[ rss / options / help ]
post ]
[ b / iq / g / zoo ] [ e / news / lab ] [ v / nom / pol / eco / emo / 101 / shed ]
[ art / A / boo / beat / com / fat / job / lit / mph / map / poof / £$€¥ / spo / uhu / uni / x / y ] [ * | sfw | o ]
logo
BOO!

Return ] Entire Thread ] Last 50 posts ]

Posting mode: Reply
Reply ]
Subject   (reply to 3587)
Message
File  []
close
dave_visiting_netmums_anti_jihadi_hacker_unit.jpg
358735873587
>> No. 3587 Anonymous
13th January 2015
Tuesday 3:08 pm
3587 Oh Dave!
>David Cameron wants to strengthen the laws that allow the security services to intercept communications so that no method or element of online communication is out of reach of the state

>A new intercept law might outlaw services such as Snapchat, by which text, photos or video are shared for up to 10 seconds before they are deleted from the company’s servers

>Companies that offer encrypted email services could be banned or required to hand over their encryption keys to the security services

>Cameron wants a blanket law that would cover not only existing forms of communication such as encrypted services or Snapchat-style services but also any that might develop into the future. This would amount to an extremely sweeping new power.

http://www.theguardian.com/politics/2015/jan/12/snooping-powers-david-cameron-mi5-explainer

Well timed Dave. Well timed. But no.
Expand all images.
>> No. 3588 Anonymous
13th January 2015
Tuesday 3:11 pm
3588 spacer

tumblr_lhni3rj33S1qzs79ko1_500[1].jpg
358835883588
It just makes me think of Four Lions, bro.
>> No. 3589 Anonymous
13th January 2015
Tuesday 3:24 pm
3589 spacer
>Exactly how the UK government could practically thwart encryption in Blighty is unclear: must software include backdoors for spies – and hackers – to exploit to eavesdrop on citizens? Would it be unlawful to possess code, source or executable, that performs a cryptographic algorithm? What counts as cryptographic – even random number generation?

>Will ISPs be ordered to drop all packets that match a given encryption protocol, even VPNs or SSL? Will specific ciphers, key lengths and protocols be banned; what if new or tweaked versions appear? Will it be as much as an embarrassing mess as the anti-porn web filtering?

>A ban is likely to prove disastrous for Blighty's IT industry, and unlikely to stop the terrorists, who are ostensibly the reason why Cameron wants an end to end-to-end encryption. If encryption is outlawed, only the outlaws will use it.

http://www.theregister.co.uk/2015/01/12/iranuk_in_accord_as_pm_promises_to_block_encrypted_comms_after_election/
>> No. 3590 Anonymous
13th January 2015
Tuesday 4:02 pm
3590 spacer
Bin Laden is slowly winning, even after his death. Impressive.
>> No. 3591 Anonymous
13th January 2015
Tuesday 7:13 pm
3591 spacer
>>3587

Fucking Netmums.
>> No. 3592 Anonymous
13th January 2015
Tuesday 7:16 pm
3592 spacer
These fucking vultures can't give a tragedy a single week before trying to use it for their own agenda.
>> No. 3594 Anonymous
13th January 2015
Tuesday 8:45 pm
3594 spacer
Places like this where people are able to communicate 'anonymously' will be illegal within 10 years.

Yes, I'm wearing my hat.
>> No. 3595 Anonymous
13th January 2015
Tuesday 9:40 pm
3595 spacer
>>3590
>after his death

Lad.
>> No. 3596 Anonymous
13th January 2015
Tuesday 9:50 pm
3596 spacer
>>3595
You're a twat.
>> No. 3597 Anonymous
13th January 2015
Tuesday 11:09 pm
3597 spacer
Does he really not see an issue with fucking over all encryption?
>> No. 3598 Anonymous
13th January 2015
Tuesday 11:55 pm
3598 spacer
>>3597

It's ok m8, only the government will be able to read everyone's traffic and they promise to not doing anything unethical with it. What have you got to hide from uncle Dave and co?
>> No. 3599 Anonymous
14th January 2015
Wednesday 2:15 am
3599 spacer
>>3597
I like to think he just sits in a room alone, playing his 3DS or browsing .gs.
Then someone calls him from the home secretary's office or something, asking asks how he's going to react to the recent stuff in the news. He looks at the clock and realises that the half hour he set aside for 'Dave time' has spilled over into 7 hours of shit posting. He's forgot to pick up the kids and missed putting the bins out. How did he not hear the bin men!? Shit.

He quickly mumbles something that sounds good, like "No more internet encryption is allowed unless we say so. That'll stop 'em, right?". He doesn't have time to listen to the response, he's got to get out of his pajamas and get the tobacco smoke off him before getting in a car to God knows where. He'll call the babysitter on the way or something, and can share the neighbors bins again. He's the PM, he'll do whatever the fuck he wants, he doesn't care how angry Mr. Anjum is that this is the 4th week in a row.

At some point later, he'll be staring blankly at himself in a bathroom mirror in some shitty school or museum. "What the fuck am I doing?" he'll mumble to himself. He drys his hands, puts on the most 'natural' smile he can muster, and leaves.
>> No. 3600 Anonymous
14th January 2015
Wednesday 9:29 am
3600 spacer
>>3599

That strikes me as entirely plausible. Top post.

MPs are a weird bunch. They're supposed to be in charge of running the country, but it's painfully obvious that they've no idea what they're doing. They get publicly admonished for going off script, for Christ's sake. That just means that they can't be trusted to think for themselves.

As time wears on, politics is veering more towards being purely public spectacle. This whole televised debates thing, aping the American model, is proving popular amongst people that think they're clever but actually aren't. It's a triumph of sophistry over philosophy.

MPs can't be trusted to toe the party line and think for themselves, so they have to be handed stuff to say by focus groups and think tanks. It's when you get senior figures saying that encryption should be banned and stuff like that you see that handing policy-making over to publicly unaccountable think tanks and the like is not a superior decision.

MPs do not make these decisions themselves, of course.
>> No. 3601 Anonymous
14th January 2015
Wednesday 10:01 am
3601 spacer
I think they should put this through as long as it works both ways, so all MPs browsing histories are a matter of public record.
>> No. 3602 Anonymous
14th January 2015
Wednesday 11:03 am
3602 spacer
The story has been badly reported IMO. Politicians are stupid when it comes to technology, but they're not that stupid. Cameron isn't seeking a blanket ban on crypto, but a return to the pre-Snowden world where consumer crypto technology was serviceable for providing reasonably secure commerce, but brittle enough to be easily bypassed by the intelligence services.

Cryptographic technology (software, hardware and algorithms) has been regulated as weapons since the second world war. Those of us who remember the early internet will remember when web browsers came in two versions - a domestic US version with 128 bit encryption, and an international version with 40 bit encryption. Export controls on consumer products were eventually relaxed, but specialist communications equipment is still controlled; I own all sorts of equipment that I can't legally export - routers and switches, coprocessors, entropy generators and so on.

In the early 1990s, the US tried to impose a single regulated (and backdoored) crypto technology in all non-governmental technology, commonly known as the "clipper chip". They eventually gave up on the effort, most likely because the NSA found that consumer-level encryption was sufficiently poorly implemented that they could break it anyway. The basic crypto algorithms were effectively unbreakable, but they were implemented so badly and used on systems so insecure that the quality of the algorithm was irrelevant. Once you've got a rootkit running on a target system, you can pinch the keys and crypto just provides the surveillance target with a false sense of security.

The current backlash against encryption substantially pre-dates the attacks in France, and is mainly due to Google and Apple providing strong privacy by default on their devices and services. A lot of Silicon Valley types reacted strongly to the Snowden revelations and really started to get their act together in terms of providing government-proof security. There hasn't been a change of heart on the part of government, but the realisation that encryption is actually starting to hinder their surveillance efforts.

We need to defend against this political impulse, but it's futile to fall back on old tropes like "you can't regulate software" or "the internet will collapse without strong crypto". It is perfectly feasible from a technological standpoint for governments to mandate one particular cryptographic algorithm that has flaws known only to the intelligence services. The Snowden papers showed that the NSA spend $250m a year on bribes to get vendors to implement backdoored algorithms. Current cryptographic technology is full of incredibly subtle weaknesses that are known only to the intelligence services, and politicians are keen to maintain that status quo. Our only defence is to stand up for the basic principle of privacy.
>> No. 3603 Anonymous
14th January 2015
Wednesday 11:21 am
3603 spacer
>>3602

Not sure if El Reg journo or GCHQ lad, but good read either way. Except this bit which was smeared in shit

>It is perfectly feasible from a technological standpoint for governments to mandate one particular cryptographic algorithm that has flaws known only to the intelligence services.
>> No. 3604 Anonymous
14th January 2015
Wednesday 11:32 am
3604 spacer
>>3602
>It is perfectly feasible from a technological standpoint for governments to mandate one particular cryptographic algorithm that has flaws known only to the intelligence services.
It isn't remotely feasible at all. That would be textbook security by obscurity, since it relies on the existence of the deliberate flaws being unknown to anyone else. The NSA already pulled this trick with DualEC and it was seen through in a matter of months. Consensus amongst people who actually know anything about the field (which apparently doesn't include you) is that this sort of thing is a horrendously catastrophically bad idea. If the security services can read your communications without specific legal measures (warranted interception, etc.) then organised criminals can almost certainly read them too.
>> No. 3605 Anonymous
14th January 2015
Wednesday 11:58 am
3605 spacer
>>3603

By far the most popular cryptographic specification in use today is AES, which was established by the US National Institute of Standards and Technology. It's the standard algorithm used in TLS (the protocol underlying HTTPS), and it has been rubber-stamped by the NSA. How confident are you that the NSA approved of the algorithm because it was secure, and not because they knew it was flawed? How confident are you that the decisions made by NIST and the IETF were made in a fair, open and honest manner?

We know that the intelligence services have been systematically degrading the quality of internet security. Thus far they have pursued this capability largely in secret in order to conceal their surveillance activities, mainly by manipulating large communications companies through threats and bribery. Now that the jig is up, what's to stop a transatlantic treaty from ruling that all large communications providers must implement cryptographic standard X? What's to stop them from forcing backbone transit providers to send traffic that isn't either plaintext or protocol X to /dev/null? How do you circumvent a set of restrictions that are enforced at the Tier 1 and peering level?

https://en.wikipedia.org/wiki/Bullrun_(decryption_program)
>> No. 3606 Anonymous
14th January 2015
Wednesday 12:26 pm
3606 spacer
>>3604

>If the security services can read your communications without specific legal measures (warranted interception, etc.) then organised criminals can almost certainly read them too.

That assumes that organised crime can compete with the cryptanalysis capabilities of government agencies. How many number theorists do you think work for the Russian mafia? The NSA have always been about a decade ahead of academia. They discovered differential cryptanalysis more than 20 years before the rest of the world; IBM later independently discovered it, and agreed to burn the research to keep it secret. It wasn't until Biham and Shamir's discovery that it eventually went public, and only then because they were Israeli.

We know about Dual_EC_DRBG because it ultimately failed, but how many other attacks on cryptographic infrastructure have succeeded? To say it was "seen through in a matter of months" is patently false - it went into ANSI/IEC standards and the BSAFE library in 2004, but was only withdrawn by RSA in 2013 when the Snowden leaks revealed the existence of BULLRUN. Schneier and others might have known it was broken by 2007, but that didn't stop it from being used by millions of customers of products incorporating BSAFE. RSA retain strong ties to the NSA.
>> No. 3607 Anonymous
14th January 2015
Wednesday 1:29 pm
3607 spacer
>>3604
>>3605
>>3606

It's all moot because I'm fairly sure the solution would be for the government to have access to all the major private keyrings. No cryptological or mathematical flaws would be needed.
>> No. 3608 Anonymous
14th January 2015
Wednesday 1:56 pm
3608 spacer
>>3606
>it went into ANSI/IEC standards and the BSAFE library in 2004, but was only withdrawn by RSA in 2013 when the Snowden leaks revealed the existence of BULLRUN.
Patents on methods of breaking Dual-EC were filed in 2005, and granted less than a month after the ratification of the standard in 2006. This was a private company. There is no reason to think that black hats wouldn't have the resources to figure out the same. For instance, we know that Heartbleed was exploited by non-state actors at least a year before its disclosure. The idea that something like this could be known only to intelligence services and kept that way is laughable.

There is an easy solution to this problem, of course. The government could simply acknowledge that the form and content of private communications are none of their fucking business and stop trying to solve a non-existent problem. Did the Met ever identify a terrorist plot that succeeded because they had to release someone on day 29? No? Then they clearly didn't need 90-day detention.
>> No. 3609 Anonymous
14th January 2015
Wednesday 1:59 pm
3609 spacer
I suppose a good question would be, can they be trusted with this kind of access? What if documents regarding said access, got left on trains and the like. Things like this always seem to be down to human error, whether they go wrong or not, and I really don't trust for someone to not eventually fuck up.
>> No. 3610 Anonymous
14th January 2015
Wednesday 2:49 pm
3610 spacer
>In the early 1990s, the US tried to impose a single regulated (and backdoored) crypto technology in all non-governmental technology, commonly known as the "clipper chip". They eventually gave up on the effort, most likely because the NSA found that consumer-level encryption was sufficiently poorly implemented that they could break it anyway.
They gave up because nobody would implement it; the chip was prohibitively expensive, and anyway mandating its inclusion in electronic devices in an increasingly global electronics marketplace was untenable.

We can only hope that our own government wouldn't be stupid enough to try the same "government-sanctioned crypto only" approach. In any case, they probably can't afford to: the infrastructural costs alone of porting all communications networks to a new standard would be staggering, and even if they managed to strong-arm their cut-ridden IT departments into implementing such changes to their networks, the bigger corporate players like Google would probably just tell them to fuck off and route British traffic to overseas servers.
>> No. 3612 Anonymous
15th January 2015
Thursday 11:20 am
3612 spacer
>David Cameron: I'm off to the US to get my bro Barack to ban crypto

>Plans to pressure President for tighter surveillance controls

http://www.theregister.co.uk/2015/01/15/cameron_wants_obama_to_back_crypto_ban/
>> No. 3613 Anonymous
15th January 2015
Thursday 12:27 pm
3613 spacer
>>3612

Cameron will have the backing of the director of the FBI, who proposed the same thing last year:

http://www.fbi.gov/news/speeches/going-dark-are-technology-privacy-and-public-safety-on-a-collision-course

Also, a good piece by Der Spiegel on the NSA's cryptanalysis capabilities:

http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-internet-security-a-1010361.html
>> No. 3614 Anonymous
16th January 2015
Friday 8:51 pm
3614 spacer

fucking_hell_dave_ffs.jpg
361436143614
"...As they emerged, Obama performed his customary trick of patting Cameron on the back – a gesture that pretends to a friendly action but is actually a subtle way of reminding Cameron who’s really in charge."

"Then, as the two men advanced towards the cameras, we noticed Obama was doing most of the talking – while he was waving his arms around and holding forth, poor Cameron was consigned to the passive role of listener; another Obama technique for making clear to everyone who’s really in control."

Oh Dave!

>Barack Obama and David Cameron fail to see eye to eye on surveillance

>Barack Obama and David Cameron struck different notes on surveillance powers after the president conceded that there is an important balance to be struck between monitoring terror suspects and protecting civil liberties.

>Obama agreed with the prime minister that there could be no spaces on the internet for terrorists to communicate that could not be monitored by the intelligences agencies, subject to proper oversight. But, unlike Cameron, the president encouraged groups to ensure that he and other leaders do not abandon civil liberties.

http://www.theguardian.com/us-news/2015/jan/16/barack-obama-david-cameron-surveillance-terrorists
>> No. 3615 Anonymous
19th January 2015
Monday 3:37 am
3615 spacer
>>3614

I think Obama and Davycambles bring out the worst in each other. Dave looks like exactly the sort of morally bankrupt arsehole he is, but I can't help but feel the facade of integrity Obama puts on is more infuriating. The man can't control his own government and pretty much explicitly lies through his teeth about shit like drones and Gitmo. And yet there he is in every international meeting pretending he's the sole upholder of decency among the corrupt.

The arrogance alone is outstanding, somebody (apart from Putin) needs to call him out on it.
>> No. 3616 Anonymous
19th January 2015
Monday 3:40 am
3616 spacer
>>3615
The pope should call him out on it.
>> No. 3617 Anonymous
19th January 2015
Monday 9:23 pm
3617 spacer
>>3587
I wonder if cuntmoron actually uses a computer, ever. Look at the slovenly and awkward way he's grasping that thing. I bet he has his fags do all that sort of thing for him.
>> No. 3618 Anonymous
19th January 2015
Monday 10:30 pm
3618 spacer
>>3617
That screen actually looks a lot closer to the camera. Perhaps he's just staring at the wall trying to get rid of the screensaver.
>> No. 3619 Anonymous
19th January 2015
Monday 10:33 pm
3619 spacer
>>3617
To be fair on him, that monitor is in a shocking place ergonomically.
>> No. 3620 Anonymous
19th January 2015
Monday 10:47 pm
3620 spacer
>>3619
The "magic" of television and/or photography. You haven't lived until you've been made to open the door to someone with the same shit-eating grin half a dozen times before they call FANTASTIC RIGHT NOW LETS DO THE SAME THING FROM THE OTHER SIDE OF THE DOOR.
>> No. 3638 Anonymous
23rd January 2015
Friday 12:15 pm
3638 spacer
A world in which whistleblowers are exposed the moment they run to the press. I can't fucking wait, Dave.
>> No. 3639 Anonymous
23rd January 2015
Friday 5:06 pm
3639 spacer
>>3618

Look at the perspective of the ceiling and the right hand wall. The photo has been taken with an ultrawideangle lens, which totally warps your sense of distance and scale. Estate agents use that sort of focal length to make a room seem much bigger than it really is, photojournalists do it to make you feel like you're right in the middle of a scene, but in this photo it looks like two tiny people are staring at a massive monitor that is miles away from them.
>> No. 3640 Anonymous
23rd January 2015
Friday 5:12 pm
3640 spacer
>>3639
Thanks lad, I really appreciate informed input like this. Could you speculate as to why such a lens has been used in this instance? I know SFA about this sort of thing.
>> No. 3641 Anonymous
24th January 2015
Saturday 9:54 am
3641 spacer
>>3589
You wont get any answers off the government about the exact details, the law will just say all communications, even if it is not technically possible to intercept them. On the basis that they may develop the technology to intercept them. I do think that they should be better informed than they are though. It's about time they had a whole department devoted to computer networks. In this way they wouldnt embarrass themselves quite so much every time they talk about the powers they need to look up our arseholes
>> No. 3642 Anonymous
24th January 2015
Saturday 10:27 am
3642 spacer
>>3619>>3639
I'd add to that to say that to me it looks like this is set up as a conference table. They've got a monitor at the end, and there's probably space for 6 or 7 people or more to be sat around the table to see it. My uni had some poncy study rooms with the same set-up, although they had the sense to use a TV screen attached to the wall so that the people sitting closest can actually see it.

>>3640
I'm not >>3639, but I think this is probably just the effect the photographer wanted to achieve, a normal lens would have captured both of them without cutting off the monitor from that close. And he either wanted the effect of sitting at the desk for the photo, or there simply wasn't enough space to move further back.
>> No. 3643 Anonymous
24th January 2015
Saturday 2:11 pm
3643 spacer
>>3642 again, sorry for double posting.

It's just occurred to me that this is all probably just set up for the sole purpose of the photo.

Daves PA or the photographer decide they need a photo of him using a computer, this would be followed by 15 minutes of dragging desks around to get the desired result of a pose with both of them and the netmums logo on display, and they can't actually be facing the monitor because then it would get in the way of the photo.
>> No. 3650 Anonymous
30th January 2015
Friday 6:34 pm
3650 spacer
>What do China, FBI and UK have in common? All three want backdoors in Western technology

http://www.theregister.co.uk/2015/01/29/china_pushes_mandatory_backdoors/
>> No. 3654 Anonymous
30th January 2015
Friday 6:46 pm
3654 spacer
>>3650
Like everyone doesn't want a backdoor into everything. No shit.
"Hey, do you want unlimited spying power into everyone else in the world?"
"Well hurrr durr no I don't want that! Why would anyschmitty else?!"
>> No. 3663 Anonymous
30th January 2015
Friday 11:36 pm
3663 spacer
>>3654
There are good reasons for a government to not want them, though. The more data you can hoover up, the more that can go missing. Say GCHQ got infiltrated by an Esquimaux maniac, or MI5/6. Or that one of the above decided to spoon over a load of information to the Chinese or Russians. Gathering loads of iffy data can end up being a real liability for all parties concerned.
>> No. 3664 Anonymous
31st January 2015
Saturday 12:26 am
3664 spacer
>>3663

> Say GCHQ got infiltrated by an Esquimaux maniac

That won't happen

> Gathering loads of iffy data can end up being a real liability for all parties concerned.

I hate to invoke Godwin's law but the liability of gathering so much data isn't the intentions of our current government but rather the intentions of all possible future governments.
>> No. 3665 Anonymous
31st January 2015
Saturday 12:51 am
3665 spacer
>>3664
> Say GCHQ got infiltrated by an Esquimaux maniac
>That won't happen

Can't it? There are plenty of white eskimo extremist converts. It'd be unlikely but not impossible.

Further it could just be infiltrated by someone willing to use insider data for criminal purposes, or just sell it for personal gain to alien agencies.

I don't understand your sentence about 'Godwin's Law'.
>> No. 3666 Anonymous
31st January 2015
Saturday 1:04 am
3666 spacer
It is not possible to create a back door that only the good guys will have access to.
>> No. 3667 Anonymous
31st January 2015
Saturday 1:37 am
3667 spacer
>>3665
It turns out that infiltrating GCHQ is nowhere near as easy as you seem to suggest. They put a lot of effort into making sure that nothing goes on in that building outside the chain of command, and for very good reason. The vetting procedure is the same one they use on high-level government staff - it's very intrusive, and includes not only talking to people you nominated as references, but people they think you know that you didn't nominate. You don't get to cross the threshold there until they know you better than you know yourself.
>> No. 3668 Anonymous
31st January 2015
Saturday 1:43 am
3668 spacer
>>3667
I'm not suggesting it's 'easy'. However, the possibility can't be ruled out. Alternatively an 'honest' recruit may be turned at a later point, like an evil Snowden.

Go to bed gchqlad it's payday weekend!
>> No. 3669 Anonymous
31st January 2015
Saturday 1:47 am
3669 spacer
>>3668
And who knows what the fuck was up with gymbaglad.
>> No. 3670 Anonymous
31st January 2015
Saturday 1:51 am
3670 spacer
>>3668
It's almost as if you didn't read a single word of the post you replied to.
>> No. 3671 Anonymous
31st January 2015
Saturday 1:59 am
3671 spacer
>>3670
To think that would be wrong. Lay off the panzer chocolate lad.
>> No. 3672 Anonymous
31st January 2015
Saturday 2:22 am
3672 spacer
>>3671
Easy mistake to make, after all most people that had bothered to read it wouldn't have come out with silly points that were actually addressed in it already.
>> No. 3673 Anonymous
31st January 2015
Saturday 2:27 am
3673 spacer
>>3672
'Addressing' a point doesn't mean what you think it means.
>> No. 3674 Anonymous
31st January 2015
Saturday 2:35 am
3674 spacer
>>3673
Shush, lad. Grownups are trying to talk.
>> No. 3675 Anonymous
31st January 2015
Saturday 2:37 am
3675 spacer
>>3674
Yeah, all these grown ups 'trying to speak' at 2:30 am GMT.

I hope you're just a Walt, because if you're legit gchq then we are fucked.
>> No. 3676 Anonymous
31st January 2015
Saturday 1:21 pm
3676 spacer

3310221[1].jpg
367636763676
>>3675

Return ] Entire Thread ] Last 50 posts ]
whiteline

Delete Post []
Password