Re: To use raw power is to make yourself infinitely vulnerable to greater powers -Frank Herbert
@rjed
Quote: "....terrorists do not hangout on WhatsApp, Facebook...."
*
But even if they do, they can still use private ciphers. Even if they use the comments area in El Reg to pass messages, the spooks have the same problem. Namely, anyone using a private cipher BEFORE the message enters the channel gets real-time messaging. The spooks on the other hand may have to wait a while, maybe a long while, maybe never to find out what is being said. (See Beale Papers for an example of two message secure for over a century.)
*
So here's the procedure:
A) Encrypt message with private cipher
B) Avoid locations using CCTV
C) If using a burner phone, make sure that your "honest citizen" phone is switched off or located far away
D) Send the message using a hijacked WiFi access point (or an internet cafe, or a VPN, or a burner phone, or El Reg)
*
Result: Spooks using the legally mandated backdoor in an end-to-end encrypted public service get:
E) To examine the private cipher message.....
F) ....which came from an IP address which has either no personal identity, or the identity of the wrong person or business
*
051k0UC319e4083J17r90Nhb0U$80WZ40pps0UTd
1dsJ0ygw0zty0=T40PzU1VhF00$q0rEr0ALd0Ove
0y7W1m6n19ny0IIS0PCp0DLz18ab1g5q0pRY1L$W
0yo$0zsE08GH1cUw1Wvr11I50UIv1mfp0o0g0kho
0bCa18aW0ChM1mjC01oi1cSo0c=80UGR1LR$1j3o
0j=u1LBl1N7p1U5d1XUL16HF1Hrv0WwK0UgB0EYW
0W0u1KnM1hTL0E6l0wIe0DYm0StQ1Uvv1l4e1SbG
1WYO0$rb0Baw1mBH0inR0qIA0XS80Q1t1EL=005b
1dqs09Qp04J70lqC1RYt0A7u0mmv1Uan0z3d1c9E
0oG70TZH133g0L8l1kYt0kAz121305RG0oY015Om
1L2l0P3E112d1W$30yOr1f8l0ZEU0jPt1HGg0naI
0mWi0JN816X50kvp13lr1Kno11Uq0cKW031Z0nHQ
11$D0J6e0SON0=Rj1kmJ05Qu1Y$70tW30dk90SN6
1EoC1KNJ1PPH1ARc02gL
*
P.S. Like the Beale Papers example, this is a book cipher example. I know, I know....book ciphers are crap. But they might just be good enough to get the job done!