X-Nico

unusual facts about Encrypted



66th Military Intelligence Brigade

Members of the brigade provide mission support by utilizing databases running on computer clusters and communicate on encrypted networks, such as the NSA-certified TACLANE encrypted network.

ARTstor

The high-resolution versions of the images are encrypted using FlashPix, allowing download and printing only of relatively low-resolution images (1024 pixels along the maximum dimension).

Astra 2D

Some channels on 2D are encrypted with Videoguard (a proprietary encryption method by the NDS Group) and only Sky Digiboxes with valid cards, or standard hardware with non-approved (with respect to the Sky/NDS end-user contract) "Dragon", or "T-Rex" Conditional Access Modules can decode these channels.

Beaumanor Hall

The park became a secret listening station where encrypted enemy signals (Morse code) were intercepted and sent to the famous Station X at Bletchley Park (by motorbike everyday) for decoding.

Bibliography of the War of 1812

Boklan, Kent D., "How I Broke an Encrypted Diary from the War of 1812", Cryptologia, West Point, New York : United States Military Academy, Volume 32, Issue 4, October 2008, pages 299 - 310.

Blackphone

The concept of a encrypted phone has long been an interest of Silent Circle founder and PGP creator, Phil Zimmerman.

Brute Force: Cracking the Data Encryption Standard

In this book, the author accounts his involvement in the DESCHALL Project, mobilizing thousands of personal computers in 1997 in order to meet the challenge to crack a single message encrypted with DES.

Cryptographically secure pseudorandom number generator

The Guardian and The New York Times have reported that the National Security Agency (NSA) inserted a CSPRNG into NIST SP 800-90A that had a backdoor which allows the NSA to readily decrypt material that was encrypted with the aid of Dual EC DRBG.

Daniel Dantas

In July 2008, several TrueCrypt-Encrypted hard drives were seized from Daniel Dantas, who was suspected of financial crimes.

Das Geheimnis der Runen

List stated that his Armanen Futharkh were encrypted in the Rúnatal of the Poetic Edda (stanzas 138 to 165 of the Hávamál), with stanzas 147 through 165, where Odin enumerates eighteen wisdoms (with 164 being an interpolation), interpreted as being the "song of the 18 runes".

Doremi Labs

CineAsset, mastering software for creating encrypted and unencrypted DCI compliant packages

Duplicati

Duplicati is a backup client that securely stores encrypted, incremental, compressed remote backups of local files on cloud storage services and remote file servers.

Federal Act on Banks and Savings Banks

After the revelations of whistleblower Bradley Birkenfeld in 2007, UBS—which was then the largest bank in the world—was caught red-handed by the United States government offering tax evasion strategies, sending undercover bankers with encrypted computers to the United States.

Financial cryptography

However, it was the work of David Chaum that excited the cryptography community about the potential of encrypted messages as actual financial instruments.

Great Cipher

Antoine Rossignol's cryptographic skills became known when in 1626 an encrypted letter was taken from a messenger leaving the city of Réalmont, controlled by the Huguenots and surrounded by the French army.

Instant computer support

These services are fully encrypted (secure) and delivered over the Internet rather than over a LAN using technology such as that offered by LogMeIn and Citrix.

JSTV

DVB-S MPEG 2: Hot Bird 6 (12597 MHz, Vertical, 3/4, VPID 2000, APID 2002/2001) Encrypted (Cryptoworks and Conax).

The channel currently broadcasts in DVB-S on Hot Bird 6, encrypted in Cryptoworks and Conax (except some programmes) and broadcasts programs of NHK, Fuji TV, TV Tokyo and other main Japanese broadcasters.

KY-68

The KY-68 can operate via civilian and military switches in either encrypted or un-encrypted mode, or point-to-point (encrypted mode only).

Link 1

Link 1 is a point-to-point, duplex, non-encrypted, digital NATO Tactical Data Link (TDL) Standard for the automatic exchange of Track and Strobe data, combined with link and data management messages between ground based ASACS-elements / e.g. CRC and CAOC), specific units (TACCS / MC) and data link buffers (SSSB, CSI).

Low-noise block downconverter

In Turkey, another LNB type Digiturk MDUs are kept powered to receive VOD content, STB firmware, EPG data and pay TV keys in order to watch encrypted content.

Macrium Reflect

Data is compressed and encrypted in real time using Abraham Lempel LZ based compression and AES encryption algorithms.

Multiscale Electrophysiology Format

Subject identifying information in the file header can be encrypted using 128-bit AES encryption in order to comply with HIPAA requirements for patient privacy when transmitting data across an open network.

Oberkommando der Wehrmacht Chiffrierabteilung

It controlled directly the personnel at the main intercept stations at Ludwigsfelds and of the subsidiary stations at Treuenbrietzen and Lauf which is used to intercept encrypted diplomatic Morse network signals.

RAF Menwith Hill

During the 2009 G-20 London Summit NSA intercept specialists based at Menwith Hill attempted to target and decode the encrypted telephone calls of the Russian president Dmitry Medvedev.

Real Time Media Flow Protocol

The Secure Real-Time Media Flow Protocol (RTMFP) is a proprietary protocol suite developed by Adobe Systems for encrypted, efficient multimedia delivery through both client-server and peer-to-peer models over the Internet.

Schweizer RU-38 Twin Condor

The aircraft also has HF, VHF and UHF radios for voice and encrypted voice communications, plus direction finding.

Short Message Service

In the GSM, only the airway traffic between the Mobile Station (MS) and the Base Transceiver Station (BTS) is optionally encrypted with a weak and broken stream cipher (A5/1 or A5/2).

STS-27

The crew was forced to use a slow, encrypted transmission method, likely causing the images NASA engineers received to be of poor quality, causing them to think the damage was actually "just lights and shadows".

Thai Global Network

Eutelsat II-F3 16 degrees east - Thai Wave (encrypted / encoded, sometimes "clear window") Entertainment thai 11 163 H 20 6.65 PAL (analog)

TVSN

From August 20, 2013, Kordia began broadcasting a localised version of the channel on LCN 20 to a national New Zealand audience on the Freeview (New Zealand) terrestrial service, which is taken from the encrypted SKY TV (New Zealand) satellite channel launched at the same time.

United States v. Manning

He said he also recovered 14–15 pages of encrypted chats, in unallocated space on Manning's MacBook's hard drive, between Manning and someone believed to be Julian Assange, using the Adium instant messaging client.

Utility station

Military use of shortwave is also common, but nearly all transmissions are encrypted, with voice encrypted using modes such as ANDVT.


see also