Keeping data secret, or not
Feb. 15th, 2025 11:38 am![[personal profile]](https://www.dreamwidth.org/img/silk/identity/user.png)
With secure communication online (TLS, etc.) it is interesting to see how standards develop: older ways are later judged insecure and the community slowly moves onto newer ones. I have wondered if the security services, and others, record some of the more interesting traffic that they can't decrypt yet in the hope that new developments might someday reveal the content of those once-private communications. People move on to different algorithms for actual reasons. Even if past the statute of limitations for prosecution, such records may still yield useful intelligence.
Now, given my job, I think about cryptocurrency more. There are some currencies, popular for payments for illegal services, that are designed to obscure the details of transfers. Even with normal cryptocurrencies, whose transfers are easily observed, there are tumblers which are busy accounts that take in many and various payments, and make payouts differently and rather later, so as to obscure the flows: they make it difficult to match the incoming funds against the outgoing.
I had already been wondering if statistical analysis of activity around tumblers may at least circumstantially reveal repeated flows for habitual users. Now I also wonder if some of the privacy-enhanced cryptocurrencies may be found to be less private than currently assumed, which would be interesting given that the blockchain records all the data publicly and long-term.
In short: as new discoveries uncover historical information, perhaps some people have bad surprises waiting for them.
Now, given my job, I think about cryptocurrency more. There are some currencies, popular for payments for illegal services, that are designed to obscure the details of transfers. Even with normal cryptocurrencies, whose transfers are easily observed, there are tumblers which are busy accounts that take in many and various payments, and make payouts differently and rather later, so as to obscure the flows: they make it difficult to match the incoming funds against the outgoing.
I had already been wondering if statistical analysis of activity around tumblers may at least circumstantially reveal repeated flows for habitual users. Now I also wonder if some of the privacy-enhanced cryptocurrencies may be found to be less private than currently assumed, which would be interesting given that the blockchain records all the data publicly and long-term.
In short: as new discoveries uncover historical information, perhaps some people have bad surprises waiting for them.
no subject
Date: 2025-02-15 07:23 pm (UTC)One concept in encryption is 'secure enough for long enough'. If the message is 'We attack Monday morning' and the message is not decrypted until Tuesday, after the attack, then it was good enough encryption. Thus there's lots of 'it depends' on how good the security needs to be.
One advantage of breaking old message traffic in criminal proceedings would be to use it to rattle people. If you're interrogating someone and casually slip 'When you told George to kill Freddy on December 6, 1992...' it could have an unnerving effect since they've thought they were clean on a killing that was over 30 years ago.
This news about the UK trying to force Apple to break their encryption is quite troubling. Apparently Apple is considering just turning it off for the UK, which would probably be a field day for the Tabloids vs the Pols.
no subject
Date: 2025-02-25 03:14 pm (UTC)Good point that is an important criterion. I bet it's an oft-forgotten one!
no subject
Date: 2025-02-25 05:52 pm (UTC)Oh, yeah. I remember Clipper and also DeCSS. I have/had the two t-shirts that had the complete code for DeCSS.
no subject
Date: 2025-02-16 10:04 am (UTC)no subject
Date: 2025-02-25 03:22 pm (UTC)