Page 2 of 2 FirstFirst 12
Results 16 to 20 of 20
  1. #16
    Join Date
    Aug 2008
    Location
    near Rockhampton
    Posts
    85

    Default

    Quote Originally Posted by damian View Post
    There are other simpler ways. Get a cheap jumping off account in a "friendly" country, encrypt to that and bounce off to wherever. Has the added benifit of making all your surfing untraceable, unless they crack your remote host. I suspect such services are available now,
    I have learnt that is called VPN (Virtual Private Network) and will cost you about $5 a month to set up a host in the US..

  2. #17
    Join Date
    Oct 2006
    Location
    Tallahassee FL USA
    Age
    82
    Posts
    0

    Default Sssssh!

    I lied. I do know a little about it. But not enough to address all of Skew's observations.

    Damian's suggestion works only until there are no "friendly" countries left.

    There are even simpler ways. In WW2, the US Marines employed "Code Talkers" from the Navajo tribe. No one else on Earth understood the Navajo language, and there were no written references. All very hush hush, of course, and it worked a treat. This is now public knowledge.

    Graphics, including rebuses, can also be employed. Scoundrels, and non-scoundrels, have been using a voice variation of this since the invention of eavesdropping.

    These two examples employ the concept of only the two secure parties. Google [steganography] for more.

    And I've excluded a few other tricks.

    Joe
    Of course truth is stranger than fiction.
    Fiction has to make sense. - Mark Twain

  3. #18
    Join Date
    Jul 2005
    Location
    Oberon, NSW
    Age
    64
    Posts
    0

    Default

    Sorry, Joe. Actually, looking back at my other post, I didn't make my main point clearly, although I can see hints of it there. (That's what happens when the inner geek breaks free. I do try not to feed him, though. )

    My main point was, it's not practical to have secure encryption available for "generally surfing the 'net."

    One of the rules of security is only use encryption for msgs that need it. Encrypting everythig simply gives potential crackers adequate samples and the contexts in which they're used, to make breaking the code easier.

    Another is: don't automate it! Databases, etc?

    As soon as you get encryption in place for "general everyday surfing" then both rules are broken and there's not really much point in having the system in the first place.
    I may be weird, but I'm saving up to become eccentric.

    - Andy Mc

  4. #19
    Join Date
    Oct 2006
    Location
    Tallahassee FL USA
    Age
    82
    Posts
    0

    Default

    We're in the same church, Skew. Just sittin' in different pews. Yeah, my inner demons break out once in a while, too.

    Joe
    Of course truth is stranger than fiction.
    Fiction has to make sense. - Mark Twain

  5. #20
    Join Date
    Jul 2005
    Location
    Oberon, NSW
    Age
    64
    Posts
    0

    Default



    See? You can catch Aussie fish from over that side of the pond! It may not have been what you were trawling for, but that's fishing for ya!
    I may be weird, but I'm saving up to become eccentric.

    - Andy Mc

Similar Threads

  1. A new government......How many are dumb?
    By Greg Ward in forum Woodies Quiz Forum
    Replies: 4
    Last Post: 20th January 2008, 05:26 PM
  2. Government Censorship Thread
    By Barry_White in forum FORUMS INFO, HELP, DISCUSSION & FEEDBACK
    Replies: 7
    Last Post: 2nd January 2008, 11:11 AM
  3. Government supporting our troops
    By Bob38S in forum NOTHING AT ALL TO DO WITH RENOVATION
    Replies: 23
    Last Post: 12th June 2006, 09:09 PM
  4. Government work
    By Baz in forum JOKES
    Replies: 2
    Last Post: 6th February 2006, 11:31 AM

Tags for this Thread

Bookmarks

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •