encryption algorithm

Matt D md123 at nycap.rr.com
Wed Dec 18 05:14:29 CET 2013


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 12/17/2013 11:02 PM, Robert J. Hansen wrote:
> On 12/17/2013 10:57 PM, Matt D wrote:
>> Lets assume I run Ubuntu live from USB stick or cd when I need
>> secure messaging so an attacker cannot predict what machine i
>> will send my message from and there will be nothing left on the
>> machine.  The encrypted message is captured but the adversary
>> does not have access to me.  What sort of attack has any chance
>> to decrypt the message?
> 
> Beating your kneecaps into pulp, hiring a hooker to persuade the
> secret out of you, beating your recipient's kneecaps into pulp,
> hiring a hooker to persuade the secret out of your correspondent,
> Van Eycking your terminal, Van Eycking your recipient's terminal,
> figuring out a way to plant an exploit on your USB stick... I could
> go on for quite some time, but you get the idea.  The best ways to
> recover the message do not involve cryptanalysis, and the
> non-cryptanalytic means are devastatingly effective.
> 
So in other words the message can not be read by some govt genius with
a rack of computers??

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.21 (GNU/Linux)
Comment: MacGPG2 - http://www.gpgtools.org/macgpg2.html
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/

iQEcBAEBAgAGBQJSsSElAAoJECrdp7MWSIVb4tIH/j3GJ91LkIEWOKyJ12VD0zkZ
PH2by0RFWP6EIZWcek2zCtwbte1u5EiF4qqrVhkkSs+mQD+K87rdZMZFGsTjqxzL
j8u8leyOOUm6jWXzLvncIVG5qYO6Tk1xIFKvNZK34hgnpxJ4JZm4tuzlgbK6S803
8A0i9beBITbFGrUIqr4/Xn9Ir9UOJEW7knhTZZnv1168p4sN4tuq5ei42yespAkz
HWMEtCyrI/xQHjc2YQB4mp9UnRAxIos0P8mdtJhN6ZSw6+UTFH30kSPslq159rWO
cT8LYxfd7wZwcS36mbXpWU8U6cxzXQp3/KcZ9ffJJsi7etnKCUCNLUOvigbfz9U=
=EAPZ
-----END PGP SIGNATURE-----



More information about the Gnupg-users mailing list