Posted in Apple, CIA, Encryption, FBI, NSA, Personal

Apple vs FBI: The unspoken Truth on Encryption

While one can admire Apple for ‘defending’ it’s customers privacy, while also benefiting with the positive advertising. It is probably a moot, and hollow victory as the NSA and the CIA have already broken Apple security.

Not that it shouldn’t be of high importance, the resources required to do the cracking of any particular extraction of an encrypted message sent with a iPhone would most likely exceed the budget of a small country. Which is exactly the point of encryption, making it hard, and expensive to decrypt. Imagine the joviality at the NSA/CIA after the hours of decryption, that the ‘Important’ message turns out to be a high priority, top secret Cookie Recipe from you mothers cookbook.

And thereby is the unspoken truth of encryption the first one is this: you must either decrypt everything, to find what is being said, because if you can only choose strategic messages, choosing the right ones are tantamount.

During WWII monitoring enemy communication was aided by observing the frequency of communication traffic, when frequency increased, something important was being communicated. Modern military communications is continuous and unbroken, transmitting meaningless message traffic, and therefore not highlighting any particular message in the traffic stream that would be required to be decrypted. This would now be a requirement to decrypt everything, in the military traffic stream.

The second Truth is this; The assumption that you can decrypt all the messages is the hight of arrogance and ignorance. Anyone, yes anyone can create an encryption that will be impossible for a machine of any sort to decrypt, and many of these can be hidden to the point that even a human expert directly observing the message can not decipher.

Imagine hiding messages in the continuous email stream called Spam, which now constitutes more that 80% of all email traffic?

Thoughts like this keep the NSA/CIA/FBI up nights, and no matter what Bull Shit they might tell you about the need to have back doors and encryption keys it will NEVER catch all the potential secret messages that terrorists might choose to pass to each other.

Because the simplest of truths: It isn’t possible.

UPDATE: and now the E.U. politicians are talking about it. European Officials To Discuss Anti-Encryption Measures.



With 40 years experience in software development, systems design and engineering and IT operations, and Infrastructure Architecture issues. I am versed in multiple programming languages, Operating Systems and RDBMS, I have work experience ranging from microcomputers and PC’s to multiprocessor mid range Unix systems and clusters. I have experience with both wireless and wired network protocols and mediums. And I've help migrate systems into the Amazon EC2 Cloud from self hosted configurations. I collect old working computers, I'm a published Astro-photographer, I tutor, and teach almost every subject I am knowledgeable in. I have had one internet email or another since 1991. I developed Gopher sites prior to the formation of HTTP/HTML and a few websites since then. I wrote my first 'database' on a DEC PDP-11 for the DECUS Library in 1984. Specialties I specialize in Database systems, and am familiar with almost all types of RDBMS and ISAM systems short of Mainframes. I habitually reverse engineer and document everything I touch.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s