4d8a6 - Posted: February Wed 8th 2:35 PM (Never Expires) - Format: text
  1. To protect my identity against stylometry I presented the contents of this post to a person who formulated information provided by me using his/her own words. Typos and bad syntax are intended.
  2.  
  3. This will be condensed list of statements about government-run cryptography.
  4.  
  5. 1. GOV uses AES and other popular civilian crypto algorithms in their top-secret facilities/systems, but:
  6.  
  7. - original KSA is never NEVER used because NSA/GCHQ/{your favourite crypto gov agency here} silent "backdoor"
  8. is almost always prepared as some kind of very subtle weakening of KSA intented for civilian use. Developers are forced
  9. to weaken their KSA designs. Compare KSAs with encryption functions - you will notice how crude KSAs are.
  10. - always when applicable, randomly (hardware) generated subkeys are directly loaded to cipher state
  11.  
  12. 2. GOV have means of wireless data transmission without use of any electromagnetic/acoustic/other emission/transfer.
  13. This is some kind of "entanglement on demand" on two sets of specially stabilised particles separated by any distance
  14. (it could be transmission from Earth to Pluton with ZERO delay). Such "entanglement routers" are used only in highest
  15. level secret facilities.
  16.  
  17. 2a. Very bad news: this "entanglement nanocore" is placed in EVERY CPU since early 2000s. So when NSA wants to be
  18. in your computer, it will be, regardless of OS/crypto/airgap/TEMPEST protection you will use.
  19. Additionally Windows "watermarks" CPU activity to make "entanglement tuning" to specified target quick and easy.
  20.  
  21. 3. The real cryptographic strength of Blowfish is UP TO 56 bits, regardless of size of key used. This is how it was designed in NSA,
  22. and spread under the trademark of NSa frontman and disinformant, "Bruce Schneier".
  23.  
  24. 3a. Kahn's "Codebreakers" and Schneier's "Applied cryptography" were published as part of plan to influence the whole cryptology
  25. of the future. This plan was successful, almost all cryptology academia is reduced to mental kindergarten without dissidents of cryptology.
  26.  
  27. 3b. Read "ciphersbyritter.com" before its author is alive. Download it, protect copy. That poor guy was close to truth.
  28.  
  29. 4. DES has at least a dozen of trapdoors in its S-Boxes.
  30.  
  31. 5. AES is still not crackable by NSA. But please do remember about weak KSA!
  32.  
  33. 6. Twofish and Serpent are not crackable by NSA. But please do remember about weak KSA!
  34. Serpent's KSA is especially weak and should be avoided.
  35.  
  36. 6a. RSA is breakable by NSA regardless of key size. DO NOT USE RSA!
  37.  
  38. 6b. ECC is breakable by NSA for all key sizes smaller than 512 bits.
  39.  
  40. 6c. P=NP. Proof is known in NSA since early 90s. Author of proof still works for NSA.
  41.  
  42. 7. The guy of "algebraic defectoscopy" fame was framed to suppress his cryptanalytical methods.
  43. Find his website on archive.org, save it, keep this copy safe.
  44.  
  45. 8. NSA is very VERY afraid of polymorphic encryption. But most public algorithms going under that name are shit. Search deeper
  46. for crypto that makes NSA shitting their pants. Hint: word "QUASI".
  47.  
  48. 9. This is SHA256 commitment of secret I will use in my next posts to prove my identity. DO NOT trust similar fake "next" posts,
  49. if they don't contain a string with SHA256 of b10bcb6556a928ce90415690a5cecaff5474d733a664330afd24fcd27091e401
  50.  
  51. Stay safe.
  52.  
  53. GOV Insider.

Enter new version of [ 4d8a6 ] :

Paste Options:

Recent Pastes:

14 days ago

a7682

27 days ago

4fc54

185 days ago

10819

207 days ago

HOW_TO_HACK_FH2.txt

221 days ago

md5

223 days ago

a78a0

230 days ago

4d8a6

260 days ago

3b92e

1230 days ago

intro