|
Post by naughtyfox on Mar 27, 2017 19:03:12 GMT
I've got to go to bed, I'm laughing too much (again)! Night all!
|
|
Deleted
Deleted Member
Posts: 0
|
Post by Deleted on Mar 27, 2017 19:19:09 GMT
there are ways round encryption. For example, the hash algorith called SHA-256 uses a mathematical method to irresversibly turn a password into a very long version. 5e884898da28047151d0e56f8dc6292773603d0d6aabbdd62a11ef721d1542d8 is an example. But hackers have stored this hash from millions of passwords. If you search for this hash, it will tell you what the password used to create it was. md5hashing.netSo impossible becomes simple. Unless a salt is used!
|
|
|
Post by Delta9 on Mar 27, 2017 19:29:01 GMT
there are ways round encryption. For example, the hash algorith called SHA-256 uses a mathematical method to irresversibly turn a password into a very long version. 5e884898da28047151d0e56f8dc6292773603d0d6aabbdd62a11ef721d1542d8 is an example. But hackers have stored this hash from millions of passwords. If you search for this hash, it will tell you what the password used to create it was. md5hashing.netSo impossible becomes simple. Unless a salt is used! That is just a hashed password. This has nothing to do with breaking the type of encryption we are talking about here.
|
|
|
Post by thebfg on Mar 27, 2017 19:38:04 GMT
there are ways round encryption. For example, the hash algorith called SHA-256 uses a mathematical method to irresversibly turn a password into a very long version. 5e884898da28047151d0e56f8dc6292773603d0d6aabbdd62a11ef721d1542d8 is an example. But hackers have stored this hash from millions of passwords. If you search for this hash, it will tell you what the password used to create it was. md5hashing.netSo impossible becomes simple. Unless a salt is used! I've had to Google that salt thing as it seemed to simple. I see if a salt is used the same word will never have the same hash and be unbreakable.
|
|
|
Post by thebfg on Mar 27, 2017 19:46:31 GMT
there are ways round encryption. For example, the hash algorith called SHA-256 uses a mathematical method to irresversibly turn a password into a very long version. 5e884898da28047151d0e56f8dc6292773603d0d6aabbdd62a11ef721d1542d8 is an example. But hackers have stored this hash from millions of passwords. If you search for this hash, it will tell you what the password used to create it was. md5hashing.netSo impossible becomes simple. Unless a salt is used! That is just a hashed password. This has nothing to do with breaking the type of encryption we are talking about here. I'm beginning to understand the issue with end to end encryption. There can't be a backdoor it a either encrypted or not. And not having it encrypted is apparently not an option for what's app as any kind of back door would be exploited by wrong uns
|
|
|
Post by Delta9 on Mar 27, 2017 19:56:17 GMT
That is just a hashed password. This has nothing to do with breaking the type of encryption we are talking about here. I'm beginning to understand the issue with end to end encryption. There can't be a backdoor it a either encrypted or not. And not having it encrypted is apparently not an option for what's app as any kind of back door would be exploited by wrong uns Correct. And even if Whats App did go along with it, people can just encrypt things themselves and send them through any other channel. For example, if anyone ever wants to contact me securely, they can use my public key to encrypt their message and post it right here in public view. Only I will be able to read it. Here is my pub key: -----BEGIN PGP PUBLIC KEY BLOCK----- Version: GnuPG v1 mQENBFjZaK0BCADKCXp156Ol7ha+ow5h4gOqQ6hRh0p6sBvUM5gsLRjvijpwj3GY rLF8vC2EFci8el02bnb+CXaeSwdPLnNrrWV0yi5JMiiMYhQF2ffQqSGXWG8BVaIO jF/nxC4MrC/Fc4aRdLQucD/SBZsXhxj+iMqk1Adaxc7v6uw1mrrvCHNp+lcN9ciJ a/6zujXxX5jWEe1IK6iMOOpdYsvU9Db9fthOeu3aPnWB/Gny46Fpg/soQ347AFOE u1rBRN0q2hTgK9+lAFC+hJLUGFAlwm+g9TGbJwaQ3H+wG1sXhQQK77rbCFT56f8B wpbJrf0+9UlFitxWTADKSsOK7A4xXe4qALvZABEBAAG0H2RlbHRhOSA8dGh1bmRl cmJvYXRAeWFuZGV4LmNvbT6JATYEEwEKACAFAljZaK0CGwMFCwkIBwMFFQoJCAsE FgIBAAIeAQIXgAAKCRDhgeCKs8Cv03eLB/921+4F7X7T2T88sYtLYCXEe7LlwLA2 JskKYuHHkW3Kl6cgXR2zm2qSaFpBKas56Hgx6uqYRkfaRIdId/sZMoM5mZ/RbLKH Fent/ntlSsZn/iTXEhXOyIhhIVE0ir1LxVEuA1mVFiaqTVwP89ROV/0UrY1ezo9h b1LOWCDLGylTWjlUj7oPBjl/afOGjtPayWCAQqind45pffPCKbwIJQK+WxKbEfUM Qfzhl170lPnOzWeouj7B2+jQdFsLZbqFkJLgASvXishF/mxEY/J+58toWUqCQsnG Gksc04fUzEd7uLBYJ6yFi+TMyNCddqLLmnFNiJEjO5kCYziMm2+/cCj0uQENBFjZ aK0BCAC7ANMgRx3X0HfteHU4fc+PSP1VmEn7p716xw/aosEhI3D4+t+TDDO54iJY gY4wbsN6Oys81qyxIN4RXCJgof7Af5lRzstN3OYiTdogK8f9Jla4NwUtIeZxivr2 JxKL84U3ubKYxJjZc/MUQdU/K8nCZ1j2pS2jGfPQj+SiIoVqtU6kU1rjeqTNEYz6 QV87RGW8eQumDE/jBHnw8mYoGpq0F3km/W5JDS0S5Kq/aYEOfGNoLiSMxBm9PFai k+cCgDecwuQrjAIjhx2mtRzkqNxwzpy93BJh/p+IacRtcXrWkk8NME0qh+HsT/1v ImmEx95ZsCnkoI6n4De2gZU+iIOTABEBAAGJAR8EGAEKAAkFAljZaK0CGwwACgkQ 4YHgirPAr9Pjwgf/TJIza+lhM+rFPPoL/KkM2rj0yKj8QEvQl99HEO0+geCZrN0j HL0ZH6RwivIh2po14DeRzS26VN/tFrDjWM/cVrO3zMFQP2Ux46Q18bX6eG5IaRJX QgFdkH50Y3Ce9xi9Yg7KlmDa/3d2+vM5DBirKxkWQZJWf7X5N1loLVsmIcdiCKFE Ti5CXR7fvrJs3OlzE5jxkY9EVlqNDwFsKCaSb1m/5DE27Wk47IKbDkblUDkExJmS XjfE5LvtHge+MsTpDhHdVqu9LGUrCKb4RPQX4N6xObFF4JhCYbqyoej7piXR241K ScfEoIgPvbzvqBzFQN9YB5Dl+xiFndHSSWr5vg== =+uXq -----END PGP PUBLIC KEY BLOCK-----
|
|
|
Post by thebfg on Mar 27, 2017 20:10:19 GMT
I was going to encrypt a message for you but couldn't work out how.
Ultimately it does not matter what what's app do then.
We could plot out a terrorist atrocity right here on this very public forum in the public view and no-one would outside of a group of members would ever know what the posts contain.
|
|
|
Post by Stumpy on Mar 27, 2017 21:22:50 GMT
fgegrgklr@////2534@@%%333&7 feckin'00""****fwe2f126749679 point there.
|
|
|
Post by naughtyfox on Mar 28, 2017 4:09:47 GMT
it would enable them to monitor electronically for "trigger" words and also to look for patterns of calls ....... traffic analysis Blanket monitoring for trigger words and patterns is completely ineffective. Too many false positives. Are u taking the Mickey?
|
|
Deleted
Deleted Member
Posts: 0
|
Post by Deleted on Mar 28, 2017 6:29:41 GMT
there are ways round encryption. For example, the hash algorith called SHA-256 uses a mathematical method to irresversibly turn a password into a very long version. 5e884898da28047151d0e56f8dc6292773603d0d6aabbdd62a11ef721d1542d8 is an example. But hackers have stored this hash from millions of passwords. If you search for this hash, it will tell you what the password used to create it was. md5hashing.netSo impossible becomes simple. Unless a salt is used! That is just a hashed password. This has nothing to do with breaking the type of encryption we are talking about here. Yes, it was just an example of how encryption can be bypassed. Some systems are hosted in countries with dubious records on personal privacy. To say that all encrypted communications are 100% is wrong.
|
|
|
Post by Delta9 on Mar 28, 2017 6:45:52 GMT
That is just a hashed password. This has nothing to do with breaking the type of encryption we are talking about here. Yes, it was just an example of how encryption can be bypassed. Some systems are hosted in countries with dubious records on personal privacy. To say that all encrypted communications are 100% is wrong. We are talking about end to end encryption, it isn't hosted anywhere.
|
|
Deleted
Deleted Member
Posts: 0
|
Post by Deleted on Mar 28, 2017 7:24:24 GMT
You have one PGP key on your computer! If that's compromised................................
|
|
Deleted
Deleted Member
Posts: 0
|
Post by Deleted on Mar 28, 2017 7:36:56 GMT
"WhatsApp Messenger is a freeware, cross-platform and end-to-end encrypted instant ..... When a user sends a message, it first travels to the WhatsApp server where it is stored. Then the server repeatedly requests the receiver acknowledge ...
And it's now owned by Facebook.
|
|
|
Post by Delta9 on Mar 28, 2017 7:41:30 GMT
You are missing the point. Also, it is encrypted when passing through their server.
|
|
Deleted
Deleted Member
Posts: 0
|
Post by Deleted on Mar 28, 2017 7:52:57 GMT
You can have the last word, I'm out.
|
|