Please Scroll Down to See Forums Below
napsgear
genezapharmateuticals
domestic-supply
puritysourcelabs
UGL OZ
UGFREAK
napsgeargenezapharmateuticals domestic-supplypuritysourcelabsUGL OZUGFREAK

hushmail

lincoln said:
Hushmail is encrypted using the same tech as SSL. 128 Bit encryption breaks a 16 digit credit card number into millions of pieces and then reassembles it when it reaches where it is going.

The FBI has a system called "The Carnivore" that theu place on servers that are suspected to be conducting illegal activity. From all the tech writings I have read their system monitors without anyone knowing it is there. It does not unencrypt anything.

For them to read an email that is encrypted it would be like putting together a 128 million piece puzzle!


But i would still be looking for something more secure since a guy In France (now in front of a court of law for mise-use of copyright....) has broken the key for bank cards, just like the Intereac system in canada.... but I gues that for the moment we remain safe
 
I have read about the carnivore software and it is wrong to use this against citizens without their consent. Invasion of privacy whether normal mail or email is wrong but, I do not know what the law says on this subject. I do have a hushmail account because some sources ask for it. VTAT you make a good arguement about the garbage but is email not considered the same as snailmail when it comes to invasion of privacy. I was only saying that if they want to break it I am sure they can. It just stands to reason if they want to monitor regular e-mail for hot keywords about crime. They would be more interested in the encrypted mail. I am not sure if this is true. I am just throwing a bone out for people to chew on and maybe someone with good info has a better idea on it.
 
DB3, good point about the govt monitering for key words...the problem with monitering encrypted e-mail is that you can't mointer a word because it is encrypted and everyones key is unique...
 
This article may shed some light?

Where Carnivore Lives


For Carnivore to gain access to this much data, its hardware must be plugged directly into the network at a central location. Because most Internet-based communications in the USA flow through large Internet Service Providers (ISPs), the FBI would typically install a Carnivore box inside an ISP data center. Controlled physical and network access improves the system's overall security.

The FBI has already employed Carnivore in a number of cases. By law, the details of these investigations have generally not been released publicly. The only ISP positively identified as cooperating with such an investigation, in fact, is Earthlink. In that case, the deployment of Carnivore at a data center in Pasadena, CA caused some service disruptions to otherwise uninvolved customers [source: CNet]. This fact alone alarms some Net users.

Reactions To Carnivore
"This is a matter of employing new technology to lawfully obtain important information while providing enhanced privacy protection." - FBI

Network sniffers are not new tools. For years it has been common practice, for example, to snoop on email traffic flowing over some corporate networks [5]. A system that scans mail ports can easily be expanded relatively easily to monitor file transfers, Internet chat sessions, and various other forms of network traffic. Carnivore's functionality is configurable, too, but the use of the system is governed by federal wiretap laws. Some of the negative reaction to Carnivore is due no doubt to the FBI's prior (unsuccessful) efforts to modify standard network protocols to better facilitate wiretapping [6].
 
Last edited:
Good info lincoln. The keyword LAWFULLY obtained information. Just because something is lawful does not make it right. I would imagine a lot of mail has changed from snail to e in the last few years and it stands to reason this makes it alot easier to wiretap alot of peoples private conversations.
 
all you can use today is pgp and/or https email servers. i also maybe suggest that you use a email provider that is overseas, a reliable one. FBI cant touch overseas servers... or can they? spooky huh...? most countries dont like usa's laws anyways, it hinders their profit margins.
 
No they 100% cannot! Also hushmail is almost impossible to crack because every email and every person has a different code. It is constantly changing so there will never be a "decoder" per say...
Jay

droid said:
Can my work read my hushmail???
 
Just note:

With the purchase of Deep Blue from IBM the Gov has access to several 2 teraflop mainframes. Cracking 128bit encryption can be done very easily through a brute force crack.
 
8pack said:
Just note:

With the purchase of Deep Blue from IBM the Gov has access to several 2 teraflop mainframes. Cracking 128bit encryption can be done very easily through a brute force crack.

Do you have any links or text to back this up? If it was easy the Internet business would be in danger as a whole. Hackers blocked Yahoo! for only minutes and it was headline news for days. I work in the industry and have never heard such a thing?

What is a brute force crack?
 
Top Bottom