- Edited
Dangor we have encro and sky phones here. Aquarius and a pixel with sky ECC . Sky was encrypted. Upload them as pdf and share the link https://privnote.co/?ref=websites&gclid=EAIaIQobChMIk4Dtz_u4ggMVppRoCR1VejBvEAAYASAAEgJMkvD_BwE
Dangor we have encro and sky phones here. Aquarius and a pixel with sky ECC . Sky was encrypted. Upload them as pdf and share the link https://privnote.co/?ref=websites&gclid=EAIaIQobChMIk4Dtz_u4ggMVppRoCR1VejBvEAAYASAAEgJMkvD_BwE
Nuttso You should give him your email because if he uploads it to privnote and shares the link here someone will already click on it and destroy the note.
final I would love to see Kyber or other NIST PQ algorithms get tried out in messaging applications soon.
There seems to be a lot of opposition to Kyber by D. J. Bernstein, Who's the Designer of Chacha20. He even wrote a article named "Debunking NIST's calculation of the Kyber-512 security level". Also, I think we're being too much off-topic, so maybe we should create another thread for this?
GrapheneLover I don't have a disposable email right now @Dangor upload the link to another host. If you want to make it public. If you want me to censor it prior to making it public give me some time or email it my lawyer.
He will share it with me and my other lawyer who is the chairman of all crime lawyers. But can't share his personal mail here
You can share files using tor network with onion share. It is open source.
https://github.com/onionshare/onionshare
https://onionshare.org/
See this is an old thread brought back to life. OP did not state what country and how long the police had his phones. In the U.S. the police need a search warrant signed by a judge to search your phones. Also, they tend not to return them if they have probable cause (which is required for a search warrant) if they can't get the data they want from the phone. Even if they get the data, they will hold the phone for a while because if the data shows anything criminal, they will keep the phone as evidence.
Nuttso a free Protonmail made in minutes isn't secure enough for this?
You said "we gonna published it" in answer to Crimesite doesnt. Who or where is "we" so we the GrapheneOS Discussion Forum Members like me in particularly who interested as well can read this.
Thank you in advance, both of you!
In the Netherlands some judges do ask law enforcement how they got all the Sky and Encro data in answer to the defence lawyers who claimed the way wasn't legal. I heard, heard not speculate but also no fact, the dutch police did succeeded this operation because of the help or of the purchase hardware/ software from NSO group in Israel. Because NSO group work(ed) with countries/ organizations know as terrorists it is illegal for The Netherlands to do business with this company. They solved this "problem" and made it legally by "give" the data to France (not public!) who give it back to The Netherlands so it (the way took data from Sky and Encro users) was done by France and not The Netherlands. The official statement dutch law enforcement made was that they worked together with France. Now their evidence was "legal" and they used many times in court the excuse they "don't know how" in answer to a judge who ask about. Funny part France did say it was The Netherlands and not France who lead the operation. Some Sky/ Encro users are already convicted and in jail for by judges, some judges didn't go with the story and let the suspects go free, last time law enforcement made the statement by telling all judges the data is legal and must be used as evidence against the suspects. The response from defence lawyers are that all data need to be given so the defence could use it the same way law enforcement do. Now law enforcement is "black" all text in data what could help the suspects their innocent.
Know this is just one example for how governments do operate must be a huge concern to society. Not only to the suspects, who are called "criminals" but those who cross the law wearing a uniform or badge and walk away with this are the real criminals.
So if there is evidence to back-up this what I have been heard, it would be nice to see where it is published and helpfully to others.
The main thing we can learn from the Sky/Encro fuck up:
Enco at least was transparent and allegedly said "the phones are compromised do not use them" while Sky at the same time was offering 5mil award for "hacking the service" in order to reassure their clients into their mission statement and writing huge blog posts against Encro and Signal too. Even after the hack they were sending emails to clients telling them to keep using the "secure service".
Suspicious here is the fact that also the owner of sky was never extradited to be prosecuted as per his charges in Cali.
The funniest part is that people who were reselling the phones are being prosecuted as helping criminals. That is just crazy. Then all pawn shop owners should be arrested too.
At the day of the Sky raid many homes were raided and people were arrested on their exact addresses, so I am sure Sky maybe did not use a VPN and all people who used their wifi to connect to the service were easily tracked, from reading blog posts Encro seemed like a lot better protected system, and sky just like a fake promise and marketing.
Netflix should make a docuseries on these hacks :D
Dangor "The funniest part is that people who were reselling the phones are being prosecuted as helping criminals. That is just crazy."
Yes, you are right, especially because it was, and still is not illegal to sell encrypted devices. If it was against the law, I understand their point. But it happened before, remember Phantom Secure? With the Sinaloa Cartel as a client, the FBI asked the CEO of Phantom Secure multiple times to build a backdoor but he refused. Ramos (CEO) pleaded guilty ended up sentenced to 9 years of imprisonment, had to forfeit USD80 million as proceeds of crime, and was seized various assets. Imagine when not pleaded guilty the prison time would be even more...