Please Scroll Down to See Forums Below
napsgear
genezapharmateuticals
domestic-supply
puritysourcelabs
UGL OZ
UGFREAK
napsgeargenezapharmateuticals domestic-supplypuritysourcelabsUGL OZUGFREAK

hushmail

DB3

New member
I know why people use excryption. But it would seem to me if the government wanted to crack the code it could and would. If I was trying to catch wrongdoings I would search encrypted messages first before looking at regular e-mail. How does some of the more experienced guys feel about this?:confused:
 
  • Like
Reactions: Cut
Dont worry they try just like some Hackers do... but it aint that easy. They also tried to ban hte use of encrypted e-mails, but for some obvious reasons they fail (just like mp3 sharing). One day they'll probably reach their goal.... but be sure that stronger encrypted technology will already be available.

Cant stop the progress, you just can admire it
 
I do not really know how it works but, it his hard to imagine with the resources available to our government that they would have a hard time decoding it.
 
Let me put it this way - there is case law that says that you have no expectation of privacy for garbage you put in front of your house for the garbage man to pick up. So the government can search through it all they want without a warrant. It's similar with email - unsecured email can be easily read anywhere along the path from your computer to the recipient. With encription though, there is a clear expectation of privacy, so if some law enforcement agency tries to use information obtained from encrypted email without a seach warrant, the defendant can have that evidence excluded from trial as an illegal search, violating your constitutional right. They would have to get a warrant from a judge to read your encrypted email, and that takes a lot of proof to show that you are most likely involved in a crime.
 
Do a search on "hushmail" or "Subject Line" and you should find a thread that Conan69 posted earlier talking about how difficult 128bit encryption is to crack...
 
Hushmail is encrypted using the same tech as SSL. 128 Bit encryption breaks a 16 digit credit card number into millions of pieces and then reassembles it when it reaches where it is going.

The FBI has a system called "The Carnivore" that theu place on servers that are suspected to be conducting illegal activity. From all the tech writings I have read their system monitors without anyone knowing it is there. It does not unencrypt anything.

For them to read an email that is encrypted it would be like putting together a 128 million piece puzzle!
 
If you want encryption, your best bet is to use pgp and do the encrypting/unencrypting on your own PC. After all with elite/hushmail etc, the encryption is only in place when going to other compatable mail hosts. With pgp you mail is encrypted until someone with the public key unencrypts it.

As for breaking it, 128bit plus is very hard and time consuming to break and pgp handles encryption scheemes a lot more secure than 128 bit.
 
I don't know if it's our slow network here or what, but hell, it takes me FOREVER sometimes to get into my own damned hushmail! Seriously, at 128 bit encryption, and each sender/reciever has his own "key" it would take forever to crack it, even on a computer.
 
lincoln said:
Hushmail is encrypted using the same tech as SSL. 128 Bit encryption breaks a 16 digit credit card number into millions of pieces and then reassembles it when it reaches where it is going.

The FBI has a system called "The Carnivore" that theu place on servers that are suspected to be conducting illegal activity. From all the tech writings I have read their system monitors without anyone knowing it is there. It does not unencrypt anything.

For them to read an email that is encrypted it would be like putting together a 128 million piece puzzle!


But i would still be looking for something more secure since a guy In France (now in front of a court of law for mise-use of copyright....) has broken the key for bank cards, just like the Intereac system in canada.... but I gues that for the moment we remain safe
 
I have read about the carnivore software and it is wrong to use this against citizens without their consent. Invasion of privacy whether normal mail or email is wrong but, I do not know what the law says on this subject. I do have a hushmail account because some sources ask for it. VTAT you make a good arguement about the garbage but is email not considered the same as snailmail when it comes to invasion of privacy. I was only saying that if they want to break it I am sure they can. It just stands to reason if they want to monitor regular e-mail for hot keywords about crime. They would be more interested in the encrypted mail. I am not sure if this is true. I am just throwing a bone out for people to chew on and maybe someone with good info has a better idea on it.
 
DB3, good point about the govt monitering for key words...the problem with monitering encrypted e-mail is that you can't mointer a word because it is encrypted and everyones key is unique...
 
This article may shed some light?

Where Carnivore Lives


For Carnivore to gain access to this much data, its hardware must be plugged directly into the network at a central location. Because most Internet-based communications in the USA flow through large Internet Service Providers (ISPs), the FBI would typically install a Carnivore box inside an ISP data center. Controlled physical and network access improves the system's overall security.

The FBI has already employed Carnivore in a number of cases. By law, the details of these investigations have generally not been released publicly. The only ISP positively identified as cooperating with such an investigation, in fact, is Earthlink. In that case, the deployment of Carnivore at a data center in Pasadena, CA caused some service disruptions to otherwise uninvolved customers [source: CNet]. This fact alone alarms some Net users.

Reactions To Carnivore
"This is a matter of employing new technology to lawfully obtain important information while providing enhanced privacy protection." - FBI

Network sniffers are not new tools. For years it has been common practice, for example, to snoop on email traffic flowing over some corporate networks [5]. A system that scans mail ports can easily be expanded relatively easily to monitor file transfers, Internet chat sessions, and various other forms of network traffic. Carnivore's functionality is configurable, too, but the use of the system is governed by federal wiretap laws. Some of the negative reaction to Carnivore is due no doubt to the FBI's prior (unsuccessful) efforts to modify standard network protocols to better facilitate wiretapping [6].
 
Last edited:
Good info lincoln. The keyword LAWFULLY obtained information. Just because something is lawful does not make it right. I would imagine a lot of mail has changed from snail to e in the last few years and it stands to reason this makes it alot easier to wiretap alot of peoples private conversations.
 
all you can use today is pgp and/or https email servers. i also maybe suggest that you use a email provider that is overseas, a reliable one. FBI cant touch overseas servers... or can they? spooky huh...? most countries dont like usa's laws anyways, it hinders their profit margins.
 
No they 100% cannot! Also hushmail is almost impossible to crack because every email and every person has a different code. It is constantly changing so there will never be a "decoder" per say...
Jay

droid said:
Can my work read my hushmail???
 
Just note:

With the purchase of Deep Blue from IBM the Gov has access to several 2 teraflop mainframes. Cracking 128bit encryption can be done very easily through a brute force crack.
 
8pack said:
Just note:

With the purchase of Deep Blue from IBM the Gov has access to several 2 teraflop mainframes. Cracking 128bit encryption can be done very easily through a brute force crack.

Do you have any links or text to back this up? If it was easy the Internet business would be in danger as a whole. Hackers blocked Yahoo! for only minutes and it was headline news for days. I work in the industry and have never heard such a thing?

What is a brute force crack?
 
No, the courts have already indicated that email (unencrypted) does not hold the same expectation of privacy as snail mail has established. It's too easy to intercept email. Especially because your service provider can read it. With regular mail, sure someone at the post office can read it, but they have to "destroy" the envelope to do so. Apparently the courts think that makes a big difference. Also, there is a lot of tradition behind snailmail.

Whether the government is able to read your encrypted mail or not is not the point. The point is that they need a search warrant to do so legally. Of course, they can do so without a warrant and try to make their investigation make sense without the benefit of the email information, but I don't think they would do that to bust someone for dealing in 1k of juice.
 
a brute force crack is the equivalent of trying every single possibility until you hit the answer along the way.

ibm is just finishing a new machine that is far more powerful than deep blue and it is to be used on the protein folding project.

the government has had massively parallel systems for years now.

I think some of you are a little off on your math here and how easily this stuff is cracked.

the main problem is that people see things they deem impossible done very quickly on computers and then they assume anything is possible very quickly - also they have no real grasp on how large these numbers are.

trust me, 1) nobody gives a shit about your mail, and 2) if they did, they couldn't break it if you are using it correctly.
or at least not in the lifetime of our universe.
if you are a terrorist and pose a national threat, then you are much more likely to be monitored than if you are some shmoe buying $500 worth of gear.

cryptography (the study of making and breaking encryption) is my main hobby.
you want to talk smack with me, go for it - I'm here.
 
Top Bottom