Announcement

Collapse
No announcement yet.

MS & Big Brother hand in hand

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

    MS & Big Brother hand in hand

    http://seattletimes.nwsource.com/htm...msftlaw29.html

    Awfully darn nice of them... Now what happens when some hacker gets his hands on one of these and reverse engineers some code for a pretty new virus? And why is MS making easier for law enforcement to get in to computers anyway? I support this for the cases where it's warranted, but with a tool like this, how many times are laws going to be overlooked to get access to "proof" quickly?
    [img]http://img.photobucket.com/albums/v337/Igorod/troopdod.jpg[/img]
    [url=http://profile.xfire.com/trooper110][img]http://miniprofile.xfire.com/bg/co/type/1/trooper110.png[/img][/url]

    #2
    Alls it is is a thumb drive with various tools. You can find tools like cain and able for brute forcing passwords and put it on your own thumb drive. It's really not that big of a deal.

    Comment


      #3
      Originally posted by mapes View Post
      Alls it is is a thumb drive with various tools. You can find tools like cain and able for brute forcing passwords and put it on your own thumb drive. It's really not that big of a deal.
      Yes, you could, but I got the impression from the article that the thumbdrive more or less just turns off any passwords or security enabled through Windows. This wouldn't affect something with, say, PGP Full Disk Encryption running, but it's an awful neat little trick without having to brute force your way in. Course, I could just be reading things incorrectly which has happened before. But what if it is something that more or less just makes Windows security feature "see through"? I'd think there would be some things that malicious programmers could get out of that.
      [img]http://img.photobucket.com/albums/v337/Igorod/troopdod.jpg[/img]
      [url=http://profile.xfire.com/trooper110][img]http://miniprofile.xfire.com/bg/co/type/1/trooper110.png[/img][/url]

      Comment


        #4
        This leads me to believe that it is a NTLM hash cracker

        The device contains 150 commands that can dramatically cut the time it takes to gather digital evidence, which is becoming more important in real-world crime, as well as cybercrime. It can decrypt passwords and analyze a computer's Internet activity, as well as data stored in the computer.

        You have to understand...Most Law Enforcment don't really understand computers. MS did this as sort of a precanned hacking thumb drive for them...I think. Well if youyr really worried about it switch to linux

        Comment


          #5
          I don't think you have anything to worry about!
          Like mapes said it's just various tools some probably not available to the public.
          Just FYI, most encryption standards have back doors built in for the certain agencies.
          Years ago The Z man, if you know who I mean, had a battle with the gov over PGP and not wanting to put that back door in.
          I don't know what the outcome was, last I saw he was still telling them to FO.
          I figured you would want to know about this PUBLIC KNOWLEDGE, so if theres an encrypted email they want to know whats in it, unless your using PGP, they can read it.
          This was not intended for all authorities and other national authorities, but I haven't followed up on this in a long time. The original purpose for this, which I might add has been released in public articles {to cover my ass}, was for national security reasons, which I agree with.

          Cheers
          DougBob

          DISCLAIMER: Information in this email was obtained thru the use of public information available on the Internet approx. 10 years ago. No information was obtained through my company or illegal means and I shall not be held responsible.
          [IMG]http://thepebkac.net/images/sigs/Outdoors_sig.jpg[/IMG]
          Like the community? Donate here:
          [URL="http://www.cainslair.com/misc.php?do=donate"]http://www.cainslair.com/misc.php?do=donate[/URL]

          Comment


            #6
            Originally posted by DougBob View Post
            Just FYI, most encryption standards have back doors built in for the certain agencies.

            That is not true.

            When the DES standard was proposed the NSA insisted on some minor changes to the Diffie Helman prime groups. They wouldn't say why. After exhaustive research by academia it was determined that the changes the NSA wanted made the DES cipher more secure.

            A few years back NIST put forth the process for a new goverment standard cipher. Many many people from academia submitted various cipher algorithms. The one that won was called Rijndael.

            The cipher was developed by two Belgian cryptographers, Joan Daemen and Vincent Rijmen, and submitted to the AES selection process under the name "Rijndael", a portmanteau of the names of the inventors. (Rijndael is pronounced [rɛindaːl], which sounds almost like "rain dahl").[4]


            http://en.wikipedia.org/wiki/Advance...ption_Standard

            Comment


              #7
              Originally posted by mapes View Post
              Remember, I did say most, not all

              the NSA wanted made the DES cipher more secure
              There was a reason for that
              [IMG]http://thepebkac.net/images/sigs/Outdoors_sig.jpg[/IMG]
              Like the community? Donate here:
              [URL="http://www.cainslair.com/misc.php?do=donate"]http://www.cainslair.com/misc.php?do=donate[/URL]

              Comment


                #8
                Originally posted by DougBob View Post
                Remember, I did say most, not all



                There was a reason for that
                Yes the reason is that the DES standard was used by our government. The NSA has many divisions. One is in charge of vetting ciphers for government use and gave us stuff like SELinux.

                Generally ciphers that have back doors are extremely weak or broken from the get go. So I would say that most ciphers do not have back doors.... Unless they're makers want to be laughed at by the cryptographic community

                The only two times the the government serious tried to install back door or something like a back door is when it restricted 128 bit key SSL via ITAR and Key Escrow.

                Comment

                Cain's Lair Forums Statistics

                Collapse

                Topics: 26,187   Posts: 269,850   Members: 6,183   Active Members: 7
                Welcome to our newest member, Fermin13Q.

                Today's Birthdays

                Collapse

                There are no members with birthdays today.

                Top Active Users

                Collapse

                There are no top active users.

                More Posts

                Collapse

                • Reply to Hi guys!
                  by Evil_T0NY {CLR}
                  I've been Alpha and will be Beta testing the Delta Force game. It's been really getting good reviews! Definitely a good Battlefield feel to it like the...
                  14 Nov 2024, 08:50 PM
                • Reply to Hope your all OK over there
                  by Apache Warrior
                  We had 17 inches of rain from the storm on November 7, 2024.
                  Apache
                  11 Nov 2024, 07:55 AM
                • Reply to Hope your all OK over there
                  by Sirex
                  Aye, I'm inclined to agree with that lmao
                  Gone are the days of warm summers and snow filled winters here, nothing but rain and wind for 8mths of...
                  10 Nov 2024, 08:53 PM
                • Reply to Hope your all OK over there
                  by Apache Warrior
                  Now we have had a lot of flooding in this area and there are still a lot of houses that have not been repaired. Must be the apocalypse.
                  ...
                  8 Nov 2024, 09:23 AM
                Working...
                X