LinuxQuestions.org
Visit Jeremy's Blog.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - General
User Name
Password
Linux - General This Linux forum is for general Linux questions and discussion.
If it is Linux Related and doesn't seem to fit in any other forum then this is the place.

Notices


Reply
  Search this Thread
Old 08-11-2013, 10:13 PM   #1
Pedroski
Senior Member
 
Registered: Jan 2002
Location: Nanjing, China
Distribution: Ubuntu 20.04
Posts: 2,116

Rep: Reputation: 73
encryption and security


I don't have any secrets. But if I were a business man with say a brilliant new idea, which I would want to keep secret until I was ready, how could I stop the Americans just stealing it from my email? The NSA dragnet is ideal for industrial espionage. Or if I were president of a country, how could I protect my email or computer from the Americans?

Lavabit and Silent Circle are down, if not out.

Does Linux have an encryption method that the NSA cannot fathom??
 
Old 08-11-2013, 11:29 PM   #2
yooy
Senior Member
 
Registered: Dec 2009
Posts: 1,387

Rep: Reputation: 174Reputation: 174
check hushmail it is pretty secure and it is used by internet pirates.
 
Old 08-12-2013, 01:07 AM   #3
lleb
Senior Member
 
Registered: Dec 2005
Location: Florida
Distribution: CentOS/Fedora/Pop!_OS
Posts: 2,983

Rep: Reputation: 551Reputation: 551Reputation: 551Reputation: 551Reputation: 551Reputation: 551
Quote:
Originally Posted by yooy View Post
check hushmail it is pretty secure and it is used by internet pirates.
interesting setup they have.
 
Old 08-12-2013, 08:26 AM   #4
H_TeXMeX_H
LQ Guru
 
Registered: Oct 2005
Location: $RANDOM
Distribution: slackware64
Posts: 12,928
Blog Entries: 2

Rep: Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301
hushmail has given in before, see the other thread.

For complete secrecy, the one-time pad is the only option.
 
Old 08-12-2013, 08:43 AM   #5
Pedroski
Senior Member
 
Registered: Jan 2002
Location: Nanjing, China
Distribution: Ubuntu 20.04
Posts: 2,116

Original Poster
Rep: Reputation: 73
What is that??
 
Old 08-12-2013, 09:29 AM   #6
H_TeXMeX_H
LQ Guru
 
Registered: Oct 2005
Location: $RANDOM
Distribution: slackware64
Posts: 12,928
Blog Entries: 2

Rep: Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301
http://it.slashdot.org/story/07/11/1...-us-government

http://en.wikipedia.org/wiki/One-time_pad
 
1 members found this post helpful.
Old 08-12-2013, 01:36 PM   #7
lleb
Senior Member
 
Registered: Dec 2005
Location: Florida
Distribution: CentOS/Fedora/Pop!_OS
Posts: 2,983

Rep: Reputation: 551Reputation: 551Reputation: 551Reputation: 551Reputation: 551Reputation: 551
thanks TeXMex
 
Old 08-12-2013, 04:58 PM   #8
sundialsvcs
LQ Guru
 
Registered: Feb 2004
Location: SE Tennessee, USA
Distribution: Gentoo, LFS
Posts: 10,659
Blog Entries: 4

Rep: Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941
Preface: "INAL," etc...

If you were "a business man with a brilliant idea," or, simply, anyone who falls under various government regulations concerning the disclosure of information to which you might be privy and/or that is legally protected, then you're required by law to safeguard that information "by reasonable business means." And that means, in short, "e-mail encryption." The messages must be safeguarded, not only "in transit," but also anywhere and everywhere that they are stored. You must be able to demonstrate to the Honorable Court that you "exercised due diligence" and "proper care."

There are, basically, two well-accepted ways to do this:
  1. Privacy-Enhanced Mail (PEM), which is built-in to most email programs, and ...
  2. GPG (or PGP), which probably requires a plugin.
Both of these systems use Public-Key (PKI) techniques, and peer-reviewed source code, to provide three important .. and separate .. capabilities:
  1. Provenance: The message probably did come from the party who claims to have sent it.
  2. Message Integrity: The message probably did arrive "as tendered," without modification in-transit.
  3. Concealment: (which is optional!) The message is unintelligible to "anyone else," and will remain so.
Now... are they going to keep-out the goons who work for mysterious government agencies (in any country ...) with three-letter-acronym (TLA) names? Uhhh... no. (And, for the #CLASSIFIED# of my Dollars that they are spending every day, I for one would be royally pissed-off if the answer were "yes.") But they will do what they were designed to do: allow you to use "the convenience of e-mail" to do what "ordinary e-mail" won't by itself do. And to give you something plausible to say to His/Her Honor in whatever country you live in.
 
1 members found this post helpful.
Old 08-12-2013, 06:37 PM   #9
Pedroski
Senior Member
 
Registered: Jan 2002
Location: Nanjing, China
Distribution: Ubuntu 20.04
Posts: 2,116

Original Poster
Rep: Reputation: 73
Thanks for that. I like the article about Hushmail handing over the CDs to the DEA. But why didn't the DEA just go to the CIA? They run most of the smuggling. Maybe they're not talking to each other.

Is there an electronic 'one-time-pad'?
 
Old 08-12-2013, 11:42 PM   #10
sundialsvcs
LQ Guru
 
Registered: Feb 2004
Location: SE Tennessee, USA
Distribution: Gentoo, LFS
Posts: 10,659
Blog Entries: 4

Rep: Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941
No, a "one-time pad" is a theoretical goal, never a practical one. The only way to achieve security with such a system is to already possess a secure means to convey an identical, purely-random key to both parties at once ... and to somehow ensure that no one else also possesses a copy of the same key. (Well, if you could actually do that, why not just use that already-secure method to send the message itself?)

In actual practice, there are lots of disadvantages to a one-time pad, not the least of which is a severe limitation as to the amount of data you can ever transmit. There's an utter and complete lack of error-correction and no prescribed way to resynchronize the two parties. The list goes on and on.

Pragmatically speaking, the purpose of encryption isn't to keep the Mysterious Government Agencies With Three-Letter Acronyms from reading your messages. Instead, it is "to keep the honest people out." To prevent crimes of opportunity, by removing that opportunity for "easily" forging, tampering with, or intercepting the intended communication ... while at the same time, making the whole process as easy-to-use for its intended users as possible (so that they'll actually use it).

Quite often, you actually don't want to "conceal" the message: you simply want to know that the message came from the party that you think sent it, and that it has arrived in your hands "exactly as sent." This by itself is a tremendous improvement to email. Many companies implement this directly on their inbound and outbound mail-servers, using it to automatically detect and quarantine fake or altered messages that proclaim to come from, say, a supplier or a customer or a salesman. If a message makes it through the gauntlet, it's trustworthy. If it's not trustworthy, it doesn't make it.

Last edited by sundialsvcs; 08-12-2013 at 11:53 PM.
 
Old 08-13-2013, 02:25 AM   #11
Pedroski
Senior Member
 
Registered: Jan 2002
Location: Nanjing, China
Distribution: Ubuntu 20.04
Posts: 2,116

Original Poster
Rep: Reputation: 73
I would like to know what politicians do to keep their email private? Not just the Americans may try to intercept them, anyone looking for political advantage. It has been documented that the Americans have accessed European computers prior to negotiations. It would be naive to think they are the only criminals to behave in this way.
 
Old 08-13-2013, 06:00 AM   #12
H_TeXMeX_H
LQ Guru
 
Registered: Oct 2005
Location: $RANDOM
Distribution: slackware64
Posts: 12,928
Blog Entries: 2

Rep: Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301
The one-time pad should be implemented using pen and paper, not on a computer. The message, however can be sent by any means.

Quote:
Originally Posted by sundialsvcs View Post
No, a "one-time pad" is a theoretical goal, never a practical one. The only way to achieve security with such a system is to already possess a secure means to convey an identical, purely-random key to both parties at once ... and to somehow ensure that no one else also possesses a copy of the same key. (Well, if you could actually do that, why not just use that already-secure method to send the message itself?)
You distribute a large pad securely, once. Then, you can use the pad for a long time afterwards with no breach in security. Having a secure channel for that same amount of time is not gonna happen.

I know the weaknesses of the one-time pad, and there are many. However, if you do it right, there are no weaknesses.

I personally don't trust AES or any NSA-developed encryption. All other encryption rely on the mathematical / computational difficulty of a certain problem. These problems are not proven to be mathematically or computationally difficult, and even if they are, they may quickly not be:
http://it.slashdot.org/story/13/08/0...within-5-years

You kinda have to trust the designer of the algorithm to not have put a backdoor, and the cryptographers analyzing it to do a good job.

It's your choice. For sure computer-based systems cannot use the one-time pad, and must use other encryption algorithms.
 
Old 08-13-2013, 06:19 AM   #13
Pedroski
Senior Member
 
Registered: Jan 2002
Location: Nanjing, China
Distribution: Ubuntu 20.04
Posts: 2,116

Original Poster
Rep: Reputation: 73
Interesting, so there is no secure message system, because if you get caught with the pad, the 'bad guys' can thenceforth read your messages. Bit slow with pencil and paper, too.

But Obama said recently, he has directed the Security Services to be more tranparent. Their reply was not alluded to.
 
Old 08-13-2013, 07:25 AM   #14
sundialsvcs
LQ Guru
 
Registered: Feb 2004
Location: SE Tennessee, USA
Distribution: Gentoo, LFS
Posts: 10,659
Blog Entries: 4

Rep: Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941
An equally-effective way to break most encryption schemes is called "a baseball bat."

Modern encryption algorithms are peer-reviewed, intensely and constantly. Information about vulnerabilities (most of them quite theoretical) are widely and openly shared. Furthermore, as much or more scrutiny is paid to how the systems are used ... the total context of key-management, authentication, human factors, everything.

The NSA is of course a very active player ... your tax dollars at work ... and they have been known to provide security improvements from the Classified world from time to time. For example, the "S-box" transformation in the original DES was provided without explanation ... except for the statement that the reasoning behind it was classified. Many folks were suspicious then, but then the technique of "differential cryptanalysis" became public, and this was revealed to be the reason behind that transformation-table being exactly as it was. (When "the secret was out," NSA confirmed this.)

It's extremely easy to produce a message that is "so 'secure' that no one can read it .. including you." It is also quite easy, through mis-application of "one time pad" in a Faustian quest for "perfect security," to receive and decrypt a message that is a forgery (or subtly yet undetectably altered by a "man in the middle") because, unbeknownst to either Alice or Bob, Eve did manage to get a copy of the pad.

If we may presume that you are not committing a high crime (usually a reasonable assumption ...) then you have to have a practical encryption technique ... ideally, one that Just Works™, like VPN or HTTPS. Something that is secure, manageable, and otherwise just does its job and stays out of the way.

If you want to read a good book about the real-world troubles of deploying a successful cipher infrastructure (in the pre-computer days), I recommend: Between Silk and Cyanide. The title says it all.

Last edited by sundialsvcs; 08-13-2013 at 07:33 AM.
 
Old 08-13-2013, 07:57 AM   #15
lleb
Senior Member
 
Registered: Dec 2005
Location: Florida
Distribution: CentOS/Fedora/Pop!_OS
Posts: 2,983

Rep: Reputation: 551Reputation: 551Reputation: 551Reputation: 551Reputation: 551Reputation: 551
Quote:
Originally Posted by Pedroski View Post
Interesting, so there is no secure message system, because if you get caught with the pad, the 'bad guys' can thenceforth read your messages. Bit slow with pencil and paper, too.

But Obama said recently, he has directed the Security Services to be more [transparent]. Their reply was not alluded to.
and you trust anything that obama has to say about being more transparent? what happened to his "no closed doors" he ran on 6 years ago bullshit? sorry everything that man has said is a lie. just look at his killing of the US ambassador, his killing of the border patrol officers, his illegal spying on Americans, and his illegal audits of conservative parties via the IRS.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
A few questions: Security, Encryption, Distro, etc... Amdx2_x64 Linux - General 7 10-19-2010 07:10 PM
Security of LUKS encryption PlatinumX Linux - Security 5 06-06-2009 04:08 PM
LXer: Enhance security with file encryption tools LXer Syndicated Linux News 0 02-08-2007 09:54 PM
scanner, encryption, security question Furlinastis Linux - Hardware 2 07-22-2006 07:09 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - General

All times are GMT -5. The time now is 01:45 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration