centershas.blogg.se

Mega encryption key cracker
Mega encryption key cracker








mega encryption key cracker
  1. MEGA ENCRYPTION KEY CRACKER MOD
  2. MEGA ENCRYPTION KEY CRACKER CODE
  3. MEGA ENCRYPTION KEY CRACKER PASSWORD
  4. MEGA ENCRYPTION KEY CRACKER CRACK

You have suggested that one might enhance security by 'playing games' with the order and value of significant bytes of the message. Unfortunatly, you are generally incorrect.

  • And, even if it only happens to us, there will be some great unpleasantness for the rest of the world.
  • It ought to scare you too.Īnd obNote to those not residing in the US, or handling US currency on a daily basis: So now, the situation is not that "someone will steal your credit card number," but that someone could potentially steal (or render worthless and nonexistent) >= 50% of all US dollars. An awful lot of bank transactions are secured with 512-bit keys, and (no reference here- if anyone has real numbers, please contribute!) I believe something like 95% of US currency exists only as bits in computers. What happens when some terrorists finally cotton to this, and realize that with some intelligent cracking, they could very well jeopardize the stability of, oh, say, the US dollar as a currency. I use this same argument with people when they complain that buying things online is not safe.īut the BIG difference here is that 512-bit keys have been thought safe against all but (perhaps) Major World Governments, until now. More technical and mathematical details (e.g., why need Gaussian elimination, how large is the matrix) can be found in the references of the Usenet announcement.

    MEGA ENCRYPTION KEY CRACKER CODE

    In addition, many of the previous factoring projects also used Cray computers for this task as well, which probably means they could use existing, proven code (and they did).

  • the matrix is so large that even though its entries are just 0's and 1's (so you can use 1 bit per entry) and it is sparse (so you can use less memory in principle), it still takes GB's of memory to storeĪlthough specialized algorithms are invented to just deal with this special case, it still takes a fast computer with fast memory access, due to the sheer size of the task worse, no one has been able to parallelize it successfully yet, as far as I know.Ĭray computers are suitable for this mainly due to its technical merits that some of you have mentioned.
  • MEGA ENCRYPTION KEY CRACKER MOD

    the entries are 0's and 1's, and they are considered numbers in the modulo-2 system (i.e., 1+1 mod 2 = 0).That is Gaussian elimination, not unlike the task to find the `row echelon form' of matrices in your linear algebra class, except that: What was that step and why did it require a Cray "'Is not a quine' is not a quine" is a quine. Though if you do find out enough, there's no reason to use it against me after all, I do deserve my privacy. That coupled with many websearches and the like would easily find plenty of dirt on me, things I've done or said in the past I'm ashamed of but which I've pretty much put behind me, since it was before I decided to grow up instead of being a trite little punk hacker wannabe.

    mega encryption key cracker

    I mean, hell, I even give Too Much Information on my slashdot user info, and anyone on the various MUCKs I'm on would have an easy time to find out anything they want about me. And, honestly, I'm not too concerned if someone else gets my bank information, since banks have insurance for my money (up to $10,000 anyway) and although it'd be a hassle for me, it's the one stealing the money who would eventually suffer, not me.īut my privacy isn't really something I clutch with my big guns blazing. I'm not concerned about my ssh connections being cracked. What I'm concerned about is the information when it's on the other server.Īs has been stated before, 1024-bit RSA and 128-bit blowfish are still plenty secure, and likely will be for a long time. There's just too much information out there for someone to effectively snatch my info, and it's certainly more secure than using a phone or mail or whatever to send that information to them. I still feel comfortable in sending my credit card information to online retailers who use 64-bit RSA and the like.

    mega encryption key cracker

    MEGA ENCRYPTION KEY CRACKER CRACK

    From there they can access any information on the servers, and if it's encrypted - and 512-bit RSA is pretty standard for such sensitive information - it's not too hard to crack that anymore, either.

    MEGA ENCRYPTION KEY CRACKER PASSWORD

    On most UNIX systems, passwords are stored as 56-bit DES, and there's always a way that one can somehow get the password file, from which point it's almost always painfully simple to get a root shell. Not national security, but information security. What this trouble is about, however, is security. So, I don't go to obscenely obscure lengths to try to cover my tracks it'd be fruitless. It's easy enough for someone to connect my presence in any media to my real person. I've resigned myself to the fact that there's no such real thing as privacy, only perceived privacy.










    Mega encryption key cracker