home bbs files messages ]

Just a sample of the Echomail archive

<< oldest | < older | list | newer > | newest >> ]

 Message 798 
 August Abolins to Wilfred van Velzen 
 Cops hate encryption but the NSA loves i 
 04 Jun 23 11:08:00 
 
MSGID: 2:221/1.58@fidonet 091d60af
REPLY: 2:280/464 647c6538
PID: OpenXP/5.0.57 (Win32)
CHRS: ASCII 1
TZUTC: -0400
 AA>> Hmmm..  Too bad networked (via FTN) BBSes don't stress that
 AA>> opaqueness as pretty-good-isolation from internet collection
 AA>> then.

 WvV> Probably everything is collected. And btw binkd doesn't use a very good
 WvV> encryption algorithm. So if they wanted/needed to break it, they
 WvV> probably could.

I thought binkd's encryption only extended to the  
authentication part.  If the whole transfer, ie. the PKTs are  
encrypted, that's interesting.

According to this, http://mimac.bizzi.org/ 
fidonet_programmi_binkd.html

"traffic encryption" was added.


 WvV> So the hiding gpg traffic only works as long as we
 WvV> remain small and under the radar...

Oh.. so you mean to include gpg'd netmail messages in the  
transfer?


 AA>> Well.. I thought that if it becomes known that BBSes are
 AA>> the transport mechanism for secret/suspect messages, then
 AA>> the spys could investigate the BBS and owners and choose
 AA>> to knock on their doors some day?

 WvV> Of course, but that is true for any kind of
 WvV> communication... The point is not to become suspect! ;-)

Yes n No. I suppose that "authorities" could demand unlocking  
encrypted messages on "grounds" for suspicion.  That happend at  
Prontomail not long ago.  What those "grounds" could be could  
be debatable and suspect itself.  :D

I recall a movement that suggested that people simply FLOOD the  
channels with messages that bore "suspect" text in the Subject  
lines: super secret, terrorism, murder.. etc.  The idea being  
that then they will have too much data to analyse.

Similarly, random suspect words could be also be thrown in as  
part of the message body at random times.

I dunno.. at this point I think the NSA wants people to think  
that they have the ability analyse all the traffic out there -  
and the media is more than willing to communicate that on their  
behalf - but I think the reality is that analysing it ALL  
within a reasonable time frame is not happening.

-- 
  ../|ug

--- OpenXP 5.0.57
 * Origin: What do you call an excavated pyramid? Unencrypted. (2:221/1.58)
SEEN-BY: 1/19 123 15/0 16/0 19/10 37 90/1 105/81 106/201 123/130 131
SEEN-BY: 142/104 153/7715 203/0 218/700 221/1 6 360 226/30 227/114
SEEN-BY: 229/110 112 113 206 307 317 400 426 428 470 664 700 240/5832
SEEN-BY: 266/512 280/464 5003 282/1038 291/111 292/854 301/1 317/3
SEEN-BY: 320/119 219 319 2119 322/0 757 326/101 342/200 396/45 423/81
SEEN-BY: 460/58 712/848
PATH: 221/1 320/219 229/426


<< oldest | < older | list | newer > | newest >> ]

(c) 1994,  bbs@darkrealms.ca