*waves*

Comments

RSS feed for comments on this post.

  1. I encrypt all my anti-gummint terroristic nefarious email plans with an unbreakable ROT-13 cipher.

    Comment by apotheosis — December 5, 2012 @ 10:13 am

  2. BTW steganography, look into it.

    Comment by apotheosis — December 5, 2012 @ 10:14 am

  3. Relax. That’ll be illegal soon.

    Comment by Claire: rebellious pink pig with car keys - and a *cause* — December 5, 2012 @ 10:15 am

  4. My emails will be responsible for boring readers to death.

    Comment by Alan outback bacon czar — December 5, 2012 @ 10:38 am

  5. IP based phone systems (VOIP) are susceptible as well. Converting voice to binary makes it easier to copy and save off.

    Comment by USMC2841 — December 5, 2012 @ 11:00 am

  6. PAQMX GGYVU VZFGT CMHTN NGEZH YKGQH ATQXU
    ABEQK DTZDC RRYUH WNRJV TCUAT GENPM MGHRH
    GDVMU ERTTA XTZFJ TEMZN YQQWR JZNNE XDQZV
    JVKKD CRDWP MFHCD WJHKQ QDKPV BWMDW YRPNE
    VRVVD NTQTB RMECE QXBZH TCNJA HEFGR VZEXQ
    UQUDP XZNPR VUYMM KYPPJ FJJYC JXHFA QMCHV
    UCBQT QZQQZ DEAWR DRTAF QUWXC KCFPZ RRHUK
    DQNNR JGEMN KVKGZ AKPYN GGBPZ MEHVD JDTWZ
    PAMQJ TVVDJ GUJTW UUJUX GPRHV RDABJ RNUFT
    BBGNT HUDDP JDGNT HDDCR XZHHT DZFCV YDHFT
    ZJYTG FXHPN HXADR YPFCQ

    Knock yourselves out, fibbies.

    Comment by apotheosis — December 5, 2012 @ 11:05 am

  7. So It might be sorta fun to start leading them on wild goose chases. Writing emails about my reconditioned Sherman tank that I keep in my garage and the nuclear warhead in the trunk of my Chevy Volt.

    Comment by MikeG — December 5, 2012 @ 11:13 am

  8. They will have too much information to be of use… but more than enough information to convict us of our three felonies a day if we should ever happen to stand up and draw attention to ourselves.

    I mainly worry about Rodger as he seems the type most likely to go all Cody Jarrett on their asses.

    Comment by Freddie Sykes — December 5, 2012 @ 11:15 am

  9. MikeG,

    QCWCD BRRUX QYZCX QENVG FRAZE BPWZH YJAXT
    QDKRU BEUUZ FHCKT GTCVG XEZYY ADGUP XDVJQ
    YVACV ECRFF KBHYZ FXYMC GGPEU UGVXP CUGXH
    UEMPH UUGEE CJPBA RHXPK HNCCE MFJUD YVUMH
    ENQJT QQFDF QUBTQ KGNTR UHFYY VRTMB QJDUH
    AQKTR WBFVP QPGYM AAZMZ BWBHY EMCYM GPBAK
    KEZUM WDCAZ DMUFX UVCEX FFYFB YTXVC YGHZY
    EWUNC BZPFQ

    Also, a randomly-chosen box of Little Debbie Marshmallow Pies, IN THE NAME OF TWINKIE THE KID.

    The Eagle Poops At Midnight. Mum’s the word.

    Comment by apotheosis — December 5, 2012 @ 11:31 am

  10. Hmmmm. Ya think now the Effa Bee Eye can find those Fast n’ Furious e-mails that Issa’s been demanding??

    Comment by rickn8or — December 5, 2012 @ 12:09 pm

  11. Apo…. Sorry, I can’t make it this weekend, and Little Debbie is with her mom the following week.

    Comment by Wollf — December 5, 2012 @ 12:15 pm

  12. Aw man, I hired mimes to hold up the targets and everything.

    Comment by apotheosis — December 5, 2012 @ 12:18 pm

  13. unbreakable ROT-13 cipher

    ROT-13 is so yesterday. We use ROT-26 here. Twice the protection!

    BTW steganography, look into it.

    Attended a talk once where the guys had looked at many many images on usenet, supposedly looking for the hidden messages. IMHO, they basically had a grant and the funding to download porn all day. They didn’t find anything, but I’m not sure how exhaustive the investigation was. (They basically looked for statistical anomalies in the underlying images, but any modification (airbrushing?) would cause this, and there are ways to hide the messages w/out causing anomalies ata the level they were detecting.)

    Comment by hank — December 5, 2012 @ 12:30 pm

  14. “Man, I coulda sworn Al-Qaida’s eleven secret herbs and spices for IED falafel was gonna be in that last issue of Penthouse. Oh well, back to alt.binaries.no.encrypted.messages.in.these.boobies.wink.wink.wink”

    Comment by apotheosis — December 5, 2012 @ 12:52 pm

  15. No worries here. I got an old german guy living near here and he informs me, “Vait Oberst J, I haf got a nother rotor undt vil add to jour Enigma. Nine, iss no vay dey can break, Ja!”

    {…Yea-ah right Hans, I can *hardly* wait dumpfkoff. Don`t git out much doya Hans?…..How long since you got crypts from Abwer comraad? That long; gottinhimmel!!!…}

    Comment by Colonel Jerry USMC — December 5, 2012 @ 1:20 pm

  16. Claire,

    You’re just being paranoid again. Pay no attention to that bug in the bottom of your purse. It’s probably just a normal cockroach that hitchiked here from NYC or DC.

    Amazingly lifelike though, dontcha think?

    Comment by Hog Whitman — December 5, 2012 @ 2:18 pm

  17. OPCBA CODVU JEJTG NFRLC BY

    Comment by TheOldMan — December 5, 2012 @ 2:39 pm

  18. IXNAY NOAY ETHAY ECRETSAY OTPLAY!

    EYTHAY AMAY EBAY ISTENLINGLAY!

    Comment by Merovign — December 5, 2012 @ 3:53 pm

  19. Honestly, I may have to reverse my traditional position of telling people not to forward all those dumb giant funny lists or long-debunked story e-mails.

    Security through overwhelming the snoops – forward that chain letter!

    Comment by Merovign — December 5, 2012 @ 3:54 pm

  20. IXNAY. AMSCRAY.

    Comment by mojo — December 5, 2012 @ 4:15 pm

  21. They all will be stored in the same place in a building in UT——-I’ve heard of that building——hmmm— no no — I think it’s wonderful—really I do—my fingers are not crossed behind my back—- it’s for the children right????????

    Comment by geezerette — December 5, 2012 @ 4:35 pm

  22. So you’re telling me that if I don’t catch up on my encryption tech, i’ll be a steganosarus?
    .
    .
    .
    .
    The chair is against the other wall

    Comment by mech — December 5, 2012 @ 4:49 pm

  23. Isn’t there such a thing as a random number generator?

    Get one and send random numbers, in groups of five — the old traditional – to all your friends in the know, to which they will respond with a single digit. Everybody in your friend circle always uses the same previously agreed upon single digit. And then sends another random number, half in length, to the next in the chain.

    Cheap entertainment for all. Keep the snoops busy.

    And if anybody is caught and interrogated, insist that it isn’t a code at all, it’s just a random number. Smile when you say it.

    Comment by Walt — December 5, 2012 @ 5:01 pm

  24. Test

    Comment by Fat Baxter — December 5, 2012 @ 5:08 pm

  25. Interesting. I can’t post a link from Sipsey Street Irregulars. Fibbies must be lurking.

    Comment by Fat Baxter — December 5, 2012 @ 5:11 pm

  26. Walt:

    GCYMW HFMJD QFGKZ GQEFZ BQHWV GXTPH ZJQTX
    QXXPJ ECQGT MZPGD MTCMV NTDQP KDYWY TXNXZ
    AEWTD YUDWD ZCMER VNZXJ TGYZG TJBFN XUXWA
    YYXJM PEQRP BWVDX TKUNP HCFQW JBDPQ EGRMK
    NVZPX NHRBV EBBFJ UYBJV YUNNZ WKRVR RWVYB
    MPVDM CWTBR ZEMNF BUTUT HYQMR VMDAC GDBTP
    XAZWG DWRZK FTKWT EEVMP BKDEC ZVFUW XNPQE
    MBHED JNFUC RUFTN ACPJH QWKVQ KPEHY QZGWE
    VCDCW ZYVWD GFVRQ KUTNP RYGQP KBMUH JKRXT
    EHQVE CRETV YKRFV TTHXW VVAJW TDQEE DKTAJ
    GNPPV XEWEF QFGAY RRTMQ ZJMKH MJWBK NUJZY
    RKPKQ MZTHT ZKUWX YFUQW FNJPZ UPVVQ RQAKH
    CZZDP WUXRY BURYV FXMYM HQMQJ HPNKZ GAWYV
    PDRUN UHWCP HXXDA HXVBC YDKKT YKBZA MYKHT
    FBHXG PNQWE AMCPH GBKYM BTKDA ZYRDH PZXQT
    VZCAB VFGAU XTQVP RPUAJ BXBBE EXQVC EDXKK
    NHUBJ NJNKD BPFKN AHTBR QCTEQ QRFJM PTDMK
    AANZV NVEKM QFRWE YXHDH UWAYR PFRVE FTXPC
    ZQQDF XCJXU BBJEV CTBDM GZAWQ PFMXX HNYND
    WYWHG GGEFC YNWWP RBCTW AMWAB VVUGT MMNKW
    GBTGJ MAUDW QDNZF QZWMV ATMZB HTGBE HWERF
    VQEZC QTEQR HWWFN MHTHW KDUUR FTMCH HKGAW
    XFZQH YRFRZ HMNCD XVQWK RYCKF VYVRD HUPGK
    NGUGN KWXUH FWZTC CZBPU FCMUH UDAXE RHVWX
    GUYZT WWXQP AUHJU QVPRD UXWUU EWKDE AFWRC
    WKUGA ZCNHF CZNKM FCTGD XEBQC RYHHD CAVUT
    UFPJV GJXBZ XYRPM CZMPC RVVWM MTHGV PMMQZ
    HABEK VZHUB NGKPP FDPCR AZPCY DEGBD GCVRB
    PZEAJ PFEMM GBXTQ AZREP NXYJA VYTNW YWYPQ
    KZACZ EBBAQ GQXVN YGYDP XHZNP YCYZE EDPUM
    DVWMW KVKCK GVQBT HUWTU RWHQT UAHVQ VUXMK
    MWXZP BDEVK AXKFK YDEYA ACRVJ MVRBC TRUDC
    BBEDF BZWHN CTXKE HAHRB DKEAE ZFNET QZFAZ
    NMHJN TPBCN ZCVDK TJJBC TWHZE BJKWJ RYVQA
    QAUWW QCMCY JDNDB UUTRU QWUGB DKNHB VEJVM
    PDHCW CCXUZ DPJCD KFQBA NVNNN JUHRQ TZWEN
    JRXQQ TNZBC

    …but other than that, great idea.

    Comment by apotheosis — December 5, 2012 @ 5:14 pm

  27. Anyone else having trouble posting links tonight?

    Comment by Fat Baxter — December 5, 2012 @ 5:30 pm

  28. Apo,

    I’m in. Oh, and Uncle Bob says that the package has been delivered but we’re waiting on the pregnant hippo to return with the fine silver.

    Comment by MikeG — December 5, 2012 @ 6:11 pm

  29. All is going according to plan.

    Comment by apotheosis — December 5, 2012 @ 6:31 pm

  30. Acomuwiw, Nit-te leyic.
    Nopal tahk skat leyinuhk.

    The stories are told. The stories are true. If only it weren’t true.

    Read that, Fibbies……. Oh, my translation of the People of the Dawn doesn’t matter, Pesko/ Maliseet is worse than Navaho Code Talk. Nothing fits.

    Grandad was Peskotomuhkati.

    Comment by Wollf — December 5, 2012 @ 7:42 pm

  31. Apo (26) I’ma gonna decipher your ROT-13 encoded message & tell
    Head Missy SondraK & all the Porch Minkees what you said!
    Caesar said I could do it!

    Comment by Lance — December 5, 2012 @ 7:58 pm

  32. Nuh uh ROT-13 is unbreakable. And besides, I’m sitting in a Faraday cage behind seven proxies.

    Comment by apotheosis — December 5, 2012 @ 8:03 pm

  33. FDoU FyouU FthinkU FtheyU FwillU FhaveU FtroubleU FdecodingU FthisU F?U

    Comment by PeggyU — December 6, 2012 @ 1:20 am

  34. Please explain how, if I use a FIOS to send a FAX (or just talk) a warrant is required to store/read it, but using it for EMail means it can be intercepted and stored (and presumably sorted in several ways, which requires “reading” at least parts) is OK?

    Comment by John A — December 6, 2012 @ 6:56 am

  35. Good question, John.

    Software pirates have argued for years that copying software illegally isn’t really stealing, because they’re not actually “taking” anything in the sense of a single physical object being taken from the owner by a second party without the owner’s consent.

    I wonder how they’ll react when essentially the same argument is used against their inboxes. Should be fun to watch.

    Comment by apotheosis — December 6, 2012 @ 7:05 am

  36. apo, using the software pirates thinking, how about I copyright all my e-mails??

    Comment by rickn8or — December 6, 2012 @ 10:51 am

  37. There are indeed “real” random number generators, but they tend to be expensive and kinda wonky. Pulling cosmic ray noise out of the upper atmosphere, that sort of thing.

    Mostly we use “Pseudo” random number generators. Their output isn’t truly random, but it’s “random enough”. Unless, of course, some nefarious nogoodnik gets in there and screws with it. Prime method of crippling a cryptosystem, by radically lowering the key space.

    That’s what NSA does to public systems.

    Comment by mojo — December 6, 2012 @ 12:33 pm

  38. John has a long mustache.

    Monitoring communications is what you do to the enemy
    and to those who might be leaking classified or operational info to the enemy.
    Guess what that make us?
    (What? I know nuth-thing!)

    Comment by DougM (Well, thaaat sucked!) — December 6, 2012 @ 4:27 pm

Sorry, the comment form is closed at this time.

Close this window.

0.192 Powered by WordPress