Just a sample of the Echomail archive
[ << oldest | < older | list | newer > | newest >> ]
|  Message 798  |
|  August Abolins to Wilfred van Velzen  |
|  Cops hate encryption but the NSA loves i  |
|  04 Jun 23 11:08:00  |
 MSGID: 2:221/1.58@fidonet 091d60af REPLY: 2:280/464 647c6538 PID: OpenXP/5.0.57 (Win32) CHRS: ASCII 1 TZUTC: -0400 AA>> Hmmm.. Too bad networked (via FTN) BBSes don't stress that AA>> opaqueness as pretty-good-isolation from internet collection AA>> then. WvV> Probably everything is collected. And btw binkd doesn't use a very good WvV> encryption algorithm. So if they wanted/needed to break it, they WvV> probably could. I thought binkd's encryption only extended to the authentication part. If the whole transfer, ie. the PKTs are encrypted, that's interesting. According to this, http://mimac.bizzi.org/ fidonet_programmi_binkd.html "traffic encryption" was added. WvV> So the hiding gpg traffic only works as long as we WvV> remain small and under the radar... Oh.. so you mean to include gpg'd netmail messages in the transfer? AA>> Well.. I thought that if it becomes known that BBSes are AA>> the transport mechanism for secret/suspect messages, then AA>> the spys could investigate the BBS and owners and choose AA>> to knock on their doors some day? WvV> Of course, but that is true for any kind of WvV> communication... The point is not to become suspect! ;-) Yes n No. I suppose that "authorities" could demand unlocking encrypted messages on "grounds" for suspicion. That happend at Prontomail not long ago. What those "grounds" could be could be debatable and suspect itself. :D I recall a movement that suggested that people simply FLOOD the channels with messages that bore "suspect" text in the Subject lines: super secret, terrorism, murder.. etc. The idea being that then they will have too much data to analyse. Similarly, random suspect words could be also be thrown in as part of the message body at random times. I dunno.. at this point I think the NSA wants people to think that they have the ability analyse all the traffic out there - and the media is more than willing to communicate that on their behalf - but I think the reality is that analysing it ALL within a reasonable time frame is not happening. -- ../|ug --- OpenXP 5.0.57 * Origin: What do you call an excavated pyramid? Unencrypted. (2:221/1.58) SEEN-BY: 1/19 123 15/0 16/0 19/10 37 90/1 105/81 106/201 123/130 131 SEEN-BY: 142/104 153/7715 203/0 218/700 221/1 6 360 226/30 227/114 SEEN-BY: 229/110 112 113 206 307 317 400 426 428 470 664 700 240/5832 SEEN-BY: 266/512 280/464 5003 282/1038 291/111 292/854 301/1 317/3 SEEN-BY: 320/119 219 319 2119 322/0 757 326/101 342/200 396/45 423/81 SEEN-BY: 460/58 712/848 PATH: 221/1 320/219 229/426 |
[ << oldest | < older | list | newer > | newest >> ]