WWYD if we found out tomorrow that FBI/USLE had a backdoor to PGP.

Is there a back up plan(one that doesn't involve a sled)??

Would all flights to Belieze be booked within hours?

Would this community set the record for number of house fires in one day?

Would LEA's even bother with most of us?

I mean, knock on wood but Theyre breathing down Apple's neck right now in the name of terrorism. So what would stop them when it comes to scumbag cyber druggies like ourselves?

Something ive been pondering as my weed&suboxone high is wearing off and I double check the amount of tinfoil I have left.Debating wheather or not to trip later Not sure id be I the right mindset after this paranoia


Comments


[4 Points] usethefrontdoorplz:

shit my pants and go cry in my closet until the Fuck Boy Investigators come-a knockin fer muh drugz and buttcoinz


[2 Points] None:

FBI screw up on the APPLE front......

http://thehackernews.com/2016/02/iphone-apple-id-passcode-reset.html


[2 Points] Ethereality_DNM:

Depending on your implementation, it may already have a backdoor. If you run the 'commercial' PGP client from Symantec then you may be in jeopardy. Rumor has it that they have some goodies hidden in there such as a weak random number generator (see: Dual_EC_DRBG as an example) although the source is available for download so like I say, it's a rumor.

Encryption algorithms like PGP are based on prime numbers (math). If the implementation is mathematically sound then theoretically it should take longer than the age of the universe to decrypt a message. However, the advance of quantum computing is something to worry about. I haven't researched it lately, but it's been thought that quantum computers may provide breakthroughs in cracking encryption.

However, unless you're selling government secrets or running for grand lizardmaster of the Illuminati, you probably aren't much of a target. If you're doing something important enough to attract attention from a nation-state then encryption is going to be the least of your worries.


[2 Points] xcoderbot1:

i'll go with d:

Would LEA's even bother with most of us?

No.


[1 Points] awayweegoagain:

Get as high as I can before I fall back down


[1 Points] RileyFreemanDNM:

Correct me if I'm wrong but reguarding the FBI and Apple, I think what they want is to be able to stop the feature that slows down brute force attacks and also the feature that erases all the phones data after 10 failed attempts. I don't believe they are close to breaking AES encryption or pgp which have been around for a long time and proven secure.


[1 Points] None:

Keep on ordering because the FBI doesn't care about people ordering a half sheet of acid, a gram of mdma, or 100 bars at a time.


[1 Points] beatthemarket:

that's not how pgp works

and they can technically decode every message if they use their super computers or just have enough time so don't be a big fish


[1 Points] guywithlabandnomoney:

Scary thought. What's the climate like in Belize?


[1 Points] blackhand25:

You mean like if the NSA were paying proprietary security companies to weaken their encryption security to make it more easily exploitable? Because they do and are working on making their reach further. It's not quite as bad as them being able to instantly back door and get in, but they've definitely weakened the door hinges on any non-opensource encryption method and network communication means. That was above and beyond the most horrifying of the Snowden leaks because it perfectly exemplifies what little knowledge those calling the shots actually have on this topic.