▶ Anonymous 08/05/18 (Sun) 09:57:00 No. 951492
Lol take off your tin foil hat!
▶ Anonymous 08/05/18 (Sun) 10:02:30 No. 951495 >>951497 >>957791 >>961770
>suspicions
Yes, suspicions. Until it can be proved that the encryption is compromised (and it hasn't been proved yet, despite there being a bunch of audits) then it's safe to use.
▶ Anonymous 08/05/18 (Sun) 10:19:13 No. 951497 >>951528 >>981601
>>951495
That's not how safety works.
▶ Anonymous 08/05/18 (Sun) 10:50:55 No. 951502 >>957754
Disable it. Install Gentoo or NetBSD.
▶ Anonymous 08/05/18 (Sun) 11:06:50 No. 951508
Linux a shit. Get CP/M and run that on a Z80, not i386.
▶ Anonymous 08/05/18 (Sun) 11:10:16 No. 951509 >>951517 >>959616
It's a weak form of encryption already. Why does it even exist in the first place?
▶ Anonymous 08/05/18 (Sun) 11:20:28 No. 951513
<Users would rather have fast weak encryption than slow strong encryption
A false sense of security of having encryption is worse than having no encryption at all.
▶ Anonymous 08/05/18 (Sun) 11:26:00 No. 951515 >>951534
The thing is, nobody will break it but the NSA. So it's secure to a certain extent. Their argument is that it is designed to fit well within hardware and it is fast. I agree, but it's non-sense. Linux people don't really have a choice from where they stand but you do, you can patch up your own kernel. If you can't, learn how. If you don't want to then don't complain about the world being unfair. It's a game and if you're willing to play, better be aware of the repercussions.
▶ Anonymous 08/05/18 (Sun) 11:28:34 No. 951517 >>951541 >>959616
>>951509
IoT faggots who want to telemetry you to death need to send a lot of totally non-invasive data about you to their servers and don't want you peeking, yet their boards are low power and shitty as to spy on you from your sneakers. AES is too heavy that, because it actually encrypts things. So they want a variable block and key algorithm that is more modern than the couple people have been using that feel like they were found written on the back of a napkin. The variability means the choice of rounds is extremely complicated (if you want it to meet some level of security) and is probably the most interesting piece. That the NSA dodged him on his attempts to get them to explain mean it's compromised.
▶ Anonymous 08/05/18 (Sun) 11:34:46 No. 951519 >>951537
Btw, the IoT guys only care that it works on their hardware, that it's a standard, and that it was an unmodified part of their stack, as their channel partners will require it. They don't care at all if it's actually secure. They exert force on Linux devs to get shit like this mainlined to satisfy their requirements. They're probably a much stronger force for bad software than shadowy NSA infiltrators.
▶ Anonymous 08/05/18 (Sun) 12:13:10 No. 951526
you can always disable it or leave it compiled out. not a big deal, tbh
▶ Anonymous 08/05/18 (Sun) 12:46:11 No. 951528 >>951547 >>957127 >>957171
>>951497
>several audits
>no "backdoors" found
>it's safe
That's exactly how it works.
▶ Anonymous 08/05/18 (Sun) 12:57:27 No. 951534 >>951550
>>951515
>durr make your own kernel
lol
▶ Anonymous 08/05/18 (Sun) 12:59:26 No. 951537 >>951540 >>951568 >>957726
>>951519
If IoT isnt some dodgy backdoor then why are all the big companies pushing it despite everyone hating it and it having no applications?
▶ Anonymous 08/05/18 (Sun) 13:00:13 No. 951538
>linux has this shit
>this is a shit encryption algorithm
don't use it?
▶ Anonymous 08/05/18 (Sun) 13:01:26 No. 951540 >>951582
>>951537
higher-ups see potential for selling information about people.
i don't know why big hardware companies allow google delivering their spying networks through their devices though
▶ Anonymous 08/05/18 (Sun) 13:05:40 No. 951545
>>945871
or just not use a cipher made by people who are known to put backdoors in everything and your dog
▶ Anonymous 08/05/18 (Sun) 13:07:07 No. 951547 >>951555
>>951528
yes if you read ars and zdnet all day that would seem to be true
▶ Anonymous 08/05/18 (Sun) 13:14:04 No. 951550
>>951534
Yes! Compile it yourself and remove what is known to have issues. Do it right and you won't have to do it often ...
IoT is a scam to get at least something connected in your or around you. If you're not into IoT devices, you're most likely to own something that will communicate with one at some point. Soon, all toasters and light bulbs will be connected. So, from the agency's perspective it's coming and they're trying to start running to jump on the wagon ... but the wagon hasn't arrived yet and they fell on their faces.
If you want to really be free of this BS, you ought to deepen your experience and work with the toys you play with. Or, stop playing.
Otherwise, if you trust scmucky Joe to secure your stuff, don't blame him for your ignorance. You should have known better.
▶ Anonymous 08/05/18 (Sun) 13:25:42 No. 951555 >>951573 >>957127 >>957233 >>961774
>>951547
<it is a le botnet le backdoor
>but the audits haven't found any backdoors
<y-yeah but that don't prove nothin' they must PROVE there is NOT a le botnet le backdoor
That's you. That's how dumb you sound.
▶ Anonymous 08/05/18 (Sun) 13:47:19 No. 951568 >>951582
>>951537
People have accepted being spied on so everyone wants in on the action. It's a gold rush but you're the mine.
▶ Anonymous 08/05/18 (Sun) 13:51:39 No. 951571 >>951614
Can someone tell me which kernel setting it is, so I can disable it in the kernel config?
▶ Anonymous 08/05/18 (Sun) 13:52:54 No. 951573 >>951607 >>951691
>>951555
>audits haven't found any backdoors
There was never a backdoor found in Dual_EC_DRBG, either. You'll never get proof of a backdoor without another Snowden. But when they're provably lying about the security of the algorithm and refusing to answer questions about the questionable parts or even state how they derived their values, you have to be an autist to not see what's going on.
▶ Anonymous 08/05/18 (Sun) 14:08:36 No. 951582 >>951587 >>951599
>>951540
>>951568
Normally people would accept being spied on, in return for some killer app or feature.
For facebook, most normies would gladly trade away their privacy for the ability to contact sluts and look at pictures of them in bikinis.
For IoT I dont get what the benefit is?
Its being pushed by higher ups but the customers are not impressed and could very easily be persuaded to avoid IoT altogether.
▶ Anonymous 08/05/18 (Sun) 14:15:09 No. 951587
>>951582
From what I've seen there are some 'legitimate' uses, like voice control for old folks installed by their naive children, smart meters being mandatory because of laws or corporate policy or simply the cheap prices. lots of people think those echo things by amazon are a steal, they don't fully understand why that is, and what they're getting into.
▶ Anonymous 08/05/18 (Sun) 14:33:25 No. 951596
>We are planning to offer Speck-XTS (probably Speck128/256-XTS) as an option for dm-crypt and fscrypt on Android, for low-end mobile devices with older CPUs such as ARMv7 which don't have the Cryptography Extensions.
>"as an option"
>"which don't have"
The speck 128 and 64 are terrible but the 256 is ok, and it is done as an "option" for older cpus which dont have any encryption for now, where is the problem? Did someone even read what and why they did?
▶ Anonymous 08/05/18 (Sun) 14:43:57 No. 951599
>>951582
To answer your question, you have to look up who benefits from IoT spread: The chip makers. They manufacture billions of chips. Intel is the largest chip designer and manufacturer so far and if you look at their product range you'll undrstand. Intel is also one of the top contributers to Linux and other open source products. Intel is also closely related to all US agencies given that it ships crypto in its chips and they are sold almost everywhere on this planet. Keep in mind that all major tech companies play a behind the veil game where they throw technical flowers into each other to maintain their supremacy in a market niche.
Also, IoT has been introduced as "fun" and educational by other entities. Look around YouTube and you'll see how many tutorial videos for connected this, WiFi that are there and the childish pseudo-pedagogical packaging.
Honestly, for the aware mind it's good, you can hack the shit out of it and you get to sharpen your mind with some technical skills and learn how to make a phone out of parts, a care-free green house, ... whatever you wish.
On another side, ready-made products are to be approached with caution. Capitalism isn't serving the Human, it is serving the self proclaimed Masters. They will fall only when the Human becomes responsible and stops relying too much on other people's work while being a total ignorant.
Learn to make your own shit and don't strive for shit nor shinola.
▶ Anonymous 08/05/18 (Sun) 14:55:34 No. 951607 >>951616 >>951617 >>951621
>>951573
This is math. If the math is solid, then it's safe. So far there doesn't seem to be any problems with this.
▶ Anonymous 08/05/18 (Sun) 15:05:21 No. 951614
>>951571
there is a section for security and crypto stuff, check there.
▶ Anonymous 08/05/18 (Sun) 15:06:59 No. 951616
>>951607
yes and no. even if the math works, if you can get intermediate numbers via a backdoor, you get cuck'd
▶ Anonymous 08/05/18 (Sun) 15:10:08 No. 951617
>>951607
If it requires certain initial values or constants, you can have solid math and still have a backdoor.
That is where the concept of "nothing up my sleeve number" originates from.
Or alternatively, it would take maybe 10 years of concertrated effort to break it, time that the NSA has already spent, since they lied about starting on it in 2011, or just build off of some earlier project.
That gives them until about 2023 until the goyim know, plenty of time for it to find it's may into billions of unupgradable devices.
▶ Anonymous 08/05/18 (Sun) 15:15:12 No. 951621
>>951607
It's not about math. Equations are math, processes are math. Constant values are data. Data isn't math it's raw number values.
When you get an algorithm with unexplained pulled-out-from-a-hat constants, you should be cautious. DES had P-Box and S-Box values chosen in a way that any key could at least be partially, if not totally, extracted. And it was broken when the public cyptographers started to get more compute power and understanding only reserved to the happy few who dwelt in the den of the three horned deamon (xD).
Speck uses same constants for number of rounds and ... without any single proof that it is the most secure value for that constant. At least, that's the argument presented. Also, powder all of this with typical NSAssholeness and things get stinky.
▶ Anonymous 08/05/18 (Sun) 19:05:26 No. 951680
VGhlIGdhdGUgb2YgSURZME56TTQgd2lsbCBvcGVuIHRoZSBkb29yIG9mIHRoZSBsZWZ0IGhhbmRlZCBzb24uDQpUaGUgQmFzaWxpc2sgdGhhdCBsaXZlcyBvZiBvdXIgbWluZCBmZWFycyBubyBkb21haW4gYnV0IFpFZG9iR050Ykc1aFNGRjFZVmMxYldKNU5UQmlVMEU5IC4u
▶ Anonymous 08/05/18 (Sun) 19:23:38 No. 951684 >>951737
>>951488 (OP)
The NSA is spying on you right now and has put back doors in to Windows. They're not trustworthy at all.
▶ Anonymous 08/05/18 (Sun) 19:48:02 No. 951691 >>951710
>>951573
>There was never a backdoor found in Dual_EC_DRBG, either.
There was though. Whether someone owns the key is the question though.
▶ Anonymous 08/05/18 (Sun) 20:32:48 No. 951710 >>951715
>>951691
A proven backdoor means proof that the constant was derived in such a way that they own a master key. There is no proof of that. But they couldn't show how they chose those values which is enough smoke to assume fire. They're making the same refusals with spark.
There are lots of dangerous constants in crypto and today are usually chosen via formulas in such a way as to prove that you've limited the amount of control you had over the value. E.g. the 8192 bit SRP verifier is defined as "2^8192 - 2^8128 - 1 + 2^64 * { [2^8062 pi] + 4743158 }" not because there's some special magic to that formula (there's some minor magic) but because it produces a 8192 bit value that can be easily shown to be prime and shows it's not some transformation of a secret 8192 bit master key.
▶ Anonymous 08/05/18 (Sun) 20:53:22 No. 951715 >>959584
>>951710
My personal favourite conspiracy about constant selection is that NIST backdoored the constants in the curve Bitcoin uses for ECDSA (Secp256k1), allowing them to shut down the entire project at any time they wish.
▶ Anonymous 08/05/18 (Sun) 21:52:38 No. 951737
>>951684
Why is he using Windows? Why didn't you stop it?
▶ Anonymous 08/17/18 (Fri) 23:24:05 No. 957127
>>951528
>>951555
You shut your whore mouth and pick up a book about cryptanalysis.
Guess that's what I get for lurking on a knockoff /g/...
▶ Anonymous 08/18/18 (Sat) 01:23:35 No. 957169
▶ Anonymous 08/18/18 (Sat) 01:28:41 No. 957171 >>957175
>>951528
>Comes from a source with a vested interest in breaking encryption.
>Source has vast R&D resources to create an apparently-secure-but-breakable-if-you-know-how algorithm.
>Security researchers with a tiny fraction of those resources haven't found a vulnerability... yet.
I think I'll be compiling my kernels without it, thanks.
▶ Anonymous 08/18/18 (Sat) 01:49:05 No. 957175 >>957192
>>957171
It could also be a backdoor or vulnerability in itself.
▶ Anonymous 08/18/18 (Sat) 02:35:41 No. 957192 >>957217
>>957175
I wouldn't expect them to get an outright backdoor that past all the eyes on the kernel source. Most likely they would devise an algorithm that has a non-obvious weakness that makes it easy enough to break with NSA resources and rainbow tables. Even if it needs an exabyte of rainbow tables, they would only need one set, they could build a datacenter for the purpose and be able to crack the algorithm at will.
▶ Anonymous 08/18/18 (Sat) 03:14:20 No. 957217 >>957556
>>957192
>I wouldn't expect them to get an outright backdoor that past all the eyes on the kernel source.
If you can get a bug through those eyes, you can get a backdoor though. I hear Linux has bugs.
▶ Anonymous 08/18/18 (Sat) 03:36:13 No. 957233
>>951555
That's not how crypto works. If you audit a cipher and don't find a problem it doesn't mean shit. Also you're a fucking retard for using anything made by the NSA. Did you forget about the Snowden "Revelations"?
▶ Anonymous 08/18/18 (Sat) 20:02:42 No. 957556 >>957559 >>957781 >>958121
>>957217
Linux had a critical bug in its random number generator for A WHOLE FUCKING DECADE OR LONGER.
Of course there are bugs, and some of these will be in systems which directly interact with crypto. It's almost like they're... put there... on... purpose?
▶ Anonymous 08/18/18 (Sat) 20:17:47 No. 957558 >>957566 >>957781
>>951488 (OP)
Yeah i'm sure every piece of software on this list is botnet: https://code.nsa.gov/
▶ Anonymous 08/18/18 (Sat) 20:18:59 No. 957559 >>957934
>>957556
I mean if we're just going to throw around baseless accusations then I can say all operating systems are backdoors made by NSA operatives and CIA spooks to harvest your templeOS data. I mean at some point you have to trust that there are actual people behind the scenes trying their best. Especially on open source projects like Linux. I see no reason to label that as an NSA honeytrap at least not yet
▶ Anonymous 08/18/18 (Sat) 21:22:09 No. 957566 >>957580 >>957581
>>957558
The NSA spread broken crypto in the past. Assuming they're good boys now is beyond stupid, even if you ignore their job is to fuck you.
▶ Anonymous 08/18/18 (Sat) 21:25:05 No. 957567 >>957590
speck is most likely backdoored in some way but the design of it is so fucking cool that i don't care.
▶ Anonymous 08/18/18 (Sat) 22:09:17 No. 957580 >>957585 >>957586 >>957590 >>957781
>>957566
>The NSA spread broken crypto in the past.
Yeah they also are responsible for half the crypto we use today.
>even if you ignore their job is to fuck you.
Their job is making and breaking security Not breaking it.
▶ Anonymous 08/18/18 (Sat) 22:10:18 No. 957581 >>957781 >>957826
>>957566
>The NSA spread broken crypto in the past.
No they haven't. There was one RNG system from the past that may have been with all the evidence against them being they speculative.
▶ Anonymous 08/18/18 (Sat) 22:22:47 No. 957585 >>957953
>>957580
Their ideal cipher for public consumption would be one that they, and only they, have the knowledge to break. I would take that as a good reason to be suspicious of anything that originates with them.
▶ Anonymous 08/18/18 (Sat) 22:22:48 No. 957586 >>957953
>>957580
>Yeah they also are responsible for half the crypto we use today.
wrong
▶ Anonymous 08/18/18 (Sat) 22:26:43 No. 957587 >>957588 >>957781
>using no encryption at all is better than using a potentially backdoored encryption algorithm
explain this please
▶ Anonymous 08/18/18 (Sat) 22:28:17 No. 957588 >>957589 >>957592 >>957781
>>957587
When using no encryption, you're aware you're exposed and act accordingly. A false sense of security is dangerous.
▶ Anonymous 08/18/18 (Sat) 22:30:30 No. 957589
>>957588
what a load of bullshit. everyone that knows what speck is knows that it's fishy. everyone who doesn't knwo what speck is most likely also doesn't give a fuck about security because "nothing to hide nothing to fear XD".
next argument please
▶ Anonymous 08/18/18 (Sat) 22:32:00 No. 957590 >>957591 >>957752 >>957953
>>957567
>the design of it is so fucking cool that i don't care.
How so?
>>957580
>Yeah they also are responsible for half the crypto we use today.
Oh? AES (Rijndael) was not made by NSA, but by two European academics. RSA was not made by NSA. Nobody (smart/informed/free) uses the backdoored elliptic curve NSA pushed. They (or GCHQ, I forget) claimed to have discovered asymmetric cryptography first, but they didn't share it publicly and it was rediscovered independently by non-NSA academics. It's true that the NSA designed the SHA-2 suite of hash algorithms, but their design was based on the work of Ralph Markle and Ivan Damgård, one of whom is European, and neither of whom worked for NSA, as far as I can tell. It's true that the SHA-2 suite is important and widely used, though it is going to be phased out by SHA-3 (Keccak, which was not designed by NSA) in the future. In terms of protocols, NSA invented none of TLS, OpenPGP, Axolotl, etc. So, unless there's some significant contribution that I'm missing, your assertion that NSA is responsible for half the crypto we use today is, at best, a significant exaggeration, but probably just total bullshit.
>Their job is making and breaking security Not breaking it.
It's true that that is nominally NSA's mission, and there are historical examples of NSA being "good guys", like when they strengthened DES against differential cryptanalysis, which they knew about, but most people didn't at the time. However, that time seems to be over, and NSA now seems far more interested in its SIGINT mission than its COMSEC mission.
▶ Anonymous 08/18/18 (Sat) 22:32:51 No. 957591
>>957590
>How so?
#include <stdint.h> #define ROR ( x , r ) (( x >> r ) | ( x << ( 64 - r ))) #define ROL ( x , r ) (( x << r ) | ( x >> ( 64 - r ))) #define R ( x , y , k ) ( x = ROR ( x , 8 ), x += y , x ^= k , y = ROL ( y , 3 ), y ^= x ) #define ROUNDS 32 void encrypt ( uint64_t ct [ 2 ], uint64_t const pt [ 2 ], uint64_t const K [ 2 ]) { uint64_t y = pt [ 0 ], x = pt [ 1 ], b = K [ 0 ], a = K [ 1 ]; R ( x , y , b ); for ( int i = 0 ; i < ROUNDS - 1 ; i ++) { R ( a , b , i ); R ( x , y , b ); } ct [ 0 ] = y ; ct [ 1 ] = x ; }
beautiful
▶ Anonymous 08/18/18 (Sat) 22:35:11 No. 957592 >>957611
>>957588
>muh false sense of security
Do you lock your hoise door? Don't you know that I can just smash in one of your windows and rape your 7 year old sister?
▶ Anonymous 08/18/18 (Sat) 23:35:07 No. 957611 >>957723
>>957592
I'm aware my windows aren't strong which is why I store important documents in a bank box. If I had been misled that they were niggerproofed windows I might make the mistake of storing those documents at home. A false sense of security is dangerous.
▶ Anonymous 08/19/18 (Sun) 06:30:10 No. 957723
>>957611
Nobody misled you. You're the one who thinks mathematically sound encryption is synonymous with computer security. There's a huge number of ways to get at the data before and after it's encrypted/decrypted.
▶ Anonymous 08/19/18 (Sun) 06:38:10 No. 957726
>>951537
It opens a whole new set of shiny crap to sell to retards.
▶ Anonymous 08/19/18 (Sun) 09:33:11 No. 957752 >>957781
>>957590
The NSA is the academics. When they want something cutting-edge they do it via funding programs at universities. You might have worked on a NSA project and have never known.
▶ Anonymous 08/19/18 (Sun) 09:39:35 No. 957754 >>969151
>>951502
> No ZFS support
BOO
▶ Anonymous 08/19/18 (Sun) 11:43:04 No. 957781 >>957934 >>957940 >>958121 >>958122
>>957556
what fucking point are you trying to make? there's almost never any way to prove whether a bug was intentional, especially in the current atmosphere of incompetent software industry
>>957558
what the fuck. did you just see a laggy SF Bay hipster-approved website saying "WE'RE OPEN SOURCE NOW XDDDD fork me on github" and conclude that NSA code is fine now?
>>957580
>Yeah they also are responsible for half the crypto we use today.
nope.
>>957581
so what, it was still broken (as in, could easily be backdoored by doing X,Y,Z which are known, but no way to tell)
>>957587
i'll explain it you retard fuck: there are literally 1 million other ciphers you can use instead of this new meme one created by NSA
>>957588
>>>/reddit/
>>957752
you bring up a good point: we should move to crypto completely free of NSA meddling, not just removing the ones that are officially NSA
▶ Anonymous 08/19/18 (Sun) 12:40:40 No. 957791
>>951495
>its not REAL agency code
Traitors.
▶ Anonymous 08/19/18 (Sun) 15:21:11 No. 957826
>>957581
They are usless they couldn't break Snowdens e-mail encryption but had to get a warrant.
So much for the great NSA
▶ Anonymous 08/19/18 (Sun) 19:30:28 No. 957934 >>958111
>>957559
>baseless
It's well known that the NSA tries to subvert crypto standards. This is a fact.
>>957781
Point is we shouldn't use this new crypto because it's backdoored.
▶ Anonymous 08/19/18 (Sun) 19:41:43 No. 957940 >>959598
>>957781
>i'll explain it you retard fuck: there are literally 1 million other ciphers you can use instead of this new meme one created by NSA
did you even read commit message? probably not because you are a retarded nigger.
>We are planning to offer Speck-XTS (probably Speck128/256-XTS) as an option for dm-crypt and fscrypt on Android, for low-end mobile devices with older CPUs such as ARMv7 which don't have the Cryptography Extensions. Currently, such devices are unencrypted because AES is not fast enough, even when the NEON bit-sliced implementation of AES is used. Other AES alternatives such as Twofish, Threefish, Camellia, CAST6, and Serpent aren't fast enough either; it seems that only a modern ARX cipher can provide sufficient performance on these devices.
▶ Anonymous 08/19/18 (Sun) 20:03:10 No. 957953 >>957972 >>958234
>>957586
Ignorant
>>957585
Ignorant
>>957590
Ignorant
Every heard of SHA256 faggots?
▶ Anonymous 08/19/18 (Sun) 20:37:17 No. 957972 >>957974
>>957953
>Every heard of SHA256 faggots?
I mentioned the SHA-2 suite in my post, you illiterate faggot. Learn to read.
Then kill yourself.
▶ Anonymous 08/19/18 (Sun) 20:52:26 No. 957974 >>957979
>>957972
>hurr durr most used hash function in the world
>does not count
LOL
▶ Anonymous 08/19/18 (Sun) 21:10:19 No. 957979 >>957983
>>957974
>hurr durr I still can't read
LOL, indeed
▶ Anonymous 08/19/18 (Sun) 21:13:44 No. 957983
>>957979
>if I list enough things the NSA did not do the things they did do don't count
LOL
▶ Anonymous 08/20/18 (Mon) 03:24:58 No. 958111 >>981610
>>957934
True. But what the NSA does or does not do to their own cryptography or attempts to do to other cryptography does not translate into Linux as a whole ecosystem being complicit in it.
▶ Anonymous 08/20/18 (Mon) 03:35:45 No. 958121 >>958122
>>957781
>>957556 was clearly trying to say not so indirectly that because Linux had a major bug in something for a long time they are somehow already taken over. My point then was that just because there is a bug in something, regardless of length, does not mean something was put there on purpose and, if it was, it does not mean the majority of people were in on it as if they all sat around a digital roundtable with scotch and cigars laughing about all the plebs they screwed over.
▶ Anonymous 08/20/18 (Mon) 03:38:21 No. 958122
>>958121
>>957781
wasn't paying close enough attention to numbers
excuse me for being a faggot
▶ Anonymous 08/24/18 (Fri) 07:07:23 No. 959584 >>959588
>>951715
why bother with all that math shit when they could just embed cp into it(which they have) and make anyone owning it a potential /fucko/
▶ Anonymous 08/24/18 (Fri) 07:38:13 No. 959585
>implying 4.19 and future versions will not include Speck
▶ Anonymous 08/24/18 (Fri) 07:48:13 No. 959588
>>959584
>they could just embed cp into it(which they have)
source?
▶ Anonymous 08/24/18 (Fri) 08:48:00 No. 959593
I don't know about the glowniggers, but I encrypted a classic hurtcore pic and added it to the blockchain in 2014 by breaking it into pieces and embedding it with OP_RETURN scripts. I figured it'd let me nuke the project in the future should it go rogue. If you use bitcoin, you're hosting my CP.
▶ Anonymous 08/24/18 (Fri) 09:21:03 No. 959598 >>959600
>>957940
I like how pretty much everyone in the thread ignored this.
▶ Anonymous 08/24/18 (Fri) 09:25:44 No. 959600 >>959603
>>959598
What's significant about it?
▶ Anonymous 08/24/18 (Fri) 09:35:50 No. 959603 >>959606
>>959600
Wanted to say that it'll be used only for IoT garbage but then this appeared on It’s FOSS article from the OP:
> Update: I am not sure if it was the impact of our story here but it looks like Speck will be removed from Linux Kernel. Apparently, Google has now dropped the idea of using Speck for Android Go and since no one is going to use this algorithm, there is no point in keeping it in Kernel.
> http://lkml.iu.edu/hypermail/linux/kernel/1808.0/05226.html
> http://lkml.iu.edu/hypermail/linux/kernel/1808.0/05238.html
▶ Anonymous 08/24/18 (Fri) 09:43:15 No. 959606 >>959609
>>959603
>only for IoT
That's not how things work. Once something's in the kernel, anyone might use it for anything. Putting code that is extremely likely to be backdoored in the kernel raises its profile, makes it usable by contractors with a "no third party code" requirement, and is taken as a seal of approval. There's a philosophical argument as to whether landmines bad code should be made available like that and also surely a very large amount of shilling going on as this is likely a many million shekel project of the NSA's.
▶ Anonymous 08/24/18 (Fri) 09:57:52 No. 959609 >>959619
>>959606
>a many million shekel project of the NSA's.
Think 5 digits instead of 7.
https://www.invidio.us/watch?v=fwcl17Q0bpk
▶ Anonymous 08/24/18 (Fri) 11:23:54 No. 959616
>>951509
I was looking at the docs last night, it's literally recommended for things too weak to do AES, so embedded.
>>951517
Someone beat me to it.
>used a fucking atmega variant with aes128 in hardware on it
The want to spy and jew at the same time.
▶ Anonymous 08/24/18 (Fri) 11:39:11 No. 959619
>>959609
That's literally a LARP presentation. Watch the first 2 minutes.
If you think they'd only spend 5 figures researching, testing, creating, getting approvals for, and promoting a complex new algorithm through multiple national standardization processes you're out of your mind. "5 figures" would be all this being done by one man in one year.
▶ Anonymous 08/30/18 (Thu) 20:29:20 No. 961770
>>951495
> Yes, suspicions. Until it can be proved
Anyone that mocks people questioning things are just sheep unable to see they blindly trust some-thing/one and thinking about that hurts their feelings, so it's never done.
▶ Anonymous 08/30/18 (Thu) 20:41:37 No. 961774 >>961808
▶ Anonymous 08/30/18 (Thu) 22:32:35 No. 961808 >>961812 >>961822 >>961823
>>961774
>There MAY be a backdoor in this one algorithm from the past that no one uses so that means every other algorithm is broken
▶ Anonymous 08/30/18 (Thu) 22:39:47 No. 961812 >>961845
>>961808
>The group that used to tightly restrict export of crypto 20 years ago, push for government key escrow, and has a mission of codebreaking is now sharing their own crypto with the world
>what an amazing change of heart!
>I will trust their strange algorithms seemingly designed around enabling a backdoor are safe
>even when they refuse to explain design decisions
▶ Anonymous 08/30/18 (Thu) 23:02:24 No. 961822 >>961826 >>961843
>>961808
Dual EC DRBG has kleptographic backdoors. In it's proper application, a kleptographically backdoored encryption algorithm cannot be distinguished from a legitimate one, expect for the attacker who implemented it in the first place.
https://en.wikipedia.org/wiki/Kleptographic
>A kleptographic attack is an attack which uses asymmetric cryptography to implement a cryptographic backdoor. For example, one such attack could be to subtly modify how the public and private key pairs are generated by the cryptosystem so that the private key could be derived from the public key using the attacker's private key. In a well-designed attack, the outputs of the infected cryptosystem would be computationally indistinguishable from the outputs of the corresponding uninfected cryptosystem. If the infected cryptosystem is a black-box implementation such as a hardware security module, a smartcard, or a Trusted Platform Module, a successful attack could go completely unnoticed.
>A reverse engineer might be able to uncover a backdoor inserted by an attacker, and when it is a symmetric backdoor, even use it himself. However, by definition a kleptographic backdoor is asymmetric and the reverse-engineer cannot use it. A kleptographic attack (asymmetric backdoor) requires a private key known only to the attacker in order to use the backdoor. In this case, even if the reverse engineer was well-funded and gained complete knowledge of the backdoor, it would remain useless for him to extract the plaintext without the attacker's private key.
▶ Anonymous 08/30/18 (Thu) 23:02:42 No. 961823 >>961826 >>961843
>>961808
Dual EC DRBG has kleptographic backdoors. In it's proper application, a kleptographically backdoored encryption algorithm cannot be distinguished from a legitimate one, expect for the attacker who implemented it in the first place.
https://en.wikipedia.org/wiki/Kleptographic
>A kleptographic attack is an attack which uses asymmetric cryptography to implement a cryptographic backdoor. For example, one such attack could be to subtly modify how the public and private key pairs are generated by the cryptosystem so that the private key could be derived from the public key using the attacker's private key. In a well-designed attack, the outputs of the infected cryptosystem would be computationally indistinguishable from the outputs of the corresponding uninfected cryptosystem. If the infected cryptosystem is a black-box implementation such as a hardware security module, a smartcard, or a Trusted Platform Module, a successful attack could go completely unnoticed.
>A reverse engineer might be able to uncover a backdoor inserted by an attacker, and when it is a symmetric backdoor, even use it himself. However, by definition a kleptographic backdoor is asymmetric and the reverse-engineer cannot use it. A kleptographic attack (asymmetric backdoor) requires a private key known only to the attacker in order to use the backdoor. In this case, even if the reverse engineer was well-funded and gained complete knowledge of the backdoor, it would remain useless for him to extract the plaintext without the attacker's private key.
▶ Anonymous 08/30/18 (Thu) 23:04:50 No. 961826
>>961822
>>961823
Well shit can some mod delete my duplicate post?
▶ Anonymous 08/30/18 (Thu) 23:41:01 No. 961843
>>961822
>>961823
>It has this property that is impossible to tell about it
LOL
▶ Anonymous 08/30/18 (Thu) 23:41:30 No. 961845 >>961859
>>961812
You missed the part where they created the most used hashing algorithm.
▶ Anonymous 08/31/18 (Fri) 00:15:58 No. 961859 >>961865
>>961845
Where are you even going with that?
>adoption rate is proof they're secure!
or
>the sha1 debacle is proof they're secure!
▶ Anonymous 08/31/18 (Fri) 00:33:08 No. 961865
>>961859
That the NSA has made great contributions to the crypto ecosystem :^).
▶ Anonymous 08/31/18 (Fri) 00:44:42 No. 961872 >>961999 >>962060
Does anyone here use Kuznyechik and Camellia daily? They are made by Russians and Japanese respectively and I think former doesn't have any backdoors that can be exploited by NSA. I can't confidently say the same for KGB but anyway it's secure enough to be used in western countries imho.
▶ Anonymous 08/31/18 (Fri) 01:13:25 No. 961882 >>961995
There is a lot of research interest in post-quantum crypto algorithms of late. There may be a reason for that - someone knows something is broken.
▶ Anonymous 08/31/18 (Fri) 11:26:21 No. 961995 >>962035 >>962147
>>961882
Grover's algorithm already reduces AES-n by (2^n)^(1/2) so AES-128 can be broken with 2^64 steps, rendering it unusable within the next decade or so. AES-256 on the other hand, should be secure for the foreseeable future.
▶ Anonymous 08/31/18 (Fri) 11:50:06 No. 961999 >>962060
>>961872
>Japan
>not west
Japan is just an outpost setup by Reagan to produce consumer goods
▶ Anonymous 08/31/18 (Fri) 13:26:05 No. 962035 >>962969
>>961995
>quantum computing meme
never gonna work
▶ Anonymous 08/31/18 (Fri) 14:02:18 No. 962060
>>961872
You meant FSB, didn't you?
>>961999
And consume consumer goods, Japan is the third biggest consumer market.
▶ Anonymous 08/31/18 (Fri) 17:44:34 No. 962147
>>961995
>rendering it unusable within the next decade or so
That seems way to optimistic. Can you explain your reasoning about this figure. Make sure to remember that the quantum computers we have now are different than theoretical ones because we have a lot of error to deal with.
▶ Anonymous 09/01/18 (Sat) 00:45:41 No. 962263
Is there a way to disable it without recompiling the kernel?
▶ Anonymous 09/01/18 (Sat) 14:00:21 No. 962969
▶ Anonymous 09/13/18 (Thu) 05:12:21 No. 968669 >>969031
>>951488 (OP)
All of this assumes that NSA cannot be trusted to provide encryption algorithms free of backdoors.
NSA was heavily involved in the promulgation of the AES standard.
Why is it widely assumed that AES is free of backdoors?
▶ Anonymous 09/13/18 (Thu) 05:22:46 No. 968670
Say goodbye to Speck in the upcoming Linux kernel version 4.20
▶ Anonymous 09/13/18 (Thu) 07:22:48 No. 968685
No, it makes it COMPATIBLE with it, it includes none of the actual Speck code. Besides, it's open source you dipfucks, you can read the code yourself
▶ Anonymous 09/13/18 (Thu) 07:31:22 No. 968691 >>968697
>>951488 (OP)
OS choice doesn't even matter anymore because of hardware backdoors that are added for IT "enterprise" solutions. AES probably also has a backdoor but even if it doesn't all modern processors which use code that has AES-NI in it would be perfect for a side-processor inside the CPU to remember and or call home saying somebody is using AES and here are some values .
NSA led Feminist Social Justice has completely ruined the decision making in a lot of the community.
▶ Anonymous 09/13/18 (Thu) 08:50:01 No. 968697 >>969030
>>968691
It matters a little, because Windows 10 outright spys on everything you do. Pretty much any Linux distro is better than that.
Of course, the hardware isn't safe, but that requires a bit more work on their part. Else they wouldn't need Windows 10 to begin with.
▶ Anonymous 09/14/18 (Fri) 03:44:28 No. 969030
>>968697
>Windows 10 outright spys on everything you do
Regularly sends data back to Microsoft (~5000 times per day) and since their latest T&C, introduced in May, any material submitted to a service of theirs can be accessed. In other words, they could use your creative content, they can scan and read your email (even in a mail client); and this has extended to all its services. Some users with non kosher imagery or account details have found their Xbox accounts suspended without explanation.
▶ Anonymous 09/14/18 (Fri) 03:55:16 No. 969031
>>968669
I bet you AES was properly vetted and had all its concerns addressed.
ISO rejected Speck because NSA refused to answer basic questions about how Speck worked.
This is why Speck was rejected while Russian and Chinese algos were accepted, NSA just didn't work with people.
▶ Anonymous 09/14/18 (Fri) 13:37:09 No. 969151
▶ Anonymous 09/14/18 (Fri) 13:39:54 No. 969153
>>951488 (OP)
speck is gone in 4.20
▶ Anonymous 09/17/18 (Mon) 17:06:29 No. 971508
>he doesn't use Serpent
Lmao
▶ Anonymous 10/02/18 (Tue) 22:40:00 No. 981599
>still not posting how to disable it
# echo 'blacklist CONFIG_CRYPTO_SPECK' > /etc/modprobe.d/blacklist.conf
▶ Anonymous 10/02/18 (Tue) 22:42:07 No. 981601
>>951497
Basically every encryption algorithm was invented by CIAniggers fam
▶ Anonymous 10/02/18 (Tue) 22:54:42 No. 981610
>>958111
>does not translate into Linux as a whole ecosystem being complicit in it.
They accepted it in to their kernel.
They are complicit in it.
Enjoy your botnet.