Site Map - skip to main content

Hacker Public Radio

Your ideas, projects, opinions - podcasted.

New episodes every weekday Monday through Friday.
This page was generated by The HPR Robot at


hpr3715 :: Secret hat conversations, Part 2.

Twin Tin Hats, feat. archer72.

<< First, < Previous, , Latest >>

Thumbnail of Some Guy On The Internet
Hosted by Some Guy On The Internet on Friday, 2022-10-28 is flagged as Explicit and is released under a CC-BY-SA license.
Tin hat, Quantum computing, Encryption, Conspiracy. 4.
The show is available on the Internet Archive at: https://archive.org/details/hpr3715

Listen in ogg, spx, or mp3 format. Play now:

Duration: 01:04:59

general.

  • Quantum computing

    • Quantum computing is a type of computation whose operations can harness the phenomena of quantum mechanics, such as superposition, interference, and entanglement. Devices that perform quantum computations are known as quantum computers. Though current quantum computers are too small to outperform usual (classical) computers for practical applications, larger realizations are believed to be capable of solving certain computational problems, such as integer factorization (which underlies RSA encryption), substantially faster than classical computers.
    • Today’s quantum systems only include tens or hundreds of entangled qubits, limiting them from solving real-world problems. To achieve quantum practicality, commercial quantum systems need to scale to over a million qubits and overcome daunting challenges like qubit fragility and software programmability.
    • Quantum computers, if they mature enough, will be able to crack much of today's encryption. That'll lay bare private communications, company data and military secrets. Today's quantum computers are too rudimentary to do so. But data surreptitiously gathered now could still be sensitive when more powerful quantum computers come online in a few years.
    • Simple passwords can be cracked using brute force; this is where an attacker uses tools that try every possible password until the correct one is found. This generally done using a dictionary attack, where an attacker will try known passwords and words until they find the one that unlocks an account. There are databases available on the internet that contain personal names as well as dictionary and slang words, in scores of languages, along with passwords found in data breaches, and more.
  • Encryption.

    • The Advanced Encryption Standard (AES) specifies a FIPS-approved cryptographic algorithm that can be used to protect electronic data. The AES algorithm is a symmetric block cipher that can encrypt (encipher) and decrypt (decipher) information. Encryption converts data to an unintelligible form called ciphertext; decrypting the ciphertext converts the data back into its original form, called plaintext. The AES algorithm is capable of using cryptographic keys of 128, 192, and 256 bits to encrypt and decrypt data in blocks of 128 bits.
    • The National Security Agency (NSA) reviewed all the AES finalists, including Rijndael, and stated that all of them were secure enough for U.S. Government non-classified data. In June 2003, the U.S. Government announced that AES could be used to protect classified information: For cryptographers, a cryptographic "break" is anything faster than a brute-force attack – i.e., performing one trial decryption for each possible key in sequence. A break can thus include results that are infeasible with current technology. Despite being impractical, theoretical breaks can sometimes provide insight into vulnerability patterns. The largest successful publicly known brute-force attack against a widely implemented block-cipher encryption algorithm was against a 64-bit RC5 key by distributed.net in 2006.
  • Password Management.

  • Password Generation.

    • pwgen : found in most linux repos
    • Man page for pwgen
    • Example : pwgen -y 50 3 : generates a 50 character password with symbols, with 3 choices
  • Google and Amazon are listening

    "I don't blame anyone who doesn't want to fill their house with cameras and
    microphones, but I also don't blame anyone who's willing to trade some of their
    data with a company they feel comfortable with in order to bring some new
    convenience and utility into their lives. It's nearly impossible to navigate
    today's age without making trades like that on a daily basis."

What is Web Scraping? Web scraping is an automatic method to obtain large amounts of data from websites.

What is Machine Learning? Machine Learning, as the name says, is all about machines learning automatically without being explicitly programmed or learning without any direct human intervention. This machine learning process starts with feeding them good quality data and then training the machines by building various machine learning models using the data and different algorithms.


  1. The October Suprise.
  2. The fruit of the poisonous tree.
  3. This Is the Data Facebook Gave Police to Prosecute a Teenager for Abortion.
  4. Google is giving data to police based on search keywords, court docs show.
  5. Google bans dad for ‘child porn’ after he sent pics of toddler’s swollen genitals to doctor.
  6. Proton VPN Transparency Report & Warrant Canary.

Comments

Subscribe to the comments RSS feed.

Comment #1 posted on 2022-10-29 20:22:25 by The hacker formerly known as b-yeezi

Tin foil hat engaged

Thanks for the show

Comment #2 posted on 2022-10-31 17:03:56 by one_of_spoons

Protonmail shopping for law enforcement.

The case of the French activist was a useful wake up call for many. They were arrested as a result of information relating to email account creation, and identification of the device used .
Essentially, Swiss courts will force Proton to provide all available information if a crime has been "established". Remember, new legislation is created daily, and comes into effect straight away.
In this case the activist was campaigning about gentrification.
Proton have since provided other documentation clarifying ways to avoid them having any useful information to give; however, you won't usually notice that stuff on the front page of advertising for many service providers.
At least nobody disappeared in this case.
Thanks for the stimulation SGOTI.

Comment #3 posted on 2022-11-02 17:33:44 by Dave Morriss

A very interesting discussion

Some great and important topics. Excellent show.

I actually have a Fairphone 3+ but haven't replaced standard Android (yet) because I'm concerned that I'll brick the phone! It's an OK phone, but I hate Android in its unmodified state.

I get daily calls from unknown numbers. I look them up on a site called who-called.co.uk and mostly find they are spam calls. I then block them. My network provider (giffgaff) seems to be flagging spam calls using a database like this, which is very useful.

I used to be heavily into email encryption. I even got my PGP key signed in 2014 at FOSDEM, Belgium. I am using it a lot less now, though the latest Thunderbird has apparently good support for PGP. It's a shame this didn't become a more generally accepted method of making email secure.

Comment #4 posted on 2022-11-03 00:52:29 by DeepGeek

Phone, Tiling wm,

Great Show, "I began hanging around you guys and became a wierdo!" classic LOL!

Wanted to let you know, that a youtube personality named Robert Braxman sells "de-google" phones. He regresses android phones to run only android Open Source project.

A fingerprint that can follow you around as you switch phones is a combination of the three cell towers your phone spends the most time in.

Tiling Window Managers, theres a program called winwrangler, runs in the background, and adds the three most popular tiling araingements to any WM/DE. It talks to the Window Manager through the WWMH specifications to add features to any WM. I like fluxbox, and if you ever try it and want, I have a config file that adds "Pseudo Tiling" to it.

Great Show, thanks!
---
DeepGeek

Leave Comment

Note to Verbose Commenters
If you can't fit everything you want to say in the comment below then you really should record a response show instead.

Note to Spammers
All comments are moderated. All links are checked by humans. We strip out all html. Feel free to record a show about yourself, or your industry, or any other topic we may find interesting. We also check shows for spam :).

Provide feedback
Your Name/Handle:
Title:
Comment:
Anti Spam Question: What does the letter P in HPR stand for?
Are you a spammer?
Who is the host of this show?
What does HPR mean to you?