The Unitied States considers cryptography a weapon. What is your favorite cryptographic tool?

The Unitied States considers cryptography a weapon.
What is your favorite cryptographic tool?

  1. 3 weeks ago
    Anonymous

    The US considers the mapping of unground tombs a weapon? This doesn't make any sense.

    • 3 weeks ago
      Anonymous

      Right? Fucking wack jobs.

  2. 3 weeks ago
    Anonymous

    GPG because thats how I keep my 15 gigabytes of furry porn and firearm blueprints safe from hackers federal agents and women.

    • 3 weeks ago
      Anonymous

      Out of curiosity, why GPG over LUKS or Veracrypt?

      4chan schizo buzzword babble is my favorite cryptographic tool

      Obfuscation isn't encryption.

      • 3 weeks ago
        Anonymous

        Because I switched from windows 10 to Ubuntu when I got a new PC and PGP was installed by default. It's not exactly the most convenient or elegant solution but it works well enough that I haven't bothered switching over to something else.

      • 3 weeks ago
        Anonymous

        >Out of curiosity, why GPG over LUKS or Veracrypt?
        NTA but it has pros and cons. Harder to bruteforce, for example. Not the most elegant solution but you could possibly combine the two and require PGP to decrypt the LUKS partition

        • 3 weeks ago
          Anonymous

          To answer the question though, I guess XMR counts as a weapon

    • 3 weeks ago
      Anonymous

      TRUECRYPT ALL THE THINGS

      7.1a got audited, no significant vulnerabilities were found (just minor stuff like booting from an encrypted volume, which doesn't tie in to the BIOS properly or something), and it still works fine for encrypting your bestiality porn just like it does for mine.

      • 3 weeks ago
        Anonymous
  3. 3 weeks ago
    Anonymous

    4chan schizo buzzword babble is my favorite cryptographic tool

  4. 3 weeks ago
    Anonymous

    one time pads randomly generated by my schizophrenic cokehead neighbor's ramblings that are then ciphered by the last digit of my shitcoin portfolio performance

  5. 3 weeks ago
    not the NSA

    dual_ec_drbg

  6. 3 weeks ago
    Anonymous

    Diffie–Hellman is the gold standard of transferring pubic keys to verify private transaction.
    Elliptic-curve is interesting efficient way to obtain high strength keys.
    NSA are moron gays trying to constantly add backdoors to every key exchange algorithms. Death to all alphabet soup agencies.

    • 3 weeks ago
      Anonymous

      >transferring pubic keys to verify private transaction
      >pubic
      That's the weirdest euphemism I've heard in a while

      • 3 weeks ago
        Anonymous

        Do you understand how key exchanges work to verify multiple parties private keys?

        • 3 weeks ago
          Anonymous

          >joke goes over autist's head

    • 3 weeks ago
      Anonymous

      DH is interesting. I wish there was a solution to no-knowledge authetication though. DH falls apart if somebody sits in the middle pretending to be the other party.

      • 3 weeks ago
        Anonymous

        Public key signatures are a thing anon. Hell you can even do it with nothing but a hash function, no fancy math. (SPHINCS, LMS, or XMSS for instance)

        • 3 weeks ago
          Anonymous

          Yeah, but then you just race down the chicken and egg rabbit hole.
          "How do you verify public key signatures?"
          "W-we can sign them?"
          AAAHH
          I mean, CAs work if you trust the companies that run them, and the governments in which they reside, but that isn't no-knowledge. You still need a known-good key.
          I just want my quantum key exchange damnit.

  7. 3 weeks ago
    Anonymous

    if you aren't going to use AES then I think Serpent is neat, secure, and public domain

    • 3 weeks ago
      Anonymous

      Based ARX enjoyer

  8. 3 weeks ago
    Anonymous

    Gotta love the Diffie Helman Key exchange.
    Beauty in simplicity.

    ECC is pretty neat too.

  9. 3 weeks ago
    Anonymous

    NFT monke

  10. 3 weeks ago
    Anonymous

    Guess it's not technically encryption, but stenography. If you use images taken yourself rather than pulled from the Internet. You could put out bulletins for some kind of organization embedded in the pictures of a seemingly normie social media account. Although I'd suppose you'd have to make sure the social media platform doesn't re-encode the pictures.

    I guess the the better way would be to LARP as an amateur photographer and upload your pictures with the encoded message on google drive or something that won't alter the data.

    • 3 weeks ago
      Anonymous

      You gotta run a script to add random steganography on all pics in your meme folder to mess with schizos

  11. 3 weeks ago
    Anonymous

    >still using conventional encyption methods
    >not using an OTP generated from the the frequency your shoes hit the floor while dancing to yakety sax at a random playback speed based on multiplying the amount the stock market moved today with the number of tourists on this board
    ISHYGDDT, Xi is reading all of your secrets

  12. 3 weeks ago
    Anonymous

    ROT-13. If it's good enough for Adobe, it's good enough for me.

  13. 3 weeks ago
    Anonymous

    math, even though I hate math

    • 3 weeks ago
      Anonymous

      138
      168
      110
      1050
      138
      168
      1734
      434
      480
      1650
      1734
      434
      168
      984
      These aren't random numbers
      but probably no one will ever figure it out

  14. 3 weeks ago
    Anonymous

    Where 2 cop plz

  15. 3 weeks ago
    Anonymous

    for me, it's having awful handwriting

  16. 3 weeks ago
    Anonymous

    Chainlink

  17. 3 weeks ago
    Anonymous

    [...]

    (You)

  18. 3 weeks ago
    Anonymous

    openPGP for email communication
    let me guess "you need more"?

    • 3 weeks ago
      Anonymous

      >openPGP for email communication
      >let me guess "you need more"?
      Please. modulate and demodulate with a middlestep of hashing with a fresh recording of a very long steak and eggs fart and then send via burst radio to a station running the gopher protocol over tcpip. What do you think this is amateur hour?

      • 3 weeks ago
        Anonymous

        >gopher protocol over tcpip
        Fuck the knots browser. HTML is for fags

    • 3 weeks ago
      Anonymous

      Yes, I require something with forward secrecy.

      • 3 weeks ago
        Anonymous

        Such as?

        • 3 weeks ago
          Anonymous

          See

          >still using conventional encyption methods
          >not using an OTP generated from the the frequency your shoes hit the floor while dancing to yakety sax at a random playback speed based on multiplying the amount the stock market moved today with the number of tourists on this board
          ISHYGDDT, Xi is reading all of your secrets

  19. 3 weeks ago
    Anonymous

    [...]

    https://i.imgur.com/RJdsfsO.jpg

    [...]
    (You)

    Baka

    TRUECRYPT ALL THE THINGS

    7.1a got audited, no significant vulnerabilities were found (just minor stuff like booting from an encrypted volume, which doesn't tie in to the BIOS properly or something), and it still works fine for encrypting your bestiality porn just like it does for mine.

    >nsa just harrases you by other means
    okay

    openPGP for email communication
    let me guess "you need more"?

    nerd

    • 3 weeks ago
      Anonymous

      >nsa just harrases you by other means
      The NSA doesn't really care about bestiality porn. That's more an issue for maybe half a half a dozen states like FL and OR and TN.

  20. 3 weeks ago
    Anonymous

    >What is your favorite cryptographic tool?
    modulate modulate and hash with my own farting sound. You are all laughing I have actually written this and it is uncrackable.

    • 3 weeks ago
      Anonymous

      >openPGP for email communication
      >let me guess "you need more"?
      Please. modulate and demodulate with a middlestep of hashing with a fresh recording of a very long steak and eggs fart and then send via burst radio to a station running the gopher protocol over tcpip. What do you think this is amateur hour?

      You can use anything you want as a key. Decrypting is a problem unless you store that key someplace, in which case now you're vulnerable to someone finding your saved key file.

  21. 3 weeks ago
    Anonymous

    [...]

    >You glow just use ethereum or whatever fotm coin is
    I will not settle for a coin that doesn't respect my privacy, Monero has forced privacy that has yet to be broken despite the government's efforts.

  22. 3 weeks ago
    Anonymous

    I had a professor in college that taught a class on cryptology. In his early years teaching he hadn't become an American citizen yet so even though he taught the class he wasn't allowed to grade any of the students' work because it would have violated munitions export laws.

  23. 3 weeks ago
    Anonymous

    Single use disposable cypher pads

  24. 3 weeks ago
    [PLEBSPOTTERS] Acbn

    lokinet, picrel

    • 3 weeks ago
      Anonymous

      Shitcoin-based Tor knockoff.
      Oh that must be a treat. I'll have to try that one day.

      • 3 weeks ago
        [PLEBSPOTTERS] Acbn

        it's pretty good, more of an i2p alternative as it does all IP traffic instead of just TCP like Tor, protocol designed mainly for torrents but it is low latency and capable of streaming 1080 anime or even minecraft

        There's an opennet non-crypto version but you lose the name resolution/DNS alternative ONS. Plus no one chooses to set up a node there when you can get paid to run a lokinet/oxen node

        • 3 weeks ago
          Anonymous

          So do you also have to pay to send data over the network, or use it?

          • 3 weeks ago
            [PLEBSPOTTERS] Acbn

            no, that's all free

  25. 3 weeks ago
    Anonymous

    That shirt is PrepHole as fuck

  26. 3 weeks ago
    Anonymous

    >What is your favorite cryptographic tool?

    cryptography is obsolete

  27. 3 weeks ago
    Anonymous

    When I was in the Navy I got to transition from EKMS to KMI and it was fun and my job was easy and I got to surf the web all day and nobody bothered me and my SCIF had air conditioning and my Chief was really chill and my LPO was a neanderthal and I was a Second Class and never weasled my way out of Duty Section because I was always standing SITREP Duty IT but we were on shore and nothing bad ever happened. I miss those days.

Your email address will not be published.