These forums have been archived and are now read-only.

The new forums are live and can be found at https://forums.eveonline.com/

Market Discussions

 
  • Topic is locked indefinitely.
Previous page12
 

How to Decode Market Secret (and Encrypt Them Again) (!) ?

Author
Adunh Slavy
#21 - 2016-01-12 17:53:32 UTC
lanyaie wrote:
I encrypt using MD5 HASH


MD5 is not secure

Necessity is the plea for every infringement of human freedom. It is the argument of tyrants; it is the creed of slaves.  - William Pitt

Buzz Orti
State War Academy
Caldari State
#22 - 2016-01-12 17:58:05 UTC
Adunh Slavy wrote:
lanyaie wrote:
I encrypt using MD5 HASH


MD5 is not secure

Why not?

Builds ship in empty Quafe bottle.

Adunh Slavy
#23 - 2016-01-12 21:41:13 UTC
Buzz Orti wrote:

Why not?



https://en.wikipedia.org/wiki/MD5

Necessity is the plea for every infringement of human freedom. It is the argument of tyrants; it is the creed of slaves.  - William Pitt

Buzz Orti
State War Academy
Caldari State
#24 - 2016-01-12 22:11:45 UTC  |  Edited by: Buzz Orti
Best public cryptanalysis
A 2013 attack by Xie Tao, Fanbao Liu, and Dengguo Feng breaks MD5 collision resistance in 2^18 time. This attack runs in less than a second on a regular computer.[2]

In 1996 a flaw was found in the design of MD5. While it was not deemed a fatal weakness at the time, cryptographers began recommending the use of other algorithms, such as SHA-1—which has since been found to be vulnerable as well.[4] In 2004 it was shown that MD5 is not collision resistant.[5] As such, MD5 is not suitable for applications like SSL certificates or digital signatures that rely on this property for digital security. Also in 2004 more serious flaws were discovered in MD5, making further use of the algorithm for security purposes questionable; specifically, a group of researchers described how to create a pair of files that share the same MD5 checksum.[6][7] Further advances were made in breaking MD5 in 2005, 2006, and 2007.[8] In December 2008, a group of researchers used this technique to fake SSL certificate validity.[9][10] As of 2010, the CMU Software Engineering Institute considers MD5 "cryptographically broken and unsuitable for further use",[11] and most U.S. government applications now require the SHA-2 family of hash functions.[12] In 2012, the Flame malware exploited the weaknesses in MD5 to fake a Microsoft digital signature.

Builds ship in empty Quafe bottle.

Cixi
#25 - 2016-01-14 17:07:16 UTC
Work smarter not harder Blink
Bumblefck
Kerensky Initiatives
#26 - 2016-01-14 21:02:14 UTC
Buzz Orti wrote:
Adunh Slavy wrote:
lanyaie wrote:
I encrypt using MD5 HASH


MD5 is not secure

Why not?



I occasionally smoke MD5 Hash

Perfection is a dish best served like wasabi .

Bumble's Space Log

Rhivre
TarNec
Invisible Exchequer
#27 - 2016-01-14 21:24:59 UTC  |  Edited by: Rhivre
Rykker Bow wrote:
You sure do like commas. I counted 37 commas in 24 sentences in your last two posts. Smile

yeah...I'm bored.


You are very brave :p
Bumblefck
Kerensky Initiatives
#28 - 2016-01-14 21:27:29 UTC
Rhivre wrote:
Rykker Bow wrote:
You sure do like commas. I counted 37 commas in 24 sentences in your last two posts. Smile

yeah...I'm bored.


You are very brave :p



Are you German, by any chance?

Perfection is a dish best served like wasabi .

Bumble's Space Log

Chekov Nikahd
Viziam
Amarr Empire
#29 - 2016-01-17 17:48:32 UTC
lanyaie wrote:
I encrypt using MD5 HASH

tbh there's little need to do much more than a double ROT13
Buzz Orti
State War Academy
Caldari State
#30 - 2016-01-31 02:31:02 UTC
The encryption program that I have to use has to be modified to prevent additional theft and attacks against IP.

Fortunately, the previous USB storage device loss was encrypted and it still prevents the thief to use it.

This will make it easier to encrypt the whole medium while browsing will function in RAM only.

The encryption program used to run encrypted folders with no data sharing between the other separately encrypted files.

It however left the root more vulnerable.

Now , with the new encryption method implemented, it will be easy to copy the code and keep it secure.

Builds ship in empty Quafe bottle.

Elizabeth Norn
Nornir Research
Nornir Empire
#31 - 2016-01-31 03:44:13 UTC
Buzz Orti wrote:
The encryption program that I have to use has to be modified to prevent additional theft and attacks against IP.

Fortunately, the previous USB storage device loss was encrypted and it still prevents the thief to use it.

This will make it easier to encrypt the whole medium while browsing will function in RAM only.

The encryption program used to run encrypted folders with no data sharing between the other separately encrypted files.

It however left the root more vulnerable.

Now , with the new encryption method implemented, it will be easy to copy the code and keep it secure.


They're behind you Shocked.
Buzz Orti
State War Academy
Caldari State
#32 - 2016-01-31 05:19:46 UTC
Elizabeth Norn wrote:
...
They're behind you Shocked.

Yes, but that is obviously not enough, both attacks and security.

Builds ship in empty Quafe bottle.

Alexi Stokov
State War Academy
Caldari State
#33 - 2016-01-31 05:29:02 UTC
Buzz Orti wrote:
Elizabeth Norn wrote:
...
They're behind you Shocked.

Yes, but that is obviously not enough, both attacks and security.


Umm they are also in front of you!
Buzz Orti
State War Academy
Caldari State
#34 - 2016-01-31 06:00:05 UTC
Alexi Stokov wrote:
Buzz Orti wrote:
Elizabeth Norn wrote:
...
They're behind you Shocked.

Yes, but that is obviously not enough, both attacks and security.


Umm they are also in front of you!

That's a good reason to keep the data elsewhere.
If it is strong enough for the front line...

Builds ship in empty Quafe bottle.

Jeronica
The Terrifying League Of Dog Fort
Deepwater Hooligans
#35 - 2016-02-04 15:23:43 UTC  |  Edited by: Jeronica
Sabriz Adoudel wrote:
Buzz Orti wrote:
pretty self-explanatory.
Can also go in skills for encryption methods, although not closely related,
warfare and tactics for practical use and intent,
and a few others...

Anyways, this thread is to discuss methods to find secret and how to keep them secret.

You can also discuss what secret you find, such as specific list of items, their related worth, and where it is worth that much.




sdtahtTsacansfffaw123masfklnwr9sgnlaetmxm

asfgiwe00mcs3fx

srqnrkdvlsoxmftwntxklcw2clksm



If you can decode that, you'll have a great market secret. Have fun!


gung boivbhfyl vf abg gehr rapelcgrq grkg!

Also, if you're running secrets in RAM, you must be aware of the exploits that watches the RAM. Is the contents in ram decrypted?

EVE-MOGUL.COM

Trade Profit Tracking&Analytics

Offering Sotiyo Services In

New Caldari | Ashab

IPOs & Investments

Buzz Orti
State War Academy
Caldari State
#36 - 2016-02-07 00:07:44 UTC  |  Edited by: Buzz Orti
Jeronica wrote:
Sabriz Adoudel wrote:
Buzz Orti wrote:
pretty self-explanatory.
Can also go in skills for encryption methods, although not closely related,
warfare and tactics for practical use and intent,
and a few others...

Anyways, this thread is to discuss methods to find secret and how to keep them secret.

You can also discuss what secret you find, such as specific list of items, their related worth, and where it is worth that much.




sdtahtTsacansfffaw123masfklnwr9sgnlaetmxm

asfgiwe00mcs3fx

srqnrkdvlsoxmftwntxklcw2clksm



If you can decode that, you'll have a great market secret. Have fun!


gung boivbhfyl vf abg gehr rapelcgrq grkg!

Also, if you're running secrets in RAM, you must be aware of the exploits that watches the RAM. Is the contents in ram decrypted?

RAM is Random Access Memory which does the same thing in the CPU as does ROM , EPROM and other types of RAM.
CPU is for central processing unit and ROM is for Read-only memory.

EPROM is for Erasable Programmable Read-Only Memory.
An example of another type of RAM is video RAM.

ROM is non-volatile memory, meaning, or in the sense of, or that, it retains its stored data when the power is turned off, or is not going through if there is none, (possibly including the back-up battery).
RAM is volatile memory, meaning that it only works when the power is on.
Once the power is off, it removes content (stored data for analysis).

If you know the code (machine language code) that turns a machine on and off, you can even switch the controls in reverse.
That affects how the ROM works, and the RAM will not retain its data.

It is not abnormal for a program to use RAM as all programs are intended to use RAM.
To make unauthorized use of RAM requires an authority scheme to make it unauthorized.
Data from RAM can also be used against guideline after the fact.
You should not send data in RAM to a third party that would use the data against security measures to prevent damage or abuse of data, or enemy (/ies).
It could be treacherous.

Edit:
The secret services offers more than trade secret services.
Most trade secrets are for business and are more limited in scope than other security matters.
However, business can generate more money than other more important security matters deriving taxes in related percent or other scheme to cover those.

Builds ship in empty Quafe bottle.

Previous page12