// disclaimer: all my posts and diagrams copyright free... a few ideas related to the context for crypto today. there is certain irony in crypto that can be subverted and used to attack or surveil via stealth. reminds of the basic situation with most home electronics, blackboxed. such as IPcams that remain on 24/7/365 and have microphones accessible over the network, compromises built-in. thus to seek security is to extend the hidden security state and its illegal home invasion. solution: five dollar on/off switch, activate security device only when away, and upon return turn it off again, limiting the designed for boundlessness of political technology. 2-Port RJ45 Manual Network Switch [1]https://www.dropbox.com/s/lk7gg8zgf7wxjjj/RJ45switch.JPG the diagrams here reference the following NSA document... The Borders of Cryptology - NSA & Electronic Warfare* [2]http://cryptome.org/2013/09/nsa-cryptology-borders.pdf diagrams created with the excellent software tool yEd... yEd - Graph Editor - yWorks (freeware) [3]http://www.yworks.com/en/products_yed_about.html the question of crypto in a complex environment where it has both offensive and defensive functioning, relating to weak and strong crypto and security ratings crypto (protection & exploitation) [4]https://www.dropbox.com/s/d7jrpilz35dvk4k/graph1v1.gif the paradoxical utility and purpose of compromised crypto that has both strong and weak, secure and insecure characteristics in a complex environment dual-use multilevel crypto [5]https://www.dropbox.com/s/ndwlu9lqf4yvhy9/graph2v1.gif the role of installation and usage errors as related to security and exploits, inherent in complicated or high-literacy approaches crypto implementation flaw [6]https://www.dropbox.com/s/bjofccwrun7lok1/graph3v1.gif this is the direct reference and extension of the NSA diagram above. cryptanalysis was included, Technical Surveillance Countermeasures (TSCM), though likely other domains are missing or perhaps in relational error. improvements or corrections appreciated... Electromagnetic Borders of Cryptology [7]https://www.dropbox.com/s/tp7dbqjbmpscv0h/diagram4v1.gif this is my estimation of the situation today, based on the above technosocial structure. it does not include many aspects and is limited by my lack of awareness and understanding, though makes an attempt at an integrated view of the larger dynamics involved... Context for computer Crypto today [8]https://www.dropbox.com/s/jn73d4d9b5ksz8u/context5v1.gif additional diagrams will follow, surveying aspects of this same territory... --- Grant Hart - You're the Reflection of the Moon On the Water [9]http://www.youtube.com/watch?v=NTH4Zu8gleA ☾ References 1. https://www.dropbox.com/s/lk7gg8zgf7wxjjj/RJ45switch.JPG 2. http://cryptome.org/2013/09/nsa-cryptology-borders.pdf 3. http://www.yworks.com/en/products_yed_about.html 4. https://www.dropbox.com/s/d7jrpilz35dvk4k/graph1v1.gif 5. https://www.dropbox.com/s/ndwlu9lqf4yvhy9/graph2v1.gif 6. https://www.dropbox.com/s/bjofccwrun7lok1/graph3v1.gif 7. https://www.dropbox.com/s/tp7dbqjbmpscv0h/diagram4v1.gif 8. https://www.dropbox.com/s/jn73d4d9b5ksz8u/context5v1.gif 9. http://www.youtube.com/watch?v=NTH4Zu8gleA