anonymous asked:

Jeff Davis: “This episode starts two characters down a path that’s been building for years” WHAT DOES THIS EVEN MEAN? That they're starting to down the romantic path from this on???

decrypting jeff davis is like decrypting the da vinci’s code

Madeon - Pay No Mind (ft. Passion Pit) (Music Video) symbols decrypted (updated)

Hey, thank you for sharing the last decryption! You made me so happy, that I’ve done a new one for Pay No Mind.

Note: In this video, there are new symbols that only show dots. I’ve tried to compare them to the “original” symbols but I couldn’t see any relation between them, so if you know more, please (!) contact me and tell me your theories.

Thanks to the people behind I’ve got a few tips and theories about the dots. The dots are showing the order of the letters.I let you guys & girls the fun to crack it your own, it’s pretty ceel.

It seems like either there will be no symbols in the next video as they are leaving the city, but it could also be that we will see more of the dotted symbols, so if we could find out what they are about until then, that would be great!

Also I’ve added another one I’ve forgot earlier, the “S”

Thank you for checking this out! See you soon :)
Justice Department Says It Should Be Able To Require People To Decrypt Their Computers | Techdirt

Another big legal question is hitting the courts, as the Justice Deparment is asking a federal judge to require a woman to decrypt her encrypted laptop as part of a lawsuit against her for a mortgage scam. The government claims that forcing her to decrypt the laptop is no different than standard discovery procedures, such as requiring someone open a safe. However, others, including the EFF, are arguing on Fifth Amendment grounds, that individuals should not be compelled to decrypt such encrypted content, on the grounds that it’s a form of incriminating yourself, if the content is found to be useful in prosecution. As we’ve discussed in the past, some courts have found that people cannot be forced to turn over their encryption key on this very basis. However, this case is slightly different, in that the government is seeking to get around such earlier rulings, by saying that it just wants to require her to type the password in herself to decrypt the laptop – rather than demanding the key itself. However, the EFF's brief(pdf) in the case suggests that this really isn’t a huge difference, and just the decryption requirement alone would be a Constitutional problem.
Russian company releases commercial iOS decryption toolset | Ars Technica

The first commercially available set of tools for cracking the encryption and passwords on iOS devices has been made available by Russian security company ElcomSoft. One part of their software is a password breaker, while another part, available only to law enforcement and forensic agencies, is able to extract numbers used to create the encryption keys for iOS data to render decrypted images of the device.

The decryption tool requires access to the device in question, but once it’s in hand, a few different kinds of keys need can be scraped from it, including the unique device key (UID) and escrow keys calculated using the UID and escrow pairing records. If the device is only protected by a 4-digit passcode, the program then only needs to brute-force its way through that to get access to all of the decryptable information.

iOS was never much of a security fortress (as we’ve noted numerous times) and even this new tool uses a variation of a previously discovered method. Charlie Miller, of Pwn2Own fame and a principal research consultant with Accuvant, even pointed out to Ars that the Fraunhofer Institute for Secure Information Technology detailed a very similar method in a research paper they put out in February. However, their tools are not for sale.

If your phone or tablet regularly comes under scrutiny of the law, Miller adds that this commercially available toolset is fairly simple to route by using a long, complex password rather than a 4-digit code to protect your data. The ElcomSoft method comes with a password breaker, but much of its efficiency is derived from defining limits on the possible guesses, such as variations on a certain word.

While “beating it out of you” will remain the superior method of password obtainment for the average law enforcer, the password breaker could still come in handy for when you can’t remember which characters in your leetspeak password were numbers, and which were letters.

Watch on

The most enigmatic of all codes in the most clandestine of all places has yet to be fully broken. “Kryptos,” a coded sculpture in the courtyard of CIA headquarters in Langley, Virginia, contains a long string of seemingly nonsensical letters that conceal a message devised by sculptor James Sanborn. Some portions have been deciphered, but the last bit remains a mystery. Solutions anyone? (via NOVA | Kryptos)

Consider encrypting your computer.

I do not believe in cyber security, it is absolutely impossible to have a fool proof system these days. Sure, Internet companies can always (and they do) put a lot of money and time in ensuring that their systems are secure, but inevitably there will always be bugs.

The story is completely different when it comes to your personal computer. Most of us have loads of pictures, videos and other personal information on our machines. Most people will often store passwords, keep logs, financial information on their computers. Bad people are out there, and some of them are going to want your information. It’s unlikely that the everyday Joe has super secret information on his computer, but since it is very simple to carry out, why not take a little effort and secure your computer?

In addition to the hackers and crackers out there, Windows users need to worry about the giga loads of malware and adware that is available for Windows machines. If you install a good antivirus (in the software world, good and paid don’t always rhyme!) chances are that you’ve safeguarded yourself from the first wave of attackers. Most of the malicious files, virus, root kits and trojans should be filtered out at first go. However, there is always the remote chance that the software you use has a zero day someone is sitting on. (Zero day’s are bugs in software that are not made public, instead the hacker would rather sell this to the manufacturer of the software and make a decent sum of money). There are tons of bugs unknown to the original manufacturer, so to be on the safe side, you should update as often as possible. That way you get the best possible protection. Firewalls add another layer of protection. For Windows machines, a good combination to have is Avast + Comodos’ firewall. Mac’s usually do not need AV’s, the built in firewall works superbly (Mac users, additionally you should go the advanced options and turn on Stealth mode, that makes you invisible to most attackers)

The stuff I’m talking about today though is encryption - 

Suppose that an extremely well written trojan breaks through and has access to your files, then what do you do? Screwed right? Well yes, but if you have encryption - no.

Encryption works in a very simple way, a fixed or adaptable algorithm is applied to all your files and this is converted into something that is not human readable or recognizable. Some very advanced algorithms are out there. You can rely of these to protect your files. Even if the attacker steals your files (mybankaccount.txt anyone?) the contents will make no sense to him at all. The decryption key will be with you, and you can always be assured that without the decryption key, there is no way the hacker or attacker will be able to crack it. (Well yes, poor algorithms, simple passwords, stuff like that can still happen)

Windows users can check out truecrypt, or the built in bitlocker (both are excellent). Bitlocker uses 128bit AES.

Mac users have a far fancier option, filevault2 (on Lion, filefault on anything before that). It uses AES-128-XTS, rest of the details are kept undisclosed. Cracking an encryption is just impossible with the usual analysis. Some very very advanced (and I do mean VERY advanced) attacks might be able to crack it, but in 99.99999 cases you’ll be safe.

I have my personal computer - a MacBook Pro, encrypted end to end, and I recommended you should do this too.

Yep! These are baby steps, but they do go a long way.
Judge Orders Defendant to Decrypt Laptop

Here’s an interesting case. A judge orders a defendant in a bank fraud case to decrypt her laptop so police can search it for evidence. At first I thought it made sense, the police presumably had a warrant to search the contents of the computer to search for evidence, but they can’t because cracking the encryption is too hard. But then I got thinking. If the police get a warrant to search your house, do they force you to produce a key or can they break the door down? If the police have a warrant to search the contents of your safe, do they order you to produce a combination or do they crack the safe? Such is the case of an encrypted laptop. Since they already have a warrant to search the hard drive, they can go through the hard work of decrypting the hard drive themselves. “It’s too hard” should never be an excuse to erode civil liberties, even if it lets guilty people go free.

Then there is a matter of the fifth amendment, self incrimination. It applies because of how encryption works. When you encrypt data, it is scrambled using an algorithm that only the password can solve. In its scrambled state, the data doesn’t really exist. Only by entering the password does the data come together to make the desired file. So by forcing the defendant to produce a password, you could say the judge is ordering her to incriminate herself.

The defendant’s lawyer needs to get a computer security expert into the courtroom.

I made an encryption program

For my IT practical assessment for the term, I had to make an encryption program. Here’s the link:

To use, just right-click on the zip file you downloaded, extract it, and run Encrypt-it.jar

Please note that you need Java on your computer in order to run the program.

Random information:

- Done over the course of about three days

- My first time making a GUI

- The only bug I’ve noticed is that if you hit enter to go to a new line, it gets lost when you encrypt/decrypt your message. I tried to fix this, I don’t know how. If you know how to fix this, please tell me

- Consists of a substitution cipher and a Caesar cipher, applied one after the other

- I know the name is near-illegible at the end. If you can suggest a better name, please give one. It’s only called Encrypt-it because I had to name it something

- The most complex program I’ve ever written, and it’s still basic

For comments, suggestions, feedback, problems etc, please feel free to send me a message/comment on this.

If you’re a skilled programmer and stumbled upon this expecting greatness, sorry for killing your expectations. Kthnxbai

In June 1953, a newspaper delivery boy (known only as Jimmy) was collecting from his customers when he noticed something weird about one of the coins that he’d been given: It was really, really light. The reason soon became clear. After he dropped it on the ground, it split open and revealed a tiny photograph depicting a sequence of numbers. Jimmy didn’t bother telling anyone about his discovery – except his friend, who mentioned it to her father, who mentioned it to his police detective friend, who mentioned it to the FBI. After decrypting this long game of telephone, they were able to examine the coin and photograph. By the strange way that the numbers were organized, they discovered it was a message from a Soviet spy.

5 Total Nobodies Who Stumbled Into Huge Conspiracies

New Post has been published on Claire Magazine

New Post has been published on

New Bill Aims to Stop State-Level Decryption Before It Starts

External image

External image

Finally, some encryption legislation that makes sense.

The post New Bill Aims to Stop State-Level Decryption Before It Starts appeared first on WIRED.


I still want to write one of my original fics about a witch in Greece who has mad skills in painting but pushes it aside to become a Rune Analyst at thirteen (passing NEWTS early and being an heir to an old line giving her legal status according to some ancient laws) so she can provide for her younger sisters and brother (Harry)...the skeleton of the fic was written years ago but I might never actually do it...

Who knows, really?