Author Topic: Internet Vulnerability & Exploits  (Read 1889 times)

TooCold

  • Larvae
  • *
  • Posts: 32
Re: Internet Security & Exploits.
« Reply #20 on: November 11, 2010, 06:05:05 AM »
You would gain another 'layer' of security. I see security as like an onion. I only bother encrypting emails to ONE person (because they are the only person I email about anything potentially 'odd') and we have a few layers. layers upon layers man. Manual encoding using our own (non sophisticated) cipher method (which key-changes a LOT, but is VERY simplistic and probably easy to crack), then GnuPG and then hushmail it just for that extra layer. The emails themselves are 'sanitized' of any identifying shite, and so on. Also as a rule I only access my hushmail accounts from 'borrowed' WiFi hotspots, wiping router logs when I am done. I tend to also use TOR while doing this.

It is all about the layers man. Each one is another layer of insulation to help CYA

My point is that your are not really gaining anything by using hushmail. As hushmail holds your keys and would gladly sell you out if asked to do so by court order. You would be much better off using your time to secure your own computer in other ways than encrypting already strongly encrypted info with a secondary insecure systems like hushmail. It would be like covering a safe with play-doh and saying "its all about layer man".

lugh

  • Global Moderator
  • Foundress Queen
  • *****
  • Posts: 876
Re: Internet Security & Exploits.
« Reply #21 on: November 11, 2010, 04:17:16 PM »
Using encryption such as pgp/gpg within a hushmail message does hide the fact that one is using encryption from those who monitor packets sent over the internet so layering does make such communications much more discrete  :-X  Stating that it doesn't enhance security is simply not realistic in view of Echelon 8)
« Last Edit: November 11, 2010, 04:56:35 PM by lugh »
Chemistry is our Covalent Bond

xxx

  • Larvae
  • *
  • Posts: 4
Re: Internet Security & Exploits.
« Reply #22 on: December 19, 2010, 05:42:02 AM »
I am trying to (Begin) to write a .pdf on 'anonymizing your browsing' and 'securing your privacy'. Basically simple ways to put more layers of REAL security between YOU and THEM. Based on both serious crypto and deniability.

The more layers between you and it the better!

Wizard X

  • Lord of the Realms
  • Foundress Queen
  • *****
  • Posts: 1,224
Re: Internet Security & Exploits.
« Reply #23 on: December 21, 2010, 05:35:30 AM »
Since this Internet Security related I'll post this here...

Since WinRescue backs up the Registry and important configuration files, and you can restore in DOS mode with WinRescue - any malware will be neutralized since the Registry and important configuration files are restored from backup(s), thus avoiding a complete Windows reinstall.

REF: http://127.0.0.1/talk/index.php/topic,1650.msg17623.html#msg17623


Readme.txt file in OS.zip The OS.zip file has been scanned with Avast, SpyBot, & Trojan Remover and all OK.

CTMOUSE is the DOS mouse driver for IMAGE & GHOST2K3 in DOS mode.

IMAGE & manual are for full hard drive imaging (full hard drive snapshot backup) in DOS.

GHOST2K3 is for full hard drive imaging (full hard drive snapshot backup) in DOS.

SC is a file explorer/management DOS (commandline utility) that show ALL HIDDEN FILES AND FOLDERS. Copy to C root. C:\
Look at sc.jpg to see example.

WinRescue XP 1.08.04 & Serial.

Pablo Commander V1.4 is a file manager like Norton Commander from http://www.pablosoftwaresolutions.com
Excellent tool for file managemet & exploration.
Albert Einstein - "Great ideas often receive violent opposition from mediocre minds."

Wizard X

  • Lord of the Realms
  • Foundress Queen
  • *****
  • Posts: 1,224
Re: Internet Security & Exploits.
« Reply #24 on: January 08, 2011, 10:16:42 PM »
Albert Einstein - "Great ideas often receive violent opposition from mediocre minds."

TooCold

  • Larvae
  • *
  • Posts: 32
Re: Internet Security & Exploits.
« Reply #25 on: January 09, 2011, 01:27:08 AM »
Using encryption such as pgp/gpg within a hushmail message does hide the fact that one is using encryption from those who monitor packets sent over the internet so layering does make such communications much more discrete  :-X  Stating that it doesn't enhance security is simply not realistic in view of Echelon 8)

It does not hide the fact your are using encryption because hushmail uses encryption. It does not make it more discreet. Also, by using a hushmail email address you are drawing more attention to yourself anyway.

lugh

  • Global Moderator
  • Foundress Queen
  • *****
  • Posts: 876
Re: Internet Security & Exploits.
« Reply #26 on: January 09, 2011, 04:46:48 AM »
Packet sniffing by the NSA isn't going to be able to detect the fact that a hushmail message was encrypted with plain text pgp/gpg encryption, while it will notice that such encryption is being used in gmail  ;)  Apparently agreements between the NSA and various telecommunications service providers is news :

h**p://www.usatoday.com/news/washington/2006-02-05-nsa-telecoms_x.htm

hushmail can be compromised by subpoena:

h**p://www.theregister.co.uk/2007/11/08/hushmail_court_orders/

the Scarfo and the Alba/Forrester cases have demonstrated the utility of plain text encryption  8)
Chemistry is our Covalent Bond

Wizard X

  • Lord of the Realms
  • Foundress Queen
  • *****
  • Posts: 1,224
Re: Internet Security & Exploits.
« Reply #27 on: January 22, 2011, 11:27:22 PM »
Albert Einstein - "Great ideas often receive violent opposition from mediocre minds."

Wizard X

  • Lord of the Realms
  • Foundress Queen
  • *****
  • Posts: 1,224
Re: Internet Security & Exploits.
« Reply #28 on: February 26, 2011, 11:37:53 PM »
New bank Trojan employs fresh tricks to steal account data. http://www.computerworld.com/s/article/9210764/New_bank_Trojan_employs_fresh_tricks_to_steal_account_data?taxonomyId=17

Solid state drive erasure proves harder than expected. http://www.v3.co.uk/v3/news/2274933/ssd-erasure-wipe

Security shocker: Android apps send private data in clear. http://www.theregister.co.uk/2011/02/24/android_phone_privacy_shocker/

Night Dragon hackers targeted Shell, BP and Exxon. http://www.v3.co.uk/v3/news/2274971/shell-bp-exxon-mobil
Albert Einstein - "Great ideas often receive violent opposition from mediocre minds."

Wizard X

  • Lord of the Realms
  • Foundress Queen
  • *****
  • Posts: 1,224
Re: Internet Security & Exploits.
« Reply #29 on: March 10, 2011, 04:50:42 AM »
Albert Einstein - "Great ideas often receive violent opposition from mediocre minds."

Wizard X

  • Lord of the Realms
  • Foundress Queen
  • *****
  • Posts: 1,224
Albert Einstein - "Great ideas often receive violent opposition from mediocre minds."

Wizard X

  • Lord of the Realms
  • Foundress Queen
  • *****
  • Posts: 1,224
Re: Internet Security & Exploits.
« Reply #31 on: April 09, 2011, 11:05:57 PM »
Albert Einstein - "Great ideas often receive violent opposition from mediocre minds."

Wizard X

  • Lord of the Realms
  • Foundress Queen
  • *****
  • Posts: 1,224
Re: Internet Security & Exploits.
« Reply #32 on: April 19, 2011, 02:17:46 AM »
Albert Einstein - "Great ideas often receive violent opposition from mediocre minds."

Wizard X

  • Lord of the Realms
  • Foundress Queen
  • *****
  • Posts: 1,224
Re: Internet Security & Exploits.
« Reply #33 on: April 23, 2011, 10:09:10 PM »
iPhone secretly tracks user location, say researchers.             
http://www.computerworld.com/s/article/9215984/iPhone_secretly_tracks_user_location_say_researchers?taxonomyId=17

Apple faces questions from Congress about iPhone tracking.               
http://www.computerworld.com/s/article/9216058/Apple_faces_questions_from_Congress_about_iPhone_tracking?taxonomyId=17

Top-secret US lab infiltrated by spear phishers. http://www.theregister.co.uk/2011/04/19/us_lab_security_breach/

Adobe patches Reader bug early as PDF attacks begin.           
http://www.computerworld.com/s/article/9216062/Adobe_patches_Reader_bug_early_as_PDF_attacks_begin?taxonomyId=17

Cops refuse to say if they secretly snarf cellphone data. http://www.theregister.co.uk/2011/04/21/police_cellphone_searches/
Albert Einstein - "Great ideas often receive violent opposition from mediocre minds."

akcom

  • Dominant Queen
  • ****
  • Posts: 430
Re: Internet Security & Exploits.
« Reply #34 on: April 29, 2011, 04:24:44 AM »
I am trying to (Begin) to write a .pdf on 'anonymizing your browsing' and 'securing your privacy'. Basically simple ways to put more layers of REAL security between YOU and THEM. Based on both serious crypto and deniability.

The more layers between you and it the better!
The tutorial could be one sentence long:
go to http://www.torproject.org

Using encryption such as pgp/gpg within a hushmail message does hide the fact that one is using encryption from those who monitor packets sent over the internet so layering does make such communications much more discrete  :-X  Stating that it doesn't enhance security is simply not realistic in view of Echelon 8)

It does not hide the fact your are using encryption because hushmail uses encryption. It does not make it more discreet. Also, by using a hushmail email address you are drawing more attention to yourself anyway.
Layering GPG is ineffective, in fact it increases the chance of a successful KPA.  Hushmail will hand over your emails (decrypted) to the authorities with a simple request, no warrant required.  Hushmail is nice if you encrypt the messages on your own, but only because they scrub the IP address.  You're just as safe using something like safe-mail or cyber-whatever + GPG
« Last Edit: April 29, 2011, 04:27:18 AM by akcom »

lugh

  • Global Moderator
  • Foundress Queen
  • *****
  • Posts: 876
Re: Internet Security & Exploits.
« Reply #35 on: April 29, 2011, 04:43:03 AM »
Quote
Layering GPG is ineffective, in fact it increases the chance of a successful KPA.  Hushmail will hand over your emails (decrypted) to the authorities with a simple request, no warrant required.  Hushmail is nice if you encrypt the messages on your own, but only because they scrub the IP address.  You're just as safe using something like safe-mail or cyber-whatever + GPG

According to:

h**ps://secure.wikimedia.org/wikipedia/en/wiki/Known-plaintext_attack

modern cyphers such as AES aren't susceptable to known plaintext attacks, perhaps you could explain why the Wikipedia article is wrong  ;)  There are certainly many alternatives to hushmail, it's simply the best known  8)
Chemistry is our Covalent Bond

akcom

  • Dominant Queen
  • ****
  • Posts: 430
Re: Internet Security & Exploits.
« Reply #36 on: April 29, 2011, 04:51:07 AM »
Because we're not talking about AES, we're talking about a PKI built on either RSA, DSA, or ECC (in some extreme cases).

Regardless of whether or not it decreases the security of the algorithm, it certainly does not increase it.

edit: hushmail is the best known and most heavily watched.  steroid bust anyone?

lugh

  • Global Moderator
  • Foundress Queen
  • *****
  • Posts: 876
Re: Internet Security & Exploits.
« Reply #37 on: April 29, 2011, 02:01:33 PM »
Quote
hushmail is the best known and most heavily watched.  steroid bust anyone?

Those fools were selling their products using publicly advertised hushmail accounts as some other braniacs are doing with research chemicals  ::) There seems to be some confusion about what modern encryption is capable of :

h**ps://secure.wikimedia.org/wikipedia/en/wiki/Public-key_cryptography

practical attacks usually involved the private key  8)
Chemistry is our Covalent Bond

akcom

  • Dominant Queen
  • ****
  • Posts: 430
Re: Internet Security & Exploits.
« Reply #38 on: April 29, 2011, 02:13:39 PM »
Yes, and hushmail will gladly hand over your private key to the authorities.

lugh

  • Global Moderator
  • Foundress Queen
  • *****
  • Posts: 876
Re: Internet Security & Exploits.
« Reply #39 on: April 29, 2011, 05:26:04 PM »
Quote
Yes, and hushmail will gladly hand over your private key to the authorities.

That's why one uses plain text encryption if one wants to securely communicate using hushmail  8)
Chemistry is our Covalent Bond