New Law on encrypted devices.

Tish

SF VIP
Yep, that's really going to make them shake in their boots!:rolleyes: *Sigh!*

The NSW Government will take another crucial step toward dismantling organized crime with new powers and tougher penalties targeting money laundering and unexplained wealth.

The reforms represent the State’s toughest ever laws targeting organized crime and will see NSW introduce world-leading legislation targeting the use of dedicated encrypted communication devices by criminals to avoid law enforcement.




 

Uhm maybe I am stupid but I do not understand this. Technically speaking my cell phone is an encrypted device and I often use Telegram for texting because uses end to end encryption. Many apps on the cell phone use encryption. So is Wales trying to outlaw such apps as or are they trying to introduce legislation to make it easier for law enforcement agencies to have access to a persons encrypted data ?
 
The initial rationalization might be organized criminal organizations but as soon as others are labeled 'criminal' so does their device. Governments need to pretty up/sell policy that will affect everyone.
 

The various encryption types​

The three major encryption types are DES, AES, and RSA. While there are many kinds of encryption - more than can easily be explained here - we will take a look at these three significant types of encryption that consumers use every day. Most of the others are variations on older types, and some are no longer supported or recommended. Tech is evolving every day and even those considered to be modern will be replaced by newer versions at some point.

Just as security tech is taking steps to increase the safety of your information, hackers are finding ways around them. It’s an arms race with your data as the spoils of war. Let’s dive in to popular encryption methods, the history of encryption, and where it’s going next.

DES encryption​

Accepted as a standard of encryption in the 1970s, DES encryption is no longer considered to be safe on its own. It encrypts just 56-bits of data at a time and it was found to be easily hacked not long after its introduction. It has, however, served as the standard upon which future, more-secure encryption tools were based.

3DES
A more modern 3DES is a version of block cipher used today. Triple Data Encryption Standard (3DES) works as its name implies. Instead of using a single 56-bit key, it uses three separate 56-bit keys for triple protection.

The drawback to 3DES is that it takes longer to encrypt data. Also, the shorter block lengths are encrypted three times, but they can still be hacked. Banks and businesses still rely on it at this point in time, but newer forms may soon phase out this version.

When should use you use DES encryption?
You probably won’t use DES or even 3DES on your own today. Banking institutions and other businesses may use 3DES internally or for their private transmissions. The industry standard has moved away from it, however, and it’s no longer being incorporated into the newest tech products.

AES encryption​

One of the most secure encryption types, Advanced Encryption Standard (AES) is used by governments and security organizations as well as everyday businesses for classified communications. AES uses “symmetric” key encryption. Someone on the receiving end of the data will need a key to decode it.

AES differs from other encryption types in that it encrypts data in a single block, instead of as individual bits of data. The block sizes determine the name for each kind of AES encrypted data:
  • AES-128 encrypts blocks of a 128-bit size
  • AES-192 encrypts blocks of a 192-bit size
  • AES-256 encrypts blocks of a 256-bit size
In addition to having different block sizes, each encryption method has a different number of rounds. These rounds are the processes of changing a plaintext piece of data into encrypted data or ciphered text. AES-128, for example, uses 10 rounds, and AES-256 uses 14 rounds.

When should you use AES encryption?

Most of the data tools available on the market today use AES encryption. Even those that allow you to use other methods with their programs recommend the AES standard. It works in so many applications, and it’s still the most widely-accepted and secure encryption method for the price. In fact, you’re probably using it without even knowing it.

RSA Encryption​

Another popular encryption standard is “Rivest-Shamir-Adleman” or RSA. It is widely used for data sent online and relies on a public key to encrypt the data. Those on the receiving end of the data will have their own private key to decode the messages. It’s proven to be a secure way to send information between people who may not know each other and want to communicate without compromising their personal or sensitive data.

When should you use RSA encryption?

You’ll need to know a little bit about using RSA to make it part of your routine, but once established, it has many uses. Some people use it to verify a digital signature and ensure the person they are communicating with is really who they say they are. It takes a long time to encrypt data this way, however, and isn’t practical for large or numerous files.

Additional encryption types​

There are other encryption services and tools available, including the fishes (Twofish, Blowfish, and Threefish). They use different tech to encrypt data and are popular among many coders and developers. They have also been integral to password protection software products on the market. They have no patent and can be used license-free by anyone.

Consumers shouldn’t be expected to understand everything about encryption or know how to encrypt personally. Just the same, even a limited knowledge of encryption can come in handy when selecting and buying privacy and security products and tools. Follow these rules to get the best outcome:
 
Quantum computing will soon render current encryption methods obsolete... The coming Cryptopocalypse
"While no one knows exactly when quantum computers will be available, there is considerable urgency in moving to PQC as soon as possible. Many researchers say it's likely that criminals and nation-state spies are recording massive amounts of encrypted communications and stockpiling them for the day they can be decrypted."

Gee whiz, what a headache that will be, I suppose we'll need new id numbers, card numbers, bank numbers, etc? And no doubt there will be a lot of info that will be ammo for blackmailing people into doing things. What a mess!
 
I put my cell phone where its hard for kids to find. Does that count?

Don't know Jack about encryption...

Speaking of encryption standards and intelligence, military and law enforcement technology many communications blogs and forums have membership post about our militaries failed UHF follow-on neckless to prevent hacking and unlawful use mostly by Brazilians and Russians. NYPD suffered massive false alarms and other forms of disinformation transmissions by cretins using CCR during the "George Floyd" riots. So much for breaking the law to hold others accountable for breaking the law.

The ultimate consumer encryption standard for blocking GPS or WAAS cellphone location and tracking is to just remove your battery. Completely free and legal. Don't buy the portable Faraday cellphone pouch story. It makes them rich and you not too smart.

BTW: The cellphone conglomerates perpetrate the myth that your new generation Iphone rechargeable battery is now "soldered" to the pc board hype. Just remove the back cover and pull the battery that doesn't look like a battery right off the pc board. Zero tracking when your Iphone be dead yo. lol.
 
Last edited:
Personally, I have no reason to send an encrypted message. If I owned a large company and was sending proprietary information across the net to employees with the need to know, I would use Telegram. Only because it’s the one I am mostly familiar with. And even then, I would have to hope the servers wouldn’t be breached.
 
BTW: The cellphone conglomerates perpetrate the myth that your new generation Iphone rechargeable battery is now "soldered" to the pc board hype. Just remove the back cover and pull the battery that doesn't look like a battery right off the pc board. Zero tracking when your Iphone be dead yo. lol.
Well although the battery isn't soldered to the logic board, it is a bit of a geek project and is a little more involved than the average person would want to attempt.
 
Well although the battery isn't soldered to the logic board, it is a bit of a geek project and is a little more involved than the average person would want to attempt.

The following phones I have used over the decades have removable batteries:

1. Samsung SM J72727T1

2. LG-US880

3. Iphone 12

4. Another Samsung whatever.
 
I don't know if any of my Android phones ever had a battery that's not a major pain to replace. Battery life is an issue for me, but when my phone no longer gets security updates and patches, it's time to shop for a new phone.
Edit: I'm ready to go more upscale in order to insure a longer period of security updates. I've had my eye on Google's Pixel line, may pull the trigger on 2(one for my wife) real soon.
 
Last edited:
I don't know if any of my Android phones ever had a battery that's not a major pain to replace. Battery life is an issue for me, but when my phone no longer gets security updates and patches, it's time to shop for a new phone.
Edit: I'm ready to go more upscale in order to insure a longer period of security updates. I've had my eye on Google's Pixel line, may pull the trigger on 2(one for my wife) real soon.


I always wanted the Motorola Droid MAXX with the HAL-9000 looking eye image. Never got around to it though. Now it's time to join the group and swill down some decaf joe and rubber flapjacks in the cafeteria, oops, the dining hall. Yeah, that's what I meant, he dining hall.

4733044_sa.jpg
 
OK, I briefly flirted with the thought of going with an iPhone, which is not a bad idea, as Apple will support older devices with security updates for as much as 7 years. But, I got over it, so it's back to Android shopping. The 'flagship' phones typically push out updates longer, Google specifically says in writing that the Pixel 6, 6a, 6 Pro will get security updates for 5 years. That works for me. ;)
Picking up two Pixel 6 Pros. , about $400 less than an iPhone 13. But for me it isn't so much the money as it is my disdain for the whole Apple "universe", the Apple ID that their servers seem to not recognize at inopportune times, gotta sign into iTunes, iCloud,App Store....I don't know, it's probably just me. I like Apple's devices, would prefer to run Linux on them . ;)
 
iPhone possession appears to be some type of status symbol for the Yup's who can afford it like their Teslas unlike Air Jordans that were under the Christmas trees of 9 year old's who's parents had to work two and a half jobs just to pay the rent. Apple, Beta and Mac vs. VHS and Android.
 


Back
Top