Honan added: “My concern is that we would have politicians and others who don’t understand technology and the implications of the technology, bringing in laws or regulations that would be unenforceable and ineffective against the targets that they’re after.

“If you make certain encryption tools illegal, it’s not going to stop criminals or terrorists from using them. If you introduce backdoors or weaken encryption in certain tools or products, it’s just going to the legitimate tools or products that normal people use - and again the criminals or terrorists will use alternatives that can’t be regulated.”

Honan said: “Maybe part of the problem is that somebody needs to be seen to be doing something.

“If regulations or legislation is introduced to support that policy, then it’s succeeded. If no rules are brought in and an atrocity happens, people can raise up their hands and say ‘you know they used encrypted communications, that’s why this happened’.

8

A858DE45F56D9BC9

If you don’t already know about A858DE45F56D9BC9, I don’t know if I can explain it.  I’ve been following it for a while, but don’t know enough about crypto to really contribute.  An atypical post came up recently (https://www.reddit.com/r/A858DE45F56D9BC9/comments/2jtoce/201410210620/).. and was at least partially solved:

<##################
 A  #       #     #
 8 #N#     #S#    #
 5 #E#  #  #T#    #
 8 #W# #N# #I#    #
 D  #  #O# #L#    #
 E #E#  #  #L#    #
 4 #Y# #A#  # #   #
 5 #E# #N# #W#T#  #
 F #5# #S# #3#O#  #
 5  #  #W# #A#O#  #
 6     #E# #K#L#  #
 D     #R#  # #   #
 9     #S#        #
 B      #         #
 C  ###### ###    #
 9 #AMOUNG#YOU#   #
<##################

I took roughly half of the source data provided in the post and used it to generate images (gifs count up to generate 16 unique tiles.  Assign each hex character a tile.  Lay them out left to right, top to bottom).  Call it abstract art, I guess.  It was an interesting project, but a maybe too labor intensive to see to completion.

Which apps and tools actually keep your messages safe? In the face of widespread Internet surveillance, we need a secure and practical means of talking to each other from our phones and computers. Many companies offer “secure messaging” products—but are these systems actually secure? We decided to find out, in the first phase of a new EFF Campaign for Secure & Usable Crypto.

If you’re like me, you often find yourself alone in the afternoon generating strings of random integers.

That’s why I choose Random Dot Org.

Unlike other random number generators which can produce embarrassing pseudo-random sequences, Random Dot Org utilizes state-of-the-art radio antennae to capture atmospheric noise and convert the data into numerical values, so you don’t have to.

Random Dot Org, because 33 42 87 83 44 14 70 100 29 31 62 59 40 76.

#GCR is now in 104 countries & going strong guys, 💪growing everyday! If your not familiar with #cryptocurrency plz educate yourself on the #decentralized industry, why it’s so needed and what it will do for us in the near #future #globally! The GCR Coin is backed with value & structure this is why our coin will be the most wanted #luxury #crypto on the market. If you want to learn more or get started click here 👉bit.ly/global-kcfash or email kcwilbon@gmail.com

…the term ‘zero knowledge’ is so appealing that it leads to problems. People misuse it, assuming that zero knowledge must be synonymous with ‘really, really secure’. Hence it gets tacked onto all kinds of stuff — like encryption systems and anonymity networks — that really have nothing to do with true zero knowledge protocols.

This all serves to underscore a point: zero-knowledge proofs are one of the most powerful tools cryptographers have ever devised. But unfortunately they’re also relatively poorly understood. In this series of posts I’m going try to give a (mostly) non-mathematical description of what ZK proofs are, and what makes them so special.

Donate Doge coin DRgEk7J6pvyXrd48t1czGEvp6WMduxE6Pu

Recommendations:

 * For users, “don’t”.  Cursory analysis found enough fundamental flaws, and secure protocol design/implementation errors that I would be reluctant to consider this secure, even if the known issues were fixed.  It may be worth revisiting in several years when the designers obtain more experience, and a thorough third party audit of the improved code and design has been done.

Nach Großbritanniens Premier Cameron und US-Präsident Obama hat nun auch der Bundesinnenminister gefordert, dass Sicherheitsbehörden in die Lage versetzt werden müssen, verschlüsselte Kommunikation einsehen zu können. Das diene dem Kampf gegen den Terror.

(via Rüdiger von Finckendorff)