| 1. |
Solve : Full-disk encryption is too good, say crime investigators.? |
|
Answer» New Scientist is carrying a story saying that full disk encryption schemes (such as Bitlocker, Truecrypt, etc) are making life hard for investigators. PGP Products | SymantecPGP was a hot issue years ago. For some of the same reasons given in the article the nOP quoted. http://en.wikipedia.org/wiki/Pretty_Good_Privacy There is The International PGP Home Page http://www.pgpi.org/They say they're "too hard to break", but who knows what technology, for example, the FBI and CIA have at their disposal? Quote "Research is needed to develop new techniques and technology for breaking or bypassing full disk encryption."And if this is done, the same research will be used to develop stronger encrpytion.Quote from: kpac on November 18, 2011, 02:47:22 PM They say they're "too hard to break", but who knows what technology, for example, the FBI and CIA have at their disposal?When two people already have a secure communication link, they can send each other information about how to make the link stronger. A cracker would need to have a archive of all their communications to find how they improved the encryption. The point is, with a good head start, you can keep your secrets for a long, long time. As BC mentioned, it becomes more feasible to use some other tacit. The idea of make encryption illegal or restrained is a matter of concern. An not just for professional CRIMINALS. The Ky and Lock analogy: Recently I was asked to leave a key to my house in a secret place; so the fire department could get into my house. Rather that making another key, I might just leave the doer unlocked while I am not at home, and locked when I am in the house.Quote from: kpac on November 18, 2011, 02:47:22 PM They say they're "too hard to break", but who knows what technology, for example, the FBI and CIA have at their disposal? I am fairly confident there is no present technology that can break 256 bit AES encryption by brute force in a reasonable time. Breaking a symmetric 256-bit key by brute force requires 2128 times more computational power than a 128-bit key. A device that could check a BILLION billion (10 to the power of 18) AES keys per second (if such a device could ever be made) would in theory require about 3×(10 to the power of 51) years to exhaust the 256-bit key space. Quote FBI hackers fail to crack TrueCryptQuote "Bless my cracked CORN and ground bone mixture!" ejaculated the chicken fancier. - "Tom Swift And His Electric Locomotive"That may be the phrase the FBI needed. That is how real people can setup a hard code. They both have copies of the same book. Same edition. When the want to change a phrase used for encoding, they just refuter to the book by chapter, paragraph and sentence. But without the name of the book. Like this: 8.12.4 Would mean chapter 8, paragraph 12, sentence 4. A reference to a specific edition of a Tom Swift book by men who speak Brazilian Portuguese would be very unexpected.Quote from: Geek-9pm on November 18, 2011, 04:46:05 PM That is how real people can setup a hard code. They both have copies of the same book. A reference to a specific edition of a Tom Swift book by men who speak Brazilian Portuguese would be very unexpected. I'd use steganogaphy and hide messages in hi-res goat porn. Everybody the whole world over likes goat porn, don't they? Nothing suspicious there! |
|