Secure Coms

13 readers
51 users here now

This is a community for enthusiest who love to ponder new ways for Alice to communicate with Bob in a world where global passive adversarys probably record every bit that ever crosses the wire.

Discuss cryptography, secure key exchange, private messangers, radios, encoding, networking tools, authentication mechanisms and anything relevant to coming up for ways to Alice to get a message to Bob.

founded 2 days ago
MODERATORS
1
 
 

There are more ways to utilize OTP then to 2FA accounts.

Using an offline otp manager like andOTP you can generate time based codes derived from any shared secret. This can provide a whole new level of security in a scenario where Alice and Bob want to self verify a communication channel.

2
3
 
 

Broad Guide to Bootstrapping your own Codebook

Using a few key formulas you can create a functional code book with enormous keys that no computer could possibly brute force.

First let me explain how many possible keys there are in this particular example.

In this example the word list contains 3000 words. Each subsequent column labeled k1-k9 contains another 3000 bits of unique information. Each number of key columns added exponentially increases the total key possibilities.

In this schema the "Key" to encrypt and decrypt is the unique state of each cell in relation to the word list.

3000!^10 represents the amount of possibilities.

That is 2^91312 possible keys which makes aes 2^256 look completely wimpy.

Important Functions To Master To Build your Code Book

  • randbetween()

-vlookup()

-ifs()

-concatenate()

All of these formulas can help automate the encode/decode process.

Ways to mitigate Frequency Analysis

-Layer the final ciphertext with other string encryption protocols.

-Increase the amount of key columns so that the encoding formula can pick a random column. This will allow the same word to be encoded multiple ways so that someone analyzing plaintext will hit a wall.

-Generate new keys. New keys can be generated by shuffling the key and wordlist columns. You can use sorting functions to randomize and shuffle the wordlist.

Ideal Operational Security

-Air gap the computers running the encoding/decoding processes

-Share the keyfiles offline

-Rotate keys often

-Destroying old keys

-Use already secured communication channels to add layers.

Final Notes

This is obviously not a convenient way to share a message. It requires dedicated hardware, and disciplined protection of the keyfiles to really be secure.

Regardless of what anyone tells you about the strength of modern encryption ciphers like AES256...do you really think a the most powerful nation in the world would release a unbreakable encryption protocol 15 days after 9/11? I don't think so pal

4
 
 

This is torch. A termux hosted hidden chat service.

Find it here After saving run with chmod +x torch.sh > ./torch.sh

Included features -PTT (if your browser supports it) -Lockdown mode. Adds E2EE -OTP mode. Generate time based keys to enhance security. -Voice changer -Add time stamp -Pin message to spam -File Sharing -Per room file organization -Delete server logs from web -Delete chat logs from web -Generate and spam random packets -Filter out generated noise (keep generating packets in background) -Optional per room cloudflared tunnels.

Here is the directory that is formed on startup.

Example server side chat logs with encryption enabled.

5
 
 

This is similar to Utopia, previously shared, with regard to functionality and peer-to-peer operation, but unlike Utopia this one is fully open source, is not blockchain based, and starts out with only connecting to your known friends. The devs are also known, and it uses well known PGP encryption which you share directly with your friend to get authenticated.

'Onion routing' is used for anonymity and needless to say you don't need your real-world credentials to register. Being P2P it does not require any servers or central services to operate - you connect to, and via, your friends directly, completely out of site of Big Tech.

It's a bit like your own private secure Facebook and is actually great for younger children to participate safely. There are no hidden costs, no ads and no terms of service. It installs on Windows, Linux and MacOS desktops, and on Android mobile. Sorry no iOS app.

See https://retroshare.cc/

#technology #P2P #decentralized #socialnetwork #privacy

6
 
 

Developer: @hereforawhile@lemmy.ml

Termux Torchat can be found here

This new version implements optional rotating time based keys, and a simple implentation of rachet forward secrecy.

Deploy secure world wide coms right from your own terminal or run the server on a old phone