Please Scroll Down to See Forums Below
napsgear
genezapharmateuticals
domestic-supply
puritysourcelabs
UGL OZ
UGFREAK
napsgeargenezapharmateuticals domestic-supplypuritysourcelabsUGL OZUGFREAK

Can my IP addy be traced if I'm using cyber-rights.net?

kbrkbr

New member
I just placed an order with a domestic source and when I pressed "send," cyber-rights came back with a message "Cannot find public keys for the following address."

This got me wondering whether the message I sent could be used to track my IP number back to my computer. My understanding is that if the message was sent encrypted, then the message couldn't be tracked back to me. But if cyber-rights DIDN'T encrypt it, then could I be exposed?

Yup, feeling a little paranoid this morning. :p
 
Kbrkbr that message just means your message was not encrypted because the person's email address you were sending it to is not a secure one like Cyber-rights, or ZipLip. It would be like me sending an encrypted Cyber-rights email to a Hotmail user. Hotmail has no clue how to handle the encryption. You can uncheck the checkmark that says Encrypt Email before sending and you won't get that message. The person you are sending the email to should really think about getting an encrypted email address. Afterall, they are free.
 
Snarling Force said:
Kbrkbr that message just means your message was not encrypted because the person's email address you were sending it to is not a secure one like Cyber-rights, or ZipLip. It would be like me sending an encrypted Cyber-rights email to a Hotmail user. Hotmail has no clue how to handle the encryption. You can uncheck the checkmark that says Encrypt Email before sending and you won't get that message. The person you are sending the email to should really think about getting an encrypted email address. Afterall, they are free.

On a serious note, that's exactly what i was thinking.
 
Snarling Force said:
Kbrkbr that message just means your message was not encrypted because the person's email address you were sending it to is not a secure one like Cyber-rights, or ZipLip. It would be like me sending an encrypted Cyber-rights email to a Hotmail user. Hotmail has no clue how to handle the encryption. You can uncheck the checkmark that says Encrypt Email before sending and you won't get that message. The person you are sending the email to should really think about getting an encrypted email address. Afterall, they are free.

Close. They have to be using the SAME encryption system, EF uses hushmail so mail to other systems using hushmail will be encrypted.
 
kbrkbr said:
I just placed an order with a domestic source and when I pressed "send," cyber-rights came back with a message "Cannot find public keys for the following address."

This got me wondering whether the message I sent could be used to track my IP number back to my computer. My understanding is that if the message was sent encrypted, then the message couldn't be tracked back to me. But if cyber-rights DIDN'T encrypt it, then could I be exposed?

Yup, feeling a little paranoid this morning. :p

Short answer, unless cyber-rights gave out your IP, there would be no way of knowing who sent the message since it's relayed via the Cyber/Hush servers - not fhrough your computer.

Now if you question is if the feds can find all that stuff on your computer later, yeah they can, so wipe your drive clean!

Mr.X
 
I get the same sometimes with my hushmail. You just don't send the mail if it won't encrypt. I would'nt deal with a guy that didn't have secure mail. That seems way to dangerous to me.
 
mposster said:
which hard drive cleaner is a good one to use...?

The best way to make a drive unreadable is to take an electric drill and put 2-3 holes in it.
 
cool....try it on yours and let me know how it works....if there are any none smart asses on this thread today..would like some assistance with ?..thanks...
Dial_tone said:
The best way to make a drive unreadable is to take an electric drill and put 2-3 holes in it.
 
kbrkbr said:
I just placed an order with a domestic source and when I pressed "send," cyber-rights came back with a message "Cannot find public keys for the following address."

This got me wondering whether the message I sent could be used to track my IP number back to my computer. My understanding is that if the message was sent encrypted, then the message couldn't be tracked back to me. But if cyber-rights DIDN'T encrypt it, then could I be exposed?

Yup, feeling a little paranoid this morning. :p

There are a million and 5 tools for doing such a thing
 
Mr.X said:
you overwrite free space?

my programmer is a geek wizard and handles that shit for every 2 weeks..
the only thing i know about computers is how to answer emails.. lol

and oh.. surf the porn site.. REALLY good at that too...
 
satchboogie said:
my programmer is a geek wizard and handles that shit for every 2 weeks..
the only thing i know about computers is how to answer emails.. lol

and oh.. surf the porn site.. REALLY good at that too...
well satch i think most of us could get an A in a computer class on porn, but hell yeah that other shit is impossible to do.
 
this is not entirely true. Theres no way to completely delete all info from a hardrive. If feds wants to get you real bad because your doing something that gets the feds attention (not just buying personal gear), they can get the info off your hardrive using sophisticated shiznit. The only way to destroy the info is to melt the hardrive. However they will only go after you if say your a big time source moving large amounts gear.

And as for the ip addresses cyber-rights and hushmail log your ip address and they cooperate with the authorities therefore if your doing something bad they will give out your ip so that you can be traced. Your ISP will do the same.
 
dr0832 said:
this is not entirely true. Theres no way to completely delete all info from a hardrive. If feds wants to get you real bad because your doing something that gets the feds attention (not just buying personal gear), they can get the info off your hardrive using sophisticated shiznit. The only way to destroy the info is to melt the hardrive. However they will only go after you if say your a big time source moving large amounts gear.

And as for the ip addresses cyber-rights and hushmail log your ip address and they cooperate with the authorities therefore if your doing something bad they will give out your ip so that you can be traced. Your ISP will do the same.

You're just paranoid. zero-ing a drive will render all data erased as the data that used to be there is now replaced with all "0"'s
 
wayneboard1 said:
I have found a gigantic magnet works well. :p


Yep, make an electromagnet that is big enough to set the HD in, use a slow alternating source, ain't nobody reading that data.
 
gjohnson5 said:
You're just paranoid. zero-ing a drive will render all data erased as the data that used to be there is now replaced with all "0"'s
No he is right. The only way to get everything off of your hard drive is to destroy it completely.
 
quadkilla31 said:
No he is right. The only way to get everything off of your hard drive is to destroy it completely.

No you're both wrong. There are gov't standards for data removal and programs such as this conform to those standards

http://www.killdisk.com/

Revocery from low level format (which is supposed to write zero across all sectors of the disk) is impossible to recover from

http://www.hardwaresecrets.com/article/138

So, in the same way it happens when we delete files, the hard drive isn't really "zeroed" when we format it. In order to really "zero" your hard drive, use utilities like Zero Fill from Quantum (click here to download it). This utility fills all sectors from your hard drive with zeros, making it impossible to recover any data after this utility is run, what doesn't happen when you use the normal format procedure. You can also use the so-called "low-level format utilities". These programs fill all sectors with zeros as well. You must download the software accordingly to your hard drive manufacturer. In our download section you will find low level format utilities for the most common hard disk drive manufacturers.
 
Some people mask their IP addresses when they LOG-IN to hushmail (or this site for that matter) so that they are INVISIBLE on the net (no IP to trace ANYWHERE). I hear GhostSurf is good for this. Some of the reviewers at C-Net and PC Mag seem to agree, I am told. I think GhostSurf also has a drive wiper that meet DeptofDefense standards and uses a funky algorithm to generate random numbers for that process. Sounds good to me! Thinking about dropping some dough on this software.

-Roatan


gjohnson5 said:
No you're both wrong. There are gov't standards for data removal and programs such as this conform to those standards

http://www.killdisk.com/

Revocery from low level format (which is supposed to write zero across all sectors of the disk) is impossible to recover from

http://www.hardwaresecrets.com/article/138

So, in the same way it happens when we delete files, the hard drive isn't really "zeroed" when we format it. In order to really "zero" your hard drive, use utilities like Zero Fill from Quantum (click here to download it). This utility fills all sectors from your hard drive with zeros, making it impossible to recover any data after this utility is run, what doesn't happen when you use the normal format procedure. You can also use the so-called "low-level format utilities". These programs fill all sectors with zeros as well. You must download the software accordingly to your hard drive manufacturer. In our download section you will find low level format utilities for the most common hard disk drive manufacturers.
 
You also may have just mistyped the email address if the recipient IS using encrypted email. I have done this before...

Roatan

kbrkbr said:
I just placed an order with a domestic source and when I pressed "send," cyber-rights came back with a message "Cannot find public keys for the following address."

This got me wondering whether the message I sent could be used to track my IP number back to my computer. My understanding is that if the message was sent encrypted, then the message couldn't be tracked back to me. But if cyber-rights DIDN'T encrypt it, then could I be exposed?

Yup, feeling a little paranoid this morning. :p
 
Everthing can be traced or taped. Phone or internet. I work for a cell phone co. and now the goverment has to be able to tap and trace any call even IP. c.a.l.e.a is watching and listing. A internet email company has to give the encryption keys to gov. in order to operate and also give trap access. So don't worry becuase there really is nothing you can do but take a chance.
 
Any encryption that you can legally use can be decrypted by the right government agencies. That's part of them allowing that encryption to be widely used. It's important to differentiate between government and local law enforcement though.

If you're accessing hushmail / cyberrights / etc from your computer directly, those services have your IP address. Law enforcement would then need to subpoena that service to obtain your IP. Then, they would need to subpoena your ISP to match your IP address to your home address. Cyber-rights.net and hushmail look to be based out of Canada. So while it may add one more hurdle to the subpoena process, it's not totally unfeasible for them to get your IP info.

Wiping your hard drive won't prevent your visits to a site from being logged, but it will give law enforcement less information in the event they raid your house. Granted, if they're raiding your house, they know who you are and have already done the above (subpoenas) anyway.

I don't think the "end user" really needs to worry about these things. There's alot you can do to attempt to cover your tracks, but if the upper echelon of law enforcement is gunning for you, they're going to track you down eventually.
 
There are CD's available for download that have Linux OS bootable on them. You just boot to this CD and you have an operating system that is 100% run in the RAM on your machine and nothing touches the drives. YOu can disconnect your hard drives and still run this and surf the net. Once your machine is turned off there is 100% no trace to where you have been except by IP through your ISP. Get a VPN client that goes overseas and you are 100% safe with no questions.
Problem solved and you can get said solutions free on the net and there are 100's of possibilities for it
 
Let's talk this through. Very interesting. If you mask your IP address when logging in to Hushmail, Hush has no record of your IP to give even under order of subpoena. And I'm not sure about this but I think that even though a govt agent/agency may know how hush encryption works, they need an individual's encryption key to unlock it. And that would require a subpoena and therefore probably cause or some other evidence to get that subpoena, right? Thoughts anyone. This is facinating. :rolleyes:

Roatan


stuck said:
Any encryption that you can legally use can be decrypted by the right government agencies. That's part of them allowing that encryption to be widely used. It's important to differentiate between government and local law enforcement though.

If you're accessing hushmail / cyberrights / etc from your computer directly, those services have your IP address. Law enforcement would then need to subpoena that service to obtain your IP. Then, they would need to subpoena your ISP to match your IP address to your home address. Cyber-rights.net and hushmail look to be based out of Canada. So while it may add one more hurdle to the subpoena process, it's not totally unfeasible for them to get your IP info.

Wiping your hard drive won't prevent your visits to a site from being logged, but it will give law enforcement less information in the event they raid your house. Granted, if they're raiding your house, they know who you are and have already done the above (subpoenas) anyway.

I don't think the "end user" really needs to worry about these things. There's alot you can do to attempt to cover your tracks, but if the upper echelon of law enforcement is gunning for you, they're going to track you down eventually.
 
use an offshore email comp. they are out there

mask your ip before logging on to the mail server

do not send anything unencrypted

TRUST YOUR SOURCE

and you can wipe a drive EASILY if you know what your doing.
 
satchboogie said:
i erase all records on my machine every 2 weeks..
can never be too safe..

Yep , Erase ALL with something like DiskWiper and change email addresses often.
I do this shit for a living and the fact is if they want you bad enough they can get you, even your hush mail. Trick is unless your last name is binladen cracking encrypted email is just not worth it.
 
Stuck-"Any encryption that you can legally use can be decrypted by the right government agencies. That's part of them allowing that encryption to be widely used. It's important to differentiate between government and local law enforcement though"


Hushmail alone does not have any backdoor keys..LMFAO.. ( the code is widely available)
Please do not give advice if you do not know.
You do not understand how encryption works.
No one but you knows the keys..it is a comination of keys....its a multi step process.that looks like 1 step. Read how husmail works...you will learn something.
If you do not know the facts please do not give bad advice to people.

No one is goign to tap your hushmail accounts. Subpeona possible...However not with offshore servers...hence the entire idea.

Can they track what ip your sending it from sure......ISP records..

In order to crack the encryption of 2048 bitch cipher block chaining mode it takes enormous resources and agencies like NSA, CIA, DIA. They can not acces it...they have to run a mainframe cpu for a sustained period of time to gain the code....trillions of posibilities = big pain in the ass. No local law enforcement or state is able to unencrypt your husmail.

Unless you are under a millitary investigation or terrorist , etc... these organizations have nothing to do with you.

Anything can be cracked....it would take special access machines and agencies though and cost a enormous ammount of money.

If the police want you they will get you in other simpler ways! Search warrant, subpeona for you to give code.....secret agent, searching your cpu.

If they want you they can get you however, anything codable is uncodable.
 
PolfaJelfa said:
Stuck-"Any encryption that you can legally use can be decrypted by the right government agencies. That's part of them allowing that encryption to be widely used. It's important to differentiate between government and local law enforcement though"


Hushmail alone does not have any backdoor keys..LMFAO.. ( the code is widely available)
Please do not give advice if you do not know.
You do not understand how encryption works.

Bro I don't want to start a pissing contest but you quoted what I said, told me I don't understand how it works, then went on to say upper level govt would be the only ones capable of cracking the encryption, which is exactly what I said above. I'm very familar with how pgp uses 3des/aes/blowfish/twofish etc work because I work with all of them on a daily basis.

As I said before, "It's important to differentiate between government and local law enforcement." So, I agree with you. Unless you're a dealer pushing massive amounts of illegal stuff and using hushmail, no one here has to worry about the security of their encrypted email being compromised. The bulk of my post dealt with the subpoenas for IP/Account information, so I think that first part was taken a little out of context. My intent was not to scaremonger or take a shot at encrypted mail services. I use cyber-rights on a regular basis and think they provide an excellent service.
 
stuck said:
Bro I don't want to start a pissing contest but you quoted what I said, told me I don't understand how it works, then went on to say upper level govt would be the only ones capable of cracking the encryption, which is exactly what I said above. I'm very familar with how pgp uses 3des/aes/blowfish/twofish etc work because I work with all of them on a daily basis.

As I said before, "It's important to differentiate between government and local law enforcement." So, I agree with you. Unless you're a dealer pushing massive amounts of illegal stuff and using hushmail, no one here has to worry about the security of their encrypted email being compromised. The bulk of my post dealt with the subpoenas for IP/Account information, so I think that first part was taken a little out of context. My intent was not to scaremonger or take a shot at encrypted mail services. I use cyber-rights on a regular basis and think they provide an excellent service.

Bro you sound like a smart guy...i meant no offense..hope you didnt take any....I just felt the need to make a clearer distinction between local and military etc.
 
PolfaJelfa said:
Bro you sound like a smart guy...i meant no offense..hope you didnt take any....I just felt the need to make a clearer distinction between local and military etc.

None taken, and I agree with you. Thank you.
 
Any us company Phone or email has to have a direct line to C.A.L.E.A by 2005. T1's to phone switches and t1s or t3's to email servers. I work for a cell phone company and would get subpeonas all the time, now for a company to operate a switch even Voip which we have, must have a path built to CALEA
we don't even get in the middle any more. The local cops can say the money is going over seas to some agencies and no suppeona is needed now CALEA is involved. No local law enforcement or state is able to unencrypt your husmail. Local and state, they don't even need a computer husmail must and will hand over the info when they get the suppeona. and like I said CALEA aready has it.




PolfaJelfa said:
Stuck-"Any encryption that you can legally use can be decrypted by the right government agencies. That's part of them allowing that encryption to be widely used. It's important to differentiate between government and local law enforcement though"


Hushmail alone does not have any backdoor keys..LMFAO.. ( the code is widely available)
Please do not give advice if you do not know.
You do not understand how encryption works.
No one but you knows the keys..it is a comination of keys....its a multi step process.that looks like 1 step. Read how husmail works...you will learn something.
If you do not know the facts please do not give bad advice to people.

No one is goign to tap your hushmail accounts. Subpeona possible...However not with offshore servers...hence the entire idea.

Can they track what ip your sending it from sure......ISP records..

In order to crack the encryption of 2048 bitch cipher block chaining mode it takes enormous resources and agencies like NSA, CIA, DIA. They can not acces it...they have to run a mainframe cpu for a sustained period of time to gain the code....trillions of posibilities = big pain in the ass. No local law enforcement or state is able to unencrypt your husmail.

Unless you are under a millitary investigation or terrorist , etc... these organizations have nothing to do with you.

Anything can be cracked....it would take special access machines and agencies though and cost a enormous ammount of money.

If the police want you they will get you in other simpler ways! Search warrant, subpeona for you to give code.....secret agent, searching your cpu.

If they want you they can get you however, anything codable is uncodable.
 
What are you remotely talking about...we are not talking about cell phones. Or taps of lines....you can tapp all you want..it will remain unreadable info!

Hushmail or email company giving the Govt the encryption code....they GIVE THAT TO EVERYONE....the hushmail code is public as it can be modified and improved....there is work on it everyday..

This has nothing to do with you account. There is no way anyone has access to your info..even hushmail...that is the whole point of encryption. There is no such thing as a backdoor. Only you have the code.... without your code...which HUSMAIL DOES NOT KNOW OR STORE...learn how encyryption works.

Additionalty there are laws to prevent abuse and restrict the use of taps etc such as the 1986 ECPA ...Electronic Comunication Privacy Act...which tells of in which situations what is at the govs disposal for how long and what is needed.

If you know what encryption is then you would know ther is no such thing as backdoor.. Especialy when the alogarythms are publicaly published.....such as the Linux Code..... You can know how the system works...you still will not crack it.

Blowsish 2048-4086 b is published.....
Bothe cypher block chanining mode..and stationary codes are available in various applications besides hush.

You are just wrong.
Care to disprove me show me proof!
 
The only thing that is limited is the strenght (bits) of encryption.

Why because the govt needs to be able to crack the codes if needed ( national security etc) without having to use too much resources. Believe me cracking a 2048 bit system is hard work, or hundreds of millions of dollars in equipment to say the least.

Hell there are contest right now...on encryption web sites...with prizes over $500,000 for anyone who is able to crack diferent alogarythms of encryption at various strenghts.....No sucess! There is a reason..its not bread and butter.

Its same as reading a hard drive that had been wiped per DoD standars 7 wipe pass..including 1 random... VERY VERY HARD...posible yes.....practical ..HELL NO!!!
 
PolfaJelfa said:
What are you remotely talking about...we are not talking about cell phones. Or taps of lines....you can tapp all you want..it will remain unreadable info!

Hushmail or email company giving the Govt the encryption code....they GIVE THAT TO EVERYONE....the hushmail code is public as it can be modified and improved....there is work on it everyday..

This has nothing to do with you account. There is no way anyone has access to your info..even hushmail...that is the whole point of encryption. There is no such thing as a backdoor. Only you have the code.... without your code...which HUSMAIL DOES NOT KNOW OR STORE...learn how encyryption works.

Additionalty there are laws to prevent abuse and restrict the use of taps etc such as the 1986 ECPA ...Electronic Comunication Privacy Act...which tells of in which situations what is at the govs disposal for how long and what is needed.

If you know what encryption is then you would know ther is no such thing as backdoor.. Especialy when the alogarythms are publicaly published.....such as the Linux Code..... You can know how the system works...you still will not crack it.

Blowsish 2048-4086 b is published.....
Bothe cypher block chanining mode..and stationary codes are available in various applications besides hush.

You are just wrong.
Care to disprove me show me proof!


PolfaJelfa, it's not so true anymore , but it used to be that all internet communication is ran over lines ran by a phone company. Bell South , SBC , NTT do more then public telephone networks. ISDN , T1 , T3 were all serial based communications that originate at the phone company. Now cable companies are wiring fiber directly to peoples homes and I'm sure they have ways of tapping into those lines as well. Encryption software such as sshd had severe holes in them to where you could record a section of encrypted dataand send it back to the sshd server and the server would allow the attacker in! Basically decrypting the data may not even be necessary depending on what your attacking. OpenSSL is another piece of software that has had so many holes recently that Oracle stopped using it and made thier own encryption engine.

Don't assume that encrypted data solves all your problems , because it dont
 
Bro, i mean this with all due respect. BULSHIT

No one has any keys to hushmail type encryption ther are none....they are private public and authenticated. Over 3 keys+ passwords. They can tap your line all they want. No on eis going to break your encryption, unless your realy asking for it and there are millions of dollars invested in bringing you down. You people have no idea about how cryptography works.
 
PolfaJelfa said:
Bro, i mean this with all due respect. BULSHIT

No one has any keys to hushmail type encryption ther are none....they are private public and authenticated. Over 3 keys+ passwords. They can tap your line all they want. No on eis going to break your encryption, unless your realy asking for it and there are millions of dollars invested in bringing you down. You people have no idea about how cryptography works.

Several vulnerabilities just with hushmail
1. http://www.fribble.net/advisories/hushmail_14-06-04.txt
and http://www.fribble.net/advisories/hushmail_14-06-04.txt
Both attacks can be used to redirect users to an alternate website where the user puts in thier username and passphrase. At this point , there's no need for decryption since the attacker has thier passphrase.

2. Bugs in OpenPGP , which is the software HUSH uses. http://www.kb.cert.org/vuls/id/303094
They probably aren't all that vulnerable to this one unless someone is sniffing thier website for data. Which goes back to the tapping issues and packet sniffers such as tcpdump are widely used. There are holes in openpgp encryption technology that this attack attempts to take advantage of and will only be fixed to reimplementing openpgp. The rfc means requests for comments and generally this would go by and ietf draft which outlines exactly how the software should operate

So no BULLSHIT. You just need to stop typing what you think and listen to people that really know
 
Thank you.
PS: The packet sniffers we use at are office can pick out packets on a 160Gig
fiber path no problem. User names, passwords anything.
gjohnson5 said:
Several vulnerabilities just with hushmail
1. http://www.fribble.net/advisories/hushmail_14-06-04.txt
and http://www.fribble.net/advisories/hushmail_14-06-04.txt
Both attacks can be used to redirect users to an alternate website where the user puts in thier username and passphrase. At this point , there's no need for decryption since the attacker has thier passphrase.

2. Bugs in OpenPGP , which is the software HUSH uses. http://www.kb.cert.org/vuls/id/303094
They probably aren't all that vulnerable to this one unless someone is sniffing thier website for data. Which goes back to the tapping issues and packet sniffers such as tcpdump are widely used. There are holes in openpgp encryption technology that this attack attempts to take advantage of and will only be fixed to reimplementing openpgp. The rfc means requests for comments and generally this would go by and ietf draft which outlines exactly how the software should operate

So no BULLSHIT. You just need to stop typing what you think and listen to people that really know
 
gjohnson5 said:
Several vulnerabilities just with hushmail
1. http://www.fribble.net/advisories/hushmail_14-06-04.txt
and http://www.fribble.net/advisories/hushmail_14-06-04.txt
Both attacks can be used to redirect users to an alternate website where the user puts in thier username and passphrase. At this point , there's no need for decryption since the attacker has thier passphrase.

2. Bugs in OpenPGP , which is the software HUSH uses. http://www.kb.cert.org/vuls/id/303094
They probably aren't all that vulnerable to this one unless someone is sniffing thier website for data. Which goes back to the tapping issues and packet sniffers such as tcpdump are widely used. There are holes in openpgp encryption technology that this attack attempts to take advantage of and will only be fixed to reimplementing openpgp. The rfc means requests for comments and generally this would go by and ietf draft which outlines exactly how the software should operate

So no BULLSHIT. You just need to stop typing what you think and listen to people that really know


Hush does not use standard PGP....it is diferent. It is similar to PGP but not it. Packet sniffers..lmfao...packet sniffers....to snif encrypted data. You still miss the point. Site redirects..lmfao.....if you know what you are doing you know where you are connecting from. You have not proven a thing. Im still waiting for you to shwo me how someone is goign to crack my husmail account.
 
PolfaJelfa said:
Hush does not use standard PGP....it is diferent. It is similar to PGP but not it. Packet sniffers..lmfao...packet sniffers....to snif encrypted data. You still miss the point. Site redirects..lmfao.....if you know what you are doing you know where you are connecting from. You have not proven a thing. Im still waiting for you to shwo me how someone is goign to crack my husmail account.


I really don't wanna waste much more of my time iwht you but...
Hush's pgp engine is based ff openpgp and hence they are listed as vulnerable in the cert security alert.

Yes , sniff encrypted data. This is the point of the vulnerability. There are validity checks to see if the encryption is accurate or not and by gathering enugh data , an attacker (in the middle) is able to decrypt pieces of the transmission.

This is the part that yu don't get. Encrypted data is nt totally indecipherable if you understand the algrithm that created the encryption.
 
You are talking about people using the Cylindrical values ..used to verify the acuracy among other methods? You can not decrypt anything from that...tha tin itself is protected by diferent validations. Iven if you were to un-encrypt a section you still would not know jakc as the encryption is made in a way as all info is scrambled an d kept at diferent "sectors".

I know what i know bro, so do you. I see we will not be able to come to an agreement. :)
 
PolfaJelfa said:
You are talking about people using the Cylindrical values ..used to verify the acuracy among other methods? You can not decrypt anything from that...tha tin itself is protected by diferent validations. Iven if you were to un-encrypt a section you still would not know jakc as the encryption is made in a way as all info is scrambled an d kept at diferent "sectors".

I know what i know bro, so do you. I see we will not be able to come to an agreement. :)

We're not going to agree simply because you're wrong...

The cbc mode attacks are also problematic in ipsec technlogy as well. PGP isn't the nly thing effected. CBC mde encryption is just flawed. Which is exactly what Ive been trying to say all along. Encrypted data is NOT infallable.

here are the same trubles in IPSEC land
CVE number: CAN-2005-0039

IPsec consists of several separate protocols; these include:

* Authentication Header (AH): provides authenticity guarantees for packets, by attaching strong

cryptographic checksum to packets.

* Encapsulating Security Payload (ESP): provides confidentiality guarantees for packets, by
encrypting packets with encryption algorithms. ESP also provides optional authentication
services
for packets.

* Internet Key Exchange (IKE): provide ways to securely negotiate shared keys.

AH and ESP has two modes of use: transport mode and tunnel mode. With ESP in tunnel mode, an IP
packet (called the inner packet) is encrypted in its entirety and is used to form the payload of
a new packet (called the outer packet); ESP typically uses CBC-mode encryption to provide
confidentiality. However, without some form of integrity protection, CBC-mode encrypted
data is vulnerable to modification by an active attacker.

By making careful modifications to selected portions of the payload of the outer packet, an
attacker can effect controlled changes to the header of the inner (encrypted) packet. The modified
inner packet is subsequently processed by the IP software on the receiving security gateway or the
endpoint host; the inner packet, in cleartext form, may be redirected or certain error messages
may be produced and communicated by ICMP. Because of the design of ICMP, these messages directly
reveal cleartext segments of the header and payload of the inner packet. If these messages can be
intercepted by an attacker, then plaintext data is revealed.

Attacks exploiting these vulnerabilities rely on the following:

* Exploitation of the well-known bit flipping weakness of CBC mode encryption.

* Lack of integrity protection for inner packets.

* Interaction between IPsec processing and IP processing on security gateways and end hosts.


These attacks can be fully automated so as to recover the entire contents of multiple
IPsec-protected inner packets.

In more detail, the three identified attacks on ESP in tunnel mode when integrity protection is not

present work as follows:

1. Destination Address Rewriting

* An attacker modifies the destination IP address of the encrypted (inner) packet by bit-
flipping in the payload of the outer packet.
* The security gateway decrypts the outer payload to recover the (modified) inner packet.
* The gateway then routes the inner packet according to its (modified) destination IP address.
* If successful, the "plaintext" inner datagram arrives at a host of the attacker's choice.

2. IP Options

* An attacker modifies the header length of the encrypted (inner) packet by bit-flipping in the

payload of the outer packet.
* The security gateway decrypts the outer payload to recover the (modified) inner packet.
* The gateway then performs IP options processing on the inner packet because of the modified
header length, with the first part of the inner payload being interpreted as options bytes.
* With some probability, options processing will result in the generation of an ICMP "parameter

problem" message.
* The ICMP message is routed to the now modified source address of the inner packet.
* An attacker intercepts the ICMP message and retrieves the "plaintext" payload of the inner
packet.

3. Protocol Field

* An attacker modifies the protocol field and source address field of the encrypted (inner)
packet by bit-flipping in the payload of the outer packet.
* The security gateway decrypts the outer payload to recover the (modified) inner packet.
* The gateway forwards the inner packet to the intended recipient.
* The intended recipient inspects the protocol field of the inner packet and generates an ICMP
"protocol unreachable" message.
* The ICMP message is routed to the now modified source address of the inner packet.
* An attacker intercepts the ICMP message and retrieves the "plaintext" payload of the inner
packet.

The attacks are probabilistic in nature and may need to be iterated many times in a first phase in
order to be successful. Once this first phase is complete, the results can be reused to efficiently
recover the contents of further inner packets.

So basically read the exploits and the underlying data before making arguments...
 
This still doesent show anything......
Show me a case where someone was able to unencrypt...Hush?
I dont think youl be finding it anytime soon.
Posting a bunch of unrelated technical info does not prove a thing. It further reinforces my point that you are severly of topic and not looking at the facts!
There are checks and balances in place to prevent such actions as you have described, such as the Cylindrical value matching. We are not talking about a code....we are talking about a multiplier for diferent numbers.....now find that...sniffing, spoofing, packeting...you will not!

You can post all the data you want... there are contests underway each year for breaking alogarythms.....do people not like huge prizes?
 
PolfaJelfa said:
This still doesent show anything......
Show me a case where someone was able to unencrypt...Hush?
I dont think youl be finding it anytime soon.
Posting a bunch of unrelated technical info does not prove a thing. It further reinforces my point that you are severly of topic and not looking at the facts!
There are checks and balances in place to prevent such actions as you have described, such as the Cylindrical value matching. We are not talking about a code....we are talking about a multiplier for diferent numbers.....now find that...sniffing, spoofing, packeting...you will not!

You can post all the data you want... there are contests underway each year for breaking alogarythms.....do people not like huge prizes?


Ok , I will end this here as polka is not listening to a word i'm typing ,thus this is a waste of time

1. cylindrical value check has nthing to do with this. The flaws as specific t cypher block chaining. The flaws with this encryption mechanism I have already posted which went completely over your head. This is because you are simply talking about things you know nthing about.

2. The check and balances yu talk about is exactly what brken in cypher block chaining cde of pgp. This particular portion of the algorithm is what allows the attacker to actually decrypt portion of the code and not others. This was posted in the cert.org alert, which also went completely over your head.

3. Cert is a security auditing and announcement site all IT professionals use when they have security holes they need to patch. The makers of PGP have announed a technical flaw with PGP which husd is seen as vulnerable. Does it mean and attack based n this flaw is emminent. No and I never said anything t this point.

4. Hush did have users compromised when network solutions was hacked and users were redirected to attacker sites. It can take decades to brute force an encrypted string for decryption. This why methofs for quicker return are things hackers or script kiddies will try to do. This particular hle is mre targeted at automated systems , and not something like Hush.

I'm obviously talking over your head so this shuld end here
 
Buddy your talking over your own head.
Dont try to be such a smartass when in reality you know jack.
You are simply taking this out of your ass.
Now you are backtracking!

"Hush did have users compromised when network solutions was hacked and users were redirected to attacker sites"
Bulshit

It did not...all that happened was the homepage was redirected..
No information was compromised.....the actuall login page is SSL and tuneled, only thing that was changed is a redirect for the homepage. Since hush is safegaurded...the system automatically shut down the server...as the omepage domain was changed! What has been compromised regarding security?
You cant understand basic internet principles!
That is why I am ending the conversation with you!
You know it all.
So enjoy yourself!
 
kbrkbr said:
I just placed an order with a domestic source and when I pressed "send," cyber-rights came back with a message "Cannot find public keys for the following address."

This got me wondering whether the message I sent could be used to track my IP number back to my computer. My understanding is that if the message was sent encrypted, then the message couldn't be tracked back to me. But if cyber-rights DIDN'T encrypt it, then could I be exposed?

Yup, feeling a little paranoid this morning. :p

That does mean the order was not encrypted by the web site.
It went through without any hash or encryption... I wouldnt worry
too much about it most ISP's use a proxy server anyways for connections
although you may not realize this is true...
IP's are usually only traced when abuse by the same IP is always causing problems. Can you imagine how many IP's are probably stored in the log file from the site... Im sure it's hundreds... Nobody would waste thier time trying to track down a single IP. The site prolly purges it's log file like most to save space anyways... In other words, I wouldnt worry.
From my understanding thats my .02 but I am known to be wrong sometimes.
If I am and there is sombody that knows better than me, I apologize.
 
Last edited:
Sorry I was away for a few days....

Let's discuss these things as people and certain moderators REALLY need education on this

1. First off If a user input a username and a passphrase at an attacker's site, then information is compromised. Period.

Secondly there is no redirection in this instance. Forward DNS records are controlled by the domain name registrar. Network Solutions in this case. Forward DNS records start at the top which would be what's called a "root server" This root dns server tells clients where to look for forward DNS records about a domain name. They do alot more then that but let's keep it simple. Reverse DNS records are controlled by ARIN or local ip address in a particular country. Who owns what ip address is controlled by the creation of swips created at the ISP. ARIN assign IP address to ISP , ISP assign IP to the customer. IF the higher level is broken then the higher level is what needs to do the fixing. Hush shutting down has no relevance at all to that situation since users would be doing "nslookup www.hush.com" and getting the ip address of the attackers site. No redirection... Not sure where redirection came in but it has no place in this scenario... Anyway, The hush customer put in thier address and passphrase at the attackers site and BANG. The attacker has information that he shouldn't. There had to have been some passphrase changes needed at least to reverse that problem.


2. Does anyone here know what tunneling is and the specific protocls which make up this idea of "tunneling" I guarantee one moderator does not. PPTP was created by M$ and L2TP was created by Cisco. Both technologies are applied to a firewall or VPN server mainly in corporate intranets. Having this technology will allow for "secure" connection from clients away from the corporate firewall to the local intranet. Thus security (IPSEC for instance) is needed to that "tapping" is limited since data is travaling over an insecure intranet. There is, atleast from my knowledge, no application for this from a web site to allow IPSEC connection to all users on the internet. If anyone can think of such an implementation , I'd like to see it. This is what SSL is for. Completely different technology and purpose from tunneling.
 
Last edited:
Gjhonson...than you for trying to pass yourself as something your not, which is knowledgable. You have zero knowledge about the situation. You are posting irelevant facts not related to the situation. What part of the sentance "THE ENCRYPTION AND LOGIN PAGE WAS NOT REDIRECTED" do you not understand. I repeat myself for the last time.....THE ENCRYPTION AND SSL LAYERING ALONG WITH THE HEAVILY ENCRYPTED INFO ARE ON VERY VERY SECURE SERVERS......ONLY THE DAMN HOMEPAGE WAS REDIRECTED.....I repeat myself a third time.....Hush Automatically prevented any use of the Encrypted servers..IT WOULD BE IMPOSIBLe TO ACCES THEM!No one could log in as there was not a place to log in! There was a message about Agent Clown and Bozo.....DO YOU NOT COMPREHEND THE WORDS COMING OUT OF MY MOUTH...? You Sir are the IGNORANT one.....you say I and the other mods here can not grasp the pure genious of your post and tunelling. Well let me tell you something....I DO..and i know the others arent idiots either! It is you who has proven himself to be IGNORANT.... again i repeat.....LOGIN PAGE WAS INACCESIBLE...due to the fact that.......ONLY THE HOMEPAGE WAS REDIRECTED TO A CLOWN MESSAGE!!!!! NO ONE EVER PUT IN A SINGLE PASSWORD.......THERE IS NO NEED FOR ANY DAMN PASPHRASE CHANGES!

Undetstand...?
Good...now put your head down...and admit you were wrong.
 
Last edited:
Notice im not disagreing with you on everything...alot of what you say has merit...there are flaws in everything....does not mean they are exploitable enough to cause problenms....however....in thid case of "hush security beign compromised" you are simply wrong. It wasnt.
 
PolfaJelfa said:
Gjhonson...than you for trying to pass yourself as something your not, which is knowledgable. You have zero knowledge about the situation. You are posting irelevant facts not related to the situation. What part of the sentance "THE ENCRYPTION AND LOGIN PAGE WAS NOT REDIRECTED" do you not understand.


There is no redirection within this scenario... DNS poisoning means there IS NO redirection


PolfaJelfa said:
I repeat myself for the last time.....THE ENCRYPTION AND SSL LAYERING ALONG WITH THE HEAVILY ENCRYPTED INFO ARE ON VERY VERY SECURE SERVERS......ONLY THE DAMN HOMEPAGE WAS REDIRECTED.....I repeat myself a third time.....Hush Automatically prevented any use of the Encrypted servers..IT WOULD BE IMPOSIBLe TO ACCES THEM!

Nothing is impossible especially when we're talking about internet security. This is the main problem with everything you have posted

PolfaJelfa said:
No one could log in as there was not a place to log in!


You could log into the attackers web site... This is the other point you're missing. I have read information that there wmay have been a site setup. Even if there wasn't one could have been created and thus the problem is still there.

PolfaJelfa said:
There was a message about Agent Clown and Bozo.....DO YOU NOT COMPREHEND THE WORDS COMING OUT OF MY MOUTH...? You Sir are the IGNORANT one.....


That's it. There was no login server the attacker created??? Are you sure of this?

PolfaJelfa said:
you say I and the other mods here can not grasp the pure genious of your post and tunelling.

To be honest I was talking specifically about YOU. I just didn't want to name you by name....

PolfaJelfa said:
Well let me tell you something....I DO..and i know the others arent idiots either! It is you who has proven himself to be IGNORANT.... again i repeat.....LOGIN PAGE WAS INACCESIBLE...due to the fact that.......ONLY THE HOMEPAGE WAS REDIRECTED TO A CLOWN MESSAGE!!!!! NO ONE EVER PUT IN A SINGLE PASSWORD.......THERE IS NO NEED FOR ANY DAMN PASPHRASE CHANGES!

This is not the information I have seen on www.fribble.net which describes the attack , but this is fine , If you feel there was no login server created by an attacker then this is you...

There is nothing to admit to...

PolfaJelfa said:
Undetstand...?
Good...now put your head down...and admit you were wrong.
 
I tried to use it on the occuring days....so that is what i can say from personal experience.
There was no login server created.

I agree if there was a fake login server and you typed in your code.....then obviously your info would be severely compormised.
 
I am going to start another thread which will be instructional on how to protect yourself from black hats / crackers (not white people) and others who break into computer services. Most will break into the service just to see if they can do it. Only a small percentage will actually manipulate the data , ie buy something off a stolen credit card number or charge calls on your phone via phracking, etc

Lets start off with the correct terms. A hacker is your friend. I hacker is generally a security auditor who works to protect computer services. A cracker is the person you read about in the paper or the news. Only a small percentage are actually good at it.
Most are just "script kiddies" who will download a script and run it because they don't have the technical ability to break into something themselves.

Anyway Enough "I think" from people.. I do this for a living.
 
Top Bottom