#encryption

mlansbury@despora.de

Lego Ideas - Working Turing Machine

What is a #Turing machine?

Depending on who you ask, it's either an abstract model of an algorithmic machine or an esoteric programming language. It's named after its creator, Alan Turing– an English #cryptologist.
The machine consists of:

  • an infinitely long (in real life: long enough to do all practical programs) tape with symbols that can be moved left and right
  • a "head" over one of the symbols that can read it and overwrite it with a new one,
  • some registers containing the state of the machine,
  • a table linking each combination of state and symbol to an instruction what to do next.

…and the working cycle of the machine looks like this:

  • read the symbol from the tape
  • based on the symbol and the state, see what to do next in the table
  • based on the instruction, go to a new state and print a new symbol in place of the one that has been read
  • also based on the instruction, move the tape 1 symbol left or right or exit the program

The cycle continues until the machine stops. This way it can execute any computer algorithm.

https://ideas.lego.com/projects/10a3239f-4562-4d23-ba8e-f4fc94eef5c7

#Lego #encryption #BletchleyPark #WWII #analog #computers #LegoIdeas

anonymiss@despora.de

#CSAM Regulation Update: Dutch #Intelligence agency weighs in

Source: https://berthub.eu/articles/posts/dutch-intel-service-csam-update/

The resulting situation is regarded by #AIVD as too large a risk for our #digital #resilience. (…) Applying detection orders to providers of end-to-end encrypted communications entails too large a #security risk for our digital resilience.

#news #backdoor #encryption #e2e #chat #communication #surveillance #bigbrother #cybercrime #cybersecurity #chatcontrol #privacy #eu #politics #Software #Europe #Smartphone #mobile

danie10@squeet.me

Secret crypto code that helped end apartheid has been cracked and open-sourced

A DOSBox screen showing an old BASIC program's main menu text screen. It is a blue background with white text. Text states CODER Level 2 MAIN MENU. Option one F1 Load files from disk, option 2 F2 Save files onto disk, option 3 F3 Delete files on disk, option 4 Encipher files, option 5 F5 Decipher files, option 6 F6 Type a new document, option 7 F7 Edit/read documents, option 8 F8 Rename files, option 9 F9 Terminal, and option 10 F10 Quit.
Operation Vula was a mission to infiltrate key leaders such as Mac Maharaj and Charles Nqakula into South Africa while ensuring good lines of communication between them and the ANC’s headquarters-in-exile in Lusaka, Zambia.

“Even in those days, 25 years before Edward Snowden, there was talk about ‘backdoors’ in encryption software,” Jenkin previously told MyBroadband.

Encrypted messages were transmitted into a signal that could be played over a regular telephone call and recorded. This allowed operatives to easily receive messages via public telephones.

The recorded message could then be played back into a computer via a modem and decrypted.

Interesting history and because this was before the availability of the Internet everywhere, more legacy mode transmissions were required.

Why the code has remained hidden for so long, was that it was stored in an encrypted zip file, and if you forget your password, you can’t open it (a valuable lesson for anyone wanting to be super-secret, is don’t forget your password, 10 years later).

And although there is a known vulnerability with the ZipCrypto scheme used, it was not as simple as just running bkcrack.

See mybroadband.co.za/news/softwar…
#Blog, #apartheid, #encryption, #privacy, #southafrica, #technology

anonymiss@despora.de

What #encryption do you use for your everyday #communication?

I'm not talking about your nerd friends, who can be counted on one hand and who know a thing or two about the subject. I'm talking about your normal friends, business partners and colleagues with whom you communicate both professionally and privately.

I was recently called by my support via Microsoft Teams because I had to enter some passwords. The support team proudly said that they were contacting me via Teams because it was more secure than the normal phone. He was then very surprised when I told him that Teams is unencrypted and can be intercepted much more easily.

encryption

#messenger #email #question #security #cybersecurity #internet #spy #surveillance #privacy #nsa #snowden #5eyes