background preloader

Encryption

Facebook Twitter

Stop Online Spying. How to Create a Personal Encryption Scheme to Easily Hide Your Data in Plain Sight. I think the article is saying you could use LastPass to generate your LastPass password and the article's encryption scheme to keep the password in plain sight. Then you would not have to remember it. For example if your LastPass encryption key password was something like /%/K\G,_sO¦R¥ÅÀbݾöà~¼ÐÂ4×òO? Ù;ñN:è1? Xð¸½ñç Then you could write it down as a series of letters like SlPerSlKBkslG...etc. You can still use LastPass to generate your passwords and use this article to write them down. Then you're up the creek without a paddle. SlPerSlKBkslG...etc. Sorry for the double post above. Because the NSA has declared war on each and every human being on earth and they do know how to decrypt common algorithms.

Bamford Claims NSA Has Made “An Enormous Breakthrough” in Cryptanalysis. Bamford Claims NSA Has Made “An Enormous Breakthrough” in Cryptanalysis March 16th, 2012 Well, it has been the $64,000 question for a couple of decades: Can NSA break something like PGP? While there might be other black world technologies that could be up to the task (there’s no way to know), what we do know is that a practical quantum computing capability would be, for all intents and purposes, the master key. I’m pretty confident that NSA has this capability and here’s why: IBM Breakthrough May Make Practical Quantum Computer 15 Years Away Instead of 50. There is no hard constant that one can point to when considering how much more advanced black world technologies are than what we think of as state of the art, but if IBM is 15 years away from building a useful quantum computer, it’s not a stretch to assume NSA has that capability already, or is close to having it. Is Bamford’s piece a limited hangout? Maybe, but it makes for interesting reading in any event.

Update: Former Senior U.S. Quantum Byzantine agreement. Introduction[edit] The Byzantine Agreement protocol is a protocol in distributed computing. It takes its name from a problem formulated by Lamport, Shostak and Pease in 1982,[2] which itself is a reference to a historical problem. The Byzantine army was divided into divisions with each division being led by a General with the following properties: Each General is either loyal or a traitor to the Byzantine state.All Generals communicate by sending and receiving messages.There are only two commands: attack and retreat.All loyal Generals should agree on the same plan of action: attack or retreat.A small linear fraction of bad Generals should not cause the protocol to fail (less than a fraction).

(See [3] for the proof of the impossibility result). All loyal Lieutenants carry out the same order.If the commanding General is loyal, all loyal Lieutenants obey the order that he sends.A strictly less than fraction including the commanding General are traitors. Sketch of the Algorithm[edit] [edit] SteGUI - Steghide. Steghide is a Steganography utility written in C++ for Linux and Windows, released under the GNU/GPL license. It lets users exploit Windows Bitmap and JPEG images (with the Libjpeg library) and Windows Wave and Sun/NeXT AU audio files as cover files; any kind of file may instead be used as the payload.

Data in the payload may be encrypted (using the libraries MCrypt and MHash) and compressed (thanks to the Zlib library). In addition to the data proper it is also possible to include in the stego file the payload file name and a checksum to verify the integrity of extracted data. The cryptography algorithm used per default is Rijndael with 128-bit keys (which constitutes the Advanced Encryption Standard, or AES) in cipher block chaining mode. It is in any case possible to select any algorithm among 18 possibilities, each of which may operate in various modes. Cryptographic algorithms and modes of operation as supported by Steghide Steghide features steghide command [ arguments ] Embed Extract.

The End of Cyberspace: Clive Thompson on ambient awareness.