Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

This is why you're not running an evil regime.


Is your implication that smart, clueful people are never evil? Of course, you can always find an apologist who will explain that any given regime wasn't or isn't evil, so how would you test that?


No, not at all. My implication is that analyzing encrypted email traffic is probably the last place you should be looking. Trying to break encryption is almost always the hardest way to acquire information. Physically intimidating people, targeted client-side attacks, or a number of other things that you can do will be much more effective and easier than breaking crypto.

On the flip side of your statement, I think evil, oppressive regimes hire very smart and talented people.


But the OP didn't suggest breaking the encryption, but to run a traffic analysis, which includes things such as identifying the realworld identities of people sending encrypted email, determing who those people are communicating with (both for their encrypted and unencrypted emails), and other ways of extracting information from messages without needing to actually break the encryption.

Once you've carried out this analysis, you know on who you can apply the more realworld techniques that you suggest.


The $5 wrench comes to mind: http://xkcd.com/538/


The goal isn't to break the encryption, it is to find out who has something to hide.


Or, the goons will just install a keylogger on your computer while you're away from the house. Or they'll try to exploit one of the umpteen jillion vulnerabilities in OSes and browsers to install something similar on your system remotely.

Or, they'll use a TEMPEST attack to read your screen without you even knowing it. Or they'll use a similar attack to read your keystrokes wirelessly.

Or, they'll get you in a room and use a $5 wrench on your face until you tell them what they want to know.

Breaking encryption is far down the list of techniques that are worthwile to oppressive regimes.


Hey, IT Goons. Spy on the network traffic to find out who is using encrypted communication, and who they are communicating with. Then pass that information to the knee-breakers, so we can find out what they are hiding.

This has nothing to do with breaking crypto. The breaking is done in an oubliette.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: