2013, 09:17 PM

145. That doesn't look like a red imported fire ant hill.

Red imported fire ant hills aren't very tall on the surface, but go deep into the ground.

Also, I would advise anyone not to try to sit on one, or even stand on one. I stood near one for too long and learned I can strip nekked in the yard and put an ice cube directly on my skin and still feel like I was on fire with the fires of hell, lol.

Red imported fire ants don't play. They mean business when they bite and sting, which is what they do. They bite first to hold on, then sting and hang on so they can continue to pump venom as long as it takes to make you know you got to close to their colony. They are vicious little shits. I have zillions of them in the yard.

P.S. Thank you for this informative sub-thread. I have learned a lot reading it. There is still a lot I don't know, but wow, this thread was great reading.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Jamastiene (Reply #145)

Mon Aug 26, 2013, 09:19 PM

146. Imported

 

Where are you, my dear? Refresh my memory... I'm sorry, I knew where you live, but I can't remember.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Aerows (Reply #146)

Mon Aug 26, 2013, 09:22 PM

147. North Carolina

Our red imported fire ant hills aren't quite that tall. Of course, we do have a local, native fire ant, plus the red imported fire ants here. I've seen pictures of them that are different out west though, more like in your picture. They seem to be a bit more entrenched out west and their mound structures are different too.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Jamastiene (Reply #147)

Mon Aug 26, 2013, 09:24 PM

148. I'm in the Deep South

 

where they just form up in balls and float to sting you if there is a flood.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Aerows (Reply #148)

Mon Aug 26, 2013, 10:00 PM

149. Ouch!

I've seen videos of how they will form little rafts with their bodies to keep their queen and young safe during floods. They are amazing little ants, if you can find a way to observe them without pissing them off at you. You'll catch hell from them if you get too close and they sense you staring too long.

I'm in that little strip of NC that has what they call ultisols, aka red clay. That stuff is sloshy and icky red when it is wet and turns really really hard almost like concrete when it is dry.
https://en.wikipedia.org/wiki/Ultisols

I'm surprised the fire ants can manage to build anything in that stuff, but parts of the Deep South has a lot of ultisols too, doesn't it?

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Jamastiene (Reply #149)

Mon Aug 26, 2013, 10:07 PM

150. It's either sand or dark earth where I am on the coast

 

You don't really have much clay here. Jacksonville, FL had more clay than we do. It's a very odd geological situation where I am. We are on high ground, but less than a mile from the Gulf.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Aerows (Reply #150)

Mon Aug 26, 2013, 11:34 PM

159. I see.

I hope you are well outside of the flood plain, but y'all have the worst hurricanes too. Our hurricanes in NC have been sparse the last few years. Most of them have headed to the Gulf. The flood from just rain has been higher than usual in NC this year. I live near a deep pond, but I am on high ground, outside of the flood plain. Still, when it rains, my front yard looks a little like this:

It is not quite that bad now, because I have been working with it, trying to get centipede grass there to cut down on the slushy mess and erosion. It's much better now than it was, but still a slushy mess when it rains.

That could be one reason the fire ants here build lower to the ground. Another reason is that bedrock is only a few inches down, according to one guy who does work for me here. He knows about that stuff and says he hit pure bedrock very close to the surface. The fire ants have the clay and that to deal with.

I tried to plant an azalea here and it bent my spade. I was so proud. I had oiled the handle of that spade and used it for more than 20 years with no problems. I had grown up with crappy gardening tools that had been left outside and not treated. So, it was my first spade that my own. It was just my size, a little shorter than the usual length spade.

P.S. That picture is from the Wiki page on ultisols (red clay), not my actual front yard. It's just an example of how that stuff looks when it rains. I wanted to make that a little clearer. This is the page I got it from:
https://en.wikipedia.org/wiki/Ultisols

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Jamastiene (Reply #159)

Tue Aug 27, 2013, 07:53 PM

183. I'd show you pictures of what it looked like after Katrina

 

But we pretty much were without electricity, huddled together in bathtubs with our cats and thankful to be alive.

I'm serious. It was that bad. I don't ever want to be in the bathtub with my cat, hearing the walls BREATHE like they would implode, praying we would survive.

The eye passed over my geographic location. I was scared shitless, and I am unashamed to say so. Have a hurricane of that magnitude pass over your house, while you have your pets huddled in the safest place in your home while you feel the walls contract and expand and see if it isn't nearly a religious experience.

I survived no electricity for a month, and no water for 6 weeks. And I was thankful that I was alive and so were my family members and pets.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Thinkingabout (Reply #72)

Mon Aug 26, 2013, 04:19 PM

104. And wait a second... here

 

Snowden, *her* husband? Uh, what? Surely you didn't mean to slur Snowden in such a homophobic manner with this post. *Her* Husband?

Greenwald is a male. Snowden is a male. Greenwald's husband is a male. Who in the hell are you talking about/what are you talking about?

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Aerows (Reply #104)

Mon Aug 26, 2013, 04:32 PM

107. That would be an autocorrect not intended, you know sorta like a typo.

Unintended error, it happens.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Thinkingabout (Reply #107)

Mon Aug 26, 2013, 04:34 PM

108. Where did the "husband" come in?

 

I see "he" "her" but not "her husband".

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Aerows (Reply #108)

Mon Aug 26, 2013, 04:51 PM

111. It was changed by auto correct, i did not type husband.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Luminous Animal (Original post)

Mon Aug 26, 2013, 01:25 PM

21. Memo to NSA: Snowden copied the files. You already have them. You don't need to break a code.

 

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Tierra_y_Libertad (Reply #21)

Mon Aug 26, 2013, 01:28 PM

22. Broken code to be used in the future.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Tierra_y_Libertad (Reply #21)

Mon Aug 26, 2013, 01:31 PM

23. Actually if they want to know which ones are on the disk, they do. n/t

Reply to this post

Back to top Alert abuse Link here Permalink


Response to hootinholler (Reply #23)

Mon Aug 26, 2013, 01:42 PM

24. So they can run a spellcheck on them before some whistle blower relaeases them?

 

I guess it would be embarrassing to let people see grammatical errors and bad punctuation on Ultra Top Secret Eyes Only files.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Tierra_y_Libertad (Reply #24)

Mon Aug 26, 2013, 02:00 PM

35. No, for reverse engineering

 

and the true panic is the fact that they have no idea what he has. That way, they can't get out in front of the story, which is what has repeatedly messed them up during this. That's also why slow release has been so effective - authorities say one thing, a week later he proves that they've lied.

I'd make CERTAIN to wad up extraneous data in the middle of it, just to keep them guessing and to make sure reverse engineering isn't possible. Kind of like wrapping individual balls of items as you ship them so that they don't get broken, and it's impossible to know where the actual item starts and the padding ends.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Aerows (Reply #35)

Mon Aug 26, 2013, 08:10 PM

138. I'm sure he got as much as possible and has the non-relevant stuff safely stashed away somewhere

For "greymail" purposes.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Leopolds Ghost (Reply #138)

Mon Aug 26, 2013, 08:11 PM

140. Me too, but I was trying to make it

 

easy to understand.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Aerows (Reply #140)

Mon Aug 26, 2013, 08:28 PM

142. I don't claim to know much

But there are ways of doing video conferencing over secure encrypted connection which means that he could just send each other the files over the same protocol, e.g. xmpp. Based on what has been reported in the paper, Snowden's worry is "man in the middle" (MITM) attacks. However having a trusted go-between eliminates those attacks if they already share an unhacked key that they can encode the key signatures in.

I only learned about this stuff recently because I've always been concerned about the issue since an activist group I'm familiar with IRL has been fighting this sort of thing tooth and nail. Well, that and I was one of the lone nuts harping about the issue on DU years ago...

...aaand... now I'm probably on a watchlist.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Leopolds Ghost (Reply #138)

Tue Aug 27, 2013, 12:09 AM

166. Hey, you!

 

Reply to this post

Back to top Alert abuse Link here Permalink


Response to NYC_SKP (Reply #166)

Tue Aug 27, 2013, 04:27 PM

176. Hi NYC SKP!

Reply to this post

Back to top Alert abuse Link here Permalink


Response to hootinholler (Reply #23)

Mon Aug 26, 2013, 01:50 PM

29. If I were Snowden et. al

 

I would have made sure to put extraneous data within the encrypted file to obscure file sizes. That also makes reverse engineering attacks impossible if the extraneous data is peppered widely enough through the "meat" of the data.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Aerows (Reply #29)

Mon Aug 26, 2013, 02:01 PM

36. We need more whistle blowers and hackers to help the NSA check and edit their files.

 

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Tierra_y_Libertad (Reply #36)

Mon Aug 26, 2013, 02:06 PM

37. That's kind of the beauty of doing it that way

 

you can do it twenty different ways with the same encryption key, and no matter how it is released, without the key it is useless because you don't know what is real data, what isn't and there is no way to do a comparison with data even if you knew to the letter what he took.

Which I was thinking they did, but now? I'm pretty sure they have no idea if he covered his tracks well enough. Hell, a single backup tape duplicated, then placed right back would be enough to throw a monkey wrench into assessments of what he has in his possession.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to hootinholler (Reply #23)

Mon Aug 26, 2013, 02:09 PM

39. Which they desperately want to know

 

so they can get in front of the story and have a plausible explanation. So far, every time they have told a lie, it has been countered.

We haven't seen much, because I think they have figured out that they don't know what he has, and now they are trying to plant stories. See the one by the Independent, and Snowden swiftly stated they had nothing from him.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Aerows (Reply #39)

Mon Aug 26, 2013, 02:21 PM

46. You mean the thread I started Friday was castigated by the usual suspects

and then sank like a rock?

Yeah.

Personally I think I'm going to start carrying a thumb with a tarball of lolcat images encrypted.

Maybe I'll hire a server in Oz to send encrypted copies of 4chan images flying around the intertubes bouncing them off of other servers.

It's like we need the opposite of a DDOS attack and more like a clog the pipe with encrypted lolcats attack.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to hootinholler (Reply #46)

Mon Aug 26, 2013, 02:23 PM

49. Precisely :)

 

And I think that is what they are doing.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to hootinholler (Reply #46)

Mon Aug 26, 2013, 08:24 PM

141. Like!

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Aerows (Reply #39)

Mon Aug 26, 2013, 05:11 PM

116. Thank you for all your input on this thread.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Tierra_y_Libertad (Reply #21)

Mon Aug 26, 2013, 04:29 PM

106. shhh... they are having fun.

 

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Luminous Animal (Original post)

Mon Aug 26, 2013, 01:49 PM

28. The NSA is thumbscrewed

n/t

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Luminous Animal (Original post)

Mon Aug 26, 2013, 01:52 PM

30. I am surprised they would be trying to break any codes.

 

Unless the govt has a time machine.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Rex (Reply #30)

Mon Aug 26, 2013, 02:13 PM

41. Sure, someone out there has the encryption key

They're probably trying to find that instead of figuring it out themselves. Whether on someone's computer or written on a sheet of paper or in a vault it's out there

And it sure sounds like he just admitted that Miranda was indeed transporting something more serious than video games or vacation pictures

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Rstrstx (Reply #41)

Mon Aug 26, 2013, 02:17 PM

43. So is Davey Jones locker.

 

True you have a billion in one chance of finding the key, as compared to a trillion in one of ever breaking the code.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Rex (Reply #43)

Mon Aug 26, 2013, 02:24 PM

50. According to the encryption experts on here

Cracking the code by brute force is wayyyyy smaller, more like one in a Brazilian. But finding the key, well they probably have some idea of where to start looking. Still long odds, but I'm not sure they are willing to waste the time given that they already have anything that would ever be on those drives

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Rstrstx (Reply #50)

Mon Aug 26, 2013, 02:29 PM

53. There is always the easiest brute-force method

 

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Rstrstx (Reply #50)

Mon Aug 26, 2013, 02:34 PM

56. Well if the NSA knows exactly what was stolen

 

then that helps. The way they were doing such a shitty job in outsourcing, makes me wonder if they maybe don't know the full extent of what is stolen. The hair on fire response of firing 90% of their sysadmins doesn't sound very encouraging that they do. The fact that they are right back with dealing with Booz Allen makes me think they don't really care. Guess they will get some kind of TARP deal from Obama.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Rex (Reply #56)

Tue Aug 27, 2013, 07:57 PM

186. They don't

 

and the shitty job they did THREE times proves it.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Luminous Animal (Original post)

Mon Aug 26, 2013, 01:58 PM

32. I can't help but wonder...

Ignorance, arrogance or stupidity?

Edit - I kant speel.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Luminous Animal (Original post)

Mon Aug 26, 2013, 01:59 PM

33. Thank you king-clown of FUD.

Your scam is over Glenn.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Luminous Animal (Original post)

Mon Aug 26, 2013, 02:17 PM

44. If I were the NSA

 

I'd be worried about a backup job that failed ostensibly, then was restarted. Job failures do happen, it's the nature of the beast. That's where I would find a goldmine that didn't get traced to me, personally, only the backup operator.

That's why I would have them hanging wondering what in the hell I had ( and more importantly, how I got it), because sometimes it isn't easy to determine what failed, why, and how much you can recover, if any. You can't get out in front of a story if you don't know the ammo that another entity has. You can go on TV and declare "I didn't sleep with that woman" and out pops a dress with your semen on it. You can declare that you aren't spying on Americans, out pops documents that prove it covers at the least 75% of all domestic communications. Out pops a warrant signed by a court that ostensibly states that you can legally dump everyone on Verizon's business communication networks traffic.

It proves that the government is full of bullshit, and that they can't be trusted. Once their credibility is eroded, you release the big ol' bomb.

That is the danger the NSA feels is facing them, and I wouldn't doubt it. It could also be detrimental to the US, but only because policy put in place has been detrimental. Unfortunately, shit rolls down hill, and the 99% are the ones that usually face the shit.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Luminous Animal (Original post)

Mon Aug 26, 2013, 02:26 PM

52. Ubiquitous crypto is the NSA 's greatest fear.

Using modern algorithms, on basic open source software, you can encrypt your data so that all the supercomputers in Fort Meade can't crack them.

I have a bachelor's in computer science, and I've seen the math personally, so I can vouch for the strength of modern crypto.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to backscatter712 (Reply #52)

Tue Aug 27, 2013, 11:58 AM

174. That's pretty cool

I wish I knew more about that sort of thing. My interest was piqued oddly enough reading about the Zodiac killer and his unsolved ciphers, particularly z340. I know I'm butchering this but it was said that it would many computers hundreds of years constantly operating to crack it. I recently grabbed some books on codes and code breaking but not in the computer age. I can only imagine just how complex and unsolvable some encryption can be these days.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Luminous Animal (Original post)

Mon Aug 26, 2013, 02:30 PM

55. Rubber-hose Cryptanalysis

 

http://en.wikipedia.org/wiki/Rubber-hose_cryptanalysis

It's a real term. Like social engineering.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Aerows (Reply #55)

Mon Aug 26, 2013, 02:44 PM

66. When rubber hose cryptanalysis becomes common, the NSA will truly be the American Gestapo. n/t

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Luminous Animal (Original post)

Mon Aug 26, 2013, 02:37 PM

58. I am curious, these Snowden/Greenwald haters here seem upset that they came out with this!

Are they NSA guys trying to influence us? Why would they attack the leaking of such important information letting us know our government has been spying on us? Is it b/c Greenwald is a lawyer, a reporter? This story is so much bigger than these 2 men responsible for letting us know our government has been lying and spying on us in violation of our Constitution! It's like they cannot wait for these guys to be arrested and stand for their "show trial!" Crazy!
Thanks Snowden and Greenwald! I for one don't care about the BS being floated about them personally. I want what they revealed to stop, but now I cannot EVER be sure it did. The info is too valuable for them to ever stop spying, regardless of what they say!

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Dustlawyer (Reply #58)

Mon Aug 26, 2013, 02:54 PM

75. Thank you, Dustlawyer. Who are these people who are trying to smear GG

and everyone he's ever known?

Authoritarian mindset, maybe. Or...NSA guys.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Dustlawyer (Reply #58)

Mon Aug 26, 2013, 08:31 PM

143. I hope they're not NSA

Their posts, argument style, use of facts, evidence and prose, don't seem like the product of very clever minds.
Most all of them seem to be playing the part of Dim-wits.


Reply to this post

Back to top Alert abuse Link here Permalink


Response to Vanje (Reply #143)

Tue Aug 27, 2013, 12:06 AM

165. "Most all of them seem to be playing the part of Dim-wits."

Well there's one spewing nonsense that seems to be proud to play the part of a Dim-wit, so much so that the first syllable of the word Dimwit is part of their DU name:

http://www.democraticunderground.com/10023536344#post33

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Luminous Animal (Original post)

Mon Aug 26, 2013, 02:38 PM

60. This warms my heart!!...

Don't let the bastards get you down. Glenn!

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Luminous Animal (Original post)

Mon Aug 26, 2013, 02:39 PM

62. Gonna be real pissed off when he finds out Snowden's key is QWERTY

 

Reply to this post

Back to top Alert abuse Link here Permalink


Response to AngryAmish (Reply #62)

Mon Aug 26, 2013, 03:46 PM

92. He's not dumb, you know. I'll bet he used DVORAK instead. :)

 

Reply to this post

Back to top Alert abuse Link here Permalink


Response to DisgustipatedinCA (Reply #92)

Mon Aug 26, 2013, 07:52 PM

133. Teh password is always SWORDFISH.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Luminous Animal (Original post)

Mon Aug 26, 2013, 02:41 PM

63. Why does GG say stuff like this:

"the US and its closest allies are trying to build a surveillance system that has as its primary objective the elimination of privacy globally"

Such hyperbole is going to turn away lots of people who may otherwise have been more than willing to listen.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to War Horse (Reply #63)

Mon Aug 26, 2013, 03:02 PM

79. why?

because greenwald is in it for the fame and fortune.
he has to stay in the picture otherwise he`ll be forgotten just like snowden is.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to madrchsod (Reply #79)

Mon Aug 26, 2013, 03:21 PM

84. "Because greenwald is in it for the fame and fortune."

That's debatable.

But you make a good point. Leaking in parts to stay relevant.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to madrchsod (Reply #79)

Mon Aug 26, 2013, 08:10 PM

137. Uh, I'm here to debate you for the "fame" and "fortune" and I'm related to neither.

 

I think some of you guys just freak out because you don't understand technology, and you pretty much think nobody else does either.

You are free to rant from your corner of insecurity, but I assure you that there are many that DO understand and how it will impact you. We illustrate how your rights can be destroyed or confiscated, and we stand up for that with regard to information rights.

We don't even need you to thank us. We do it because it is the right thing to do.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to War Horse (Reply #63)

Mon Aug 26, 2013, 03:37 PM

90. "by which I mean that everyone’s communications electronically will be collected, stored, analyzed

and monitored by the US government."

If you read the whole statement, I don't think it's sounds particularly hyperbolic, given what we already know.

That doesn't mean someone will actually be reading, watching or listening to all of it (which wouldn't be possible). And it doesn't mean the communications will be stored forever, either (I assume).

Full quote:

"I think this will be the time the world realizes that the US and its closest allies are trying to build a surveillance system that has as its primary objective the elimination of privacy globally, by which I mean that everyone’s communications electronically will be collected, stored, analyzed and monitored by the US government. "

Reply to this post

Back to top Alert abuse Link here Permalink


Response to War Horse (Reply #63)

Mon Aug 26, 2013, 03:51 PM

93. Those kinds of words are perfect chum for the gullible.

 

and Glenn knows that, the gulls, not so much.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to War Horse (Reply #63)

Mon Aug 26, 2013, 04:12 PM

101. Because this s such hyperbole

 

That people know this is confirmation over what has been suspected around the world.

I am sorry you can't conceive of it

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Luminous Animal (Original post)

Mon Aug 26, 2013, 02:47 PM

68. now that`s the funniest thing i`ve read in a long time

i guess greenwald has to say something shocking to stay in the news.


by the way ...when is he coming back to the usa?

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Luminous Animal (Original post)

Mon Aug 26, 2013, 02:52 PM

73. I disagree with Mr. Greenwald re:encryption

luminous, what's with the script that appears below your link to truth out?

"I won't rest until there is a L(l)ibertarian boogyman under every DUer's bed."

I've dumped all things Microsoft, Google, and Facebook. If Verizon, or ATT were my provider, they would receive my cancellation notice. Who wants to pay any company to collect and share personal information?

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Luminous Animal (Original post)

Mon Aug 26, 2013, 02:54 PM

74. I disagree with Mr. Greenwald re:encryption

luminous, what's with the script that appears below your link to truth out?

"I won't rest until there is a L(l)ibertarian boogyman under every DUer's bed."

I've dumped all things Microsoft, Google, and Facebook. If Verizon, or ATT were my provider, they would receive my cancellation notice. Who wants to pay any company to collect and share personal information?

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Luminous Animal (Original post)

Mon Aug 26, 2013, 02:55 PM

76. Why are these files encrypted anyway? Aren't they supposed to be leaked and released?

 

That's the one most confusing thing about this whole saga.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to arcane1 (Reply #76)

Mon Aug 26, 2013, 03:02 PM

80. They don't want the particular spy agencies and politicians

 

to know what they have. If the various ones did, they would go on television and lie. In fact, they have. But since they have no idea what Snowden has, each time they have gone on television and lied, they have been called out as liars. That erodes the credibility of the spy agencies, and any public official speaking on behalf of them, as well it should.

That's what has them in knots. They don't know what they can lie about and can't, because the second they lie, he releases something. Which, they kind of deserve for lying to the very people that work to elect them.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Aerows (Reply #80)

Mon Aug 26, 2013, 03:23 PM

86. Then what's the point of taking the info in the first place? That's what I don't get...

 

It made sense when documents and slides were being released and published, but I don't see the point of keeping the rest of it a secret.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to arcane1 (Reply #86)

Mon Aug 26, 2013, 03:29 PM

87. Some of it probably has to be parsed through

 

so that no one is put in danger. And otherwise, they get their kicks on watching politicians and the agencies squirm.

I don't begrudge them that at all, since politicians and government officials have told so many lies to the American public and discredited so many whistleblowers that told the truth.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Aerows (Reply #87)

Mon Aug 26, 2013, 10:18 PM

151. In that case, it sounds like Greenwald and Snowden also don't know what they have.

 

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Aerows (Reply #87)

Mon Aug 26, 2013, 11:40 PM

163. Why does that give you "kicks"?

Sounds kind of immature and sadistic to me, personally.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Recursion (Reply #163)

Tue Aug 27, 2013, 08:09 PM

190. When my elected government lies to me

 

I have proof that they lied to me, even though I just suspected they lied to me before, yes, I get a kick knowing that I have confirmation that I'm not an idiot for thinking my government lied to me. I KNOW they did.

I have CONFIRMATION that they did.

Now, ask yourself why that might be important information for a citizen in a Democratic society.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Aerows (Reply #190)

Tue Aug 27, 2013, 09:51 PM

196. But the claim was the *purpose* of the gradual releases was to get them to lie

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Recursion (Reply #196)

Tue Aug 27, 2013, 10:06 PM

197. So you agree they lied?

 

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Aerows (Reply #197)

Tue Aug 27, 2013, 10:53 PM

198. Who? When?

Some people's job is to lie, some of the time, so I'm definitely sure there have been lies told.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Recursion (Reply #198)

Wed Aug 28, 2013, 01:39 PM

199. I'll just leave this post to stand by itself.

 

Reply to this post

Back to top Alert abuse Link here Permalink


Response to arcane1 (Reply #86)

Mon Aug 26, 2013, 05:10 PM

115. The Guardian, the Washington Post, Der Spiegal, and the NY Times are not done with

their reporting.

There is more to come.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Luminous Animal (Reply #115)

Mon Aug 26, 2013, 07:50 PM

131. Yes there is

 

and they aren't going to give government a way to get out in front of the story so that they can create plausible lies.

I look forward to the next revelation, because it is going to show yet another pack of lies we have been told. The American people are strong, resilient and robust - but we hate lies and being lied to. That's what the agencies know, and why they are tied up in knots with these revelations.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Aerows (Reply #80)

Mon Aug 26, 2013, 11:39 PM

162. So the point is "feeling more powerful than politicians" rather than "the truth"?

Awesome.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Luminous Animal (Original post)

Mon Aug 26, 2013, 03:00 PM

78. I disagree with Mr. Greenwald re:encryption

luminous, what's with the script that appears below your link to truth out?

"I won't rest until there is a L(l)ibertarian boogyman under every DUer's bed."

I've dumped all things Microsoft, Google, and Facebook. If Verizon, or ATT were my provider, they would receive my cancellation notice. Who wants to pay any company to collect and share personal information?

Reply to this post

Back to top Alert abuse Link here Permalink


Response to saidsimplesimon (Reply #78)

Mon Aug 26, 2013, 05:42 PM

121. No one

 

But when the government does it, and they can imprison you for life, it's entirely different.

In case you couldn't differentiate between the two.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Luminous Animal (Original post)

Mon Aug 26, 2013, 03:12 PM

81. If they do break it....

I hope they end up watching episodes of My Little Pony.
It would serve the NSA right if they wasted all their time for a kids cartoon.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Luminous Animal (Original post)


Response to Luminous Animal (Original post)

Mon Aug 26, 2013, 05:55 PM

122. Wouldn't it just be a total hoot if the only thing on the thumb drives was

Ed Snowden says hi!

Have a nice day, thank you for playing.


Reply to this post

Back to top Alert abuse Link here Permalink


Response to Zorra (Reply #122)

Mon Aug 26, 2013, 07:43 PM

127. I would think it was extraneous data.

 

I'd use it to make the data untraceable by size and content.

That's just me, though.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Luminous Animal (Original post)

Mon Aug 26, 2013, 08:02 PM

135. I'm a bit unclear why Greenwald is relying on thumb drives in the first place to get data to point B

I mean, that would make sense if both parties in question were not already known...? From a spy-vs-spy perspective, that is.

If both parties are not worried about calling attention to their location and the fact that they are in communication with each other, why not just use the same strong encryption to send each other the data directly? Using a non-web protocol? In my limited understanding, but the go-between only has to exchange public key signatures, which they should be able to pass on by other means.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Luminous Animal (Original post)

Mon Aug 26, 2013, 08:11 PM

139. There's a simpler way, and the NSA knows it...

Eventually Greenwald is going to give the key to someone. On the internet, nothing remains secret long; eventually someone will put the key on his Facebook page, and someone who is sick of Greenwald's shit will e-mail it to the NSA.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to jmowreader (Reply #139)

Mon Aug 26, 2013, 08:48 PM

144. In 2013...

Facebook

Reply to this post

Back to top Alert abuse Link here Permalink


Response to jmowreader (Reply #139)

Tue Aug 27, 2013, 11:17 AM

168. Which is why they are so desperate to get their hands on him.

 

Rubber hose is far easier than cracking a key of this nature.

You can state, confidently, that they know, but it is clearer than crystal to everyone that is familiar with this technology why and that they don't. That's why he's in Russia. That's why they are desperate to get him back in the US.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Luminous Animal (Original post)

Tue Aug 27, 2013, 11:27 AM

169. One thing to remember

 

Physical access to the data stands up to no security measure. Physical access to people knowing the keys only stands up as long as they are tortured.

Why do you think they want their hands on Snowden so badly? He had physical access. Help me other DUers that know about server rooms and securing information to explain this.

I'm trying to think up an analogy, but I have things to do today and haven't arrived at one, yet.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Luminous Animal (Original post)

Tue Aug 27, 2013, 11:52 AM

172. FBI, NSA, et al could'nt even crack this

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Luminous Animal (Original post)

Fri Aug 30, 2013, 01:05 PM

200. Kick...

don't need any code-breaking, when you carry the encryption key on a piece of paper.

Sid

Reply to this post

Back to top Alert abuse Link here Permalink


Response to SidDithers (Reply #200)

Fri Aug 30, 2013, 01:07 PM

201. Ain't that the truth! nt

Reply to this post

Back to top Alert abuse Link here Permalink


Response to SidDithers (Reply #200)

Fri Aug 30, 2013, 01:08 PM

202. Nope. The UK is pulling your strings.

 

@ggreenwald: @MichaelKelleyBI Good encryption requires multiple passwords, not just one. That pw allows no access to documents, period.

Reply to this post

Back to top Alert abuse Link here Permalink


Response to Luminous Animal (Original post)

Sat Aug 31, 2013, 06:23 AM

203. Well...unless your husband is such a dumbass he carries the password on paper

Reply to this post

Back to top Alert abuse Link here Permalink

Reply to this thread