C
Code
Guest
The commercial sector has been stagnant re: encryption for over 20 years. DES was the de facto standard for over a decade. The US government, on the other hand, has not used DES in well over 18 years. This means they have a 20 year advantage on encrypting and decrypting your data. Only recently has NIST even bothered to nominate and choose a new Advanced Encryption Standard (blowfish). DES stood for far too long and was assumed secure for that entire time.
PGP 2048 has been broken with 50 re-designed atari chips (ascs) in under 20 minutes, it is very economical from a law enforcement stand-point. Total cost of the machine was under 10 grand.
Remember, encrption isn't about keeping your data secure. It's about keeping data secure for X amount of time, X is a variable which changes radically based on the algorithm used.
Your passphrase does not do anything for key generation. That takes place when they ask you to move your mouse around the little black square. A long passphrase simply means it's harder for someone to guess, or MITM attack your account.
You cannot sniff server based encrytped mail; mail sent from one Hush user to another never leaves the server. You *can* sniff the connection of the end-user checking the mail. But SSL/TLS is secure for one primary reason, by the time the SSL connections times out (or the user disconnects) is not nearly enough time it would take to crack the keys and inject or pull out packets. And SSL and TLS sessions are session-based keys, meaning you use different key-sets for each session. So the hacker would be starting from ground-zero with each session.
PGP 2048 has been broken with 50 re-designed atari chips (ascs) in under 20 minutes, it is very economical from a law enforcement stand-point. Total cost of the machine was under 10 grand.
Remember, encrption isn't about keeping your data secure. It's about keeping data secure for X amount of time, X is a variable which changes radically based on the algorithm used.
Your passphrase does not do anything for key generation. That takes place when they ask you to move your mouse around the little black square. A long passphrase simply means it's harder for someone to guess, or MITM attack your account.
You cannot sniff server based encrytped mail; mail sent from one Hush user to another never leaves the server. You *can* sniff the connection of the end-user checking the mail. But SSL/TLS is secure for one primary reason, by the time the SSL connections times out (or the user disconnects) is not nearly enough time it would take to crack the keys and inject or pull out packets. And SSL and TLS sessions are session-based keys, meaning you use different key-sets for each session. So the hacker would be starting from ground-zero with each session.
pharmadan said:Hushmail, cyber-rights, elitefitness, ziplip are all compatible. They all use PGP encryption, and as long as the public keys are available, they are compatible and secure. PGP providers are VERY secure (if you passphrase is secure). The advantage to PGP encryption is that if other eyes try to snoop into your mail, it is not "economical" to decrypt (again ... based on how secure your passphrase is). Not even the companies that host PGP based email can snoop. What I mean by "economical" is that the more secure your passphrase is (based on bits on entropy), the more expensive and time consuming it becomes for interested parties to crack the encryption. Read the diceware link below.
Keptprivate is NOT secure. Keptprivate does use SSL encryption from the email server to your desktop, which can inhibit packet sniffers, but the email can still be easily read from the server.
Assume any other email provider (yahoo, msn, hotmail) is NOT secure. BTW, operamail is NOT secure. If there is a link "Forgot your password?" anywhere, the system is NOT SECURE.
KEY THINGS TO REMEMBER
--------------------------
1. Do not accept unencrypted email (requires paid subscription with some providers).
2. Never send email unencrypted.
3. Your passphrase determines how strong the encryption REALLY is. http://world.std.com/~reinhold/diceware.html
4. Do not lose or forget your passphrase or you are screwed. It can not be recovered.
Basic PGP Information
http://www.pgpi.org/doc/pgpintro/