We get 2 a week usually with the IMPD Surveillance one at the same time. And yes it's when they are doing sweeps etc.
i prefer a little bit of security through obscurity. Home WiFi is “Home”, phone is “phone”, tablet is “tablet”, etc. It makes it harder for targeted attacks.
I take a similar approach, except I use the names of very obscure 3rd or 4th magnitude stars. If someone sees a wifi node named sadalachbia or shiliak , they'll have no idea what it is. And no, neither of those are in use by me.
It would seem that FBI would know that keys need to be regularly changed and IDs randomized.
He gots speakers I'm gonna turn on my homies with cb doin a zillion watts driving round mumbling and spitting crap on 11 etc... If they are in close range you only hear them on all speakers. Period. Lol.
This is just another attempt at notoriety. If you think for one minute that others (not just Russians) aren't trying to 'hack' any/all types of communications you are being sort of naive, of course 'they' are. That 'they' also includes countries that are friends, you know? It's very, very common and we do it too. So, what's so sensational about it?
This is just another attempt at notoriety. If you think for one minute that others (not just Russians) aren't trying to 'hack' any/all types of communications you are being sort of naive, of course 'they' are. That 'they' also includes countries that are friends, you know? It's very, very common and we do it too. So, what's so sensational about it?
Next we will learn AES256 has been hacked using borrowed bit coin mining gear.
My bets here are the Russians probably were tracking the encrypted simplex communications of the FBI's counterintelligence teams. I believe even in 2012 those would have been simplex P25 encrypted with AES-256.
If the Russians simply sent out a subject they suspected of being watched by the counter intelligence teams and then had their own teams monitor for encrypted P25 simplex comms within the general vicinity of the subject, they would know that the subject was indeed being watched.
Even though it's almost certain that the Russians were not able to actually decrypt AES-256 P25 transmissions, there are a number of key meta-data variables in the FBI's simplex P25 communications that would be available. The Unit ID of the portable radio, and the current KeyID of the AES-256 encryption. Presumably, the counter-intel teams had their own personnel assigned radios which have unique P25 unit IDs, and most likely had their own team unique AES encryption keys loaded into the radios.
If you couple the ability to monitor each of those metadata variables with knowing that simplex communications are short range (local to just you) and even employ some rudimentary DF (direction finding) capabilities into the equation, and it would be very simple for the Russians to determine which of their assets were being tracked by the FBIs counter-intel teams, and even possibly which individual agents were part of the tracking and close to the target (by cross-referencing P25 unit IDs)
It is surprising the FBI let it slip that they were caught with their pants down. Maybe they are trying to get those AES256 upgrades financed. Next we will learn AES256 has been hacked using borrowed bit coin mining gear.
Not going to happen!
Forget AES-256. Consider AES-128.
If some machine existed that could test 2^80 possible key variables a second (that's 1,208,925,819,614,629,174,706,176 keys a second) which is very unlikely to exist anywhere, it would take that machine about 100,000 years to test just 1% of the key space.
For AES-256 multiply 100,000 years by 2^128 to test 1% of the key space.
Enigma used incredibly weak encryption. AES is a peer reviewed algorithm and for the last 21 years, expert cryptographers haven't managed to put a dent in it.The vulnerability will likely be found in the algorithm , or implementation, not the key length.
Enigma M4 had a key length of 87/88 bits and was cracked in WW2 using mechanical stepper relays.