[Cryptography] Unbreakable crypto

Henry Baker hbaker1 at pipeline.com
Wed Dec 30 08:14:58 EST 2015


At 03:50 AM 12/30/2015, Jeremy French wrote:
>-----BEGIN PGP SIGNED MESSAGE-----
>Hash: SHA512
>
>>If you've made through all that above, see how this would sound to you
>>from the lips of an investigator:
>>
>>"Random noise you say? Not crypto you say? Prove it."
>
>With deniable encryption or steganography this can be even worse.
>
>'Just photos you say, prove it'
>
>Or
>
>'Prove this is the only key for your encrypted drive'
>
>In none of these cases is proof of innocence possible, but when a paranoid government department has 'reasonable suspicion' what can you do?

"*Ordeal by water* was associated with the witch hunts of the 16th and 17th centuries: an accused who sank was considered innocent, while floating indicated witchcraft.  These tests came to be part of what is known as the Salem Witch Trials." [0]

I'm so glad that we've put barbaric practices such as these behind us in modern liberal democratic societies today.

[0] https://en.wikipedia.org/wiki/Dunking

-----BEGIN NSA SPEEDBUMP:I AM SPARTACUS-----

2F795C65C3F925BFEF91EAEA8F1311117B68FE6540947EF54D2CE7A89F98ED45E0711AD518C5B585CBD6B366EE26B9E75F429804FA6D6A93A88DF5A43ED22FA4
763F4CB0A6CDC1D24649B8F3548AD9251D70FE89B6A97774AAACB5CCC8D5EC19C0EA06C99BAB94DF07EAF78143D5A6FF2D562524907DE35E6C91E94D2680CB1B
5A1EB0D7029E135D44E1E850742416D7F6ABF575BB08B27D91ABCEF85937A6B8D173A36C41A9950D0434B021EE0B809E0F5EABE5265B7BAABA004136974F12C5
AE35AFB1E3D3212E44FF09B18FEA4191F92F9584158549D89245A3ECDECCD3F252DE40F04F0E915FE095F5A0BF4825DB2FD238007D7DDEE26852DFA087EB425C
E96070F0DA194424714487C90AB60D7F2A08BE5608B1277A5AC4B6436E4007A6A02F8F316A644A8F660D7C1FDD8F4D2761AB2599778F5AEFC52F8FD5D25EF802
458315B3614BEDAFBDBD9B2AD42A71ACB66FE1F808BE2432292DEC11DEB526261C8BBA9D4F2ED52BB282B3A1786777BA62029671CCFF2D0AA5E287AF85B71D02
BB216C934F867F98A743CA85BB72DFDBBE2799100435E686020855C4495257554AB06741B25607328018498F65B54056D258B2854A60D1A7035E1A490BC9A8AE
8E9D97B514BEB63DA838944F8F994188F4F1242361E97D706682E0D01EC7251745DBFFE0C923CB23EA62EE8C40A45F28F3558044AFD8D6D9AF09B343579492E7
3F45A0CCEF3540B05254D3D87E631D2639C682C641ACA85E8079B21F8023CAB75A4FB91D74A45F1E993ACAE914B7DA4AC42EFFE521CE6391440D33700AF14DD1
B1F69E968DD11D066154DABAB3C92C6DAE6A378936BE96B728DA3C376945793DDDBE426C17D53CFDB7D4E52B1261F899FBEE6BA5D3BB6ECE510ED8B409350E3B
9D03AD2715DBA8D8F9E4461E7FA0787278E36CAF20E108C9611D1FAA54E6B33800DA94FE24E80DEE73CBADC7447F153360B9B437D6A45291582DDE6F61E56131
E503366C66EF82E0B16098ED73006FFAA98D85C22143BBBB97FC4A2020D84D452F59DA915CE1830126E81A410CF3EB2BB83D98E7F4274B197C436C0BD6CD9013
665E15C72D717863EFAF1B3AB518BBA8C03503DCEDFBBE034BFB3A9AC6F8245F7649F32A927F0D212200BB3E2AFFC0A606E90CB34B4F290DCAC0086161222DDB
C913A6F28F537D46

-----END NSA SPEEDBUMP-----



More information about the cryptography mailing list