<html>
<head>
<meta content="text/html; charset=ISO-8859-1"
http-equiv="Content-Type">
</head>
<body text="#000000" bgcolor="#FFFFFF">
<div class="moz-cite-prefix">That's not really true. There are many
documented cases of encryption which no<br>
one has been able to break. We know this, because if they had
succeeded, the<br>
person doing the encryption would certainly be prosecuted. It
may be close to<br>
vanishingly rare, but it does happen.<br>
<br>
Want to bet that the recent NSA exposure isn't going to convince
more and more<br>
people to start using really good tools?<br>
<br>
--STeve Andre'<br>
<br>
On 09/16/13 23:23, Karl Schuttler wrote:<br>
</div>
<blockquote
cite="mid:CALUi6oVTBGj+tiVwrT0QvNdU+omyQkcMFd9E6srpERonJYJ=iA@mail.gmail.com"
type="cite">
<div dir="ltr">
<div class="gmail_extra">Certainly an interesting article, but a
bit silly. If they want you, they'll have you. <br>
<br>
<div class="gmail_quote">On Mon, Sep 16, 2013 at 9:00 AM, Clay
Dowling <span dir="ltr"><<a moz-do-not-send="true"
href="mailto:clay@lazarusid.com" target="_blank">clay@lazarusid.com</a>></span>
wrote:<br>
<blockquote class="gmail_quote" style="margin:0 0 0
.8ex;border-left:1px #ccc solid;padding-left:1ex">
<div class="im">On 09/15/2013 02:35 PM, Chick Tower wrote:<br>
> In his article at<br>
><br>
> <a moz-do-not-send="true"
href="https://www.schneier.com/blog/archives/2013/09/how_to_remain_s.html"
target="_blank">https://www.schneier.com/blog/archives/2013/09/how_to_remain_s.html</a><br>
><br>
> and after outlining several measures to limit the
ability of the NSA<br>
> to snoop on internet users, Bruce Schneier writes<br>
><br>
> "I understand that most of this is impossible for
the typical Internet<br>
> user. Even I don't use all these tools for most
everything I am<br>
> working on. And I'm still primarily on Windows,
unfortunately. Linux<br>
> would be safer."<br>
<br>
</div>
That was an excellent read. Of particular note was that
public key<br>
encryption was inferior to symetric shared key encryption.
I had always<br>
distrusted such encryption because of the shared key,
which imposes a<br>
fixed target for attackers to work against, but a little
reflection on<br>
historical key exchange methods reminds me that each
encrypted message<br>
can contain the key for the next message that will be
received,<br>
effectively creating a moving target.<br>
<span class="HOEnZb"><font color="#888888"><br>
Clay</font></span><br>
</blockquote>
</div>
</div>
</div>
</blockquote>
<br>
</body>
</html>