The Unitied States considers cryptography a weapon. What is your favorite cryptographic tool?

The Unitied States considers cryptography a weapon.
What is your favorite cryptographic tool?

250 Piece Survival Gear First Aid Kit

LifeStraw Water Filter for Hiking and Preparedness

250 Piece Survival Gear First Aid Kit

  1. 2 years ago
    Anonymous

    The US considers the mapping of unground tombs a weapon? This doesn't make any sense.

    • 2 years ago
      Anonymous

      Right? Fricking wack jobs.

  2. 2 years ago
    Anonymous

    GPG because thats how I keep my 15 gigabytes of furry porn and firearm blueprints safe from hackers federal agents and women.

    • 2 years ago
      Anonymous

      Out of curiosity, why GPG over LUKS or Veracrypt?

      /misc/ schizo buzzword babble is my favorite cryptographic tool

      Obfuscation isn't encryption.

      • 2 years ago
        Anonymous

        Because I switched from windows 10 to Ubuntu when I got a new PC and PGP was installed by default. It's not exactly the most convenient or elegant solution but it works well enough that I haven't bothered switching over to something else.

      • 2 years ago
        Anonymous

        >Out of curiosity, why GPG over LUKS or Veracrypt?
        NTA but it has pros and cons. Harder to bruteforce, for example. Not the most elegant solution but you could possibly combine the two and require PGP to decrypt the LUKS partition

        • 2 years ago
          Anonymous

          To answer the question though, I guess XMR counts as a weapon

    • 2 years ago
      Anonymous

      TRUECRYPT ALL THE THINGS

      7.1a got audited, no significant vulnerabilities were found (just minor stuff like booting from an encrypted volume, which doesn't tie in to the BIOS properly or something), and it still works fine for encrypting your bestiality porn just like it does for mine.

      • 2 years ago
        Anonymous
  3. 2 years ago
    Anonymous

    /misc/ schizo buzzword babble is my favorite cryptographic tool

  4. 2 years ago
    Anonymous

    one time pads randomly generated by my schizophrenic cokehead neighbor's ramblings that are then ciphered by the last digit of my shitcoin portfolio performance

  5. 2 years ago
    not the NSA

    dual_ec_drbg

  6. 2 years ago
    Anonymous

    Diffie–Hellman is the gold standard of transferring pubic keys to verify private transaction.
    Elliptic-curve is interesting efficient way to obtain high strength keys.
    NSA are Black person homosexuals trying to constantly add backdoors to every key exchange algorithms. Death to all alphabet soup agencies.

    • 2 years ago
      Anonymous

      >transferring pubic keys to verify private transaction
      >pubic
      That's the weirdest euphemism I've heard in a while

      • 2 years ago
        Anonymous

        Do you understand how key exchanges work to verify multiple parties private keys?

        • 2 years ago
          Anonymous

          >joke goes over autist's head

    • 2 years ago
      Anonymous

      DH is interesting. I wish there was a solution to no-knowledge authetication though. DH falls apart if somebody sits in the middle pretending to be the other party.

      • 2 years ago
        Anonymous

        Public key signatures are a thing anon. Hell you can even do it with nothing but a hash function, no fancy math. (SPHINCS, LMS, or XMSS for instance)

        • 2 years ago
          Anonymous

          Yeah, but then you just race down the chicken and egg rabbit hole.
          "How do you verify public key signatures?"
          "W-we can sign them?"
          AAAHH
          I mean, CAs work if you trust the companies that run them, and the governments in which they reside, but that isn't no-knowledge. You still need a known-good key.
          I just want my quantum key exchange damnit.

  7. 2 years ago
    Anonymous

    if you aren't going to use AES then I think Serpent is neat, secure, and public domain

    • 2 years ago
      Anonymous

      Based ARX enjoyer

  8. 2 years ago
    Anonymous

    Gotta love the Diffie Helman Key exchange.
    Beauty in simplicity.

    ECC is pretty neat too.

  9. 2 years ago
    Anonymous

    NFT monke

  10. 2 years ago
    Anonymous

    Guess it's not technically encryption, but stenography. If you use images taken yourself rather than pulled from the Internet. You could put out bulletins for some kind of organization embedded in the pictures of a seemingly normie social media account. Although I'd suppose you'd have to make sure the social media platform doesn't re-encode the pictures.

    I guess the the better way would be to LARP as an amateur photographer and upload your pictures with the encoded message on google drive or something that won't alter the data.

    • 2 years ago
      Anonymous

      You gotta run a script to add random steganography on all pics in your meme folder to mess with schizos

  11. 2 years ago
    Anonymous

    >still using conventional encyption methods
    >not using an OTP generated from the the frequency your shoes hit the floor while dancing to yakety sax at a random playback speed based on multiplying the amount the stock market moved today with the number of tourists on this board
    ISHYGDDT, Xi is reading all of your secrets

  12. 2 years ago
    Anonymous

    ROT-13. If it's good enough for Adobe, it's good enough for me.

  13. 2 years ago
    Anonymous

    math, even though I hate math

    • 2 years ago
      Anonymous

      138
      168
      110
      1050
      138
      168
      1734
      434
      480
      1650
      1734
      434
      168
      984
      These aren't random numbers
      but probably no one will ever figure it out

  14. 2 years ago
    Anonymous

    Where 2 cop plz

  15. 2 years ago
    Anonymous

    for me, it's having awful handwriting

  16. 2 years ago
    Anonymous

    Chainlink

  17. 2 years ago
    Anonymous

    [...]

    (You)

  18. 2 years ago
    Anonymous

    openPGP for email communication
    let me guess "you need more"?

    • 2 years ago
      Anonymous

      >openPGP for email communication
      >let me guess "you need more"?
      Please. modulate and demodulate with a middlestep of hashing with a fresh recording of a very long steak and eggs fart and then send via burst radio to a station running the gopher protocol over tcpip. What do you think this is amateur hour?

      • 2 years ago
        Anonymous

        >gopher protocol over tcpip
        Frick the knots browser. HTML is for gays

    • 2 years ago
      Anonymous

      Yes, I require something with forward secrecy.

      • 2 years ago
        Anonymous

        Such as?

        • 2 years ago
          Anonymous

          See

          >still using conventional encyption methods
          >not using an OTP generated from the the frequency your shoes hit the floor while dancing to yakety sax at a random playback speed based on multiplying the amount the stock market moved today with the number of tourists on this board
          ISHYGDDT, Xi is reading all of your secrets

  19. 2 years ago
    Anonymous

    [...]

    https://i.imgur.com/RJdsfsO.jpg

    [...]
    (You)

    Baka

    TRUECRYPT ALL THE THINGS

    7.1a got audited, no significant vulnerabilities were found (just minor stuff like booting from an encrypted volume, which doesn't tie in to the BIOS properly or something), and it still works fine for encrypting your bestiality porn just like it does for mine.

    >nsa just harrases you by other means
    okay

    openPGP for email communication
    let me guess "you need more"?

    nerd

    • 2 years ago
      Anonymous

      >nsa just harrases you by other means
      The NSA doesn't really care about bestiality porn. That's more an issue for maybe half a half a dozen states like FL and OR and TN.

  20. 2 years ago
    Anonymous

    >What is your favorite cryptographic tool?
    modulate modulate and hash with my own farting sound. You are all laughing I have actually written this and it is uncrackable.

    • 2 years ago
      Anonymous

      >openPGP for email communication
      >let me guess "you need more"?
      Please. modulate and demodulate with a middlestep of hashing with a fresh recording of a very long steak and eggs fart and then send via burst radio to a station running the gopher protocol over tcpip. What do you think this is amateur hour?

      You can use anything you want as a key. Decrypting is a problem unless you store that key someplace, in which case now you're vulnerable to someone finding your saved key file.

  21. 2 years ago
    Anonymous

    [...]

    >You glow just use ethereum or whatever fotm coin is
    I will not settle for a coin that doesn't respect my privacy, Monero has forced privacy that has yet to be broken despite the government's efforts.

  22. 2 years ago
    Anonymous

    I had a professor in college that taught a class on cryptology. In his early years teaching he hadn't become an American citizen yet so even though he taught the class he wasn't allowed to grade any of the students' work because it would have violated munitions export laws.

  23. 2 years ago
    Anonymous

    Single use disposable cypher pads

  24. 2 years ago
    [PLEBSPOTTERS] Acbn

    lokinet, picrel

    • 2 years ago
      Anonymous

      Shitcoin-based Tor knockoff.
      Oh that must be a treat. I'll have to try that one day.

      • 2 years ago
        [PLEBSPOTTERS] Acbn

        it's pretty good, more of an i2p alternative as it does all IP traffic instead of just TCP like Tor, protocol designed mainly for torrents but it is low latency and capable of streaming 1080 anime or even minecraft

        There's an opennet non-crypto version but you lose the name resolution/DNS alternative ONS. Plus no one chooses to set up a node there when you can get paid to run a lokinet/oxen node

        • 2 years ago
          Anonymous

          So do you also have to pay to send data over the network, or use it?

          • 2 years ago
            [PLEBSPOTTERS] Acbn

            no, that's all free

  25. 2 years ago
    Anonymous

    That shirt is PrepHole as frick

  26. 2 years ago
    Anonymous

    >What is your favorite cryptographic tool?

    cryptography is obsolete

  27. 2 years ago
    Anonymous

    When I was in the Navy I got to transition from EKMS to KMI and it was fun and my job was easy and I got to surf the web all day and nobody bothered me and my SCIF had air conditioning and my Chief was really chill and my LPO was a neanderthal and I was a Second Class and never weasled my way out of Duty Section because I was always standing SITREP Duty IT but we were on shore and nothing bad ever happened. I miss those days.

Leave a Reply to Anonymous Cancel reply

Your email address will not be published. Required fields are marked *