It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Originally posted by MindBodySpiritComplex
This seems to be only the third time they are (publicly) releasing insurance files:
On 29 July 2010 WikiLeaks added a 1.4 GB "Insurance file" to the Afghan War Diary page.
On 22 February 2012, there was another insurance file release, this time 65 GB in size
On 17 August 2013, WikiLeaks released another three insurance files, this time 3.6 GB, 49 GB and 349 GB in size.[96] Like previous insurance files, the contents of these three insurance files are still unknown.
link
Originally posted by pistolerooo
reply to post by Maxatoria
If you think that breaking a "Key" is such a big deal, I point you to these respectable "Main Frames"
Tianhe-I - Jaguar - Nebulae - Tsubame 2.0 - Cielo
Any of these could shred the encription and WHO do you think has access to this type of computing power........The CIA, Military, and of course The NSA!!!
(Tianhe-I is Chinese but, for the sake of "National Security" it would be made available)
edit on 18-8-2013 by pistolerooo because: A sentence missing when I posted
If you think that breaking a "Key" is such a big deal, I point you to these respectable "Main Frames"
Tianhe-I - Jaguar - Nebulae - Tsubame 2.0 - Cielo
Originally posted by BayesLike
reply to post by ForteanOrg
Yeah, even layered encryption should be fully recoverable unless the original encryption was lossy -- then you have to find the missing pieces. Layering means nothing and adds no difficulty to recovery, but does add difficulty to decryption.
Originally posted by DJM8507
The debate is not if they can or can't decrypt it (They easily can).
Originally posted by ForteanOrg
Originally posted by BayesLike
reply to post by ForteanOrg
Yeah, even layered encryption should be fully recoverable unless the original encryption was lossy -- then you have to find the missing pieces. Layering means nothing and adds no difficulty to recovery, but does add difficulty to decryption.
Now then, say I hand you a stream of bits that do not have any discernible meaning and tell you they are the result of applying one or more encryption algorithms and one or more keys - would you not agree that you would not be able to detect what algorithm / which algorithms were used (on which part of the message) for the encryption, and of course not which key(s)?
Originally posted by BayesLike
Ah, but you keep missing the point.
I only want to recover the encrypted information, not crack the key. Trying to crack the code by determining the key is a) stupid and b) completely unnecessary.
What you think you know is mostly very clever misdirection, 1944 linear thinking, totally within the box you have been told to look within. You need to get out more -- outside that tiny box that is.
Originally posted by ForteanOrg
Originally posted by DJM8507
The debate is not if they can or can't decrypt it (They easily can).
They wished they could - but they can't. Your 'backdoor' statement is ridiculous: the algorithms are public and under very much scrutiny by the entire community that has any proper knowledge of encryption and related mathematics. Though the community is not THAT big, it is totally impossible that the NSA has bought all of them - including Chinese, Russian and North-Korean scientists. Also, the simple one time pad proves that there ARE algorithms that can be used to encrypt a message without any chance to recover it with certainty unless you have the key. I am aware of the subsequent key management problems if we would be using one-time pads, but please refrain from absurd statements that it is easy for secret services (or whomever) with plenty of computing power to decrypt any message. It's utter nonsense.
edit on 19-8-2013 by ForteanOrg because: (no reason given)
Originally posted by DJM8507
I perhaps misspoke, there is not a "BACK DOOR" but there are vulnerabilities that are unknown to the public at large and will remain such for quite some time. Once it is discovered the industry will once again shift to a "new" more "secure" system.
But as it has been said, without evidence this is all hearsay, and evidence cannot be provided without risk of personal, and national harm.