home bbs files messages ]

Just a sample of the Echomail archive

Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.

   PUBLIC_KEYS      Public-Key Discussion Echo      845 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 798 of 845   
   August Abolins to Wilfred van Velzen   
   Cops hate encryption but the NSA loves i   
   04 Jun 23 11:08:00   
   
   MSGID: 2:221/1.58@fidonet 091d60af   
   REPLY: 2:280/464 647c6538   
   PID: OpenXP/5.0.57 (Win32)   
   CHRS: ASCII 1   
   TZUTC: -0400   
    AA>> Hmmm..  Too bad networked (via FTN) BBSes don't stress that   
    AA>> opaqueness as pretty-good-isolation from internet collection   
    AA>> then.   
      
    WvV> Probably everything is collected. And btw binkd doesn't use a very good   
    WvV> encryption algorithm. So if they wanted/needed to break it, they   
    WvV> probably could.   
      
   I thought binkd's encryption only extended to the     
   authentication part.  If the whole transfer, ie. the PKTs are     
   encrypted, that's interesting.   
      
   According to this, http://mimac.bizzi.org/    
   fidonet_programmi_binkd.html   
      
   "traffic encryption" was added.   
      
      
    WvV> So the hiding gpg traffic only works as long as we   
    WvV> remain small and under the radar...   
      
   Oh.. so you mean to include gpg'd netmail messages in the     
   transfer?   
      
      
    AA>> Well.. I thought that if it becomes known that BBSes are   
    AA>> the transport mechanism for secret/suspect messages, then   
    AA>> the spys could investigate the BBS and owners and choose   
    AA>> to knock on their doors some day?   
      
    WvV> Of course, but that is true for any kind of   
    WvV> communication... The point is not to become suspect! ;-)   
      
   Yes n No. I suppose that "authorities" could demand unlocking     
   encrypted messages on "grounds" for suspicion.  That happend at     
   Prontomail not long ago.  What those "grounds" could be could     
   be debatable and suspect itself.  :D   
      
   I recall a movement that suggested that people simply FLOOD the     
   channels with messages that bore "suspect" text in the Subject     
   lines: super secret, terrorism, murder.. etc.  The idea being     
   that then they will have too much data to analyse.   
      
   Similarly, random suspect words could be also be thrown in as     
   part of the message body at random times.   
      
   I dunno.. at this point I think the NSA wants people to think     
   that they have the ability analyse all the traffic out there -     
   and the media is more than willing to communicate that on their     
   behalf - but I think the reality is that analysing it ALL     
   within a reasonable time frame is not happening.   
      
   --    
     ../|ug   
      
   --- OpenXP 5.0.57   
    * Origin: What do you call an excavated pyramid? Unencrypted. (2:221/1.58)   
   SEEN-BY: 1/19 123 15/0 16/0 19/10 37 90/1 105/81 106/201 123/130 131   
   SEEN-BY: 142/104 153/7715 203/0 218/700 221/1 6 360 226/30 227/114   
   SEEN-BY: 229/110 112 113 206 307 317 400 426 428 470 664 700 240/5832   
   SEEN-BY: 266/512 280/464 5003 282/1038 291/111 292/854 301/1 317/3   
   SEEN-BY: 320/119 219 319 2119 322/0 757 326/101 342/200 396/45 423/81   
   SEEN-BY: 460/58 712/848   
   PATH: 221/1 320/219 229/426   
      

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca