<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://community.element14.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/"><channel><title>crypto war: get prepared!</title><link>https://community.element14.com/learn/publications/w/documents/10189/crypto-war-get-prepared</link><description /><dc:language>en-US</dc:language><generator>Telligent Community 12</generator><item><title>crypto war: get prepared!</title><link>https://community.element14.com/learn/publications/w/documents/10189/crypto-war-get-prepared</link><pubDate>Fri, 08 Oct 2021 05:00:02 GMT</pubDate><guid isPermaLink="false">93d5dcb4-84c2-446f-b2cb-99731719e767:507b79d9-c36a-4605-b72c-545c85ce70bd</guid><dc:creator>DebuggerGuys</dc:creator><comments>https://community.element14.com/learn/publications/w/documents/10189/crypto-war-get-prepared#comments</comments><description>Current Revision posted to Documents by DebuggerGuys on 10/8/2021 5:00:02 AM&lt;br /&gt;
&lt;p style="margin:0;"&gt;&lt;span style="font-family:&amp;#39;trebuchet ms&amp;#39;, geneva;font-size:12pt;text-align:-webkit-auto;"&gt;In the information age, communication security is one of the things you can&amp;#39;t go around without. It ensures the secure flow of money in electronic commerce, the free exchange of ideas and the flourishing of democracy, even in hostile regimes. &lt;a href="http://farm4.static.flickr.com/3031/2880224058_0643af0f9b.jpg"&gt;&lt;img alt="image" class="jiveImage" src="http://farm4.static.flickr.com/3031/2880224058_0643af0f9b.jpg" style="float:right;padding:15px;margin-right:0px;"  /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style="margin:0;padding:0px;"&gt;&amp;nbsp;&lt;/p&gt;&lt;p style="margin:0;"&gt;&lt;span style="font-family:&amp;#39;trebuchet ms&amp;#39;, geneva;font-size:12pt;"&gt;Government&amp;#39;s attempt to break in citizens&amp;#39; information unleashed the first crypto war, with the hardware-based &lt;a class="jive-link-external-small" href="http://epic.org/crypto/clipper/" rel="nofollow ugc noopener" target="_blank"&gt;Clipper Chip&lt;/a&gt; which intended to protect private communications whereas it permitted the obtention of targeted information. &lt;/span&gt;&lt;/p&gt;&lt;p style="margin:0;padding:0px;"&gt;&amp;nbsp;&lt;/p&gt;&lt;p style="margin:0;"&gt;&lt;span style="font-family:&amp;#39;trebuchet ms&amp;#39;, geneva;font-size:12pt;"&gt;Luckily, the situation didn&amp;#39;t grow into a big deal, but the big brother didn&amp;#39;t hold its horses. Ever since, the intentions to leak thru our information have grown bigger and stronger, most recent examples of this are &lt;a class="jive-link-external-small" href="http://www.forbes.com/sites/larrymagid/2012/01/18/what-are-sopa-and-pipa-and-why-all-the-fuss/" rel="nofollow ugc noopener" target="_blank"&gt;SOPA and PIPA&lt;/a&gt;, for those who have no bells ringing so far.&lt;/span&gt;&lt;/p&gt;&lt;p style="margin:0;padding:0px;"&gt;&amp;nbsp;&lt;/p&gt;&lt;p style="margin:0;padding:0px;"&gt;&amp;nbsp;&lt;/p&gt;&lt;p style="margin:0;"&gt;&lt;span style="font-family:&amp;#39;trebuchet ms&amp;#39;, geneva;font-size:12pt;text-align:-webkit-auto;"&gt;Fortunately, the tools to secure communications are widely available and people around the world have access to strong encryption, unbreakable by any government. Encryption can be found in source code, with open peer-reviewed algorithms that can be implemented in any programming language, embedded in software and layered on top of any communications channel.&lt;/span&gt;&lt;/p&gt;&lt;p style="margin:0;padding:0px;"&gt;&amp;nbsp;&lt;/p&gt;&lt;p style="margin:0;"&gt;&lt;span style="font-family:&amp;#39;trebuchet ms&amp;#39;, geneva;font-size:12pt;"&gt;The following are resourceful methods to grant security within our information.&lt;/span&gt;&lt;/p&gt;&lt;p style="margin:0;padding:0px;"&gt;&amp;nbsp;&lt;/p&gt;&lt;p style="margin:0;"&gt;&lt;span style="font-family:&amp;#39;trebuchet ms&amp;#39;, geneva;font-size:12pt;"&gt;&lt;strong&gt;1. Email Privacy&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style="margin:0;"&gt;&lt;span style="font-family:&amp;#39;trebuchet ms&amp;#39;, geneva;font-size:12pt;"&gt;Naked email is like a postcard for anyone to read. &lt;a class="jive-link-external-small" href="http://www.pgpi.org/" rel="nofollow ugc noopener" target="_blank"&gt;Pretty Good Privacy&lt;/a&gt; (PGP), an open source software program created by Phil Zimmermann in 1991, is the global standard for point-to-point encrypted and authenticated email.&lt;a class="jive-link-external-small" href="http://www.hushmail.com/" rel="nofollow ugc noopener" target="_blank"&gt;Hushmail&lt;/a&gt; is an OpenPGP-compatible &lt;a class="jive-link-external-small" href="https://help.hushmail.com/entries/245155-using-java-with-hushmail" rel="nofollow ugc noopener" target="_blank"&gt;web-based&lt;/a&gt;email platform that does not have access to your user password for decryption. Both products, when used correctly, offer &lt;a class="jive-link-external-small" href="http://blog.wired.com/27bstroke6/2007/11/pgp-creator-def.html" rel="nofollow ugc noopener" target="_blank"&gt;subpoena-proof&lt;/a&gt; email communication.&lt;/span&gt;&lt;/p&gt;&lt;p style="margin:0;padding:0px;"&gt;&amp;nbsp;&lt;/p&gt;&lt;p style="margin:0;"&gt;&lt;span style="font-family:&amp;#39;trebuchet ms&amp;#39;, geneva;font-size:12pt;"&gt;&lt;strong&gt;2. File Privacy&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style="margin:0;"&gt;&lt;span style="font-family:&amp;#39;trebuchet ms&amp;#39;, geneva;font-size:12pt;"&gt;Your files might be stored in the encrypted cloud but that doesn’t mean that they’re 100% safe for your eyes only. Free and open-source&lt;a class="jive-link-external-small" href="http://www.truecrypt.org/" rel="nofollow ugc noopener" target="_blank"&gt;TrueCrypt&lt;/a&gt; allows you to encrypt folders or entire drives locally prior to syncing with Dropbox.&lt;a class="jive-link-external-small" href="https://www.boxcryptor.com/" rel="nofollow ugc noopener" target="_blank"&gt;BoxCryptor&lt;/a&gt; also facilitates local file encryption prior to cloud uploading and it comes with added compatibility for Android and iOS.&lt;/span&gt;&lt;/p&gt;&lt;p style="margin:0;"&gt;&lt;span style="font-family:&amp;#39;trebuchet ms&amp;#39;, geneva;font-size:12pt;"&gt;There is an alternative to the dual-application process described above. Although most cloud-based storage services transfer over an encrypted session and store data in an encrypted form, the files are still accessible to the service provider which makes the data vulnerable to court-ordered subpoena. In order to rectify this, two different&lt;a class="jive-link-external-small" href="http://en.wikipedia.org/wiki/Zero-knowledge_proof" rel="nofollow ugc noopener" target="_blank"&gt;zero-knowledge&lt;/a&gt; data storage companies provide secure online data backup and syncing – &lt;a class="jive-link-external-small" href="https://spideroak.com/" rel="nofollow ugc noopener" target="_blank"&gt;SpiderOak&lt;/a&gt; and &lt;a class="jive-link-external-small" href="http://www.wuala.com/" rel="nofollow ugc noopener" target="_blank"&gt;Wuala&lt;/a&gt;. For obvious reasons, there is no password recovery and employees have zero access to your data.&lt;/span&gt;&lt;/p&gt;&lt;p style="margin:0;padding:0px;"&gt;&amp;nbsp;&lt;/p&gt;&lt;p style="margin:0;"&gt;&lt;span style="font-family:&amp;#39;trebuchet ms&amp;#39;, geneva;font-size:12pt;"&gt;&lt;strong&gt;3. Voice Privacy&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style="margin:0;"&gt;&lt;span style="font-family:&amp;#39;trebuchet ms&amp;#39;, geneva;font-size:12pt;"&gt;Wiretapping will become &lt;a class="jive-link-external-small" href="http://www.wired.com/threatlevel/2012/05/fbi-seeks-internet-backdoors/" rel="nofollow ugc noopener" target="_blank"&gt;more prevalent&lt;/a&gt; in the days and months ahead. From the creator of PGP, &lt;a class="jive-link-external-small" href="http://zfoneproject.com/index.html" rel="nofollow ugc noopener" target="_blank"&gt;Zfone&lt;/a&gt; is a new secure VoIP phone software product utilizing a protocol called &lt;a class="jive-link-external-small" href="http://en.wikipedia.org/wiki/ZRTP" rel="nofollow ugc noopener" target="_blank"&gt;ZRTP&lt;/a&gt; which lets you make encrypted phone calls over the Internet. The project’s trademark is “whisper in someone’s ear from a thousand miles away.” You can listen to Zimmermann present Zfone at &lt;a class="jive-link-external-small" href="http://youtu.be/euK3m9y4xcs" rel="nofollow ugc noopener" target="_blank"&gt;DEFCON 15&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;&lt;p style="margin:0;"&gt;&lt;span style="font-family:&amp;#39;trebuchet ms&amp;#39;, geneva;font-size:12pt;"&gt;Also utilizing ZRTP, open-source &lt;a class="jive-link-external-small" href="https://jitsi.org/index.php/Main/HomePage" rel="nofollow ugc noopener" target="_blank"&gt;Jitsi&lt;/a&gt; provides secure video calls, conferencing, chat, and desktop sharing. Because of security issues and lawful interception, Tor Project’s Jacob Appelbaum &lt;a class="jive-link-external-small" href="http://www.youtube.com/watch?v=3DS4nFy1NXA&amp;amp;feature=youtu.be&amp;amp;t=15m40s" rel="nofollow ugc noopener" target="_blank"&gt;recommends using Jitsi instead of Skype&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;&lt;p style="margin:0;"&gt;&lt;span style="font-family:&amp;#39;trebuchet ms&amp;#39;, geneva;font-size:12pt;"&gt;Designed specifically for mobile devices and utilizing ZRTP, open-source&lt;a class="jive-link-external-small" href="https://play.google.com/store/apps/details?id=org.thoughtcrime.redphone" rel="nofollow ugc noopener" target="_blank"&gt;RedPhone&lt;/a&gt; from Whisper Systems is an application that enables encrypted voice communication between RedPhone users on Android.&lt;/span&gt;&lt;/p&gt;&lt;p style="margin:0;padding:0px;"&gt;&amp;nbsp;&lt;/p&gt;&lt;p style="margin:0;"&gt;&lt;span style="font-family:&amp;#39;trebuchet ms&amp;#39;, geneva;font-size:12pt;"&gt;&lt;strong&gt;4. Chat Privacy&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style="margin:0;"&gt;&lt;span style="font-family:&amp;#39;trebuchet ms&amp;#39;, geneva;font-size:12pt;"&gt;Encrypting your chat or instant messaging sessions is just as important as encrypting your email. &lt;a class="jive-link-external-small" href="https://crypto.cat/" rel="nofollow ugc noopener" target="_blank"&gt;Cryptocat&lt;/a&gt; establishes a secure, encrypted chat session that is not subject to commercial or government surveillance. Similar to Cryptocat, the older and more durable &lt;a class="jive-link-external-small" href="http://www.cypherpunks.ca/otr/" rel="nofollow ugc noopener" target="_blank"&gt;Off-the-record Messaging&lt;/a&gt; (OTR) cryptographic protocol generates new key pairs for every chat implementing a form of &lt;a class="jive-link-external-small" href="http://en.wikipedia.org/wiki/Perfect_forward_secrecy" rel="nofollow ugc noopener" target="_blank" title="Perfect forward secrecy"&gt;perfect forward secrecy&lt;/a&gt; and &lt;a class="jive-link-external-small" href="http://en.wikipedia.org/wiki/Deniable_encryption" rel="nofollow ugc noopener" target="_blank"&gt;deniable encryption&lt;/a&gt;. It is available via &lt;a class="jive-link-external-small" href="http://www.pidgin.im/" rel="nofollow ugc noopener" target="_blank"&gt;Pidgin&lt;/a&gt; plugin.&lt;/span&gt;&lt;/p&gt;&lt;p style="margin:0;padding:0px;"&gt;&amp;nbsp;&lt;/p&gt;&lt;p style="margin:0;"&gt;&lt;span style="font-family:&amp;#39;trebuchet ms&amp;#39;, geneva;font-size:12pt;"&gt;&lt;strong&gt;5. Traffic Privacy&lt;/strong&gt; &lt;/span&gt;&lt;/p&gt;&lt;p style="margin:0;"&gt;&lt;span style="font-family:&amp;#39;trebuchet ms&amp;#39;, geneva;font-size:12pt;"&gt;The final step in the process is &lt;a class="jive-link-external-small" href="http://www.law.ed.ac.uk/ahrc/script-ed/vol5-2/nouwt.asp" rel="nofollow ugc noopener" target="_blank"&gt;geo-privacy&lt;/a&gt;, which refers to the protection of ‘information privacy’ with regard to geographic information. &lt;a class="jive-link-external-small" href="http://en.wikipedia.org/wiki/Virtual_private_network" rel="nofollow ugc noopener" target="_blank"&gt;Virtual Private Networks&lt;/a&gt;, or VPNs, have been used consistently for anonymous web browsing and IP address masking. Just make sure that your VPN provider &lt;a class="jive-link-external-small" href="http://www.ivpn.net/blog/when-law-enforcement-knocks-on-a-vpns-door-what-happens" rel="nofollow ugc noopener" target="_blank"&gt;does not log IP addresses&lt;/a&gt; and that they accept a &lt;a class="jive-link-external-small" href="http://www.how-to-hide-ip.info/2012/04/27/pay-for-your-vpn-subscription-with-bitcoin/" rel="nofollow ugc noopener" target="_blank"&gt;form of payment&lt;/a&gt; that does not link you to the transaction.&lt;/span&gt;&lt;/p&gt;&lt;p style="margin:0;"&gt;&lt;span style="font-family:&amp;#39;trebuchet ms&amp;#39;, geneva;font-size:12pt;"&gt;Additionally, the &lt;a class="jive-link-external-small" href="https://www.torproject.org/" rel="nofollow ugc noopener" target="_blank"&gt;Tor Project&lt;/a&gt; provides free software and an open network for privacy-oriented Internet usage. Intended to protect users’ personal freedom, privacy, and ability to conduct confidential business, Tor (The onion router) is a system that improves online anonymity by routing Internet traffic through a worldwide volunteer network of layering and encrypting servers which impedes &lt;a class="jive-link-external-small" href="http://en.wikipedia.org/wiki/Computer_surveillance#Network_surveillance" rel="nofollow ugc noopener" target="_blank"&gt;network surveillance&lt;/a&gt; or &lt;a class="jive-link-external-small" href="https://www.torproject.org/about/overview.html.en" rel="nofollow ugc noopener" target="_blank"&gt;traffic analysis&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;&lt;p style="margin:0;margin:15px 0;font-size:18px;color:#000000;font-family:Georgia, &amp;#39;Times New Roman&amp;#39;, serif;"&gt;&lt;span style="font-family:&amp;#39;trebuchet ms&amp;#39;, geneva;font-size:12pt;"&gt;The idea is that we all get familiar with this concepts so we can apply security methods on our own and be prepared in case is needed. I&amp;#39;ll keep documenting on this, so be alert! &lt;span&gt;&lt;a href="https://community.element14.com/resized-image/__size/16x16/__key/communityserver-wikis-components-files/00-00-00-00-88/contentimage_5F00_3.png"&gt;&lt;img loading="lazy" alt="image" src="https://community-storage.element14.com/communityserver-components-secureimagefileviewer/communityserver/wikis/components/files/00/00/00/00/88/contentimage_3.png-16x16.png?sv=2016-05-31&amp;amp;sr=b&amp;amp;sig=XeSRQbdXfqQ7r6A%2BQrv45pi26WzL44bG5EQ5T3KZp2E%3D&amp;amp;se=2026-04-11T23%3A59%3A59Z&amp;amp;sp=r&amp;amp;_=dTVpkup5yoe1It0VY5CD3A==" style="max-height: 16px;max-width: 16px;" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: information, security, private, info, crypto, encryption&lt;/div&gt;
</description></item></channel></rss>