Post by halibutholysoap on Aug 15, 2013 14:20:08 GMT -5
“To steal from a brother or sister is evil. To not steal from the institutions that are the pillars of the Pig Empire is equally immoral.”
― GSW
“The robb'd that smiles, steals something from the thief; He robs himself that spends a bootless grief.”
-- Giant Sand Worm
“Stealing, of course, is a crime, and a very impolite thing to do. But like most impolite things, it is excusable under certain circumstances. Stealing is not excusable if, for instance, you are in a museum and you decide that a certain painting would look better in your house, and you simply grab the painting and take it there. But if you were very, very hungry, and you had no way of obtaining money, it would be excusable to grab the painting, take it to your house, and eat it.”
--GLW
Security, Cryptography////:==
me: I know you're studying cypotography...and I like it, actually because it created freenetproject.org, but I wish that banks and powerful people didn't have access to it because they want to use it to reduce everyone elses' privacy and make people use their security, so they are secure and no one else is.
me: I think it is a paradox of sorts.
adil: Well just as a public key cryptosystem can be created
a private one may be as well. if you dont want them to have your information nothing is stoping you from encrypting it yourself.
me: hmm
adil: The concept of a public key cryptosystem is inherently that they are secure and you are not.
me: My friend Rob does that. I got a message from his instant messaging client that said I had to agree to his privacy, as in i couldnt talk to him unless i didn't leak him.
3:35pm
adil: You can encrypt information and only they can decrypt it. this is known as an asymetric cipher. a symetric cipher works differently. You each have a (separate) key and you can each encode and decode data. the problem with those is that often (not always) they are susceptible to middle man attacks. ie someone intercepts your data, tampers with it and is able to read it without either of you knowing.
adil: When you create the keys it would be ideal that it were done over a secure channel. if thats the case they shouldnt be able to do that.
but some systems rely on you exchanging pieces of information that are related to your keys... alice has key a and makes A = somenumber^a. bob has key b and makes B = someothernumer^b. they exchange keys by sending eachother A and B. their keys are hidden in the exponents. but now they can multiply A*B to get some number *ab. they can use that to decrypt data now.
me: ah so they have to be able to tamper by knowing the key creation method
adil: some other person Eve were to intercept the message and send them E = somenumebr^e then now she can decrypt data and they are both using her key. because they will never know the other persons key. they could never know that its eves
me: what does encryption look like? a word scramble?
adil: essentially trash/ unless you can decode it
me: But how does it enter in there and give them false info? how does the person even know they're talking? how does he access their transmission amidst 1000s of transmissions? IP hacking?
adil: maybe they transmitted the keys over radiowaves and he was listening. maybe it was via IM and he posed as the other person. could have been anonymous email. who knows. but if he could find a way the system could be comprimised. For reference you enjoy a lot of security from cryptography. Your bank account uses RSA encryption most likely, Facebook uses RSA, etc... We rely on processing power being low for security but as it increases all of these things will become insecure. Especially considering it could be possible for some with the right resources to design a quantum computer and use shors algorithm to crack RSA encrypted data in almost polynomial time.
me: i read about the fake emails people send to scam, they purposely make it sound very ridiculous so they only catch the most gullible people and have a higher success rate.
adil: oh yeah that was a funny paper.
― GSW
“The robb'd that smiles, steals something from the thief; He robs himself that spends a bootless grief.”
-- Giant Sand Worm
“Stealing, of course, is a crime, and a very impolite thing to do. But like most impolite things, it is excusable under certain circumstances. Stealing is not excusable if, for instance, you are in a museum and you decide that a certain painting would look better in your house, and you simply grab the painting and take it there. But if you were very, very hungry, and you had no way of obtaining money, it would be excusable to grab the painting, take it to your house, and eat it.”
--GLW
Security, Cryptography////:==
me: I know you're studying cypotography...and I like it, actually because it created freenetproject.org, but I wish that banks and powerful people didn't have access to it because they want to use it to reduce everyone elses' privacy and make people use their security, so they are secure and no one else is.
me: I think it is a paradox of sorts.
adil: Well just as a public key cryptosystem can be created
a private one may be as well. if you dont want them to have your information nothing is stoping you from encrypting it yourself.
me: hmm
adil: The concept of a public key cryptosystem is inherently that they are secure and you are not.
me: My friend Rob does that. I got a message from his instant messaging client that said I had to agree to his privacy, as in i couldnt talk to him unless i didn't leak him.
3:35pm
adil: You can encrypt information and only they can decrypt it. this is known as an asymetric cipher. a symetric cipher works differently. You each have a (separate) key and you can each encode and decode data. the problem with those is that often (not always) they are susceptible to middle man attacks. ie someone intercepts your data, tampers with it and is able to read it without either of you knowing.
adil: When you create the keys it would be ideal that it were done over a secure channel. if thats the case they shouldnt be able to do that.
but some systems rely on you exchanging pieces of information that are related to your keys... alice has key a and makes A = somenumber^a. bob has key b and makes B = someothernumer^b. they exchange keys by sending eachother A and B. their keys are hidden in the exponents. but now they can multiply A*B to get some number *ab. they can use that to decrypt data now.
me: ah so they have to be able to tamper by knowing the key creation method
adil: some other person Eve were to intercept the message and send them E = somenumebr^e then now she can decrypt data and they are both using her key. because they will never know the other persons key. they could never know that its eves
me: what does encryption look like? a word scramble?
adil: essentially trash/ unless you can decode it
me: But how does it enter in there and give them false info? how does the person even know they're talking? how does he access their transmission amidst 1000s of transmissions? IP hacking?
adil: maybe they transmitted the keys over radiowaves and he was listening. maybe it was via IM and he posed as the other person. could have been anonymous email. who knows. but if he could find a way the system could be comprimised. For reference you enjoy a lot of security from cryptography. Your bank account uses RSA encryption most likely, Facebook uses RSA, etc... We rely on processing power being low for security but as it increases all of these things will become insecure. Especially considering it could be possible for some with the right resources to design a quantum computer and use shors algorithm to crack RSA encrypted data in almost polynomial time.
me: i read about the fake emails people send to scam, they purposely make it sound very ridiculous so they only catch the most gullible people and have a higher success rate.
adil: oh yeah that was a funny paper.