It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
False. I've never seen any evidence suggesting US police have any master encryption keys. However, the Canadian government is known to have a master key for Blackberry devices.
originally posted by: spirit_horse
all commercial encryption software made in the US has a LEAK. It is a Law Enforcement Access Key that intelligence agencies keep. If you want encryption without the LEAK you have to write it yourself or use encryption that a private concern wrote.
originally posted by: fractal5
False. I've never seen any evidence suggesting US police have any master encryption keys. However, the Canadian government is known to have a master key for Blackberry devices.
originally posted by: spirit_horse
all commercial encryption software made in the US has a LEAK. It is a Law Enforcement Access Key that intelligence agencies keep. If you want encryption without the LEAK you have to write it yourself or use encryption that a private concern wrote.
Source: www.theverge.com...
One example is the National Security Agency’s (NSA) surreptitious efforts to manipulate certain cryptographic standards, introduce backdoors in U.S. products, and hide security vulnerabilities it has discovered in commercial systems so that the government could exploit those weaknesses.5
These types of secretive actions have weakened data security for both U.S. firms and consumers and left the security products they use susceptible to attacks. The U.S. government’s surveillance efforts have also sowed the seeds of distrust around the world, damaging U.S. IT competitiveness.6
5. Larry Greenemeier, “NSA Efforts to Evade Encryption Technology Damaged U.S. Cryptography Standard;” Joseph Menn, “NSA says how often, not when, it discloses software flaws,” Reuters, March 30, 2015.
6. Daniel Castro and Alan McQuinn, “Beyond the USA Freedom Act: How U.S. Surveillance Still Subverts U.S. Competitiveness,” Information Technology and Innovation Foundation, June 2015.
Congress should bar the NSA from intentionally weakening encryption standards and strengthen transparency in those processes.
Congress should pass legislation banning all government efforts to install encryption backdoors or require companies to alter the design of the systems they sell to allow government access, preempting states’ actions on these issues.
I posted this 9 days ago and asked Wikileaks for help to explain why I found this by accident because it was indexed .oros but the actual email should Soros. They said they would check into it but I never heard back. So if someone was looking for Soros it would not pull up. This was from Hillary's state dept emails. May be totally unrelated to indexing issue but wanted to bring it up
originally posted by: gottaknow
Trying to investigate this fresh avenue of terrifying possibilities.
There is a SS of a series of posts from someone who claims Wikileaks has been compromised. Direct link to image.
In the image he states he and 14 others at Wikileaks were raided at the same time Assange's internet was cut at the Ecuadorian embassy. He was given a security gag order and his equipment was seized involving the CIA and GHCQ. He claims there is "an incredible charade to keep up the appearance that Julian is fine."
It's quite the scary read and the author says he is in danger, under a gag order and is trying to warn others. When confronted about him not using Tor, he responds that the exit nodes are compromised there as well and owned by intelligence agencies.
Reddit has it's own thread regarding the possibility of Wikileaks being compromised and none of this looks good so far.
There is considerable reference claiming of evidence for child exploitation by the Clinton Foundation, the drug market being controlled by intelligence agencies to fund black projects and the pedophile ring surrounding
If this is true, this is a gigantically bad situation and needs more attention.
originally posted by: spirit_horse
If the intelligence agencies and US government in general wanted to bad enough they could easily get the Ecuadorian government to play ball. It is a matter of large amounts of cash and favors and they would work with the US. That is the problem faced by Asange and Wikileaks in general.
The other issue about TOR being compromised is absolutely believable. Does anyone remember when the FBI replaced DNS servers for a period of time over Russian hacking? It would not take many resources to put servers out there. If they wanted to track down server locations and anyone that physically accesses them they could do it.
However as someone mentioned above, the government created TOR. If you have read capabilities of the NSA then you should know that they had absolute control of TOR before it was ever released. The NSA and other agencies have been putting their own chips on any communications circuit boards since they started making them in the US. China has done the same with boards they manufacture. Something that people don't realize is they also operate systems on a 30 bit structure that civilian systems won't even be able to communicate on. Also, all commercial encryption software made in the US has a LEAK. It is a Law Enforcement Access Key that intelligence agencies keep. If you want encryption without the LEAK you have to write it yourself or use encryption that a private concern wrote.
It would not surprise me in the least that the intelligence agencies have been monitoring everything going on. They normally let the activity go on because moving against it would alert all of their potential targets that the system is compromised. TOR is used by field agents.
Many ask for #ProofOfLife for #Assange. Thank you--but it is not possible to give strong meaningful proof (live internet video) presently.
originally posted by: CraftBuilder
originally posted by: justneo
... but tor has been compromised for a while now.
Based on...?
originally posted by: GreenGunther
a reply to: justneo
You don't need a backdoor for tor lol.
You just need to be an entry node as well as an exit node then you can decrypt all traffic passing through your nodes - or so I have heard.
TOR has never been 'secure'' in the true sense. I've just never been able to discern why law enforcement agencies around the world don't catch more evil people using TOR, it's all there for the taking?
originally posted by: GreenGunther
a reply to: justneo
You don't need a backdoor for tor lol.
You just need to be an entry node as well as an exit node then you can decrypt all traffic passing through your nodes - or so I have heard.
TOR has never been 'secure'' in the true sense. I've just never been able to discern why law enforcement agencies around the world don't catch more evil people using TOR, it's all there for the taking?
originally posted by: GreenGunther
a reply to: everyone
Thank you for enlightening me