pa2a.org


Share Thread:  
Silent Circle, The New Encryption App That Is Terrifying The Government
#1
http://www.disinfo.com/2013/02/silent-ci...overnment/

Worth looking into especially with a pay as you go smart phone with no personal info.




Peace Until, ItsTime
Reply
#2
This intrigues me.
Interdum feror cupidine partium magnarum Europae vincendarum
Reply
#3
Does seem neat. Here are some related links

https://play.google.com/store/apps/detai...ilentphone

https://silentcircle.com/

https://www.youtube.com/user/CircledUp?feature=watch

The comments left on Google play are interesting though. Seems it may need some work.
[Image: picsay-1358258813.jpg]
Reply
#4
Without knowing the kind of encryption that's being used and how strong it is against brute forcing then I'm not sure it's going to be good. While the shredding idea is interesting, only the files that exist on the phones would be shredded a copy of that file that was plucked midstream of the network wouldn't be. Thus giving someone all the time in the world to brute force it.
Reply
#5
streaker69;83338 Wrote:Without knowing the kind of encryption that's being used and how strong it is against brute forcing then I'm not sure it's going to be good. While the shredding idea is interesting, only the files that exist on the phones would be shredded a copy of that file that was plucked midstream of the network wouldn't be. Thus giving someone all the time in the world to brute force it.

Is there really a way around that though? Unless you are in close proximity with the other device and send it directly.
Reply
#6
bac0nfat;83366 Wrote:
streaker69;83338 Wrote:Without knowing the kind of encryption that's being used and how strong it is against brute forcing then I'm not sure it's going to be good. While the shredding idea is interesting, only the files that exist on the phones would be shredded a copy of that file that was plucked midstream of the network wouldn't be. Thus giving someone all the time in the world to brute force it.

Is there really a way around that though? Unless you are in close proximity with the other device and send it directly.

That would be the only way really. If you're sending anything out over the internet, it can be intercepted by a MiTM. Right now there's a huge MiTM in an underground bunker.

The question then comes in, is whatever is inside that file worth the time/effort to crack it, that is, if it doesn't already have a backdoor into it or the encryption method isn't weak.
Reply






Possibly Related Threads...
Thread Author Replies Views Last Post
  Chinese Government Run Media Shows Plans for Nuke Strike on U.S. Cities das 7 868 05-21-2015, 02:33 PM
Last Post: Uinta Firearms
  Government shoving beliefs down throats JustinHEMI 4 811 10-09-2014, 08:39 AM
Last Post: Camper
  Government shoving beliefs down throats RugerGirl 28 1,849 10-08-2014, 06:12 PM
Last Post: Mr_Gixxer
  Online rants, anti-government radicals fuel fear of U.S. cop killings das 3 690 08-12-2014, 03:17 PM
Last Post: das
  Utah man wanted to bomb police station, hoped to cause anti-government uprising das 2 507 07-13-2014, 10:12 AM
Last Post: das



Users browsing this thread: 1 Guest(s)

Software by MyBB, © 2002-2015 MyBB Group.
Template by Modogodo Design.