Jump to content

Recommended Posts

Posted

News you can use:

Encryption used in Apple's iMessage chat service has stymied attempts by
federal drug enforcement agents to eavesdrop on suspects'
conversations, an internal government document reveals.


An internal Drug Enforcement Administration document seen by CNET
discusses a February 2013 criminal investigation and warns that because
of the use of encryption, "it is impossible to intercept iMessages between two Apple devices" even with a court order approved by a federal judge.

Internal document from the Drug Enforcement Administration complains that
messages sent with Apple’s encrypted chat service are “impossible to
intercept,” even with a warrant.

Interesting, eh? Big Brother can be foiled it seems. smile.png

  • Like 1
Posted

FALSE - this is false information planted to get people to use this thinking it is secure. There is no "Common" encryption that the governments cannot break and there are back doors to most of the common ones. Best would be using something like TRUECRYPT and doing a double encryption. Could be broken in time but it would really give those snoops a headache in trying it.

Posted

iMessage does not work very well if using a Mac and a mobile device on the same account. Messages routinely show up out of order or don't even show up.

Posted

FALSE - this is false information planted to get people to use this thinking it is secure. There is no "Common" encryption that the governments cannot break and there are back doors to most of the common ones. Best would be using something like TRUECRYPT and doing a double encryption. Could be broken in time but it would really give those snoops a headache in trying it.

tin-foil-hat.jpg?w=468&h=376

Posted
FALSE - this is false information planted to get people to use this thinking it is secure. There is no "Common" encryption that the governments cannot break and there are back doors to most of the common ones. Best would be using something like TRUECRYPT and doing a double encryption. Could be broken in time but it would really give those snoops a headache in trying it.

Truecrypt is used for encrypting files folders or disks its not used for encrypting messages

  • 2 weeks later...
Posted

FALSE - this is false information planted to get people to use this thinking it is secure. There is no "Common" encryption that the governments cannot break and there are back doors to most of the common ones. Best would be using something like TRUECRYPT and doing a double encryption. Could be broken in time but it would really give those snoops a headache in trying it.

Thats funny to hear, PGP haven't been backdoor or broken since it was created.

TRUECRYPT is easy to break with a brutforce attack.

Posted

I do forensics stuff. When talking about truecrypt, in order to trap the password in cache, the pc has to be turned on. If you turn off the pc, it is impossible to decrypt truecrypt drives.

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Recently Browsing   0 members

    • No registered users viewing this page.



×
×
  • Create New...