Bullrun - All Your Encryption Are Belong To Us



With the quantum computers, they can solve a bounded version of the problem in polynomial time. They can't brute-force AES 256 in the general case, and based on the limited details that they have released, I haven't seen anyone making that claim.

They could be able to exploit weaknesses in an implementation to go after the low-hanging fruit. That situation is fucked up, because they are using these big companies' servers to basically build their own botnet.
 
From the article:

The full extent of the N.S.A.’s decoding capabilities is known only to a limited group of top analysts from the so-called Five Eyes: the N.S.A. and its counterparts in Britain, Canada, Australia and New Zealand. Only they are cleared for the Bullrun program, the successor to one called Manassas — both names of American Civil War battles. A parallel GCHQ counterencryption program is called Edgehill, named for the first battle of the English Civil War of the 17th century.

The best part is how the program was named after Bull Run, and its predecessor program was named after Manassas, both of them large American Civil War battles. And the GCHQ program was also named after an English Civil War battle.

The story they always give is that they need to spy on their own citizens in order to protect us from outsiders and terrorists yet they name the programs after Civil War battles in which the "enemy" was its own citizens. I'm sure that's just a coincidence though.
 
....?

AES-256 is the exact same encryption the US government uses for some classified information.

Unless you have millions of dollars in funding and insanely fast computers, you aren't cracking that shit if its a strong password.

From 2007: Did NSA Put a Secret Backdoor in New Encryption Standard?

"What Shumow and Ferguson showed is that these numbers have a relationship with a second, secret set of numbers that can act as a kind of skeleton key. If you know the secret numbers, you can predict the output of the random-number generator after collecting just 32 bytes of its output. To put that in real terms, you only need to monitor one TLS internet encryption connection in order to crack the security of that protocol. If you know the secret numbers, you can completely break any instantiation of Dual_EC_DRBG."
 
Very good read from start to finish. however a well protected password enclosed file is still the safest way to go unless everything gets heavily encrypted.
 
Fuck all that. I use the password-protect thingy on MS Excel for all my important shit.

Ain't no fuckers gettin' a low on me.
 
If you're sending data that's that sensitive, there are better ways to send it so that it takes considerable effort to crack, like household cryptography. for example if you and your recipient both have copies of a very old, relatively unknown, vocabulary diverse book, you could technically send a bunch of numbers that correspond to pages, lines and word order in that said book.

As long as you don't reuse the same number codes for the same words everytime, they'd have a field day trying to sort that out. And that's a very simple example, you could just print your own randomly generated book as a key, automate the process with scripting, etc.

Source: ( I see a lot of Liam Neeson Movies )
 
If you're sending data that's that sensitive, there are better ways to send it so that it takes considerable effort to crack, like household cryptography. for example if you and your recipient both have copies of a very old, relatively unknown, vocabulary diverse book, you could technically send a bunch of numbers that correspond to pages, lines and word order in that said book.

As long as you don't reuse the same number codes for the same words everytime, they'd have a field day trying to sort that out. And that's a very simple example, you could just print your own randomly generated book as a key, automate the process with scripting, etc.

Source: ( I see a lot of Liam Neeson Movies )

And this is why you leave cryptography to the experts kids.
 
If you're sending data that's that sensitive, there are better ways to send it so that it takes considerable effort to crack, like household cryptography. for example if you and your recipient both have copies of a very old, relatively unknown, vocabulary diverse book, you could technically send a bunch of numbers that correspond to pages, lines and word order in that said book.

As long as you don't reuse the same number codes for the same words everytime, they'd have a field day trying to sort that out. And that's a very simple example, you could just print your own randomly generated book as a key, automate the process with scripting, etc.

Source: ( I see a lot of Liam Neeson Movies )

Your method is absolutely not secure. All you need is a one time pad for strong proven secure encryption.

One-time pad - Wikipedia, the free encyclopedia

Please also note how one time pads offer perfect secrecy as long as there is no human error involved. That should give you a clue at what the NSA's decryption "breakthrough" is really all about: human errors, backdoors, and other tricks.
 
Your method is absolutely not secure. All you need is a one time pad for strong proven secure encryption.

One-time pad - Wikipedia, the free encyclopedia

Please also note how one time pads offer perfect secrecy as long as there is no human error involved. That should give you a clue at what the NSA's decryption "breakthrough" is really all about: human errors, backdoors, and other tricks.

I don't know bro... It worked perfectly in a Liam Neeson movie I saw... BTW do you even lift?
 
Clearly the government is brute force decrypting all Internet traffic in real time guys.

Do you realize that with each new revelation about government abuse of power over the years, that you (and not just you, lots of people) just keep moving the goal posts further away? It's almost as if the default assumption is that the government can't be wrong therefore we must modify the truth in a way that makes sense of the new information. You see the same mental gymnastics with religious people too. It's weird.
 
"The D-Wave TwoTM system is a high performance computing system designed for industrial problems encountered by Fortune 500 companies, government and academia. Our latest superconducting 512-qubit processor chip is housed inside a cryogenics system within a 10 square meter shielded room. If you are interested in finding out if this quantum computing system meets your needs please contact us for more information."

http://www.dwavesys.com/en/products-services.html

10 square meter shielded room? Tinfoil shield, or?
 
"The D-Wave TwoTM system is a high performance computing system designed for industrial problems encountered by Fortune 500 companies, government and academia. Our latest superconducting 512-qubit processor chip is housed inside a cryogenics system within a 10 square meter shielded room. If you are interested in finding out if this quantum computing system meets your needs please contact us for more information."

http://www.dwavesys.com/en/products-services.html

10 square meter shielded room? Tinfoil shield, or?

Ummm the Computer is cooled to Almost absolute zero with liquid nitrogen Thats how you get the superconducting bits.... I'm guessing its for that. But that Dwave is some next gen stuff.