Australia Becomes First Western Nation to Ban Secure Encryption
Page 1 of 1
Australia Becomes First Western Nation to Ban Secure Encryption
Australia is now the first Western nation to ban security, following a decision by its parliament to pass a bill forcing companies to hand over encrypted data to police upon demand. The government will be allowed to demand this without judicial review or oversight of any kind, beyond the requirement to get a warrant in the first place. Furthermore, the law requires corporations to build tools to give them the ability to intercept data sought by police when such tools do not already exist. While the bill has only passed Australia’s lower chamber, the upper chamber has indicated it will pass the legislation provided there are later votes on unspecified amendments to the current bill.
Australia has become the first nation to enact into legislation what both the UK and US governments very much want — government-mandated backdoors into encryption systems that require corporations to hand over data on demand. The response of the tech industry has been straightforward: There is no way to perform this task that does not fundamentally weaken security. And for all that journalism is often the process of laying out multiple sides to an argument or debate, there’s no actual debate to be had, here — not, at least, as far as the security principles are concerned. We can certainly debate whether people should be entitled to privacy, or if the governments of nominally free countries should have access to this information in the first place. But as to whether it’s actually possible to build secret backdoors into security systems without fundamentally weakening them, the evidence is simple: No.
As Cindy Cohn wrote in a recent post on Lawfare Blog:
The idea that corporations can be trusted to safeguard these vital tools or hold vital data in escrow accounts doesn’t survive contact with reality. Even without government-mandated backdoors, companies regularly suffer breaches and attacks, often leaking personal details of dozens to hundreds of millions of people. The need for better data security is enormous and the solution to this problem is not to create tools that can be used to attack the very concept. Products from Facebook, Google, Apple, Microsoft, and all such similar efforts will now be required to include systemic weaknesses, while open source products will not be affected for now. In case you’re wondering, according to a survey of the 343 comments made on the bill while it was under discussion, only one of them — and not an Australian citizen at that — was in support. The Australian Parliament simply didn’t care.
LNX
Australia has become the first nation to enact into legislation what both the UK and US governments very much want — government-mandated backdoors into encryption systems that require corporations to hand over data on demand. The response of the tech industry has been straightforward: There is no way to perform this task that does not fundamentally weaken security. And for all that journalism is often the process of laying out multiple sides to an argument or debate, there’s no actual debate to be had, here — not, at least, as far as the security principles are concerned. We can certainly debate whether people should be entitled to privacy, or if the governments of nominally free countries should have access to this information in the first place. But as to whether it’s actually possible to build secret backdoors into security systems without fundamentally weakening them, the evidence is simple: No.
As Cindy Cohn wrote in a recent post on Lawfare Blog:
There simply is no debate within the security community on this topic. Creating keys to an encryption system, or, alternately, maintaining the encryption but forcing companies to create tools that allow them to attach a “stalker” to the system to monitor communications invisibly (the UK is proposing this method of surveillance, and the aforementioned Lawfare Blog post has more on this), automatically creates an enormous incentive for anyone aware of the existence of such tools to either try to steal them (if they’re black hats) or leverage them for their own use (if they’re governments). Once companies are forced to create these tools to operate in the Australian market, they’ll be pressured to bring them to other countries.Even without compromising the cryptography, there is no way to allow access for only the good guys (for instance, law enforcement with a Title III warrant) and not for the bad guys (hostile governments, commercial spies, thieves, harassers, bad cops and more). The NSA has had several incidents in just the past few years where it lost control of its bag of tricks, so the old government idea called NOBUS—that “nobody but us” could use these attacks—isn’t grounded in reality. Putting the keys in the hands of technology companies instead of governments just moves the target for hostile actors. And it’s unrealistic to expect companies to both protect the keys and get it right each time in their responses to hundreds of thousands of law enforcement and national security requests per year from local, state, federal and foreign jurisdictions. History has shown that it’s only a matter of time before bad actors figure out how to co-opt the same mechanisms that good guys use—whether corporate or governmental—and become “stalkers” themselves.
The idea that corporations can be trusted to safeguard these vital tools or hold vital data in escrow accounts doesn’t survive contact with reality. Even without government-mandated backdoors, companies regularly suffer breaches and attacks, often leaking personal details of dozens to hundreds of millions of people. The need for better data security is enormous and the solution to this problem is not to create tools that can be used to attack the very concept. Products from Facebook, Google, Apple, Microsoft, and all such similar efforts will now be required to include systemic weaknesses, while open source products will not be affected for now. In case you’re wondering, according to a survey of the 343 comments made on the bill while it was under discussion, only one of them — and not an Australian citizen at that — was in support. The Australian Parliament simply didn’t care.
LNX
Guest- Guest
Re: Australia Becomes First Western Nation to Ban Secure Encryption
trenutno imam 256bitno kriptiranje..vjerovatno 20 godina zatvora bih dobijo..
Guest- Guest
Re: Australia Becomes First Western Nation to Ban Secure Encryption
Ma da ali nije to nenarodni totalitarni režim kao npr.sj.Koreja, ovo je za dobrobit drađana i liberalne demokracije :)
_________________
catabbath-
Posts : 12438
2015-08-22
Re: Australia Becomes First Western Nation to Ban Secure Encryption
slozit cu se...ne zna Narod sto je dobro za njega...
Guest- Guest
Re: Australia Becomes First Western Nation to Ban Secure Encryption
Labor caved in last Thursday. Despite spending hours telling Parliament why the Assistance and Access Bill was dangerous garbage, and complaining about the rushed process, they dropped all of their proposed amendments and voted in the sitting government's version anyway.
So now it's law.
The most controversial part is the "frameworks for voluntary and mandatory industry assistance to law enforcement and intelligence agencies" to help government access the content of encrypted communications.
It is Australia's contribution to the Five Eyes nations' tougher attitudes to the regulation of online communications. Information and communications technology vendors and service providers have a "mutual responsibility" to offer "further assistance" to law enforcement agencies, they said in August this year.
See: Australian encryption Bill raises bar for outrageous legislation
Under the new laws, Australian government agencies can issue three kinds of notices:
From here on, we'll refer to these collectively as "notices".
A compulsory TAN can be issued by the director-general of ASIO, or by the chief officer of an "interception agency".
That last category includes the Australian Federal Police (AFP), the Australian Crime Commission (ACC), and the state and territory police forces provided they get the approval of the AFP Commissioner.
However the government amendments removed the various anti-corruption bodies from this category. It's not clear why.
There's no requirement for independent approval of a notice by, say, a judge issuing a warrant. However there must be an underlying warrant to access communications under the Telecommunications (Interception and Access) Act or the Surveillance Devices Act or state-level equivalents.
A notice must be in writing, unless there is "an imminent risk of serious harm to a person or substantial damage to property exists", the notice is "necessary for the purpose of dealing with that risk", and "it is not practicable in the circumstances to make the variation in writing". A notice given orally must be confirmed in writing within 48 hours.
The same goes for variations to a notice, extensions, and revocations.
All notices, extensions, and revocations must be notified to the Inspector-General of Intelligence and Security (IGIS) within seven days.
A TCN can only be issued by the Attorney-General following a request from ASIO or an interception agency, and only with the approval of the Minister for Communications.
The Attorney-General must also give written notice of the intention to issue a TCN to the communications provider, inviting them to make a submission, and respond. Except in a "matter of urgency", that process has to run for at least 28 days.
Also: Hasty PJCIS examination of encryption Bill produces rushed and contemptuous report
There's also "assisting the enforcement of the criminal laws in force in a foreign country, so far as those laws relate to serious foreign offences".
The ASD can also ask for "material, advice and other assistance on matters relating to the security and integrity of information that is processed, stored or communicated by electronic or similar means".
ASIS can also ask for assistance in relation to "the interests of Australia's foreign relations or the interests of Australia's national economic well-being".
The table listing all the categories runs for three pages.
It includes obvious players like "carrier or carriage service provider[s]" -- that's the telcos.
But it also includes anyone who "provides an electronic service that has one or more end-users in Australia", anyone who "develops, supplies or updates software used, for use, or likely to be used, in connection with: (a) a listed carriage service; or (b) an electronic service that has one or more end-users in Australia", device manufacturers, and even anyone who "manufactures or supplies components for use, or likely to be used, in the manufacture of customer equipment for use, or likely to be used, in Australia".
Read: How government haste is ruining its own anti-encryption law
If you mean having any method by which a third party can access the content of a specific communication, that's obviously a "Yes". That's the whole point of a communications intercept.
If you mean a method that allows any communication to be accessed at will, well, the government has been trying very hard to make that a "No".
A notice must not have the effect of "(a) requesting or requiring a designated communications provider to implement or build a systemic weakness, or a systemic vulnerability, into a form of electronic protection; or (b) preventing a designated communications provider from rectifying a systemic weakness, or a systemic vulnerability, in a form of electronic protection".
They cannot ask a provider to "implement or build a new decryption capability", or "render systemic methods of authentication or encryption less effective", or introduce a "selective" vulnerability or weakness that would "jeopardise the security of any information held by any other person", or create "a material risk that otherwise secure information can be accessed by an unauthorised third party".
These two definitions were added to the legislation:
That's the law's intent anyway. What this might mean in practice is still unknown. Whether any of this is even technically feasible is a question for another time.
Must read: Everyone will use encryption, Australia should get over it
It also includes providing technical information, "installing, maintaining, testing or using software or equipment", "assisting with the testing, modification, development or maintenance of a technology or capability", "modifying, or facilitating the modification of, any of the characteristics of a service", and "substituting, or facilitating the substitution of, a service provided by the designated communications provider" with another service.
And quite a bit more.
The decision-maker has to take into account things such as the interests of national security; the interests of law enforcement; the legitimate interests of the designated communications provider; the objectives of the request; the availability of other means to achieve the objectives; whether the request is the least intrusive form of assistance with respect to "persons whose activities are not of interest"; and "the legitimate expectations of the Australian community relating to privacy and cybersecurity".
Agencies will report the number of notices issued annually. Communications providers can report the number of notices they've received in periods no shorter than six months.
An electronic device found while executing a warrant can now be moved to another place for analysis for 30 days, up from 14 days. Australian Border Force can now seize and examine an electronic device for 30 days, up from 72 hours.
ASIO can now "require a person with knowledge of a computer or a computer system to provide assistance that is reasonable and necessary to gain access to data on a device that is subject to an ASIO warrant".
Also see: Encryption debate reminiscent of climate change arguments
Labor reckons its amendments to the legislation will be considered when Parliament resumes sitting in February 2019. The Parliamentary Joint Committee on Intelligence and Security will continue its examination of the legislation through to April.
The Independent National Security Legislation Monitor must "review the operation, effectiveness and implications" of the new laws after 18 months, so around June 2020.
https://www.zdnet.com/article/whats-actually-in-australias-encryption-laws-everything-you-need-to-know/?utm_referrer=https%3A%2F%2Fzen.yandex.com
So now it's law.
WHAT IS THE ASSISTANCE AND ACCESS BILL?
Its full name is the Telecommunications and Other Legislation Amendment (Assistance and Access) Bill 2018, which is now an Act [PDF]. It makes changes to more than a dozen pieces of legislation in an effort to combat what the government refers to in its explanatory memorandum [PDF] as "the challenges posed by ubiquitous encryption".The most controversial part is the "frameworks for voluntary and mandatory industry assistance to law enforcement and intelligence agencies" to help government access the content of encrypted communications.
It is Australia's contribution to the Five Eyes nations' tougher attitudes to the regulation of online communications. Information and communications technology vendors and service providers have a "mutual responsibility" to offer "further assistance" to law enforcement agencies, they said in August this year.
See: Australian encryption Bill raises bar for outrageous legislation
IT'S ABOUT BANNING STRONG ENCRYPTION, RIGHT?
No. Read on."VOLUNTARY AND MANDATORY INDUSTRY ASSISTANCE" MEANS WHAT?
Under the new laws, Australian government agencies can issue three kinds of notices:
- Technical Assistance Notices (TAN), which are compulsory notices for a "designated communication provider" to use an interception capability they already have;
- Technical Capability Notices (TCN), which are compulsory notices for a designated communication provider to build a new interception capability, so that it can meet subsequent Technical Assistance Notices; and
- Technical Assistance Requests (TAR), which are "voluntary" requests, but which have been described by experts as the most dangerous of the three because there was less oversight, at least in the original version of the law.
From here on, we'll refer to these collectively as "notices".
WHO CAN ISSUE THESE NOTICES?
A voluntary TAR can be issued by the directors-general of the Australian Security and Intelligence Organisation (ASIO), the Australian Secret Intelligence Service (ASIS), or the Australian Signals Directorate (ASD), or by the chief officer of an "interception agency".A compulsory TAN can be issued by the director-general of ASIO, or by the chief officer of an "interception agency".
That last category includes the Australian Federal Police (AFP), the Australian Crime Commission (ACC), and the state and territory police forces provided they get the approval of the AFP Commissioner.
However the government amendments removed the various anti-corruption bodies from this category. It's not clear why.
There's no requirement for independent approval of a notice by, say, a judge issuing a warrant. However there must be an underlying warrant to access communications under the Telecommunications (Interception and Access) Act or the Surveillance Devices Act or state-level equivalents.
A notice must be in writing, unless there is "an imminent risk of serious harm to a person or substantial damage to property exists", the notice is "necessary for the purpose of dealing with that risk", and "it is not practicable in the circumstances to make the variation in writing". A notice given orally must be confirmed in writing within 48 hours.
The same goes for variations to a notice, extensions, and revocations.
All notices, extensions, and revocations must be notified to the Inspector-General of Intelligence and Security (IGIS) within seven days.
A TCN can only be issued by the Attorney-General following a request from ASIO or an interception agency, and only with the approval of the Minister for Communications.
The Attorney-General must also give written notice of the intention to issue a TCN to the communications provider, inviting them to make a submission, and respond. Except in a "matter of urgency", that process has to run for at least 28 days.
Also: Hasty PJCIS examination of encryption Bill produces rushed and contemptuous report
IS THIS ABOUT FIGHTING TERRORISM AND CHILD ABUSE?
Kinda. "Safeguarding national security" is in there, but so is "enforcing the criminal law, so far as it relates to serious Australian offences". That's defined as any crime "punishable by a maximum term of imprisonment of 3 years or more or for life".There's also "assisting the enforcement of the criminal laws in force in a foreign country, so far as those laws relate to serious foreign offences".
The ASD can also ask for "material, advice and other assistance on matters relating to the security and integrity of information that is processed, stored or communicated by electronic or similar means".
ASIS can also ask for assistance in relation to "the interests of Australia's foreign relations or the interests of Australia's national economic well-being".
WHO COUNTS AS A "DESIGNATED COMMUNICATION PROVIDER"?
Pretty much anyone and everyone who provides any kind of online service or communications equipment to anyone in Australia, and anyone who even installs or maintains the kit. Yes, that includes anyone who has a website.The table listing all the categories runs for three pages.
It includes obvious players like "carrier or carriage service provider[s]" -- that's the telcos.
But it also includes anyone who "provides an electronic service that has one or more end-users in Australia", anyone who "develops, supplies or updates software used, for use, or likely to be used, in connection with: (a) a listed carriage service; or (b) an electronic service that has one or more end-users in Australia", device manufacturers, and even anyone who "manufactures or supplies components for use, or likely to be used, in the manufacture of customer equipment for use, or likely to be used, in Australia".
Read: How government haste is ruining its own anti-encryption law
ISN'T THIS ABOUT FORCING COMPANIES TO PUT BACKDOORS IN THEIR PRODUCTS?
It depends what you mean by "backdoor".If you mean having any method by which a third party can access the content of a specific communication, that's obviously a "Yes". That's the whole point of a communications intercept.
If you mean a method that allows any communication to be accessed at will, well, the government has been trying very hard to make that a "No".
A notice must not have the effect of "(a) requesting or requiring a designated communications provider to implement or build a systemic weakness, or a systemic vulnerability, into a form of electronic protection; or (b) preventing a designated communications provider from rectifying a systemic weakness, or a systemic vulnerability, in a form of electronic protection".
They cannot ask a provider to "implement or build a new decryption capability", or "render systemic methods of authentication or encryption less effective", or introduce a "selective" vulnerability or weakness that would "jeopardise the security of any information held by any other person", or create "a material risk that otherwise secure information can be accessed by an unauthorised third party".
These two definitions were added to the legislation:
There's now also a lengthy definition of "target technology" that refers to a service, device, piece of software, or "particular update of software" or whatever that "is used, or is likely to be used, (whether directly or indirectly) by a particular person" whether or not the person can be identified.systemic vulnerability means a vulnerability that affects a whole class of technology, but does not include a vulnerability that is selectively introduced to one or more target technologies that are connected with a particular person. For this purpose, it is immaterial whether the person can be identified.
systemic weakness means a weakness that affects a whole class of technology, but does not include a weakness that is selectively introduced to one or more target technologies that are connected with a particular person. For this purpose, it is immaterial whether the person can be identified.
That's the law's intent anyway. What this might mean in practice is still unknown. Whether any of this is even technically feasible is a question for another time.
Must read: Everyone will use encryption, Australia should get over it
WHAT CAN AGENCIES ASK FOR?
The list of "acts or things" that can be requested runs for two pages. The first is "removing one or more forms of electronic protection that are or were applied by, or on behalf of, the provider". Electronic protection is defined as an authentication system or encryption.It also includes providing technical information, "installing, maintaining, testing or using software or equipment", "assisting with the testing, modification, development or maintenance of a technology or capability", "modifying, or facilitating the modification of, any of the characteristics of a service", and "substituting, or facilitating the substitution of, a service provided by the designated communications provider" with another service.
And quite a bit more.
ARE THERE ANY LIMITS ON THIS?
Notices can't be given unless they're "reasonable and proportionate", and the compliance with the request is "practicable" and "technically feasible".The decision-maker has to take into account things such as the interests of national security; the interests of law enforcement; the legitimate interests of the designated communications provider; the objectives of the request; the availability of other means to achieve the objectives; whether the request is the least intrusive form of assistance with respect to "persons whose activities are not of interest"; and "the legitimate expectations of the Australian community relating to privacy and cybersecurity".
WHO DECIDES WHAT'S REASONABLE, ETC?
The person issuing the notice.HOW MUCH OF THIS WILL BE PUBLIC?
Almost none of it. There are hefty penalties for revealing any aspect of a notice, except in situations such as referring a complaint to IGIS or the Commonwealth Ombudsman, or in other legal proceedings.Agencies will report the number of notices issued annually. Communications providers can report the number of notices they've received in periods no shorter than six months.
WHAT ELSE IS IN THE NEW LAW?
There's changes to the computer access warrant system, including giving covert computer access powers to "law enforcement agencies investigating certain federal offences".An electronic device found while executing a warrant can now be moved to another place for analysis for 30 days, up from 14 days. Australian Border Force can now seize and examine an electronic device for 30 days, up from 72 hours.
ASIO can now "require a person with knowledge of a computer or a computer system to provide assistance that is reasonable and necessary to gain access to data on a device that is subject to an ASIO warrant".
Also see: Encryption debate reminiscent of climate change arguments
IT'S THE LAW NOW, SO WHAT HAPPENS NEXT?
Agencies can start issuing notices as soon as they like.Labor reckons its amendments to the legislation will be considered when Parliament resumes sitting in February 2019. The Parliamentary Joint Committee on Intelligence and Security will continue its examination of the legislation through to April.
The Independent National Security Legislation Monitor must "review the operation, effectiveness and implications" of the new laws after 18 months, so around June 2020.
https://www.zdnet.com/article/whats-actually-in-australias-encryption-laws-everything-you-need-to-know/?utm_referrer=https%3A%2F%2Fzen.yandex.com
Guest- Guest
Re: Australia Becomes First Western Nation to Ban Secure Encryption
pismejker wrote:trenutno imam 256bitno kriptiranje...
imaš da
a spajaš se na web stranice i internet općenito preko nekog CDN
https://en.wikipedia.org/wiki/Content_delivery_network
poput CloudFlare-a
https://en.wikipedia.org/wiki/Cloudflare
oni su "Man in the middle", imaju ključ i mogu čitati tvoju enripciju
https://en.wikipedia.org/wiki/Man-in-the-middle_attack
https://security.stackexchange.com/questions/107835/does-a-content-delivery-network-cdn-interrupt-end-to-end-security
https://security.stackexchange.com/questions/177291/why-cloudflare-is-a-mitm-attack
Guest- Guest
Re: Australia Becomes First Western Nation to Ban Secure Encryption
regularni migrant wrote:pismejker wrote:trenutno imam 256bitno kriptiranje...
imaš da
a spajaš se na web stranice i internet općenito preko nekog CDN
https://en.wikipedia.org/wiki/Content_delivery_network
poput CloudFlare-a
https://en.wikipedia.org/wiki/Cloudflare
oni su "Man in the middle", imaju ključ i mogu čitati tvoju enripciju
https://en.wikipedia.org/wiki/Man-in-the-middle_attack
https://security.stackexchange.com/questions/107835/does-a-content-delivery-network-cdn-interrupt-end-to-end-security
https://security.stackexchange.com/questions/177291/why-cloudflare-is-a-mitm-attack
Gnječo??Ljubi te brat..!!! ..CDNovi me ne brinu,nego do njih i poslije njih,kad mi je promet kriptiran..
E sad,koristim VPN Cajberghost,koji podrzava P2P protokol u punom smislu i 256bitnu enkripciju...
CDNovi su "moji" serveri,odnosno od CajberGusta,pa tak opodaci ostaju "unutar obitelji"..bar se nadam..
Guest- Guest
Re: Australia Becomes First Western Nation to Ban Secure Encryption
pismejker wrote:
E sad,koristim VPN Cajberghost,koji podrzava P2P protokol u punom smislu i 256bitnu enkripciju...
da, ti imaš VPN, tvoj ISP ne vidi što radiš, no CDN vidi jer mu tvoj VPN šalje ključ, tamo te hvata NSA / CIA
ako si nebitan lik ne trebaš brinuti, nikog nije briza za tvoju pornografiju
Guest- Guest
Re: Australia Becomes First Western Nation to Ban Secure Encryption
to se trazi...Golotinja ostaje samo moja..ebo one bolesnike iz napomenutih troslovnih devijantnih organizacija...PUJ..!!!regularni migrant wrote:pismejker wrote:
E sad,koristim VPN Cajberghost,koji podrzava P2P protokol u punom smislu i 256bitnu enkripciju...
da, ti imaš VPN, tvoj ISP ne vidi što radiš, no CDN vidi jer mu tvoj VPN šalje ključ, tamo te hvata NSA / CIA
ako si nebitan lik ne trebaš brinuti, nikog nije briza za tvoju pornografiju
Nego,kako si ti,sto se nadurio?
Guest- Guest
Re: Australia Becomes First Western Nation to Ban Secure Encryption
dobro dakle,vlasti brine kriptiranje podataka..bas dobro...ameri se to nisu usudili staviti pod ban,nisu Kanadjani,niti zapadna Europa...
vidjet cemo kako to prodje u Australiji..
vidjet cemo kako to prodje u Australiji..
Guest- Guest
Re: Australia Becomes First Western Nation to Ban Secure Encryption
Hacked files suggest NSA monitored Middle East banks
https://www.aljazeera.com/news/2017/04/hacked-files-suggest-nsa-monitored-middle-east-banks-170415040035301.htmlHackers release files indicating NSA monitored global bank transfers
https://www.reuters.com/article/us-usa-cyber-swift/hackers-release-files-indicating-nsa-monitored-global-bank-transfers-idUSKBN17G1HC
vide sve, enkripcija ne pomaže
još par godina i imat će AI, SkyNet
Guest- Guest
Re: Australia Becomes First Western Nation to Ban Secure Encryption
neman ništa bitno jebe me se. neka gledaju sve.
_________________
May Allah destroy Australia
AssadNaPodmornici- Posts : 22332
2018-06-14
Re: Australia Becomes First Western Nation to Ban Secure Encryption
nemaš flaster na kameri?AssadNaPodmornici wrote:neka gledaju sve.
i mikrofonu*
Guest- Guest
Re: Australia Becomes First Western Nation to Ban Secure Encryption
neman ni mikrofon niti kameru :DOsoba wrote:nemaš flaster na kameri?AssadNaPodmornici wrote:neka gledaju sve.
i mikrofonu*
a šta će mi vidjeti? gadnu facu i slušat tvrdi slavenski jezik čudnog dijalekta :D
AssadNaPodmornici- Posts : 22332
2018-06-14
Re: Australia Becomes First Western Nation to Ban Secure Encryption
AssadNaPodmornici wrote:neman ni mikrofon niti kameru :DOsoba wrote:nemaš flaster na kameri?AssadNaPodmornici wrote:neka gledaju sve.
i mikrofonu*
a šta će mi vidjeti? gadnu facu i slušat tvrdi slavenski jezik čudnog dijalekta :D
Pa ti onda lik hakira laptop, ukrade kućne porno uradke i slike i stavi ih na Xhamster, Burek i Volafile :)
catabbath-
Posts : 12438
2015-08-22
Re: Australia Becomes First Western Nation to Ban Secure Encryption
catabbath wrote:AssadNaPodmornici wrote:neman ni mikrofon niti kameru :DOsoba wrote:nemaš flaster na kameri?AssadNaPodmornici wrote:neka gledaju sve.
i mikrofonu*
a šta će mi vidjeti? gadnu facu i slušat tvrdi slavenski jezik čudnog dijalekta :D
Pa ti onda lik hakira laptop, ukrade kućne porno uradke i slike i stavi ih na Xhamster, Burek i Volafile :)
besplatna reklama..ako je cura u prigodnim godinama,onda je dobra reklama..
nastranu zajebancija...
Nije bas jednostavno niti Ciji niti onim drugim usrancima razbiti 256bitnu enkripciju..doduse,sad postoje cak 2048 bitne enkripcije,no komercijalni alati to ne nudju..
Onijahi CND ovi,isto izmedju sebe kriptiraju ali ne svi..Dakle dobiju od tebe posiljku,dekriptiraju,odaberu najbolji nacin za komprimiranje podataka i ostalo,pa ponovno kriptiraju istim kljucem..
Osta onda Cija suha kurtza..
Guest- Guest
Similar topics
» Moderate rebels in Syria a ‘fantasy’ of Western media
» China Says It Is Ready To Assume "World Leadership", Slams Western Democracy As "Flawed"
» srbi i dalje rade na nation brandingu
» Đoković i Dodig osvojili Australia Open
» Croatian President Heads Off on Official Visit to Australia & New Zealand
» China Says It Is Ready To Assume "World Leadership", Slams Western Democracy As "Flawed"
» srbi i dalje rade na nation brandingu
» Đoković i Dodig osvojili Australia Open
» Croatian President Heads Off on Official Visit to Australia & New Zealand
Page 1 of 1
Permissions in this forum:
You cannot reply to topics in this forum