• IP addresses are NOT logged in this forum so there's no point asking. Please note that this forum is full of homophobes, racists, lunatics, schizophrenics & absolute nut jobs with a smattering of geniuses, Chinese chauvinists, Moderate Muslims and last but not least a couple of "know-it-alls" constantly sprouting their dubious wisdom. If you believe that content generated by unsavory characters might cause you offense PLEASE LEAVE NOW! Sammyboy Admin and Staff are not responsible for your hurt feelings should you choose to read any of the content here.

    The OTHER forum is HERE so please stop asking.

Ultra Super Crapy Gay-Phone Wayang Propaganda Campaign by Govt

LEEgime

Alfrescian
Loyal
Ang Moh govt is helping dying gay-phone to falsify encryption myth, as if gay-phone was so secured and not crackable.

Suck my dick!

The govt agencies like NSA has huge supercomputer to crack any encryption they wanted. This is by brute force and huge CPU and RAM powers. Does not need any help from Gay-phones.

in 2007, 400 pcs were used to crack 1024 bit encryption within 11 months, today's PC power can do the same within just one month, without a supercomputer - which can do it within just days or hours.

http://www.geek.com/news/rsa-1024-bit-encryption-only-has-a-few-years-left-565998/


A new distributed computing experiment has lead one researcher to warn that the current RSA 1024-bit encryption used for secure online bank account access will become ineffective in the coming years.

The experiment was carried out by Professor Arjen Lenstra who works on cryptography at the Ecole Polytechnique de Lausanne in Switzerland. It involved the use of around 400 standard PCs and involved cracking a 700-bit RSA encryption key. The key was cracked in 11 months.
http://www.cbc.ca/news/technology/apple-encryption-privacy-security-1.3452630


Apple's encryption battle with the FBI could spill into Canada
U.S. legal fight will be closely watched north of the border

By Lucas Powers, CBC News Posted: Feb 19, 2016 11:00 AM ET Last Updated: Feb 19, 2016 12:29 PM ET
'Compromising the security of our personal information can ultimately put our personal safety at risk. That is why encryption has become so important to all of us,' Apple CEO Tim Cook said in a letter to customers.

'Compromising the security of our personal information can ultimately put our personal safety at risk. That is why encryption has become so important to all of us,' Apple CEO Tim Cook said in a letter to customers. (Jeff Chiu/Associated Press)


All the might, money and intellect of the Federal Bureau of Investigation apparently couldn't crack the password-protected iPhone used by one of the shooters in the attack late last year that left 14 people dead in San Bernardino, Calif.

So the backup plan is to make Apple do it via an unusual court order, something the technology giant has said it will fight.

The outcome of the legal battle over that deeply controversial strategy could reverberate loudly in Canada, where privacy and technology experts say the debate around encryption technology has been alarmingly quiet despite its far-reaching consequences for anyone with a smartphone.

Apple blasts order to unlock iPhone, vowing to fight court order
Trump slams Apple for refusing to help FBI hack shooter's iPhone
Read Tim Cook's message to Apple customers
Apple ordered to help FBI hack shooter's iPhone

"The conversations about encryption and how it fits into security have been very vocal in the U.S. and what's happening now with Apple now is sort of all that coming to a head," says Tamir Israel, a lawyer with the Canadian Internet Policy and Public Interest Clinic at the University of Ottawa.

"But if you look carefully, you see that law enforcement in Canada has been actively trying to attain the kinds of powers we see in the U.S., but doing it in a much less overt way."

'This is taking a chainsaw to a problem that requires a scalpel.'
- Trevor Timm, Freedom of the Press Foundation

Broadly speaking, encryption is the scrambling of data so that it can only be accessed with a secret decryption key, which is generated by an algorithm. There are varying types of encryption methods, some more secure than others.

Leaning on a U.S. law passed in 1798 — the same year Napoleon's army landed in Egypt — the FBI wants Apple to write a new, highly specialized version of its iOS mobile operating system that would help investigators access the encrypted work phone, an iPhone 5C, of Syed Farook.

Simply put, Apple is being ordered by a federal judge to deliberately subvert its own security systems.
Your chainsaw, doctor

Apple and privacy advocates say the move would be very dangerous, suggesting it amounts to creating a backdoor — an intentionally built-in susceptibility that could, in the wrong hands, be used to compromise data on millions of phones worldwide.

"This is taking a chainsaw to a problem that requires a scalpel," says Trevor Timm, executive director at the California-based Freedom of the Press Foundation, who has written extensively on technology privacy law.

"They are telling tech companies that they are going to have to disable security features that are in place specifically to protect users from all sorts of malicious actors."

It could also set a precedent for future cases in which Apple or other tech companies could be compelled to write software that undermines the security of newer-model phones.

"It's clear the government is not just concerned with this case. They want to set a precedent that they will be able to force tech companies to rewrite their own software," Timm adds. "This could lead to all sorts of situations that compromise user security."

Whether this is really possible in Apple's case, since the tech giant significantly increased the strength of its encryption technology in 2014, remains a bit of an open question.

Nonetheless, if Apple loses its appeal to have the order tossed out, it would be forced to do the U.S. government's bidding.
Pushing boundaries

That's a significant departure from, say, providing existing data to law enforcement based on a warrant, according to Halifax-based privacy lawyer David Fraser, a partner at McInnes Cooper.

"The court is essentially ordering a team of engineers at a private corporation to be deputized, unwillingly, to create a product for the government," he says.

CBC Forum | When should security trump privacy?
What powers do police have for online surveillance?
Spy agencies target mobile phones, app stores to implant spyware

The Apple case could encourage Canadian law enforcement to attempt similar orders for all kinds of third party companies operating here, like the telcos — which do encrypt some communications on mobile networks — or software companies developing encryption services, Fraser adds.

It's very unlikely a Canadian court would ever be able to successfully order a foreign tech company to comply with an order like the one in the ongoing Apple case, but police already have a pretty wide range of options at their disposal when it comes to obtaining digital records, he says.

"In theory, the same power that's being explored in the Apple case exists in Canadian law. We've just never seen it go that far. I would expect that if Apple is compelled to comply with the order, we'd eventually see something here that would test similar boundaries within the Canadian court system."
'Going dark'?

This is partly because well-encrypted data, obtained through lawful search warrants, can be impossible for police to crack. Law enforcement in both Canada and the U.S. have been vocal about the problem that encrypted data poses for investigations, a phenomenon dubbed "going dark."

Authorities in the U.S. have even gone as far to suggest that backdoors should be built in to all encryption technology so that police can access information more readily. That idea has been strongly condemned across the board by privacy advocates, lawyers and tech companies.

Still, police insist something must be done to help them decrypt data when it's needed.

Some technology law experts, however, argue that, in much more subtle ways than backdoor orders, the Canadian establishment began trying to weaken communications encryption nearly two decades ago.

"We have seen, over the years in Canada, several attempts by law enforcement and government to quietly and less overtly find ways to get around encrypted protections," says Israel.

"Sometimes the language in proposed bills would not suggest this specific purpose, but really they could be used to leverage third parties to assist in decryption efforts."
Weakening encryption

An interesting example, Israel says, can be found in Bill C-13, which passed into law in 2014. It was an evolutionary step in successive attempts by Liberal and Conservative governments to pass "lawful access" legislation, which privacy advocates have long derided as Draconian and overly generous in the powers it affords law enforcement.

CBC's coverage of Canada's Snowden files
OK for police to search cellphone if no password, says court

It was presented as a bill to end cyberbullying, but it has many less obvious repercussions because the language is intentionally vague.

According to Israel, the bill can arguably be used to force mobile carriers and third-party service providers to hand over decryption keys for data encrypted and stored, say, in a secure cloud.

It's important to note that this doesn't apply to data stored on a device you own and can't be used to intercept and decrypt data in transit, like in a wiretap.

But it does pertain to information kept by a service provider, which in some cases, says Israel, can be even more robust than what may be on your phone because so much of our digital footprint is stored in clouds.
Media placeholder

Apple defies court order to help FBI7:07

In a report published last summer, Citizen Lab post-doctoral researcher Christopher Parsons wrote that "though Canadian officials have not been as publicly vocal about a perceived need to undermine cryptographic standards, the government of Canada nevertheless has a history of successfully weakening encryption available to and used by Canadians."

In the U.S., the conversation around law enforcement's and security agencies' access to encrypted data has been loud and very public.

But in Canada "much of these debates have taken place very quietly within government," Parsons says.

The Apple case, Israel adds, could help drag the exchange over the future of encryption technology and digital security in Canada into the spotlight.

Read the U.S. government's order for Apple:

Document
Zoom
«
Page 1 of 40
»
Mobile users: View the document
(PDF KB)
(Text KB)
CBC is not responsible for 3rd party content
 

LEEgime

Alfrescian
Loyal
http://www.forbes.com/sites/andygre...o-crack-worlds-strongest-crypto/#3f2be443b357

NSA's New Data Center And Supercomputer Aim To Crack World's Strongest Encryption

Andy Greenberg

Forbes Staff

Covering the worlds of data security, privacy and hacker culture.

Follow on Forbes (1415)

Opinions expressed by Forbes Contributors are their own.

The NSA's Fort Meade, Maryland headquarters.

James Bamford has a way of digging up the facts that lend credence to America’s worst privacy fears about its own government. Now the author and investigative reporter who wrote the definitive portraits of the National Security Agency in his books The Puzzle Palace, Body of Secrets and The Shadow Factory has drawn a picture of ubiquitous surveillance that seems mind-boggling even by NSA standards.
Recommended by Forbes

In his just-published cover story for Wired, Bamford lays out the NSA’s plans for a vast new facility in Bluffdale, Utah that aims to become a storage and analysis hub for the record-breakingly massive collections of Internet traffic data that the NSA hopes to gather in coming years not from just foreign networks, but domestic ones as well.

The story adds confirmation to what the New York Times revealed in 2005: that the NSA has engaged in widespread wiretapping of Americans with the consent of firms like AT&T and Verizon. But more interestingly–and more troubling in the eyes of many who value their privacy–it details the Agency’s plans to crack AES encryption, the cryptographic standard certified by the NSA itself in 2009 for military and government use and until now considered uncrackable in any amount of time relevant to mortals.

Using what will likely be the world’s fastest supercomputer and the world’s largest data storage and analysis facility, the NSA plans to comb unimaginably voluminous troves of messages for patterns they could use to crack AES and weaker encryption schemes, according to Bamford’s story. A few of the facts he’s uncovered:

The $2 billion data center being built in Utah would have four 25,000 square-foot halls filled with servers, as well as another 900,000 square feet for administration.
It will use 65 megawatts of electricity a year, with an annual bill of $40 million, and incorporates a $10 million security system.
Since 2001, the NSA has intercepted and stored between 15 and 20 trillion messages, according to the estimate of ex-NSA scientist Bill Binney. It now aims to store yottabytes of data. A yottabyte is a million billions of gigabytes. According to one storage firm’s estimate in 2009, a yottabyte would cover the entire states of Rhode Island and Delaware with data centers.
When the Department of Energy began a supercomputing project in 2004 that took the title of the world’s fastest known computer from IBM in 2009 with its “Jaguar” system, it simultaneously created a secret track for the same program focused on cracking codes. The project took place in a $41 million, 214,000 square foot building at Oak Ridge National Lab with 318 scientists and other staff. The supercomputer produced there was faster than the so-called “world’s fastest” Jaguar.
The NSA project now aims to break the “exaflop barrier” by building a supercomputer a hundred times faster than the fastest existing today, the Japanese “K Computer.” That code-breaking system is projected to use 200 megawatts of power, about as much as would power 200,000 homes.

Read Wired’s story here.


https://www.washingtonpost.com/worl...ff297e-7195-11e3-8def-a33011492df2_story.html

NSA seeks to build quantum computer that could crack most types of encryption

Resize Text
Print Article
Comments 736
Book mark article
Read later list
Saved to Reading List
By Steven Rich and Barton Gellman January 2, 2014

In room-size metal boxes *secure against electromagnetic leaks, the National Security Agency is racing to build a computer that could break nearly every kind of encryption used to protect banking, medical, business and government records around the world.

According to documents provided by former NSA contractor Edward Snowden, the effort to build “a cryptologically useful quantum computer” — a machine exponentially faster than classical computers — is part of a $79.7 million research program titled “Penetrating Hard Targets.” Much of the work is hosted under classified contracts at a laboratory in College Park, Md.

[Read an annotated description of the Penetrating Hard Targets project]

The development of a quantum computer has long been a goal of many in the scientific community, with revolutionary implications for fields such as medicine as well as for the NSA’s code-breaking mission. With such technology, all current forms of public key encryption would be broken, including those used on many secure Web sites as well as the type used to protect state secrets.

Physicists and computer scientists have long speculated about whether the NSA’s efforts are more advanced than those of the best civilian labs. Although the full extent of the agency’s research remains unknown, the documents provided by Snowden suggest that the NSA is no closer to success than others in the scientific community.
 

knnpapccb

Alfrescian
Loyal
US Govt is dishonest or incompetent?

Acting dumb.

The simple hacking tools are all out there to crack stolen gay phones!

http://www.channelnewsasia.com/news/technology/exclusive-common-mobile/2532024.html


EXCLUSIVE - Common mobile software could have opened San Bernardino shooter's iPhone
The legal showdown over U.S. demands that Apple Inc unlock an iPhone used by San Bernardino shooter Rizwan Farook might have been avoided if his employer, which owns the device, had equipped it with special mobile phone software it issues to many workers.

Posted 20 Feb 2016 06:00 Updated 20 Feb 2016 11:30

PHOTOS

The Apple Inc. logo is seen through raindrops on a window outside of its flagship store in New York in this file photo taken January 18, 2011. REUTERS/Mike Segar/Files

Enlarge
Caption

0 Email More

A A

REUTERS - The legal showdown over U.S. demands that Apple Inc unlock an iPhone used by San Bernardino shooter Rizwan Farook might have been avoided if his employer, which owns the device, had equipped it with special mobile phone software it issues to many workers.

San Bernardino County, which employed Farook as an environmental health inspector, requires some, but not all, of its workers to install mobile-device management software made by Silicon Valley-based MobileIron Inc on government-issued phones, according to county spokesman David Wert.

That software is designed to secure corporate data. It also allows information technology departments to remotely unlock phones, even without assistance of the phone's users or access to the password needed to open the phone and unscramble the data.

"If that particular iPhone was using MobileIron, the county's IT department could unlock it," MobileIron Vice President Ojas Rege told Reuters.

The problem is that the MobileIron software was not installed on Farook's phone because his department did not use it. "The app was not installed on that device," Wert said.

If it had been, the high stakes legal battle that has pitted Apple and much of the technology industry against the U.S. government could have been avoided altogether. The Department of Justice, in court filings, has said there is no way to get at the data in the phone without Apple engineering a special software solution.

Apple, which is refusing to comply with a judge's order to unlock the phone, could not be reached immediately for comment.

Wert said he did not know why some departments opted out of using the mobile-management software. He said that the county might review the policy after the debacle over accessing Farook's phone.

"I think everybody who is in the business of providing mobile devices to their employees is probably taking a fresh look after these past couple days," he said.

County Chief Information Officer Jennifer Hilber could not be reached for comment.

Other leading mobile device management software makers include BlackBerry Ltd, International Business Machines Corp and VMware Inc.

David Goldschlag, a mobile-security expert with Pulse Secure, confirmed that MobileIron is capable of unlocking phones without the user's passcode, and he said the company's major competitors have similar features.

Representatives with BlackBerry and IBM declined comment. A VMware spokesman said he had no immediate comment. To be sure, mobile security experts warned that Farook could still have prevented the county from remotely accessing his phone by simply deleting the MobileIron software from his phone. But such a deletion would at a minimum have alerted managers to a problem, security experts said.

(Reporting by Jim Finkle in Boston; Additional reporting by Julia Love in San Francisco; Editing by Jonathan Weber and Bill Rigby)

- Reuters
 
Top