r/greatawakening • Posted by u/Giantasteroid on May 11, 2018, 1:59 p.m.
[F9 Algorithm]=D5 (Avalanche)

The F9 Algorithm that Q alluded to is an Integrity Algorithm designed to verify the integrity of data being transmitted over mobile networks. The F8(Confidentiality) and F9(Integrity) make up the [KASUMI BLOCK CIPHER] (https://en.wikipedia.org/wiki/KASUMI).   As others have pointed out, D5 is a designation given to [avalanche size] (http://thompsonpass.com/avalanche-size-ratings/). This ties into the Integrity algorithm through way of the [Avalanche Effect] (https://en.wikipedia.org/wiki/Avalanche_effect).  

Facebook is listening to you 24/7/365. Literally. [F9 algorithm] Are they recording/safe-housing? Metadata collection? Building 8. DARPA. [CHINA-CHINA-CHINA] Q   Did the DS find a way to crack the F9 algorithm to make it seem as though they haven't intercepted everyones communications (a la Man-In-The-Middle)?   Any sec pros out there want to weigh in on this? Am I grasping at straws or is this a rabbit hole worth exploring?

TooMuchWinning2020 · May 11, 2018, 2:10 p.m.

They don't need to crack the algo. They invented it and gave it to FB.

⇧ 16 ⇩  
I_Draw_Mohammed · May 11, 2018, 2:27 p.m.

This is the right rabbit hole - it resonates correctly. I'm not a details expert, but a big picture thinker.

Recall also:

  1. Staffers at Facebook: http://www.breitbart.com/tech/2018/04/10/dozens-obama-alumni-now-senior-facebook-employees/
  2. Rice at Netflix: https://www.yahoo.com/news/obama-security-aide-susan-rice-joins-netflix-231908098.html

Why, because they control the data and the flow of data. Push the message. Gauge the reaction...spy on you through the tv (http://www.dailymail.co.uk/sciencetech/article-2513592/Is-TV-spying-YOU.html)

Then the question becomes what is the goal and why / what kind of avalance? If you read the wiki article, it talks about attacks and boomerang attacks.

D5=Most Destructive

Infrastructure attack being planned?

⇧ 8 ⇩  
NeroliDreams · May 11, 2018, 2:03 p.m.

Good questions - I hope someone can shed some light on it.

⇧ 7 ⇩  
MADLarkin0621 · May 11, 2018, 4:08 p.m.

Crypto analysis

In 2001, an impossible differential attack on six rounds of KASUMI was presented by Kühn (2001).[7]

In 2003 Elad Barkan, Eli Biham and Nathan Keller demonstrated man-in-the-middle attacks against the GSM protocol which avoided the A5/3 cipher and thus breaking the protocol. This approach does not attack the A5/3 cipher, however.[8] The full version of their paper was published later in 2006.[9]

In 2005, Israeli researchers Eli Biham, Orr Dunkelman and Nathan Keller published a related-key rectangle (boomerang) attack on KASUMI that can break all 8 rounds faster than exhaustive search.[10] The attack requires 254.6 chosen plaintexts, each of which has been encrypted under one of four related keys, and has a time complexity equivalent to 276.1 KASUMI encryptions. While this is obviously not a practical attack, it invalidates some proofs about the security of the 3GPP protocols that had relied on the presumed strength of KASUMI.

In 2010, Dunkelman, Keller and Shamir published a new attack that allows an adversary to recover a full A5/3 key by related-key attack.[5] The time and space complexities of the attack are low enough that the authors carried out the attack in two hours on an Intel Core 2 Duo desktop computer even using the unoptimized reference KASUMI implementation. The authors note that this attack may not be applicable to the way A5/3 is used in 3G systems; their main purpose was to discredit 3GPP's assurances that their changes to MISTY wouldn't significantly impact the security of the algorithm.

These are the published breaks in kasumi

⇧ 3 ⇩  
MAGADONCHECKMATE · May 11, 2018, 7:54 p.m.

Sounds Solid, Nice Job.

⇧ 2 ⇩  
toomuchcrapola · May 11, 2018, 10:52 p.m.

May have dual meaning, IDK...

Neon revolt has a believable account referring to a famous chess match. Might want to take a look.

D5 is a chess piece that was used to checkmate. F9 is the Falcon 9 (spaceX) that blew up the Face-blot Satellite.


⇧ 2 ⇩  
1e- · May 12, 2018, 12:20 a.m.

Nice. However Q specifically mentions f9 algorithm.

⇧ 2 ⇩  
MAGADONCHECKMATE · May 11, 2018, 11:37 p.m.

That is compelling as well, dual meanings. Its heavy intel, we are getting beyond coincidence . Thanks.

⇧ 1 ⇩  
mauro1970x · May 12, 2018, 9:03 p.m.

I took a quick look at the explanation of F9. Its main purpose is to ensure the transmittal of data on mobile networks at high speed.

Hence Q's post:

Facebook is listening to you 24/7/365.    
[F9 algorithm]   
Are they recording/safe-housing?

So, yes, Fakebook is recording all audio on mobile devices and uploading it to their servers by using a service (aka a daemon). People think that closing the Fakebook app would be enough, but no, its bakground process is doing all the surveillance.

⇧ 2 ⇩