It looks like you're using an Ad Blocker.

Please white-list or disable AboveTopSecret.com in your ad-blocking tool.

Thank you.

 

Some features of ATS will be disabled while you continue to use an ad-blocker.

 

Something is wrong with modern electronic devices

page: 4
19
<< 1  2  3   >>

log in

join
share:

posted on Sep, 1 2010 @ 07:07 PM
link   
Oh sweet jesus. Just use email then, you know, the one with which you _can_ use PKI? And since when has Mr. Dark intercepted an MMS and not allowed you to see it? Get real. There's plenty of things to be concerned about, this surely isn't one of them. By the way, the contract - the one Alice and Bob signed when they contracted with the Company - precludes any semblance of privacy, be it implied or otherwise. Perhaps you should go back to using smoke signals.




posted on Sep, 1 2010 @ 07:52 PM
link   
If you're looking for PRIVATE, SECURE Computer to Computer or Handset to Handset communications then you have ZERO choice but to form your own sort of ad-hoc network. Otherwise there will always need to be some CENTRAL access point (like a CELL Tower or a WIFI Access Point).

My recommendation is, if you are looking for a secure connection you should look into getting a type of LOS (Line of Sight) or even better nLOS (Near Line of Sight) Wireless Bridge Kit. Usually these are anywhere from $150-300$ a unit and you need TWO plus sufficient Antennas. After that...it's just a matter of getting LINE OF SIGHT to the target Antenna.

I've been doing a lot of research on this recently as I was looking into starting up a neighborhood WISP (Wireless Internet Service Provider).

But even then...one could argue it's not exactly 100% Secure...There are ALWAYS ways to "eavesdrop" on a connection, and that is where Encryption Keys come in.

Ideally the MOST secure connection I could think of would be be to implement something like what I stated above, (A WPA-Protected Wireless Bridge using LOS to send the data from one antenna to the other), I would also recommend using some type of "USB Thumbdrive" that was loaded with some SSL-encrypted communication method (would act like a SMARTCARD). Basically Person A would CALL Person B and tell them "Plug In". From there, both parties would insert their USB-drive, which would open the communication application that utilized SSL to transfer data across the network. The Data would be sent POINT TO POINT from Person A's Computer/Access Point/Antenna to Person B's Computer/Access Point/Antenna with NO MIDDLE MAN.

Luckily as Technology becomes newer, and more innovative, these options are becoming cheaper and cheaper.

I'd one could put together the Point to Point network for somewhere between $300-$2000 depending on elevation/line of sight between the two points. (You may need a Cell Tower to raise the antenna's height to achieve LOS for example).

Then you'd probably pay another decent number for the application that allowed direct SSL-encrypted message to be sent across the network. I haven't done much research in that area so I can't exactly quote a price.



posted on Sep, 1 2010 @ 09:19 PM
link   

Originally posted by scwizard
daniel_g: I addressed this, the solution is public key cryptography. You don't need a trusted company to hold all keys, because Alice can encrypt her message using Bob's public key, and then only Bob can decrypt the message. Also you can indicate that the message is for Alice by including Alice's public key with the message unencrypted, or some other identification.


There is a fundamental problem with this, Bob cannot choose his own key because it would mean that either nobody will know his public key, or he will need to somehow share that key with 6 billion people, something that's not feasible.

If Alice requested one, Bob could still broadcast a public key to Alice alone(or in fact to everyone in a room as it'd make no difference), but this is no different than using a third party application(includes whatever blackberries use), and like people have been pointing out, you could use bluetooth to avoid the tower altogether.

Interesting idea though.

[edit on 1-9-2010 by daniel_g]



posted on Sep, 1 2010 @ 10:48 PM
link   

Originally posted by scwizardWell lets say Alice and Bob are currently sitting in the same class. Does Alice's cell phone really need to waste electricity sending a wireless signal that can be heard as far away as the nearest cell phone tower.
...


Any computer that receives that message or a piece of that message can rebroadcast it if it so desires.
You say it's wasting battery power to send a message to a tower, but you want the data connection on 24/7 so other devices can relay through your phone? That would drain the battery WAY quicker.



posted on Sep, 1 2010 @ 11:15 PM
link   
What they need to do is free up more of the unlicensed bands to make broadband mesh networks a reality. There is no way they could stop unlicensed pirate networks set up all over the country. This completely sidesteps the net neutrality issue. Make the monopolists compete with unfettered networks.

Moreover there is a company that had a plan to offer free broadband service to everyone, if only the FCC would be allowed to free up the bandwidth. This of course is consistent with their mandate but was shot down under intense lobbying from the monopolies. So as usual the monopolies run congress.

www.computerworld.com...

All the more reason to vote out every scum bag incumbent. They are all crooks, with only a few exceptions.



posted on Sep, 2 2010 @ 07:00 AM
link   
reply to post by scwizard
 


All electronic communication is intercepted at the high speed
fiber intercept facilities like room 641a.

en.wikipedia.org...

This was the cornerstone of the FISA investigation.

If you want the deeper details watch "shadow government"

part 1 of several parts here:

www.mojvideo.com...

Excellent film with several authors with solid evidence.







[edit on 2-9-2010 by Ex_MislTech]



posted on Sep, 3 2010 @ 05:07 PM
link   
reply to post by scwizard
 


Ever heard of Bluetooth



posted on Sep, 5 2010 @ 06:29 PM
link   

Originally posted by CHA0S
reply to post by daniel_g
 


Thank you for answering these questions, it saved me some time. You are correct, it's hard to manage encryption keys with a network such as that used for mobile phones. And you can actually send data straight to another phone close to you, it's called blue-tooth.


damn you beat me to it



posted on Sep, 5 2010 @ 08:02 PM
link   

Originally posted by Alxandro
It's happening, orrather, we allow it to happen for the sake of "convenience", simple as that.
We've just gotten accustomed to it without ever questioning it.
Truly not not the best or safest means of communicating but it is what it is, and it's the preferred method of communication (PMC) for many.

BTW, did you know that all ATM's actually run on a Windows CE platform?
Scary, ain't it?


At some point the Objective Weapon (OICW) system -- an advanced rifle -- was running Windows, now that's what I call scary! Sheesh.

Now, more realistically, we have a few countries in Asia threatening to ban Blackberries because the BBs use pervasive encryption of all they communicate.

Just a thought -- maybe all ain't that bad.

I have a BB. I also don't care if somebody evesdrops on my SMS stream with my wife debating how many chicken wings to buy for the BBQ. And it will be encrypted so at least I know whoever wants the recipe will have to go through pain to get it.



posted on Sep, 5 2010 @ 09:30 PM
link   
There is a problem with our modern electronic devices because they are mass produced in China you twits.


I will concern myself when everybody's handmade in Italy Ferrari's break down for no reason.



posted on Sep, 6 2010 @ 10:30 AM
link   
there's an app for that.




Freedom from the limits of geography, from the limits of economics, from the limits of war, unrest and disaster.

Ordinary mobile phones rely on towers, wires in the ground, and other expensive infrastructure. That infrastructure can be damaged by disaster, war or terrorism. Local geography can also make it difficult or impossible to install, and so vast tracts of land are left without coverage, often in areas of great need.

But the Serval Batphone project is different. In its simplest form, Serval Batphone, as it’s name implies, just needs a phone. There is no infrastructure to be maintained, protected which also reduces environmental impact. Any two Serval-compatible phones can automatically form a mesh network. Existing mobile phones can be used, too, with Serval’s mesh-enabled phone tower design. Importantly for times of crisis, your existing phone number will work on a Serval network.



posted on Sep, 19 2010 @ 04:28 AM
link   
could it be the magnetic reversal or polar shifts that are happening as we speak. ie northern lights



new topics

top topics



 
19
<< 1  2  3   >>

log in

join