General Discussion
Related: Editorials & Other Articles, Issue Forums, Alliance Forums, Region ForumsI'm shocked that no one thinks Snowden knows how to use Truecrypt
(or an equivalent).
Certainly, his hosts could use the "rubber hose" method of password cracking on him to access any encrypted data he's carrying, but that would ruin the schadenfreude that they--and much of the rest of the world--are currently wallowing in. I strongly suspect that no one has accessed his data unless he specifically allowed it.
http://en.wikipedia.org/wiki/TrueCrypt
(Excepting, of course, the possibility that someone in China proved P=NP or that Putin has a quantum computer that can do Shor's algorithm in the basement of the Kremlin. )
Romulus Quirinus
(524 posts)Poll_Blind
(23,864 posts)...that Snowden helped Greenwald get set up with encrypted messaging before communicating with him about the sensitive material he posessed, going so far as to make a YouTube video (presumably, a private one) giving him step by step instructions on how to get his setup.
I've pimped TrueCrypt here before and explained how nested, encrypted subvolumes are rubber-hose and quantum-proof but for most people here, they just don't have much application for it.
It's more for the Cryptome crowd.
Blah blah, I'm off track. But, yes, not only is your point a valid one but I read an article which clearly indicated that Snowden was security conscious encryption-wise before moving forward.
PB
Recursion
(56,582 posts)This does make me wonder what system(s) he is running.
Poll_Blind
(23,864 posts)Just my impression.
PB
Romulus Quirinus
(524 posts)The pros will be examining it with a fine-toothed comb every time he drops by the head.
bemildred
(90,061 posts)I'm sure the data is already secure and disseminated with parties he trusts. He clearly knew how to do that sort of thing and he has clear motivation. They may say he is naive, but he is not naive about that sort of thing. I suspect that is part of why the Chinese and Russia are happy to let him go.