Quote: (08-04-2015 11:18 PM)h3ltrsk3ltr Wrote:
First, I would give a rep point and a bottle of...let's say mid shelf bourbon for a datasheet on practical encryption, public keys, and whatever else you could provide on this topic. I'd be willing to write part of it or help in any way I can.
Second, how does the physical layer play into vulnerability? Is it possible for any entity, like the middle man, (VPN/proxy companies, an ISP, web host, cell provider, the government, or someone else) to simply intercept the information physically after its been encrypted properly because they're part of the infrastructure?
1 ) Oh man, cryptography gets pretty complex and to be honest with you, I'm not the best at understanding it myself. This explanation I'm giving you is the "Jim Bean" of cryptography. Look at those tasty middle shelf bourbons, and then move your eyes down to the floor.
![[Image: lol.gif]](https://rooshvforum.network/images/smilies/new/lol.gif)
. The public key cryptography I mentioned uses RSA cryptography, which, to explain at the highest level essentially uses two VERY LARGE *DIFFERENT* (assymetric) prime numbers of similar bit length, and what makes them so hard to break is that its so damn hard to factor prime numbers. A 256-bit key will take you testing 2^256 possible keys to break. The math is provided here:
https://en.wikipedia.org/wiki/RSA_(crypt...generation
Now, the RSA is just one part of the puzzle. Your private key is created with AES encryption which I understand even less, lol. But these tend to be harder to break unless you use a very very large bit RSA prime.
2) Very perceptive of you!!! almost every single point in the physical layer you mentioned is also a point of vulnerability. And yes, they can and will intercept it physically because its much easier than all of the other ways. More likely, this information will just be handed to them on a silver platter from the services you use.
But to break down the layers you provided:
* VPN/Proxy Companies - if the proxy company itself is "compromised by" (read: "working-with") authorities, technically all of the IPs you could connect to can be listened in on. With ones that are not, often times they can set up "honeypot" proxies which seem innocent enough until you connect through it, then all of your behavior is logged anyways.
* All your standard ISPs Americans and Europeans are already signed onto giving this information to relevant authorities who request. And I'm sure there is clause in the Terms and Conditions you didn't read which allows them to do so!
* Cell Provider - You've heard of PRISM, right?
![[Image: wink.gif]](https://rooshvforum.network/images/smilies/wink.gif)
. Interestingly enough aside, even your local PD (and hackers, as well) can set up fake cell towers nearby which your phone by default doesn't know the difference allowing them near full access to your data.
* Gov't - where exploiting your weak connection doesn't work, just raid the house and get physical access to the machine.
* Web Host - this is a pretty cool FBI trick - they will often exploit browser vulnerabilities (all browsers still have
some) to run malicious code against your browser to reveal information identifying you. FBI got into TOR through a Firefox exploit, and caught a lot of bad people that way!
But honestly mate, there are literally so many other tells that your browser and your connection will give *you* away it would be better moved into a different thread, and my time is short
![[Image: undecided.gif]](https://rooshvforum.network/images/smilies/undecided.gif)
. Simply put, anyone can be found easily through correlating your behavior and your usage.
Let's just be glad that the bad guys don't understand how to cover up all the holes.