UN Report Warns Encryption Backdoors Violate Human Rights

Discussion in 'privacy general' started by Minimalist, May 29, 2015.

  1. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,883
    Location:
    Slovenia, EU
  2. DeathStalker

    DeathStalker Registered Member

    Joined:
    May 29, 2015
    Posts:
    2
    Unfortunately, that will simply be ignored by countries like the UK as it goes against the popular theory that we should not have any secrets from snoops
     
  3. lotuseclat79

    lotuseclat79 Registered Member

    Joined:
    Jun 16, 2005
    Posts:
    5,390
  4. driekus

    driekus Registered Member

    Joined:
    Nov 30, 2014
    Posts:
    489
    Lol yeah the US and UK havent really had a history of listening to the UN.
     
  5. RockLobster

    RockLobster Registered Member

    Joined:
    Nov 8, 2007
    Posts:
    1,812
    That's good though. The more our governments challenge our security and privacy, the bigger the movement to increase it gets. I am waiting for them to try and make it illegal to use encryption, I am ahead of the game already. I am working on an algorithm to convert encrypted data to image format and back again.
    "You have 1000 abstract images on your hardrive, we believe that is illegally encrypted data."
    "Prove it."
     
  6. mirimir

    mirimir Registered Member

    Joined:
    Oct 1, 2011
    Posts:
    9,252
    I like that!

    How about music?
     
  7. Nebulus

    Nebulus Registered Member

    Joined:
    Jan 20, 2007
    Posts:
    1,635
    Location:
    European Union
    You will never be able to fool anyone with that kind of transformation...
     
  8. driekus

    driekus Registered Member

    Joined:
    Nov 30, 2014
    Posts:
    489
    Ok so this is how it is going to play out.

    There will be a case bought forward by the media pawns of the government (think how the case for the Iraq war was built). It will involve either a terrorist act or some child abduction where the encryption of either iphone or android meant the government "supposedly" could not access the information necessary to stop the act. It will be spun to death and used to remove public resistance to unbreakable encryption.
     
  9. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,883
    Location:
    Slovenia, EU
    I expect something similar also. They are waiting for 9/11 cyber event to impose anything they want, take control over the internet and take away liberties that it brings to people.
     
  10. deBoetie

    deBoetie Registered Member

    Joined:
    Aug 7, 2013
    Posts:
    1,832
    Location:
    UK
    It's been found that the use of compression such as jpg provides "tells" when steganogrpahy is used. Presumably that is not the case for uncompressed bitmap.

    The short-termism of what the authorities are doing is illustrated by this kind of thing. By making the innocent suspects, you encourage the growth of products and services which are much harder to crack. They've broken the deal in secret, so it's very hard to recover trust from then on.
     
  11. RockLobster

    RockLobster Registered Member

    Joined:
    Nov 8, 2007
    Posts:
    1,812
    It is not about fooling anyone, it is about plausible deniability.
    In a court of law when accused of a crime we still have the protection of innocent until proven guilty (for now) and I believe the only way to prove an image has been created from encrypted data would be to convert it back to encrypted data and decrypt it which would require the encryption key.
    The algorithm I am working on could be applied to any image, if that image was not created from encrypted data the output would be random data that would look no different to the data that would result from applying it to an image that really was created from encrypted data.

    It probably would be possihle to do that too, but would require knowledge of audio encoders I think I could handle image formats, probably bitmap, faking jpg compression would be difficult and as deBoetie mentioned, may leave telltale signs, and real jpg compression would cause data loss.
    I'm still reading up about the bitmap image format so to figure out a way to create a real image from what would be random data, it will be interesting to see what they look like.
     
  12. RockLobster

    RockLobster Registered Member

    Joined:
    Nov 8, 2007
    Posts:
    1,812
    I agree with you except to say I don't think they wait for these kinds of events, I believe they plan them.
     
    Last edited: Jun 1, 2015
  13. noone_particular

    noone_particular Registered Member

    Joined:
    Aug 8, 2008
    Posts:
    3,798
    Music would open up all kinds of possibilities, especially if you don't focus on hiding a message in it. Let the message be part of the music itself. Oversimplified example, but gives the idea. different notes or beats translate into dots and dashes, which translate into an altered morse code. Multiple instruments equals multiple signals, several of which could be false flags. Just the various ways music can be split between the left and right channels could be the signal. IMO, putting the code in an analog signal might be one of the simplest and most effective ways to defeat digital cryptographic analysis.
     
  14. mirimir

    mirimir Registered Member

    Joined:
    Oct 1, 2011
    Posts:
    9,252
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.