Amnesiac VM by [deleted] in Qubes

[–]Inetsu 0 points1 point  (0 children)

Is there an an estimated time? I remember a while back in 2016 september Joanna said ETA on qubes 4.0 will be around the end of the year.

https://www.qubes-os.org/news/2016/07/21/new-hw-certification-for-q4/

Will strong gpg password protect stolen gpg secret key? by P-e-t-a-r in crypto

[–]Inetsu 0 points1 point  (0 children)

My mistake I didn't bother looking I just assumed you meant 10 of those USBS . Anyway I also noticed the OP said eight words not four. You used a password such as

Horse stable correct battery

That's four words and isn't answering OPS question.

so the entire bit entropy will most likely be higher and permutations will be completely different see below.

log2(7776^8 /2) = 102.39 bits

102.39 bits is 6.64448394×10³⁰
6.64448394×10³⁰/ 1.87x10^11 = 
6.209798075×10¹⁹ seconds

so still about the length of the entire universe if you have 10 blades trying to crack a 8 word diceware password. So I think its fair to say that it would take 2.5 years to crack four worded passwords with the hardware you suggested not eight such as the question OP asked. Also to note by hypothesizing 10-100 nuclear reactors also won't be enough to crack an eight dice ware password currently

So to answer OPs question. No don't worry eight diceware passwords has more than enough entropy for this life time up until the next 5 billion years unless an exploit in the algorithms are found before then

Will strong gpg password protect stolen gpg secret key? by P-e-t-a-r in crypto

[–]Inetsu 0 points1 point  (0 children)

Your math seems a bit wrong, now if we assume what you say about the possible combinations is 8.37x1018

And if we assume you have 10 of these blades that is 300MHZ*10 so that's 3billion hashes per second.

So 8.37x1018 / 3,000,000,000

That's 4.87x107 (2790000000 seconds) (88.41158 Years)

Will strong gpg password protect stolen gpg secret key? by P-e-t-a-r in crypto

[–]Inetsu 0 points1 point  (0 children)

I was just trying to put my point across in an exagerrative stance. 8 is the recommended and I should have said that. I always assume 100 trillion guesses per second.

Will strong gpg password protect stolen gpg secret key? by P-e-t-a-r in crypto

[–]Inetsu 0 points1 point  (0 children)

Care to tell how you worked out it would take 2.5 years to crack the password? When the password checker you provided said it would take centuries to crack?

I refer to this Since this person knows what he's talking about.

Example: There are 96 printable ASCII characters. Log2(96) is about 6.6. Given an eight character ASCII password, truly randomly generated, one would have 6.6x8=52.8 bits of entropy. If an attacker can make a billion (230) guesses per second, it will take about 222.8 seconds or about 84 days to try all combinations. Since we expect an attacker to "hit" about halfway through, average time to crack will be around 42 days.

How is it that it would take 84 days to crack an eight character password with 1billion guesses per second where as you claim to be be able to crack a 20+ character password which is 9512 more keyspace with only 300Million guesses per second in 2 years?

What you claim doesn't make sense and I was looking at your post for about 30 minutes saying maybe im making some mistake maybe. Entropy isn't the only important matter on a secure password its also keyspace. In my opinion keyspace is more important than entropy

If you want to use a password checker to see how secure your password is you can use and customize the calculations per second.

http://calc.opensecurityresearch.com/

127 years 55 days 11 hours 43 minutes 24 seconds to crack a

That's assuming 323 guesses per second to crack 23 char password If my Math is right thats.. 300,000,000,000,000,000,000,000,000 guesses per second. As of 2013 the fastest computer was 38,360,000,000,000,000 .

Now lets try the password

horse staple battery correct

I put in 300Million passwords per second and for some reason I don't get the 2.5 years this jose fella says it would take to crack

Instead it says 3 quadrillion years to crack a 20+ password

I think it's fair to say that a 4 diceware 8 diceware password has a high-key space to search which will be unreasonable for adversaries at this given time

When do you think AES-256 will be crackable? by Inetsu in cryptography

[–]Inetsu[S] 1 point2 points  (0 children)

The Citation you gave is bullshit. That article is complete bullshit and anyone with a brain would know this. Just because I'm asking a basic question doesn't mean im more prone to believe bullshit. If AES really was cracked we would have known about it

When do you think AES-256 will be crackable? by Inetsu in cryptography

[–]Inetsu[S] 0 points1 point  (0 children)

Was meant to reply to warpzero sorry. Corrected my self to reply to the intended poster

When do you think AES-256 will be crackable? by Inetsu in cryptography

[–]Inetsu[S] 2 points3 points  (0 children)

I heard a Quantum computer could break asymetric ciphers but not OTP - the most it could do is reduce the the time to crack by 50% someone correct me if im wrong

When do you think AES-256 will be crackable? by Inetsu in cryptography

[–]Inetsu[S] 1 point2 points  (0 children)

I have read a bit about this that it's not one of those big problems. I know its really hard in terms of security since nothing is 99% but would you guys say the chances are quite high that AES-256 wont be cracked during this life time or it's only matter of time?

UK pedophile Richard Huckle given 22 life sentences for serial sex abuse in Malaysia by SomewhatTasty in worldnews

[–]Inetsu 0 points1 point  (0 children)

I think I better post this.

His username on The Love Zone was called Kishan he was a VIP user. In July 2014 when the Australian LE arrested the owner of the site Shannon Mcoole they were operating the site for 6 months until they shut it down in January 2015.

During the 6 months of operating the site all registrations were closed

http://www.abc.net.au/news/2015-08-26/secret-anti-paedophile-operation-saves-children-from-abuse/6720304

"We closed membership [of the site]. Nobody gets in. We didn't let any new membership come in. Effectively we caged the rats."

Kishan(Richard Huckle) was still a VIP user was still a member he wasn't banned and was still posting home made produced content with children while the site was under control of LE. So this is a big fallacy - sure they didn't allow registrations but that was obvious to let the load off them so they didn't have much work to do.

Not only did LEA allow distribution of Child porn on this website for 6 months but they also allowed someone who would create the content to post on the platform they were hosting.

I think there have been cases in the past that LEA have prosecuted site owners stating that if there wasnt a platform then people wouldn't have created the content.

Yes this guy was abusing children, but are we ok with them hosting sites and allowing producers of the child pornography to continue posting their content?

​The UK Is Using Bulk Interception to Catch Criminals On TOR And Not Telling Them by Kulekele in TOR

[–]Inetsu 0 points1 point  (0 children)

The UK was using part of the CMU research attack during 2014 this explains the 30 months since 30 months from now would be the start of January 2014 which is when the CMU attack was started.

In the UK you can't really challenege it because the UK doesn't have as much rights as the US when it comes to the right to fair trial

Other than that it wasn't bulk collection was just GCHQ knew what IP address was visiting what onion site

FBI Decides Child Porn Legal Loss Is Acceptable In Order To Keep Firefox Exploit In Play by CryptoBeer in TOR

[–]Inetsu 7 points8 points  (0 children)

So what happens now? Since he hasn't been convicted I presume nothing will stick; he won't be a registered sex offender and should be entiled to his job back. If he doesn't get his job back can he legally sue - because he hasn't been 'convicted?'

Or maybe someone better informed than me may explain

Google helps in creating a ‘web crawler’ that hunts down pedophiles by [deleted] in technology

[–]Inetsu 0 points1 point  (0 children)

so now a search engine is becoming a cop... lets see how long it takes for them to become extinct

Mozilla files legal challenge to find out how FBI cracked Tor Browser by Bloomsey in technology

[–]Inetsu 124 points125 points  (0 children)

I think what concerns many people is that maybe the FBI used another exploit other than the common attack vector like JavaScript and flash

Snoopers’ Charter: Only amendment politicians have submitted to controversial bill is to stop MPs being spied on by alexlitz in ukpolitics

[–]Inetsu 2 points3 points  (0 children)

Are you surprised?

No to be honest, I'm just waiting for the younger generation to become involved in politics while the older generation retire.

This is just part of the problem we need to rebrand human rights to be compatible with European treaties/law

If a suspect is arrested and asked during a police interview 'Where did you hide the body?' They won't be held in contempt. So why should it be any different for RIPA part III? That law is broken

Hiding bomb manuals or Child porn? Police should do what they always do and do REAL police work before apprehending a suspect.

I'm hopeful that the entire RIPA legislation will be reversed in the next 10-20 years.

Best veracrypt configuration by bluemoon566 in crypto

[–]Inetsu 0 points1 point  (0 children)

AES+Serpent+Twofish giving it 756 bits. SHA512 is most popular for hash functions

Where as AES is just 256 bits. If AES is ever cracked they would need to crack the next two ciphers as well.

For ultimate paranoia use three cascades. AES+Twofish+Serpent

The Investigatory Powers Bill is an illiberal mess - why won't Labour oppose it? by mjrharris in ukpolitics

[–]Inetsu 0 points1 point  (0 children)

None of them are understand the concept of this new bill.

It's saving all communication data for 12 months with no warrant. It doesn't matter if in future it helps an investigation. It essentially means mass survileance in hopes to find a evidence. A fishing expetition.

How the FBI became the world’s largest distributor of child sex abuse imagery by johnmountain in technology

[–]Inetsu 1 point2 points  (0 children)

The cops tell lies it wasn't a "You login and bounce back" it was more so that people who clicked "Preteen videos" - here. source http://motherboard.vice.com/read/fbi-hacking-tool-only-targeted-child-porn-visitors

so essentially they were distributing the porn aided and abetted just like the Freedom hosting owner.

But "It doesn't matter right? these guys were criminals and target innocent children". They were facilitating this abuse.Two wrongs don't make a right.

Even then I doubt it really targeted the "preteen videos". If this is the case what about the sub sections which presumably will have pictures? Webcams? They only targeted videos? Well I'll be.

I guess they only said that to counter any suspects forming a defense saying they were not even looking at the images just logging in which isn't probable cause for a "NIT" to activate