|
Post by Delta9 on Mar 27, 2017 18:33:03 GMT
Governments use the same encryption, what are you on about? They don't use it enough then. How many leaks are there from top secret stuff all over the world. More than enough I would say. Correct. The weak link is usually the human that gives out his password, or leaves a laptop unattended whilst logged in. Never the encryption itself.
|
|
|
Post by JohnV on Mar 27, 2017 18:33:10 GMT
however in this case I can see very clearly the value of it for anti terrorist action And what value would that be? Even if they could do it, it would be of no use in the prevention of terrorism. it would enable them to monitor electronically for "trigger" words and also to look for patterns of calls ....... traffic analysis
|
|
|
Post by kris on Mar 27, 2017 18:33:37 GMT
Governments use the same encryption, what are you on about? They don't use it enough then. How many leaks are there from top secret stuff all over the world. More than enough I would say. Usually by insiders.
|
|
|
Post by Delta9 on Mar 27, 2017 18:34:12 GMT
Fuck off Kris. You don't have to do this in every damn thread.
|
|
|
Post by kris on Mar 27, 2017 18:34:28 GMT
And what value would that be? Even if they could do it, it would be of no use in the prevention of terrorism. it would enable them to monitor electronically for "trigger" words and also to look for patterns of calls ....... traffic analysisΒ k believe they do that already.
|
|
|
Post by kris on Mar 27, 2017 18:35:27 GMT
Fuck off Kris. You don't have to do this in every damn thread. when he stops being a twat I'll stop calling him one. So you fuck off.
|
|
|
Post by Delta9 on Mar 27, 2017 18:36:01 GMT
And what value would that be? Even if they could do it, it would be of no use in the prevention of terrorism. it would enable them to monitor electronically for "trigger" words and also to look for patterns of calls ....... traffic analysis Blanket monitoring for trigger words and patterns is completely ineffective. Too many false positives.
|
|
|
Post by thebfg on Mar 27, 2017 18:39:09 GMT
it would enable them to monitor electronically for "trigger" words and also to look for patterns of calls ....... traffic analysisΒ Blanket monitoring for trigger words and patterns is completely ineffective. Too many false positives. Whatever they currently do seems far more effective than watching billions of what's app messages. Ok a few terrorists acts still happen but probably not as many as those that they stop... If what's app became insecure, wouldn't they just find another way.
|
|
|
Post by JohnV on Mar 27, 2017 18:39:45 GMT
however in this case I can see very clearly the value of it for anti terrorist action And what value would that be? Even if they could do it, it would be of no use in the prevention of terrorism. without the encryption it would enable monitoring for "trigger" words or word patterns but more importantly it would enable them to home in on particular things indicated by traffic analysis
|
|
|
Post by JohnV on Mar 27, 2017 18:41:23 GMT
it would enable them to monitor electronically for "trigger" words and also to look for patterns of calls ....... traffic analysis k believe they do that already. they can only monitor if it's not encrypted
|
|
|
Post by Delta9 on Mar 27, 2017 18:41:45 GMT
If what's app became insecure, wouldn't they just find another way. Exactly.
|
|
|
Post by thebfg on Mar 27, 2017 18:42:35 GMT
And what value would that be? Even if they could do it, it would be of no use in the prevention of terrorism. without the encryption it would enable monitoring for "trigger" words or word patterns but more importantly it would enable them to home in on particular things indicated by traffic analysis Is it not the normal way just to pick a country they think is training them and bomb the shit out of it anyway.π
|
|
|
Post by tomsk on Mar 27, 2017 18:42:38 GMT
Fuck off Kris. You don't have to do this in every damn thread. when he stops being a twat I'll stop calling him one. So you fuck off. Twat.
|
|
|
Post by Delta9 on Mar 27, 2017 18:43:52 GMT
And what value would that be? Even if they could do it, it would be of no use in the prevention of terrorism. without the encryption it would enable monitoring for "trigger" words or word patterns but more importantly it would enable them to home in on particular things indicated by traffic analysis As I've pointed out several times above, blanket monitoring for triggers and patterns as you describe is widely accepted to be completely ineffective.
|
|
|
Post by naughtyfox on Mar 27, 2017 18:59:12 GMT
It's probably a smokescreen to disguise the fact that they already have a 'back door'. They don't already have a backdoor, we can be 100% sure of that. It would be impossible for them to break the encryption involved, even if they used every computer on earth. You can't put a backdoor in mathematics. Perhaps the backdoor is Mark Zuckerberg blabbing?
|
|