IPB

Welcome Guest ( Log In | Register )

 
Reply to this topicStart new topic
> Encryption question, Crash-crash-boom-boom
Wasabi
post Oct 6 2005, 04:30 PM
Post #1


Running Target
***

Group: Members
Posts: 1,251
Joined: 11-September 04
From: GA
Member No.: 6,651



Can a hacker use the Crash Program/OS action to crash an Encryption program running on a device?
Go to the top of the page
 
+Quote Post
Nikoli
post Oct 6 2005, 04:30 PM
Post #2


Chicago Survivor
*********

Group: Dumpshocked
Posts: 5,079
Joined: 28-January 04
From: Canton, GA
Member No.: 6,033



Yes, but that won't defeat the encryption on existing data, but it will stop them from encrypting new data.
Go to the top of the page
 
+Quote Post
calypso
post Oct 6 2005, 06:41 PM
Post #3


Moving Target
**

Group: Members
Posts: 238
Joined: 18-August 05
Member No.: 7,569



QUOTE (Nikoli)
Yes, but that won't defeat the encryption on existing data, but it will stop them from encrypting new data.

I concur.
Go to the top of the page
 
+Quote Post
Wasabi
post Oct 7 2005, 04:12 PM
Post #4


Running Target
***

Group: Members
Posts: 1,251
Joined: 11-September 04
From: GA
Member No.: 6,651



Fair enough. What about spoofing a feed? If a hacker hacks into a Drone communicating with its master via Encrypted commo and the hacker wants the controller to receive a false feed (not an edited one) then would decrypting the feed prevent insertion (and matching encryption) of the false feed?
Go to the top of the page
 
+Quote Post
blakkie
post Oct 7 2005, 04:15 PM
Post #5


Dragon
********

Group: Members
Posts: 4,718
Joined: 14-September 02
Member No.: 3,263



Since to insert the command attacker first had to Decrypt the communication, reconnecting using Encrypt again would defeat the attacker. Or i guess more aptly delay them.
Go to the top of the page
 
+Quote Post
Wasabi
post Oct 7 2005, 08:51 PM
Post #6


Running Target
***

Group: Members
Posts: 1,251
Joined: 11-September 04
From: GA
Member No.: 6,651



QUOTE (blakkie)
Since to insert the command attacker first had to Decrypt the communication, reconnecting using Encrypt again would defeat the attacker. Or i guess more aptly delay them.

True, but my question is more about what happens when an undetected hacker is inserting purely false data into an encrypted feed. Does it travel unencrypted and thus automatically detected as false?
Go to the top of the page
 
+Quote Post

Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 25th April 2024 - 07:01 PM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.