Search results

  1. C

    Has the CIA already stolen India's Aadhaar database?

    First of all in an brute force attack you will never get a key, in brute force attack you only get packets and every packet for an attacker will be like using a new key. Hence I told you it will takes hours just to decrypt one packets just for des. key is never transferred from one system to...
  2. C

    Has the CIA already stolen India's Aadhaar database?

    "DES key in 22 hours and 15 minutes (see chronology). There are also some analytical results which demonstrate theoretical weaknesses in the cipher, although they are infeasible to mount in practice." Lets me give you an example with today computing power you crack one packet in lets says 2...
  3. C

    Has the CIA already stolen India's Aadhaar database?

    I never heard of GPG encryption, so don't have a clue. I only know about AES and DES encryption which I use. But I can say even DES encryption is not hackable with the current computing capabilities Do a search if you have time to see what encryption new comms are coming in our army.
  4. C

    Has the CIA already stolen India's Aadhaar database?

    Don't belive everything you read on internet there is no hardware that can break DES encryption, forget about AES. We just sold Brazilian army a system with DES encryption do you think they will buy it if they though it's hackable ? I worked for a company which works really close with NSA on...
  5. C

    Has the CIA already stolen India's Aadhaar database?

    He was a less then average system admin who stole the data. this is the perfect examples of biting more then he could chew. Most of the data he stole i assume he could even understand what he stole. Some of the data is available online check what he stole. Russian evaluated and knew he was...
  6. C

    Has the CIA already stolen India's Aadhaar database?

    That's a clear case of leak of credentials and anyway company are allowed to authenticate info of an indvidaual, all he did is build a app that's access that data with the sold out credentials. I can call that stealing not hacking. Nor CIA or NIA (which is much ahead of CIA in case of resources...
Top