Help ATS with a contribution via PayPal:
learn more

Decrypt your drives or go to jail indefinitely!

page: 10
32
<< 7  8  9   >>

log in

join

posted on Jun, 6 2013 @ 11:27 AM
link   

Originally posted by lincolnparadox
reply to post by smyleegrl
 


I agree with you, BUT...

When the police can't open a lock, they call a locksmith.

If the police/judge/DA wants to decrypt those files, they need to hire a computer forensics expert. It will cost, but they have a warrant. The burden of proof falls on the prosecution, as does the requirement to gather evidence.



There is a limitation on cracking and only applies to already known flawed algorithms. So yes there is lots out there to crack, but when brute forcing standard 128, 192, 256 bit AES you're going to hit a abrupt dead end. Especially if you couple AES with twofish and serpant. The mathematical possible combinations for 256bit AES is 1.1x10^77 or 1.1e+77. That's a lot.

Brute Forcing a password is also limited by what you pipe into it. If a password is a word in the dictionary then it's almost certain you're going to crack it. There are many dictionary files like states/cities, cars, common first/last names, dictionary words. You can enter in info like this for a brute force attack in hopes that the bruteforce has something to go on and eventually exhaust combinations possible. Length of a password is crucial the longer the password the harder it becomes to crack. Also the strength of the password with what factors are used. If it is a 4-5-6 form factored password it now becomes virtually impossible to crack. What I mean by factors, is letters/numbers | upper/lower | special keys | pictures or other files. Creating a password that also asks for a file makes cracking futile.

Moreover, then we have thumb prints and eye scanners, chips and chipped cards, usb sticks used to unlock systems with unique serial numbers and key on it to unlock systems. The list goes on and on and on. It's a nightmare for forensics as some things are just impossible to crack. You can encrypt a containment file within a file, yeah try cracking that. The only thing going for forensics is the known vulnerabilities or other infiltration techniques, such as root kits, key loggers, watching the password being typed in, intercepting, middleman attacks, coercion, wifi intercepting and cracking, dumping the systems memory. Yes, there is a way to crack a computers memory and freezing it with canned air, then transferring the ram to forensics computer along with the encrypted hard drive. So yeah shutting down your system is important to drain the energy from the ram. This technique is used in hopes of gathering info that sometime the user entered in his password at the time the computer was seized.

On average most people commonly don't even take steps or measures to secure their data. Millions of e-mails are sent everyday in plain text. Many people don't even know what a digital signature is, which you can get for free. Or they don't even pay attention to the difference between http and https. It's what you don't know, that's the real threat. This guy simply took the time to lock out his hard drive and it threw a wrench in the authorities machine.
edit on 6-6-2013 by sean because: (no reason given)




posted on Jun, 6 2013 @ 11:33 AM
link   
reply to post by stirling
 
Ugh Hopechest


I'm just trying to make the point that the constitution has already been eroded away. Yet this guy is where the buck needs to stop??

Who decides whose rights get eroded for the greater good? It's biz as usual when folks have their doors bashed in/grandma thrown to the floor for the "war on drugs" yet pedos need protecting. Even in prison they get special treatment.

I suspect powerful people are involved in child sex trade/porn so we'll never see real justice. Didn't mean to come off like hopechest. I'm just disgusted.
edit on 6-6-2013 by Morningglory because: (no reason given)



posted on Jun, 6 2013 @ 11:34 AM
link   
Google "TrueCrypt + plausable deniability" and your problem is solved. This guy is a techno noob, and thus suffers the consequences.



posted on Jun, 6 2013 @ 01:44 PM
link   
I don't care if hes a pedo or a white supremacist or a mass murderer. He should have the right to remain silent. Yeah hes a techno newb he could use the false volume approach. The entire thing is pointless because they've already decrypted a drive. If they have the evidence there then whats the problem? Prosecute the guy. As a I understand it every picture and every video is like so many years? Done. Quit crying and taking away the rest of our rights for stupid things like this.



posted on Jun, 6 2013 @ 03:59 PM
link   
Hmmm....this all seems very simple to me.....



When a warrant is issued to search your premises, that includes all objects within, cabinets, basements, holes, hiding spots, vehicles in the garage, the airspace above the home etc.

This still applies to your computer hard drive. It is a "virtual filing cabinet" and all data inside it is subject to search.

If they are unable to crack the encryption, and the user refuses to provide the passwords based on constitutional rights, there are a few options.

1. Convict on current charges and issue charges pending, with no parole until the files are cracked.

2. Plea bargain the current convictions down to get the passwords to "protect the children" and not worry about the additional pay bump from increased charges. (this is a bs claim, most people who deal with enforcement of child porn know that a large bulk of the material available off torrents etc was made a long time ago. It is not easy to access current pedo material without using something to cover your tracks that would be obvious to any investigator.)

3. Allow the constitution to do what it was meant to do, because there is not enough evidence through ip traffic, file association, and physical means, to make an actual conviction and release the defendant. His computer can be confiscated as an "unsearchable asset" and charges to be formaly presented upon them breaking the encryption.

4. Go full retard, cost the tax payers several million dollars, by detaining someone without due process thus enraging the american public more and forcing them to argue with each other of semantics cause the person in question who's rights are being trampled on liked to look at pictures of naked kids, which most of us, take extreme issue with that kind of behavior.


Hmmm I wonder which option they will choose.....


I am not trying to stick up for kiddy pron or this guy beyond the fact it effects all of us, next time it might not be the kiddy porn guy, but Bob the gardener, who was creating documents telling people how to "make your own organic garden"


Lets step back from emotion for a second and consider some things.

Is there any evidence this person created child porn? No
Is there any evidence that this person was attempting to associated with young children? No
Is there any evidence this person posed a threat to anyone's actual person? No
Is this person guilty of anything other than view the results of others despicable actions? No


So think carefully my friends before you lets the words and associates cloud your view of the actual issue.



posted on Jun, 6 2013 @ 04:16 PM
link   
reply to post by Arbitrageur
 


Again I'm specifically speaking about rar files.
Things like windows passwords are crackable in under 20 seconds with a machine like that.
SQL hashed passwords are cake for that beast.

rar encryption is a different animal. And would still take some time with longer complex passwords.

Jngh5894hdfikoLJKH&^%

Something like the password above would still be a challenge to that monster.

anrieff.net...


Why is it so hard to crack RAR passwords?

The RAR archives are notorious for their strong encryption which proves to be resistant to brute-force searches, even when the passwords used are quite weak by modern standards. There are three reasons for this:

RAR relies on well-proven cryptographic algorithms;
Its initialization step is deliberately made very slow, so that the number of passwords one can test per second is quite low;
WinRAR and related tools don't not have any bugs or other security problems;

The last item might seem irrelevant at first, but consider the case with .ZIP files and WinZIP version 7 or earlier: if you got an encrypted archive with more than four files, programs like ElcomSoft's Advanced Archive Password Recovery can break your password for sure, no matter how strong it is. Therefore, you should never use WinZIP for any serious security. This is all because of a flaw in WinZIP's original implementation, which seems to be fixed in recent versions. In case of WinRAR, nobody has found a bug like this as of the time of this writing.

The second item is helped a lot by the first one. The RAR encryption routine requires a key initialization phase, which is intentionally made complex and requires a lot of number crunching. Because of the first item, it cannot be short-circuited: you cannot avoid doing all of the calculations. Indeed, the algorithms used in RAR (namely: the AES encryption algorithm and the SHA-1 hashing routine) are very well studied. Making some serious progress in item #2 would require a significant cryptographic discovery. Therefore, you can safely assume the security of RAR will not be broken soon.

Let's put some numbers. Assuming your cracking speed is stuck at let's say 100 passwords per second, it would take a long time to launch even a small dictionary attack (and a reasonable one can take hours). Testing all 5-chars alphanumeric passwords takes week and a half, testing all numbers up to a billion requires four months, and doing the ultimate search: all 8-chars passwords using any printable character would take about 210 million years! (Of course, this doesn't count the effects of Moore's law. Click here for an amusing applet that takes it into account.)



posted on Jun, 6 2013 @ 04:21 PM
link   

Originally posted by WP4YT
I don't get it. If they already found some illegal things on his other drive, why don't they just charge him on what they found rather than drag it out? Hmm, because prosecutors always want the hardest penalties possible. Doesn't matter they have enough now to lock him up for 20 years, they need to violate the constitution and risk their case in order to push for life in prison for him.

I'll tell you why. Because this about "setting precedent" within the justice system. You see, they don't give a flying rat's behind about this guy having kiddy porn and punishing him. If they did, they would have prosecuted him already with the kiddie porn they already found on his hard drive.

What they want to do is use the popular hatred people have for kiddie porn to "set precedent" that demanding encryption keys under threat of indefinite imprisonment as a standard procedure for all people who's computer equipment is encrypted, be it Wall Street traders, Political activists, Technology researchers, etc.

If they can convince the courts to do this NOW, then they will be able to do this WITHOUT QUESTION to everyone in the future whom they want encryption keys from.

Lastly, it's also just more chipping away of the Constitution that they are doing everyday. They want that thing to go away or simply be ruled irrelevant.



posted on Jun, 6 2013 @ 06:09 PM
link   

Originally posted by grey580
rar encryption is a different animal. And would still take some time with longer complex passwords.
I'm not sure if they even need a password with what they're doing:

www.wired.com...

There is still one technology preventing untrammeled government access to private digital data: strong encryption. Anyone—from terrorists and weapons dealers to corporations, financial institutions, and ordinary email senders—can use it to seal their messages, plans, photos, and documents in hardened data shells. For years, one of the hardest shells has been the Advanced Encryption Standard, one of several algorithms used by much of the world to encrypt data. Available in three different strengths—128 bits, 192 bits, and 256 bits—it’s incorporated in most commercial email programs and web browsers and is considered so strong that the NSA has even approved its use for top-secret US government communications. Most experts say that a so-called brute-force computer attack on the algorithm—trying one combination after another to unlock the encryption—would likely take longer than the age of the universe. For a 128-bit cipher, the number of trial-and-error attempts would be 340 undecillion (1036).

Breaking into those complex mathematical shells like the AES is one of the key reasons for the construction going on in Bluffdale....

The NSA’s machine was likely similar to the unclassified Jaguar, but it was much faster out of the gate, modified specifically for cryptanalysis and targeted against one or more specific algorithms, like the AES. In other words, they were moving from the research and development phase to actually attacking extremely difficult encryption systems. The code-breaking effort was up and running.

The breakthrough was enormous, says the former official, and soon afterward the agency pulled the shade down tight on the project, even within the intelligence community and Congress. “Only the chairman and vice chairman and the two staff directors of each intelligence committee were told about it,” he says. The reason? “They were thinking that this computing breakthrough was going to give them the ability to crack current public encryption.”



posted on Jun, 6 2013 @ 06:46 PM
link   
I don't believe he should be forced to decrypt it. If the courts rule that way it has far reaching implications, and the courts have been going back and forth on just this very issue for years. Sometimes in favor and sometimes against, there's precedent on both sides but so far nothing has gone beyond a state level court.

What the guy needed to do when refusing to decrypt it though is to say he doesn't remember the password. If you don't remember, there's not much they can do. It's not like they can force it out of you at that point.
edit on 6-6-2013 by Aazadan because: (no reason given)



posted on Jun, 6 2013 @ 07:47 PM
link   
all one would need is a keyboard key and program that allowed for systems lock in character of ones own design, where no super computer could ever unscramble its unique character, plus erasure pass on drive for every attempt by super computer..so if forced to ever open it by threat..nothing would be there but billions of overwrites


we've came to an age were defense against the establishment is paramount in our survival and that we must master the art of counter intelligence on every level of our daily lives to circumvent their treachery against humanity



posted on Jun, 6 2013 @ 07:50 PM
link   

Originally posted by Wrabbit2000

Originally posted by maryhinge
reply to post by ownbestenemy
 


im not into child porn so i would have nothing to hide from the "govenment"


When they came for the Jews, I said nothing, for I was not Jewish.

When they came for the Roma, I said nothing, for I was not Roma.

When they came for the outcasts, I said nothing, for I was no outcast.

Now they come for me and there is no one left to say anything.


Things to consider.


Nah, pal. There was no one left, to send out for me.



posted on Jun, 6 2013 @ 07:58 PM
link   

Originally posted by nesba263
Google "TrueCrypt + plausable deniability" and your problem is solved. This guy is a techno noob, and thus suffers the consequences.


Yes that's another method, a containment file of real data hidden inside another decoy containment file filled with legit decoy accounts.



posted on Jun, 7 2013 @ 12:43 AM
link   

Originally posted by maryhinge
reply to post by SaturnFX
 


like i have already said i have no child porn on my pc and dont go on black internet to download this kind of #e

so i have nothing to hide

also i didnt know it was ATS that wanted to decrypt his files

GET A GRIP thou do protest to much

I protest about someone being forced to testify against themselves?
Ya...its called being an American.
Learn the law of the land. There is a reason why such measures are put in place.

I am not saying this guy is clean. but its better to let 100 people get away with someone than compromise the law and have innocent people lose rights and privacy.

I know you totally want to get lost in the example, because the example justifies the sweeping destruction of a value that 200+ years of scholarly wisdom has given us in favor of draconian measures for all. If you don't understand this simple aspect, then you are easy prey for any dictorial measure.

And don't you dare question my character. You don't know me, and you only show that your grasp on this is weak and backwards when you attack a person verses the point.



posted on Jun, 7 2013 @ 06:39 AM
link   
reply to post by Arbitrageur
 


Yeah it's a numbers game.
But that machine might do it.



posted on Jun, 7 2013 @ 07:30 AM
link   
reply to post by SaturnFX
 


We are seeing how these dents in the law turn into near destruction of it. Now the NSA has probable cause to get the phone records of nearly everyone at Verizon. The ability to monitor everything at large ISPs. The FBI has cause to get phone records of reporters.

It's starting to look as it every American citizen is now considered a suspect in some crime.



posted on Jun, 8 2013 @ 01:56 AM
link   
reply to post by SaturnFX
 

it was pointed out to me by nenothtu so i take it back sorry





new topics

top topics



 
32
<< 7  8  9   >>

log in

join