SHARE
TWEET

[+] Encryption the NSA/GHCQ cant Break! #31c3 [+]

_d3f4ult Dec 31st, 2014 (edited) 4,403 Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1.  
  2. =========================================================================================================
  3.   _____           _                            _   _ ____    _        ___       ____ _   _  ____ ___    _
  4.  |  ___|   _  ___| | __   _   _  ___  _   _   | \ | / ___|  / \      ( _ )     / ___| | | |/ ___/ _ \  | |
  5.  | |_ | | | |/ __| |/ /  | | | |/ _ \| | | |  |  \| \___ \ / _ \     / _ \/\  | |  _| |_| | |  | | | | | |
  6.  |  _|| |_| | (__|   <   | |_| | (_) | |_| |  | |\  |___) / ___ \   | (_>  <  | |_| |  _  | |__| |_| | |_|
  7.  |_|   \__,_|\___|_|\_\   \__, |\___/ \__,_|  |_| \_|____/_/   \_\   \___/\/   \____|_| |_|\____\__\_\ (_)
  8.                           |___/                                                                          
  9. ==========================================================================================================
  10. #BULLRUN #LONGHAUL #BLUESNORT #GALLANTWAVE #VALIANTSURF #APEX #SPIN9 #TAO #PRISM #TURBINE #TURMOIL #POISENNUT
  11. #MALIBU #FOURSCORE #XKeyscore #TUNDRA #TOYGRIPPE #BLEAKINQUIRY #VULCANDEATHGRIP #VULCANMINDMELD #CORALREEF
  12.  
  13. Here is previous paste with links to pdf's to verify the following info.
  14. http://pastebin.com/mfCEr9XD
  15.  
  16.                              \!/  wget --wait=5s http://www.spiegel.de/media/media-355{09..52}.pdf  \!/
  17.                                      ^Command to download all the recently released NSA DOX!
  18.  
  19.  
  20.                            The main phrase you needs to remember out of all this is... "Defense in Depth!"
  21.  
  22. According to recently NSA Edward Snowden pdf's released at #31c3 and presented by @ioerror Jacob Appelbaum and mirrored on DerSpeigel, the following tools are said to be unbreakable and blocks #PRISM and other NSA secret programs from spying you and collecting your messages and decrypting them to plaintext!
  23.  
  24. 1) OTR: Off The Record - OTR uses a combination of AES symmetric-key algorithm with 128 bits key length, the Diffie–Hellman key exchange with 1536 bits group size, and the SHA-1 hash function. In addition to authentication and encryption, OTR provides forward secrecy and malleable encryption.
  25.  
  26. 2) PGP: Pretty Good Privacy - serial combination of hashing, data compression, symmetric-key cryptography, and finally public-key cryptography; each step uses one of several supported algorithms. Released in 1991 by Phil Zimmerman and its still invincible!
  27.  
  28. 3) ZRTP: (composed of Z and Real-time Transport Protocol) is a cryptographic key-agreement protocol to negotiate the keys for encryption between two end points in a Voice over Internet Protocol (VoIP) phone telephony call based on the Real-time Transport Protocol. A protocol that was helped written by PGP author Phil Zimmerman! Red Phone is for android and Signal is for iPhone.
  29.  
  30. 4) Tor: The Tor network is a series of relay nodes all over the entire world in almost ever country. All traffic within the nodes is encrypted until it reaches an exit node where the encrypted traffic is then decrypted into plaintext or whatever format it was at entry node. Alot of new deanonymizing techniques exposed recently(look at bottom in other sources for those examples), howevers a properly configured torrc using StrictExitNodes (CCC ftw!) helps avoid malicious nodes along with never allowing javascripts globally. Tor is still an amazing tool, if you use it right!
  31.  
  32. 5) Veracrypt (Truecrypt successor): Alot of controversy about whether Truecrypt was truely vuln since its abrubt shutdown and code audit is still not completed by @matthew_d_green . Howevers i found a successor to it called Veracrypt, Truecrypt uses PBKDF2-RIPEMD160 with 1000 iterations whereas in VeraCrypt we use 327661. And for standard containers and other partitions, TrueCrypt uses at most 2000 iterations but VeraCrypt uses 655331 for RIPEMD160 and 500000 iterations for SHA-2 and Whirlpool.This enhanced security adds some delay only to the opening of encrypted partitions without any performance impact to the application use phase. This is acceptable to the legitimate owner but it makes it much harder for an attacker to gain access to the encrypted data.Starting from version 1.0f, VeraCrypt can load TrueCrypt volume. It also offers the possibility to convert TrueCrypt containers and non-system partitions to VeraCrypt format.
  33.  
  34. 6) SecureDrop (Tor + USB): SecureDrop uses the anonymity network, Tor, to facilitate communication between whistleblowers, journalists, and news organizations. SecureDrop sites are therefore only accessible as hidden services in the Tor network. After a user visits a SecureDrop website, they are given a randomly generated code name. This code name is used to send information to a particular author or editor via uploading. Investigative journalists can contact the whistleblower via SecureDrop messaging. Therefore, the whistleblower must take note of their random code name.The system utilizes private, segregated servers that are in the possession of the news organization. Journalists use two USB flash drives and two personal computers to access SecureDrop data. The first personal computer accesses SecureDrop via the Tor network, the journalist uses the first flash drive to download encrypted data from the Internet. The second personal computer does not connect to the Internet, and is wiped during each reboot. The second flash drive contains a decryption code. The first and second flash drives are inserted in to the second person computer, and the material becomes available to the journalist. The personal computer is shut down after each use.
  35.  
  36. 7) Tails OS: a live operating system, that you can start on almost any computer from a DVD, USB stick, or SD card. It aims at preserving your privacy and anonymity, and helps you to; use the Internet anonymously and circumvent censorship; all connections to the Internet are forced to go through the Tor network; leave no trace on the computer you are using unless you ask it explicitly; use state-of-the-art cryptographic tools to encrypt your files, emails and instant messaging.
  37.  
  38.  
  39. [+] Tor [+]
  40. https://www.torproject.org/
  41. @torproject
  42.  
  43. [+] ChatSecure (OTR) [+]
  44. https://chatsecure.org/
  45. https://play.google.com/store/apps/details?id=info.guardianproject.otr.app.im&hl=en
  46. https://itunes.apple.com/us/app/chatsecure-encrypted-secure/id464200063?mt=8
  47. @ChatSecure
  48.  
  49. [+] Red Phone (ZRTP) [+]
  50. https://whispersystems.org/
  51. https://play.google.com/store/apps/details?id=org.thoughtcrime.redphone&hl=en
  52. @FredericJacobs @corbett @moxie and all of @whispersystems
  53.  
  54. [+] Signal (ZRTP) [+]
  55. https://whispersystems.org/
  56. https://itunes.apple.com/us/app/signal-private-messenger/id874139669?mt=8
  57. @FredericJacobs @corbett @moxie and all of @whispersystems
  58.  
  59. [+] PGP/GPG (4096bit RSA) [+]
  60. https://www.gnupg.org/
  61. http://www.gpg4win.org/
  62.  
  63. [+] Veracrypt (Many Algorithms & Key Sizes) [+]
  64. https://veracrypt.codeplex.com/
  65. http://sourceforge.net/projects/veracrypt/
  66. @VeraCrypt_IDRIX
  67.  
  68. [+] SecureDrop [+] - Still to be determined IMO
  69. https://github.com/freedomofpress/securedrop
  70. @SecureDrop
  71.  
  72. [+] Tails OS [+]
  73. https://tails.boum.org/
  74.  
  75. [+] Other Sources [+]
  76. http://en.wikipedia.org/wiki/Pretty_Good_Privacy
  77. http://en.wikipedia.org/wiki/Off-the-Record_Messaging
  78. http://en.wikipedia.org/wiki/Tor_%28anonymity_network%29
  79. http://pastebin.com/wegNzLy3
  80. http://pastebin.com/VP4ciBWb
  81.  
  82.  
  83.  
  84. ***PLEASE DONATE ANY EXTRA MONEY TO ONE OF THE FOLLOWING PROGRAMS SINCE THEY ARE ALL FIGHTING FOR OUR RIGHTS & SECURING OUR COMS***
  85. https://www.torproject.org/donate/donate
  86. https://otr.cypherpunks.ca/donate.php
  87. https://supporters.eff.org/donate/year-end-challenge-2014
  88. https://veracrypt.codeplex.com/
  89. https://whispersystems.org/blog/
  90. https://chatsecure.org/contribute/
RAW Paste Data
Top