• Re: clown act?

    From Mike Scott@21:1/5 to Sam Plusnet on Thu Feb 27 20:13:28 2025
    On 27/02/2025 18:15, Sam Plusnet wrote:
    Misleading to call a government minister a "security top guy".

    touche :-) But I think people get the gist.


    --
    Mike Scott
    Harlow, England

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Jon Ribbens@21:1/5 to Jeff Gaines on Fri Feb 28 11:17:13 2025
    On 2025-02-27, Jeff Gaines <jgnewsid@outlook.com> wrote:
    On 27/02/2025 in message <slrnvs16ur.4ph.jon+usenet@raven.unequivocal.eu>
    Jon Ribbens wrote:

    On 2025-02-27, Jeff Gaines <jgnewsid@outlook.com> wrote:
    On 27/02/2025 in message <slrnvs0n3q.4ph.jon+usenet@raven.unequivocal.eu> >>>Jon Ribbens wrote:
    On 2025-02-27, Jeff Gaines <jgnewsid@outlook.com> wrote:
    On 27/02/2025 in message >>>>><slrnvs0j2i.4ph.jon+usenet@raven.unequivocal.eu>
    Jon Ribbens wrote:
    On 2025-02-27, Jeff Gaines <jgnewsid@outlook.com> wrote:
    On 27/02/2025 in message <vpp5jb$31866$1@dont-email.me> Mike Scott >>>>>>>wrote:
    From a Beeb web page I've just seen:

    The Minister of State for Security said: "I cannot comment on >>>>>>>>operational matters, and it would not be appropriate for me either >>>>>>>>to confirm or to deny the existence of any notices under the >>>>>>>>Investigatory Powers Act 2016."

    [fair enough; I'd expect that. But.....]

    He added: "What I can say is that the suggestion that privacy and >>>>>>>>security are at odds is not correct; we can and must have both." >>>>>>>>
    [https://www.bbc.com/news/articles/c1kjmddx2nzo]

    Really? A security "top guy" really cannot see the problem in saying >>>>>>>>that?

    It also seems we've rubbed up the USA the wrong way too over this. >>>>>>>
    Does anybody know the situation in the USA? I find it hard to believe >>>>>>>that the USA government accepts it is unable to see this data, it's an >>>>>>>obvious situation for terrorists to take advantage of.

    Terrorists are not renowned for their strict adherence to the law. >>>>>>If they want to communicate in an encrypted manner then they will >>>>>>do so whether the law allows it or not. There are tools easily >>>>>>available regardless of whether major companies make it a simple >>>>>>consumer option.

    But in this case they wouldn't be breaking the law, they would just >>>>>send/save data on an iPhone when, apparently, nobody else can see it.

    Yes. Or indeed not an iPhone but any one of many other encrypted systems. >>>>What's your point?

    I was responding to what you said, "Terrorists are not renowned for their >>>strict adherence to the law." However, they wouldn't be breaking the law >>>in using an iPhone.

    You missed my point, which is that you said iPhone data being encrypted
    is an "obvious situation for terrorists to take advantage of", but they >>will encrypt their data if they want to regardless of whether or not it
    is legal for them to do so and whether or not the iPhone provides that >>encryption as standard.

    I think we may have missed each other's points. Criminal wouldn't
    have to do anything or use anything except an iPhone to hide their
    data, assuming it is true that no other party can access it.

    I didn't miss your point, I am saying your point is... pointless.
    It isn't a "situation for terrorists to take advantage of" since
    there is no advantage to them. They can use encryption either way.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Jeff Gaines@21:1/5 to Jon Ribbens on Fri Feb 28 12:01:01 2025
    On 28/02/2025 in message <slrnvs36pp.4ph.jon+usenet@raven.unequivocal.eu>
    Jon Ribbens wrote:

    I think we may have missed each other's points. Criminal wouldn't
    have to do anything or use anything except an iPhone to hide their
    data, assuming it is true that no other party can access it.

    I didn't miss your point, I am saying your point is... pointless.
    It isn't a "situation for terrorists to take advantage of" since
    there is no advantage to them. They can use encryption either way.

    You still seem to be having a problem, I said:

    "Does anybody know the situation in the USA? I find it hard to believe
    that the USA government accepts it is unable to see this data, it's an
    obvious situation for terrorists to take advantage of."

    As I said it is a clear and obvious situation for terrorists or, indeed,
    any criminal to take advantage of.

    --
    Jeff Gaines Dorset UK
    The true meaning of life is to plant trees under whose shade you do not
    expect to sit.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From GB@21:1/5 to Jon Ribbens on Fri Feb 28 14:35:00 2025
    On 28/02/2025 11:17, Jon Ribbens wrote:

    I didn't miss your point, I am saying your point is... pointless.
    It isn't a "situation for terrorists to take advantage of" since
    there is no advantage to them. They can use encryption either way.



    There is a different point, though.

    Most people are harmless, and they can signal this to the security
    services to some extent by NOT encrypting their data. That greatly
    whittles down the number of people whom the security services need to concentrate their resources on.

    I'm prepared to help out in this way, although I know that some people
    are unhappy about it. I see no need to encrypt my shopping list, for
    example, as it doesn't contain lots of oxygenating chemicals, etc.

    Even if there's a diode somewhere in GCHQ that takes an abnormal
    interest in my Marmite consumption, I can live with that.

    It's better still if I can use a mild sort of encryption, so my data
    can't be snooped on by a casual observer, but it can easily be glanced
    at by the security services, who can then happily ignore me.

    That kind of justifies the sentence in the OP: "What I can say is that
    the suggestion that privacy and security are at odds is not correct; we
    can and must have both."

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From GB@21:1/5 to All on Fri Feb 28 14:47:43 2025
    On 27/02/2025 11:41, Jethro_uk wrote:

    There was a case a while back where Apple "refused" to unlock an iPhone. Because it couldn't be done. It was set to hit the courts then the FBI claimed "they found another way", which no one believed.

    I think that you may be completely wrong, actually:-

    Whatever passphrase that was used to encrypt the phone must have been relatively short, as otherwise the user couldn't enter it.

    Inherently, a short passphrase is easy to guess by brute force techniques.

    What protects it is that the iphone deletes the data after a small
    number of incorrect guesses.

    One solution is to hack the iphone and extract the encrypted data, so
    that it can then be worked on by simple brute force techniques.

    Another solution is to hack the OS, so "a small number of incorrect
    guesses" is changed to "a vast number of incorrect guesses".

    What makes you so sure that can't be done?

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Roger Hayter@21:1/5 to Jeff Gaines on Fri Feb 28 13:58:37 2025
    On 28 Feb 2025 at 12:01:01 GMT, ""Jeff Gaines"" <jgnewsid@outlook.com> wrote:

    On 28/02/2025 in message <slrnvs36pp.4ph.jon+usenet@raven.unequivocal.eu>
    Jon Ribbens wrote:

    I think we may have missed each other's points. Criminal wouldn't
    have to do anything or use anything except an iPhone to hide their
    data, assuming it is true that no other party can access it.

    I didn't miss your point, I am saying your point is... pointless.
    It isn't a "situation for terrorists to take advantage of" since
    there is no advantage to them. They can use encryption either way.

    You still seem to be having a problem, I said:

    "Does anybody know the situation in the USA? I find it hard to believe
    that the USA government accepts it is unable to see this data, it's an obvious situation for terrorists to take advantage of."

    As I said it is a clear and obvious situation for terrorists or, indeed,
    any criminal to take advantage of.

    As is being able to lock your car boot and being able to refuse permission to the police to search it without probable cause. But the Americans take their civil liberties seriously, and if anyone does search your car improperly they can't use the evidence they find. I think this is a good thing, ditto encryption.


    --

    Roger Hayter

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Mike Scott@21:1/5 to All on Fri Feb 28 19:33:29 2025
    On 28/02/2025 14:35, GB wrote:
    That kind of justifies the sentence in the OP: "What I can say is that
    the suggestion that privacy and security are at odds is not correct; we
    can and must have both."

    But we come back to the fundamental issue that either something is
    secure, in which case no-one can pry including HMG, or HMG can get at it
    in which case /anyone/ can get at it. Only today

    <https://www.bbc.com/news/articles/c3vwwq260gdo>

    "The force said the mother of PC Molly Bury, 28, was overheard at an
    event in Burnley telling someone "Molly checked the police system"
    before it emerged the officer had illegally accessed police computer
    systems over several years."

    If a government agency has the keys, the wrong people /will/ use them
    for wrong purposes. And when (if) you find out, it's too late.

    If you're interested in "casual security", settle for ROT13.


    --
    Mike Scott
    Harlow, England

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Jon Ribbens@21:1/5 to Mike Scott on Fri Feb 28 20:49:05 2025
    On 2025-02-28, Mike Scott <usenet.16@scottsonline.org.uk.invalid> wrote:
    On 28/02/2025 14:35, GB wrote:
    That kind of justifies the sentence in the OP: "What I can say is that
    the suggestion that privacy and security are at odds is not correct; we
    can and must have both."

    But we come back to the fundamental issue that either something is
    secure, in which case no-one can pry including HMG, or HMG can get at it
    in which case /anyone/ can get at it. Only today

    <https://www.bbc.com/news/articles/c3vwwq260gdo>

    "The force said the mother of PC Molly Bury, 28, was overheard at an
    event in Burnley telling someone "Molly checked the police system"
    before it emerged the officer had illegally accessed police computer
    systems over several years."

    If a government agency has the keys, the wrong people /will/ use them
    for wrong purposes. And when (if) you find out, it's too late.

    If you're interested in "casual security", settle for ROT13.

    Apparently *over half* of all cybercrime prosecutions in the UK are of
    police officers abusing the system.

    https://www.cl.cam.ac.uk/~ah793/papers/2025police.pdf

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Mark Goodge@21:1/5 to usenet.16@scottsonline.org.uk.inval on Fri Feb 28 23:00:12 2025
    On Thu, 27 Feb 2025 07:52:11 +0000, Mike Scott <usenet.16@scottsonline.org.uk.invalid> wrote:

    From a Beeb web page I've just seen:

    The Minister of State for Security said: "I cannot comment on
    operational matters, and it would not be appropriate for me either to
    confirm or to deny the existence of any notices under the Investigatory >Powers Act 2016."

    [fair enough; I'd expect that. But.....]

    He added: "What I can say is that the suggestion that privacy and
    security are at odds is not correct; we can and must have both."

    [https://www.bbc.com/news/articles/c1kjmddx2nzo]

    Really? A security "top guy" really cannot see the problem in saying that?

    No; a security guy didn't say that, a politician said that. And even if the politician knows it's not technically accurate, it may still be politically
    the correct thing to say.

    Mark

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Jeff Gaines@21:1/5 to Hayter on Fri Feb 28 21:10:39 2025
    On 28/02/2025 in message <5111730902.1dd963cc@uninhabited.net> Roger
    Hayter wrote:

    On 28 Feb 2025 at 12:01:01 GMT, ""Jeff Gaines"" <jgnewsid@outlook.com>
    wrote:

    On 28/02/2025 in message <slrnvs36pp.4ph.jon+usenet@raven.unequivocal.eu> >>Jon Ribbens wrote:

    I think we may have missed each other's points. Criminal wouldn't
    have to do anything or use anything except an iPhone to hide their >>>>data, assuming it is true that no other party can access it.

    I didn't miss your point, I am saying your point is... pointless.
    It isn't a "situation for terrorists to take advantage of" since
    there is no advantage to them. They can use encryption either way.

    You still seem to be having a problem, I said:

    "Does anybody know the situation in the USA? I find it hard to believe
    that the USA government accepts it is unable to see this data, it's an >>obvious situation for terrorists to take advantage of."

    As I said it is a clear and obvious situation for terrorists or, indeed, >>any criminal to take advantage of.

    As is being able to lock your car boot and being able to refuse permission
    to
    the police to search it without probable cause. But the Americans take
    their
    civil liberties seriously, and if anyone does search your car improperly
    they
    can't use the evidence they find. I think this is a good thing, ditto >encryption.

    Does America accept it is unable to see this data? I struggle a bit with
    that, especially after today's performance from Trump/Vance!

    --
    Jeff Gaines Dorset UK
    By the time you can make ends meet they move the ends

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Jethro_uk@21:1/5 to Jon Ribbens on Sat Mar 1 09:45:53 2025
    On Fri, 28 Feb 2025 20:49:05 +0000, Jon Ribbens wrote:

    On 2025-02-28, Mike Scott <usenet.16@scottsonline.org.uk.invalid> wrote:
    On 28/02/2025 14:35, GB wrote:
    That kind of justifies the sentence in the OP: "What I can say is that
    the suggestion that privacy and security are at odds is not correct;
    we can and must have both."

    But we come back to the fundamental issue that either something is
    secure, in which case no-one can pry including HMG, or HMG can get at
    it in which case /anyone/ can get at it. Only today

    <https://www.bbc.com/news/articles/c3vwwq260gdo>

    "The force said the mother of PC Molly Bury, 28, was overheard at an
    event in Burnley telling someone "Molly checked the police system"
    before it emerged the officer had illegally accessed police computer
    systems over several years."

    If a government agency has the keys, the wrong people /will/ use them
    for wrong purposes. And when (if) you find out, it's too late.

    If you're interested in "casual security", settle for ROT13.

    Apparently *over half* of all cybercrime prosecutions in the UK are of
    police officers abusing the system.

    https://www.cl.cam.ac.uk/~ah793/papers/2025police.pdf

    What is "cybercrime" though ? IIRC just manually entering a URL can be considered "sophisticated hacking" by the time the Daily Mail gets ahold
    of it.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Jethro_uk@21:1/5 to All on Sat Mar 1 09:47:35 2025
    On Fri, 28 Feb 2025 14:47:43 +0000, GB wrote:

    One solution is to hack the iphone and extract the encrypted data, so
    that it can then be worked on by simple brute force techniques.

    Is that possible ? AS in has it been done and reported ? Pics or it
    didn't happen.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Roger Hayter@21:1/5 to Jeff Gaines on Sat Mar 1 10:02:33 2025
    On 28 Feb 2025 at 21:10:39 GMT, ""Jeff Gaines"" <jgnewsid@outlook.com> wrote:

    On 28/02/2025 in message <5111730902.1dd963cc@uninhabited.net> Roger
    Hayter wrote:

    On 28 Feb 2025 at 12:01:01 GMT, ""Jeff Gaines"" <jgnewsid@outlook.com>
    wrote:

    On 28/02/2025 in message <slrnvs36pp.4ph.jon+usenet@raven.unequivocal.eu> >>> Jon Ribbens wrote:

    I think we may have missed each other's points. Criminal wouldn't
    have to do anything or use anything except an iPhone to hide their
    data, assuming it is true that no other party can access it.

    I didn't miss your point, I am saying your point is... pointless.
    It isn't a "situation for terrorists to take advantage of" since
    there is no advantage to them. They can use encryption either way.

    You still seem to be having a problem, I said:

    "Does anybody know the situation in the USA? I find it hard to believe
    that the USA government accepts it is unable to see this data, it's an
    obvious situation for terrorists to take advantage of."

    As I said it is a clear and obvious situation for terrorists or, indeed, >>> any criminal to take advantage of.

    As is being able to lock your car boot and being able to refuse permission >> to
    the police to search it without probable cause. But the Americans take
    their
    civil liberties seriously, and if anyone does search your car improperly
    they
    can't use the evidence they find. I think this is a good thing, ditto
    encryption.

    Does America accept it is unable to see this data? I struggle a bit with that, especially after today's performance from Trump/Vance!

    America absolutely accepts that it is unable to routinely see this data *for American citizens*, at least in its government's public policies. There is
    some debate over access to data for people undergoing criminal investigation because of reasonable suspicion, but the courts seem to have sided with Apple on this. And there has been no move to forbid public access to strong encryption which can't be broken by the supplier

    --

    Roger Hayter

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Roger Hayter@21:1/5 to jethro_uk@hotmailbin.com on Sat Mar 1 11:21:06 2025
    On 1 Mar 2025 at 09:45:53 GMT, "Jethro_uk" <jethro_uk@hotmailbin.com> wrote:

    On Fri, 28 Feb 2025 20:49:05 +0000, Jon Ribbens wrote:

    On 2025-02-28, Mike Scott <usenet.16@scottsonline.org.uk.invalid> wrote:
    On 28/02/2025 14:35, GB wrote:
    That kind of justifies the sentence in the OP: "What I can say is that >>>> the suggestion that privacy and security are at odds is not correct;
    we can and must have both."

    But we come back to the fundamental issue that either something is
    secure, in which case no-one can pry including HMG, or HMG can get at
    it in which case /anyone/ can get at it. Only today

    <https://www.bbc.com/news/articles/c3vwwq260gdo>

    "The force said the mother of PC Molly Bury, 28, was overheard at an
    event in Burnley telling someone "Molly checked the police system"
    before it emerged the officer had illegally accessed police computer
    systems over several years."

    If a government agency has the keys, the wrong people /will/ use them
    for wrong purposes. And when (if) you find out, it's too late.

    If you're interested in "casual security", settle for ROT13.

    Apparently *over half* of all cybercrime prosecutions in the UK are of
    police officers abusing the system.

    https://www.cl.cam.ac.uk/~ah793/papers/2025police.pdf

    What is "cybercrime" though ? IIRC just manually entering a URL can be considered "sophisticated hacking" by the time the Daily Mail gets ahold
    of it.

    Well it would be a crime if you are accessing data you are not entitled to
    see, and using credentials given to you for other purposes to do so.

    In the innocent days of a decade or two back, the web was awash with data that its owners regarded as secret but was not protected in any way from anyone who could find, or guess, the address. I think it was established to be criminal
    to deliberately access data you knew you were not entitled to see, even if no passwords or other credentials were involved. Roland could probably remind us whether that was established. I think generally people have learned to not leave secret stuff unprotected.




    --

    Roger Hayter

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From GB@21:1/5 to All on Sat Mar 1 12:20:20 2025
    On 01/03/2025 09:47, Jethro_uk wrote:
    On Fri, 28 Feb 2025 14:47:43 +0000, GB wrote:

    One solution is to hack the iphone and extract the encrypted data, so
    that it can then be worked on by simple brute force techniques.

    Is that possible ? AS in has it been done and reported ? Pics or it
    didn't happen.


    I have it on good authority from the FBI that it can be done. OTOH, I
    hear from some anonymous bloke on the internet that it can't be done. He
    says that I must prove him wrong, or else it's 100% certain that the FBI
    are lying.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From GB@21:1/5 to Sam Plusnet on Sat Mar 1 12:26:21 2025
    On 27/02/2025 18:16, Sam Plusnet wrote:
    On 27/02/2025 15:32, Jethro_uk wrote:
    On Thu, 27 Feb 2025 13:31:18 +0000, Martin Brown wrote:

    Personally I wouldn't trust anyone elses encryption.

    You have to be very very good at it before DIY encryption will be even
    remotely secure. PGP back in its day was classed as exporting munitions
    by the US government when they decided to persecute the author.

    --

    Oh I agree. The security fails from roll-your-own encryption are legend.
    Which is why I wouldn't risk that.

    Bottom line is you have to assume all channels are compromised and work
    with that.

    ROT13 is pretty secure - especially if you double-encode your text.


    AFAIK, you can use a proper form of encryption such as AES but with 128
    bit keys, and this will not be a problem for the security services?

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Mark Goodge@21:1/5 to jon+usenet@unequivocal.eu on Sat Mar 1 13:32:46 2025
    On Fri, 28 Feb 2025 20:49:05 -0000 (UTC), Jon Ribbens <jon+usenet@unequivocal.eu> wrote:

    Apparently *over half* of all cybercrime prosecutions in the UK are of
    police officers abusing the system.

    https://www.cl.cam.ac.uk/~ah793/papers/2025police.pdf

    I suspect, though, that that's mainly because access to, and usage of, the
    PNC is strictly regulated and routinely monitored, precisely because of the potential for abuse. Which means that someone abusing that privilege has a
    very strong probability of being detected and, if the offence is
    sufficiently egregious, prosecuted. So I don't think that tells us anything useful about the prevalence of undetected and unprosecuted cybercrime in the wider community.

    Mark

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Roger Hayter@21:1/5 to NOTsomeone@microsoft.invalid on Sat Mar 1 17:09:37 2025
    On 1 Mar 2025 at 12:26:21 GMT, "GB" <NOTsomeone@microsoft.invalid> wrote:

    On 27/02/2025 18:16, Sam Plusnet wrote:
    On 27/02/2025 15:32, Jethro_uk wrote:
    On Thu, 27 Feb 2025 13:31:18 +0000, Martin Brown wrote:

    Personally I wouldn't trust anyone elses encryption.

    You have to be very very good at it before DIY encryption will be even >>>> remotely secure. PGP back in its day was classed as exporting munitions >>>> by the US government when they decided to persecute the author.

    --

    Oh I agree. The security fails from roll-your-own encryption are legend. >>> Which is why I wouldn't risk that.

    Bottom line is you have to assume all channels are compromised and work
    with that.

    ROT13 is pretty secure - especially if you double-encode your text.


    AFAIK, you can use a proper form of encryption such as AES but with 128
    bit keys, and this will not be a problem for the security services?

    What, precisely, would be the point?

    --

    Roger Hayter

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Jon Ribbens@21:1/5 to Mark Goodge on Sat Mar 1 18:40:32 2025
    On 2025-03-01, Mark Goodge <usenet@listmail.good-stuff.co.uk> wrote:
    On Fri, 28 Feb 2025 20:49:05 -0000 (UTC), Jon Ribbens
    <jon+usenet@unequivocal.eu> wrote:
    Apparently *over half* of all cybercrime prosecutions in the UK are of >>police officers abusing the system.

    https://www.cl.cam.ac.uk/~ah793/papers/2025police.pdf

    I suspect, though, that that's mainly because access to, and usage of, the PNC is strictly regulated and routinely monitored, precisely because of the potential for abuse. Which means that someone abusing that privilege has a very strong probability of being detected and, if the offence is
    sufficiently egregious, prosecuted. So I don't think that tells us anything useful about the prevalence of undetected and unprosecuted cybercrime in the wider community.

    Well I'm sure you're right that it's prosecuted because it's easily
    detected and the people doing the detecting are themselves police
    (or work for the police). But the point is that it sets an absolute
    minimum of how much cybercrime the police are committing, and the
    police are asking for more powers to access private data that will
    then inevitably be abused.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Jethro_uk@21:1/5 to All on Sat Mar 1 20:57:51 2025
    On Sat, 01 Mar 2025 12:20:20 +0000, GB wrote:

    On 01/03/2025 09:47, Jethro_uk wrote:
    On Fri, 28 Feb 2025 14:47:43 +0000, GB wrote:

    One solution is to hack the iphone and extract the encrypted data, so
    that it can then be worked on by simple brute force techniques.

    Is that possible ? AS in has it been done and reported ? Pics or it
    didn't happen.


    I have it on good authority from the FBI that it can be done. OTOH, I
    hear from some anonymous bloke on the internet that it can't be done. He
    says that I must prove him wrong, or else it's 100% certain that the FBI
    are lying.

    I hear from some anonymous bloke on the internet who has it on good
    authority from the FBI that it can't be done ...

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Mike Scott@21:1/5 to All on Sun Mar 2 13:01:38 2025
    On 01/03/2025 12:26, GB wrote:
    ROT13 is pretty secure - especially if you double-encode your text.


    AFAIK, you can use a proper form of encryption such as AES but with 128
    bit keys, and this will not be a problem for the security services?

    I believe perhaps there should have been smiley.

    You do know what happens if you apply rot13 twice?


    --
    Mike Scott
    Harlow, England

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From GB@21:1/5 to Mike Scott on Sun Mar 2 15:36:26 2025
    On 02/03/2025 13:01, Mike Scott wrote:
    On 01/03/2025 12:26, GB wrote:
    ROT13 is pretty secure - especially if you double-encode your text.


    AFAIK, you can use a proper form of encryption such as AES but with
    128 bit keys, and this will not be a problem for the security services?

    I believe perhaps there should have been smiley.

    You do know what happens if you apply rot13 twice?

    Why else do you think I suggested a sensible sort of encryption and
    ignored the joke?

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From GB@21:1/5 to Roger Hayter on Sun Mar 2 15:38:14 2025
    On 01/03/2025 17:09, Roger Hayter wrote:

    AFAIK, you can use a proper form of encryption such as AES but with 128
    bit keys, and this will not be a problem for the security services?

    What, precisely, would be the point?


    I know it's a long thread, but I have already answered that question. I
    haven't made many posts on this thread, so it wouldn't take you long to
    find my answer.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From GB@21:1/5 to Jon Ribbens on Sun Mar 2 16:06:46 2025
    On 01/03/2025 18:40, Jon Ribbens wrote:

    Well I'm sure you're right that it's prosecuted because it's easily
    detected and the people doing the detecting are themselves police
    (or work for the police). But the point is that it sets an absolute
    minimum of how much cybercrime the police are committing, and the
    police are asking for more powers to access private data that will
    then inevitably be abused.



    There are cases like Molly Bury, who accessed the PNC for personal
    amusement. Whilst I don't approve of what she did, it's not serious
    abuse. And, it's certainly not abuse by the state.

    You seem to be moving on from there to something far more sinister, but
    not really justifying it.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Roger Hayter@21:1/5 to NOTsomeone@microsoft.invalid on Sun Mar 2 15:57:50 2025
    On 2 Mar 2025 at 15:38:14 GMT, "GB" <NOTsomeone@microsoft.invalid> wrote:

    On 01/03/2025 17:09, Roger Hayter wrote:

    AFAIK, you can use a proper form of encryption such as AES but with 128
    bit keys, and this will not be a problem for the security services?

    What, precisely, would be the point?


    I know it's a long thread, but I have already answered that question. I haven't made many posts on this thread, so it wouldn't take you long to
    find my answer.

    And I am saying that not leaving our phone/computer unlocked is perfectly adequate defence for most of us. And those of us with data that is actually valuable to someone won't be protected by weak encryption.

    --

    Roger Hayter

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Roger Hayter@21:1/5 to NOTsomeone@microsoft.invalid on Sun Mar 2 19:11:22 2025
    On 2 Mar 2025 at 16:06:46 GMT, "GB" <NOTsomeone@microsoft.invalid> wrote:

    On 01/03/2025 18:40, Jon Ribbens wrote:

    Well I'm sure you're right that it's prosecuted because it's easily
    detected and the people doing the detecting are themselves police
    (or work for the police). But the point is that it sets an absolute
    minimum of how much cybercrime the police are committing, and the
    police are asking for more powers to access private data that will
    then inevitably be abused.



    There are cases like Molly Bury, who accessed the PNC for personal
    amusement. Whilst I don't approve of what she did, it's not serious
    abuse. And, it's certainly not abuse by the state.

    You seem to be moving on from there to something far more sinister, but
    not really justifying it.

    In a lot of published cases police officers were accessing data for money, or to aid criminal friends/partners

    --

    Roger Hayter

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Jethro_uk@21:1/5 to Martin Harran on Mon Mar 3 13:35:31 2025
    On Mon, 03 Mar 2025 11:03:19 +0000, Martin Harran wrote:

    On Sat, 1 Mar 2025 09:47:35 -0000 (UTC), Jethro_uk
    <jethro_uk@hotmailbin.com> wrote:

    On Fri, 28 Feb 2025 14:47:43 +0000, GB wrote:

    One solution is to hack the iphone and extract the encrypted data, so
    that it can then be worked on by simple brute force techniques.

    Is that possible ? AS in has it been done and reported ? Pics or it
    didn't happen.


    Do you really think that GCHQ and/or NSA would disclose how far advanced
    they are in decryption? Bearing in mind the amount of leading-edge
    equipment they have - possibly even quantum - I suspect they have got a
    lot further than we'd imagine.

    *Shrug*

    as I have already stated, I don't trust any form of encryption. So GCHQ/
    NSA having cracked something *other people* consider uncrackable is
    merely an interesting sidenote to me.

    If I did need to engage in activities where protection from eavesdropping
    is crucial that would be my starting point.

    Decent encryption is only so useful. Right now I would assume -
    encryption or not - anything the UK exchanges with the US is on Russian
    desks before their US counterparts can read it.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Roland Perry@21:1/5 to All on Thu Mar 6 19:11:31 2025
    In message <2806583049.102f1222@uninhabited.net>, at 11:21:06 on Sat, 1
    Mar 2025, Roger Hayter <roger@hayter.org> remarked:
    On 1 Mar 2025 at 09:45:53 GMT, "Jethro_uk" <jethro_uk@hotmailbin.com> wrote:

    On Fri, 28 Feb 2025 20:49:05 +0000, Jon Ribbens wrote:

    On 2025-02-28, Mike Scott <usenet.16@scottsonline.org.uk.invalid> wrote: >>>> On 28/02/2025 14:35, GB wrote:
    That kind of justifies the sentence in the OP: "What I can say is that >>>>> the suggestion that privacy and security are at odds is not correct; >>>>> we can and must have both."

    But we come back to the fundamental issue that either something is
    secure, in which case no-one can pry including HMG, or HMG can get at
    it in which case /anyone/ can get at it. Only today

    <https://www.bbc.com/news/articles/c3vwwq260gdo>

    "The force said the mother of PC Molly Bury, 28, was overheard at an
    event in Burnley telling someone "Molly checked the police system"
    before it emerged the officer had illegally accessed police computer
    systems over several years."

    If a government agency has the keys, the wrong people /will/ use them
    for wrong purposes. And when (if) you find out, it's too late.

    If you're interested in "casual security", settle for ROT13.

    Apparently *over half* of all cybercrime prosecutions in the UK are of
    police officers abusing the system.

    https://www.cl.cam.ac.uk/~ah793/papers/2025police.pdf

    What is "cybercrime" though ?

    Don't, just don't.

    I've sat in more meetings trying to define that, than you've had hot
    dinners.

    Short version: Two kinds - crimes against the network, and crimes
    facilitated by the network.

    IIRC just manually entering a URL can be
    considered "sophisticated hacking" by the time the Daily Mail gets ahold
    of it.

    Well it would be a crime if you are accessing data you are not entitled to >see, and using credentials given to you for other purposes to do so.

    In the innocent days of a decade or two back, the web was awash with data that >its owners regarded as secret but was not protected in any way from anyone who >could find, or guess, the address. I think it was established to be criminal >to deliberately access data you knew you were not entitled to see, even if no >passwords or other credentials were involved. Roland could probably remind us >whether that was established.

    I don't know, but do recall the issue of "guessing a url" in order to
    access unlinked data.

    I think generally people have learned to not leave secret stuff
    unprotected.

    Security by obscurity is not a good idea.
    --
    Roland Perry

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From brian@21:1/5 to All on Fri Mar 7 02:00:57 2025
    In message <lRgSwFXjNfynFAS8@perry.uk>, Roland Perry <roland@perry.uk>
    writes
    In message <2806583049.102f1222@uninhabited.net>, at 11:21:06 on Sat, 1
    Mar 2025, Roger Hayter <roger@hayter.org> remarked:
    On 1 Mar 2025 at 09:45:53 GMT, "Jethro_uk" <jethro_uk@hotmailbin.com> wrote: >>
    <------------------------------>
    .......

    Well it would be a crime if you are accessing data you are not entitled to >>see, and using credentials given to you for other purposes to do so.

    In the innocent days of a decade or two back, the web was awash with data that
    its owners regarded as secret but was not protected in any way from anyone who
    could find, or guess, the address. I think it was established to be criminal >>to deliberately access data you knew you were not entitled to see, even if no >>passwords or other credentials were involved. Roland could probably remind us >>whether that was established.

    I don't know, but do recall the issue of "guessing a url" in order to
    access unlinked data.

    I think generally people have learned to not leave secret stuff >>unprotected.

    Security by obscurity is not a good idea.

    There was a case in 2005 focusing on an innocent "directory traversal"

    https://www.scl.org/821-computer-misuse-prosecutions/

    The Tsunami Case. I remembered it because I also tried to donate and hit similar problems. I just gave up.

    It seems that just editing a url can be enough to set the alarms off.

    Brian

    --
    Brian Howie

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Roland Perry@21:1/5 to All on Mon Mar 10 19:18:07 2025
    In message <bR$qfcJZNlynFwFI@b-howie.co.uk>, at 02:00:57 on Fri, 7 Mar
    2025, brian <nospam@b-howie.co.uk> remarked:
    In message <lRgSwFXjNfynFAS8@perry.uk>, Roland Perry <roland@perry.uk>
    writes
    In message <2806583049.102f1222@uninhabited.net>, at 11:21:06 on Sat,
    1 Mar 2025, Roger Hayter <roger@hayter.org> remarked:
    On 1 Mar 2025 at 09:45:53 GMT, "Jethro_uk" <jethro_uk@hotmailbin.com> wrote: >>>
    <------------------------------>
    .......

    Well it would be a crime if you are accessing data you are not entitled to >>>see, and using credentials given to you for other purposes to do so.

    In the innocent days of a decade or two back, the web was awash with
    data that
    its owners regarded as secret but was not protected in any way from >>>anyone who
    could find, or guess, the address. I think it was established to be criminal >>>to deliberately access data you knew you were not entitled to see, even if no
    passwords or other credentials were involved. Roland could probably remind us
    whether that was established.

    I don't know, but do recall the issue of "guessing a url" in order to >>access unlinked data.

    I think generally people have learned to not leave secret stuff >>>unprotected.

    Security by obscurity is not a good idea.

    There was a case in 2005 focusing on an innocent "directory traversal"

    https://www.scl.org/821-computer-misuse-prosecutions/

    The Tsunami Case. I remembered it because I also tried to donate and
    hit similar problems. I just gave up.

    It seems that just editing a url can be enough to set the alarms off.

    Given there's only a couple of dozen Computer Misuse Act prosecutions a
    year, someone must have really got out of bed the wrong side to proceed
    with that one.
    --
    Roland Perry

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)