issue152:entretien
Différences
Ci-dessous, les différences entre deux révisions de la page.
Prochaine révision | Révision précédente | ||
issue152:entretien [2019/12/30 08:48] – créée d52fr | issue152:entretien [2020/01/02 15:47] (Version actuelle) – andre_domenech | ||
---|---|---|---|
Ligne 1: | Ligne 1: | ||
- | Website: http:// | + | **Website: http:// |
From the website: “Today' | From the website: “Today' | ||
- | Finalcrypt is, by all accounts, something amazing. It follows the Unix philosophy of doing one thing and doing it well. The main problem of cryptography is getting your “key” from one person to another, without it being intercepted. Hence our current shared key cryptography. What if you do not need to give the key to anyone? Now this becomes a real secret. (A secret is something only you know). One-time pad, (https:// | + | Finalcrypt is, by all accounts, something amazing. It follows the Unix philosophy of doing one thing and doing it well. The main problem of cryptography is getting your “key” from one person to another, without it being intercepted. Hence our current shared key cryptography. What if you do not need to give the key to anyone? Now this becomes a real secret. (A secret is something only you know). One-time pad, (https:// |
- | Continuing our series of interviews with open source heroes, in this issue we would like to introduce you to the brilliant creator behind Finalcrypt, Ron de Jong. I asked Ron for an interview and he very kindly accepted to answer my questions. | + | |
+ | Site Web : http:// | ||
+ | |||
+ | Du site Web : « De nos jours, le cyberespionnage arrive via des logiciels espion qui attendent le déverrouillage de votre disque. Le Disk Encryption (le chiffrement du disque) ne protège plus ! Même quand vous vous êtes connecté, il faut que les fichiers fermés restent cryptés. C’est uniquement le chiffrement des fichiers qui empêche les logiciels espion de lire vos fichiers. De plus, la plupart des logiciels de cryptage utilisent de l’AES ou du chiffrement asymétrique qui sont rapidement percés par l’algorithme de Shor avec des Ordinateurs quantiques. Il faut que cette pandémie de cyberespionnage soit arrêtée par le cryptage de fichiers avec le procédé de cryptage par Clé/Pad à Usage Unique (One-Time Pad – masque jetable – File Encryption). C’est la raison pour laquelle " | ||
+ | |||
+ | De toute évidence, Finalcrypt est quelque chose d’époustouflant. Il adopte la philosophie Unix qui est de faire une seule chose et de la faire bien. Le problème majeur de la cryptographie est l’envoi d’une « clé » d’une personne à une autre sans qu’elle soit interceptée, | ||
+ | |||
+ | **Continuing our series of interviews with open source heroes, in this issue we would like to introduce you to the brilliant creator behind Finalcrypt, Ron de Jong. I asked Ron for an interview and he very kindly accepted to answer my questions. | ||
Q: Ron, thank you very much for your time. First, can you tell us something about yourself? How old are you? Where do you live? What do you do for a living? Where did you study? | Q: Ron, thank you very much for your time. First, can you tell us something about yourself? How old are you? Where do you live? What do you do for a living? Where did you study? | ||
- | A: In September, I’ll be celebrating my 50th birthday; living in Zaandijk (close to Amsterdam) in The Netherlands. At 13, I started programming (Atari 600XL) and became fascinated and obsessed with programming, | + | A: In September, I’ll be celebrating my 50th birthday; living in Zaandijk (close to Amsterdam) in The Netherlands. At 13, I started programming (Atari 600XL) and became fascinated and obsessed with programming, |
- | Q: Encryption is a very complicated subject, when and how did you become interested in it? | + | Nous poursuivons notre série d’entretiens avec des héros de l’Open Source en vous présentant dans ce numéro le créateur brillant derrière Finalcrypt, Ron de Jong. Quand je le lui ai demandé, il a très aimablement accepté de répondre à mes questions. |
- | A: Throughout my career, encryption always played a part, but more as something you’d use to hide and protect confidential information – assuming that encryption algorithms were as secure as the authorities claimed. Over the years, more and more signals came out that crypto algorithms weren’t as secure as claimed, and vulnerabilities were deliberately exploited to expand espionage on civilians. Cyber security news became jaw dropping during the past decade. Thanks to people like Edward Snowden, Julian Assange, and established news-media, we now know we can’t trust national security agencies to respect privacy. I finally came to realize that One-Time Pad Encryption is the only truly unbreakable encryption. A straightforward algorithm that can’t be reversed or brute-forced – its encryption comes from only irreversible random bit patterns. | + | Q : Ron, merci beaucoup pour le temps que vous nous accordez. D’abord, pouvez-vous nous parler un peu de vous-même ? Quel âge avez-vous ? Que faites-vous pour gagner votre vie ? Où avez-vous fait vos études ? |
- | Q: Would you care to share some insights into what goes into coding something like finalcrypt? | + | R : Je viens de fêter mon 50e anniversaire (en septembre) et j’habite à Zaandijk près d’Amsterdam, |
- | A: Being a crypto-sceptic, | + | **Q: Encryption |
- | Q: Finalcrypt obviously was created in response to something? Care to share? | + | A: Throughout my career, encryption always played a part, but more as something |
- | A: After my autism diagnosis I tried to understand my social limitation in an attempt to understand what social behaviour really is, but couldn’t find objective answers (not even from academic sociologists) so I started to philosophize about social behavior and how evolution evolved social behavior to increase our chances of survival, and concluded that group hunting behavior is about hunting competences of stealth behavioral observation, | + | Q : Le chiffrement est très compliqué. Quand et comment le sujet a-t-il commencé à vous intéresser ? |
- | Q: I see you opted for the creative Commons license; was this always your goal? | + | R : Tout au long de ma carrière, le chiffrement a toujours eu un rôle à jouer, mais davantage comme quelque chose à utiliser pour cacher et protéger des renseignements confidentiels - en supposant que les algorithmes de cryptage étaient aussi sûrs que les autorités le disaient. Au fil des ans, j’ai vu de plus en plus de signaux qui montraient que les algorithmes de cryptage n’étaient pas aussi sûrs que cela et que des vulnérabilités étaient exploitées de façon délibérée pour augmenter l’espionnage sur les civils. Au cours de la dernière décennie, les actus de cybersécurité sont devenues hallucinantes. Grâce à des gens comme Edward Snowden, Julian Assange et les médias établis, nous savons maintenant que nous ne pouvons pas faire confiance aux agences de sécurité nationale pour respecter la vie privée. J’ai enfin compris que One-Time Pad Encryption est le seul chiffrement qui soit vraiment incassable. C’est un algorithme assez simple qui ne peut pas être inversé ou craqué par de la force brute, car son chiffrement vient uniquement de schémas de bits aléatoires et irréversibles. |
+ | |||
+ | **Q: Would you care to share some insights into what goes into coding something like finalcrypt? | ||
+ | |||
+ | A: Being a crypto-sceptic, | ||
+ | |||
+ | Q : Auriez-vous l' | ||
+ | |||
+ | R : Étant crypto-sceptique, | ||
+ | |||
+ | **Q: Finalcrypt obviously was created in response to something? Care to share? | ||
+ | |||
+ | A: After my autism diagnosis I tried to understand my social limitation in an attempt to understand what social behaviour really is, but couldn’t find objective answers (not even from academic sociologists) so I started to philosophize about social behavior and how evolution evolved social behavior to increase our chances of survival, and concluded that group hunting behavior is about hunting competences of stealth behavioral observation, | ||
+ | |||
+ | Q : Il est évident que FinalCrypt était créé en réponse à quelque chose ? Voulez-vous partager cela ? | ||
+ | |||
+ | R : Après le diagnostic d’autisme, | ||
+ | |||
+ | |||
+ | **Q: I see you opted for the creative Commons license; was this always your goal? | ||
A: Starting off, I chose GPL3, but soon after I realised that GPL3 allowed anyone to build-in backdoors, and publicly release it, so I changed to Creative Commons License not allowing anyone releasing derivative works. Changes for personal use are allowed. | A: Starting off, I chose GPL3, but soon after I realised that GPL3 allowed anyone to build-in backdoors, and publicly release it, so I changed to Creative Commons License not allowing anyone releasing derivative works. Changes for personal use are allowed. | ||
Ligne 29: | Ligne 55: | ||
Q: Do you have any metrics on how many people use this software? | Q: Do you have any metrics on how many people use this software? | ||
- | A: Yes, the website currently counts 1917 different users (unique ip addresses). This number grows with 5 - 50 users / day, counting from 2019-04-01. This can be measured because FinalCrypt (at start-up) automatically checks for updates once every 24 hours. | + | A: Yes, the website currently counts 1917 different users (unique ip addresses). This number grows with 5 - 50 users / day, counting from 2019-04-01. This can be measured because FinalCrypt (at start-up) automatically checks for updates once every 24 hours.** |
- | Q: Can one use finalcrypt within an encrypted volume like LUKS or a Veracrypt volume? | + | Q : Je vois que vous avez choisi une licence Creative Commons ; était-ce toujours votre but ? |
- | A: Yes. FinalCrypt (like most applications) has no notion of any underlying disk encryption, and just creates files and writes file-data to the underlying physical (or logical presented) file-system. Just tested FinalCrypt on LUKS successfully (with different file-systems). | + | R : Au départ, j’ai choisi GPL3, mais je me suis rapidement rendu compte que la GPL3 permettait à n’importe qui d’y créer des portes dérobées et de les publier ; aussi, j’ai changé pour Creative Commons, car leur licence ne permet pas la publication de dérivés. Des modifications pour un usage personnel sont permises. |
- | Q: What difference does the underlying file system make when you have to code encryption software? | + | Q : Avez-vous une idée du nombre de gens qui utilisent ce logiciel ? |
+ | |||
+ | R : Oui, actuellement le site Web compte 1 917 utilisateurs différents (avec des adresses IP distinctes). Depuis le 1er avril 2019, il y a de 5 à 50 utilisateurs supplémentaires par jour. Cela peut être mesuré, car, au démarrage, FinalCrypt recherche des mises à jour une fois par jour. | ||
+ | |||
+ | |||
+ | **Q: Can one use finalcrypt within an encrypted volume like LUKS or a Veracrypt volume? | ||
+ | |||
+ | A: Yes. FinalCrypt (like most applications) has no notion of any underlying disk encryption, and just creates files and writes file-data to the underlying physical (or logical presented) file-system. Just tested FinalCrypt on LUKS successfully (with different file-systems).** | ||
+ | |||
+ | Q : Peut-on utiliser FinalCrypt à l’intérieur d’un volume crypté comme LUKS ou un volume Veracrypt ? | ||
+ | |||
+ | R : Oui. Comme la plupart des applications, | ||
+ | |||
+ | **Q: What difference does the underlying file system make when you have to code encryption software? | ||
A: Mainly file-system meta-data attributes like what timestamps does the file-system support, cloning modification timestamps from source to target file, and what file-system permissions are valid or invalid as data source and data target, and whether directory & file links should be ignored preventing double-directory looping and therefore double encryption attempts. | A: Mainly file-system meta-data attributes like what timestamps does the file-system support, cloning modification timestamps from source to target file, and what file-system permissions are valid or invalid as data source and data target, and whether directory & file links should be ignored preventing double-directory looping and therefore double encryption attempts. | ||
Ligne 43: | Ligne 82: | ||
A: I appreciate every “thank you”, but FinalCrypt really depends on publicity as I don’t have the financial means to advertise, so users can really thank me by sharing online. | A: I appreciate every “thank you”, but FinalCrypt really depends on publicity as I don’t have the financial means to advertise, so users can really thank me by sharing online. | ||
- | FinalCrypt is also a political statement telling “Big Brother” that we demand privacy. | + | FinalCrypt is also a political statement telling “Big Brother” that we demand privacy.** |
- | Outtro | + | Q : Le système de fichiers sous-jacent change-t-il quelque chose quand vous devez coder un logiciel de chiffrement ? |
+ | |||
+ | R : Oui : pour la plupart, des attributs de méta-données du système de fichiers, comme quel horodatage est pris en compte par le système de fichiers, le clonage de l' | ||
+ | |||
+ | Q : Puisque le logiciel est gratuit, comment peut-on vous aider ou vous remercier ? | ||
+ | |||
+ | R : Chaque « merci » me touche beaucoup, mais FinalCrypt dépend, en fait, de la publicité, car l’état de mes finances ne me permet pas de faire des réclames. Ainsi, les utilisateurs peuvent vraiment me remercier en partageant le logiciel en ligne. | ||
+ | |||
+ | FinalCrypt est aussi une déclaration politique qui dit à « Big Brother » que nous exigeons le respect de notre vie privée. | ||
+ | |||
+ | **Outtro | ||
Ligne 51: | Ligne 100: | ||
- | Finalcrypt seems to be an answer to the current work being done by government agencies on elliptical curve encryption, ‘coz, let’s face it, the threat to privacy is internal these days too. (Like when the GCHQ hacked Belgain telecoms). Cryptography is almost the only thing that protects your digital privacy, and, if you care, you should encrypt everything. If you want to keep your data truly safe, you need OTP and thus Finalcrypt. Ron has put in tremendous effort to make your world a safer place. Not all heroes wear capes. | + | Finalcrypt seems to be an answer to the current work being done by government agencies on elliptical curve encryption, ‘coz, let’s face it, the threat to privacy is internal these days too. (Like when the GCHQ hacked Belgain telecoms). Cryptography is almost the only thing that protects your digital privacy, and, if you care, you should encrypt everything. If you want to keep your data truly safe, you need OTP and thus Finalcrypt. Ron has put in tremendous effort to make your world a safer place. Not all heroes wear capes.** |
+ | |||
+ | Postface : | ||
+ | |||
+ | Nous avons éliminé quelques-unes des questions les plus techniques concernant FinalCrypt, mais si vous voulez davantage de renseignements, | ||
+ | |||
+ | FinalCrypt semble être une réponse au travail actuel accompli par des agences gouvernementales concernant la cryptographie à courbes elliptiques, | ||
+ | |||
issue152/entretien.1577692106.txt.gz · Dernière modification : 2019/12/30 08:48 de d52fr