of course you already knew...cell (mobile) phones are not secure...here is the latest

turkeydance

Well-Known Member
Life Member
Supporting Member
Joined
Jul 17, 2017
Messages
4,507
Location
nc
Rating - 100%
4   0   0
quote:
Billed as the most secure phone on the planet, An0m became a viral sensation in the underworld.
There was just one problem for anyone using it for criminal means: it was run by the police

 
Didn't read all of it but it seems to me that the Government isn't allowed to commit a crime in running a sting operation. Offering a fraudulent app seems like it would be a crime.
 
"...seems to me that the Government isn't allowed to commit a crime in running a sting operation."
Australia.
 
Didn't read all of it but it seems to me that the Government isn't allowed to commit a crime in running a sting operation. Offering a fraudulent app seems like it would be a crime.

Didn’t our courts allow a cop to lie to catch criminals?
 
It's weird when things like this make the news. I heard about this back in June, and it was a blip then, but only now big news.

Basically think about it like this:
To have a secure communication, you need end-to-end encryption. Meaning Alice and Bob want to communicate. They need to have both ends of the communication encrypted, not just one end or the other, else it can be intercepted and read in transit. It gets more complicated, symmetric, assymetric encryption, public and private keys, but just assume that both sides need to be encrypted.

The rub here is that there was a guy working on a secure app for criminals. He got caught, and said, "Hey guys, I'm almost done with the secure messaging app. You let me off of my crime, and pay me a bit, and it's yours. I'll finish it, and give it to criminals to use. I'll design it with holes in it, so it'll look encrypted, but you can scoop it all up in transit and decrypt it. Deal?"

So, they did. He finished it, put holes in it. Made some secret squirrel looking bells and whistles on it to make people think, "Ooooh, 1334 h@x0r, I trust it," and they bought it hook, line, and sinker.


This is why security people tell you not to try to create your own encryption algorithms or hashing algorithms. Heck, algorithms in general. Sure, you can make one. But what are the chances you messed something up, and made a mistake that can allow it to be cracked? Pretty high. What about the algorithms made by comp-sci and math genius working together in the 80's and 90's, which are open to view and have been looked over by everybody for decades for problems? Those are probably ok.

TL;DR, don't use weird apps. Use well respected apps like Signal.
 
NSA was recording all calls and metadata.

 
Wow, really? They would need a massive high technology redundantly structured facility in some remote location for something like that.

heres-the-2-billion-facility-where-the-nsa-stores-and-analyzes-your-communications.jpg
 
Last edited:
Wow, really? They would need a massive high technology redundantly structured facility in some remote location for something like that.
My first thought was that facilities like that require lots of mechanical cooling. That requires water. That can be turned off. Then I looked closer at the picture see they're using air cooled chillers and it looks like they have a few million gallons of thermal storage for extra capacity.
 
My first thought was that facilities like that require lots of mechanical cooling. That requires water. That can be turned off. Then I looked closer at the picture see they're using air cooled chillers and it looks like they have a few million gallons of thermal storage for extra capacity.
Did you notice the buildings are mirrored? I think the only thing that would be effective in the long term would be a close proximity EMP.
 
Last edited:
Did you notice the buildings are mirrored? I think the only thing that would be effective in the long term would be a close proximity EMP.
No, I didn't at first, but now that you mention it, I do see that. I am guessing the buildings in the semi-middle with the stacks coming out of them are generators and the big tall tank (on the right) is a fuel storage, while the two smaller tanks are likely thermal (chilled water) storage. Yes, the facility was designed to be self reliant and stay up even under attack.
 
That's why I don't trust the damn things, and have the oldest one I can find. WIFE pays for it, or I'd NEVER own one.
 
Personally, if the government wants to listen in on my boring conversations they can have at it.

"The NSA, the only government agency that listens" 😆
 
If you hope to have secure communication when the gman is looking at you you have your work cut out for you. If it doesn't include computers on each end that handle the encryption that have NEVER been on any network and sneakernet/air gap conveying of encrypted files to another machine to actually send and receive then you're hosed from the start. 512-bit key length with actual 512 bit long keys too...
 
Last edited:
Back
Top Bottom