[–]▶ No.1031658>>1031669 >>1031672 >>1031719 >>1031768 >>1031803 >>1032046 >>1032134 >>1033408 >>1033464 >>1033661 >>1033850 [Watch Thread][Show All Posts]
I've seen this a lot lately, and it's getting really annoying. It's the idea that intelligence agencies like the NSA have some form of "magical" capability to instantly crack every encryption scheme known to man because 'you don't know what they're capable of'
Yes I do. I know quite well what they're capable of, and what they're capable of is nowhere near what you claim, simply because of how cryptography and computers work.
Let's look at the cryptography side of things. Any textbook on information security will tell you that secrecy in the true nature of cryptographic algorithms doesn't work. However, wikipedia explains that the history of this goes farther back than one would think.
>It was finally explicitly recognized in the 19th century that secrecy of a cipher's algorithm is not a sensible nor practical safeguard of message security; in fact, it was further realized that any adequate cryptographic scheme (including ciphers) should remain secure even if the adversary fully understands the cipher algorithm itself.
In short, hiding any sort of meta-information about cryptography would be foolish. Cryptography is the ultimate open source, because it requires and benefits from the eyes of everyone.
it also says with regards to modern computer encryption algorithms
>breaking it requires an effort many orders of magnitude larger, and vastly larger than that required for any classical cipher, making cryptanalysis so inefficient and impractical as to be effectively impossible.
In short, no they didn't find some super secret special way to instabreak AES, SHA-512, RSA, or ECC. If you truly believe they did, show some damn evidence.
On the computer side, I think people overestimate the how powerful computers are in terms of password and general cryptography breaking, and even more so how powerful the NSA's computers are. Below is a link to an earlier version of the Kaspersky password checker that estimates how long it would take for different types of computers to crack a password, everything from a ZX Spectrum to the TOP500 supercomputer Tianhe-2. Obviously don't type in your real password, but play around with this. You'll find that if your password is even remotely competent and in keeping with industry best practices (20+ characters, atleast 1 lower, upper, number, special char), it would take good ole Tianhe way longer than the average human lifespan to crack it.
https://web.archive.org/web/20170824104237/https://password.kaspersky.com/
To believe that the NSA can get it done as fast as you claim, you would have to believe that they have computers that would be TOP500-tier. I seriously doubt that.
▶ No.1031666
>No matter what we do, what we think is a strong cipher may not actually be a strong cipher. We are unlikely to know the practical strength of our cipher. In practice, strength is contextual and depends not only upon some unknown "absolute" strength, but also upon the knowledge and abilities of the attacker or opponent. Unfortunately, we do not expect to know who the attackers may be, nor their capabilities, nor will they tell us of their successes. So, absent some sort of "proof of strength in practice" (which is generally not possible), there is no way to know whether a cipher is actually protecting the information we entrust to it.
From: http://www.ciphersbyritter.com/LEARNING.HTM (heavily recommend the site, BTW)
▶ No.1031669
>>1031658 (OP)
The NSA hires a lot of crypto researchers, and they do not publish holes and attacks which reduce the search space for crypto algorithms. At the same time, the NSA doesn't want sensitive US communications to be easily intercepted by adversaries, so their work on improving encryption schemes (they were involved in helping tweak RSA) are not likely nefarious. As for "magic", it's more along the lines of interdicting shipments of computers to certain individuals, and botnetting their hardware.
▶ No.1031672>>1033608
>>1031658 (OP)
>I seriously doubt that.
You seriously doubt that a secretive agency with a bottomless wallet doesn't have access to the most powerful hardware on earth? You either glow or you are incredibly naive.
Not only will they have hardware which surpasses those computers, they'll have custom designed hardware to perform various specific tasks magnitudes of times faster than supercomputers.
▶ No.1031675>>1031725
The problem is not even cryptography. The problem is exploits and hardware backdoors. Best encryption algorithm isn't doing shit for you if the software encrypting has an unknown bug that can be exploited or if the hardware simply keylogs you entering the password or gives DMA access to the memory containing the unencrypted data. That is the big problem. There's ample evidence that three letter agencies influence the hardware industry big time. Look into Snowden and hardware backdoors in Cisco hardware for example.
They also probably have a lot of people figuring out exploits they don't publish and don't get found quickly because software has become so incredibly complex. Every critical new exploit in widely used software you hear of, you have to assume agencies like the NSA have known for months, if not for years. If they don't planted it there themselves by hired programmers working on opensource projects, that is. How safe or unsafe cryptography is does not even matter.
▶ No.1031719
>>1031658 (OP)
<muh Kerckhoffs's principle
Let me guess. You also think security by obscurity is also not effective.
>In short, no they didn't find some super secret special way to instabreak AES, SHA-512, RSA, or ECC
Way to set up a strawman and knock it down.
>NSA can't figure out your password
Most people want to protect messages, not their password.
▶ No.1031725
>>1031675
I'm surprised this answer took four replies to appear.
Encryption is not the weak point of almost any system. Take the enigma code as an example:
>Good operating procedures, properly enforced, would have made the plugboard Enigma machine unbreakable.
So then how did they break it? Don't attack the strong point. Attack things like:
>improper usage of technology
>improper implementation of technology (software bugs)
>information leaks of keys (bugs, viewing system data)
for example.
Yes, NSA capabilities aren't infinite. However they are an advanced global persistent threat with unknown capability and (if Snowden and others are to be believed) known to have massive capabilities.
▶ No.1031733>>1031737
There is an intelligence agency with dozens of billions of dollars to hire the most talented engineers in the world and fund projects with goals beyond the what most people can even imagine
>versus
some guy on a Taiwanese basket weaving forum who knows how to install Gentoo.
There is clearly an enormous capability difference. I'd actually be surprised if they couldn't get into my system whenever they wanted to.
▶ No.1031737
>>1031733
Government agencies are highly capable but (mostly) low motivated. That doesn't mean they are magic though.
If you are airgapped, they aren't getting in without visiting your house.
If you are using simple obscure software (incl. firmware) and they have no physical access, they aren't getting in unless they focus on you and spend time finding a vuln and crafting an exploit. I would be surprised if they had a prepared exploit for Haiku. Who has time for that?
If they need to get in one of those devices (eg. you are a legitimate powerful risk to them) they can with proper planning, effort and paperwork. Just don't be worth that effort and they aren't getting in.
▶ No.1031739
SUPER ADVANCED (((AI))) GOY
(((NEURAL NETWORKS!)))
not just auto generated if else statements
▶ No.1031768>>1031780 >>1031799
>>1031658 (OP)
>he thinks the big boys are still using binary computers
>he thinks his binary network can ever be secure
▶ No.1031780>>1031788
>>1031768
>quantum computing
Talk to me when you have a quantum computer!
▶ No.1031788>>1031793 >>1032095
>>1031780
nsa and google will have it before you
▶ No.1031793
>>1031788 (checked)
However not in a large amount and I don't live in the US.
▶ No.1031799>>1032221
>>1031768
By the time we have sufficient quantum computer, it will be similar situation as today with old crypto which we now can break by sheer brute force alone.
▶ No.1031803
>>1031658 (OP)
>I think people overestimate
>muh feels
>I seriously doubt that
>muh feels
glownigger or reddit retard /g/ancer
>what is rootkit?
>what is ring -4?
>what is hardware backdoor?
>what is post-quantum cryptography?
Fuckoff nigger and don't come back. This board is for people who use knowledge not feels.
▶ No.1031805>>1031806 >>1031861
Quantum computers can't break one time pads and are simple enough to implement that you don't even need a computer to use them to communicate securely. The real issue isn't a secure communications channel, it's literally every other part of the system and the practicality of it all.
▶ No.1031806>>1031807 >>1031808
>>1031805
And where are you going to get the random numbers for one time pads?
▶ No.1031807
>>1031806
Just hit a calculator a couple of times until you're satisfied with the results.
▶ No.1031821>>1031861
To me the biggest problem is that people are trying to secure themselves without establishing a sane threat model. Most people's threat model shouldn't be a omniscient 3-letter agency. And focusing on preventing that instead of more basic shit is a bad idea. There are many ways of breaking into a system without literally breaking the encryption, since human's often fuck up. You should prioritize preventing those rather than something the NSA might be able to do.
Most spying comes from people willingly giving their data away without caring where it goes. And companies frankly aren't going to prioritize chasing people who try to hide their data from them. Every normie I talk to about this shit always complains about how pointless it is and how big google's reach on their data is, when a simple adblocker/script blocker will reduce their digital footprint significantly.
▶ No.1031848
They hire professional psychics. Not the kind you see on late night infomercials either. They don't need magic algorithms. If they wanted you they would have already taken you.
▶ No.1031858>>1031865 >>1031975
xkcd method, 1-2 digit padding, punctuation separator, 4 words, 30 characters.
NSA BTFO
▶ No.1031861>>1031975
>>1031805
OTPs are useless for most applications precisely because they do require a secure communication channel.
>>1031821
>Most people's threat model shouldn't be a omniscient 3-letter agency.
The sane reason to worry about security against glow-in-the-darks isn't some inane belief you'll be targeted, but the absolute certainty you and billions of others will be surveilled and datamined to construct a highly accurate panopticon model targeting genuinely important activists and dissidents, furthering totalitarian downfall of free society, both by actual government agents, and by spies/contractors from other colossal deep pocket entities infiltrating government.
▶ No.1031865>>1031867
>>1031858
why arent password generators using that if its so secure?
▶ No.1031867
>>1031865
Because password generators don't care about whether or not you'll memorize it since you'll likely use a password manager, so they can aim for maximum entropy.
▶ No.1031959
>>1031808
You're going to be sitting there and throwing coins thousands upon thousands of times then? Since the plaintext is as long as the encrypted message...
▶ No.1031975
>>1031858
>>1031861
<xkcd
Take a razor blade and go down the river faggot
▶ No.1032005>>1032014 >>1032221 >>1033607
it doesn't matter how strong your password and cryptography is, because your Intel CPU with Intel Management Engine and UEFI, will just log all your keystrokes and send it over network to Israel. it doesn't matter what OS you use (linux, openbsd) because Intel Management Engine and UEFI work on lower level than your OS
Intel processors are botnet, they are backdoored and they are privacy issue. Modern AMD processors also have similar backdoor called AMD PSP.
Boycott both companies, do not buy modern CPU
▶ No.1032014>>1032030 >>1032189 >>1032221
>>1032005
Do you have proof of this?
▶ No.1032030
▶ No.1032039
Have noticed that too OP. They give them omniscient powers. I wonder if it's due to the decline in religion, and the need for some people to have something to worship. That, or astroturfing by the same agencies.
▶ No.1032046>>1032094 >>1032100
>>1031658 (OP)
They are more than likely able to break almost everything, consumer technology is decades behind state of the art, and it's always been like that.
Good thing you're not important enough for them to come cracking through your hardware they nano backdoored or decrypting and analyzing your guttman wiped encrypted platter drive, what these paranoid kikes are interested is STATIC data collection, STATIC meaning they pick the low hanging fruit you basically give away for free to sell onward or store and it costs them nothing, through such methods as ISATAP, systemd, cookies, JS, your google searches, accessing your cache, SMS, texts calls, phone storage etc.
What they want besides static data collection is access basis, (((they))) will not neccessarily access anything. But they want the ability on demand to access any computer with an internet connection by any means, any log they can. And even the possibility collecting your every keystroke if you let them by running their nicely packaged malware. For the most part you have nothing to fear unless you're some big shot who's going to be the next big thing being attempted to extort and buy out, like most of our politicians. Your life is very safe untill the unforseeable future when (((they))) just might have established JewSSR v2 1984 system in place somewhere like the UK only then will we possibly see usage for this (((data))) to preemtively get rid of anyone who's even rumored to not agree with the diseased semitism and their sick policies, and in the UK they are already doing it, but only the old timers and uninformed who don't even know what a VPN is.
You are nothing untill you have defied them enough, as in a nation suddenly refuses to obey the demands of Jews and zionist puppets like the United states, anywhere important there is an www internet connection you are likely to see that power plant go down, and then you are likely to see the water pump, enrichment plant stop working or any vital infrastructure, because these places are all either running Intel or AMD, the key here is it has an internet connection, without it there is not a lot they can do without actively being on the "inside".
Keep in mind there's a also a very good chance they are holding the world hostage with these backdoors and this technology already forcing compliance. If the power and water mains goes down for 2 weeks people will die and who's to blame? The politicians or israel who rigged the CPU's behind the scenes?
Understand that It's worth being conscientious and opting out of it, but in the end unless you're the next super hero who did something they consider illegal or hate you enough they will not bother with you, yes they will collect but will they use anything against you now? No. Will they use it against you in the future? Who knows, that's why it's worth working towards destroying ZOG and not having to ever worry about their schizophrenic dreams of semitic revenge against whites and the other intelligent races. One thing is sure, even if you happen to be a duped mouth breathing leftist tranny degen even you do not want to live in their judeomarxist "utopia".
▶ No.1032094>>1032194 >>1032293
>>1032046
No, Mr. /pol/, the Israeli aliens in the Federal Reserve's underground Moloch worshipping Satanic cave temple of the 33rd degree Master Mason Illuminati can't spy on your webcam without turning its LED on or use your DAC-connected headphones as a mic to listen to you. If you went to college instead of shitposting on incel echo chambers, you'd have an ounce of critical thinking.
▶ No.1032095
>>1031788
You will never have it. That's why it's called “the next nuclear weapon”.
▶ No.1032100
>>1032046
>They are more than likely able to break almost everything
That isn't how encryption works, regardless of how much kikes wish it to be so.
▶ No.1032134>>1032159
>>1031658 (OP)
>they didn't find some super secret special way to instabreak AES
Grover's quantum algorithm is still right now a theoritical attack, but once quantum computing gets powerful enough, AES is a goner.
▶ No.1032159
>>1032134
Grover's algorithm halves the key size so yes, AES 128 will be a goner. AES 256 on the other hand, should be secure.
▶ No.1032189>>1032246
>>1032014
lol
proof is everywhere
at least amd had discussions on plebbit with respect to disabling the psp. (most and possibly all amd motherboards offer the option to "disable" it, but if it actually works or not is unclear).
▶ No.1032194>>1032246 >>1032534
>>1032094
i smell a (((kike))).
▶ No.1032221
>>1031799
Unfortunately, no. This is not like before, where increasing computing power brought brute-force cracking within reach, but that was offset by applying the same computing power to more difficult algorithms and longer key lengths.
Quantum computers would not simply be a leap forward in conventional cracking power, but would present a completely different paradigm that is absolutely devastating to all conventional cryptography algorithms, present and future - the ability to test every possible key simultaneously.
The saving grace is that it appears quantum cryptography is going to be easier to implement than quantum processors, and will probably be with us sooner.
>>1032005
This. Buy OpenPOWER if you can, or use older AMD hardware (FX-8350 is good), or liberate the older Intel generations where the ME has been defeated.
>>1032014
Do you have a search engine? The existence of ME and PSP are well documented facts.
▶ No.1032246>>1032310 >>1032438 >>1032454 >>1032511
>>1032194
I don't smell any argument.
>>1032189
Give me an instance of someone having a router that logs everything and caught his Intel CPU sending his nudes to an Israeli server.
▶ No.1032293
>>1032094
cool generic copy paste schlomo
▶ No.1032310
>>1032246
That's not the point he was making. The argument is wether agencies have certain capabilities not wether they've used them, and Intel with all their secrets around the ME might be implicated in that.
▶ No.1032438>>1032454
>>1032246
>Give me an instance of someone having a router that logs everything and caught his Intel CPU sending his nudes to an Israeli server.
You cannot log that with routers because all routers are backdoored in factory and they hide certain packets from being visible in logs. Even if you use OpenWRT it won't matter as this backdoor is hardware one.
Also, how would you detect Intel CPU sent it? The packet will be encrypted and it won't be sent to official Mossad server but some common amazon/cloudflare/facebook/microsoft server that won't look suspicious. Intel CPU might send their messages when there is a lot of other traffic to hide in it, or send it when you are sleeping.
▶ No.1032454>>1032468 >>1032470 >>1032503
>>1032246
You are a faggot
>>1032438
You are a faggot because you can use an oscliscope to test for those packets with laughable ease
>be anon
>put computer with botnet hardware in a room nowhere near wifi points and or blocked with tinfoil
>bring ethernet cable in from outside with internet connection
>use osciliscope on ethernet cable connected to computer and use wireshark on computer at same time
>identify packets not showing up on wireshark
>?????
>profit
<but ur osciliscope is backdoored
No its not if you build it yourself and evenso its made to detect energy and not packets of electrons, which are energy. So it wouldn't have been considered using it to test for rouge packets in a digital apperatus or it has and all the more reason to build it yourself.
Oh and just so you know, there are indeed packets that get sent that wireshark doesn't see if you use a intel branded wifi chip in hardware or the BIOS default ethernet controller with a intel ME enabled processor. Same thing applies to AMD chips with the PSP but the wifi chip and or ethernet controller varies.
▶ No.1032468
>>1032454
What if it only works when the NSA sends it a special packet?
▶ No.1032470>>1032481
>>1032454
You are talking about spending tens of thousands $$$ for an oscilloscope that can accurately measure packets fast enough for 1 Gbps ethernet. 10 Gbps or 40 Gbps an oscilloscope could approach millions of $$$.
▶ No.1032481
>>1032470
Don't use a 1gb line you stupid fag, just get a line with low speeds instead.
▶ No.1032503
>>1032454
Then can we use a cheapo USB wired network adapter to defeat AMT? I was hoping so. The problem of still running ME in the background remains, though.
▶ No.1032534
>>1032194
>i smell a (((kike))).
Imagine being so stupid you don't know what ((())) means
▶ No.1032677>>1032679 >>1032856 >>1033699
>>1032511
Not trolling, genuinely interested.
Why do you /pol/acks fallback to this blatant admit of defeat when you have no argument and are losing an argument so fucking hard? You could at least try to convince someone by actually trying the damage control card, but instead you do everything you can to lose even harder and after a few posts just claim you're not here to make a point but to make fun of people (PROTIP: you're actually the ones made fun of, and I don't know anyone, Jew or goy, who's remotely scared of you taking power because it'll never happen). When did you decide to adopt this apporach and unironically started thinking it would work?
▶ No.1032679>>1032682 >>1032890
>>1032677
Security
Intel finds critical holes in secret Management Engine hidden in tons of desktop, server chipsets
Bugs can be exploited to extract info, potentially insert rootkits
By Thomas Claburn in San Francisco 20 Nov 2017 at 23:53
▶ No.1032682>>1032684
>>1032679
>Intel finds critical holes in secret Management Engine hidden in tons of desktop, server chipsets
>Bugs can be exploited to extract info, potentially insert rootkits
Phew! Good thing they found these holes so they can patch them in future CPUs then.
▶ No.1032684>>1032690
>>1032682
>thinks they aren't keeping all the joocy stuff for themselves until that too is publicly disclosed and has to be 'patched'
▶ No.1032690>>1032691
>>1032684
Phew! Good thing people are here to remind them to be honest. Now we can have quality and safety.
▶ No.1032691>>1032704
>>1032690
>remind them to be honest
▶ No.1032704>>1032766 >>1032789
>>1032691
>Oh no, someone reported an exploit in our processor. Hey dude, let's ignore this and hope the exploit isn't sold to hackers.
If you believe this is how engineers maximize their income, you're utterly retarded. That exploits exist in processors is not a proof of conspiracy. I know you program in C and think you're the shit because you check (some of) your mallocs, but I also bet you make at least twice as many mistakes per line of code as they do. I also bet one of the reasons why you think CPU exploits can't be unintentional is because you've never heard of concurrency in your life, so you you think testing shit is easy. I also assume you've never had an actual job since you seem to think risking major fuckups of this kind when you have direct competition is profitable. It's only the case for Apple because it's a well-known fact their business model is based on sectarianism. In any case, you obviously have no argument and rely only on pooh pooh to make yourself sound cool, not even to prove anyone wrong. Like /pol/acks.
▶ No.1032766>>1032856
>>1032704
>do you honestly think someone would intentionally backdoor their hardware?
▶ No.1032789>>1032856
>>1032704
settle down chaim
▶ No.1032814
>type bionicman
>4 hours
Ice breaker was better
▶ No.1032829
▶ No.1032839>>1033699
I don't care what the NSA can do because I'm not a threat to the national security of an allied country and they don't share their illegal evidence with domestic law enforcement.
▶ No.1032843>>1032846 >>1033465
Totally agree computers not magical. But they are, in the way that a performing magician is magical. There is what is call `magic` in computers that allows them to recognize what type of file a file is by its header. The first few bits signify the type of file so that the system can link the right compatibility.
▶ No.1032846
>>1032843
user@host:~/Pictures$ xxd dope.jpg | head
00000000: ffd8 ffe1 0022 4578 6966 0000 4d4d 002a ....."Exif..MM.*
00000010: 0000 0008 0001 0112 0003 0000 0001 0001 ................
00000020: 0000 0000 0000 ffed 0038 5068 6f74 6f73 .........8Photos
00000030: 686f 7020 332e 3000 3842 494d 0404 0000 hop 3.0.8BIM....
00000040: 0000 0000 3842 494d 0425 0000 0000 0010 ....8BIM.%......
00000050: d41d 8cd9 8f00 b204 e980 0998 ecf8 427e ..............B~
00000060: ffc0 0011 0805 0004 fd03 0122 0002 1101 ..........."....
00000070: 0311 01ff c400 1f00 0001 0501 0101 0101 ................
00000080: 0100 0000 0000 0000 0001 0203 0405 0607 ................
00000090: 0809 0a0b ffc4 00b5 1000 0201 0303 0204 ................
user@host:~/Pictures$ file dope.jpg
dope.jpg: JPEG image data, Exif standard: [TIFF image data, big-endian, direntries=1, orientation=upper-left], baseline, precision 8, 1277x1280, frames 3
▶ No.1032856>>1032890
▶ No.1032890>>1033053
▶ No.1033053>>1033318
>>1032890
That didn't answer the question, and you know it.
▶ No.1033408
>>1031658 (OP)
>he hasn't read SICP
▶ No.1033464
>>1031658 (OP)
>security through obscurity is bad goyz!
great, the only products that both rely on it and have shitty laughable implementations are shitty little web servers on home routers, and similar crapware that wont be saved no matter how many best practices you proclaim on the internet
>the NSA doesn't have attacks on this super specific small list of "approved" ciphers because i said so. look i did logic somewhere in my post QED
wat
>To believe that the NSA can get it done as fast as you claim, you would have to believe that they have computers that would be TOP500-tier. I seriously doubt that.
why? they have money to build bluffdale and noone gave a shit
if you give a fuck about security you're obviously already cascading ciphers.
▶ No.1033465
>>1032843
magic is UNIX braindamage
▶ No.1033502>>1033517
>>1033318
Nah, this still doesn't tell me why /pol/acks think saying "lol ur a kike XD" means they're right.
▶ No.1033514
DoD and ABC's are already utilizing systems such as these for automation features for
Facial Recog, Traffic Analysis, Pedestrian Pathfinding, WebCrawling, SIGINT.
T. Wikileak Fag
▶ No.1033515>>1033526
▶ No.1033517
>>1033502
Are you saying you're not a jew, or Intel isn't jewing everybody with backdoors?
▶ No.1033526
>>1033515
IIRC DWave's """"""""""quantum computer"""""""""" if you can call it that can only work on optimization problems You can also try to shoehorn some other problems in by trying to turn them into an optimization problems.
▶ No.1033607
>>1032005
>Not using a ten year old ThinkPad with libreboot
▶ No.1033608>>1033657 >>1034637
>>1031672
OHH! IS IT? WHERE IS THE PROOF? OH I SEE, U R A SCHIZO WHOSE MOTHER FAILED TO BREASTFEED.
▶ No.1033657>>1034637
>>1033608 His mom not only failed to breastfeed him but also has been fucked by him! And now he is sucking his mom's boobs because he couldn't it when he was a baby!
▶ No.1033661
>>1031658 (OP)
babby read an introduction to crypto book and is now spreading knowledge to the peasants
▶ No.1033699
>>1032677
>>1032511
>Why do you /pol/acks fallback to this blatant admit of defeat when you have no argument
He claimed the actual computer hardware to have special snooping capabilities.
That is not just a claim, but an admitted fact.
He did not claim this bugged hardware permanently sending packets towards TelAviv.
Your claim that it is "trivial" to check hardware for hidden listening devices is factual false:
https://en.wikipedia.org/wiki/The_Thing_%28listening_device%29
You can sit for years in "your Faraday cage" and cross-check your cheap home router with wire-shark, as long as the bugging-mode is not activated you wont find anything.
Routers are bugged, not only Snowden claims this, but any observer of bug-checking list knows that Cisco hardware is riddled with backdoor passwords and modes since decades, that apear "solely coincidental and by random".
Beside of simple backdoors in firmware, there are so many possibilities for side-chanel attacks.
Of course your cheap one-chip home router has no backdoors what so ever, promise me said Broadcom. If Intel didn't tell all the world about ME, sell it to administrators as VPro, you wouldn't and couldn't know about its capabilities.
> and are losing an argument so fucking hard?
/pol is allways right!
>and I don't know anyone, Jew or goy, who's remotely scared of you taking power because it'll never happen).
Jewish arogance and bragging was allways your undoing.
>>1032839
>I don't care what the NSA can do because I'm not a threat to the national security of an allied country
You think that, but NSA thinks that readers of the Linux Magazine are dangerous extremists and CIA make people disappear that wear a type of a cheap Casio watch.
Even if you are just some low level peon, Mossad might be interested in the keys to the building you are cleaning the floors of.
▶ No.1033700
NSA is a government agency so they probably suck at what they do
▶ No.1033850>>1033921
>>1031658 (OP)
This is a good point. People often times feel powerless in the face of things that they don't understand.
To be clear the NSA and other intelligence agencies do some advantages in cracking cryptography.
Firstly most encryption types are based on prime numbers and sqaure roots or cubed roots of prime numbers.
If you know you are going to breaking an encryption that is based on prime triplets or something like that you just use a compute cluster to generate a lookup table of prime triplets or their factors or cubed roots. Precomputation saves a lot of FLOPs/IOPs. This shortcuts the process of cracking encryption tremendously. It's like cracking hashes with rainbow tables versus a regular dictionary attack.
Another thing they have is ASIC(application specific integrated circuit) devices. ASIC devices were originally created for graphics processing back in the day before GPUs were a thing. Most famously ASICshave been designed for cracking unsalted SHA256 hashes. Basically any function you can do on a computer you can create a hardware implementation that will do it more efficiently.
FPGA(field programmable gate array) is a programmable circuit. They are not as efficient as ASICs but they have the key advantage of being programmable. You can flash them for any purpose. Notably FPGAs have been set up for cracking WPA/WAP2. They can generate about 2 billion PMK/s. For reference an average laptop CPU can generate about 3,000 PMK/s.
Basically by breaking the encryption process into managable parts and using precomputation security agencies have an advantage in cracking encryption.
This being said, it still takes time to crack encryption. Using multiple layers of encryption make cracking take much longer. If it takes a month to crack the type of encryption you are using then it should take about 1,000 months to crack 1,000 layers. Using multiple types of encryption are a good idea.
If you want to troll the NSA. Copy and paste the 4th amendment into a text file then use 10k layers of encryption over it.
Also being aware that using heavy encryption is something that will flag you for monitoring by intelligence agencies. If you're using some heavy encryptians at work that can throw some security flags depending on the security level of the network you are using.
I'd be less concerned with encryption. I'm sure there are encryption solutions that the NSA can't crack. What I would be concerned with is Equation group 0days or custom hardware level hacks that the NSA likely has.
Shortly don't do shit that will make you a target of the NSA. Don't send money to middle eastern countries, etc.
Shortly if it's very sensitive information than you shouldn't be sending over a public network.
Pic unrelated. Trinity using NMAP and SSH in one of Matrix movies. Just want to point out that movies and media make out hacking to be something that it is not.
▶ No.1033921
>>1033850
>Most famously ASICs have been designed for cracking unsalted SHA256 hashes
I would think the most famous example of an ASIC would be one of Intel's or AMD's lines of CPUs.