User Panel
Quoted: Scrub means to delete data. "Hillary had her minions scrub 30,000 emails off of her computer." Scrape means to collect data. "The Eff Bee Eye scraped thousands of pedo pics off of Hunter's laptop and did nothing with them." I think you mean they are scraping data, not scrubbing data. View Quote Scraping is to take. They do that with fat taps. Hillary wiped data. Scrubbing data is technically more like ECC RAM. In this context though it means to analyze data. |
|
Welcome friend and fellow enthusiast. I take great pleasure in welcoming you to our great 2nd amendment themed site. It is here where you can share your knowledge of firearms, ammunition, training, survival, culinary, and general life skills. This site consists of people from all walks of life: doctors, lawyers, cops,
writers, race car guys, pilots, firearm instructors, dentists, TV personalities, teachers, firemen, military, retirees, lawmakers, porn stars, Kia mechanics and Trolls. So please accept my warm wishes, bountiful blessings and happy thoughts. Enjoy your stay, share your wisdom and take some wisdom with you. Sincerely, your brother in arms. |
|
Quoted: Yeah. I'm calling bullshit. Its far far easier to compromise a device than a well implemented forward secure AES256 scheme. Why even fuck with the transport side of an encrypted system when you can compromise a device and just grab screen shots of everything when the signal app opens? Let the device and owner do the decryption then snag everything. There are no reports of the signal system itself being compromised. Even cellebrite needed physical access to a device and then only managed to decrypt messages stored on that device, they could have just unlocked it and opened the app. If the feds target you, yep, they are probably going to see everything. But not because apps like signal aren't secure, its because your device isn't secure. Build a device that is truly secure and you'll make all kinds of waves. View Quote You seem to know some about the diff between a single target and a mass collection of big data. You also show ignorance about crypto. That's fair enough. Will leave it at that. |
|
Quoted: Has this warning been posted in the public domain or are we left to get through second hand accounts? View Quote What warning? Nat Terror notice? You don't watch news on TV or online? https://news.yahoo.com/us-issues-terror-alert-over-171250871.html |
|
|
So, page 3 and this could have been handled with a "be careful"?
|
|
Quoted: Pretty sure anyone with a few brain cells who's perused an issue or two of 2600 realized a long time ago the inherent risk factors of believing a comm system to be secure. The NSA spends $10 billion a year on something more than just padding corporate coffers. View Quote That made me laugh. 99.999% of US think "2600" is free $ handout they are getting from the "Fed", let alone even realizing it's their own taxpayer $$. |
|
Quoted: What warning? Nat Terror notice? You don't watch news on TV or online? https://news.yahoo.com/us-issues-terror-alert-over-171250871.html View Quote View All Quotes View All Quotes Quoted: Quoted: Has this warning been posted in the public domain or are we left to get through second hand accounts? What warning? Nat Terror notice? You don't watch news on TV or online? https://news.yahoo.com/us-issues-terror-alert-over-171250871.html Quote the part of the Terror Warning that led you to believe it was based upon the analysis of Signal comms. |
|
Quoted: So...the Big Tech funded secure comms app that was pushed on the conservative populace, as a way to organize against an oppressive regime being censored by Big Tech was actually a trap?! My God! Thank you for sharing this wisdom. Speed View Quote Antifa types have been using signal and telegram like apps long before the right knew about them. |
|
Quoted: /media/mediaFiles/sharedAlbum/giphy-84.gif yeah, you're gonna have to lay out some actual credentials before I start listening to what you have to say buddy OK I caught up to my own post now I want to understand EXACTLY what you're saying here... your allegation is that the feds are sniffing signal messages off the network and decrypting them that's a yes or no answer View Quote Not just Signal, all internet traffic is sifted through! The Fed Terror warning coincides with the massive user increase with Signal app, and, Signal employees are stating they are worried the app will be used for bad things. But hey, you tell me what credible info the Fed got, and from where, to warrant the issuance of a National Terror Warning notice. My personal opinion. I don't live in China, you? |
|
Quoted: So basically you're saying apps like Signal aren't secure and the feds have broken the encryption because they issued a terror alert with no publicly released chatter. Gotcha. View Quote I sorry you don't understand crypto. I did not say the Fed had broken any crypto. If I did please point it out, I will then correct it. |
|
Quoted: LOL I guess we're going to get a bunch of new members now telling us why we shouldn't use encryption. View Quote Who said not to use encryption? Nobody said not to use encryption. However, many are likely still using defunct crypto which is either broken or can be brute forced at home with a China made ThinkPad laptop. Choose wisely, but don't think your choice is 100%. |
|
Quoted: I sorry you don't understand crypto. I did not say the Fed had broken any crypto. If I did please point it out, I will then correct it. View Quote View All Quotes View All Quotes Quoted: I sorry you don't understand crypto. I did not say the Fed had broken any crypto. If I did please point it out, I will then correct it. Quoted: The encryption available to the public is no match for the Fed. |
|
|
|
|
|
Quoted: https://www.ar15.com/media/mediaFiles/138374/d2u189w-8cdd1712-b31a-404e-9105-2d6a6fa7-1644140.jpg View Quote Probably a good idea. |
|
Quoted: You could have just said that. Claiming that the "Terror Warning" comes SPECIFICALLY "from them analyzing comms of the Signal app," is not supported by ANYTHING found in that warning or anything you have posted. Your very first post demonstrated poor logic and a lack of critical thinking. Post one, and credibility gone. Quite a feat. View Quote There's no other app, in this world of follow the dummy. What other app is there? Elon endorsed Signal, it must be good and safe. https://www.nytimes.com/2021/01/13/technology/telegram-signal-apps-big-tech.html |
|
so I should stop using an encrypted app because a first post 21'er said it's not secure, and go back to regular texting? Seems legit, fellow firearms enthusiast
|
|
I would bet a large amount of money that they didn't have to "decrypt" anything.
The feds have become pretty good at infiltrating any group they want to spy on and it certainly doesn't take James Bond to get into a Signal group full of mostly-anonymous folks. |
|
Quoted: That made me laugh. 99.999% of US think "2600" is free $ handout they are getting from the "Fed", let alone even realizing it's their own taxpayer $$. View Quote View All Quotes View All Quotes Quoted: Quoted: Pretty sure anyone with a few brain cells who's perused an issue or two of 2600 realized a long time ago the inherent risk factors of believing a comm system to be secure. The NSA spends $10 billion a year on something more than just padding corporate coffers. That made me laugh. 99.999% of US think "2600" is free $ handout they are getting from the "Fed", let alone even realizing it's their own taxpayer $$. Did I miss a "$" in front of the 2600 reference by WesJanson? 'Cause the way I'm reading it, you whizzed right past his comment. I can't get images on this system, but "My days of not taking you seriously are certainly coming to a middle." |
|
Quoted: Quote the part of the Terror Warning that led you to believe it was based upon the analysis of Signal comms. View Quote Who ever said the Fed notice had in it their source of info? It's a BS notice in that context. But no doubt they have info. To be credible they must have info, which is coming out of their looking into everything/anything running over the internet. Signal is just an app that people are flocking to in groves. Follow the users, it's that simple. If I did not want to "secure" my comms, then why bother using Signal or the like? Why does ar15.com use TLS for accessing the website? Only need TLS for the login piece and maybe the profile page. TLS'ing the rest is kinda pointless. Nothing like adding pointless overhead to a computing system. |
|
Quoted: There's no other app, in this world of follow the dummy. What other app is there? Elon endorsed Signal, it must be good and safe. https://www.nytimes.com/2021/01/13/technology/telegram-signal-apps-big-tech.html View Quote View All Quotes View All Quotes Quoted: Quoted: You could have just said that. Claiming that the "Terror Warning" comes SPECIFICALLY "from them analyzing comms of the Signal app," is not supported by ANYTHING found in that warning or anything you have posted. Your very first post demonstrated poor logic and a lack of critical thinking. Post one, and credibility gone. Quite a feat. There's no other app, in this world of follow the dummy. What other app is there? Elon endorsed Signal, it must be good and safe. https://www.nytimes.com/2021/01/13/technology/telegram-signal-apps-big-tech.html Again, you employ ZERO logic in jumping to that conclusion, or to your conclusion as to the source of the Terror Warning. |
|
Quoted: Antifa types have been using signal and telegram like apps long before the right knew about them. View Quote Last years bun loot murder run, on FB there were tons of users telling everyone to not use FB or WhatsApp or Twitter to communicate, and to switch over to Signal. Why they moved to Signal or the like is a topic for another thread. |
|
|
Quoted: Not just Signal, all internet traffic is sifted through! The Fed Terror warning coincides with the massive user increase with Signal app, and, Signal employees are stating they are worried the app will be used for bad things. But hey, you tell me what credible info the Fed got, and from where, to warrant the issuance of a National Terror Warning notice. My personal opinion. I don't live in China, you? View Quote so, no. lol insert relevant XKCD comic here or something.... Marked troll |
|
|
Quoted: I would bet a large amount of money that they didn't have to "decrypt" anything. The feds have become pretty good at infiltrating any group they want to spy on and it certainly doesn't take James Bond to get into a Signal group full of mostly-anonymous folks. View Quote Your technique is a floundering one. But sure, infiltration is still active. But hey, with all the plotting info they have to warrant a Nat Terror notice, all those arrests are filling the Fed jails. I suspect (wild hunch) that big data analysis out ranks the infiltration technique. |
|
OP stop being squirrelly and answer my question, are you referring to a crack in the software or a generalized location based user data correlation?
|
|
The big influx of people to signal isn't because people are using it to plot anything. It's because people are fleeing whatsapp due to them selling your chats to facebook or because people want a little more protection from cancel culture.
|
|
Quoted: Did I miss a "$" in front of the 2600 reference by WesJanson? 'Cause the way I'm reading it, you whizzed right past his comment. I can't get images on this system, but "My days of not taking you seriously are certainly coming to a middle." View Quote I think my sarcastic reply whizzed right by you, twice. It's all good. |
|
Quoted: I sorry you don't understand crypto. I did not say the Fed had broken any crypto. If I did please point it out, I will then correct it. View Quote You're premise seems to be that the government collects all data, ok. Let's say they specifically target all signal users for collection, that is now a large number. Let's say they further drill down to priority targets identified by other Metadata analysis. They still don't have the horsepower to brute force AES256 hundreds of times a day. Its just wildly inefficient. Quantum computing makes everything orders of magnitude faster but its still not practical. There are easier ways. If they have RATs on your device, you're fucked. Period. They aren't brute forcing time sensitive data out of AES256 even with quantum methods. Eventually they can break it, sure. Then AES goes to 1024 or 2048..and the quantum arrays get bigger..etc..its the same encryption arms race it always has been. The goal isn't to make brute force attacks impossible, just impractical. If the signal crypto isn't vulnerable why call it out as such? This is all a very convoluted way to say devices aren't secure....ok..thanks. |
|
They get this information from CI's, not by breaking the end to end encryption. All the encrypted texts in the world aren't safe if the machine on the end or the human on the end gives up the ghost. For instance, if you are using signal on a cheap as shit Android phone - and I can crack into the phone, I can crack into the app and read the text as an end user. If the end user is LEO or an informant, or humint asset, then that is the weak link.
|
|
|
Isn't signal's source code audited and proven to have end-to-end encryption? A decree from the fed boyz doesn't change the mathematical limitations of prime factorizations.
ETA: If they have RATs on your device, you're fucked. Period. View Quote Yep, this is how they will do it. Via side-channel attacks and roots on the device (not related to Signal), or just a regular old meat pop cycle spy on your group chat room. |
|
Quoted: They will also retain 5k troops in DC area. Militarizing it. That too must bug you, as it does most Americans. But hey, the commies there in DC need to protect themselves from The People, so how else can they do it. Understandable absurd and ironic I guess, but that explains what commie's do. My point was, the Fed is heavily spying again, so keep the crazy chatter off the internet. Trusting "encryption" is a fools game. View Quote You were doing so well, until you typed out this sentence. ROLCON. Believe nothing OP says, this entire Not saying Signal is secure, either. If either/any device is compromised encryption will not matter. |
|
Using stuff like this probably just makes it more likely you'll be looked at. Nothing is secure. There is no privacy.
|
|
Quoted: OP stop being squirrelly and answer my question, are you referring to a crack in the software or a generalized location based user data correlation? View Quote A "crack" in the app? An encryption module is not technically "the app". So, if you can clarify your Q I may be able to answer. |
|
Quoted: Dude, you're taking leaps here that you can't back up with fact. If they haven't broken the crypto what are you concerned about? Meta analysis? You're premise seems to be that the government collects all data, ok. Let's say they specifically target all signal users for collection, that is now a large number. Let's say they further drill down to priority targets identified by other Metadata analysis. They still don't have the horsepower to brute force AES256 hundreds of times a day. Its just wildly inefficient. Quantum computing makes everything orders of magnitude faster but its still not practical. There are easier ways. If they have RATs on your device, you're fucked. Period. They aren't brute forcing time sensitive data out of AES256 even with quantum methods. Eventually they can break it, sure. Then AES goes to 1024 or 2048..and the quantum arrays get bigger..etc..its the same encryption arms race it always has been. The goal isn't to make brute force attacks impossible, just impractical. If the signal crypto isn't vulnerable why call it out as such? This is all a very convoluted way to say devices aren't secure....ok..thanks. View Quote AES-256 is currently believed to be quantum-resistant, isn't it? In order for the feds to break AES-256 with quantum computing, they would have to 1) create a quantum computer several orders of magnitude more powerful than anything the private sector has created, and 2) create a novel technique for breaking it. Either one of those is potentially possible, but both together seems unlikely. Besides, imagine if the government had done this. The government would be able to read every piece of information the Chinese and the Russians produce, for the next decade or two (or however long it takes the rest of the planet to catch up with their magic computer). That's the kind of breakthrough that they wouldn't tip their hand on. Even if people were planning assassinations of elected officials, it's far more likely that the NSA would consider those officials expendable in order to keep their technological advantage. They aren't going to disclose that they have broken cryptography in order to arrest a guy with a 30-round magazine in New York. |
|
Quoted: A "crack" in the app? An encryption module is not technically "the app". So, if you can clarify your Q I may be able to answer. View Quote View All Quotes View All Quotes Quoted: Quoted: OP stop being squirrelly and answer my question, are you referring to a crack in the software or a generalized location based user data correlation? A "crack" in the app? An encryption module is not technically "the app". So, if you can clarify your Q I may be able to answer. He's asking if the feds are able to read your messages directly without using your phone or the other guy's phone to do it. |
|
|
|
Quoted: The big influx of people to signal isn't because people are using it to plot anything. It's because people are fleeing whatsapp due to them selling your chats to facebook or because people want a little more protection from cancel culture. View Quote I don't think there's any argument to be had as to why people are shifting apps. And yes, when people believe they are "safe" from govt spying they will use such app to "plot". |
|
Quoted: A "crack" in the app? An encryption module is not technically "the app". So, if you can clarify your Q I may be able to answer. View Quote View All Quotes View All Quotes Quoted: Quoted: OP stop being squirrelly and answer my question, are you referring to a crack in the software or a generalized location based user data correlation? A "crack" in the app? An encryption module is not technically "the app". So, if you can clarify your Q I may be able to answer. You said "Signal" which is an app. Which is what I am referring to. |
|
Quoted: A "crack" in the app? An encryption module is not technically "the app". So, if you can clarify your Q I may be able to answer. View Quote Fuck it. I'll take a crack at it. Are you suggesting that somebody employed by the federal government can read the plaintext of a specific end-to-end encrypted message sent via Signal? |
|
Quoted: Who ever said the Fed notice had in it their source of info? It's a BS notice in that context. But no doubt they have info. To be credible they must have info, which is coming out of their looking into everything/anything running over the internet. Signal is just an app that people are flocking to in groves. Follow the users, it's that simple. If I did not want to "secure" my comms, then why bother using Signal or the like? Why does ar15.com use TLS for accessing the website? Only need TLS for the login piece and maybe the profile page. TLS'ing the rest is kinda pointless. Nothing like adding pointless overhead to a computing system. View Quote View All Quotes View All Quotes Quoted: Quoted: Quote the part of the Terror Warning that led you to believe it was based upon the analysis of Signal comms. Who ever said the Fed notice had in it their source of info? It's a BS notice in that context. But no doubt they have info. To be credible they must have info, which is coming out of their looking into everything/anything running over the internet. Signal is just an app that people are flocking to in groves. Follow the users, it's that simple. If I did not want to "secure" my comms, then why bother using Signal or the like? Why does ar15.com use TLS for accessing the website? Only need TLS for the login piece and maybe the profile page. TLS'ing the rest is kinda pointless. Nothing like adding pointless overhead to a computing system. You suggested in no uncertain terms that the terror warning was the result of the feds analyzing Signal comms. You provide no reason or ANYTHING that backs up your VERY specific claim. |
|
Sign up for the ARFCOM weekly newsletter and be entered to win a free ARFCOM membership. One new winner* is announced every week!
You will receive an email every Friday morning featuring the latest chatter from the hottest topics, breaking news surrounding legislation, as well as exclusive deals only available to ARFCOM email subscribers.
AR15.COM is the world's largest firearm community and is a gathering place for firearm enthusiasts of all types.
From hunters and military members, to competition shooters and general firearm enthusiasts, we welcome anyone who values and respects the way of the firearm.
Subscribe to our monthly Newsletter to receive firearm news, product discounts from your favorite Industry Partners, and more.
Copyright © 1996-2024 AR15.COM LLC. All Rights Reserved.
Any use of this content without express written consent is prohibited.
AR15.Com reserves the right to overwrite or replace any affiliate, commercial, or monetizable links, posted by users, with our own.