Party Vibe

Register

Welcome To

Can the police read private messages?

Forums Life Law Can the police read private messages?

  • This topic is empty.
Viewing 15 replies - 1 through 15 (of 28 total)
  • Author
    Replies
  • no, they can request (with a warranty thing) to see them from the server host, or from the owner of the site though.

    cool. That’s a definite plus.

    and if for instance they get a warrent to search your house for any reason .. and they sieze your pc .. they could log onto your account and see them that way

    @DaftFader 347436 wrote:

    and if for instance they get a warrent to search your house for any reason .. and they sieze your pc .. they could log onto your account and see them that way

    so delete them! :love:

    test it say there is a growing mountain of doughts coming that will bringnem out even the under 12 stoners

    encrypt your discs this is what our pansy goverment want t access to read everything . its up and down I’m not bothered about stuff like just made a cake with my daughter stuff like that who cares but if its stuff like ijust took a pedo out with a single gunshot to the head I aint so keen on em hearing it.

    true but mines on an unknown server even local ones its encrypted without the pass word if strong nasa couldn’t crack it and ive forgotten the password

    Regular police, I very much doubt it without seizing the servers. The site uses https now so all traffic from and to the server is encrypted. The messages sent privately between 2 users are private in the context that only the sender and receiver know they exist. If someone accessed either parties account though they’d have access to every sent and received PM of that user. If an attacker gained access to the server, he has everything as I don’t believe their is any obfuscation at all involved beyond the 2 users using transport encryption to read and send them.

    For your PMs to be unreadable by anyone else you’d need to encrypt the message, not just the connection to the server. You could always use PGP to encrypt PMs but that requires exchanging keys (not hard) but still involves using encryption software that most people would sooner go to prison than take the time to learn how to use it.

    There are ways of communicating privately by PM but whatever you send can be read.

    @palpa7 983159 wrote:

    encrypt your discs this is what our pansy goverment want t access to read everything . its up and down I’m not bothered about stuff like just made a cake with my daughter stuff like that who cares but if its stuff like ijust took a pedo out with a single gunshot to the head I aint so keen on em hearing it.

    Encrypting YOUR HDD will do fuck all in any way to messages held on this sites server.

    I had all my kit confiscate for selling conterfit goods took 3 half years to admit defeat and bring it all back I t the bear min on there though and bet security

    you never really delete anything its still there unless you use nasa or military tools to wie them

    Well a man from South America somewhere accused of some massive fraud had his truecrypt protected external discs taken and the FBI tried to brute force the passwords for TWO YEARS before giving up and admitting defeat.

    We also have a British chap who was a member of lulzsec (I think but definitely associated with them) who is accused of no crimes in the UK (he is facing extradition to the US though) who has been told he’ll go to prison if he does not reveal the encryption keys for them. Un-fucking-believably, if he were already in the US the 5th amendment would mean he could not be forced to turn the keys over.

    try totanoata encrypted email its amazing you have to have all repondents passwords to read itstas encyrypted highlevel on any servers the police hate this one easy to use

    @palpa7 983164 wrote:

    you never really delete anything its still there unless you use nasa or military tools to wie them

    Secure deletion is easy, just requires effort. Deleting something from the operating system just removes it from the master file table (or something) but leaves the data right where it was on the physical HDD platters meaning the OS sees it as space where it can write data to now instead of it being marked as in use. OS’es will start writing over the data as time passes but how much will depend on how long the computer runs and how much data is written to disk in that time.

    There are plenty of tools that can securely erase data anwhile there are some ridiculously paranoid methods (36 pass guttman method anyone?) to do this but your HDD is just a set of magnetic platters and a read/write head that can flip the bits on the platters between 0 and 1 and they are the only 2 options so deleting something then filling the disk or free space completely with 0s will prevent any recovery so only one pass with a secure wipe tool would be needed. Normally tools like this will use some hash function or encryption algorithm to generate 0s and 1s randomly-ish and write that to the disk but regardless, once a bit has been flipped to become a 1, there is no way of telling if that bit has always been a 1 or was previously a 0 so once data is written over by either new data or total garbage, there is no way of recovering the overwritten data, EVER, BY ANYONE.

    @palpa7 983166 wrote:

    try totanoata encrypted email its amazing you have to have all repondents passwords to read itstas encyrypted highlevel on any servers the police hate this one easy to use

    What? Maybe I’m misreading that but you say you need all the recipients passwords to send them mail? No-one should be knowing anyones passwords for anything ever. I’m gonna guess that’s a public key crypto system where each user generates 2 keys before sending any messages. One key is private and kept secret, the other key is public and could be printed in the New York Times if wanted but the public key can only encrypt messages, it can’t also decrypt them. The secret, private key that is held by the recipient is the only key that can decipher the messages, and again, the private key cannot encrypt messages so he needs to other persons public key to encrypt any replies.

    Exact way PGP (GnuPG now) works. but again, if you are picked up by anyone expert enough in rubber hose cryptography, the password for the private key can be obtained pretty quickly with a brute force attack and render ever message you have saved readable. Perfect Forward Secrecy can help get around that as it encrypts each message with a different key each time.

    Or you could use self destructing messaging services like cryptobin or onetimesecret.com (there are quite a few) which allows you to create a message which is then encrypted and you geta URL for that message. Pass the URL to the person you want, they click on it and as soon as the message has been opened, it is wiped from the system making it unrecoverable. Another benefit to this is if your communications are being intercepted, you’ll know for a fact they are if one of you ever foes to read a message and it was already destroyed by some other party reading it.

0

Voices

27

Replies

Tags

This topic has no tags

Viewing 15 replies - 1 through 15 (of 28 total)
  • You must be logged in to reply to this topic.

Forums Life Law Can the police read private messages?