Truth is a force of nature
- May 7, 2004
10101010-Caution! For the privacy nuts only!-10101010 :lol:
I recommend this as it is exactly what I do now in certain circumstances.
I actually think it would make sense to use encryption in a limited way! If one was really paranoid of the NSA grabbing information from them or someone else taking a peek at their privacy, encryption actually isn't the answer!
Why you ask? Well the NSA funnels in a lot of data and their fundamental technique is to gather data in flagged particular events, it seems. So in layman's terms, flag the names Al Jafar, a particular network IP address, or if there is any form of encryption used.
IMO~ My answer would be to use a simple Caesar cypher in your E-mail to write particular concerns relevant to your privacy. IE: Paragraph here a paragraph there.(1) Its very crude and easy to crack.(2) but it shows no signs of any digital manipulation that took place.(3) Thus bypassing a possibility of being flagged. Also, if you fear the network admin. or some other monkey has been, or is reading your E-mails, they probably are. Because you don't have control where the data goes after you press [send] and through what servers. Also, for all you know your traffic is or has been intercepted by the kid next door. Of course an asymmetrical encryption technique could be deployed but wait, there may be a man in the middle!
Well, I just now gave the NSA a bigger headache as they would now have to add such a tactic to their huge sht list of flaggings. As I don't think their looking for Caesar cypherings across the Intent or other mediums.:twisted:
I think this really puts the whole NSA hoopla into perspective. They have a lot of traffic to analyze and there is no way that you are probably their target. IE: They have bigger fish to catch.
(1)- I have a program to do this.
(2)- One time pad.
(3)- There are other ways of hiding messages. This is writing a message and hiding it amongst a picture.(1) However, MIT has did an experiment to find those with particular probabilitys across the Internet. Who's to say NSA doesn't have this technique?