On 4/24/2024 1:47 AM, Marco Moock wrote:
Hello!
Various governments around the world - including the US and EU - want
to have backdoors in encryption technology.
Is there anything known how FOSS developers will deal with that?
Especially if they are enforced to implement backdoors.
Is there a backdoor to HMAC?
Hello!
Various governments around the world - including the US and EU - want
to have backdoors in encryption technology.
Is there anything known how FOSS developers will deal with that?
Especially if they are enforced to implement backdoors.
Marco Moock wrote:
Hello!
Various governments around the world - including the US and EU -
want to have backdoors in encryption technology.
Is there anything known how FOSS developers will deal with that?
Especially if they are enforced to implement backdoors.
If I would be forced, which I doubt, I would comment the code with
something like this:
// backdoor begins here
backdoor code
// backdoor ends here
and put in the README how to exchange that code with proper one.
Stefan Claas <pollux@tilde.club> wrote:
If I would be forced, which I doubt, I would comment the code with something like this:
// backdoor begins here
backdoor code
// backdoor ends here
and put in the README how to exchange that code with proper one.
Likely would not work well. Such forcing would likely also be
accompanied by a gag order preventing you from admitting the backdoor
even exists and so such comments and readme text would be a likely gag
order violation that would land you in jail.
Rich wrote:
Stefan Claas <pollux@tilde.club> wrote:
If I would be forced, which I doubt, I would comment the code with
something like this:
// backdoor begins here
backdoor code
// backdoor ends here
and put in the README how to exchange that code with proper one.
Likely would not work well. Such forcing would likely also be
accompanied by a gag order preventing you from admitting the
backdoor even exists and so such comments and readme text would be a
likely gag order violation that would land you in jail.
Well, I gues this may only apply to big FOSS projects,
where they can force teams, or an individual team member, but not the millions of FOSS programmers out there.
Another option for folks, living in West-Eurasia, might be to handle
over the correct code to people in BRICS countries and publish it
there.
We should also not forget that Democrats (back then Senator Biden),
in the U.S., started the Crypto War ...
On 4/28/2024 2:06 AM, Stefan Claas wrote:
Rich wrote:
Stefan Claas <pollux@tilde.club> wrote:
If I would be forced, which I doubt, I would comment the code with
something like this:
// backdoor begins here
backdoor code
// backdoor ends here
and put in the README how to exchange that code with proper one.
Likely would not work well. Such forcing would likely also be
accompanied by a gag order preventing you from admitting the backdoor
even exists and so such comments and readme text would be a likely gag
order violation that would land you in jail.
Well, I gues this may only apply to big FOSS projects, where they can
force teams, or an individual team member, but not the millions of FOSS programmers out there.
Another option for folks, living in West-Eurasia, might be to handle
over the correct code to people in BRICS countries and publish it there.
We should also not forget that Democrats (back then Senator Biden),
in the U.S., started the Crypto War ...
Think if an algorithm A that is published for anyone to implement. Not
raw code, but the algorithm itself. A standard, like HMAC or something.
There "might" be a backdoor in the algorithm itself, however its very,
VERY, very... hard to find. This is why I asked about HMAC having a
backdoor by default. Something that dr. spoofs a lot can take advantage
of. Rich said probably not, wrt the algorithm itself...
On 4/29/2024 10:45 AM, Stefan Claas wrote:
But would a published algorithm not been more peer reviewed than
later a lot of code implementations, from various people?
I hope so! I ask this question about HMAC because my experimental
encryption uses it.
Stefan Claas <pollux@tilde.club> wrote:...
Rich wrote:
Stefan Claas <pollux@tilde.club> wrote:
If I would be forced, which I doubt, I would comment the code with
something like this:
...// backdoor begins here
Likely would not work well. Such forcing would likely also be
accompanied by a gag order preventing you from admitting the
backdoor even exists and so such comments and readme text would be a
likely gag order violation that would land you in jail.
Well, I gues this may only apply to big FOSS projects,
Your prior post did not specify FOSS vs. closed source.
Is there anything known how FOSS developers will deal with that?
Backdoors.
When people use PRIVATE ENCRYPTION BEFORE any messaging enters a
public channel.......
......backdoors are the least of their worries!
On 5/8/2024 9:27 PM, Marco Moock wrote:
Am 07.05.2024 18:20 Uhr schrieb Edward Teach:
Backdoors.
When people use PRIVATE ENCRYPTION BEFORE any messaging enters a
public channel.......
......backdoors are the least of their worries!
Isn't enough. There is a time when that message is unencrypted (e.g.
when entering it to the crypto application). The operating system can
then read the cleartext. If the backdoor is in the OS, X11 etc., it
still works here.
Go to a 100% "clean room", cloaked, cannot receive and/or send anything...
Encrypt a message on a clean thumb drive. Take out the clean disk with a single file on it. Destroy the computer... Exit the clean room. This
disk contains an encrypted file.
Is it safe?
On 5/8/2024 9:27 PM, Marco Moock wrote:
Am 07.05.2024 18:20 Uhr schrieb Edward Teach:
Backdoors.
When people use PRIVATE ENCRYPTION BEFORE any messaging enters a
public channel.......
......backdoors are the least of their worries!
Isn't enough. There is a time when that message is unencrypted (e.g.
when entering it to the crypto application). The operating system can
then read the cleartext. If the backdoor is in the OS, X11 etc., it
still works here.
Go to a 100% "clean room", cloaked, cannot receive and/or send anything...
Encrypt a message on a clean thumb drive.
Take out the clean disk with a
single file on it. Destroy the computer...
Exit the clean room. This disk contains an encrypted file.
Is it safe?
How did the computer get into the clean room? How are you sure that no hardware on the computer has a backdoor, or that no software running on
the computer has a backdoor?
On Thu, 9 May 2024 22:15:01 -0000 (UTC), Rich wrote:
How did the computer get into the clean room? How are you sure that
no hardware on the computer has a backdoor, or that no software
running on the computer has a backdoor?
And even more problematic: electrons are constantly recycled, who can
tell where they've been prior to entering the room?
Chris M. Thomasson wrote:
On 5/9/2024 3:15 PM, Rich wrote:
The answer depends upon whether the thumbdrive and/or the computer used
in the clean room contained a hardware or software back door.
Hopefully, the thumbdrive is clean. If there even is such a thing...
Why not use a 3.5 inch disk drive and 3.5 inch disks? Still available
at Amazon and I think the content written on 3.5 inch disk can be easily examined with a disk editor. And they are loud, so you can hear the read/write
process. :-)
On 5/9/2024 3:15 PM, Rich wrote:
The answer depends upon whether the thumbdrive and/or the computer used
in the clean room contained a hardware or software back door.
Hopefully, the thumbdrive is clean. If there even is such a thing...
On 5/9/2024 3:15 PM, Rich wrote:
Chris M. Thomasson <chris.m.thomasson.1@gmail.com> wrote:
On 5/8/2024 9:27 PM, Marco Moock wrote:
Am 07.05.2024 18:20 Uhr schrieb Edward Teach:
Backdoors.
When people use PRIVATE ENCRYPTION BEFORE any messaging enters a
public channel.......
......backdoors are the least of their worries!
Isn't enough. There is a time when that message is unencrypted (e.g.
when entering it to the crypto application). The operating system can
then read the cleartext. If the backdoor is in the OS, X11 etc., it
still works here.
Go to a 100% "clean room", cloaked, cannot receive and/or send anything... >>>
Encrypt a message on a clean thumb drive.
Where did you obtain the thumb drive?
Did you build it, from the ground up, or did you bring it into the
clean-room after purchase from a vendor?
If you purchased from a vendor, then how do you know said vendor did
not include a hardware backdoor on that thumb drive?
Take out the clean disk with a
single file on it. Destroy the computer...
How did the computer get into the clean room? How are you sure that no
hardware on the computer has a backdoor, or that no software running on
the computer has a backdoor?
The computer would have to be clean.
However, once its in the room, it
cannot communicate with the outside world, and gets utterly destroyed
after the encryption process. Turned into ashes.
Humm... Damn.
So, is there a way to use a clean room, a clean computer and a clean
medium to store the encrypted file? Assuming clean means clean... ;^o
On 5/9/2024 3:15 PM, Rich wrote:
Chris M. Thomasson <chris.m.thomasson.1@gmail.com> wrote:
On 5/8/2024 9:27 PM, Marco Moock wrote:
Am 07.05.2024 18:20 Uhr schrieb Edward Teach:
Backdoors.
When people use PRIVATE ENCRYPTION BEFORE any messaging enters a
public channel.......
......backdoors are the least of their worries!
Isn't enough. There is a time when that message is unencrypted
(e.g. when entering it to the crypto application). The operating
system can then read the cleartext. If the backdoor is in the OS,
X11 etc., it still works here.
Go to a 100% "clean room", cloaked, cannot receive and/or send
anything...
Encrypt a message on a clean thumb drive.
Where did you obtain the thumb drive?
Did you build it, from the ground up, or did you bring it into the clean-room after purchase from a vendor?
If you purchased from a vendor, then how do you know said vendor did
not include a hardware backdoor on that thumb drive?
Take out the clean disk with a
single file on it. Destroy the computer...
How did the computer get into the clean room? How are you sure
that no hardware on the computer has a backdoor, or that no
software running on the computer has a backdoor?
The computer would have to be clean. However, once its in the room,
it cannot communicate with the outside world, and gets utterly
destroyed after the encryption process. Turned into ashes.
Humm... Damn.
Exit the clean room. This disk contains an encrypted file.
Is it safe?
The answer depends upon whether the thumbdrive and/or the computer
used in the clean room contained a hardware or software back door.
On Fri, 10 May 2024 13:21:15 -0700
"Chris M. Thomasson" <chris.m.thomasson.1@gmail.com> wrote:
On 5/9/2024 3:15 PM, Rich wrote:
Chris M. Thomasson <chris.m.thomasson.1@gmail.com> wrote:
On 5/8/2024 9:27 PM, Marco Moock wrote:
Am 07.05.2024 18:20 Uhr schrieb Edward Teach:
Backdoors.
When people use PRIVATE ENCRYPTION BEFORE any messaging enters a
public channel.......
......backdoors are the least of their worries!
Isn't enough. There is a time when that message is unencrypted
(e.g. when entering it to the crypto application). The operating
system can then read the cleartext. If the backdoor is in the OS,
X11 etc., it still works here.
Go to a 100% "clean room", cloaked, cannot receive and/or send
anything...
Encrypt a message on a clean thumb drive.
Sorry I started this thread......in my world "private encryption" only
needs to be private for twenty-four hours.....maybe less!!!
After that.......it doesn't matter who knows.................
Sysop: | Keyop |
---|---|
Location: | Huddersfield, West Yorkshire, UK |
Users: | 546 |
Nodes: | 16 (2 / 14) |
Uptime: | 12:11:52 |
Calls: | 10,389 |
Calls today: | 4 |
Files: | 14,061 |
Messages: | 6,416,872 |
Posted today: | 1 |