Knowledge

Secure communication

Source 📝

187:– a rule to convert a piece of information (for example, a letter, word, phrase, or gesture) into another form or representation (one sign into another sign), not necessarily of the same type. In communications and information processing, encoding is the process by which information from a source is converted into symbols to be communicated. Decoding is the reverse process, converting these code symbols back into information understandable by a receiver. One reason for coding is to enable communication in places where ordinary spoken or written language is difficult or impossible. For example, semaphore, where the configuration of flags held by a signaler or the arms of a 1978: 652:
the downloader, or had knowledge of the use to which unknown others might be putting their connection. An example of this was the Tammie Marson case, where neighbours and anyone else might have been the culprit in the sharing of copyright files. Conversely, in other cases, people deliberately seek out businesses and households with unsecured connections, for illicit and anonymous Internet usage, or simply to obtain free
88:. Secure communication includes means by which people can share information with varying degrees of certainty that third parties cannot intercept what is said. Other than spoken face-to-face communication with no possible eavesdropper, it is probable that no communication is guaranteed to be secure in this sense, although practical obstacles such as legislation, resources, technical issues (interception and 1988: 1044: 407:("hidden writing") is the means by which data can be hidden within other more innocuous data. Thus a watermark proving ownership embedded in the data of a picture, in such a way it is hard to find or remove unless you know how to find it. Or, for communication, the hiding of important data (such as a telephone number) in apparently innocuous data (an MP3 music file). An advantage of steganography is 25: 352:" attack whereby a third party who can 'see' the establishment of the secure communication is made privy to the encryption method, this would apply for example to the interception of computer use at an ISP. Provided it is correctly programmed, sufficiently powerful, and the keys not intercepted, encryption would usually be considered secure. The article on 419:
Unwanted or malicious activities are possible on the web since the internet is effectively anonymous. True identity-based networks replace the ability to remain anonymous and are inherently more trustworthy since the identity of the sender and recipient are known. (The telephone system is an example
651:
the connection – that is, use it without the owner being aware. Since many connections are left open in this manner, situations where piggybacking might arise (willful or unaware) have successfully led to a defense in some cases, since it makes it difficult to prove the owner of the connection was
562:
specialist cited in the same source, "Security-conscious corporate executives routinely remove the batteries from their cell phones" since many phones' software can be used "as-is", or modified, to enable transmission without user awareness and the user can be located within a small distance using
269:
Each of the three types of security is important, and depending on the circumstances, any of these may be critical. For example, if a communication is not readily identifiable, then it is unlikely to attract attention for identification of parties, and the mere fact a communication has taken place
160:, but the conversation would remain clear to authorized parties. As secrecy was paramount, the location of the Green Hornet was only known by the people who built it and Winston Churchill. To maintain secrecy, the Green Hornet was kept in a closet labeled 'Broom Cupboard.'' The Green Hornet used a 99:
With many communications taking place over long distance and mediated by technology, and increasing awareness of the importance of interception issues, technology and its compromise are at the heart of this debate. For this reason, this article focuses on communications mediated or intercepted by
635:
is not tappable, nor that the proxy does not keep its own records of users or entire dialogs. As a result, anonymous proxies are a generally useful tool but may not be as secure as other systems whose security can be better assured. Their most common use is to prevent a record of the originating
605:
Analogue landlines are not encrypted, it lends itself to being easily tapped. Such tapping requires physical access to the line which can be easily obtained from a number of places, e.g. the phone location, distribution points, cabinets and the exchange itself. Tapping a landline in this way can
428:
Recently, anonymous networking has been used to secure communications. In principle, a large number of users running the same system, can have communications routed between them in such a way that it is very difficult to detect what the complete message is, which user sent it, and where it is
624:
system of any kind (payphone, Internet cafe) is often secure, however if that system is used to access known locations (a known email account or 3rd party) then it may be tapped at the far end, or noted, and this will remove any security benefit obtained. Some countries also impose mandatory
640:, or address, being left on the target site's own records. Typical anonymous proxies are found at both regular websites such as Anonymizer.com and spynot.com, and on proxy sites which maintain up to date lists of large numbers of temporary proxies in operation. 553:
Cellphones can easily be obtained, but are also easily traced and "tapped". There is no (or only limited) encryption, the phones are traceable – often even when switched off – since the phone and SIM card broadcast their International Mobile Subscriber Identity
343:
is a method in which data is rendered hard to read by an unauthorized party. Since encryption methods are created to be extremely hard to break, many communication methods either use deliberately weaker encryption than possible, or have
152:. In the beginning, the calls were made using a voice scrambler, as this was thought to be secure. When this was found to be untrue, engineers started to work on a whole new system, which resulted in the Green Hornet or 706:– some email networks are designed to provide encrypted and/or anonymous communication. They authenticate and encrypt on the users own computer, to prevent transmission of plain text, and mask the sender and recipient. 1000:
Pell, Stephanie K., and Christopher Soghoian. 2014. "Your secret stingray's no secret anymore: The vanishing government monopoly over cell phone surveillance and its impact on national security and consumer privacy."
270:(regardless of content) is often enough by itself to establish an evidential link in legal prosecutions. It is also important with computers, to be sure where the security is applied, and what is covered. 631:
are another common type of protection, which allow one to access the net via a third party (often in a different country) and make tracing difficult. Note that there is seldom any guarantee that the
367:?" If the response is affirmative, then the conversation proceeds in Navajo, otherwise it uses the common language of the two speakers. This method does not generally provide 80:
is when two entities are communicating and do not want a third party to listen in. For this to be the case, the entities need to communicate in a way that is unsusceptible to
686:
to secure all instant messages to other users of the same software. Some instant messaging clients also offer end-to-end encrypted file transfer support and group messaging.
558:). It is possible for a cellphone company to turn on some cellphones when the user is unaware and use the microphone to listen in on you, and according to James Atkinson, a 363:
is a lower security method to generally increase the percentage of generic traffic which is encrypted. This is analogous to beginning every conversation with "Do you speak
278:
A further category, which touches upon secure communication, is software intended to take advantage of security openings at the end-points. This software category includes
191:
encodes parts of the message, typically individual letters and numbers. Another person standing a great distance away can interpret the flags and reproduce the words sent.
348:
inserted to permit rapid decryption. In some cases government authorities have required backdoors be installed in secret. Many methods of encryption are also subject to "
359:
Encryption can be implemented in a way that requires the use of encryption, i.e. if encrypted communication is impossible then no traffic is sent, or opportunistically.
109:, an approach under present development that achieves security in general at the potential cost of compelling obligatory trust in corporate and government bodies. 457:
Typically, an unknown device would not be noticed, since so many other devices are in use. This is not assured in reality, due to the presence of systems such as
35: 989: 1076: 665: 741:
Several secure communications networks, which were predominantly used by criminals, have been shut down by law enforcement agencies, including:
46: 514:, or even in extreme cases by monitoring the tiny electrical signals given off by keyboard or monitors to reconstruct what is typed or seen ( 387: 938:, Boston Studies in the Philosophy and History of Science, vol. 324, Cham: Springer International Publishing, pp. 159–187, 492:
The placing covertly of monitoring and/or transmission devices either within the communication device, or in the premises concerned.
465:, which can monitor communications over entire networks, and the fact that the far end may be monitored as before. Examples include 843: 555: 1991: 799: 536:
beam off a window of the room where a conversation is held, and detecting and decoding the vibrations in the glass caused by the
462: 1800: 1595: 594:) track and store users' position information, so that movements for months or years can be determined by examining the phone. 669: 1048: 951: 901: 881: 1220: 1069: 411:, that is, unless one can prove the data is there (which is usually not easy), it is deniable that the file contains any. 1351: 697: 1770: 1825: 64: 317:
which check all web pages being read and identify and remove common nuisances contained. As a rule they fall under
1981: 1062: 226:" and similar anonymous group structures – it is difficult to identify who said what when it comes from a "crowd" 597:
The U.S. Government also has access to cellphone surveillance technologies, mostly applied for law enforcement.
825: 648: 383: 259:
Random traffic – creating random data flow to make the presence of genuine communication harder to detect and
2027: 2012: 2017: 1316: 1291: 647:") are left in their unsecured state. The effect of this is that any person in range of the base unit can 230: 1941: 1897: 1301: 794: 390:
ensures that a wireless communication link is provably secure with communications and coding techniques.
1014: 591: 223: 506:
Any security obtained from a computer is limited by the many ways it can be compromised – by hacking,
2022: 1695: 1331: 1026: 714:
provide a higher level of anonymity by using a network of anonymizing intermediaries, similar to how
1931: 1835: 1805: 1500: 1278: 1177: 772: 729: 675: 360: 349: 279: 39:
that states a Knowledge editor's personal feelings or presents an original argument about a topic.
1926: 1795: 1665: 1381: 777: 715: 487: 434: 293:
These types of activity are usually addressed with everyday mainstream security methods, such as
209: 1953: 1946: 1785: 1712: 1560: 42: 1958: 972: 679: 653: 408: 149: 126: 990:
Wall Street Journal: How concerned are you that the iPhone tracks and stores your location?
725: 567:
and now using built in GPS features for newer models. Transceivers may also be defeated by
559: 511: 345: 298: 85: 8: 1750: 1238: 1156: 1146: 1141: 1085: 821: 1740: 1545: 1535: 515: 1508: 1389: 1136: 1121: 947: 897: 877: 848: 767: 507: 501: 318: 283: 239: 145: 105: 724:
and web chat – Some IRC clients and systems use client-to-server encryption such as
1480: 939: 782: 527: 260: 122: 621: 1730: 1660: 1589: 1555: 1540: 1452: 1419: 1394: 933: 683: 628: 606:
enable an attacker to make calls which appear to originate from the tapped line.
458: 177:
Security can be broadly categorized under the following headings, with examples:
943: 1490: 1286: 750: 643:
A recent development on this theme arises when wireless Internet connections ("
368: 188: 134: 2006: 1936: 1735: 1409: 914: 837: 804: 568: 564: 470: 446: 404: 399: 376: 234: 216:
Hiding the parties to a communication – preventing identification, promoting
204: 156:. With the Green Hornet, any unauthorized party listening in would just hear 81: 1720: 1675: 1467: 1296: 1230: 1093: 829: 703: 572: 161: 118: 93: 356:
examines the key requirements for certain degrees of encryption security.
1765: 1685: 1630: 1550: 1054: 364: 310: 194: 157: 130: 1871: 1815: 1745: 1620: 1615: 1565: 1530: 1523: 1485: 1475: 1414: 1200: 1111: 1101: 746: 637: 579: 537: 340: 335: 199: 89: 1702: 1690: 1680: 1645: 1610: 1605: 1518: 1424: 1326: 1258: 1195: 1106: 742: 707: 632: 615: 442: 372: 294: 217: 1887: 1861: 1790: 1650: 1640: 1625: 1570: 1447: 1399: 1366: 1341: 1321: 1306: 1151: 1116: 532:
Sounds, including speech, inside rooms can be sensed by bouncing a
466: 353: 711: 1910: 1905: 1856: 1670: 1404: 1371: 1361: 1336: 1268: 1248: 1190: 1131: 1125: 919: 816: 314: 306: 287: 245: 153: 141: 666:
Comparison of instant messaging clients § Secure messengers
1963: 1810: 1356: 1311: 1263: 1215: 1043: 587: 583: 430: 302: 140:
One of the most famous systems of secure communication was the
1866: 1840: 1780: 1755: 1513: 1457: 1442: 1346: 1253: 1210: 1205: 1185: 853: 644: 533: 476: 248:
methods – through unauthorized third-party systems, or relays
1655: 1434: 693: 689: 184: 36:
personal reflection, personal essay, or argumentative essay
1725: 1635: 1243: 833: 721: 438: 375:
but it does protect the content of the conversation from
256:"Security by obscurity" – similar to needle in a haystack 92:), and the sheer volume of communication serve to limit 670:
Comparison of VoIP software § Secure VoIP software
788: 543: 659: 452: 429:ultimately coming from or going to. Examples are 253:Hiding the fact that a communication takes place 2004: 1027:'Extortionist' turns Wi-Fi thief to cover tracks 973:"High-tech bugging techniques, and a costly fix" 876:(2nd Edition, published by Thomson, April 2005) 324: 181:Hiding the content or nature of a communication 167: 1015:Open Wi-Fi proves no defence in child porn case 1070: 16:Anonymous communicating between two entities 874:Introduction to Wireless and Mobile Systems 521: 1084: 1077: 1063: 414: 129:that allowed secure communication between 65:Learn how and when to remove this message 844:NSA warrantless surveillance controversy 836:to tap all of its clients' Internet and 800:Comparison of instant messaging clients 301:, programs that identify or neutralize 2005: 495: 423: 1058: 935:The Early History of Voice Encryption 931: 761: 678:– Some instant messaging clients use 625:registration of Internet cafe users. 609: 309:, and web filtering programs such as 1987: 172: 18: 789:Software selections and comparisons 321:rather than secure communications. 273: 13: 912:The schematics are illustrated in 229:Anonymous communication devices – 148:had to discuss vital matters with 14: 2039: 1036: 544:Systems offering partial security 164:. SIGSALY was also never broken. 1986: 1977: 1976: 1042: 477:Methods used to "break" security 393: 23: 896:(2nd Ed, Addison Wesley, 2003) 736: 718:works, but at a higher latency. 660:Programs offering more security 453:Anonymous communication devices 420:of an identity-based network.) 1020: 1008: 994: 983: 965: 925: 906: 886: 866: 826:Electronic Frontier Foundation 824:, a 2006 lawsuit in which the 692:– Some VoIP clients implement 384:Information-theoretic security 1: 872:D. P. Agrawal and Q-A. Zeng, 859: 548: 329: 325:Tools used to obtain security 168:Nature and limits of security 600: 7: 1942:Cryptographic hash function 944:10.1007/978-3-319-53280-6_7 795:Comparison of VoIP software 756: 732:. This is not standardized. 10: 2044: 663: 613: 525: 499: 485: 481: 397: 333: 112: 1972: 1919: 1896: 1880: 1849: 1824: 1764: 1711: 1588: 1499: 1466: 1433: 1380: 1277: 1229: 1176: 1165: 1092: 388:physical layer encryption 1932:Timeline of cryptography 918:and describes "rotating 810: 773:Opportunistic encryption 676:Secure instant messaging 522:Laser audio surveillance 361:Opportunistic encryption 1927:Outline of cryptography 1898:Anti–computer forensics 778:Communications security 488:Covert listening device 415:Identity-based networks 231:unregistered cellphones 1954:Homomorphic encryption 1947:List of hash functions 1086:Cryptographic software 449:networks, and others. 45:by rewriting it in an 1959:End-to-end encryption 932:Bauer, Craig (2017), 700:encryption for calls. 680:end-to-end encryption 518:, which is complex). 409:plausible deniability 150:Franklin D. Roosevelt 127:Madison Square Garden 2028:Espionage techniques 2013:Secure communication 1051:at Wikimedia Commons 1049:Secure communication 822:Hepting vs. AT&T 747:Sky Global / Sky ECC 560:counter-surveillance 78:Secure communication 2018:Secret broadcasting 1003:Harv. JL & Tech 915:U.S. patent 613,809 894:Computer Networking 496:Computers (general) 424:Anonymized networks 386:technique known as 1546:Facebook Messenger 892:J.K. and K. Ross, 762:General background 610:Anonymous Internet 47:encyclopedic style 34:is written like a 2000: 1999: 1850:Service providers 1584: 1583: 1390:Check Point VPN-1 1047:Media related to 953:978-3-319-53278-3 902:978-0-321-17644-8 882:978-0-534-49303-5 849:Secret cell phone 768:Computer security 629:Anonymous proxies 578:Some cellphones ( 508:keystroke logging 502:Computer security 350:man in the middle 319:computer security 240:Anonymous proxies 173:Types of security 146:Winston Churchill 106:Trusted Computing 75: 74: 67: 2035: 2023:Internet privacy 1990: 1989: 1980: 1979: 1828:operating system 1826:Security-focused 1774: 1599: 1174: 1173: 1079: 1072: 1065: 1056: 1055: 1046: 1030: 1024: 1018: 1012: 1006: 998: 992: 987: 981: 980: 969: 963: 962: 961: 960: 929: 923: 917: 910: 904: 890: 884: 870: 783:Secure messaging 528:Laser microphone 274:Borderline cases 261:traffic analysis 123:radio controlled 70: 63: 59: 56: 50: 27: 26: 19: 2043: 2042: 2038: 2037: 2036: 2034: 2033: 2032: 2003: 2002: 2001: 1996: 1968: 1915: 1892: 1876: 1845: 1827: 1820: 1768: 1760: 1731:Java Anon Proxy 1707: 1593: 1592: 1590:Disk encryption 1580: 1556:Google Messages 1541:Signal Protocol 1495: 1462: 1429: 1376: 1273: 1225: 1168: 1161: 1088: 1083: 1039: 1034: 1033: 1025: 1021: 1013: 1009: 999: 995: 988: 984: 977:Popular Science 971: 970: 966: 958: 956: 954: 930: 926: 913: 911: 907: 891: 887: 871: 867: 862: 813: 791: 764: 759: 739: 684:forward secrecy 672: 662: 618: 612: 603: 551: 546: 530: 524: 504: 498: 490: 484: 479: 455: 426: 417: 402: 396: 338: 332: 327: 276: 189:semaphore tower 175: 170: 144:. During WWII, 121:demonstrated a 115: 71: 60: 54: 51: 43:help improve it 40: 28: 24: 17: 12: 11: 5: 2041: 2031: 2030: 2025: 2020: 2015: 1998: 1997: 1995: 1994: 1984: 1973: 1970: 1969: 1967: 1966: 1961: 1956: 1951: 1950: 1949: 1944: 1937:Hash functions 1934: 1929: 1923: 1921: 1920:Related topics 1917: 1916: 1914: 1913: 1908: 1902: 1900: 1894: 1893: 1891: 1890: 1884: 1882: 1878: 1877: 1875: 1874: 1869: 1864: 1859: 1853: 1851: 1847: 1846: 1844: 1843: 1838: 1832: 1830: 1822: 1821: 1819: 1818: 1813: 1808: 1803: 1798: 1793: 1788: 1783: 1777: 1775: 1762: 1761: 1759: 1758: 1753: 1748: 1743: 1738: 1733: 1728: 1723: 1717: 1715: 1709: 1708: 1706: 1705: 1700: 1699: 1698: 1688: 1683: 1678: 1673: 1668: 1663: 1658: 1653: 1648: 1643: 1638: 1633: 1628: 1623: 1618: 1613: 1608: 1602: 1600: 1586: 1585: 1582: 1581: 1579: 1578: 1575: 1574: 1573: 1568: 1563: 1558: 1553: 1548: 1538: 1533: 1528: 1527: 1526: 1521: 1511: 1505: 1503: 1497: 1496: 1494: 1493: 1488: 1483: 1478: 1472: 1470: 1464: 1463: 1461: 1460: 1455: 1450: 1445: 1439: 1437: 1431: 1430: 1428: 1427: 1422: 1417: 1412: 1407: 1402: 1397: 1392: 1386: 1384: 1378: 1377: 1375: 1374: 1369: 1364: 1359: 1354: 1349: 1344: 1339: 1334: 1329: 1324: 1319: 1314: 1309: 1304: 1299: 1294: 1289: 1287:BBM Enterprise 1283: 1281: 1275: 1274: 1272: 1271: 1266: 1261: 1256: 1251: 1246: 1241: 1235: 1233: 1227: 1226: 1224: 1223: 1218: 1213: 1208: 1203: 1198: 1193: 1188: 1182: 1180: 1171: 1163: 1162: 1160: 1159: 1154: 1149: 1144: 1139: 1134: 1129: 1119: 1114: 1109: 1104: 1098: 1096: 1090: 1089: 1082: 1081: 1074: 1067: 1059: 1053: 1052: 1038: 1037:External links 1035: 1032: 1031: 1029:, The Register 1019: 1017:, The Register 1007: 993: 982: 979:. August 1987. 964: 952: 924: 905: 885: 864: 863: 861: 858: 857: 856: 851: 846: 841: 840:communications 819: 812: 809: 808: 807: 802: 797: 790: 787: 786: 785: 780: 775: 770: 763: 760: 758: 755: 751:Phantom Secure 738: 735: 734: 733: 719: 701: 687: 661: 658: 614:Main article: 611: 608: 602: 599: 550: 547: 545: 542: 526:Main article: 523: 520: 500:Main article: 497: 494: 486:Main article: 483: 480: 478: 475: 454: 451: 425: 422: 416: 413: 398:Main article: 395: 392: 369:authentication 334:Main article: 331: 328: 326: 323: 275: 272: 267: 266: 265: 264: 257: 251: 250: 249: 244:Hard-to-trace 242: 237: 235:Internet cafes 227: 214: 213: 212: 210:Identity Based 207: 202: 197: 192: 174: 171: 169: 166: 114: 111: 73: 72: 31: 29: 22: 15: 9: 6: 4: 3: 2: 2040: 2029: 2026: 2024: 2021: 2019: 2016: 2014: 2011: 2010: 2008: 1993: 1985: 1983: 1975: 1974: 1971: 1965: 1962: 1960: 1957: 1955: 1952: 1948: 1945: 1943: 1940: 1939: 1938: 1935: 1933: 1930: 1928: 1925: 1924: 1922: 1918: 1912: 1909: 1907: 1904: 1903: 1901: 1899: 1895: 1889: 1886: 1885: 1883: 1879: 1873: 1870: 1868: 1865: 1863: 1860: 1858: 1855: 1854: 1852: 1848: 1842: 1839: 1837: 1834: 1833: 1831: 1829: 1823: 1817: 1814: 1812: 1809: 1807: 1804: 1802: 1799: 1797: 1794: 1792: 1789: 1787: 1784: 1782: 1779: 1778: 1776: 1772: 1767: 1763: 1757: 1754: 1752: 1749: 1747: 1744: 1742: 1739: 1737: 1734: 1732: 1729: 1727: 1724: 1722: 1719: 1718: 1716: 1714: 1710: 1704: 1701: 1697: 1694: 1693: 1692: 1689: 1687: 1684: 1682: 1679: 1677: 1674: 1672: 1669: 1667: 1664: 1662: 1659: 1657: 1654: 1652: 1649: 1647: 1644: 1642: 1639: 1637: 1634: 1632: 1629: 1627: 1624: 1622: 1619: 1617: 1614: 1612: 1609: 1607: 1604: 1603: 1601: 1597: 1591: 1587: 1576: 1572: 1569: 1567: 1564: 1562: 1559: 1557: 1554: 1552: 1549: 1547: 1544: 1543: 1542: 1539: 1537: 1534: 1532: 1529: 1525: 1522: 1520: 1517: 1516: 1515: 1512: 1510: 1507: 1506: 1504: 1502: 1498: 1492: 1489: 1487: 1484: 1482: 1479: 1477: 1474: 1473: 1471: 1469: 1465: 1459: 1456: 1454: 1451: 1449: 1446: 1444: 1441: 1440: 1438: 1436: 1432: 1426: 1423: 1421: 1418: 1416: 1413: 1411: 1410:SoftEther VPN 1408: 1406: 1403: 1401: 1398: 1396: 1393: 1391: 1388: 1387: 1385: 1383: 1379: 1373: 1370: 1368: 1365: 1363: 1360: 1358: 1355: 1353: 1350: 1348: 1345: 1343: 1340: 1338: 1335: 1333: 1330: 1328: 1325: 1323: 1320: 1318: 1315: 1313: 1310: 1308: 1305: 1303: 1300: 1298: 1295: 1293: 1292:Bouncy Castle 1290: 1288: 1285: 1284: 1282: 1280: 1279:TLS & SSL 1276: 1270: 1267: 1265: 1262: 1260: 1257: 1255: 1252: 1250: 1247: 1245: 1242: 1240: 1237: 1236: 1234: 1232: 1228: 1222: 1219: 1217: 1214: 1212: 1209: 1207: 1204: 1202: 1199: 1197: 1194: 1192: 1189: 1187: 1184: 1183: 1181: 1179: 1175: 1172: 1170: 1169:communication 1164: 1158: 1155: 1153: 1150: 1148: 1145: 1143: 1140: 1138: 1135: 1133: 1130: 1127: 1123: 1120: 1118: 1115: 1113: 1110: 1108: 1105: 1103: 1100: 1099: 1097: 1095: 1094:Email clients 1091: 1087: 1080: 1075: 1073: 1068: 1066: 1061: 1060: 1057: 1050: 1045: 1041: 1040: 1028: 1023: 1016: 1011: 1004: 997: 991: 986: 978: 974: 968: 955: 949: 945: 941: 937: 936: 928: 921: 916: 909: 903: 899: 895: 889: 883: 879: 875: 869: 865: 855: 852: 850: 847: 845: 842: 839: 838:Voice over IP 835: 831: 830:AT&T Inc. 827: 823: 820: 818: 815: 814: 806: 805:Anonymous P2P 803: 801: 798: 796: 793: 792: 784: 781: 779: 776: 774: 771: 769: 766: 765: 754: 752: 748: 744: 731: 727: 723: 720: 717: 713: 709: 705: 702: 699: 695: 691: 688: 685: 681: 677: 674: 673: 671: 667: 657: 655: 650: 646: 641: 639: 634: 630: 626: 623: 617: 607: 598: 595: 593: 589: 585: 581: 576: 574: 570: 566: 565:triangulation 561: 557: 541: 539: 535: 529: 519: 517: 513: 509: 503: 493: 489: 474: 472: 471:Internet cafe 468: 464: 460: 450: 448: 447:anonymous P2P 444: 440: 436: 432: 421: 412: 410: 406: 405:Steganography 401: 400:Steganography 394:Steganography 391: 389: 385: 380: 378: 377:eavesdropping 374: 370: 366: 362: 357: 355: 351: 347: 342: 337: 322: 320: 316: 312: 308: 304: 300: 296: 291: 289: 285: 281: 280:trojan horses 271: 263:less reliable 262: 258: 255: 254: 252: 247: 243: 241: 238: 236: 232: 228: 225: 221: 220: 219: 215: 211: 208: 206: 205:Steganography 203: 201: 198: 196: 193: 190: 186: 183: 182: 180: 179: 178: 165: 163: 159: 155: 151: 147: 143: 138: 136: 132: 128: 124: 120: 110: 108: 107: 101: 97: 95: 91: 87: 83: 82:eavesdropping 79: 69: 66: 58: 48: 44: 38: 37: 32:This article 30: 21: 20: 1766:File systems 1676:Private Disk 1166: 1022: 1010: 1002: 996: 985: 976: 967: 957:, retrieved 934: 927: 908: 893: 888: 873: 868: 832:allowed the 740: 737:Criminal use 704:Secure email 642: 627: 619: 604: 596: 577: 573:Faraday cage 552: 531: 505: 491: 456: 427: 418: 403: 381: 358: 339: 292: 277: 268: 176: 162:one-time pad 142:Green Hornet 139: 119:Nikola Tesla 116: 104: 102: 100:technology. 98: 94:surveillance 86:interception 77: 76: 61: 55:January 2015 52: 33: 1881:Educational 1686:Sentry 2020 1631:DriveSentry 1551:Google Allo 1157:Thunderbird 622:third party 538:sound waves 311:Proxomitron 195:Obfuscation 158:white noise 131:transmitter 2007:Categories 1872:NordLocker 1816:Tahoe-LAFS 1806:Rubberhose 1746:RetroShare 1621:Cryptoloop 1616:CrossCrypt 1596:Comparison 1566:TextSecure 1524:ChatSecure 1486:RetroShare 1476:Bitmessage 1415:strongSwan 1201:ChatSecure 1112:Claws Mail 1102:Apple Mail 959:2021-10-23 860:References 664:See also: 549:Cellphones 445:, various 341:Encryption 336:Encryption 330:Encryption 297:software, 286:and other 284:keyloggers 200:Encryption 90:encryption 1713:Anonymity 1703:VeraCrypt 1691:TrueCrypt 1681:Scramdisk 1646:FileVault 1611:BitLocker 1606:BestCrypt 1519:Cryptocat 1425:WireGuard 1327:MatrixSSL 1297:BoringSSL 1259:SecureCRT 1221:Profanity 1196:Centericq 1107:Autocrypt 743:EncroChat 708:Mixminion 654:bandwidth 649:piggyback 633:plaintext 616:Anonymity 601:Landlines 512:backdoors 467:payphones 459:Carnivore 443:Mixminion 373:anonymity 346:backdoors 299:firewalls 295:antivirus 218:anonymity 117:In 1898, 103:Also see 1982:Category 1888:CrypTool 1862:Tresorit 1791:eCryptfs 1751:Ricochet 1651:FreeOTFE 1641:eCryptfs 1626:dm-crypt 1571:WhatsApp 1448:Linphone 1400:Openswan 1367:TeamNote 1352:SChannel 1342:mbed TLS 1322:LibreSSL 1307:cryptlib 1239:Dropbear 1152:Sylpheed 1117:Enigmail 920:coherers 828:alleges 757:See also 712:I2P-Bote 620:Using a 354:key size 135:receiver 125:boat in 1992:Commons 1911:BusKill 1906:USBKill 1857:Freenet 1741:Vidalia 1696:History 1671:PGPDisk 1577:SimpleX 1536:Session 1531:Proteus 1405:OpenVPN 1395:Hamachi 1372:wolfSSL 1362:stunnel 1337:OpenSSL 1269:wolfSSH 1249:OpenSSH 1191:BitlBee 1137:Outlook 1132:Kontact 1126:Gpg4win 817:Freenet 592:Android 569:jamming 563:signal 516:TEMPEST 482:Bugging 473:, etc. 315:Privoxy 307:spyware 288:spyware 246:routing 154:SIGSALY 113:History 41:Please 1964:S/MIME 1811:StegFS 1721:GNUnet 1561:Signal 1509:Matrix 1357:SSLeay 1312:GnuTLS 1264:WinSCP 1216:Kopete 1167:Secure 1005:28(1). 950:  900:  880:  749:, and 668:, and 588:Google 584:iPhone 431:Crowds 365:Navajo 303:adware 224:Crowds 1867:Wuala 1841:Qubes 1836:Tails 1781:EncFS 1756:Wickr 1514:OMEMO 1481:Briar 1458:Zfone 1443:Jitsi 1347:BSAFE 1302:Botan 1254:PuTTY 1211:Jitsi 1206:climm 1186:Adium 854:Unode 811:Other 682:with 645:Wi-Fi 580:Apple 534:laser 463:unzak 1801:PEFS 1796:LUKS 1771:List 1666:LUKS 1661:geli 1656:GBDE 1453:Jami 1435:ZRTP 1420:Tinc 1317:JSSE 948:ISBN 898:ISBN 878:ISBN 710:and 698:SRTP 696:and 694:ZRTP 690:VoIP 556:IMSI 461:and 313:and 305:and 185:Code 133:and 1786:EFS 1736:Tor 1726:I2P 1636:E4M 1501:DRA 1491:Tox 1468:P2P 1382:VPN 1332:NSS 1244:lsh 1231:SSH 1178:OTR 1147:PGP 1142:p≡p 1122:GPG 940:doi 834:NSA 730:TLS 726:SSL 722:IRC 716:Tor 590:'s 582:'s 571:or 439:I2P 435:Tor 382:An 371:or 84:or 2009:: 975:. 946:, 922:". 753:. 745:, 656:. 638:IP 586:, 575:. 540:. 510:, 469:, 441:, 437:, 433:, 379:. 290:. 282:, 233:, 137:. 96:. 1773:) 1769:( 1598:) 1594:( 1128:) 1124:( 1078:e 1071:t 1064:v 942:: 728:/ 554:( 222:" 68:) 62:( 57:) 53:( 49:.

Index

personal reflection, personal essay, or argumentative essay
help improve it
encyclopedic style
Learn how and when to remove this message
eavesdropping
interception
encryption
surveillance
Trusted Computing
Nikola Tesla
radio controlled
Madison Square Garden
transmitter
receiver
Green Hornet
Winston Churchill
Franklin D. Roosevelt
SIGSALY
white noise
one-time pad
Code
semaphore tower
Obfuscation
Encryption
Steganography
Identity Based
anonymity
Crowds
unregistered cellphones
Internet cafes

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.