Encrypting in Networking: Implications of Unencrypted Data

  • Thread starter Thread starter Reshma
  • Start date Start date
Click For Summary

Discussion Overview

The discussion revolves around the implications of unencrypted data transmission in networking, exploring concepts of encryption, security risks, and the technical challenges associated with maintaining secure communications over the internet.

Discussion Character

  • Debate/contested
  • Technical explanation
  • Conceptual clarification

Main Points Raised

  • Some participants describe encryption as a method of transforming data into a secure format that can only be reverted by authorized parties, emphasizing the importance of public key cryptography and authentication services like Kerberos to mitigate risks such as man-in-the-middle attacks.
  • Others express concern about the risks associated with sending unencrypted information, particularly regarding the potential for third parties to intercept sensitive data, such as login credentials.
  • One participant mentions that the site in question does not use encryption, suggesting that experienced individuals could potentially access passwords if they monitor the traffic.
  • There are differing views on the necessity of obtaining a certificate from a trusted Certification Authority for encryption, with some arguing that self-signed certificates can be used, albeit with user prompts for acceptance.
  • Participants discuss the relationship between encryption and malware, with some asserting that malware can exploit unencrypted data, while others argue that encryption and malware are fundamentally different and that breaking encryption typically requires specific hacking methods rather than malware.
  • Concerns are raised about the effectiveness of personal security measures on unencrypted sites, with some suggesting that users should avoid sharing sensitive information on such platforms.
  • Disagreements arise regarding the methods of breaking encryption, with some participants claiming that it involves brute force or exploiting algorithm weaknesses, while others challenge the notion that malware can directly break encryption.

Areas of Agreement / Disagreement

Participants do not reach a consensus on the relationship between encryption and malware, the necessity of certificates for encryption, and the best practices for maintaining security on unencrypted sites. Multiple competing views remain throughout the discussion.

Contextual Notes

Some statements reflect assumptions about the nature of encryption and its vulnerabilities, while others highlight the complexity of the topic without resolving the technical details or implications of different encryption methods.

  • #31
TsunamiJoe said:
I wasn't speaking of port blocking, but when requiring a set of passwords of which are encrypted so that they can be planely seen, except by the other communicating machine.
You didn't realize you were talking about port blocking, but you were. There are no port-level cryptographic authorization schemes. You can deny connections by IP, but that's about it. Anyone can connect to an open port on another machine. Authorization using cryptography is done by a server servicing that port at the application level -- much, much higher than the port itself.
This is not entirely so, when using a file sharing program, most often the program will merely know your IP, so that someone wanting access to the information being sent could merely "spoof" there IP and pretend they were one of the machines(personaly i would say that the user receiving the file would be the one to spoof, as to promote less work by the middleman in not having to get into the other persons system prior, but to instead just walk into the connect) then simultaniously send it out to the real user spoofing the senders' IP.
And where would the real packets go? Would you just use your super-laser-ray and obliterate them off the ethernet wires?
I was not claiming your ignorance, I'm merely presenting another side to an argument, and if you wish to degrade to using pety comments such as this to proove your point, then I no longer have any position in this debate anymore. It was nice, and a great debate while it was being upheld properly. I hope you, Reshma, got the answers you were seeking.
We're not conducting a debate. You're saying things that are wrong. I, and others, are correcting you. Whether or not it's worth doing, only you can say.

- Warren
 

Similar threads

  • · Replies 27 ·
Replies
27
Views
3K
  • · Replies 2 ·
Replies
2
Views
1K
Replies
5
Views
2K
  • · Replies 3 ·
Replies
3
Views
4K
  • · Replies 14 ·
Replies
14
Views
2K
  • · Replies 52 ·
2
Replies
52
Views
6K
  • · Replies 1 ·
Replies
1
Views
2K
  • · Replies 9 ·
Replies
9
Views
4K
Replies
7
Views
2K
  • · Replies 2 ·
Replies
2
Views
2K