[cryptography] The Compromised Internet

Natanael natanael.l at gmail.com
Wed Sep 25 16:45:25 EDT 2013

Carrier-agnostic encrypted mesh routing software: CJDNS.

Cantenna, IR-link based RONJA, ethernet/LAN, whatever. If you've got a
data link you can use it.

It creates an IPv6 network internally in the 'fc' range (private
network) where the address is a hash of the node's public key.

On Wed, Sep 25, 2013 at 10:07 PM, John Young <jya at pipeline.com> wrote:
> Now that it appears the Internet is compromised what other
> means can rapidly deliver tiny fragments of an encrypted
> message, each unique for transmission, then reassembled
> upon receipt, kind of like packets but much smaller and less
> predictable, dare say random?
> The legacy transceiver technologies prior to the Internet or
> developed parallel to it, burst via radio, microwave, EM emanations,
> laser, ELF, moon or planetary bounce, spread spectrum, ELF,
> hydro, olfactory, quanta, and the like.
> Presumably if these are possible they will remain classified, kept
> in research labs for advanced study, or shelved for future use.
> Quite a few are hinted at, redacted and partially described in
> NSA technical publications from 25-50 or so years ago. Many
> developed for military use and the best never shared with the
> public.
> A skeptic might suppose the internet was invented and promoted as
> a diversion along with public-use digital cryptography. This ruse
> has led to immense growth in transmission-breakable ciphers
> as well as vulnerable transceivers. Packet techology could hardly
> be surpased for tappability as Snowden and cohorts disclose the
> tip of the iceberg. Ironically, the cohorts believe encryption protects
> their communications, conceals his location and cloaks the
> depositories.
> _______________________________________________
> cryptography mailing list
> cryptography at randombit.net
> http://lists.randombit.net/mailman/listinfo/cryptography

More information about the cryptography mailing list