Rocksolid Light

Welcome to novaBBS (click a section below)

mail  files  register  newsreader  groups  login

Message-ID:  

They can always run stderr through uniq. :-) -- Larry Wall in <199704012331.PAA16535@wall.org>


computers / alt.privacy.anon-server / Another Pseudo Secure Encryption Bites The Dust - Thank Goodness

SubjectAuthor
* Another Pseudo Secure Encryption Bites The Dust - Thank Goodnessmike
`* Re: Another Pseudo Secure Encryption Bites The Dust - Thank GoodnessGrant Taylor
 +* Re: Another Pseudo Secure Encryption Bites The Dust - Thank GoodnessThe Stuff of Legend
 |`* Re: Another Pseudo Secure Encryption Bites The Dust - Thank GoodnessGrant Taylor
 | `* Re: Another Pseudo Secure Encryption Bites The Dust - Thank Goodnessrat
 |  +- Re: Another Pseudo Secure Encryption Bites The Dust - Thank Goodnessnone
 |  `* Re: Another Pseudo Secure Encryption Bites The Dust - Thank GoodnessGrant Taylor
 |   `* Re: Another Pseudo Secure Encryption Bites The Dust - Thank Goodnessrat
 |    `- Re: Another Pseudo Secure Encryption Bites The Dust - Thank GoodnessGrant Taylor
 `- Re: Another Pseudo Secure Encryption Bites The Dust - Thank Goodnesskuzvanechka2

1
Another Pseudo Secure Encryption Bites The Dust - Thank Goodness

<de600ihf5ghpatunb0k77pjo0eprkcr4kt@4ax.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=13711&group=alt.privacy.anon-server#13711

  copy link   Newsgroups: alt.privacy.anon-server alt.computer Security
Path: i2pn2.org!i2pn.org!eternal-september.org!reader01.eternal-september.org!.POSTED!not-for-mail
From: mik...@notyahooie.com
Newsgroups: alt.privacy.anon-server,alt.computer,Security
Subject: Another Pseudo Secure Encryption Bites The Dust - Thank Goodness
Date: Wed, 01 Mar 2023 21:40:55 -0600
Organization: A noiseless patient Spider
Lines: 33
Message-ID: <de600ihf5ghpatunb0k77pjo0eprkcr4kt@4ax.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: 8bit
Injection-Info: reader01.eternal-september.org; posting-host="ebd81897a3543b50f451d2a3d65b766f";
logging-data="233778"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+0tGx3TnjltFvWz1oWSOmpYiV9lD+tbaeCxFTenEKU9g=="
Cancel-Lock: sha1:RDt6Unkdn9z46SK1mGbYjfEPh84=
X-No-Archive: yes
X-Newsreader: Forte Agent 1.93/32.576 English (American)
 by: mik...@notyahooie.com - Thu, 2 Mar 2023 03:40 UTC

https://www.dailymail.co.uk/news/article-11810243/Man-50-sold-guns-gangsters-Britain-using-EncroChat-jailed-19-years.html

A man who supplied weapons to criminal gangs across the UK has been
jailed for more than 19 years.

Michael Derrane, 50, from Morpeth in Northumberland, transferred
firearms and multiple kilos of class A and B drugs to crime groups for
a profit, according to the National Crime Agency (NCA).

The NCA said Derrane used the encrypted messaging system EncroChat to
orchestrate the illegal trades in Newcastle, Manchester, Leeds, the
Midlands and London.

As part of Operation Venetic, the UK law enforcement crackdown on
EncroChat users, Derrane was arrested
=======
From Wikipedia - https://en.wikipedia.org/wiki/EncroChat

"EncroChat handsets emerged in 2016 as a replacement for a previously
disabled end-to-end encrypted service.[6] The company had revealed on
31 December 2015 the Version 115 of EncroChat OS, which appears to be
the first public release of their operating system.[7] The earliest
version of the company's website archived by the Wayback Machine dates
to 23 September 2015.[8]

According to a May 2019 report by the Gloucester Citizen, EncroChat
was originally developed for "celebrities who feared their phone
conversations were being hacked".[9] In the 2015 murder of English
mobster Paul Massey, the killers used a similar service providing
encrypted BlackBerry phones based on PGP. After the Dutch and Canadian
police compromised their server in 2016, EncroChat turned into a
popular alternative among criminals for its security-oriented services
in 2017–2018."

Re: Another Pseudo Secure Encryption Bites The Dust - Thank Goodness

<ttp7k2$ff2$1@tncsrv09.home.tnetconsulting.net>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=13712&group=alt.privacy.anon-server#13712

  copy link   Newsgroups: alt.privacy.anon-server alt.computer Security
Path: i2pn2.org!i2pn.org!weretis.net!feeder6.news.weretis.net!tncsrv06.tnetconsulting.net!tncsrv09.home.tnetconsulting.net!.POSTED.alpha.home.tnetconsulting.net!not-for-mail
From: gtay...@tnetconsulting.net (Grant Taylor)
Newsgroups: alt.privacy.anon-server,alt.computer,Security
Subject: Re: Another Pseudo Secure Encryption Bites The Dust - Thank Goodness
Date: Wed, 1 Mar 2023 21:10:37 -0700
Organization: TNet Consulting
Message-ID: <ttp7k2$ff2$1@tncsrv09.home.tnetconsulting.net>
References: <de600ihf5ghpatunb0k77pjo0eprkcr4kt@4ax.com>
Mime-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Thu, 2 Mar 2023 04:10:42 -0000 (UTC)
Injection-Info: tncsrv09.home.tnetconsulting.net; posting-host="alpha.home.tnetconsulting.net:198.18.18.251";
logging-data="15842"; mail-complaints-to="newsmaster@tnetconsulting.net"
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101
Thunderbird/78.13.0
In-Reply-To: <de600ihf5ghpatunb0k77pjo0eprkcr4kt@4ax.com>
Content-Language: en-US
 by: Grant Taylor - Thu, 2 Mar 2023 04:10 UTC

On 3/1/23 8:40 PM, mike@notyahooie.com wrote:
> The NCA said Derrane used the encrypted messaging system EncroChat
> to orchestrate the illegal trades in Newcastle, Manchester, Leeds,
> the Midlands and London.

I've not yet read the article, but arresting someone that uses
encryption does not mean that the encryption was broken.

People are arrested everyday that use HTTPS, thus encryption, yet
contemporary TLSv1.3 hasn't been broken.

--
Grant. . . .
unix || die

Re: Another Pseudo Secure Encryption Bites The Dust - Thank Goodness

<20230302202458.EB2DF120920@fleegle.mixmin.net>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=13719&group=alt.privacy.anon-server#13719

  copy link   Newsgroups: alt.privacy.anon-server alt.computer.security
Subject: Re: Another Pseudo Secure Encryption Bites The Dust - Thank Goodness
References: <de600ihf5ghpatunb0k77pjo0eprkcr4kt@4ax.com>
<ttp7k2$ff2$1@tncsrv09.home.tnetconsulting.net>
Message-Id: <20230302202458.EB2DF120920@fleegle.mixmin.net>
Date: Thu, 2 Mar 2023 20:24:58 +0000 (GMT)
Newsgroups: alt.privacy.anon-server,alt.computer.security
Author-Supplied-Address: tsol<AT>nym<DOT>mixmin<DOT>net
From: Use-Auth...@[127.1] (The Stuff of Legend)
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!sewer!news.dizum.net!not-for-mail
Organization: dizum.com - The Internet Problem Provider
X-Abuse: abuse@dizum.com
Injection-Info: sewer.dizum.com - 2001::1/128
 by: The Stuff of Legend - Thu, 2 Mar 2023 20:24 UTC

On Wed, 1 Mar 2023 21:10:37 -0700, Grant Taylor <gtaylor@tnetconsulting.net>
said in Message-ID: <ttp7k2$ff2$1@tncsrv09.home.tnetconsulting.net>:

> On 3/1/23 8:40 PM, mike@notyahooie.com wrote:
> > The NCA said Derrane used the encrypted messaging system EncroChat
> > to orchestrate the illegal trades in Newcastle, Manchester, Leeds,
> > the Midlands and London.
>
> I've not yet read the article, but arresting someone that uses
> encryption does not mean that the encryption was broken.
>
> People are arrested everyday that use HTTPS, thus encryption, yet
> contemporary TLSv1.3 hasn't been broken.

Gentlemen, this is fairly old news. The EncroChat servers were breached by the
French authorities as early as 2019, using a technique similar to that used to
gain access to the BlackBerry network a couple of years earlier.

EncroChat

Enter EncroChat, a European communication network and service provider.
EncroChat offered its users the ability to send encrypted messages, make
encrypted call (EncroTalk) and write encrypted notes (EncroNotes). This is
achieved through specially modified Android phones running the Encro
software which not only provided high levels of encryption on the device,
but also routed all data through a central server located in France which
provided end-to-end encryption of calls and messages. In addition an
EncroChat phone includes a panic button on the phone which when pressed
causes the contents of the phone to be immediately wiped, and a user can
also send a "kill pill" to self-destruct the contents of the phone.

EncroChat made it relatively straightforward to acquire a "Military Grade"
encrypted phone (or so they were marketed). While initially developed and
marketed to celebrities wanting a higher level of privacy, the service was
quickly adopted by the criminal fraternity and by 2017, EncroChat phones
were widely regarded by law enforcement as the device of choice for OCGs.
OCGs using the EncroChat service were able to make encrypted phone calls,
send encrypted messages that disappeared from both sender and recipient
within a set amount of time, and completely wipe a phone by the very action
of the police entering a PIN number provided to them by the user. Using the
EncroChat service OCGs were able to operate with complete privacy, and the
police found their attempts to investigate criminal activity frustrated at
every turn.

ENCROCHAT BREACHED

And then law enforcement agencies cracked EncroChat wide open.

In 2019, a joint operation between UK, French and Dutch police broke into
EncroChat’s service, putting a piece of malware on to the French server and
potentially the carbon units themselves, allowing them to interrupt the
panic wipe feature, access messages sent between users and record lock
screen PINs. By April 2020 European agencies, including the NCA in the UK,
had access to millions of text and hundreds of thousands of images. Under
the codenames Operation Venetic (NCA) and Eternal (Metropolitan police)
agencies began to analyse the huge amount of data that had been gathered
and began to make hundreds of arrests, seizing millions of pounds of drugs,
cash and weapons in the process.

THERE WILL BE MORE TO COME

Dame Cressida Dick, the Metropolitan Police Commissioner, said: "this is
just the beginning. We will be disrupting organised criminal networks as a
result of these operations for weeks and months and possibly years to
come."

Nikki Holland, director of investigations at the NCA, said: "this is the
broadest and deepest ever UK operation into serious organised crime." There
is every reason to believe that the number of arrests arising out of the
hack of EncroChat will rise as the police work their way through the
evidence that they have obtained.

Whilst the current target is serious organised crime, it is thought that
the NCA is sharing its intel with various other government agencies, such
as HMRC, and so we would expect the scope of the investigations spawned by
the EncroChat hack to widen over the coming months and years.

ENCROCHAT SHUTS DOWN

In June 2020 EncroChat, realising that it had been compromised, sent a
message to its users advising that they dispose of their devices
immediately. The service has since been permanently shut down. However, the
European agencies had had access to the service for months, and the damage
had already been done. It is now just a matter of time as these agencies
sift through the enormous amount of data at their fingertips.

https://www.reeds.co.uk/insight/encrochat-hack/

Re: Another Pseudo Secure Encryption Bites The Dust - Thank Goodness

<ttr4m9$oro$1@tncsrv09.home.tnetconsulting.net>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=13721&group=alt.privacy.anon-server#13721

  copy link   Newsgroups: alt.privacy.anon-server alt.computer.security
Path: i2pn2.org!i2pn.org!usenet.blueworldhosting.com!feed1.usenet.blueworldhosting.com!tncsrv06.tnetconsulting.net!tncsrv09.home.tnetconsulting.net!.POSTED.alpha.home.tnetconsulting.net!not-for-mail
From: gtay...@tnetconsulting.net (Grant Taylor)
Newsgroups: alt.privacy.anon-server,alt.computer.security
Subject: Re: Another Pseudo Secure Encryption Bites The Dust - Thank Goodness
Date: Thu, 2 Mar 2023 14:32:51 -0700
Organization: TNet Consulting
Message-ID: <ttr4m9$oro$1@tncsrv09.home.tnetconsulting.net>
References: <de600ihf5ghpatunb0k77pjo0eprkcr4kt@4ax.com>
<ttp7k2$ff2$1@tncsrv09.home.tnetconsulting.net>
<20230302202458.EB2DF120920@fleegle.mixmin.net>
Mime-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Thu, 2 Mar 2023 21:32:57 -0000 (UTC)
Injection-Info: tncsrv09.home.tnetconsulting.net; posting-host="alpha.home.tnetconsulting.net:198.18.18.251";
logging-data="25464"; mail-complaints-to="newsmaster@tnetconsulting.net"
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101
Thunderbird/78.13.0
In-Reply-To: <20230302202458.EB2DF120920@fleegle.mixmin.net>
Content-Language: en-US
 by: Grant Taylor - Thu, 2 Mar 2023 21:32 UTC

On 3/2/23 1:24 PM, The Stuff of Legend wrote:
> Gentlemen, this is fairly old news. The EncroChat servers were breached
> by the French authorities as early as 2019, using a technique similar
> to that used to gain access to the BlackBerry network a couple of
> years earlier.

Nothing about what you shared indicated that authorities /broke/ or
/cracked/ the encryption used.

Getting inside the network another way is completely independent of the
encryption used.

xkcd 538 -- Security -- comes to mind
- https://xkcd.com/538/

--
Grant. . . .
unix || die

Re: Another Pseudo Secure Encryption Bites The Dust - Thank Goodness

<5d96169f39a348427c931bbab9c44401@dizum.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=13726&group=alt.privacy.anon-server#13726

  copy link   Newsgroups: alt.computer.security alt.privacy.anon-server
From: rat...@dc.nest (rat)
References: <de600ihf5ghpatunb0k77pjo0eprkcr4kt@4ax.com>
<ttp7k2$ff2$1@tncsrv09.home.tnetconsulting.net>
<20230302202458.EB2DF120920@fleegle.mixmin.net>
<ttr4m9$oro$1@tncsrv09.home.tnetconsulting.net>
Subject: Re: Another Pseudo Secure Encryption Bites The Dust - Thank Goodness
Message-ID: <5d96169f39a348427c931bbab9c44401@dizum.com>
Date: Fri, 3 Mar 2023 00:22:56 +0100 (CET)
Newsgroups: alt.computer.security,alt.privacy.anon-server
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!sewer!news.dizum.net!not-for-mail
Organization: dizum.com - The Internet Problem Provider
X-Abuse: abuse@dizum.com
Injection-Info: sewer.dizum.com - 2001::1/128
 by: rat - Thu, 2 Mar 2023 23:22 UTC

On 02 Mar 2023, Grant Taylor <gtaylor@tnetconsulting.net> posted some
news:ttr4m9$oro$1@tncsrv09.home.tnetconsulting.net:

> On 3/2/23 1:24 PM, The Stuff of Legend wrote:
>> Gentlemen, this is fairly old news. The EncroChat servers were breached
>> by the French authorities as early as 2019, using a technique similar
>> to that used to gain access to the BlackBerry network a couple of
>> years earlier.
>
> Nothing about what you shared indicated that authorities /broke/ or
> /cracked/ the encryption used.
>
> Getting inside the network another way is completely independent of the
> encryption used.
>
> xkcd 538 -- Security -- comes to mind
> - https://xkcd.com/538/

All it takes is a tech inside a DC cage with a USB drive. Plug it in, the
OS does the rest when it reads the drive file system. Takes less than a
minute to compromise a system. Pull the drive on the way out and nobody
is the wiser.

A COLO looks impressive on the outside and even more internally. But
techs are badged to work in them to save time getting in and out. There
are blind spots and it is not uncommon for equipment grid / cage locations
to be misidentified on access requests.

Familiarity breeds contempt and opens doors.

Re: Another Pseudo Secure Encryption Bites The Dust - Thank Goodness

<335c58b9c6b8fe831c823cd39772ef15@news.novabbs.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=13728&group=alt.privacy.anon-server#13728

  copy link   Newsgroups: alt.privacy.anon-server
Date: Thu, 2 Mar 2023 23:58:10 +0000
Subject: Re: Another Pseudo Secure Encryption Bites The Dust - Thank Goodness
X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on novabbs.org
From: kuzvanec...@proton.me (kuzvanechka2)
Newsgroups: alt.privacy.anon-server
X-Rslight-Site: $2y$10$aH.fkP6kAq7S9qUS1BLQyuFdeqfglIuw0sY9EFy/YIpbZNu1XoEFy
X-Rslight-Posting-User: 81d9887e53b87ba032d2aba85ed203470d5f1e53
Mime-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit
User-Agent: Rocksolid Light 0.7.2
References: <de600ihf5ghpatunb0k77pjo0eprkcr4kt@4ax.com> <ttp7k2$ff2$1@tncsrv09.home.tnetconsulting.net>
Organization: novaBBS
Message-ID: <335c58b9c6b8fe831c823cd39772ef15@news.novabbs.com>
 by: kuzvanechka2 - Thu, 2 Mar 2023 23:58 UTC

Wikipedia:

"Intelligence and technical collaboration between the NCA, the National Gendarmerie and Dutch police culminated in gaining access to messages after the National Gendarmerie put a "technical tool" on EncroChat's servers in France."

Looks like attackers had physical access to servers, and encryption was not point-to-point. Either that, or Encrochat was a trap from the very beginning.

Re: Another Pseudo Secure Encryption Bites The Dust - Thank Goodness

<dd15ba6c1e9dc9464b11cb0276ef08d2@dizum.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=13731&group=alt.privacy.anon-server#13731

  copy link   Newsgroups: alt.computer.security alt.privacy.anon-server
From: ano...@anonymous.com (none)
References: <de600ihf5ghpatunb0k77pjo0eprkcr4kt@4ax.com>
<ttp7k2$ff2$1@tncsrv09.home.tnetconsulting.net>
<20230302202458.EB2DF120920@fleegle.mixmin.net>
<ttr4m9$oro$1@tncsrv09.home.tnetconsulting.net>
<5d96169f39a348427c931bbab9c44401@dizum.com>
Subject: Re: Another Pseudo Secure Encryption Bites The Dust - Thank Goodness
Message-ID: <dd15ba6c1e9dc9464b11cb0276ef08d2@dizum.com>
Date: Fri, 3 Mar 2023 02:24:35 +0100 (CET)
Newsgroups: alt.computer.security,alt.privacy.anon-server
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!sewer!news.dizum.net!not-for-mail
Organization: dizum.com - The Internet Problem Provider
X-Abuse: abuse@dizum.com
Injection-Info: sewer.dizum.com - 2001::1/128
 by: none - Fri, 3 Mar 2023 01:24 UTC

On 02 Mar 2023, rat <rat@dc.nest> posted some
news:5d96169f39a348427c931bbab9c44401@dizum.com:

> On 02 Mar 2023, Grant Taylor <gtaylor@tnetconsulting.net> posted some
> news:ttr4m9$oro$1@tncsrv09.home.tnetconsulting.net:
>
>> On 3/2/23 1:24 PM, The Stuff of Legend wrote:
>>> Gentlemen, this is fairly old news. The EncroChat servers were
>>> breached by the French authorities as early as 2019, using a
>>> technique similar to that used to gain access to the BlackBerry
>>> network a couple of years earlier.
>>
>> Nothing about what you shared indicated that authorities /broke/ or
>> /cracked/ the encryption used.
>>
>> Getting inside the network another way is completely independent of
>> the encryption used.
>>
>> xkcd 538 -- Security -- comes to mind
>> - https://xkcd.com/538/
>
> All it takes is a tech inside a DC cage with a USB drive. Plug it in,
> the OS does the rest when it reads the drive file system. Takes less
> than a minute to compromise a system. Pull the drive on the way out
> and nobody is the wiser.
>
> A COLO looks impressive on the outside and even more internally. But
> techs are badged to work in them to save time getting in and out.
> There are blind spots and it is not uncommon for equipment grid / cage
> locations to be misidentified on access requests.
>
> Familiarity breeds contempt and opens doors.

There are cameras above some cages but many of those team members
monitoring activity have no direct view of a tech working inside a
cabinet or rack.

They can see when a server is pulled out in front for example because that
is where the cameras are aimed, but any access of port or USB connections
on the back of the server are not visible.

Re: Another Pseudo Secure Encryption Bites The Dust - Thank Goodness

<tts3fo$lq2$2@tncsrv09.home.tnetconsulting.net>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=13734&group=alt.privacy.anon-server#13734

  copy link   Newsgroups: alt.computer.security alt.privacy.anon-server
Path: i2pn2.org!i2pn.org!weretis.net!feeder6.news.weretis.net!news.quux.org!tncsrv06.tnetconsulting.net!tncsrv09.home.tnetconsulting.net!.POSTED.alpha.home.tnetconsulting.net!not-for-mail
From: gtay...@tnetconsulting.net (Grant Taylor)
Newsgroups: alt.computer.security,alt.privacy.anon-server
Subject: Re: Another Pseudo Secure Encryption Bites The Dust - Thank Goodness
Date: Thu, 2 Mar 2023 23:18:26 -0700
Organization: TNet Consulting
Message-ID: <tts3fo$lq2$2@tncsrv09.home.tnetconsulting.net>
References: <de600ihf5ghpatunb0k77pjo0eprkcr4kt@4ax.com>
<ttp7k2$ff2$1@tncsrv09.home.tnetconsulting.net>
<20230302202458.EB2DF120920@fleegle.mixmin.net>
<ttr4m9$oro$1@tncsrv09.home.tnetconsulting.net>
<5d96169f39a348427c931bbab9c44401@dizum.com>
Mime-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Fri, 3 Mar 2023 06:18:32 -0000 (UTC)
Injection-Info: tncsrv09.home.tnetconsulting.net; posting-host="alpha.home.tnetconsulting.net:198.18.18.251";
logging-data="22338"; mail-complaints-to="newsmaster@tnetconsulting.net"
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101
Thunderbird/78.13.0
In-Reply-To: <5d96169f39a348427c931bbab9c44401@dizum.com>
Content-Language: en-US
 by: Grant Taylor - Fri, 3 Mar 2023 06:18 UTC

On 3/2/23 4:22 PM, rat wrote:
> All it takes is a tech inside a DC cage with a USB drive.

That is not breaking encryption. That's attacking the system a
different way.

--
Grant. . . .
unix || die

Re: Another Pseudo Secure Encryption Bites The Dust - Thank Goodness

<39eb0d802434a6181ab9d734fcd09e4d@dizum.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=13744&group=alt.privacy.anon-server#13744

  copy link   Newsgroups: alt.computer.security alt.privacy.anon-server
From: rat...@dc.nest (rat)
References: <de600ihf5ghpatunb0k77pjo0eprkcr4kt@4ax.com>
<ttp7k2$ff2$1@tncsrv09.home.tnetconsulting.net>
<20230302202458.EB2DF120920@fleegle.mixmin.net>
<ttr4m9$oro$1@tncsrv09.home.tnetconsulting.net>
<5d96169f39a348427c931bbab9c44401@dizum.com>
<tts3fo$lq2$2@tncsrv09.home.tnetconsulting.net>
Subject: Re: Another Pseudo Secure Encryption Bites The Dust - Thank Goodness
Message-ID: <39eb0d802434a6181ab9d734fcd09e4d@dizum.com>
Date: Sat, 4 Mar 2023 08:43:09 +0100 (CET)
Newsgroups: alt.computer.security,alt.privacy.anon-server
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!sewer!news.dizum.net!not-for-mail
Organization: dizum.com - The Internet Problem Provider
X-Abuse: abuse@dizum.com
Injection-Info: sewer.dizum.com - 2001::1/128
 by: rat - Sat, 4 Mar 2023 07:43 UTC

Grant Taylor <gtaylor@tnetconsulting.net> wrote in
news:tts3fo$lq2$2@tncsrv09.home.tnetconsulting.net:

> On 3/2/23 4:22 PM, rat wrote:
>> All it takes is a tech inside a DC cage with a USB drive.
>
> That is not breaking encryption. That's attacking the system a
> different way.

There is no need to break encryption when there is a means to access
stored data, which in many cases is completely unsecured.

Re: Another Pseudo Secure Encryption Bites The Dust - Thank Goodness

<ttvuqd$luk$1@tncsrv09.home.tnetconsulting.net>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=13745&group=alt.privacy.anon-server#13745

  copy link   Newsgroups: alt.computer.security alt.privacy.anon-server
Path: i2pn2.org!i2pn.org!usenet.blueworldhosting.com!feed1.usenet.blueworldhosting.com!tncsrv06.tnetconsulting.net!tncsrv09.home.tnetconsulting.net!.POSTED.alpha.home.tnetconsulting.net!not-for-mail
From: gtay...@tnetconsulting.net (Grant Taylor)
Newsgroups: alt.computer.security,alt.privacy.anon-server
Subject: Re: Another Pseudo Secure Encryption Bites The Dust - Thank Goodness
Date: Sat, 4 Mar 2023 10:23:18 -0700
Organization: TNet Consulting
Message-ID: <ttvuqd$luk$1@tncsrv09.home.tnetconsulting.net>
References: <de600ihf5ghpatunb0k77pjo0eprkcr4kt@4ax.com>
<ttp7k2$ff2$1@tncsrv09.home.tnetconsulting.net>
<20230302202458.EB2DF120920@fleegle.mixmin.net>
<ttr4m9$oro$1@tncsrv09.home.tnetconsulting.net>
<5d96169f39a348427c931bbab9c44401@dizum.com>
<tts3fo$lq2$2@tncsrv09.home.tnetconsulting.net>
<39eb0d802434a6181ab9d734fcd09e4d@dizum.com>
Mime-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Sat, 4 Mar 2023 17:23:25 -0000 (UTC)
Injection-Info: tncsrv09.home.tnetconsulting.net; posting-host="alpha.home.tnetconsulting.net:198.18.18.251";
logging-data="22484"; mail-complaints-to="newsmaster@tnetconsulting.net"
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101
Thunderbird/78.13.0
In-Reply-To: <39eb0d802434a6181ab9d734fcd09e4d@dizum.com>
Content-Language: en-US
 by: Grant Taylor - Sat, 4 Mar 2023 17:23 UTC

On 3/4/23 12:43 AM, rat wrote:
> There is no need to break encryption when there is a means to access
> stored data, which in many cases is completely unsecured.

Agreed.

But (one of) the implication(s) of the OPs post was that the encryption
had been broken. There is no evidence that is the case.

--
Grant. . . .
unix || die

1
server_pubkey.txt

rocksolid light 0.9.8
clearnet tor