It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Originally posted by Helig
Unless you have coded weak crypto or put some kind of intentional backdoor into a encryption scheme the creator shouldn't be able to magically crack anything encrypted with it, to think so is uninformed foolishness. That being said there is always the traditional brute force approach which is seriously time and resource intensive when dealing with bigtime encryption like AES, on the order of thousands of years to brute force.
I suppose the actual IP address of the servers/routers you are going through wouldn't be encrypted because otherwise the client/server wouldn't know where to send the request?
He claims that encryption doesn't really work since the one (or they) who came up with the specific encryption standard would know how to decipher it since they programmed it.
Originally posted by Taz2122
In specific we were arguing about a VPN solution. My question is:
How does in fact a VPN solution work? What is the key used? Is it the current date or time and if so, does this change for each request?
I suppose the actual IP address of the servers/routers you are going through wouldn't be encrypted because otherwise the client/server wouldn't know where to send the request?
Originally posted by Pilgrum
About 20 years back, law enforcement people and all those 3 letter agencies were starting to have major problems intercepting and monitoring web-based communications between 'persons of interest' like drug & weapons traffickers, terrorist cells and the like due to the evolution of publicly available encryption software (eg PGP, Blowfish etc) which could be freely and anonymously downloaded by anyone on the planet. It led to a campaign at the highest levels of those agencies and government for all such software schemes to be legally required to build in a 'law enforcement backdoor' to free up resources that were being employed to brute-force those ever stronger cyphers.
I've never seen any public announcement indicating that they got what they wanted but their silence on the subject and abrupt change of posture suggests they did ultimately get what they campaigned for IE a backdoor into any downloadable scheme plus a restriction on the 'export' of encryption software beyond nominated cypher strengths. Maybe ensuring they could use Crays or whatever to brute-force their way into communications of interest to them in the absence of backdoors which would be the case with weaker versions of encryption software released prior to the campaign for easy access.
I'm not really into conspiracies but my view is 'if it can be made, it can be broken' so it's just a matter of resources and determination to circumvent any encryption. Not that I have any communications worthy of encryption which is the main reason I don't use any.
That is the most bizarre conspiracy theory I've read on here. Crab keyboards to stop people programming? AppStore conspiracies? What the hell?
But they're trying to stop that too. That's why all the new devices like tablets have #ty keyboards so you can't easily learn to code on em and what they call "app" stores. Instead of getting software from wherever you want or making it yourself, you have to buy their software from their "app store" and companies like Apple say what's allowed in their store and then they can mandate that everything has a backdoor.
Embedding data or text into digital picture files has been around for quite some time and it's called 'Steganography...