J.TrIDr3ESpPJEs ID: 2d6e2d July 18, 2018, 11:06 a.m. No.2200767   🗄️.is 🔗kun   >>2515

>>2196494

Actually, there is, but I need to get a usable prototype working before I can hand it out for betatesting and pentesting (it needs a few cryptanalysts as well).

 

It's predecessor was a project called 'FireFly' (because encrypted messages 'light up' to the NSA). Strangely enough, the NSA also have a classified algorithm with the same name:

https://www.cryptomuseum.com/intel/nsa/index.htm#type1

 

It was only ever an experimental prototype. It was a foray into uncrackable encryption (can't do anything about end point interceptions). Some of the technology design includes:

 

  • Keylogger resistant design

  • Mouselogger resistant design

  • Memory probing resistant design (limitations due to programming language)

  • Modular encryption, which includes:

— Password determined layering (EG the longer the password, the more encryption passes it applies, meaning you can easily drown out bruteforcing attacks by increasing password complexity)

— Password determined encryption modes (EG not only does the order of an encryption module change based on the password, but how it behaves can change based on the password too)

  • Anti-Quantum technology, including:

— Garbage data generation inserts

— Superimposed red herring messages (optional)

— Near OneTimePad level encryption

— Temporal encryption verification (EG you can encrypt it with a timestamp, which if combined with public posting, can be used to verify that was when you posted it when you reveal the complete password. If used for 'in-transit' messages, any delay to the arrival throws off the decryption, so observer attacks are severely hampered).

  • OS Agnostic

  • Portable

  • Can be used on any media tool.

 

It's a high mark to hit, and the tool is most definitely months away.

 

It's power is in the modular encryption system. With the exception of preventing module repeats (which can weaken encryption), it is wholly unpredictable - not even I would know what your data was encrypted with.

 

Because each module is a standalone, any flaws in one don't necessarily translate into a flaw in another, and even if you cracked one message, you would have to start again on another message because you don't know what order the encryption modules (if they were even applied!) were used in.

 

Which means from a message security standpoint, you could never break the system in one go.

 

This is the kind of technology they kill people over.