Results 46 to 51 of 51
-
30th July 2013, 05:19 PM #46
Hi Scott,
If I see you at the club tonight I promise not to mention
"Telstra" ... I want to get home before midnight.
AllanLife is short ... smile while you still have teeth.
-
30th July 2013, 06:01 PM #47Banned
- Join Date
- Jul 2013
- Location
- Perth
- Posts
- 16
Micro dot
Micro dot is old technology but still used in encryption...
The latest is what the Russians used until recently when that was discovered too (Google 12 Russian spy's expelled from US).
The old school spy communications were done by a one time pad decryption key.
You encrypt with a one time pad key and the receiver uses a duplicate of the one time pad key to de crypt upon receiving the encrypted message.
Each destroys the key used after 1 use.
Because the encryption / decryption key is never the same twice and never sent with the message, it requires a lot of effort to decrypt the individual message without a decryption key and even if you do manage it you have to do it all over again for the 2nd message etc.
The latest method involved using altered and unaltered digital images and the internet.
Typically an innocent enough email sent with a picture attached, and the same image posted to say a internet forum.
The first or 2nd image have the pixellation data altered slightly, such that at magnification normally used to render on a computer screen, the photo look identical to the human eye, BUT when the pixellation codes of the two photos are matched to each other, one is the one time pad decryption key and the other is the encrypted message!
Only a handler with both photos could determine the hidden message encrypted within the altered pix-elation data files by looking for the alterations.
Another common way of avoiding transmitting (downloading) clandestine comunications over the internet is the drafts email folder to an online account.
Both spys have the password code to an account.
The sender composes a draft email and saves it but never sends it! The Handler then opens that account using the same login & password and reads the draft email - it's never been "sent" online or downloaded at the other end in order to be captured by echelon, but has been read online by both parties!.
etc...
The degree of trickiness of people never ceases to amaze!.
As said, microdots is old analogue technology - the new digital crap is much trickier...
But ssshhh - it's all a big secret - don't tell anyone I told you, OK?
Your not s'posed to know that you can be traced via your cell phone when its turned off and the sim cards taken out or changed, by an IEMI trace pinged from cell towers by Telstra on behalf of big brother. Long as they know the chassis number of your phone (from your telstra contract when you bought the phone) they (Telstra) can send enough energy to the hard wired circuitry in the phone, to make it ping back to a tower, such that triangulation will give a pretty good idea where your handset is.
They don't usually do imei traces without a warrant, for say homicide cases etc, BUT the fact is they CAN (and do) do it!
Reason they don't tell everyone of the capability is - can you imagine the number of requests from peeps, (kids) who's mobile phone was lost / stolen, every day? (Please Mr Telstra man can you find my phone for me I was so drugged off my face at a party on eccys I didn't remember where I left my phone to be stolen and now someones got it etc etc) They would spend all day every day sending pings from towers all over the country trying to find lost & stolen phones.
BUT - if your trying to evade the authorities - then leave your phone at home - because turning it off or even removing the sim card won't necessarily save you.
Not that I ever hide from Authorities or send encrypted spy messages....
Cheers!
-
30th July 2013, 06:42 PM #48
Timless Timber, your last couple of posts have been an interesting blend of old technology and its supposed application to new technology. while some of your propositions are interesting they are generally too far from reality to even make it into the next Bond movie.
I am surprised you did not suggest a "foilie" for your phone when you turn it off and remove your sim card so that Telstra cant find it.
Cheers
DougI got sick of sitting around doing nothing - so I took up meditation.
-
30th July 2013, 06:44 PM #49Retired
- Join Date
- May 2012
- Location
- Canberra
- Posts
- 122
Some pretty interesting opinions being written here, but I'm afraid to say most of them are tin foil hat stuff.
Modern encryption is as good as uncrackable. A man-in-the-middle attack is feasible, such as for SSL/HTTPS web traffic, but you need to have a plug directly between the two points, need to intercept the certificates and handshakes transparently and then record everything real time. This happens right now in modern large workplaces and government departments. They will say the don't, but that's untrue. This is hardly news though.
BUT, if you encrypt a message, attach it to an email, or start a SSH tunnel to your friend, there is no way "they" can crack this. Rather a 75 watt soldering iron applied to your head while strapped into a chair will reveal the answers in a few minutes, to do it computationally is infeasibile. It can be *done* but the time/effort ratio is astronomical. The soldering iron is faster...or a bug/camera in your home over your computer.
If you are concerned by your phone, wrap it in a metallicised chip packet. Instant Faraday cage.
Not to say governments and big businesses isn't up to some seriously nefarious ####. I've worked in the DSD, Acxiom and Nielsen and have implemented some seriously big brother collection mechanisms. Believe me, however, to collect is one thing - to gain useful, usable and timely information for anything other than to work out "your daughter is pregnant" or you are "a woodworker" is exceedingly hard.
Profiling and building a reliable one is insanely hard even if they had a target.
The easiest thing to do is spike the data with torrents of erroneous data. Mix it up, become both a man/woman, who is 24/38/69, who lives in several cities including two in your own area right now. They won't work it out.
The truth is, the government is so drastically incompetent, so hopelessly outmatched and so utterly bereft of ideas and capacity, that the TRUE horror is how terrifyingly inept they are at anything - let alone being evil.
Remember Hanlon - "Never attribute to malice that which is adequately explained by stupidity."
If in doubt, read this and ask the obvious questions : Autistic taxman jailed for fraud
-
30th July 2013, 08:14 PM #50Banned
- Join Date
- Jul 2013
- Location
- Perth
- Posts
- 16
Uh huh!
The easiest thing to do is spike the data with torrents of erroneous data. Mix it up, become both a man/woman, who is 24/38/69, who lives in several cities including two in your own area right now. They won't work it out.
I - I
A - A
N - M
M - N
O - O
O - O
N - N
E - E
-
30th July 2013, 08:27 PM #51
Similar Threads
-
Telstra Take Over
By echnidna in forum JOKESReplies: 7Last Post: 28th August 2007, 01:50 PM
Bookmarks