Please Scroll Down to See Forums Below
napsgear
genezapharmateuticals
domestic-supply
puritysourcelabs
UGL OZ
UGFREAK
napsgeargenezapharmateuticals domestic-supplypuritysourcelabsUGL OZUGFREAK

Can my IP addy be traced if I'm using cyber-rights.net?

Any us company Phone or email has to have a direct line to C.A.L.E.A by 2005. T1's to phone switches and t1s or t3's to email servers. I work for a cell phone company and would get subpeonas all the time, now for a company to operate a switch even Voip which we have, must have a path built to CALEA
we don't even get in the middle any more. The local cops can say the money is going over seas to some agencies and no suppeona is needed now CALEA is involved. No local law enforcement or state is able to unencrypt your husmail. Local and state, they don't even need a computer husmail must and will hand over the info when they get the suppeona. and like I said CALEA aready has it.




PolfaJelfa said:
Stuck-"Any encryption that you can legally use can be decrypted by the right government agencies. That's part of them allowing that encryption to be widely used. It's important to differentiate between government and local law enforcement though"


Hushmail alone does not have any backdoor keys..LMFAO.. ( the code is widely available)
Please do not give advice if you do not know.
You do not understand how encryption works.
No one but you knows the keys..it is a comination of keys....its a multi step process.that looks like 1 step. Read how husmail works...you will learn something.
If you do not know the facts please do not give bad advice to people.

No one is goign to tap your hushmail accounts. Subpeona possible...However not with offshore servers...hence the entire idea.

Can they track what ip your sending it from sure......ISP records..

In order to crack the encryption of 2048 bitch cipher block chaining mode it takes enormous resources and agencies like NSA, CIA, DIA. They can not acces it...they have to run a mainframe cpu for a sustained period of time to gain the code....trillions of posibilities = big pain in the ass. No local law enforcement or state is able to unencrypt your husmail.

Unless you are under a millitary investigation or terrorist , etc... these organizations have nothing to do with you.

Anything can be cracked....it would take special access machines and agencies though and cost a enormous ammount of money.

If the police want you they will get you in other simpler ways! Search warrant, subpeona for you to give code.....secret agent, searching your cpu.

If they want you they can get you however, anything codable is uncodable.
 
What are you remotely talking about...we are not talking about cell phones. Or taps of lines....you can tapp all you want..it will remain unreadable info!

Hushmail or email company giving the Govt the encryption code....they GIVE THAT TO EVERYONE....the hushmail code is public as it can be modified and improved....there is work on it everyday..

This has nothing to do with you account. There is no way anyone has access to your info..even hushmail...that is the whole point of encryption. There is no such thing as a backdoor. Only you have the code.... without your code...which HUSMAIL DOES NOT KNOW OR STORE...learn how encyryption works.

Additionalty there are laws to prevent abuse and restrict the use of taps etc such as the 1986 ECPA ...Electronic Comunication Privacy Act...which tells of in which situations what is at the govs disposal for how long and what is needed.

If you know what encryption is then you would know ther is no such thing as backdoor.. Especialy when the alogarythms are publicaly published.....such as the Linux Code..... You can know how the system works...you still will not crack it.

Blowsish 2048-4086 b is published.....
Bothe cypher block chanining mode..and stationary codes are available in various applications besides hush.

You are just wrong.
Care to disprove me show me proof!
 
The only thing that is limited is the strenght (bits) of encryption.

Why because the govt needs to be able to crack the codes if needed ( national security etc) without having to use too much resources. Believe me cracking a 2048 bit system is hard work, or hundreds of millions of dollars in equipment to say the least.

Hell there are contest right now...on encryption web sites...with prizes over $500,000 for anyone who is able to crack diferent alogarythms of encryption at various strenghts.....No sucess! There is a reason..its not bread and butter.

Its same as reading a hard drive that had been wiped per DoD standars 7 wipe pass..including 1 random... VERY VERY HARD...posible yes.....practical ..HELL NO!!!
 
PolfaJelfa said:
What are you remotely talking about...we are not talking about cell phones. Or taps of lines....you can tapp all you want..it will remain unreadable info!

Hushmail or email company giving the Govt the encryption code....they GIVE THAT TO EVERYONE....the hushmail code is public as it can be modified and improved....there is work on it everyday..

This has nothing to do with you account. There is no way anyone has access to your info..even hushmail...that is the whole point of encryption. There is no such thing as a backdoor. Only you have the code.... without your code...which HUSMAIL DOES NOT KNOW OR STORE...learn how encyryption works.

Additionalty there are laws to prevent abuse and restrict the use of taps etc such as the 1986 ECPA ...Electronic Comunication Privacy Act...which tells of in which situations what is at the govs disposal for how long and what is needed.

If you know what encryption is then you would know ther is no such thing as backdoor.. Especialy when the alogarythms are publicaly published.....such as the Linux Code..... You can know how the system works...you still will not crack it.

Blowsish 2048-4086 b is published.....
Bothe cypher block chanining mode..and stationary codes are available in various applications besides hush.

You are just wrong.
Care to disprove me show me proof!


PolfaJelfa, it's not so true anymore , but it used to be that all internet communication is ran over lines ran by a phone company. Bell South , SBC , NTT do more then public telephone networks. ISDN , T1 , T3 were all serial based communications that originate at the phone company. Now cable companies are wiring fiber directly to peoples homes and I'm sure they have ways of tapping into those lines as well. Encryption software such as sshd had severe holes in them to where you could record a section of encrypted dataand send it back to the sshd server and the server would allow the attacker in! Basically decrypting the data may not even be necessary depending on what your attacking. OpenSSL is another piece of software that has had so many holes recently that Oracle stopped using it and made thier own encryption engine.

Don't assume that encrypted data solves all your problems , because it dont
 
Bro, i mean this with all due respect. BULSHIT

No one has any keys to hushmail type encryption ther are none....they are private public and authenticated. Over 3 keys+ passwords. They can tap your line all they want. No on eis going to break your encryption, unless your realy asking for it and there are millions of dollars invested in bringing you down. You people have no idea about how cryptography works.
 
PolfaJelfa said:
Bro, i mean this with all due respect. BULSHIT

No one has any keys to hushmail type encryption ther are none....they are private public and authenticated. Over 3 keys+ passwords. They can tap your line all they want. No on eis going to break your encryption, unless your realy asking for it and there are millions of dollars invested in bringing you down. You people have no idea about how cryptography works.

Several vulnerabilities just with hushmail
1. http://www.fribble.net/advisories/hushmail_14-06-04.txt
and http://www.fribble.net/advisories/hushmail_14-06-04.txt
Both attacks can be used to redirect users to an alternate website where the user puts in thier username and passphrase. At this point , there's no need for decryption since the attacker has thier passphrase.

2. Bugs in OpenPGP , which is the software HUSH uses. http://www.kb.cert.org/vuls/id/303094
They probably aren't all that vulnerable to this one unless someone is sniffing thier website for data. Which goes back to the tapping issues and packet sniffers such as tcpdump are widely used. There are holes in openpgp encryption technology that this attack attempts to take advantage of and will only be fixed to reimplementing openpgp. The rfc means requests for comments and generally this would go by and ietf draft which outlines exactly how the software should operate

So no BULLSHIT. You just need to stop typing what you think and listen to people that really know
 
Top Bottom