
And here is where the story gets interesting! Following the end of the war, the United States and Britain made presents of captured German Enigma machines to friendly governments … but never mentioned that the messages encoded on those machines were readable by the US and Britain!

Use of this machine, based in part on theoretical work by Alan Turing, allowed the Enigma messages to be read. After the method was known, the British cryptographers at Bletchley Park were able to “brute force” the keys to various German messages using an early mechanical computer nicknamed the “bombe” for its constant ticking sound while working.
21st century encrypto code#
Of the two, the first step is by far the hardest.įor example, the allies did not break the German Enigma code until they succeeded in capturing an actual machine from the German submarine U-559. Then the specific key for the message must be found. First, the method of the encryption must be determined. To decode a message is a two step process. The NSA loves to be able to read your encrypted traffic, and they are able to do so because Americans are tricked into using code systems where the NSA knows the method (or has a back door). This brings us to the issue of encryption to protect our privacy. I maintain that the NSA spying is wholly about controlling the American people, looting their business secrets for cronies, and has no impact on real terrorists (as opposed to fake acting a theater role to sell us a war) because real terrorists and drug criminals have known all along that public communications are open to monitoring. Obviously the Boston Bombing proves this is an epic fail, even given the admission by the FBI that they did in fact have recorded phone calls for the Tsarnaev brothers to listen to. The NSA justifies its surveillance of all our computer and phone data with the claim they need it to detect and track terrorists.

– The Fourth Amendment to the Constitution of the United States “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.” This one is a bit tougher than the first effort.
21st century encrypto free#
Now, I don’t have a surplus of cash to offer rewards, but I will send a free WRH coffee mug to the first person who succeeds in breaking this message before the day of the pelting, which is July 20th, the 20th Anniversary of the murder of White House Deputy Council Vincent Foster, the case that inadvertently launched my “career” as an activist.
21st century encrypto zip file#
It’s a zip file because this message is in a binary file. The identity of the target is contained in this SECRET MESSAGE.

Once again I and my fellow “irritists” plan an attack with marshmallows of mass destruction, this time against a famous person. So dust off that old Dell 486 with internal no modem, and rediscover the joys of basic programming… We’ve searched high and low for solutions that might allow free individuals to retain some personal dignity in the face of totally immoral global tyranny, and this is by far one of the best put out there. It’s rather disheartening to know that the NSA is illegally spying and stealing all of our private data in order to target various innocent individuals around the world, or to steal commercial secrets in order to fix markets.
