India claims to have tool to defeat iPhone encryption

DingDong

Senior Member
Joined
Oct 24, 2014
Messages
3,083
Likes
7,777
Country flag
@charlie, @DingDong - is NSA capable of retrieving the keys of iphones?! want to know this to tell to a friend.
Let us just say that the field of Cryptanalysis is simply amazing. Algorithm, code and platform doesn't matter only the KEY matters. if NSA can retrieve the keys from your computer then NSA can retrieve the keys from your iPhones much easily.

And don't underestimate the indigenous capabilities of the Indian agencies either. Governments have at their disposal the best Mathematical minds, the PHD Professors and scholars in all those government funded Universities and Research Centres. On top of that governments can invest into design and building of large and powerful computers.

The sound and heat emission your computer generates at the moment you key in your password is sufficient for the government to steal your password if it wants.
 

Screambowl

Ghanta Senior Member?
Senior Member
Joined
Jan 1, 2015
Messages
7,950
Likes
7,908
Country flag
LOL..
Why these non technical ministers make such statements and become piece of laughing stock?

I phone is a piece of cake for hackers to encrypt the data. The only problem FBI facing is legal access.

The real encrypted data is well protected. These data are missile tech, nuclear tech, intelligence tech. defence tech...

Now that's something which is tough to extract but then hackers do it too. Wtf is Iphone? LOL
 
Last edited:

no smoking

Senior Member
Joined
Aug 14, 2009
Messages
5,000
Likes
2,302
Country flag
chinise, not upto recintly, fbi took isreali company help, okay? go back to making noddles
:facepalm:

Yes, American media also told you that Iraq had Massive destruction weapon in 2003, where are they?
Seriously, you can't be that naïve!
1. Israel is surviving under American protection, can they go to do anything to spoil American's cash cow without US permission? In another word, it was a FBI cover company.
2. American has been able to hike into highly protected foreign servers for years, do you really believe they can't defeat their own Iphone's encryption?
 

charlie

Senior Member
Joined
Jul 1, 2010
Messages
1,150
Likes
1,245
Country flag
@charlie, @DingDong - is NSA capable of retrieving the keys of iphones?! want to know this to tell to a friend.
Well my knowledge is limited when it comes to cellphones, I can tell you about cellular network tapping but devices like iPhone I am not sure.

Now in LMR we use a key too for encryption, is that the similar key to that of a iPhone ?

NSA is capable of getting data and voice from a cellular network doesn't matter which phone or what app you use.
 
Last edited:

Peter

Pratik Maitra
Senior Member
Joined
Mar 3, 2014
Messages
2,938
Likes
3,341
Country flag
Let us just say that the field of Cryptanalysis is simply amazing. Algorithm, code and platform doesn't matter only the KEY matters. if NSA can retrieve the keys from your computer then NSA can retrieve the keys from your iPhones much easily.

And don't underestimate the indigenous capabilities of the Indian agencies either. Governments have at their disposal the best Mathematical minds, the PHD Professors and scholars in all those government funded Universities and Research Centres. On top of that governments can invest into design and building of large and powerful computers.

The sound and heat emission your computer generates at the moment you key in your password is sufficient for the government to steal your password if it wants.
A bit offtopic.

It seems sir that you had cryptographic analysis and security systems in your college syllabi. I too had the same subject this semester.
 

DingDong

Senior Member
Joined
Oct 24, 2014
Messages
3,083
Likes
7,777
Country flag
A bit offtopic.

It seems sir that you had cryptographic analysis and security systems in your college syllabi. I too had the same subject this semester.
Yes, I studied Number Theory, Cryptography and Cryptanalysis at college.
 

Yodha

India is my Identity
Professional
Joined
Aug 30, 2013
Messages
731
Likes
1,688
Country flag
no man. encryption protocol may be known, but not the keys. even apple dont know the keys. when apple know the weakness, they fix it, more trouble for agencies then.
It is not hard to collect a pool of keys and try them for decryption. Even the so secured Tor is vulnerable to such attacks. When there is a lock, there will be a key. Even if it is in a heap of keys, they will find it, they will open it. NSA is attributed to monitor communications between all sorts of devices all over the world. It even breached the European data reservoir programme. They can even listen to you using your phones' microphone with out you knowing it. And the FBI-APPLE fiasco is deliberately made to look like a privacy vs security fight. Truth is no one want to get hurt, either apple or FBI. They could have solved it internally but the news came out and spread like wild fire about the shooters iPhone. So FBI filed a case(for public show), apple rejected(for show again) and a 3rd party Israeli firm unlocked it and it all ended and everyone went to their business happily ever after.

Sent from my XT1022 using Tapatalk
 

Navnit Kundu

Pika Hu Akbarrr!!
Senior Member
Joined
Mar 22, 2016
Messages
1,395
Likes
3,098
It is not hard to collect a pool of keys and try them for decryption. Even the so secured Tor is vulnerable to such attacks. When there is a lock, there will be a key. Even if it is in a heap of keys, they will find it, they will open it. NSA is attributed to monitor communications between all sorts of devices all over the world. It even breached the European data reservoir programme. They can even listen to you using your phones' microphone with out you knowing it. And the FBI-APPLE fiasco is deliberately made to look like a privacy vs security fight. Truth is no one want to get hurt, either apple or FBI. They could have solved it internally but the news came out and spread like wild fire about the shooters iPhone. So FBI filed a case(for public show), apple rejected(for show again) and a 3rd party Israeli firm unlocked it and it all ended and everyone went to their business happily ever after.

Sent from my XT1022 using Tapatalk
Tor was never a secure system. It was evolved by the CIA to be marketed by so called 'Anonymous' which was a branch of the CIA cyber activities division, as a tool to be used by dissidents during Arab spring to prevent THEIR respective governments from listening to their conversations and so that the CIA assets inside Arab nations could communicate freely with the dissidents and grow the underground movements. CIA was always able to listen to Tor communications. If you have data packets passing through multiple decentralized nodes and some of those nodes are compromised then they can voluntarily leak the meta data and content of the message to the admin of that node. Do you recall which countries these tools were used most in? Tunisia, Egypt, Libya, Yemen, Bahrain, Syria, Algeria. What is the status of those countries now? all wrecked. Co-incidence?

Tor was meant to give a false sense of security to dissidents in foreign nations so that they could use it to gossip among themselves, and then CIA could listen to that gossip. They also created and shared other tools like Tails OS, Bitcoin, if you look at the source code of all of these, it's apparent that it wasn't done by some freelancer with too much free time on his hands on a weekend. It's been done and managed by professionals. The open source repositories are more frequently revised than most paid softwares out there. Using the 'Anonymous' alias allows CIA to carry out cyber attacks against their adversaries while maintaining deniability. Anonymous (Tor, Tails, Bitcoin) is to CIA what LeT is to Pakistan.

Completely agree with your opinion on the Apple fiasco. They want to create an impression that privacy is of utmost concern to them. Claiming that Apple is enctypted is such a childish thing to say. Does it mean that a terrorist operating in US can simply buy iPhone and he wont be on the radar of intel agencies? Pfff..the CIA thinks the world is an idiot, well, to their credit, iPhone users are idiots, but that's a different story.
 

Yodha

India is my Identity
Professional
Joined
Aug 30, 2013
Messages
731
Likes
1,688
Country flag
Tor was never a secure system. It was evolved by the CIA to be marketed by so called 'Anonymous' which was a branch of the CIA cyber activities division, as a tool to be used by dissidents during Arab spring to prevent THEIR respective governments from listening to their conversations and so that the CIA assets inside Arab nations could communicate freely with the dissidents and grow the underground movements. CIA was always able to listen to Tor communications. If you have data packets passing through multiple decentralized nodes and some of those nodes are compromised then they can voluntarily leak the meta data and content of the message to the admin of that node. Do you recall which countries these tools were used most in? Tunisia, Egypt, Libya, Yemen, Bahrain, Syria, Algeria. What is the status of those countries now? all wrecked. Co-incidence?

Tor was meant to give a false sense of security to dissidents in foreign nations so that they could use it to gossip among themselves, and then CIA could listen to that gossip. They also created and shared other tools like Tails OS, Bitcoin, if you look at the source code of all of these, it's apparent that it wasn't done by some freelancer with too much free time on his hands on a weekend. It's been done and managed by professionals. The open source repositories are more frequently revised than most paid softwares out there. Using the 'Anonymous' alias allows CIA to carry out cyber attacks against their adversaries while maintaining deniability. Anonymous (Tor, Tails, Bitcoin) is to CIA what LeT is to Pakistan.

Completely agree with your opinion on the Apple fiasco. They want to create an impression that privacy is of utmost concern to them. Claiming that Apple is enctypted is such a childish thing to say. Does it mean that a terrorist operating in US can simply buy iPhone and he wont be on the radar of intel agencies? Pfff..the CIA thinks the world is an idiot, well, to their credit, iPhone users are idiots, but that's a different story.
Yeah Tor is funded by DARPA for US Navy secure communications project. Tor was compromised the moment it had US roots in its funding. And the basic thing is Tor consumes a lot of bandwidth. A simple I2p is better than Tor. Hijacking Tor nodes was demonstrated publicly in Hacker summit.

Sent from my XT1022 using Tapatalk
 

Navnit Kundu

Pika Hu Akbarrr!!
Senior Member
Joined
Mar 22, 2016
Messages
1,395
Likes
3,098
@charlie, @DingDong - is NSA capable of retrieving the keys of iphones?! want to know this to tell to a friend.
The average user is much more careless than that so there are a zillion ways for governments to extract data out of a person if they want. All those apps and games people download and authorize to have unlimited quasi-admin level access can easily have backdoors which send your information to governments, it could even have keyloggers and cookie sniffing tools which can allow anyone to steal all your social media accounts.

A regular user fretting over encryption is like plugging holes in the ceiling while the front door is wide open. If you have an electronic device, and if you are a political activist of any kind, always assume that the device is compromised. No downloadable 'security apps' can help secure that. It requires behavioral change and discipline like using PGP keys for secure communications.
 

Yodha

India is my Identity
Professional
Joined
Aug 30, 2013
Messages
731
Likes
1,688
Country flag
The average user is much more careless than that so there are a zillion ways for governments to extract data out of a person if they want. All those apps and games people download and authorize to have unlimited quasi-admin level access can easily have backdoors which send your information to governments, it could even have keyloggers and cookie sniffing tools which can allow anyone to steal all your social media accounts.

A regular user fretting over encryption is like plugging holes in the ceiling while the front door is wide open. If you have an electronic device, and if you are a political activist of any kind, always assume that the device is compromised. No downloadable 'security apps' can help secure that. It requires behavioral change and discipline like using PGP keys for secure communications.
Behavioural change is one of the reasons that intelligence agencies check about an Individual. A normal guy suddenly searching for a VPN and having one to hide his online activity obviously welcomes the suspicion from Intel agencies. Normal people don't even know that every activist is mapped. Every politician is under surveillance.

Sent from my XT1022 using Tapatalk
 

Navnit Kundu

Pika Hu Akbarrr!!
Senior Member
Joined
Mar 22, 2016
Messages
1,395
Likes
3,098
Behavioural change is one of the reasons that intelligence agencies check about an Individual. A normal guy suddenly searching for a VPN and having one to hide his online activity obviously welcomes the suspicion from Intel agencies. Normal people don't even know that every activist is mapped. Every politician is under surveillance.

Sent from my XT1022 using Tapatalk
That is why I have always preferred democratic porn, no communist or jihadi porn for me. Tauba tauba.

PS : Did you know that it is actually illegal in India to use the kind of encryption we are talking about? (neither I2P, nor PGP is registered in India)

It is legally not permitted to use 256-bit encryption in India.

The DeitY has posted a draft National Encryption Policy on its website

The draft guidelines read "All citizens (C), including personnel of Government/ Business (G/B) performing non-official/ personal functions, are required to store the plaintexts of the corresponding encrypted information for 90 days from the date of transaction and provide the verifiable Plain Text to Law and Enforcement Agencies as and when required as per the provision of the laws of the country."

The language of the new draft policy is quite clear on one thing - businesses and consumers may use encryption for storage and communication, but the encryption algorithms and key sizes will be prescribed by the Indian government. What's more, vendors of encryption products would have to register in India (with the exception of mass use products, such as SSL), and citizens are allowed to use only the products registered in India.
 
Last edited:

Latest Replies

Global Defence

New threads

Articles

Top