1,313 votes and 260 comments so far on Reddit
It means that the amount of work required for an opponent to read the message is greater than the amount of work that opponent would be willing to expend. In practice this is all guesswork. The opponent guesses at the value of reading the message
Rubber-hose cryptanalysis. Also see XKCD #538 A very strong disk encryption setup (e.g. full system encryption with authenticity checking and no plaintext boot partition) is required to stand a chance against professional attackers who are able to tamper with your system before you use it.
For all of you quoting XKCD or talking about rubber hose cryptography, I have three words: Public Key Cryptography There is no reason why a keypair can''t be generated on a safe computer in a safe country and only the public key gets loaded into the camera, while the private key remains safe.
Comic borrowed from XKCD Even if you''re subject to rubber-hose cryptanalysis , you can just give away the outer (non-secret) volume password with only trash data. And, if you''ve already destroyed the header drive (or didn''t take it from its safe place), it''s impossible to decrypt and is effectively just a …
Rubber-hose cryptanalysis. Also see XKCD #538 A very strong disk encryption setup (e.g. full system encryption with authenticity checking and no plaintext boot partition) is required to stand a chance against professional attackers who are able to tamper with your system before you use it.
Clive Robinson • February 13, 2010 6:40 AM @ J.D., "The only totally realistic cryptanalytic technique that I can imagine would hold the attention of the average comic-book reader for longer than a page would be rubber hose cryptanalysis." Yeah or whatever else
Yeah, this is a pretty well worn infosec in-joke more commonly referred to as a "rubber hose attack," meaning that no matter how super uncrackable your shit is, if someone REALLY wants it they''re just going to torture it out of you. Used in casual conversation
Password recovery from the password holder by exploiting a procedural goof (password on a postit note, master password list), rubber-hose cryptanalysis (obligatory XKCD), legal variants (involving use of expressions on the tune of contempt of court
And then (as the xkcd comic at the top of the page illustrates) there''s the age-old standby of rubber hose cryptoanalysis - beating/torturing the key out of a holder. (The name comes from the rather vivid image of the keyholder being beaten across their bare feet with a rubber hose).
2020/11/5· There’s no reason to think that Bitcoin is more resistant to rubber hose cryptanalysis than other financial instruments. If a US prosecutor can bring evidence showing that you are in control of a stolen asset, cryptography isn’t going to save you from being indicted.
For all of you quoting XKCD or talking about rubber hose cryptography, I have three words: Public Key Cryptography There is no reason why a keypair can''t be generated on a safe computer in a safe country and only the public key gets loaded into the camera, while the private key remains safe.
Today I cam across a term I’d not heard of: Rubber-hose Cryptanalysis. Wikipedia = In cryptography , rubber-hose cryptanalysis is the extraction of cryptographic secrets (e.g. the password to an encrypted file) from a person by coercion or torture ,in contrast to a mathematical or technical cryptanalytic attack .
And then (as the xkcd comic at the top of the page illustrates) there''s the age-old standby of rubber hose cryptoanalysis - beating/torturing the key out of a holder. (The name comes from the rather vivid image of the keyholder being beaten across their bare feet with a rubber hose).
1,313 votes and 260 comments so far on Reddit
Today I cam across a term I’d not heard of: Rubber-hose Cryptanalysis. Wikipedia = In cryptography , rubber-hose cryptanalysis is the extraction of cryptographic secrets (e.g. the password to an encrypted file) from a person by coercion or torture ,in contrast to a mathematical or technical cryptanalytic attack .
Cryptography is the art of creating mathematical assurances for who can do what with data, including but not limited the classical example of use the following search parameters to narrow your results: subreddit:subreddit find submissions in "subreddit" author:username
Cryptographic systems often rely on the secrecy of cryptographic keys given to users. Many schemes, however, cannot resist coercion attacks where the user is forcibly asked by an attacker to reveal the key. These attacks, known as rubber hose cryptanalysis, are often the easiest way to defeat cryptography…
For all of you quoting XKCD or talking about rubber hose cryptography, I have three words: Public Key Cryptography There is no reason why a keypair can''t be generated on a safe computer in a safe country and only the public key gets loaded into the camera, while the private key remains safe.
1,313 votes and 260 comments so far on Reddit
Always bear in mind that a determined enough attacker or organisation will probably try to obtain data via other means (subversion of the running system) or may simply resort to rubber hose cryptography.
In cryptography, rubber-hose cryptanalysis is the extraction of cryptographic secrets (e.g. the password to an encrypted file) from a person by coercion or torture, in contrast to a mathematical or technical cryptanalytic attack. …
2020/7/9· He was pretty sure that the most common ways of breaking cryptography were , drugs and money, with a little blackmail thrown in for good measure. Coercion is often called rubber-hose cryptanalysis , and is much cheaper and easier than the mathematical kind.
2018/2/13· Rubber-hose cryptanalysis will take care of that. Even if you actually separate yourself from the second factor, parties interested in the contents of your safe will probably make very sure that''s a true story before letting you go.
Password recovery from the password holder by exploiting a procedural goof (password on a postit note, master password list), rubber-hose cryptanalysis (obligatory XKCD), legal variants (involving use of expressions on the tune of contempt of court