And here is why... This is a little script I wrote using ncat to
demonstrate just how easy it is to generate your own private keys and
have a secure SSL session, immune from backdoors, NSA pricks, Interpol,
and God: # generate some keys openssl genrsa -out $FILENAME.key 1024 openssl req -new -key $FILENAME.key -x509 -days 3653 -out \ $FILENAME.crt # server: ncat --broker -- listen -- chat --ssl --ssl-cert $crt --ssl-key $key $host $port # client: while true; do read -p ">> " message echo -e "[$name@$hostname:] $message " done | ncat --ssl-verify --ssl-trustfile $crt $host $port The full scripts can be found here in case anyone is interested. So this is just a very simple chat script using ncat, and good luck ever getting a 'backdoor' into ncat (lol), or openssl for that matter. All the source code for openssl can be found right here. All the ncat source can be found right here... so unless you plan on fundementally re...doing(?) the entire computer industry... good luck with that. Go do some real police work instead. I am getting sick of writing these blogs trying to explain why everything the government wants to do is not only a terrible idea, but makes no sense whatsoever. So I will end by linking you to Google and telling you to use your own damn brain. |
Tuesday, November 17, 2015
NO, 'Encryption Backdoors in Software' Won't do a Damn Thing to 'Stop Terrorists Before They Act'
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment