PDA

View Full Version : Want to encrypt your way past the NSA? Good luck with that




tangent4ronpaul
07-15-2013, 04:44 AM
This guy reminds me of that old joke: Hello? Tech support? Umm, yeah - the coffee cup holder on my PC broke...

http://www.digitaltrends.com/opinion/want-to-encrypt-your-way-past-the-nsa-good-luck/
(there are a number of links in the article, so you might want to click through)

I’m smart, right? I’m technology-savvy. Hell, you might even call me an expert on some of this crap. But none of those descriptors seemed to matter when I dipped my toes into the murky pool of encryption – the one and only technology that promises to keep out the NSA – or at least slow it down – besides, apparently, typewriters.

While many of you may claim to have nothing to hide, I actually did – well, I thought I did anyway. I am currently working on a story that involves passing along some potentially sensitive information with some pathologically privacy-minded individuals. Through the course of my reporting, one of my contacts requested that we communicate via encrypted email, using an encryption standard known as PGP, or Pretty Good Privacy. Great, I said. Let me just figure that out real quick and I’ll get right back to you.

Wrong! Turns out, using PGP is more complicated than building a national park on the Moon.

The original PGP encryption software is now owned by Symantec, which has the audacity to charge money for its product. Lucky for me, a number of open-source options are available. Do a few Google searches, and you’ll find yourself at the home of Gnu Privacy Guard (GPG), which has released versions of OpenPGP software for both Microsoft Windows and Apple OS X machines.

As a Mac user, I opted for GPGTools. The download is straightforward. The creators were even kind enough to provide a handy tutorial for how to get started – one of the few PGP tutorials not written exclusively for computer geniuses with Asperger’s.

PGP basically works like this: A piece of software (in my case, GPGTools) generates two PGP encryption keys. One of these keys you keep private. The other, your “public key,” you share with whomever you want to send secret messages.

This sharing of keys is where things start to get overly complicated. Most people who use PGP upload their public key to a key exchange, which makes your key searchable (as long as the person doing the searching knows what you’ve named yourself on the the key exchange). Or you can share you public key some other secure way – snail mail, maybe? Carrier pigeon? Long-range ballistic missile? Maybe you could just meet up in the basement of some parking garage, Deep-Throat style. The possibilities here are virtually endless – and they all kind of suck.

To send your friend an encrypted email, you use his public key to encrypt the message. He then decrypts the message with his private key. For him to send you an encrypted message, he uses your public key to encrypt, and you decrypt with your private key. Are you still with me?

Well, it doesn’t matter because that’s about as far as I got. GPGTools seems to act as a kind of plugin for Apple’s Mail app. Which, from what I could decipher, enables a couple of buttons in Mail to now do, um, something that they didn’t before. But I still have yet to figure out how to successfully encrypt or decrypt an email using the software.

Now, there are some more user-friendly options out there. The Mailvelope plugin, for example, is actually a bit easier to use than GPGTools, but still comes with all the other complications inherent with PGP. Another option, SecureGmail, is a simple-as-pie browser plugin for Chrome or iOS. But it uses something called symmetric encryption (as opposed to PGP, which is a form of asymmetric encryption), and relies on you to come up with a quality password to protect your emails – something we all know ain’t gonna cut it – and then to share that password with your contacts in a way that makes the whole exercise futile.

None of my bickering is meant to dog on the clearly brilliant minds working to build these encryption tools. Cryptography is necessarily complex – if it weren’t, it wouldn’t be secure. But using it needn’t give you an aneurism. Fortunately for the rest of us, there are people currently working very hard to solve the usability problem, including the teams behind the plugins listed above, The Pirate Bay guys behind the new Heml.is app, and many others.

Until these developers get it right, most people just won’t go through the trouble of figuring this stuff out – especially since encrypting your communications can reportedly make you more of a target for the NSA. That’s not to say doing so is an impossible riddle or not worth the effort – strong encryption really is the best option we have. But the barrier to entry here is some “Game of Thrones”-level nonsense.

At the end of the day, my contact and I just decided to talk on the phone – what he had to tell me was far less sensitive than he first made it out to be. So, theoretically, anyone could have listened. I can only hope that I have this PGP thing figured out by the time I actually have something to hide.

-t

WM_in_MO
07-15-2013, 05:47 AM
S.S.E is an android app that will keep your passwords, can encrypt files and encrypt text.

Warrior_of_Freedom
07-15-2013, 06:12 AM
just make your own language

V4Vendetta
07-15-2013, 07:48 AM
Everyone and their dog should use this plugin https://www.eff.org/https-everywhere
It allows encryption of at least some of the websites you visit.
And Josh... here at www.ronpaulforums.com should contact EFF and tell them he wants to make this forum compatible with their HTTPS plugin.
Something I have begged Josh to do before, years ago, but nothing happened.

Kilrain
07-15-2013, 08:04 AM
Call me crazy or paranoid, but I would be very surprised if there is a widely available encryption tool that Government Agency XYZ cannot defeat.

jtstellar
07-15-2013, 08:34 AM
Everyone and their dog should use this plugin https://www.eff.org/https-everywhere
It allows encryption of at least some of the websites you visit.
And Josh... here at www.ronpaulforums.com should contact EFF and tell them he wants to make this forum compatible with their HTTPS plugin.
Something I have begged Josh to do before, years ago, but nothing happened.

problem is do they know it is you specifically requesting some kind of encryption? if doing it actually draws more interest to what you're doing then it defeats the purpose. if not, this would be very useful

presence
07-15-2013, 08:52 AM
Everyone and their dog should use this plugin https://www.eff.org/https-everywhere
It allows encryption of at least some of the websites you visit.
And Josh... here at www.ronpaulforums.com (http://www.ronpaulforums.com) should contact EFF and tell them he wants to make this forum compatible with their HTTPS plugin.
Something I have begged Josh to do before, years ago, but nothing happened.


I'm also fond of the plugin "Firefox Cryptocat" for brief encrypted exchange of ideas or code.

http://ts2.mm.bing.net/th?id=H.4904604579136985&pid=1.7&w=195&h=180&c=7&rs=1

WM_in_MO
07-15-2013, 12:07 PM
Here's the thing about encryption: it works. Use it.

RickyJ
07-15-2013, 12:16 PM
just make your own language

OK. ewbeagbaetfb eb edbedbb edfbedb dvbdv!

I just said, have a nice day! :D

The Northbreather
07-15-2013, 12:18 PM
Everyone and their dog should use this plugin https://www.eff.org/https-everywhere
It allows encryption of at least some of the websites you visit.
And Josh... here at www.ronpaulforums.com (http://www.ronpaulforums.com) should contact EFF and tell them he wants to make this forum compatible with their HTTPS plugin.
Something I have begged Josh to do before, years ago, but nothing happened.

I believe Josh retired.

He's just another one of us crazy members now I think ? :o

EBounding
07-15-2013, 12:32 PM
Everyone and their dog should use this plugin https://www.eff.org/https-everywhere
It allows encryption of at least some of the websites you visit.

I use it, but I don't think it's helpful for this NSA stuff. I'm no expert, but it seems like that encryption is useless if the NSA has a secret PRISM backdoor into your gmail and google searches. It'll keep wi-fi sniffers out though.

DamianTV
07-15-2013, 12:49 PM
Then use a VPN that encrypts all your traffic. Not only does it block websites from viewing your IP, it stops your ISP from operating the Man in the Middle attack. Next problem is DNS. You can fully encrypt all your HTTP / S traffic, but usually DNS requests are wide open. VPN solves that problem also. And for fucks sake, learn how to block both Cookies and Flash Cookies. Its not that hard. This also includes staying logged into Facebook / Google 24 / 7 (any cookies), and browsing through the VPN because the cookies still uniquely identify you.

Right and Wrong are Subjective Terms. Our definition of what is Right and what is Wrong is exactly what every single one of us have to hide.

ctiger2
07-15-2013, 12:57 PM
http://libertyblitzkrieg.com/2013/07/15/prism-proof-storage-device-plug-raises-over-350000-on-kickstarter-in-five-days/

WM_in_MO
07-15-2013, 02:12 PM
You can also use a stego software to hide messages in pictures...

http://quickcrypto.com/free-steganography-software.html

CaptUSA
07-15-2013, 02:26 PM
Here's the thing... I'm not really concerned about the NSA wiretapping me, I'm concerned about them wiretapping everybody!

Unless everybody else is encrypted in some way, this is pretty pointless. (at least from my perspective)

I worry about the next generation of politicians that have been monitored their entire lives and the NSA knows exactly which buttons to push to get them to behave accordingly.

WM_in_MO
07-15-2013, 02:31 PM
MY point is you ca nstill have secrecy if you shoose. It just takes an extra step

For instance you could use this technology to send confidential information in an email when you normally would not.

So for instance if you were applying for a mortgage they would need alot of that kind of info for a credit check.

You can either meet in person and take the time to drive and such OR you can send it all encrypted and call the person to deliver the key!

V4Vendetta
07-15-2013, 02:33 PM
I use it, but I don't think it's helpful for this NSA stuff. I'm no expert, but it seems like that encryption is useless if the NSA has a secret PRISM backdoor into your gmail and google searches. It'll keep wi-fi sniffers out though.

Https Everywhere works even with NSA spying... Because even with the Prism Program being used, all they see is encrypted traffic, they will see what website your using, but that's it. All other information will be useless encrypted information. It is also good to use even when using a VPN.... that's multiple layers of encryption. That's exactly why I urged Ronpaulforums to make this site compatible with it. If the Admins make it work with EFF's HTTPS EVERYWHERE plugin, its a optional feature that only those who have the plugin in their browser can take advantage of.
And even with a VPN, once you reach the VPN'S server, your information is unencrypted.... with "HTTPS everywhere" Your information is completely encrypted from you to the websites server you're currently visiting.

So AGAIN I ask, can the admins here PLEASE make www.ronpaulforums.com compatable with EFF's HTTPS EVERYWHERE???

Josh retired? Why?
Who is admin now? Bryan?

muh_roads
07-15-2013, 02:37 PM
We seriously need a sticky of references for people at the top. It makes me sad that people care more about that retarded zimmerman case than protecting their own conversations online. The NSA fiasco is so much more important.

WM_in_MO
07-15-2013, 02:41 PM
We seriously need a sticky of references for people at the top. It makes me sad that people care more about that retarded zimmerman case than protecting their own conversations online. The NSA fiasco is so much more important.
It makes me downright angry.

american.swan
07-15-2013, 05:00 PM
Encryption works.
Can encryption software be trusted?
It seems to me the best thing to do is use something like Thunderbird and OpenPGP. You can SEE your emails completely garbled before being sent to Google(good luck reading my emails with your advertising bot)

Creating a public private key on your own computer seems the most trusted way to go. (sharing your public key is NOT dangerous, that's why it's called "public".) My public/private keys are LONG and there's no freaking way the NSA or FBI will break them code. Well, they can.

How? Because your computer is unsafe. They can hack into your webcam or any number of key loggers and whatnot. Good luck booting my computer. The whole system is encrypted.

'Anonymous'*uses Windows OS running a virtual machine running Ubuntu through TOR. Yeah, and some still get caught.

Maybe the solution is sending code in plain sight. It looks like a normal picture, but inside is the hidden message. You can store very small messages inside images and not a sole would know. Look into it.

Also, creating your own code. "Mom just left to go to the store" could mean the "police are on the move".

Good luck.

CPUd
07-15-2013, 05:43 PM
Encryption works.
Can encryption software be trusted?
It seems to me the best thing to do is use something like Thunderbird and OpenPGP. You can SEE your emails completely garbled before being sent to Google(good luck reading my emails with your advertising bot)

Creating a public private key on your own computer seems the most trusted way to go. (sharing your public key is NOT dangerous, that's why it's called "public".) My public/private keys are LONG and there's no freaking way the NSA or FBI will break them code. Well, they can.

How? Because your computer is unsafe. They can hack into your webcam or any number of key loggers and whatnot. Good luck booting my computer. The whole system is encrypted.

'Anonymous'*uses Windows OS running a virtual machine running Ubuntu through TOR. Yeah, and some still get caught.

Maybe the solution is sending code in plain sight. It looks like a normal picture, but inside is the hidden message. You can store very small messages inside images and not a sole would know. Look into it.

Also, creating your own code. "Mom just left to go to the store" could mean the "police are on the move".

Good luck.

I know of 2 companies- SpiderOak(online storage) and LastPass(user/pass storage) that store only the encrypted data. The fancy name for it is 'zero-knowledge privacy'. This means everything is encrypted on the client side before transmitting. This also means if you lose your key, your data is gone, because they don't store clients' keys.

FindLiberty
07-15-2013, 06:01 PM
Use a SLOW blinking IR LED (without any current limiting resistor) to send out text messages using this WW2 encryption code (in SMOKE SIGNAL mode): http://www.navajocodetalkers.org/