XEROF

 

Blackberry not secure since 2010


The main reason to purchase a Blackberry, it's built-in encryption of messages, turns out to an hoax, the Canada government being in knowledge of the relevant encryption key since at least 2010 according to news.

Suffice to say this should hint the direction where things should go. What should be changing over time is the encryption algorithm, because it's the weak link. If your algorithm never changes over time, how can you expect it not be cracked ?

Ideally, the encryption key should be a dynamically generated algorithm based on so many parameters that it makes it not uncrackable, but substantially expensive for even the most sophisticated surveillance.

Posted on 15-April-2016 00:09 | Category: News | comment[0] | trackback[0]

 

 

<-- previous page

< April >
0102030405
0607080910
1112131415
1617181920
2122232425
2627282930



 

 

This site
Home
Articles

DevTools
CPU-Z
EditPlus
ExplorerXP
Kill.exe
OllyDbg
DependencyWalker
Process Explorer
autoruns.exe
Araxis
COM Trace injection
CodeStats
NetBrute
FileMon/Regmon
BoundsChecker
AQTime profiler
Source monitor
GDI leaks tracking
Rootkit revealer
Rootkit removal
RunAsLimitedUser(1)
RunAsLimitedUser(2)

 

 

Liens
Le Plan B
Un jour à Paris
Meneame
Rezo.net (aggr)
Reseau voltaire
Cuba solidarity project
Le grand soir
L'autre journal
Le courrier suisse
L'Orient, le jour
Agoravox (aggr)