Forum Discussion
Gdetrailer
May 22, 2014Explorer III
JoeTampa writes “NOT true. I have been working in the encryption field for 15 years and I can assure you that there are encryption algorithms that have no back doors, and crypto systems that do not as well. Many are open-source and peer reviewed; backdoors would be found.
There are crypto systems that have been alleged to have been intentionally weakened at the behest of the NSA, but there are others where no such tampering would be detected quickly. TrueCrypt is one of them.”
The Germans in WW2 “thought” their “Enigma” machine was uncrackable, it WAS cracked. The fact it was cracked was kept secret from the Germans which allowed the Allied Forces to gain important information which considerably shortened the war.
ENIGMA MACHINE
HOW ENIGMA WORKS
Take your “pick” on the Target data breach..
TARGET DATA BREACH SEARCH
TARGET DATA BREACH FAQs
"What impact did the breach have on PIN numbers?
On Dec. 27, 2013, we were able to confirm, through additional forensic work, that strongly encrypted PIN data was removed. We remain confident that PIN numbers are safe and secure. The PIN information was fully encrypted at the keypad, remained encrypted within our system, and remained encrypted when it was removed from our systems.
Why does Target think PIN data can’t be compromised?
Due to how the encryption process works, Target does not have access to nor does it store the encryption key within our system. The PIN information is encrypted within Target’s systems and can only be decrypted when it is received by our external, independent payment processor. What this means is that the “key” necessary to decrypt that data has never existed within Target’s system and could not have been taken during this incident."
Even though Target may not have the “keys” the EXTERNAL PAYMENT “PROCESSOR” DOES..
MORE BREACHES
ADP was “hacked” back in 2011..
HERE
Most recently big news..
CYBER ESPIONAGE
Westinghouse Electric had 700,000+ documents along with an unknown amount of internal company communications stolen.. Keeping in mind that many of those documents possibly contained designs and trade secrets for nearly half the nuclear power plant reactors.. :E
Ebay?
YEP, EBAY
How about 150 MILLION passwords hacked at Adobe?
ADODE HACKED
How about the top ten hacked sites in 2012?
TOP TEN BIG COMPANIES HACKED IN 2012
INCLUDING DROPBOX!
2013, MICROSOFT was hacked..
MS HACKED
Many companies may have been hacked and NEVER REPORTED IT
HACKING DISCLOSURES
For each hacked or compromised system that has been PUBLICALLY REPORTED there is most likely tens of thousands which have been hacked and never found out and or never reported..
It goes a lot like this..
What is built, can be disassembled.
Example..a house can be assembled and it can be disassembled.
A electronic circuit can be assembled and is can be disassembled (I have personally “disassembled” electronic circuits in order to repair them without the aid of actual schematic drawings, was it easy? No, but it is often done since many companies do not release that info).
Computer code can be assembled and it CAN be disassembled (reverse engineering)
First rule of computers, they are only as smart as the person who programmed it..
Computers do not and cannot TRULY generate “random numbers”, what computers generate is call Pseudo numbers. Meaning there IS a possibility at any given time a number string “generated” is duplicated this creates a potential FLAW.
To get around this FLAW issue complicated “algorithms” (mathematical equations) are created which are used to generate security “keys”. The problem with that is ANY mathematical equation CAN BE SOLVED provided one has a few “pieces” of the equation and some time on their hands.. The flip side is those who created the “algorithms” also hold the KNOWLEDGE on how to get around the encryption..
There is ALWAYS FLAWS in computer code and therefore will always be a potential for someone to reverse engineer the code and be able to extract enough info to crack the encryption.
Keep in mind that all of the companies above are PRIVATE NETWORKS with firewalls, antivirus protection..
If a company which is protecting trade secrets CAN’T prevent data breaches just how much safer do you REALLY think a PUBLIC Internet storage site is?
Folks today have gotten so used to the idea that everything is “secure”, they think nothing of posting everything and anything out on the Internet without ever realizing that once it goes outside of your PC it no longer is “private” and there is no security which is 100% fool proof when that happens.
For those who think offsite PUBLIC storage even encrypted via third party software is needed, think again.
Even with "encryption" you DO NOT KNOW where your data is stored, nor do you know WHO has your data. It could be in the USA but it could be in ANY COUNTRY..
For protection against fire you can get fire rated small safes, place a portable HD in that safe..
Surely you have a relative who doesn’t full time camp, even that is a good place to keep off site valuables..
Heck most folks SHOULD have some sort of fire resistant safe that they place important documents in like birth, wedding, titles, insurance papers, property deeds and so on in..
Now days they DO have fire rated safes which are also rated for protecting optical media and even hard drives in case of fire.
If you really, really believe that any encryption is 100% crack proof.. There ARE folks who can make you a great deal on some ocean front property in Arizona or if you would rather a large bridge in NY I am sure they will happen to have one of those..
There are crypto systems that have been alleged to have been intentionally weakened at the behest of the NSA, but there are others where no such tampering would be detected quickly. TrueCrypt is one of them.”
The Germans in WW2 “thought” their “Enigma” machine was uncrackable, it WAS cracked. The fact it was cracked was kept secret from the Germans which allowed the Allied Forces to gain important information which considerably shortened the war.
ENIGMA MACHINE
HOW ENIGMA WORKS
Take your “pick” on the Target data breach..
TARGET DATA BREACH SEARCH
TARGET DATA BREACH FAQs
"What impact did the breach have on PIN numbers?
On Dec. 27, 2013, we were able to confirm, through additional forensic work, that strongly encrypted PIN data was removed. We remain confident that PIN numbers are safe and secure. The PIN information was fully encrypted at the keypad, remained encrypted within our system, and remained encrypted when it was removed from our systems.
Why does Target think PIN data can’t be compromised?
Due to how the encryption process works, Target does not have access to nor does it store the encryption key within our system. The PIN information is encrypted within Target’s systems and can only be decrypted when it is received by our external, independent payment processor. What this means is that the “key” necessary to decrypt that data has never existed within Target’s system and could not have been taken during this incident."
Even though Target may not have the “keys” the EXTERNAL PAYMENT “PROCESSOR” DOES..
MORE BREACHES
ADP was “hacked” back in 2011..
HERE
Most recently big news..
CYBER ESPIONAGE
Westinghouse Electric had 700,000+ documents along with an unknown amount of internal company communications stolen.. Keeping in mind that many of those documents possibly contained designs and trade secrets for nearly half the nuclear power plant reactors.. :E
Ebay?
YEP, EBAY
How about 150 MILLION passwords hacked at Adobe?
ADODE HACKED
How about the top ten hacked sites in 2012?
TOP TEN BIG COMPANIES HACKED IN 2012
INCLUDING DROPBOX!
2013, MICROSOFT was hacked..
MS HACKED
Many companies may have been hacked and NEVER REPORTED IT
HACKING DISCLOSURES
For each hacked or compromised system that has been PUBLICALLY REPORTED there is most likely tens of thousands which have been hacked and never found out and or never reported..
It goes a lot like this..
What is built, can be disassembled.
Example..a house can be assembled and it can be disassembled.
A electronic circuit can be assembled and is can be disassembled (I have personally “disassembled” electronic circuits in order to repair them without the aid of actual schematic drawings, was it easy? No, but it is often done since many companies do not release that info).
Computer code can be assembled and it CAN be disassembled (reverse engineering)
First rule of computers, they are only as smart as the person who programmed it..
Computers do not and cannot TRULY generate “random numbers”, what computers generate is call Pseudo numbers. Meaning there IS a possibility at any given time a number string “generated” is duplicated this creates a potential FLAW.
To get around this FLAW issue complicated “algorithms” (mathematical equations) are created which are used to generate security “keys”. The problem with that is ANY mathematical equation CAN BE SOLVED provided one has a few “pieces” of the equation and some time on their hands.. The flip side is those who created the “algorithms” also hold the KNOWLEDGE on how to get around the encryption..
There is ALWAYS FLAWS in computer code and therefore will always be a potential for someone to reverse engineer the code and be able to extract enough info to crack the encryption.
Keep in mind that all of the companies above are PRIVATE NETWORKS with firewalls, antivirus protection..
If a company which is protecting trade secrets CAN’T prevent data breaches just how much safer do you REALLY think a PUBLIC Internet storage site is?
Folks today have gotten so used to the idea that everything is “secure”, they think nothing of posting everything and anything out on the Internet without ever realizing that once it goes outside of your PC it no longer is “private” and there is no security which is 100% fool proof when that happens.
For those who think offsite PUBLIC storage even encrypted via third party software is needed, think again.
Even with "encryption" you DO NOT KNOW where your data is stored, nor do you know WHO has your data. It could be in the USA but it could be in ANY COUNTRY..
For protection against fire you can get fire rated small safes, place a portable HD in that safe..
Surely you have a relative who doesn’t full time camp, even that is a good place to keep off site valuables..
Heck most folks SHOULD have some sort of fire resistant safe that they place important documents in like birth, wedding, titles, insurance papers, property deeds and so on in..
Now days they DO have fire rated safes which are also rated for protecting optical media and even hard drives in case of fire.
If you really, really believe that any encryption is 100% crack proof.. There ARE folks who can make you a great deal on some ocean front property in Arizona or if you would rather a large bridge in NY I am sure they will happen to have one of those..
About RV Must Haves
Have a product you cannot live without? Share it with the community!8,793 PostsLatest Activity: Aug 22, 2023