Welcome to ECCIE, become a part of the fastest growing adult community. Take a minute & sign up!

Welcome to ECCIE - Sign up today!

Become a part of one of the fastest growing adult communities online. We have something for you, whether you’re a male member seeking out new friends or a new lady on the scene looking to take advantage of our many opportunities to network, make new friends, or connect with people. Join today & take part in lively discussions, take advantage of all the great features that attract hundreds of new daily members!

Go Premium

Go Back   ECCIE Worldwide > Texas > Austin > Coed Discussions - Austin
test
Coed Discussions - Austin Both male and female members can mingle and interact here. Let's keep these discussions on-topic, thought-provoking, and more importantly...entertaining!

Most Favorited Images
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
Most Liked Images
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
Top Reviewers
cockalatte 646
MoneyManMatt 490
Still Looking 399
samcruz 399
Jon Bon 394
Harley Diablo 377
honest_abe 362
DFW_Ladies_Man 313
Chung Tran 288
lupegarland 287
nicemusic 285
You&Me 281
Starscream66 277
George Spelvin 265
sharkman29 255
Top Posters
DallasRain70760
biomed162936
Yssup Rider60583
gman4453258
LexusLover51038
offshoredrilling48541
WTF48267
pyramider46370
bambino42126
CryptKicker37192
The_Waco_Kid36494
Mokoa36491
Chung Tran36100
Still Looking35944
Mojojo33117

Reply
 
Thread Tools
Old 06-07-2010, 09:04 PM   #16
78704
Valued Poster
 
78704's Avatar
 
Join Date: Dec 18, 2009
Location: 78704
Posts: 975
Encounters: 10
Default

Quote:
Originally Posted by winemaker View Post
PGP is pretty INSECURE. It has a known backdoor.

There were some angles of attack fifteen years ago; not algorithmic, mind you. I don't know of a current vulnerability. Cite?
78704 is offline   Quote
Old 06-07-2010, 09:19 PM   #17
winemaker
Gaining Momentum
 
Join Date: Dec 31, 2009
Location: Austin
Posts: 54
Default

Adm. Bobby Inman.

Doesn't have to be algorithm. A good RNG can make a good attack,esp if you know the feistel design. Backdoors, are by definition, a way of circumventing the cipher. All you need to look for the cascade of bit flips, then off you go. Text is much easier to decrypt, since, at least for english, there are known etymological precedents which induce early discovery.

Best ciphers have rotating keys as well as rotating ciphers. Never cipher a lump of information. Break the chunks up. Different directory, different key, different cipher. RNG are not great keys, since most are not necessarily primes, but prime factored. Human interface determined keys are best ( random mouse motion, etc ). Best to have entropy > 95%. Get beyond that, and other parties will take great interest in your entropy generator.
winemaker is offline   Quote
Old 06-07-2010, 09:57 PM   #18
Sensei
Valued Poster
 
Sensei's Avatar
 
Join Date: Jan 2, 2010
Location: KY/TN
Posts: 162
Encounters: 5
Default PGP is Secure

Quote:
Originally Posted by winemaker View Post
Adm. Bobby Inman.

Doesn't have to be algorithm. A good RNG can make a good attack,esp if you know the feistel design. Backdoors, are by definition, a way of circumventing the cipher. All you need to look for the cascade of bit flips, then off you go. Text is much easier to decrypt, since, at least for english, there are known etymological precedents which induce early discovery.

Best ciphers have rotating keys as well as rotating ciphers. Never cipher a lump of information. Break the chunks up. Different directory, different key, different cipher. RNG are not great keys, since most are not necessarily primes, but prime factored. Human interface determined keys are best ( random mouse motion, etc ). Best to have entropy > 95%. Get beyond that, and other parties will take great interest in your entropy generator.
Hmm, not to defend anyone but I have been using PGP since the early days when I had to compile my own source code. Nobody has "publicly" cracked PGP. And the backdoor is actually a feature which is optional. Unless someone has a multi million $ machine (ie N-S-A) , I would say near impossible.

Check this link for the version I use: http://www.pgpi.org/doc/faq/pgpi/en/#Crack
Sensei is offline   Quote
Old 06-07-2010, 09:59 PM   #19
AustinWildFlowers
Pending Age Verification
 
User ID: 2809
Join Date: Dec 19, 2009
Location: Austin, Texas
Posts: 116
My ECCIE Reviews
Default

I gotta admit, you know your shit, Wine. So... recommendations? What do you use?
I'd honestly appreciate the advice. Besides, if memory serves me well, your number might just be in the database from back in the days of "sweetness". Don't worry, I think the PGP's got it covered, but I'm always willing to learn and improve.
AustinWildFlowers is offline   Quote
Old 06-08-2010, 01:11 AM   #20
rCoder
Clit Explorer
 
rCoder's Avatar
 
Join Date: Dec 31, 2009
Location: Austin's Colony
Posts: 492
Encounters: 6
Default

Quote:
Originally Posted by winemaker View Post
Best to have entropy > 95%. Get beyond that, and other parties will take great interest in your entropy generator.
For a few bucks of hardware you can have a pretty good random number generator (example: http://robseward.com/misc/RNG2/). I've been waiting for PC's to add a hardware random number generator as a core feature since I first heard about sampling reversed biased PN junctions 15 years ago...

For fun, picture burning a pair of DVD's with the output from the hardware RNG then using them for one time pad encryption of base data, which is then feed thru "good" key encryption before transmittal. Now it takes two pieces to break, the key and the physical one time pad. A hassle but it's layered.

Back on topic. Keep in mind that good security is layered. I.e., never depend on one security item. For example, encrypting the disk is good, but how are you controlling the keys and physical access? Are the backups encrypted and secured at a different site? Is the computer connected to anything? All unused ports (IR, bluetooth, wifi, ethernet) disabled?

My favorite T-shirt says it all: "Got root?"

Also remember that the human element is the weakest link for any security.
rCoder is offline   Quote
Old 06-08-2010, 01:25 AM   #21
Guest092810
Account Disabled
 
Join Date: Mar 12, 2010
Location: austin texas
Posts: 1,553
Encounters: 19
Default

Damn. You folks are out of my little league. Nice info.
Guest092810 is offline   Quote
Old 06-08-2010, 02:06 AM   #22
Rand Al'Thor
Super Member
 
Rand Al'Thor's Avatar
 
Join Date: Apr 26, 2010
Location: Austin
Posts: 3,492
Encounters: 3
Default

Bottom line, there is no perfect security. The closer you get to it, the more prohibitive it becomes in terms of usage - think of the black room computer they broke into in "Mission Impossible."

Above a certain level of security, you could end up spending just as much time, if not more, following security protocol than actually using the computer, and as you tighten security, the return is diminishing from that point.

For the most part, it's enough to not be the low hanging fruit - enough security so that it makes it difficult enough so whoever is trying to break in will move on to the next (and easier) target. Of course, this won't work if you become the target of a focused attack.
Rand Al'Thor is offline   Quote
Old 06-08-2010, 03:54 AM   #23
GneissGuy
Thank God it's Firday!
 
GneissGuy's Avatar
 
Join Date: Dec 12, 2009
Location: Austin, TX
Posts: 2,698
Encounters: 12
Default

Zimmerman was investigated, (i.e. harassed) by the US government back in the early 1990's. It was a publicity ploy that backfired on the government. The investigation was dropped in 1996. There was never a prosecution.

The US government classified anything crypto as a "munition" at that time, including DES which was well known to be insecure. They'd even classify pig latin as a "munition." The classification of PGP as a "munition" doesn't qualify it as good crypto.

The current version of PGP has very little to do with the 14+ year old version Zimmerman was harassed for.

There are a number of other programs with similar features, including several free, open source programs. Commercial PGP may be worth it for the non-geek or corporate types because it's packaged for ease of use and has support.

Even if the government has a secret backdoor built into the program, they probably wouldn't risk using it on small fry like us. They wouldn't want to risk letting people find out they have a back door in the program.

The more realistic risk is if you don't choose a GOOD password, or if you write down the password and keep it where someone can find it. Let's be realistic. If you're using windows, or even MAC OS or Linux, the big boys can probably compromise your PC remotely through the internet and simply steal your password with a keylogger. Even if you do have your security up to date. Or use wiretaps, bugs, etc.
GneissGuy is offline   Quote
Old 06-08-2010, 02:06 PM   #24
AustinWildFlowers
Pending Age Verification
 
User ID: 2809
Join Date: Dec 19, 2009
Location: Austin, Texas
Posts: 116
My ECCIE Reviews
Default

Good points, GG. Personally, I think my most important security technique is a rigorous screening process. And I damn sure NEVER cut corners on that. I've learned a lot from my recent experience. I will admit my former ECCIE account password was weak, but I learned my lesson on that one. It certainly wasn't the NSA that hacked my account. I'm hoping things will chill out now, at least till I catch my breath. It's been a tough few days for me.
AustinWildFlowers is offline   Quote
Old 06-08-2010, 02:30 PM   #25
Whispers
Hope I haven't bored you!
 
Whispers's Avatar
 
Join Date: Apr 30, 2009
Location:  
Posts: 19,456
Encounters: 22
Default

Quote:
Originally Posted by AustinWildFlowers View Post
Besides, if memory serves me well, your number might just be in the database from back in the days of "sweetness". Don't worry, I think the PGP's got it covered, but I'm always willing to learn and improve.

All this talk of encryption software....

I'm surprised no one else has asked......

based on this comment it seems you keep information on clients for quite a while which is something everyone is always concerned with.....

Just how much information and what is the nature of the information you feel the need to keep and how far back are you storing it?
Whispers is offline   Quote
Old 06-08-2010, 03:20 PM   #26
MisterSmith
Account Disabled
 
Join Date: May 17, 2010
Location: Austin, TX
Posts: 36
Default

You wanted suggestions for more security?

Here's one: Stop storing sensitive information in your database. Period.
MisterSmith is offline   Quote
Old 06-08-2010, 03:58 PM   #27
AustinWildFlowers
Pending Age Verification
 
User ID: 2809
Join Date: Dec 19, 2009
Location: Austin, Texas
Posts: 116
My ECCIE Reviews
Default

Thanks. Emails stored off site, phone numbers on my phone. That's all I got.
What else is there? Nothing. Number of times a client has seen us? nope? session details? no way. addresses? No.

LOOK - Wild Flowers is a legit entertainment service. Fees are for time and companionship ONLY. Nothing illegal going on here. Heaven forbid! What are you so worried about? Winemaker (not his real name, BTW) is the only person who's posted on this thread who's ever seen a WF girl. His number was deleted long ago from my phone, though it MAY still be amongst my old emails. No need for him to freak out.
Or you other guys. I take client's privacy seriously, and probably protect it as well or better than any other agency or provider around. You guys being a little... dramatic?
AustinWildFlowers is offline   Quote
Old 06-08-2010, 07:08 PM   #28
Amrita Lover
Lifetime Premium Access
 
Amrita Lover's Avatar
 
Join Date: Dec 31, 2009
Location: Austin
Posts: 426
Encounters: 13
Default

How secure is the Eccie site?
Amrita Lover is offline   Quote
Old 06-08-2010, 08:44 PM   #29
Guest060211-3
Account Disabled
 
Join Date: Feb 8, 2010
Posts: 689
Encounters: 25
Default

Doesn't have to be algorithm. A good RNG can make a good attack,esp if you know the feistel design. Backdoors, are by definition, a way of circumventing the cipher. All you need to look for the cascade of bit flips, then off you go. Text is much easier to decrypt, since, at least for english, there are known etymological precedents which induce early discovery.

Best ciphers have rotating keys as well as rotating ciphers. Never cipher a lump of information. Break the chunks up. Different directory, different key, different cipher. RNG are not great keys, since most are not necessarily primes, but prime factored. Human interface determined keys are best ( random mouse motion, etc ). Best to have entropy > 95%. Get beyond that, and other parties will take great interest in your entropy generator.


GOODNIGHT!!! i think i will just go back to installing fences and building decks.

peace
atx
Guest060211-3 is offline   Quote
Old 06-09-2010, 12:28 AM   #30
AustinBusinessTraveler
Valued Poster
 
AustinBusinessTraveler's Avatar
 
Join Date: Dec 19, 2009
Location: On walkabout
Posts: 352
Encounters: 6
Default

Three quick thoughts:

1 - Keeping old e-mails for any reason other than a client whom is or was a danger to you, your girls, or the community at large is a red flag for many. I don't care about how it's stored, how it's encrypted, or anything of the like. Any system you have can, and will, be targeted if you ever were. While we know you are a legitimate entertainment service, many of those services can be targeted and harassed by authorities and those emails could compromise people.

2 - If your ECCIE account was hacked, what about the PM's? I know all of us have tons of PM's and if you keep e-mails, I would guess you keep the PM's. What info / details could be gleamed from those messages.

3 - Encryption will never beat deletion and overwriting (repeatedly). Ideally, the use of a small thumb drive (IronKey comes to mind) for your "off-site" storage is a little more ideal. Whereas IronKey will simply fry itself after bad password attempts, even a standard thumb drive will take the over-writes and do a damn good job of being hard to read.

I would go with TrueCrypt on any day over PGP. PGP's heyday was over 15 years ago at this point.

Just my thoughts and suggestions
AustinBusinessTraveler is offline   Quote
Reply



AMPReviews.net
Find Ladies
Hot Women

Powered by vBulletin®
Copyright © 2009 - 2016, ECCIE Worldwide, All Rights Reserved