Main Menu |
Most Favorited Images |
Recently Uploaded Images |
Most Liked Images |
Top Reviewers |
cockalatte |
650 |
MoneyManMatt |
490 |
Jon Bon |
408 |
Still Looking |
399 |
samcruz |
399 |
Harley Diablo |
377 |
honest_abe |
362 |
DFW_Ladies_Man |
313 |
Starscream66 |
289 |
Chung Tran |
288 |
lupegarland |
287 |
nicemusic |
285 |
You&Me |
281 |
George Spelvin |
280 |
sharkman29 |
260 |
|
Top Posters |
DallasRain | 71028 | biomed1 | 65067 | Yssup Rider | 61777 | gman44 | 53911 | LexusLover | 51038 | offshoredrilling | 49139 | WTF | 48267 | pyramider | 46388 | bambino | 43244 | The_Waco_Kid | 38332 | CryptKicker | 37323 | Mokoa | 36497 | Chung Tran | 36100 | Still Looking | 35944 | Mojojo | 33117 |
|
|
06-07-2010, 10:04 PM
|
#16
|
Valued Poster
Join Date: Dec 18, 2009
Location: 78704
Posts: 975
|
Quote:
Originally Posted by winemaker
PGP is pretty INSECURE. It has a known backdoor.
|
There were some angles of attack fifteen years ago; not algorithmic, mind you. I don't know of a current vulnerability. Cite?
|
|
Quote
![Like](/images/like.png) | 1 user liked this post
|
06-07-2010, 10:19 PM
|
#17
|
Gaining Momentum
Join Date: Dec 31, 2009
Location: Austin
Posts: 54
|
Adm. Bobby Inman.
Doesn't have to be algorithm. A good RNG can make a good attack,esp if you know the feistel design. Backdoors, are by definition, a way of circumventing the cipher. All you need to look for the cascade of bit flips, then off you go. Text is much easier to decrypt, since, at least for english, there are known etymological precedents which induce early discovery.
Best ciphers have rotating keys as well as rotating ciphers. Never cipher a lump of information. Break the chunks up. Different directory, different key, different cipher. RNG are not great keys, since most are not necessarily primes, but prime factored. Human interface determined keys are best ( random mouse motion, etc ). Best to have entropy > 95%. Get beyond that, and other parties will take great interest in your entropy generator.
|
|
Quote
![Like](/images/like.png) | 1 user liked this post
|
06-07-2010, 10:57 PM
|
#18
|
Valued Poster
Join Date: Jan 3, 2010
Location: KY/TN
Posts: 162
|
PGP is Secure
Quote:
Originally Posted by winemaker
Adm. Bobby Inman.
Doesn't have to be algorithm. A good RNG can make a good attack,esp if you know the feistel design. Backdoors, are by definition, a way of circumventing the cipher. All you need to look for the cascade of bit flips, then off you go. Text is much easier to decrypt, since, at least for english, there are known etymological precedents which induce early discovery.
Best ciphers have rotating keys as well as rotating ciphers. Never cipher a lump of information. Break the chunks up. Different directory, different key, different cipher. RNG are not great keys, since most are not necessarily primes, but prime factored. Human interface determined keys are best ( random mouse motion, etc ). Best to have entropy > 95%. Get beyond that, and other parties will take great interest in your entropy generator.
|
Hmm, not to defend anyone but I have been using PGP since the early days when I had to compile my own source code. Nobody has "publicly" cracked PGP. And the backdoor is actually a feature which is optional. Unless someone has a multi million $ machine (ie N-S-A) , I would say near impossible.
Check this link for the version I use: http://www.pgpi.org/doc/faq/pgpi/en/#Crack
|
|
Quote
![Like](/images/like.png) | 1 user liked this post
|
06-07-2010, 10:59 PM
|
#19
|
Pending Age Verification
User ID: 2809
Join Date: Dec 19, 2009
Location: Austin, Texas
Posts: 116
My ECCIE Reviews
|
I gotta admit, you know your shit, Wine. So... recommendations? What do you use?
I'd honestly appreciate the advice. Besides, if memory serves me well, your number might just be in the database from back in the days of "sweetness". Don't worry, I think the PGP's got it covered, but I'm always willing to learn and improve.
|
|
Quote
![Like](/images/like.png) | 1 user liked this post
|
06-08-2010, 02:11 AM
|
#20
|
Clit Explorer
Join Date: Dec 31, 2009
Location: Austin's Colony
Posts: 493
|
Quote:
Originally Posted by winemaker
Best to have entropy > 95%. Get beyond that, and other parties will take great interest in your entropy generator.
|
For a few bucks of hardware you can have a pretty good random number generator (example: http://robseward.com/misc/RNG2/). I've been waiting for PC's to add a hardware random number generator as a core feature since I first heard about sampling reversed biased PN junctions 15 years ago...
For fun, picture burning a pair of DVD's with the output from the hardware RNG then using them for one time pad encryption of base data, which is then feed thru "good" key encryption before transmittal. Now it takes two pieces to break, the key and the physical one time pad. A hassle but it's layered.
Back on topic. Keep in mind that good security is layered. I.e., never depend on one security item. For example, encrypting the disk is good, but how are you controlling the keys and physical access? Are the backups encrypted and secured at a different site? Is the computer connected to anything? All unused ports (IR, bluetooth, wifi, ethernet) disabled?
My favorite T-shirt says it all: "Got root?"
Also remember that the human element is the weakest link for any security.
|
|
Quote
![Like](/images/like.png) | 1 user liked this post
|
06-08-2010, 02:25 AM
|
#21
|
Account Disabled
Join Date: Mar 12, 2010
Location: austin texas
Posts: 1,553
|
Damn. You folks are out of my little league. Nice info.
|
|
Quote
![Like](/images/like.png) | 1 user liked this post
|
06-08-2010, 03:06 AM
|
#22
|
Super Member
Join Date: Apr 26, 2010
Location: Austin
Posts: 3,492
|
Bottom line, there is no perfect security. The closer you get to it, the more prohibitive it becomes in terms of usage - think of the black room computer they broke into in "Mission Impossible."
Above a certain level of security, you could end up spending just as much time, if not more, following security protocol than actually using the computer, and as you tighten security, the return is diminishing from that point.
For the most part, it's enough to not be the low hanging fruit - enough security so that it makes it difficult enough so whoever is trying to break in will move on to the next (and easier) target. Of course, this won't work if you become the target of a focused attack.
|
|
Quote
![Like](/images/like.png) | 1 user liked this post
|
06-08-2010, 04:54 AM
|
#23
|
Thank God it's Firday!
Join Date: Dec 12, 2009
Location: Austin, TX
Posts: 2,698
|
Zimmerman was investigated, (i.e. harassed) by the US government back in the early 1990's. It was a publicity ploy that backfired on the government. The investigation was dropped in 1996. There was never a prosecution.
The US government classified anything crypto as a "munition" at that time, including DES which was well known to be insecure. They'd even classify pig latin as a "munition." The classification of PGP as a "munition" doesn't qualify it as good crypto.
The current version of PGP has very little to do with the 14+ year old version Zimmerman was harassed for.
There are a number of other programs with similar features, including several free, open source programs. Commercial PGP may be worth it for the non-geek or corporate types because it's packaged for ease of use and has support.
Even if the government has a secret backdoor built into the program, they probably wouldn't risk using it on small fry like us. They wouldn't want to risk letting people find out they have a back door in the program.
The more realistic risk is if you don't choose a GOOD password, or if you write down the password and keep it where someone can find it. Let's be realistic. If you're using windows, or even MAC OS or Linux, the big boys can probably compromise your PC remotely through the internet and simply steal your password with a keylogger. Even if you do have your security up to date. Or use wiretaps, bugs, etc.
|
|
Quote
![Like](/images/like.png) | 1 user liked this post
|
06-08-2010, 03:06 PM
|
#24
|
Pending Age Verification
User ID: 2809
Join Date: Dec 19, 2009
Location: Austin, Texas
Posts: 116
My ECCIE Reviews
|
Good points, GG. Personally, I think my most important security technique is a rigorous screening process. And I damn sure NEVER cut corners on that. I've learned a lot from my recent experience. I will admit my former ECCIE account password was weak, but I learned my lesson on that one. It certainly wasn't the NSA that hacked my account. I'm hoping things will chill out now, at least till I catch my breath. It's been a tough few days for me.
|
|
Quote
![Like](/images/like.png) | 1 user liked this post
|
06-08-2010, 03:30 PM
|
#25
|
Hope I haven't bored you!
Join Date: Apr 30, 2009
Location:
Posts: 19,463
|
Quote:
Originally Posted by AustinWildFlowers
Besides, if memory serves me well, your number might just be in the database from back in the days of "sweetness". Don't worry, I think the PGP's got it covered, but I'm always willing to learn and improve.
|
All this talk of encryption software....
I'm surprised no one else has asked......
based on this comment it seems you keep information on clients for quite a while which is something everyone is always concerned with.....
Just how much information and what is the nature of the information you feel the need to keep and how far back are you storing it?
|
|
Quote
![Like](/images/like.png) | 1 user liked this post
|
06-08-2010, 04:20 PM
|
#26
|
Account Disabled
Join Date: May 17, 2010
Location: Austin, TX
Posts: 36
|
You wanted suggestions for more security?
Here's one: Stop storing sensitive information in your database. Period.
|
|
Quote
![Like](/images/like.png) | 1 user liked this post
|
06-08-2010, 04:58 PM
|
#27
|
Pending Age Verification
User ID: 2809
Join Date: Dec 19, 2009
Location: Austin, Texas
Posts: 116
My ECCIE Reviews
|
Thanks. Emails stored off site, phone numbers on my phone. That's all I got.
What else is there? Nothing. Number of times a client has seen us? nope? session details? no way. addresses? No.
LOOK - Wild Flowers is a legit entertainment service. Fees are for time and companionship ONLY. Nothing illegal going on here. Heaven forbid! What are you so worried about? Winemaker (not his real name, BTW) is the only person who's posted on this thread who's ever seen a WF girl. His number was deleted long ago from my phone, though it MAY still be amongst my old emails. No need for him to freak out.
Or you other guys. I take client's privacy seriously, and probably protect it as well or better than any other agency or provider around. You guys being a little... dramatic?
|
|
Quote
![Like](/images/like.png) | 1 user liked this post
|
06-08-2010, 08:08 PM
|
#28
|
Lifetime Premium Access
Join Date: Dec 31, 2009
Location: Austin
Posts: 426
|
How secure is the Eccie site?
|
|
Quote
![Like](/images/like.png) | 1 user liked this post
|
06-08-2010, 09:44 PM
|
#29
|
Account Disabled
Join Date: Feb 8, 2010
Posts: 689
|
Doesn't have to be algorithm. A good RNG can make a good attack,esp if you know the feistel design. Backdoors, are by definition, a way of circumventing the cipher. All you need to look for the cascade of bit flips, then off you go. Text is much easier to decrypt, since, at least for english, there are known etymological precedents which induce early discovery.
Best ciphers have rotating keys as well as rotating ciphers. Never cipher a lump of information. Break the chunks up. Different directory, different key, different cipher. RNG are not great keys, since most are not necessarily primes, but prime factored. Human interface determined keys are best ( random mouse motion, etc ). Best to have entropy > 95%. Get beyond that, and other parties will take great interest in your entropy generator.
GOODNIGHT!!! i think i will just go back to installing fences and building decks.
peace
atx
|
|
Quote
![Like](/images/like.png) | 1 user liked this post
|
06-09-2010, 01:28 AM
|
#30
|
Valued Poster
Join Date: Dec 19, 2009
Location: On walkabout
Posts: 352
|
Three quick thoughts:
1 - Keeping old e-mails for any reason other than a client whom is or was a danger to you, your girls, or the community at large is a red flag for many. I don't care about how it's stored, how it's encrypted, or anything of the like. Any system you have can, and will, be targeted if you ever were. While we know you are a legitimate entertainment service, many of those services can be targeted and harassed by authorities and those emails could compromise people.
2 - If your ECCIE account was hacked, what about the PM's? I know all of us have tons of PM's and if you keep e-mails, I would guess you keep the PM's. What info / details could be gleamed from those messages.
3 - Encryption will never beat deletion and overwriting (repeatedly). Ideally, the use of a small thumb drive (IronKey comes to mind) for your "off-site" storage is a little more ideal. Whereas IronKey will simply fry itself after bad password attempts, even a standard thumb drive will take the over-writes and do a damn good job of being hard to read.
I would go with TrueCrypt on any day over PGP. PGP's heyday was over 15 years ago at this point.
Just my thoughts and suggestions
|
|
Quote
![Like](/images/like.png) | 1 user liked this post
|
|
AMPReviews.net |
Find Ladies |
Hot Women |
|