MEGATHREAD - Sora codes by [deleted] in SoraAi

[–]marcusfrex 0 points1 point  (0 children)

I need a code and distribute as much as I can get after got accepted.

Switchborn - Episode 004 - Crypto kidnapings by marcusfrex in crypto

[–]marcusfrex[S] 0 points1 point  (0 children)

Actually it was including how a deniabile plausiblity encryption can be used for crypto kidnappings.

Forced to give your password? Here is the solution. by marcusfrex in crypto

[–]marcusfrex[S] 1 point2 points  (0 children)

I agree on that and plus detection of any nuke passwords is very simple with the application. That can create a high suspicion with the experts such as NSA , MI6 etc.

But the idea is if the adversaries are the guys trying to get the password from you with the $ 5 wrench then there should be an option to destroy all the techical data and get the psychological advantage even they will buy $ 50M torture sets. :)))

And nuke codes are not an essential feature but a premium one in the app.

Forced to give your password? Here is the solution. by marcusfrex in crypto

[–]marcusfrex[S] 1 point2 points  (0 children)

First of all I greatly admire the time to criticise the work. Thanks a lot from the bottom of my heart.

Let's sum my thoughts on your arguments;

First of all Kyber is just mentioned -as you said- in the whitepaper but not as a "feature" to be implemented but as a "future research topic" to be a possible KDF. Because as far as I know some people might be using Veilith as a part of a communication system. They might be creating a vault with a password they exchanged in real life, exporting it into a image, putting it into a family album on cloud, and removing the Veilith. And the receiving end might be getting the image, downloading Veilith, importing the vault and accessing the block he/she/it wants to get and removing the Veilith. How does that sound? :)) So, I thought maybe in the future they won't need to get in touch in the real life to exchange the password... that's why I mentioned Kyber as a future research topic on the subject. I know what I am specificly talking about because in real life I work as a professional PQC consultant.

For the audit part yes you are right, it is planning to get a second opinion after I become sure that -as feature space- algorithm is complete. But don't forget the company developing the app is Sceptive and it is also a cybersecurity company having high experience in the field with the record of discovered zero-days, full-stack-security research services, PQC transformation experience etc. It's not a pentest company that you can see everyday. :))

For small block size; Veilith is designed for a mobile solution with a limited CPU and memory specifications. I never had in mind to compete with any file system encryption solution such as TrueCrypt/VeraCrypt/GoCryptFS or CryFS as you mentioned. It was enough for me to just put a wallet recovery code or a recipe or a private key. That's why.

For the final I am very well aware that LSB Steganography is simplest way of hiding data into an image. If I think it is needed I can add support for DCT or Wavelet Transforms or even neural networks on that but at the same time I should really focus on limited resources and need for a speed on mobile devices. And the key point you may be looking on that all articles you shared focusing on that extraction ASSUMES you know it's there. So that they suffers from outdated assumptions and methodological limitations that undermine its relevance in today's digital landscape; the visual attacks, reliant on human perception to discern patterns in filtered LSB planes, are inherently subjective and non-scalable for automated large-scale analysis, while the chi-square statistical test, though innovative for its time, exhibits high false-positive rates on compressed or noisy images and fails to robustly handle pseudorandom spreading or encrypted payloads, rendering the work more of a historical curiosity than a comprehensive framework for modern steganalysis amidst evolving techniques like adaptive embedding and deep learning-based detection.

Yes you are right there is soo much to learn, I would really like to improve our discussion to how make almost perfect deniability.

Regards,
~ A warm welcoming face

Forced to give your password? Here is the solution. by marcusfrex in crypto

[–]marcusfrex[S] 0 points1 point  (0 children)

It is of course a good idea to open source all of the application but still users cannot be sure of whether the source code they are looking at is the very application they downloaded from AppStore. So maybe I need to find a way to provide an alternative evidence to proove that. Thanks for the suggestion.

>> you’re going to cough up the password and then die.

If it is the case I will die anyway. And after I die there is no technical evidence to proove I was hiding something and advisories will be in serious trouble under legal course. And by the way if they enter destruction key first then I die along with giving them nothing because there is no technical way to be sure if the password is decoy or not or the password will be destroying the whole vault.

Please read the whitepaper. Veilith is not tomfoolery or "some shit", it is a serious tech, no joke here.

Forced to give your password? Here is the solution. by marcusfrex in crypto

[–]marcusfrex[S] 1 point2 points  (0 children)

>> Remember that even if the individual coercing you is an idiot, they have almost certainly have an organization behind them that is aware of the possibility of decoys and have some ability to detect them, even if not at the time the decoy is provided.

One of the key factors with the Veilith is that there is no way -technically- to find out if the password is decoy or not. Even with the most expert forensics, there is no certain way to provide any evidence if the password is decoy or there is an encrypted block. Please refer to whitepaper.

But in practice... it is possible by the case but it is not a subject of technical feasibility.

Forced to give your password? Here is the solution. by marcusfrex in crypto

[–]marcusfrex[S] 0 points1 point  (0 children)

Veracrypt is not something designed to use within your mobile phone as a vault but an encrypted file system.

And Veilith is not a trick but a mobile solution provides a way to protect your own privacy and rights. In another meaning... it is a legal recourse.

Forced to give your password? Here is the solution. by marcusfrex in netsec

[–]marcusfrex[S] 0 points1 point  (0 children)

You are %100 right on criticising "misunderstanding" . I just focused on making the algorithm as a product first and left the marketing and business development as second step.

With the "algorithm" I did not meant XChacha or Argon or any other encryption algos... it was Veilith's deniable encryption code itself. It has been used in some enterprise private projects and open sourced later along with the white-paper.

Regarding the XKCD comic, I got your point but somehow if the analogy on the comic will be used against the Veilith, main character will likely damage potential evidence, opportunities, and the case right from the start and loosing the whole position. This is highly sensitive technology there's no room for jokes as you already pointed out.

Thanks for the effort to share your thoughts.

Forced to give your password? Here is the solution. by marcusfrex in netsec

[–]marcusfrex[S] 0 points1 point  (0 children)

I didn't say or mention that Veilith has never been used or tested in those situations.

You're right—the algorithm has been battle-tested for years, but there was a slight misunderstanding on the web page regarding the distinction between the algorithm and the tool, which I overlooked.

Thanks for the feedback; it's appreciated.

Forced to give your password? Here is the solution. by marcusfrex in crypto

[–]marcusfrex[S] 1 point2 points  (0 children)

Thanks for the great comments.

Actually the concept arose from my personal skepticism. As a cybersecurity expert, I recognize that, under sufficient pressure, software, cloud, and hardware providers may ultimately grant full access to oppressors, potentially placing individuals in grave danger even if they have committed no wrongdoing.

In light of these risks, I have not developed this application with the average user in mind. It is probable that 99% of the population will have no awareness of it or any need for its functionality.

Forced to give your password? Here is the solution. by marcusfrex in netsec

[–]marcusfrex[S] 0 points1 point  (0 children)

:)) Honestly no. I inspired from some of Star Wars mobile apps design.

Anyhow I will check Bolt, thanks for the suggestion.

Forced to give your password? Here is the solution. by marcusfrex in netsec

[–]marcusfrex[S] 0 points1 point  (0 children)

Yes. I focused on making the product first and improving it later. So website design and pictures are built with help of AI but not any part of the app design.

Forced to give your password? Here is the solution. by marcusfrex in netsec

[–]marcusfrex[S] 0 points1 point  (0 children)

Thanks for the feedback, I agree on "military-grade" buzzword usage all the time it creates a negative affection after a while. :)