Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

Anyone know how this domestic spying thing will affect VOIP calls?

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
This topic is archived.
Home » Discuss » Archives » General Discussion: Presidential (Through Nov 2009) Donate to DU
 
joeprogressive Donating Member (1000+ posts) Send PM | Profile | Ignore Sun May-14-06 05:03 PM
Original message
Anyone know how this domestic spying thing will affect VOIP calls?
I have Time Warner which I think is a big Bush contributer. If they cooperated, I am switching. Also, what about cingular wireless?
Printer Friendly | Permalink |  | Top
Freedom_Aflaim Donating Member (745 posts) Send PM | Profile | Ignore Sun May-14-06 05:05 PM
Response to Original message
1. of course it will
google "lawful intercept voip"

Printer Friendly | Permalink |  | Top
 
yourout Donating Member (1000+ posts) Send PM | Profile | Ignore Sun May-14-06 05:07 PM
Response to Original message
2. You can bet they have been listening to VOIP for a while.
Printer Friendly | Permalink |  | Top
 
Poll_Blind Donating Member (1000+ posts) Send PM | Profile | Ignore Sun May-14-06 05:14 PM
Response to Original message
3. If you use something like Skype, possibly not.
Article here. Encryption kicks the NSA's ass. Not that they can't crack the encryption (they can, possibly, if it's low enough) but that the data would require special, limited, resources to decode.

PB
Printer Friendly | Permalink |  | Top
 
Che_Nuevara Donating Member (517 posts) Send PM | Profile | Ignore Sun May-14-06 05:43 PM
Response to Reply #3
5. And if you use an onion router (like Tor)
then you're good to go. If they really wanted to, they could trace your routing and break your encryption, but damn, fighting terrorism isn't THAT important.


Tor's website: http://tor.eff.org
Printer Friendly | Permalink |  | Top
 
3waygeek Donating Member (1000+ posts) Send PM | Profile | Ignore Sun May-14-06 05:44 PM
Response to Reply #3
6. However, if you believe
this guy, cracking encryption is a piece of cake for the NSA.:tinfoilhat:
Printer Friendly | Permalink |  | Top
 
yourout Donating Member (1000+ posts) Send PM | Profile | Ignore Sun May-14-06 06:10 PM
Response to Reply #6
8. Now that is Hall of Fame level Tin Foil
Waaayyyyy Out there.
Printer Friendly | Permalink |  | Top
 
Poll_Blind Donating Member (1000+ posts) Send PM | Profile | Ignore Sun May-14-06 06:12 PM
Response to Reply #6
9. I'm a Gray, myself, and I take offense at his assertions! 8^)
Seriously though, the maxim information is power is quite true and very-well understood in the defense industry. For instance, when Drs. Cooper and Boone discovered the largest Mersenne Prime I geniunely do not believe they were walking in unexplored territory. Primes, up until quantum cryptography, anyway, were/are the currency of cryptography and valued very highly. Primes have left the realm of mathmatics and become defense assets a long time ago.

I get around this by A) making my own Blowfish derivitaves and B) sending the message entirely in Navajo pig-latin.

As to the human-Gray deal, send more Camrym Manheims and less Callista Flockharts and it's back on!

PB
Printer Friendly | Permalink |  | Top
 
dchill Donating Member (1000+ posts) Send PM | Profile | Ignore Sun May-14-06 05:28 PM
Response to Original message
4. Don't worry...
they're covered.
Printer Friendly | Permalink |  | Top
 
longship Donating Member (1000+ posts) Send PM | Profile | Ignore Sun May-14-06 06:01 PM
Response to Reply #4
7. Not easy to break.
Edited on Sun May-14-06 06:04 PM by longship
The algorithm is even openly available for anybody to look at.
Here it is:

  • n = pq, where p and q are distinct primes.
  • phi = (p - 1)(q - 1)
  • e < n, such that gcd(e, phi) = 1
  • d = e^-1 mod phi
  • c = m^e mod n, for 1 < m < n
  • m = c^d mod n


The problem is that this is a trapdoor function which is straightforward to calculate in one direction, but is extremely computationally complex in the other direction.

Now I know that the NSA has plenty of computing horsepower, but I suspect that they are still not able to routinely crack long key length encryption, especially for a system which is in general use throughout the world.

RSA and other cyphers were under US export restrictions for years. In practice, because of the Internet, these restrictions only meant that people wishing to use RSA (and others) could only get the cypher from outside the US where it was easily available to anybody. Regardless, the US classified RSA and other cyphers as a "munition". The restrictions remained in place until Bill Clinton, realizing their folly, lifted them.

I think that the NSA probably is doing research on the fast factoring of primes, but it is not likely that they could reach any breakthroughs in this area sufficient to enable them to routinely break hard cyphers like RSA. The reason why I can state this with some certainty is that mathematicians all over the world are researching this stuff. If there were an exploit, it would likely have been reported in the peer-reviewed math journals. (This is the stuff of which fame and fortune are made in the mathematics world.)
Printer Friendly | Permalink |  | Top
 
Recursion Donating Member (1000+ posts) Send PM | Profile | Ignore Sun May-14-06 06:22 PM
Response to Reply #7
11. Well...
... for DES there's speculation that NSA's edits to the standard after IBM was finished with it set up a "meta-trapdoor" that only NSA knows about (personally my analysis suggests that they actually removed a meta-trapdoor Big Blue put in, but that's a subject for another thread)...

My advice: stick with blowfish and twofish, the two ciphers that had the least Gov't input in their creation. Our privacy is our own responsibility, and the extent to which people are lax with it disturbs me. It is possible to communicate securely using open-source, verifiable, scientific ciphers and protocols. Yes, it takes more effort to set up. Yes, it's a pain in the ass. It's worth it.
Printer Friendly | Permalink |  | Top
 
longship Donating Member (1000+ posts) Send PM | Profile | Ignore Sun May-14-06 07:21 PM
Response to Reply #11
13. You are right about one thing.
We need strong crypto if only to prevent our own government from depriving us of our rights. The only way to have *safe* and strong crypto is for the algorithms to be peer-reviewed and public. I agree that blowfish et al satisfy both requirements nicely (as does RSA).

I use strong encryption all the time at work and in private as well, if my correspondents have taken the trouble to install it. I wish more people would take the trouble to find out about this. With this NSA shit, maybe they will.
Printer Friendly | Permalink |  | Top
 
Recursion Donating Member (1000+ posts) Send PM | Profile | Ignore Sun May-14-06 06:18 PM
Response to Original message
10. Encrypt, encrypt, encrypt
If you aren't already using strong encryption, all the time, every possible place you can, you aren't paying attention.
Printer Friendly | Permalink |  | Top
 
joeprogressive Donating Member (1000+ posts) Send PM | Profile | Ignore Sun May-14-06 06:58 PM
Response to Original message
12. I'm not worried so much about programming computer to avoid it
I'm not that tech savy. I would rather punish Time Warner for selling out by hurting them financially. The siple solution: dump 'em. Anyone know about Cingular?
Printer Friendly | Permalink |  | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Tue Apr 30th 2024, 04:13 PM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » Archives » General Discussion: Presidential (Through Nov 2009) Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC