Time to encrypt email ?

Discussion in 'Current Affairs' started by SilverSaviour, Dec 10, 2013.

  1. SilverSaviour

    SilverSaviour New Member

    Joined:
    Aug 2, 2011
    Messages:
    299
    Likes Received:
    0
    Trophy Points:
    0
  2. beeteecee

    beeteecee New Member Silver Stacker

    Joined:
    Sep 6, 2013
    Messages:
    280
    Likes Received:
    0
    Trophy Points:
    0
    Location:
    Australia
    Sadly I think it will get a lot worse before things get better. I think moves like this will push people to alternative networks of communication, and some of those are the last place you want your citizens to go, especially when they're turtled off at the gubmint.
     
  3. willrocks

    willrocks Well-Known Member Silver Stacker

    Joined:
    May 10, 2012
    Messages:
    6,678
    Likes Received:
    2,029
    Trophy Points:
    113
    Was in Bangkok airport the other day. They won't let you access the 'Free' WI-FI unless you provide your passport and sign a form. They had some sign at the Info desk stating that it's Thai law that all internet traffic must be traceable to an individual. I think it's heading that way in Australia.
     
  4. Old Codger

    Old Codger Active Member Silver Stacker

    Joined:
    May 13, 2011
    Messages:
    4,936
    Likes Received:
    3
    Trophy Points:
    38
    I will bet a bucket they can decode any encrypted email on the planet in 5 minutes.

    OC
     
  5. tolly_67

    tolly_67 Well-Known Member

    Joined:
    May 17, 2010
    Messages:
    1,861
    Likes Received:
    100
    Trophy Points:
    63
    Yes, this is how the world has always been........demand creates industry......I object to anybody reading my emails or tracing my calls so I would be very interested in any system that protects me. I don't need someone telling me that the reason for restricting my freedom is for the greater good of everyone.
     
  6. SilverSaviour

    SilverSaviour New Member

    Joined:
    Aug 2, 2011
    Messages:
    299
    Likes Received:
    0
    Trophy Points:
    0
    You need to read more about encryption. If I get a chance I will find some links. For those that understand feel free to provide some info.
     
  7. tychondus

    tychondus New Member

    Joined:
    Nov 11, 2013
    Messages:
    20
    Likes Received:
    0
    Trophy Points:
    0

    This would be true under 2 circumstances:

    1) implementing a backdoor in the encryption algorithm rather than brute force decryption.
    2) run the decryption on a quantum (clustered) computer.

    Trying to decrypt a encrypted email without the private key will take many many years. This is due to the nature of the algorithm. Any good encryption algorithm will exhibit 2 properties:

    1) take polynomial time both encrypt and decrypt a message.
    2) it will take exponential time to brute force the message.
     
  8. Old Codger

    Old Codger Active Member Silver Stacker

    Joined:
    May 13, 2011
    Messages:
    4,936
    Likes Received:
    3
    Trophy Points:
    38
    SS,


    I have NIL knowledge of code breaking, but I wonder why the NSA can spend billions on something that can be circumvented by code.


    OC
     
  9. tolly_67

    tolly_67 Well-Known Member

    Joined:
    May 17, 2010
    Messages:
    1,861
    Likes Received:
    100
    Trophy Points:
    63
    They are in cahoots with the encryption companies such that the encryption key is supplied. It would be impossible to do business in the u.s. without this occuring.
     
  10. Roswell Crash Survivor

    Roswell Crash Survivor Well-Known Member Silver Stacker

    Joined:
    Apr 11, 2011
    Messages:
    2,508
    Likes Received:
    318
    Trophy Points:
    83
    Location:
    Zeta Reticuli
    I'm inclined to think encrypting e-mails only encourage further scrutiny.

    So...forwards into the past for secure communications. Back to one-time pads and shortwave numbers stations.
     
  11. glam

    glam Member

    Joined:
    Apr 10, 2011
    Messages:
    165
    Likes Received:
    2
    Trophy Points:
    18
    Location:
    Adelaide
    Take a look at this site for information on privacy and alternatives to protect your privacy.

    Includes information on operating systems, email clients, browsers and any other computer or mobile service.

    https://prism-break.org/
     
  12. Old Codger

    Old Codger Active Member Silver Stacker

    Joined:
    May 13, 2011
    Messages:
    4,936
    Likes Received:
    3
    Trophy Points:
    38
    I suppose tehy would use 'flags' such as,


    BOMB

    ASSASSINATE

    PRESIDENT.

    should send them into a frenzy!

    (Hi guys!)


    OC
     
  13. Ouch

    Ouch Active Member

    Joined:
    Nov 16, 2010
    Messages:
    1,066
    Likes Received:
    5
    Trophy Points:
    38
    Location:
    Sydney, Australia
    The 3rd option is to install the snooping software on the receiver's end after the email has been decrypted. That way they don't even need to worry about breaking the encryption algorithm.
     
  14. beeteecee

    beeteecee New Member Silver Stacker

    Joined:
    Sep 6, 2013
    Messages:
    280
    Likes Received:
    0
    Trophy Points:
    0
    Location:
    Australia
    I think some misunderstanding of encrypted email is because there's a few levels you can look at it on. For instance, gmail, or your bank, or many sites use HTTPS which is encryption and it essentially keeps your activities private/safe from random hackers in transit, however the gubmint basically has all the keys, so nothing is private from them. Remember too that the gubmint is not one guy, but many many workers, all being trusted not to misuse their position. I can't see this ending well.

    Or there is the not so convenient choice to encrypt your emails yourself, and then nobody but the receiving party should be able to read them, if nothing worse is afoot, like what Ouch mentions.

    There's an idea inspired by bitcoin called bitmessage, looks kind of interesting.

    https://en.wikipedia.org/wiki/Bitmessage

    Spot on Tolly.
     
  15. sammysilver

    sammysilver Well-Known Member Silver Stacker

    Joined:
    Apr 7, 2011
    Messages:
    6,414
    Likes Received:
    1,298
    Trophy Points:
    113
    Location:
    Sydney
    I strongly suggest an alternate identity. Gmail address and prepaid mobile in a bogus name. Do it now before it's too late.
     
  16. dragafem

    dragafem Well-Known Member Silver Stacker

    Joined:
    Jan 16, 2012
    Messages:
    5,186
    Likes Received:
    454
    Trophy Points:
    83
    Location:
    Sunshine State
    I dont understand a word u just said :p but I assume helpful info for some...
     
  17. Guest

    Guest Guest

    I've naturally assumed for a long time now that every keystroke is permanently recorded
     
  18. beeteecee

    beeteecee New Member Silver Stacker

    Joined:
    Sep 6, 2013
    Messages:
    280
    Likes Received:
    0
    Trophy Points:
    0
    Location:
    Australia
  19. Eruaran

    Eruaran New Member

    Joined:
    Aug 13, 2012
    Messages:
    685
    Likes Received:
    0
    Trophy Points:
    0
    Location:
    Australia
  20. dollars

    dollars Active Member Silver Stacker

    Joined:
    Aug 31, 2010
    Messages:
    736
    Likes Received:
    29
    Trophy Points:
    28
    Location:
    Western Australia

Share This Page