[GLLUG] Schneier on Windows
andres at msu.edu
Tue Sep 17 00:10:19 EDT 2013
That's not really true. There are many documented cases of encryption
one has been able to break. We know this, because if they had
person doing the encryption would certainly be prosecuted. It may be
vanishingly rare, but it does happen.
Want to bet that the recent NSA exposure isn't going to convince more
people to start using really good tools?
On 09/16/13 23:23, Karl Schuttler wrote:
> Certainly an interesting article, but a bit silly. If they want you,
> they'll have you.
> On Mon, Sep 16, 2013 at 9:00 AM, Clay Dowling <clay at lazarusid.com
> <mailto:clay at lazarusid.com>> wrote:
> On 09/15/2013 02:35 PM, Chick Tower wrote:
> > In his article at
> > https://www.schneier.com/blog/archives/2013/09/how_to_remain_s.html
> > and after outlining several measures to limit the ability of the NSA
> > to snoop on internet users, Bruce Schneier writes
> > "I understand that most of this is impossible for the typical
> > user. Even I don't use all these tools for most everything I am
> > working on. And I'm still primarily on Windows, unfortunately. Linux
> > would be safer."
> That was an excellent read. Of particular note was that public key
> encryption was inferior to symetric shared key encryption. I had
> distrusted such encryption because of the shared key, which imposes a
> fixed target for attackers to work against, but a little reflection on
> historical key exchange methods reminds me that each encrypted message
> can contain the key for the next message that will be received,
> effectively creating a moving target.
-------------- next part --------------
An HTML attachment was scrubbed...
More information about the linux-user