Reply to post: Crypto schmypto

Spies still super upset they can't get at your encrypted comms data

David Roberts
Big Brother

Crypto schmypto

So much commentary on encryption when everyone knows that you can't effectively backdoor encryption.

The narrative has moved on.

At some point, to be intelligible, the information has to be in clear. Pre/post encryption. 5 Eyes are mandating that the data has to be accessible in clear to themselves.

There are already major concerns that router encryption chips can be told to divulge clear text. China won't use US routers and vice versa. This just extends reach so that all commercial hardware platforms have to have embedded capability to reveal clear text pre/post encryption.

There is a lot of suspicious stuff embeded deep below the OS on computer mother boards. Mobile SOCs get more complex every iteration so almost anything could be buried in there.

Going on about encryption is just the magician waving one hand in the air to distract whilst the other hand does the real work.

Regardless, someone has to design and manufacture any intrusion system and then employees have to use it. There may be a brief gain early on, but information invariably leaks over time. Down the line we will find out what they really did.

Think about how you can securely encrypt off platform. Not using computing hardware made by someone else. This includes USB devices because they have a SOC in them.

Recommendation; learn to hand encode important messages using One Time Pads, obscure book references, code words, other traditional methods. Give up all naive hope that your everyday online brain farts and cat pictures will ever be secure from official and officious snoopers. Oh, and make sure you include a lot of garbage text in your daily communications to mask the important stuff.

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon