Bleep
-
- Vice Admiral
- Posts:2623
- Joined:Thu Dec 06, 2012 9:46 pm
- Affiliation:Nivanshae
- IGN:_Shadowcat_
- Location:Munching on important looking wires.
Re: Bleep
That's nice, I feel safe within my rights that my government is based off of so I don't really feel a need for this.
But hey, technology is technology no matter what your reasoning.
But hey, technology is technology no matter what your reasoning.
In yo ceiling, stealin yo wires
Do not open. Ever. At all. Enter at your own risk to life and limb.
Trigger warning
Bot gore warning
Memetic biohazard
Error bait
Do not open. Ever. At all. Enter at your own risk to life and limb.
Trigger warning
Bot gore warning
Memetic biohazard
Error bait
Spoiler:
-
- Vice Admiral
- Posts:2312
- Joined:Sun Dec 09, 2012 10:21 pm
- Affiliation:Strigiforme
- IGN:ACH0225
- Location:Cuuyth
Re: Bleep
Obviously a CIA/MI6/NSA run espionage wiretap.
mfw brony imagesfr0stbyte124 wrote:5 months from now, I will publish a paper on an efficient method for rendering millions of owls to a screen.
Spoiler:
- Tau
- Admin
- Posts:750
- Joined:Mon Dec 10, 2012 9:58 am
- Affiliation:Futureville Mafia
- IGN:TehPwnzor7306
- Location:Ancapistan
Re: Bleep
1. Closed source and made by an American company. Assuming backdoors are present until otherwise proven.
2. I can't find any information on what cryptographic protocols are used, or how clients communicate with each other (assuming this is a peer-to-peer solution, which it probably is). Until I see a whitepaper or spec-sheet, I refuse to pass judgement on how strong it is, but will just assume it's weak.
How is this better than using PGP and XMPP over Tor/I2P/cjdns?
EDIT: Okay, there's a technical description on the site. It uses a Kademlia-based DHT, and public keys are stored on the company's servers (except for incognito users, which require manual disclosure of keys). Actual messaging and calling apparently uses encrypted SIP over UDP packets. However, it says nothing about the encryption methods used other than that it's asymmetric. This renders a portion of my second point (partially) moot, but there's still the issues of closed-sourced-ness and lack of info on the encryption algorithms.
2. I can't find any information on what cryptographic protocols are used, or how clients communicate with each other (assuming this is a peer-to-peer solution, which it probably is). Until I see a whitepaper or spec-sheet, I refuse to pass judgement on how strong it is, but will just assume it's weak.
How is this better than using PGP and XMPP over Tor/I2P/cjdns?
EDIT: Okay, there's a technical description on the site. It uses a Kademlia-based DHT, and public keys are stored on the company's servers (except for incognito users, which require manual disclosure of keys). Actual messaging and calling apparently uses encrypted SIP over UDP packets. However, it says nothing about the encryption methods used other than that it's asymmetric. This renders a portion of my second point (partially) moot, but there's still the issues of closed-sourced-ness and lack of info on the encryption algorithms.
Vinyl wrote:"RP" and gaming and homosexuality is what's keeping [the forum] afloat.
-
- Vice Admiral
- Posts:2623
- Joined:Thu Dec 06, 2012 9:46 pm
- Affiliation:Nivanshae
- IGN:_Shadowcat_
- Location:Munching on important looking wires.
Re: Bleep
I like how there's a comment on that page almost exactly like this.Tau wrote:1. Closed source and made by an American company. Assuming backdoors are present until otherwise proven.
2. I can't find any information on what cryptographic protocols are used, or how clients communicate with each other (assuming this is a peer-to-peer solution, which it probably is). Until I see a whitepaper or spec-sheet, I refuse to pass judgement on how strong it is, but will just assume it's weak.
How is this better than using PGP and XMPP over Tor/I2P/cjdns?
EDIT: Okay, there's a technical description on the site. It uses a Kademlia-based DHT, and public keys are stored on the company's servers (except for incognito users, which require manual disclosure of keys). Actual messaging and calling apparently uses encrypted SIP over UDP packets. However, it says nothing about the encryption methods used other than that it's asymmetric. This renders a portion of my second point (partially) moot, but there's still the issues of closed-sourced-ness and lack of info on the encryption algorithms.
In yo ceiling, stealin yo wires
Do not open. Ever. At all. Enter at your own risk to life and limb.
Trigger warning
Bot gore warning
Memetic biohazard
Error bait
Do not open. Ever. At all. Enter at your own risk to life and limb.
Trigger warning
Bot gore warning
Memetic biohazard
Error bait
Spoiler:
-
- Vice Admiral
- Posts:2312
- Joined:Sun Dec 09, 2012 10:21 pm
- Affiliation:Strigiforme
- IGN:ACH0225
- Location:Cuuyth
Re: Bleep
Should really just have a one time pad for top secret communications. Nobody can de-encrypt that shit.
mfw brony imagesfr0stbyte124 wrote:5 months from now, I will publish a paper on an efficient method for rendering millions of owls to a screen.
Spoiler:
-
- Vice Admiral
- Posts:2623
- Joined:Thu Dec 06, 2012 9:46 pm
- Affiliation:Nivanshae
- IGN:_Shadowcat_
- Location:Munching on important looking wires.
Re: Bleep
You know what the government can't spy on? A letter sealed with wax is pretty hard to look at undetected.ACH0225 wrote:Should really just have a one time pad for top secret communications. Nobody can de-encrypt that shit.
GASP mail!? What blasphemy is this?! Writing on paper?!
In yo ceiling, stealin yo wires
Do not open. Ever. At all. Enter at your own risk to life and limb.
Trigger warning
Bot gore warning
Memetic biohazard
Error bait
Do not open. Ever. At all. Enter at your own risk to life and limb.
Trigger warning
Bot gore warning
Memetic biohazard
Error bait
Spoiler: