Because I switched from windows 10 to Ubuntu when I got a new PC and PGP was installed by default. It's not exactly the most convenient or elegant solution but it works well enough that I haven't bothered switching over to something else.
>Out of curiosity, why GPG over LUKS or Veracrypt?
NTA but it has pros and cons. Harder to bruteforce, for example. Not the most elegant solution but you could possibly combine the two and require PGP to decrypt the LUKS partition
7.1a got audited, no significant vulnerabilities were found (just minor stuff like booting from an encrypted volume, which doesn't tie in to the BIOS properly or something), and it still works fine for encrypting your bestiality porn just like it does for mine.
one time pads randomly generated by my schizophrenic cokehead neighbor's ramblings that are then ciphered by the last digit of my shitcoin portfolio performance
Diffie–Hellman is the gold standard of transferring pubic keys to verify private transaction.
Elliptic-curve is interesting efficient way to obtain high strength keys.
NSA are Black person homosexuals trying to constantly add backdoors to every key exchange algorithms. Death to all alphabet soup agencies.
DH is interesting. I wish there was a solution to no-knowledge authetication though. DH falls apart if somebody sits in the middle pretending to be the other party.
Yeah, but then you just race down the chicken and egg rabbit hole.
"How do you verify public key signatures?"
"W-we can sign them?"
AAAHH
I mean, CAs work if you trust the companies that run them, and the governments in which they reside, but that isn't no-knowledge. You still need a known-good key.
I just want my quantum key exchange damnit.
Guess it's not technically encryption, but stenography. If you use images taken yourself rather than pulled from the Internet. You could put out bulletins for some kind of organization embedded in the pictures of a seemingly normie social media account. Although I'd suppose you'd have to make sure the social media platform doesn't re-encode the pictures.
I guess the the better way would be to LARP as an amateur photographer and upload your pictures with the encoded message on google drive or something that won't alter the data.
>still using conventional encyption methods >not using an OTP generated from the the frequency your shoes hit the floor while dancing to yakety sax at a random playback speed based on multiplying the amount the stock market moved today with the number of tourists on this board
ISHYGDDT, Xi is reading all of your secrets
>openPGP for email communication >let me guess "you need more"?
Please. modulate and demodulate with a middlestep of hashing with a fresh recording of a very long steak and eggs fart and then send via burst radio to a station running the gopher protocol over tcpip. What do you think this is amateur hour?
>still using conventional encyption methods >not using an OTP generated from the the frequency your shoes hit the floor while dancing to yakety sax at a random playback speed based on multiplying the amount the stock market moved today with the number of tourists on this board
ISHYGDDT, Xi is reading all of your secrets
7.1a got audited, no significant vulnerabilities were found (just minor stuff like booting from an encrypted volume, which doesn't tie in to the BIOS properly or something), and it still works fine for encrypting your bestiality porn just like it does for mine.
>nsa just harrases you by other means
okay
openPGP for email communication
let me guess "you need more"?
>nsa just harrases you by other means
The NSA doesn't really care about bestiality porn. That's more an issue for maybe half a half a dozen states like FL and OR and TN.
>What is your favorite cryptographic tool?
modulate modulate and hash with my own farting sound. You are all laughing I have actually written this and it is uncrackable.
>openPGP for email communication >let me guess "you need more"?
Please. modulate and demodulate with a middlestep of hashing with a fresh recording of a very long steak and eggs fart and then send via burst radio to a station running the gopher protocol over tcpip. What do you think this is amateur hour?
You can use anything you want as a key. Decrypting is a problem unless you store that key someplace, in which case now you're vulnerable to someone finding your saved key file.
>You glow just use ethereum or whatever fotm coin is
I will not settle for a coin that doesn't respect my privacy, Monero has forced privacy that has yet to be broken despite the government's efforts.
I had a professor in college that taught a class on cryptology. In his early years teaching he hadn't become an American citizen yet so even though he taught the class he wasn't allowed to grade any of the students' work because it would have violated munitions export laws.
it's pretty good, more of an i2p alternative as it does all IP traffic instead of just TCP like Tor, protocol designed mainly for torrents but it is low latency and capable of streaming 1080 anime or even minecraft
There's an opennet non-crypto version but you lose the name resolution/DNS alternative ONS. Plus no one chooses to set up a node there when you can get paid to run a lokinet/oxen node
When I was in the Navy I got to transition from EKMS to KMI and it was fun and my job was easy and I got to surf the web all day and nobody bothered me and my SCIF had air conditioning and my Chief was really chill and my LPO was a neanderthal and I was a Second Class and never weasled my way out of Duty Section because I was always standing SITREP Duty IT but we were on shore and nothing bad ever happened. I miss those days.
The US considers the mapping of unground tombs a weapon? This doesn't make any sense.
Right? Fricking wack jobs.
GPG because thats how I keep my 15 gigabytes of furry porn and firearm blueprints safe from hackers federal agents and women.
Out of curiosity, why GPG over LUKS or Veracrypt?
Obfuscation isn't encryption.
Because I switched from windows 10 to Ubuntu when I got a new PC and PGP was installed by default. It's not exactly the most convenient or elegant solution but it works well enough that I haven't bothered switching over to something else.
>Out of curiosity, why GPG over LUKS or Veracrypt?
NTA but it has pros and cons. Harder to bruteforce, for example. Not the most elegant solution but you could possibly combine the two and require PGP to decrypt the LUKS partition
To answer the question though, I guess XMR counts as a weapon
TRUECRYPT ALL THE THINGS
7.1a got audited, no significant vulnerabilities were found (just minor stuff like booting from an encrypted volume, which doesn't tie in to the BIOS properly or something), and it still works fine for encrypting your bestiality porn just like it does for mine.
/misc/ schizo buzzword babble is my favorite cryptographic tool
one time pads randomly generated by my schizophrenic cokehead neighbor's ramblings that are then ciphered by the last digit of my shitcoin portfolio performance
dual_ec_drbg
Diffie–Hellman is the gold standard of transferring pubic keys to verify private transaction.
Elliptic-curve is interesting efficient way to obtain high strength keys.
NSA are Black person homosexuals trying to constantly add backdoors to every key exchange algorithms. Death to all alphabet soup agencies.
>transferring pubic keys to verify private transaction
>pubic
That's the weirdest euphemism I've heard in a while
Do you understand how key exchanges work to verify multiple parties private keys?
>joke goes over autist's head
DH is interesting. I wish there was a solution to no-knowledge authetication though. DH falls apart if somebody sits in the middle pretending to be the other party.
Public key signatures are a thing anon. Hell you can even do it with nothing but a hash function, no fancy math. (SPHINCS, LMS, or XMSS for instance)
Yeah, but then you just race down the chicken and egg rabbit hole.
"How do you verify public key signatures?"
"W-we can sign them?"
AAAHH
I mean, CAs work if you trust the companies that run them, and the governments in which they reside, but that isn't no-knowledge. You still need a known-good key.
I just want my quantum key exchange damnit.
if you aren't going to use AES then I think Serpent is neat, secure, and public domain
Based ARX enjoyer
Gotta love the Diffie Helman Key exchange.
Beauty in simplicity.
ECC is pretty neat too.
NFT monke
Guess it's not technically encryption, but stenography. If you use images taken yourself rather than pulled from the Internet. You could put out bulletins for some kind of organization embedded in the pictures of a seemingly normie social media account. Although I'd suppose you'd have to make sure the social media platform doesn't re-encode the pictures.
I guess the the better way would be to LARP as an amateur photographer and upload your pictures with the encoded message on google drive or something that won't alter the data.
You gotta run a script to add random steganography on all pics in your meme folder to mess with schizos
>still using conventional encyption methods
>not using an OTP generated from the the frequency your shoes hit the floor while dancing to yakety sax at a random playback speed based on multiplying the amount the stock market moved today with the number of tourists on this board
ISHYGDDT, Xi is reading all of your secrets
ROT-13. If it's good enough for Adobe, it's good enough for me.
math, even though I hate math
138
168
110
1050
138
168
1734
434
480
1650
1734
434
168
984
These aren't random numbers
but probably no one will ever figure it out
Where 2 cop plz
for me, it's having awful handwriting
Chainlink
(You)
openPGP for email communication
let me guess "you need more"?
>openPGP for email communication
>let me guess "you need more"?
Please. modulate and demodulate with a middlestep of hashing with a fresh recording of a very long steak and eggs fart and then send via burst radio to a station running the gopher protocol over tcpip. What do you think this is amateur hour?
>gopher protocol over tcpip
Frick the knots browser. HTML is for gays
Yes, I require something with forward secrecy.
Such as?
See
Baka
>nsa just harrases you by other means
okay
nerd
>nsa just harrases you by other means
The NSA doesn't really care about bestiality porn. That's more an issue for maybe half a half a dozen states like FL and OR and TN.
>What is your favorite cryptographic tool?
modulate modulate and hash with my own farting sound. You are all laughing I have actually written this and it is uncrackable.
You can use anything you want as a key. Decrypting is a problem unless you store that key someplace, in which case now you're vulnerable to someone finding your saved key file.
>You glow just use ethereum or whatever fotm coin is
I will not settle for a coin that doesn't respect my privacy, Monero has forced privacy that has yet to be broken despite the government's efforts.
I had a professor in college that taught a class on cryptology. In his early years teaching he hadn't become an American citizen yet so even though he taught the class he wasn't allowed to grade any of the students' work because it would have violated munitions export laws.
Single use disposable cypher pads
lokinet, picrel
Shitcoin-based Tor knockoff.
Oh that must be a treat. I'll have to try that one day.
it's pretty good, more of an i2p alternative as it does all IP traffic instead of just TCP like Tor, protocol designed mainly for torrents but it is low latency and capable of streaming 1080 anime or even minecraft
There's an opennet non-crypto version but you lose the name resolution/DNS alternative ONS. Plus no one chooses to set up a node there when you can get paid to run a lokinet/oxen node
So do you also have to pay to send data over the network, or use it?
no, that's all free
That shirt is PrepHole as frick
>What is your favorite cryptographic tool?
cryptography is obsolete
When I was in the Navy I got to transition from EKMS to KMI and it was fun and my job was easy and I got to surf the web all day and nobody bothered me and my SCIF had air conditioning and my Chief was really chill and my LPO was a neanderthal and I was a Second Class and never weasled my way out of Duty Section because I was always standing SITREP Duty IT but we were on shore and nothing bad ever happened. I miss those days.