← Home ← Back to /g/

Thread 106321435

24 posts 16 images /g/
Anonymous No.106321435 >>106321450 >>106321671 >>106322255 >>106322295 >>106322431 >>106322465
is 1 encryption algorithm enough?
>aes backdoored by usa
>kuznyechik backdoored by russia
so if I encrypt my data with both of them I can be safe?
Anonymous No.106321450
>>106321435 (OP)
you sick fuck
Anonymous No.106321671 >>106322043 >>106322071 >>106322130
>>106321435 (OP)
>aes backdoored by nsa
citation please
It literally can't be backdoored, only an implementation can be. This shit is literally third party audited in anything that matters and anyone can read the source code.
Anonymous No.106322043 >>106322088 >>106322118 >>106322133
>>106321671
>It literally can't be backdoored, only an implementation can be
>all aes implementations are backdoored by usa
ok now?
Anonymous No.106322071 >>106322078
>>106321671
The only thing I'd hold against it is the fact that it was chosen because of how relatively cheap and easy it is to build cracking hardware for it.

Blowfish's still the goat. I use it for everything except where a birthday attack may be viable.
Anonymous No.106322078 >>106322138
>>106322071
how about Blowfish + Kuznyechik for extremely sensitive information?
Anonymous No.106322088 >>106322266
>>106322043
are you fucking retarded? you can easily write your own implementation it's not that complicated.
Anonymous No.106322118 >>106322128 >>106322138 >>106322465
>>106322043
There's open source implementations, use them. To preempt you continuing being retarded, you can go the whole way down the line and say everything is a backdoor.

Your OS could be backdoored, the Linux Kernal could be backdoored.
Your computer probably has intel ME or the Apple and AMD equivalent, that could be backdoored. Hell the government own the power grid, they could use that to keylog your computer so the powergrid is backdoored.

But here's the kicker, show me a court case where any of those backdoors were actually used. If someone's charged they need to include how it was obtained evidence so show me the case law.
Anonymous No.106322128
>>106322118
None some laws against subliminals back in the day check when they nullified them
Anonymous No.106322130
>>106321671
Anonymous No.106322133
>>106322043
implement your own
Anonymous No.106322138 >>106322150
>>106322078
something like that anon would work fine. veracrypt uses various combinations like you mentioned. it's all worthless if your password is "password" btw.

>>106322118
> but there's open source implementations!
> that use the exact same elliptic-curves and random number generators approved by the US government
cringe. i can't imagine ever being this fucking stupid.
Anonymous No.106322150 >>106322244
>>106322138
Still waiting for that case law nigger faggot
Anonymous No.106322204
Eliptic curves are pozzed and ready to be instantly btfo'ed by quantum cpu's. Use classic ciphers with the strongest possible settings.

I used pgp ckt builds for centuries before gnupg sort of caught up, and even now the official binary distributions are stuck with 4k keys.
Anonymous No.106322244
>>106322150
> low iq child sex offender slapped around by /g/ thinks crying helps
not /g/'s fault that you're an out of touch and dangerously low iq imbecile. read a book, you jungle dwelling, tick and flea eating primate.
Anonymous No.106322255
>>106321435 (OP)
whats more important is how your password is hashed, if the password is hashed with 100gb and takes 10 minutes on the latest cpu, then it wouldn't be possible even for giga glows to break. can ask any LLM about this aspect of encryption security.
Anonymous No.106322266
>>106322088
lolwut
it's EXTREMELY complicated to write a production-grade AES implementation
your toy weekend project is vulnerable as fuck in real life situations
Anonymous No.106322295
>>106321435 (OP)
Loving sex with her.
Anonymous No.106322358 >>106322962
i use ROT13 as my encryption algorithm, but when i want extra security I double it
Anonymous No.106322410
Anonymous No.106322431
>>106321435 (OP)
Use XChaCha20.
Anonymous No.106322465
>>106321435 (OP)
Your security is only as strong as its weakest link, and the encryption algorithm won't be it. As >>106322118 points out, even if the algorithm were somehow backdoored, to use it in any legal procedures they'd have to admit they have a backdoor, which they won't.

You can have things encrypted perfectly and still not be safe. Instead look out for various other mistakes you could be making. Is part of the data stored outside the encrypted container (or has it been in the past; deleting a file does not erase its contents from the physical disk)? Is there any caching or metadata processes (e.g. thumbnailing) happening on unencrypted storage? Is your RAM getting swapped to unencrypted storage? Is your keyphrase safe? Do you have the keyphrase stored anywhere in human-readable form? Is all the software you're using safe? Have you been drawing attention by describing your situation on honeypot sites like 4chan?

There are many, many things that can get you in trouble even if your encryption is perfect. Focus on the weakest aspects of your security rather than overoptimizing an already strong aspect.
Anonymous No.106322962
>>106322358
lol
Anonymous No.106323066
bot