* Posts by FooCrypt

39 publicly visible posts • joined 5 Sep 2017

Blessed are the cryptographers, labelling them criminal enablers is just foolish

FooCrypt

Re: Peer review

Or you could go down the publication / review of your cipher, via https://iacr.org/

But if you are in Australia, you still need DEC / ASD assessment / approval.

FooCrypt

Re: Peer review

Send me an invite on LinkedIn so we can chat.

If your within the Australian Boarders, you need Defence Export Control & Australian Signals Directorate assessment / permit approval.

--

Mark A. Lane

Founder, Cryptologist, Software / UNIX Engineer @ FooCrypt, A Tale of Cynical Cyclical Encryption

Australia's only, Quantum+ Proof / Secure Cryptography and Steganography Software Solution

( Which also has obtained 3 legal Defence Export Control assessments / permits by the Australian Department of Defence, Defence Export Controls & Australian Signals Directorate )

FooCrypt

Executive Order for Improving the Nation's Cybersecurity posture, oops thats the USA, not Oz

Meanwhile in the USA....I would like to sell them a government load of FooCrypt, to satisfy their 6 months deadline ;)

https://www.linkedin.com/pulse/what-quantum-mitigation-mark-a-lane

United States: The White House: Executive Order on Improving the Nation’s Cybersecurity

https://lnkd.in/e_bnsQH published yesterday May 12, 2021

This is a large document (8,000 words) and I note that the word "Encryption" appears 7 times, in §3(d) and §4(e) and §8(b), quoting portions of each below.

§3(d)

Within 180 days of the date of this order, agencies shall adopt multi-factor authentication and encryption for data at rest and in transit, to the maximum extent consistent with Federal records laws and other applicable laws.

§4(e)

Within 90 days of publication of the preliminary guidelines pursuant to subsection (c) of this section, the Secretary of Commerce acting through the Director of NIST, in consultation with the heads of such agencies as the Director of NIST deems appropriate, shall issue guidance identifying practices that enhance the security of the software supply chain.

§8(b)

Logs shall be protected by cryptographic methods to ensure integrity once collected and periodically verified against the hashes throughout their retention.

FooCrypt

The world is already behind the 8 ball with Post-Quantum-Cryptography sneaking up on us all, and Australia is last in the queue due to the current government policies on encryption based technologies.

The European Union Agency For CyberSecurity has recently released a study 'Post-Quantum Cryptography: Current state and quantum mitigation' [ https://www.enisa.europa.eu... ] which states under 'Quantum Mitigation' :

"If you encrypt data that needs to be kept confidential for more than 10 years and an attacker could gain access to the ciphertext you need to take action now to protect your data. Otherwise, security will be compromised as soon as the attacker also gets access to a large quantum computer. "

And also mentions that the 5 most likely Quantum Algorithms are around 2 -3 years off being finalised as a final NIST recommended cipher to tackle Quantum+ Proofing via single algorithm ( Cipher ).

Given that according to The ENISA if an adversary collects your encrypted data today, they will be able to notationally decrypt it at around 10 years from now, but in reality it would be within the 5 - 10 years time frame, surely the Australian Government should be assisting the Australian Public / Private sectors and protecting Government Data, by highlighting the serious problems around stolen data and trying to assist the Australian Public / Private sectors with a proven 'Quantum Mitigation' solution, rather than continually running scare campaigns and hammering the Cryptography and Steganography Sectors in Australia, by associating their solutions as just a tool that is used by non law abiding citizens / entities.

--

Mark A. Lane

Founder, Cryptologist, Software / UNIX Engineer @ FooCrypt, A Tale of Cynical Cyclical Encryption

Australia's only, Quantum+ Proof / Secure Cryptography and Steganography Software Solution

( which also has obtained 3 legal Defence Export Control assessments / permits by the Australian Department of Defence, Defence Export Controls & Australian Signals Directorate )

FooCrypt

Re: The pen is mightier than the sword.

https://twitter.com/mpesce/status/1392582855222468608

FooCrypt

The pen is mightier than the sword.

FooCryptMsg_1_157_U2FsdGVkX1+36rzplewIdLHPPmIbdq6xT8COe71BS8HTHI940T895ATLPsgHcGBJ

FooCryptMsg_2_157_0ViJoM3YkcsplR2ON1BziyjjhJHlcnpX3zdWSgrYGp4R9KJ4Yk2ngH0h1hsxEcRu

<-- cut due to character limit --->

FooCryptMsg_153_157_sDUpsz5hVdzkGXql1iEE2YiLj1oHGS8o5ACqVjzpGvrdaUTg1KpxAxY/V35rFdax

FooCryptMsg_154_157_QwykDhJj51qrM1vzDtStTXjNV4j7nUMpm9izqGCiflTtng1lD/X6z73vH3WZz8Fd

FooCryptMsg_155_157_TP/hzLKZQp7KhAVla/pQisFEI6CZt+lj3feQlRL9vzDIMcIZ3WNiuEdMH9D+KYDT

FooCryptMsg_156_157_5uIn5gwMtCh0Hcf9fx3//g==

FooCryptMsg_157_157_1691C6A45A05C402B81BFC1844E39E08DE3B313D838D181BA94BC6F1F18CFCE9

Atlassian scrambles to fix zero-day security hole accidentally disclosed on Twitter

FooCrypt

TOLA ?

12 months and counting the damage to Aus Tech Exports...!

Wow, what a lovely early Christmas present for Australians: A crypto-busting super-snoop law passes just in time

FooCrypt

re : What's next. ???

anyone found with items that can be used to separate H2O into separate atoms

@ https://en.wikipedia.org/wiki/Water

"Water is a transparent, tasteless, odorless, and nearly colorless chemical substance, which is the main constituent of Earth's streams, lakes, and oceans, and the fluids of most living organisms. It is vital for all known forms of life, even though it provides no calories or organic nutrients. Its chemical formula is H2O, meaning that each of its molecules contains one oxygen and two hydrogen atoms connected by covalent bonds. Water is the name of the liquid state of H2O at standard ambient temperature and pressure. It forms precipitation in the form of rain and aerosols in the form of fog. Clouds are formed from suspended droplets of water and ice, its solid state. When finely divided, crystalline ice may precipitate in the form of snow. The gaseous state of water is steam or water vapor. Water moves continually through the water cycle of evaporation, transpiration (evapotranspiration), condensation, precipitation, and runoff, usually reaching the sea. "

Hydrogen and Oxygen atoms, extracted via your common kitchen kettle, can be collected, stored and utilized as combustion sources in any explosive device...just add the spark from the brains of the combined LNP government combined intelligence to ignite it !!!

https://www.instructables.com/id/Separate-Hydrogen-and-Oxygen-from-Water-Through-El/

FooCrypt

Re: Atlassian

If they get asked to assist or ordered to put in a back door, its up to their corporate ethics. Either they comply or fight it.

As a user, the only thing you can do to mitigate an issue, is freeze your development environment, or move it onto some virtualization infrastructure that is protected.

FooCrypt has several distribution models, one being an ISO, which is impossible to backdoor..!

The common flaws in ALL encryption technologies to date are :

1. Typing on a KeyBoard to enter the password

2. Clicking on the Mouse / Pointer device that controls the location of the cursor

3. Some person or device looking / recording your screen as you type the password

4. The human developing a password that is easily guess, or can be brute forced due to its length

5. Sharing the password with a third party to decrypt the data

6. Storing the encrypted data in a secure location so no unauthorised access can be made to either the key(s) to decrypt the data or the encrypted data itself

7. The Right Wing Policies of the Liberal Party of Australia, being forced into law so they can all make it to the xmas party…!

FooCrypt, A Tale Of Cynical Cyclical Encryption, takes away the above ‘BAD GUYS’ by providing you with software engineered to alleviate all the above.

FooCrypt

Re: @FooCrypt -- !@#$Fsg34=#5^GSHJ+ASdgAE$_wfaewgefH

@Someone Else

It was a highly sensitive message containing various amounts of the ASCII table ( 32 - 126 ) arranged in an order that constructs a message.

Whats M$ C++ ??

FooCrypt

Re: Trust us...

If you haven't heard, VicPol were one of the agencies who pushed hard for the encryption bill to be passed. Am sure the Australian citizens residing or travelling to Victoria, are going to 'TRUST' their ethics and not abuse the new powers ! <- NOT

https://www.abc.net.au/news/2018-12-06/graham-ashton-on-lawyer-x-informer-3838/10588236

FooCrypt

Re: I promised I'd keep doing this...

I found it easier to provide a quote from one of Rodney Rude's live performances in my first submission to the PJCIS. https://pjcis.foocrypt.net/ but unfortunately, they decided only to accept it as correspondence, and not publish it.

Just re arrange the first three characters of the 9425 in my message above..;)

FooCrypt

Re: I promised I'd keep doing this...

Your PGP message has 1 layer of asynchronous encryption, my message above has 50 layers of symmetric encryption, with each layer having a password length of 512 random characters.

Which one do you think they will brute force first ?

FooCrypt

Re: Thank you very much, government ..

Im looking at immigration opportunities to bypass what has been an on going 5 year struggle against the Liberal Parties stance on encryption. If you know any, message me via www.foocrypt.net.

I was nuked 2.7 years ago, the Australian Signals Directorate placed a caveat in my Defence Export Controls permit, wanting to know if my software or variations are used in Weapon of Mass Destruction programs.

Be Protected, Get ….…..

The FooKey METHOD :

http://foocrypt.net/the-fookey-method

The common flaws in ALL encryption technologies to date are :

1. Typing on a KeyBoard to enter the password

2. Clicking on the Mouse / Pointer device that controls the location of the cursor

3. Some person or device looking / recording your screen as you type the password

4. The human developing a password that is easily guess, or can be brute forced due to its length

5. Sharing the password with a third party to decrypt the data

6. Storing the encrypted data in a secure location so no unauthorised access can be made to either the key(s) to decrypt the data or the encrypted data itself

7. The Right Wing Policies of the Liberal Party of Australia, being forced into law

FooCrypt, A Tale Of Cynical Cyclical Encryption, takes away the ‘BAD GUYS’ by providing you with software engineered to alleviate all the above.

FooCrypt

Re: !@#$Fsg34=#5^GSHJ+ASdgAE$_wfaewgefH

You know they wont look unless they match a string that proves the text is encrypted in some way...;)

Salted__<8a>ÜRb^AU©<94>PÅÇ^K)¬º<83>6f^BûÁ;Ê}§<93>z´^HùPq&8l_È<87>²^OG~Þ[<8a>å<8d>ã²X^@U<82><9d>^_

....

<83><86>X^LÙÏØÀä^N4^D£ÙC<8a>^V( 7óÓ<8f>¸78*½ønô^\ÂmÍó5<87>S<9c>C°Ùo¾

FooCrypt

I think they have been reading the congress notes from the mid 90's key escrow laws, not to mention munitions

FooCrypt

Re: !@#$Fsg34=#5^GSHJ+ASdgAE$_wfaewgefH

U2FsdGVkX1+K3FJiAVWplFDFxwsprLqDNmYC+8E7yn2nk3q0CPlQcSY4bF/Ih7IP

R37eW4rljeOyWABVgp0fCj/+uvajD5NyTgx4ZXgJqXEe+O48nrP8uU80HP7Inr5z

OmrfV0V/hIkRtoBIYgin5j/hwagaoo1sJRSDbzcmAY1+x7NCs+CrJvv1C/OXuUSa

rXDlz2QhSXaeOULVB7Dhtwih3ktb0lfbJro/1GdH28jSHdzcyFrJpDUO1FBm0LHf

G0rKG3Lk4o5QbVhKdQ5NfVSvvw+k+CV5VEYn0IoExoRUZvVEtnW7iwHwaNSV2HTb

jhrPw2V+sJp80Vo3dqZbCmSKKeB30pC107GNm7okO7soWJQ8MVF/O6rSQSBm0+aV

bdEELyvL6g9eBzLiHB3aHnaZ6kSpz16XB4654X/bc4po3uAJdLjsHuR7BgZ40Rxt

mT+HdgewHQLrrkzXXXGqMmffj1GQ5Y7ogWGtGrz0ObBo3M5pKAL/Mew5+I7yMc8/

jflwXqtGRgNC2tYntK+2I3t/Eg4VbLu0nnB85qOgkSO5hwsp135VlE+eASuJJmAa

hqih5L+LbKGbCwfAYEaZ+/g1K4V9MMmG1TWkyN0qVWKSg9bqLmHf8wh2fTBZynIx

8NPKsAdHfImxuWk61pz8zJbVQ1N8Onl9110ykM70pVktU/w9prNmeL3IwvcR1i82

gDDd1I9nvZAm2w1nIWxPtbbEXzuw/ZUAOh9o3BIp3CVaigNl6DHSjj2Ow73EZImH

uPawLmGvTE57a2jlUOt3RZp26FTDfEhS0rrtLrJnWEv6fC4TgRecOS3s8Uo2pZba

BR7T42wZC6yY14hGq8TQpLTT89AWvlSglJEAQ5V4CafmYaWH91kZ9hhWuFckaB5z

YG0aYiIZYpqroJZS0WpoOszz03mZ56IUYOGQPt6cY9MtZKLjFKDzLCdPhdDoNy+G

QOGgH7AkcdY0nEhrWxP0R2rIN4D7PskE3b6em32ec7Wc8FLNpYNtOfSZ8bmp+h3n

/VmKCGCtwXmNOXiv6UADJGIDCBNJK1SIVeCGNbfF7Q3esWw/GhaX3mwG6RDbodjr

g6cMaiu9smyBfJYIbj5O/fc0dovgLbrPo7EiQULLSvkVs8kuSemV7P2woWqMkRYN

lkbiTmgBP9N/4wksbkkG2Beuj7qu2TfXrfKFrcucitIjN18HHAYgxWjEw+qIEdGS

ngHq/8O3o3yzfbaUOLHsQOpnHDd9g93j5lbcOCDBX1j7vwW1QpTiUkD43RghrBFG

7k/5e3zEjaWxJLlPOefD08AjV/y/f+fjyTq26whzB+L/AuB+wTTtkTw30Axr1k5g

a0wfLno76opnSg6I8jT1pPDSpqMFfC1ksp0mwn3vNic5hbTw+w9ucSlzAM883q2L

l50m/a3lsvIltVXBCxasg/gN+uFXc8IzNy7xQdAPlI0Ru/nE8+4RMRNuO8qYKNLo

8sA3/vgvLIkuDRo+1mJrJ2spCLGXz7GEYrHz9Ao85noek7SjJopUElExHAsW48p9

Wti6cYcp+g/ZVrZAlUtIwXTSS7lMSPMMH8hUIO8JmED6zPHM5sc7RQ414+arUfIh

AxPa/kFJdmf7rtdT3ne8xmFbQVPT/TrKHRQC7vPNPvBo7lzd6oFAIXHMjjdfcVZP

Ugd0K6cYoNUCpCtDash54EhnviJi9swdDOPKZtBOcrRjgSwg6xxgESAOe0QLeg4X

X6wkXwoautqFS4PB3nTpTZf8WfPgG3E26j+2G0qxaLNHkqLNoIfUojN3XJoQmcoM

d58B+hs6Q75Fz3t9ih9t3/TsrxFkOHL2OqRQeBjTrtsnjqb0O01mqXJXVWSXHLzM

6Um3Qwr9ESFukCH2nhmCLtJA1n1wczuaF+O4hAU4SLo4ax00b8ZBE0BtVxvmauZd

oQvDpKfoyIclWsxJc4ZcSjs59ngjYs6I7Y+Q+ChN/yK6u49FvNxDGQvYCAIjHs9N

PHZ1BKVh3T04Vb4hnUwmVuoOjPUwR61rvFUC2CbgpikqqudF/vRINsEyEHkLMtRh

Fyr8RrozzW52YHLMNnMlWHW5LG1ym2Jpq1/Kc7aOs2C1UKV8q5Q2i3tHNwsUGOYw

bRLEi8XpCEKRPRmxmE1MVxtDQUlQHOFGKxXqtK8heczxrmFkq/WtKZ7p3n3b6JhF

md4s2B66t5VlCTYWhYBpY1lE7GCnIzF2K6nKu3uMeAc+A6CxTIjSkee955UMKpgI

/WJYz4qZRV9iz2IyyE+Lt4R4qmphsPXBJbr9ati3hiJuEhgoAQFrJ+zltkgh68GX

V7kyS2b/21w9jdt+zjY42DdomD5FIxyEhGtq+A2q2wI8cXGGawBWJ5LC8fYRhRF7

8Wf67FcVtGeZ/0M/ayrfTEbnNQJ5s6yju2vgBEMgpSEOW2iNzZia5nQXITz91DfS

/RN33cn30zR/QOe76I1m955obCrHcHKu7ctRkwuyyyG7T6if34TrdTOhu1v278yw

gMdB2TyJykgsv8mcM4hF14gNDCUYq4ytu5kPUTnP1b3AOizx/Y5jOMinBrDl7i+c

wkBQbbHy/GdVWkMI12L5JzUf1VsqGHmsKdR4hpkDGzW8K+GdNZxaOp45+ZG2Yl4U

b4CO2BlPh6s5QSqjvmS2lWdUFGxbzbU8ys+9Mht3J3jInYNjX2PDE7ub54F26J3O

Wy/C2cqtwwtK8s6HAH758xhvPMGJaMzfR61uivNTSSJUpYTyj11YVFwQHD2Vm8ID

AY0OERem2/BM2u/cPnb0gjxv6f/26T+YM6NXOPmb1cYlg2wfcJrSIpOr9wt9gSMu

9Iw1ecjPLotxa2VSVNABSbRxL60c98q9AcB016gSa7OgxWs5vSR5b/y2iKv09YnO

FjeReHGSBGwwDxZx0brAW37pqDpzcPuNSG5Nqb2/9u8bl4qG+1taBqGBzwe1Xop6

au4pwgKte4JBR7ACPGKxy+tnWyzj8rrf+gZiYUbhEvLXdkJ/wJ4/Bo6WMqYhaqP0

3ag43p4umhDmeBwTD7vkMIJMIcaGEtvgsnSjkwupwFh4GbkXVohdUAJEvC+hUxHO

47uzRAcbWHL6Lgu6b/U312l8BMFsf+akMMm5SCSijmlGIopM2RGl8ZENKSLe8foT

fpRpNZ72g7ysHbmldkMXlv8vnA7J+efjG7TnomQS/anFz3vQEsd/5K0SFF0A4Bsj

pw10LUMT2z44ICfdq4fKArvAOBOpPqkDtS5w68b9kRIjwb5BghC5iQrddMN5r3cD

LUSVLGTbnFkBSOJWf/uOOlNK8hTXVjtvVcGqvt8YtAYN0FUJU73iJLNtHZeZca09

hIwgmtFgIYbs5S0wu4VzbUCrj0YdhODco8NhszvL9Tisc9bBsN+qBN9jcWic5h/z

5KhdWuhQe7BJiDdea+UyH8xYSUFZoj4WLDAKAXhTWHpQfdPT+yVbAlA4fgjYpnjV

1y1uAeVtabHAtDuKPa5QJsSRuA1T+V46WUUVUIag6BFDP2EMSBw22UrzdpaorSUr

yTz0FLHytejbx1MsuaeGysGpKuO0tXU2KDClpWc1EyO5a5/u5Dw1NDk3JBjRKO3M

2WhQyvWRO72v7CSkgqT36SzQ/+Yq9JHTdi/URMh1SxPq5uXTgypJQTazU42R6awY

mxWogQEoShjru9uh2iXGvRHc1JzUeey6WgaeX44do7zSRQUTipLtd9O8QhwuCy7p

ErROEWnlnPF8fMlo8RrYAuiwxecmQO1w4prXoY3zkTcBabtdpnHKHNhYo6n7qhPW

0YNAcvk7qT6RRYFkjXxxZtbzNy3ADN9xC0trzfpsW5eWO3ManjzRV84wAK6/mhhQ

IuehIa6RmN+E2B55JxJ1JYVQCqzR7jM4jnGA4LYO7J2PB+QSyxYD9ugQzi38/ypZ

Fcg+piSD87oTt5Jv9MoGiRiyEK5ap6zvkzQcZElCEKEFkwuxJNkyM56C6U2oMeqV

TknZ4tA7RDuvOfZEhesmwuOtAcWlQdY+r+w42Uv1JJHCeKe4cxzAG6ikq7lrr3HU

YXF1LNTAfHixE1SYnzCijC+1k+3v+0s7cCbdcBs4Nnwa27i8JHjbhrYJufVn4iqe

FxVx4Ypn1cG0s/Qh1k/Sb1ZfG39ncOElQaVFcD7xl4XMu+1mzsHyywXBd1s14PHp

iAzMeDPYgajVGI5XtaScILCTp9Y8dA9kTfZz8NY80O9uh0jrPkSWOtqC6F694QWM

O1JrsuSKcVUbFFlAbI56ik2buSSENqd8kN7whWcuoBOCUSCayUWqJUWzhs9wQXgk

770UUS47BveQM73F1y8aLxHoU6ywRd1h3hiQMmh7l5MU3p9rND2jIiE6PtoFmP9L

EHWKa1foioCAP2tsWdCfw763NVtYwlW2yFZb9q7NN0cb9cOd7F6FLkedvuxuNQsr

e56QBlFgT30vK9VmVQJDbPpVX/k9wuRh8/NOwylxr9zzJuU32ciTOixpmSmyjDUU

ftas+5hCClpmNxkydIyg7iHHjJQGPwzDvTk/vrAXQ8ci9yrQWJfhl9Bttas9m1pv

6RnuOaMr5iVeAL3klw6N1zy1JJLPwqp5FabdtPYpYjwxcYtqpRyNuBsK3zVCndOu

r6TwjCCP0zyl4x3P/2/4V46WYRDbKc6H5kO/MIb6TNDjPbWY0fbHvXn/nryiPjlP

feMjdbHI82INPe9spr0YWBihm9+bCUDE9k+N21JJd0WEVDEi5nXbbBrTNKpQ5ntW

XmcrVbTVqvGgfkcj1FIwmaQZsLpOdxhh6qYKKklLTKFULvKDX2LhGixWpto0nCeI

X9sxcTqmSB6g29IVJ+hQanzTzT3ILXxedlDZgJBVkU7KYaruaskxRDfyjRNN6t7n

iUw5i1Pq/XpB9YXz2Bv6dE0+t29L6NJxLmgGxW75pmcz1AUgcX7USY8ELm+it4db

vnj7+EnWFJ7CsrVLuuR5fRTAt+l4ltXM5FVqtJQrcBw6Eh+JoKfU6xvBGUkQLoNk

nNiIknwkcZioMWLlLxyAtv/PsUzu8eSqZ0u/pNXhCsYbCjabX71zr1P+HypPhWpc

2c2ZKCrbGPDCW08Ilmiw1LiOkDMWS/i0UdDy+uF0wzp119UbpXmNRkfOVMmfhOZz

7BDuu5mH8jeFkxqYctkWguu1TL1a2PlqjJnzX4l2e6+gtuisA0PVMltppfDZ1tB4

tTDHxw9AM8ykehUpfsUsda7P64ZdQQTlcMWbc0aHUmn+jJMzFqH2V+rlQgWAe1SY

muTXr/JmoXIpeeA52nnvYyLgT4a1lMHjahFeC1Yl/IOO+BdxOBWsPwhn4zrpHIgw

t/Or6z4TVN5EGDrbZznQcu0v8Iy/w7Nc5CYOHSY5ZcSmDqj7so5sZtAL8+uqk13p

SHaK/LhfSbkqYPYHeyHHkeQWXug8Y+0D2ajxch+ZSrz9JoncpIaDrM6mYKLKy32s

PJ80fPCkiHwz/TGTt0fSjiyc5DvCoDBqip5LLV3P9COXJjsmDXS+O0tWTBM8RLkA

qWGG28kb6oKkLZF8qsuwxZpEqYqBvnUcnyEdHS9H1r6DhVYWehO0nV1EEcsL/8b7

xk+uIaoDDXYI24GqUDqKNpmJ9rPo88wy7UD7Dk3yl1TAuYby/T6Mv0iRCGF/9Tmp

aAFsY5NKYH08lO5ClmrvJJhaitdjB79fzzy3HAH0FhhHwdx229sLPyuOzOqfIQwP

vYn+sLvU6TAt6dP+d4qPqSCMI6IhmQUgGHfRBZT2iVk3/yUCGZ7bUntEVYGUZdbd

NVrJvbWSy7h7wNwVgKXJWLKD+2fYXtyz+nSFhkAwT//9aPXvh7KrhQdIJh25ffAt

r+Vl0B2qSmhWVWe39dvA1prWsQIVuq1B1Vg0k6CHDd/UqMlixIZroyv30WN40MT+

5nEO08938l52JGWqtH64Kg9Rx58/VT24dsKewKncwhTl/SjS+lOOFi+Snv1WHH+M

n5gdTuoXpLr9PWqwqqoNWsZEPxH3UyLLgpNBZjKxperzbaoBNTKizipO4SXsJuzt

gwvIM9/FNBTGAzZmRFtozXeEAUEx+D8tyo1tivPwxtuLkG/SJCAKbIBEYjF1mehw

qz83nWvvJYSCXO6FHgx4cagbMNFi97+s/cFu7Er270HfJVGj38Z962oLXXxL4800

CNN87AUPWtJabtj2MuHVrzt3uySWpB3yUUO6kcBPu4fhDhYHnNZ8eU8djSpD2pBa

AAZZHWHsAUjs3ZBhvZobu0fOzRuLXqLykO5Q1+dlcgiB+xbRKq9r1ANLrmJe4ioX

GcZR/31/CsvyxMCWssxbx9ptDkUPTGUEHDnsYioS/4YwXonWH80ba8dktySBu9Gy

wV0LAD0Sz81d8hul9sgH6fA8yqA83pjurdMfRgeQNYfib44CL5VocLyffyV7DL2a

VnLaAnPLojLtklnvjb7161XgGBADZUSvLpWyLbP7fnlM+Swhdg+dzKyYLyz3DHPQ

C7TWkEllzJHiYgusQ8tPdFa+abWA6qWBafTqNMCZAKpYaGSLUtDOft7NfywFSHLq

VMxzlThNL5XdMXd8M8dqGtMV7coXcJt5yWNhnC7OK1s8a5vQw0GykMFfHI0JS7kN

Frdp+rAUXVwK1QhGL+91kfu69uvy1vT2vLVhqrXBBpNT/zh3rK/Gwqp7D1CGmQAh

EbHI/wnz7+97a24Z13ElUtlZcknXWb6BXHSqWTNgZKMKp8m5RazEG33Ce6z5DaIY

PLiHO7VMXv4IOkmKyObTpQUN+5WOAveIhAq7bro3WWH8xa8EG2pzXuxTqyNC97or

3AEbhegqj0otkE8fNbHKSLjeN3LKpEPLeBbMtRoENJT/SxcW13RFVHOCpN/uT8ug

toLA9vK7silnomiAZgVnpJTIcpVuESdE4FtoP1r3bBmfjszscY+PrOnScx5F5dct

3btZdbGCpmUz++nUxD3QeK+psxd3Qibn+7Cd01Pab2NIb5QZKv3scVv/KlB4eY4/

aUYnn378CShJgDx4bWqrDId3l0mEp3Bt6LgTj+sn61yH25g53xSFMUmgdQiTAHwr

/aezC+J2JqTw/Tx1PgTAUR2iQnbLHz6HNXrF7cVYiELz22PC/dDLUN2wh0088MrA

KxSN9W8p5/y6TH749PFqHx1HsK+FXADw1KExYUFoy4IoxQ4hA3x/rEMtzhSDYPKW

E6wi7jHiAjrmrMy2S1ahTb0ULwt32MFA0hCu2f3gQsXEoZ8P36HUb0dQ8LshMziO

dvZT61M65O77rdN10VpbeT3l9bnyFe2+oeCzK1lun0ViW4diY/wKSKKkYmtip3pM

NGggxTvDVwxNQbtxbt8JtMKEc0jXrpG2jt4GzkuVufQC0engieE1SGcZNswptsUw

VTFP3ZAI4P00Bwm6qc8q+la3WtBGYR5T+IlYtxQAMuH0gH+MLCWBciLSNqCjh0dd

jUwnWR1gsL3H5IIQtpKwA+owQek994rwEdgcDOCg7PzfhOpltqN7c1ZLC8zqWH73

u3J07R3jFuobG4t0JiavbQLWYZNmtTUexsGCJFxDtzlEIBms3b6Moinl3OHAevhS

1RURKjgDm2N6CWEzrQB4yxOwrogqA1ay3Qj18FBaIljivnjjD1OqZ8Rdd6MOIQ9i

cvzUtKFaSwWqe80TiSLTCt6DHKRqkkGDIP+FP1XQTZguFD7Lt4pPSWdwmUt39pHO

VrIMsDJ2lJry5j++gX4Wfht3dl/P6LcEQ7LsSweR86Fkd+SO04vwlR8/QJ9H13vB

yidX+assdOLmQR7YNRE34pnv1f97WcHCn1i2QDeDiAQJPBMrIWbn1rm9XXeLo15+

/rDESnOUiWYW63j1NMD1LCPK0hhxssWchyTDcB7qqQEuJ9qYE97zOSDUsN8he+bY

okvIWvvx774Ihxz/gd3EqPhxN/tXyX2yT4TekVX8RSYfHY7ChOKiwxsecekUKXEd

ZBtPN0QRPQl8yygbw6xVK57yyjFb2plV1+ESwTngct/NTOrJ4Epil4aGsL+5xE7u

elVhhM3xmYANHSWOr9ieSaLTwMpd4VVD3VGPobi1TmyGy4pxilzq+j86seE7a7Qa

vgnWVY+LeqZ4oJWxaNjgiynq8akTZWw+hxDmUnMDHi/PCNbGbVtTQnlfTbBvk7zk

0WoZNgTt6XmG+IMpSM75NgyQJzP+wQbra+boiUKRCkwavCkMeREkb7WHmp00tFom

rFR7FaTf+cj8DzbomHk1TfVlAEggCog/qCC2m21otgOtGft0Pbf8QhfxT42o2G6F

2F7+6zwBd60KreDwIQJmAqbvDI8lqPScJnoj31wPvMi2zKJiD9O1YFm4f+A96ivz

6cXzdAgh03rWZKyxSjCuUaw59V5wP5BCC5Zm1+73NIRuGlQepTNxj0loGmUz9I7h

Td+laRdELilEPREOmNuIhCyTfDwCwD9S5HfdCaC2kpSTJfytRcQcaZEFDoB/UnzX

Jqp0e11N7Z79rzKIibXhqc/zypPfaQa5PEYNy/VN9mnZbYMswfe+HtvPAr5Ut1Pi

rVEpzOe7Z9vxEwN9/dGxUAFxGoJM8D7NZtqnTWHP/bYqbgX15BbDVOsckttHMGtU

Pd8N4m++4VBZknxO6uqtp3cNQ461W+5WdBC+Dg5N7LdP2s6ahOc4GISMh8D37+Bn

S/JmqvyqNe2kW2mPg5vEqFmKxNdgM5HZJDMr8Wn/KjmacoIhU5W4VJY0gsAuZal4

C49rkmJSXTJ5Py/q9hsK+++ZWJ+VOfyxUt9YwhIDHMDSvy3EXOHOUTH3c0KDgPkk

NVA/Y+Fs7R4Q63DR5eyKuEIhW5rJ74bHsmuFL74AMQjhX2bXVwJQpUDEgUvF2vXm

7NMhSMVkHw+MHDXsNu/7DCr5k3WuFSqunOLCNaI8kz6fwDWGELRVDUFHp1W4jrkI

0N71hUwUKjOil7gC41Vf9MLjt3Qlijde86W5IDEBytrzZsCXiG1lAlCEQdwPOhgO

pZ1jQVm1wAFV3VkC91qGBrfvM7+cNDM52wKjZigqaXAh+NKhg8s3IEpM+445lJNW

bPj3k7PP4DPboIjZpf12PpDr/KvFlwfKlely10AtxRSNUywRqw+s4g5viiueZpsO

2d/CGK+IRzy0J6jocXKhnc6PRt/aMl61CQ86Al9qha4b9FJEEndKxspGF+/+c4qT

U1zUCOH6mPzDQ5iL504cepotdBxAs2Lx0TjTUPulg5mAWMPj8U5DuYwRru4gglrF

jtAKg4ZYDNnP2MDkDjQEo9lDihYoIDfz04+4Nzgqvfhu9BzCbc3zNYdTnEOw2W++

FooCrypt

They are a bunch of children, playing with our security....

The government sets the sitting days for both houses of parliament. There was no reason what so ever to explain why the government could not have extended the parliament sitting hours yesterday, or added more days this year to resolve all the flaws in the legislation instead of packing their bags and going home, forcing Labour ( who does not have the insights into the actual intelligence reports on the xmas terrorist attacks mentioned by ASIO ) to pass the legislation.

The 3 billion dollar Encryption export sector has just gone to ZERO....!

If you know of immigration opportunities for encryption software companies, let me know.

FooCrypt, prides itself on providing a solution that "takes away the ‘BAD GUYS’", including crappy legislation that destroys human rights and civil liberties. Oz Government included.

Oz opposition folds, agrees to give Australians coal in their stockings this Christmas

FooCrypt

The cryptopocalypse is here

In conjunction with FooCrypt’s Parliamentary Joint Committee on Intelligence and Security, Case Study [ 897316929176464ebc9ad085f31e7284 ] submission on the Telecommunication and Other Legislation Amendment (Assistance and Access) Bill 2018 [ https://pjcis.foocrypt.net ]

FooCrypt,0.0.1,Core has been released with a Demonstration Expiration date of 20190131235959, to enable all encryption users to download / try / buy before the impending legislative changes are brought into effect.

https://store.foocrypt.net/product-category/cryptology/897316929176464ebc9ad085f31e7284

Be Protected, Get ….…..

Warning: Malware, rogue users can spy on some apps' HTTPS crypto – by whipping them with a CAT o' nine TLS

FooCrypt

Re: Veni, vidi, vici ‽ .

@amanfromMars 1

Data61 is listed in the credits on the paper.

Data61 is in partnership with the Department of Defence Science and Technology. ( Australian Signals Directorate, et al are all in that mix ).

Perhaps we should thank them for releasing it last Friday, rather than having it sucked up by AssAccess...!

FooCrypt

Warning: Malware, rogue users can spy on some apps' HTTPS crypto

Its been a long day watching the children in parliament and I haven't read the paper in question, but

'The boffins tested OpenSSL, Amazon s2n, MbedTLS, Apple CoreTLS, Mozilla NSS, WolfSSL, GnuTLS, BearSSL and BoringSSL. And they were able to downgrade all except for the last two, BearSSL and BoringSSL.'

From a web server / app api / portal etc perspective, refusing to downgrade would protect the end user trying to connect.

https://cipherli.st

Apache2 example :

SSLCipherSuite EECDH+AESGCM:EDH+AESGCM:AES256+EECDH:AES256+EDH

SSLProtocol All -SSLv2 -SSLv3 -TLSv1 -TLSv1.1

SSLHonorCipherOrder On

Should throw an error to the end user's browser / app / etc and mitigate any leakage.

Australia's 'snoop minister' wants crypto-busting law probe wound up, proposals back into parliament

FooCrypt

Re: ASD AISEP Evaluation process still under the liberal hammer for backdoors.....

Six months ago, I put forward a submission to Dr Vivian Thom ( Former Inspector General of Intelligence ) regarding the DSGL fit for purpose review. As part of that response, several case studies were provided, including some on the ASD AISE(F|P) process highlighting deficiencies and confusion in what ASD where communicating to software developers who work in the encryption space. [ http://www.defence.gov.au/publications/reviews/tradecontrols/Docs/Mark_Lane.pdf ]

In the 6 months following to date, the Australian Cyber Security Centre has taken over the roles regarding the AISE(F|P) and has been since its launch proving the information via its website ( www.acsc.gov.au )

<——>

https://www.acsc.gov.au/infosec/aisep/evaluation.htm

contact.htm goes to a 404 error page.

‘If you would like further clarification or guidance, please (a href="../../contact.htm">contact ASD(/a). ASD will assist recommending government agencies who need clarification on how to answer the questions. ASD will also assist product developers in understanding the evaluation process and requirements.’(sic)

(=< & )=>

<——>

Apart from the humour aspects of the ACSC committing a denial of service attack against Australian Government Departments and Australian based encryption software developers who seek to secure Australian Government departments by providing greater encryption methods via the AESI(F|P) process ( definitely sponsored by the liberal party ),

What User Acceptance Testing, ongoing website validation testing does the ACSC actually do to verify its own websites without the need of users having to log a cyber security incident against the ACSC ????

FooCrypt

ASD AISEP Evaluation process still under the liberal hammer for backdoors.....

Australian Government continues its 5 month long campaign to piss off encryption developers by sending enquires to a 404 error page.

‘If you would like further clarification or guidance, please ( a href="../../contact.htm")contact ASD(/a). ASD will assist recommending government agencies who need clarification on how to answer the questions. ASD will also assist product developers in understanding the evaluation process and requirements.’(sic)

(=< & )=>

Feel free to log a cyber incident regarding the ASD website being hacked by subversive liberal party members trying to influence encryption policies by denying access to government resources.

https://www.acsc.gov.au/infosec/aisep/evaluation.htm

FooCrypt

Re: Encryption - Point-to-Point - Clearly Australians Don't Understand!

There banning and burning books for Xmas... https://pjcis.foocrypt.net/ Feel free to add an addendum.

The motives and justifications behind AssAccess are over stated, and politicised for all the wrong reasons.

There are plenty of end point tools available to capture key strokes on any point to point encryption method, along with several Man In The Middle attacks which can be used to circumvent the point to point tunnel.

Implementing an 'Insecurity by Design' policy will kill the local IT industry and expose Government, Business and Public to zero days leaked from the so called AssAccess assistance requests.

The FooKey METHOD :

http://foocrypt.net/the-fookey-method

The common flaws in ALL encryption technologies to date are :

1. Typing on a KeyBoard to enter the password

2. Clicking on the Mouse / Pointer device that controls the location of the cursor

3. Some person or device looking / recording your screen as you type the password

4. The human developing a password that is easily guess, or can be brute forced due to its length

5. Sharing the password with a third party to decrypt the data

6. Storing the encrypted data in a secure location so no unauthorised access can be made to either the key(s) to decrypt the data or the encrypted data itself

Oz intel committee: Crypto-busting is only bad if you're a commie, and we're not by the way

FooCrypt

897316929176464ebc9ad085f31e7284

In conjunction with FooCrypt’s Parliamentary Joint Committee on Intelligence and Security, Case Study [ 897316929176464ebc9ad085f31e7284 ] submission on the Telecommunication and Other Legislation Amendment (Assistance and Access) Bill 2018 [ https://pjcis.foocrypt.net ]

FooCrypt,0.0.1,Core has been released with a Demonstration Expiration date of 20190131235959, to enable all encryption users to download / try / buy before the impending legislative changes are brought into effect.

https://store.foocrypt.net/product-category/cryptology/897316929176464ebc9ad085f31e7284

Be Protected, Get ….…..

The FooKey METHOD :

http://foocrypt.net/the-fookey-method

The common flaws in ALL encryption technologies to date are :

1. Typing on a KeyBoard to enter the password

2. Clicking on the Mouse / Pointer device that controls the location of the cursor

3. Some person or device looking / recording your screen as you type the password

4. The human developing a password that is easily guess, or can be brute forced due to its length

5. Sharing the password with a third party to decrypt the data

6. Storing the encrypted data in a secure location so no unauthorised access can be made to either the key(s) to decrypt the data or the encrypted data itself

FooCrypt, A Tale Of Cynical Cyclical Encryption, takes away the ‘BAD GUYS’ by providing you with software engineered to alleviate all the above.

MIT to Oz: Crypto-busting laws risk banning security tests

FooCrypt

897316929176464ebc9ad085f31e7284

In conjunction with FooCrypt’s Parliamentary Joint Committee on Intelligence and Security, Case Study [ 897316929176464ebc9ad085f31e7284 ] submission on the Telecommunication and Other Legislation Amendment (Assistance and Access) Bill 2018 [ https://pjcis.foocrypt.net ]

FooCrypt,0.0.1,Core has been released with a Demonstration Expiration date of 20190131235959, to enable all encryption users to download / try / buy before the impending legislative changes are brought into effect.

https://store.foocrypt.net/product-category/cryptology/897316929176464ebc9ad085f31e7284

Be Protected, Get ….…..

The FooKey METHOD :

http://foocrypt.net/the-fookey-method

The common flaws in ALL encryption technologies to date are :

1. Typing on a KeyBoard to enter the password

2. Clicking on the Mouse / Pointer device that controls the location of the cursor

3. Some person or device looking / recording your screen as you type the password

4. The human developing a password that is easily guess, or can be brute forced due to its length

5. Sharing the password with a third party to decrypt the data

6. Storing the encrypted data in a secure location so no unauthorised access can be made to either the key(s) to decrypt the data or the encrypted data itself

FooCrypt, A Tale Of Cynical Cyclical Encryption, takes away the ‘BAD GUYS’ by providing you with software engineered to alleviate all the above.

FBI boss: We went to the Moon, so why can't we have crypto backdoors? – and more this week

FooCrypt

Re: The correct metaphor

I actually pounded 'End Game' [ C.I.A. Financed & staffed by ex N.S.A. head / other defence personal ] for their interference in my software this year via my submission report for the D.T.C.A. [ headed by the former Inspector General Of Intelligence ] review after it took them over 6 weeks to 'white list' it.

http://www.defence.gov.au/publications/reviews/tradecontrols/Docs/Mark_Lane.pdf

FooCrypt

F.B.I. Riddle Solved....

CSIRO in partnership with NASA are currently seeking via seek a Computer Systems Administrator with experience in Sun, and scripting in TCL/TK, which is the majority of the code base for 'FooCrypt,0.0.1,Core', so I applied, and am currently seeking a response to my query :

'On my reading of the Position Description, there appears to be no reference to security clearance requirements, can you clarify if a security clearance is required and whom conducts the security clearance.

I'm assuming the position requirements is not in any way in correlation with the recent comments by the head of the F.B.I. in requirements for encryption back doors.'(sic)

FooCrypt

F.B.I. riddle solved......

CSIRO in partnership with NASA are currently seeking via seek a Computer Systems Administrator with experience in Sun, and scripting in TCL/TK, which is the majority of the code base for 'FooCrypt,0.0.1,Core', so I applied, and am currently seeking a response to my query :

'On my reading of the Position Description, there appears to be no reference to security clearance requirements, can you clarify if a security clearance is required and whom conducts the security clearance.

I'm assuming the position requirements is not in any way in correlation with the recent comments by the head of the F.B.I. in requirements for encryption back doors.'(sic)

Meet TLBleed: A crypto-key-leaking CPU attack that Intel reckons we shouldn't worry about

FooCrypt

Re: Sparc is better than power8

'The company also sells servers based on Sparc. There's a chance those might also shift to ARM, said Jim McGregor, principal analyst at Tirias Research. Fujitsu already makes ARM-based microcontrollers and networking chips.'

F.U.D. and stock market conjecture by a non associated research analyst turned into a comment by the author of the 'STORY' from 2016.

There is no factual evidence that it was nothing more than tin foil hat conjecture 2 years on since the story was written.

https://blog.global.fujitsu.com/promising-future-sparc-solaris/

Meanwhile, openSSL is apparently immune to the side channel attack as disclosed in the article, IBM's customised encryption algorithms are in doubt.

FooCrypt

Re: Sparc is better than power8

Am pretty sure it does have an ecosystem, I used solaris for over 30 years, and its still being actively developed with a roadmap, future, etc....

I take it your an IBM guy who scoffed at Sun in the sale hoping to slice it up and take it out of the market back in 2010 ?

https://www.top500.org/lists/2018/06/

https://www.top500.org/news/chinas-next-supercomputer-may-spoil-americas-plans-to-retake-top500-crown/

I don't see why your celebrating, the USA hasn't been #1 for years, and will loose it again very very soon.

FooCrypt

Re: And the Hits just keep on coming

Sparc is better than power8, has been for years / decades.....

https://www.youtube.com/watch?v=VWdevUsss5k

https://www.youtube.com/watch?v=7dhRap0LoLg

https://blogs.oracle.com/jhenning/one-sparc-beats-two-power8-on-3-out-4-specrate-metrics

FooCrypt

Re: Write your cryptographic software to...

The FooKey METHOD :

http://foocrypt.net/the-fookey-method

The common flaws in ALL encryption technologies to date are :

1. Typing on a KeyBoard to enter the password

2. Clicking on the Mouse / Pointer device that controls the location of the cursor

3. Some person or device looking / recording your screen as you type the password

4. The human developing a password that is easily guess, or can be brute forced due to its length

5. Sharing the password with a third party to decrypt the data

6. Storing the encrypted data in a secure location so no unauthorised access can be made to either the key(s) to decrypt the data or the encrypted data itself

FooCrypt, A Tale Of Cynical Cyclical Encryption, takes away the ‘BAD GUYS’ by providing you with software engineered to alleviate all the above.

Australia wants tech companies to let cops 'n' snoops see messages without backdoors

FooCrypt

Re: politician talking to skeptic security expert

I hope they applied for a permit as per the DTCA, DSGL listing on encryption technologies ;)

FooCrypt

The common flaws in ALL encryption technologies to date are :

The FooKey METHOD :

http://foocrypt.net/the-fookey-method

The common flaws in ALL encryption technologies to date are :

1. Typing on a KeyBoard to enter the password

2. Clicking on the Mouse / Pointer device that controls the location of the cursor

3. Some person or device looking / recording your screen as you type the password

4. The human developing a password that is easily guess, or can be brute forced due to its length

5. Sharing the password with a third party to decrypt the data

6. Storing the encrypted data in a secure location so no unauthorised access can be made to either the key(s) to decrypt the data or the encrypted data itself

FooCrypt, A Tale Of Cynical Cyclical Encryption, takes away the ‘BAD GUYS’ by providing you with software engineered to alleviate all the above.

1,2,3 are mitigated by the FooKeyBoard, Auto Key Press and a simple combination of colors modifying the Cypher Key Control Text Window. The TopeSecretCypherKeyControlText Preference Setting enables your to have a such a configuration. All the Text is hidden until you click and drag the cursor over a text area revealing only the portion of the text window you choose.

4 is mitigated by the simple configurability of FooCrypt, the accept random data from an unlimited number of sources and following FooCrypt's DEFAULT settings of utilising a length up to the maximum

5 is mitigated by FooCrypt’s ability to intemperate any binary data as a source for creating a FooKey, hence sharing the FooKey, can be obfuscated by an act as simply as sending the third party :

A Photo

A Music file

A Document

A URL to a data source on the Internet / Intranet

The possibilities are endless

Then, all the third party has to do, is utilise FooCrypt’s Import Window Memory Binary Features, to recreate the FooKey.

Modifications to the imported binary import can be made with ease with FooCrypt’s XY features, enabling identical cursor position for character modifications to the binary import

6 can be mitigated by always storing your encrypted data on an encrypted media device, thus even if your media device is physically stolen, the thief needs to break the disk encryption, and then try to break FooCrypt’s Cyclical Encryption. FooKey’s are always stored on physical media, encrypted in a single layer of encryption. FooKey’s can easily be encrypted by the User with a FooKey, hence, layering the FooKey in multiple layers of encryption.

No one to date has been able to by pass or break into a file encrypted with the FooKey method.

FooCrypt

Independent review of the Defence Trade Controls Act 2012 (Cth)

I mentioned Angus the Cyber Minister twice in my review submission :

http://www.defence.gov.au/publications/reviews/tradecontrols/Submissions.asp

http://www.defence.gov.au/publications/reviews/tradecontrols/Docs/Mark_Lane.pdf

Male Bovinae Faeces [ BullShit ] & Case study # 7c5aba41f53293b712fd86d08ed5b36e

The escrow debate is bullshit being regurgetated & farmed down from the USA 'CLIPPER KEY / CHIP' from 25+ years ago. [ https://en.wikipedia.org/wiki/Clipper_chip ] along with the 'Munitions legislation' that was forced into the 'Wassenaar Arrangement’ that the stupid Liberals turned into the DTCA.

Be Protected, Get The FooKey METHOD : http://foocrypt.net/the-fookey-method

Dick move: Navy flyboy flings firmament phallus for flabbergasted folk

FooCrypt

Happy Movember Guys and Dolls, don't forget to get your Prostrate checked via a P.S.A. / etc, for possible Prostrate Cancer....issue's ;)

Australia reviews defence export controls, perhaps easing cryptography research

FooCrypt

I've started a blog to discuss the DTC(Act) modifications being put forward to the Australian Parliament.

http://www.foocrypt.net/blog/defence-reviewing-13e

Having spent the last few years jumping through the Defence Controls around Cryptology, et al ( 13E, DTC(Act), Fairwork action, A.G.S.V.A. Data Breaches, Australian Signals Directorate delays and essentially requesting source code, Defence Export Controls ( who lost their Office ) delays, Australian Human Rights Cases, etc ), it's a much needed change to ensure innocent end users can obtain access to technologies to ensure a citizens privacy and not be sent to jail on the whim of a Minister in the sitting Australian Federal Government.

Current criminal penalties of up to 10 years in jail and .5 million in fines, for utilising software to ensure their privacy ( Cryptology ) is a ridiculous law effecting all within Australian borders.

https://forums.theregister.co.uk/forum/1/2017/09/05/australian_defence_export_controls_up_for_review/

Feel free to comment, send on, refer, etc.....