Encrypt and decrypt texts
Stumbled on this so far free sure.
Stumbled on this so far free sure.
Follow along with the video below to see how to install our site as a web app on your home screen.
Note: This feature may not be available in some browsers.
www.zdnet.com
Me no habloI just use old school encryption techniques
ђㄖ ⓤ Øʳ ❺ KⓘⓄ Ⓞ ⓒⓞaίE?
Me no hablo
Sorry i had to run a different encryption protocol, that first one was too weak, revised encryption now shown, virtually uncrackable now, brodriguez
This one is pretty incognito too, brotatoe.
Potatoe skins and cheese mmm can confirm this to be true and accurate!Ran it through my best decryption algorithm.
Decryption result: I suck penis for potatoe shavings, bro
Can you verify if accurate?
Feel free to chime in or ask questions. IT Security is my job of well over a decade now. I am certified via CISSP, and I am working on my Certified Ethical Hacker and Offensive Security Certified Professional certs too. Can't wait to get those bad boys done!! But yeah I'm happy to help people be safer, more secure, and more anonymous on the internet!
Opinion on Threema?Thanks for sharing this. However, I must say, InfoEncrypt looks rather...mediocre... Not great. First off they really should use AES 256 at least. Also the way it is encrypted there are multiple vectors of attack: if someone took over the web app, they could potentially see everything everyone is encrypting. Or they could try to man-in-the-middle it and intercept your clear-text message before it is encrypted. Or a compromise of your PC could mean the attackers could be keylogging what you type, they could be able to see your screen and read what you encrypt/decrypt, etc. I would honestly rather have this be a little utility that you downloaded instead.
It seems like the use here is that you'd write your message, encrypt it with a password, then paste it into your text or wherever and the receiver would have to know the password, paste it into this tool, then use the password to decrypt it. Is that correct? If so, How is that any better than PGP? AES is ideal for data at REST. But messages are not at rest, that are in transit. PGP would be stronger for this use case as it has an additional layer of security--which is that ONLY the person with the private key and password that corresponds to the public key used to encrypt the message can decrypt the message. This is why, after 30 years, PGP is still on top and still considered very strong encryption (granted that people need to update their keys to be AT LEAST 2048 bit, preferably 4096).
Personally, I would say PGP is the best, but hoenstly for sensitive conversations like this, I actually prefer Wickr. Wickr is now open source, which is HUGE, because all the white/red/black hat hackers that live and breath hacking have been reviewing Wickr's code, looking for vulnerabilities or backdoors, etc. This makes it a much, much stronger solution in the end.
Wickr uses 256 bit encryption (As opposed to 128 bit like InfoEncrypt) and on top of that allows you, the sender, to dictate when your messages are deleted. YOU get to say, burn this message 1 hour after reading. No email platform does that (that I'm aware of). This circumvents one of the biggest concerns I have with interacting with vendors: they don't delete my messages. That means that there is a record in their inbox of me saying "Hi! Do you have blah in stock? It will cost this much, right? Let me know" then next email saying "Alright I paid you with <some crypto> here is my address!" (I always encrypt my address in PGP at the very least, but still).
Wickr is honestly probably one of, if not the most secure and private message platforms available.
Feel free to chime in or ask questions. IT Security is my job of well over a decade now. I am certified via CISSP, and I am working on my Certified Ethical Hacker and Offensive Security Certified Professional certs too. Can't wait to get those bad boys done!! But yeah I'm happy to help people be safer, more secure, and more anonymous on the internet!
I haven't done freelance work in the past, i am relatively new to it all. I used to do stuff back when I was a teen, then when I started using drugs I stopped, but started studying again about a year ago when ine of my coworkers invited me to a hackathon. I'm getting these certs as they directly relate to and increase my respect within my field of work (and marketability, but Im not looking to change jobs at all, I love where I work). I could potentially help, I won't do anything illegal though. White hat only. If you're interested or want advice feel free to PM me.So your a hacker? Do you do freelance work? Like if i was having an issue where only hacking could help, are you the guy for the job?
The one thing that concerns me most is that Threema must be purchased. The reason this is a concern is because that means somewhere in your account, there must be some record of a licensing key. Somewhere in some database, that licensing key must be tied to your username or account ID. Otherwise the app wouldn't function and would be at risk of pirating.Opinion on Threema?
What is it likeI just use old school encryption techniques
?ǝuıɐɔoɔ ɟo sɯɐɹɓolıʞ ގ ɹoɟ ɥɔnɯ ʍoH
That doesn't do shit. It's like the idea when people used "SWIM" or "My cat is on 500 mg tren Ace". It just doesn't hold up in court.Can’t you just add a auto signature to every text that says something like
- the above is strictly fictional and for entertainment purposes only.
lol 15 years ago everyone had that in their signature line of their message board profile on these steron boards. Good times
This would only be true if you're a political target or some major player being investigated. They have to get you to actually download the Spyware onto your phone first top. It's not like every phone is factory installed with government screenshare apps. Well, maybe Huawei lol. I'm sure they're sending everything to China.From what I've heard they don't help you if you are dealing with the government. They have software that lets them see and hear everything you do on a smartphone in real time. They can 100% see Whatsapp, Telegram etc service messages and those are all end to end encrypted.
I agree that all the loss of information occurs when we ourselves put something on the phone.This would only be true if you're a political target or some major player being investigated. They have to get you to actually download the Spyware onto your phone first top. It's not like every phone is factory installed with government screenshare apps. Well, maybe Huawei lol. I'm sure they're sending everything to China.
Shot of it: this isn't built in ti every smart phone. You have you be targeted. That could mean getting a text with a link. You click the link and nothing happens. Weird, okay whatever. But in the background you just rooted for your phone are allowing attackers to spy on everything you do, see your screen activate your camera, etc.
I really like this app calls "Access Dots". It's amazing. It puts a dot of the color and at the location of your choice on your phone screen whenever your mic or camera is activated. I have blue for microphone and bright red for camera. So far it has only ever turned in while I have been taking pics or in a meeting/call. I highly recommend the app for anyone who is on the cautious side like me![]()
