What exactly is Carnivore?
(Thanks Majc)
computer security-please read Post #1
Since it comes up so often, I decided to write a little observation/recommendation list concerning personal computer security. This is a work in progress, so anyone feel free to add to it.
The government has implemented an internet monitoring tool known as Carnivore. What carnivore does is monitor email messages through text searching, meaning it searches for certain keywords like “primobolan” or “cocaine” in the mail. While the FBI claims it only looks at the subject header, I doubt it limits itself to just that. As an example, you send an email ordering 50 amps of Primo. Carnivore picks this up and saves the message. your friendly G-Man looks at the message and decides to set carnivore to monitor al messages coming from your email addy. Later, when you send shipping info, the nice G-Man gets the info and calls customs to have them stop all packages going too your address. Cojntrolled delivery, Bye bye.
As a result, mail needs too be sent in a way that only the recipient can read it. This problem is solved by data encryption, a process by which a message is turned into an unreadable form. As an example,
this is the un-encrypted message.
And this is what that message looks like after it is encrypted:
-----BEGIN PGP MESSAGE-----
Version: PGPfreeware 7.0.3 for non-commercial use <
http://www.pgp.com>
qANQR1DBwU4DzfcyOrm77gYQB/0QBDOZ5ASlWgmS05daR3CMnJjgXUiPm7WNOeJE
LNDbZ9BJTVUenVzpkbGMj2KpDWHdHzZjw6C3oiw8WxSnHUONLL
LYCS5WPcH8cv51
UsmKi3JedRYIXKFLym01vkr3fBlMBVcSAEUKms3pDXZef4OKC4
B4WE6jylgH94QG
aHX3qpZeXx4moLIJ3ZDO58EGkvUK0wPj9qFifDc7nELebB0WM6
V74SbxVP9HlrjT
wr/ dYukH71PBmg9GsAl18ufKMOKxvrZIblGII49QISbhrvGRiJBNX
hV1jQ4qaAxO
MSENZeslnJDUvlaf20ci5bS1QCkiyzqXYGdaUIfeko65gFAjCA
DwTwS3WfC+oNlP
x9axAZIbzbrhKl6KV/euc9+NC8he1A/FCQgEmZgbUgf6r0j7B0zTleWqLhtGLD03
TG5o82rVFrtFJdIDvNoeQmF7uEpWiK10bKFA74fJ5lrAqlqz0e
hrjaVwVpD1duBq
cogB5g2ghNjNyE+R/YFncl49JO/QUPdo1VANCZSvZVKfMqWxJeY6IxizSfDleVbY
ITHXoL3TjT2reUKxZmIQMu6sHcwXnmVTlS3koSLU1ohWOHoQ4s
SSLoEF1HRop7pA
NaEHlDStcTbdoy7qxTKTwYsEb9A6hy6rTqRoI04SISUVgGbMcv
c0+WwvELqcoSq8
MYCO0zpNyTjNFg4KGm0U5zfjwx0YuCKNJJiLNNdAjq8KffH+Zi
fLOBM6FktzP0Ew
rx8cVIRjr75vGTrr40a9gw==
=jj4T
-----END PGP MESSAGE-----
See! Can't makes heads or tails of it, can you? Well, neither can carnivore. However, how can your recipient read the message? with a key. This key can be sent via email too the recipient who can decrypt any message you send too him/her. Generally, I wouldn't include both the message and the key in the same email. The Key is output in a text format just like above except "BEGIN PGP KEY" and "END PGP KEY" appear. This key actually consists of a pair, one for you and one for other people to read your message. This key pair is protected by a password or "passphrase", which you create yourself.
The process is very quick and a snap to use. How much does this marvel cost? Nothing. One implementation of this process is known as PGP "Pretty Good Privacy" and is available from
http://www.pgpi.org/
How secure is PGP? Very.
right now the only two ways of defeating PGP are:
1. attacking the encrypted message by brute force eg. guessing every possible key.
2. attacking the key's passphrase
Since even the most powerful supercomputer could take decades or even centuries too guess every key, this is simply not feasible. Therefore, figuring out someone's passphrase is the only way to go. As a result your passphrase must be strong. It must have letters, characters, nonsense phrases or anything that only you would know. The stronger the passphrase the longer it takes to guess it, again brute force takes too long. This brings us to the "magic lantern" everyone is talking about. the idea is the FBI "infects" your computer with a Trojan horse which records all your key strokes and can be used to get your passphrase. It sends this information from your computer over the net to the FBI. This idea is not new and hackes have been using it for years now. what I mean is that this is neither new nor very clever. However, it is an issue that you need to address. this brings us to the second part:
In order for someone to remotely access your system over the internet they need to know you exist. This is accomplished by pinging your ip address to see if anyone responds. Since you don't want too respond you want what's called a firewall. A firewall can be either hardware or software and should also monitor outbound traffic too alert you too any program which is trying to send information without your knowledge. Such software is usually called "spyware"
A software firewall exists which does this and it is free, Zonealarms. As a backup you can also use ad-aware.I really depends on how paranoid you are. However, an ounce of prevention goes a long way.
As far as the virus thing keep your anti-virus software updated or do the online scan at trendmicro, it's free. Never open email attachments. anyway, I'll add anything if I think of it.
