It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
originally posted by: Morrad
a reply to: MuonToGluon
Thanks for the info. To be honest I have never looked at the file batches on WikiLeaks. I wait to read them on here.
My experience lies more in server-side encryption and file encryption. My understanding of PGP (from knowledge acquired approx 5 years ago) is that a pair of keys is generated by the user, a private key and a public key. The user (call him Fred) gives all his contacts the public key which allows them to encrypt messages and files to send to Fred who is the only one who can read these messages as he has the private key to decrypt it. For two-way encrypted communication Fred would need each contacts public key.
I recall around 2007 that Assange was criticised for trying to use PGP in a way it was not designed to be used. If I remember correctly he stopped trying to use it.
When a supposed key was published on Twitter and posted on ATS I was one of the first posters and I said it was a SHA256 hash. Can you link where the public key is please so I take a look? My server's public key is 4096 bit RSA and the characters take up nearly a third of a sheet of A4.
originally posted by: Morrad
Files sent over email encrypted with PGP cannot be decrypted with a password, you need the private key file as well as the password. Even the sender cannot decrypt a file once they have encrypted it.
The only thing I can think of is if the insurance file is a container file with the encrypted archive and also a key file enclosed (the container file may also be encrypted). You probably know that .AES256 is not a file extension. It is fairly easy to require both a password and a key file to open and encrypted file. This is just a random key, not a signing key for verification.
originally posted by: Kettu
Anyone in the USA can use "alternative" networks. They choose not to.
a reply to: Aazadan
Since encryption is your hobby
I've been under the impression that one of the standard tricks these days is to use two layers of encryption, this way even if the first layer is breached, the file still looks like it's a bunch of gibberish and it becomes very difficult to figure out what the valid decrypted file is.
In fact, with a little bit of thinking about this, as long as you never publish a valid SHA to compare against for the internal container, there's no external method of verifying the encryption.
Personally, if it were me, what I would do is when the file container is opened, I would have it send a signal to my server alerting me it was opened. This would be the ultimate security because it would inform you if a government or someone else broke in.
originally posted by: Morrad
Please correct me if I have misread this. As I understand it, If someone managed to open the encrypted container and replace the encrypted file inside, it would be easy to encrypt the container again with the same password. The problem would be with the file container, the SHA checksum would be different to the original. If the original file container checksum had previously been published it would arouse suspicion.
The problem would be with a file that is opened on a system which is not connected to the internet. Another issue is manually set or automated permissions as you need a port on the host system (where the file is opened) to communicate with the internet ie the ability to pass through a firewall undetected.
originally posted by: roadgravel
Having an encryption program notify some central point as to it's action probably isn't a good idea. It would allow a compromised central point to be used to track activity by a group that wants to know who has a opened a target file. Makes it easier to find a starting point for some release of prohibited information. It goes against the purpose for what cryptography is often used.