Offshore Outsourcing & Scammer

Blog about offshore outsourcing and scammer in the outsourcing industry

Why Google denies us real end-to-end encryption?

Why did we still do not have easy-to-use end-to-end encryption? The standard answer is far too complicated! But this is nonsense; Apple shows how to make it simple.

AndroidThe technical challenges for true end-to-end encryption are solved for many years. In principle, one could make the simple. With it would be sure not just anybody can easily read along our private and business communications.

Nevertheless, emails, chats and phone calls are still almost always in plain text. They are secured for transport (SSL / TLS), but at least, the service provider can read everything and often does. This course also various other interested parties that attach to help him, the contents of confidential messages.

At this point I always hear, end-to-end encryption is still far too complicated. Alone to generate key, not to mention the checking and signing - end users don’t like do that. In fact, I'll never get anyone to use PGP. Nevertheless, the argument is simply wrong.

Because there is already end-to-end encryption, which is so simple that they use many millions of users and do not even know this: Apple's iMessage encrypts any message with a key that is only known by the recipient. Not Apple, not the network operator and not the NSA. And the highlight: Thanks to Apple's iMessage is a sophisticated design that not a bit more complicated than traditional SMS. Each iPhone owners use it easily and has not to worry about the encryption. The encryption is just there.

This one who wants to read along these messages has to attack this encryption. This also applies to Apple or someone standing there with a National Security Letter at the door. In practice this means: It is not enough that Apple or engage NSAs to the appropriate server to write there the plaintext with, as would be the case with Google, Skype and almost all other services. Instead, Apple would have to actively engage in communication and distribute counterfeit keys.

Of course, experts will argue that Apple does not satisfy the pure doctrine and the user himself has no control over his keys. Specifically, the system is not hedged against the fact that Apple itself eventually distributed as "Man in the Middle" wrong keys. But these are details that go past the actual heart of the matter. It can get improved without much effort. (The ignorance and arrogance of Apple is typical and with that the refuse demands for such extensions and perhaps the other side of the coin is that Apple like no other company can create easy-to-use products). Is crucial, however, Apple is the only major manufacturer and service provider offering such end-to-end encryption at all.

The real question is: Why does Google's Android has no a similar function and nourishes us with Hangouts without proper encryption? I seriously doubt that Google no one has come up with this idea or that technological pioneer in so many areas that could not be implemented just as elegant as Apple; Moxie Marlinspike shows with TextSecure how this might look like. There is only one plausible explanation for why Google has nothing to offer in this respect:

Easy to use end-to-end encryption is undesirable.

There is strong political interest to be able to read the communication of all Internet users at any time without much effort. We can only speculate as large as the pressure is exerted by politicians and authorities on the Group. But much harder probably weighs Google own economic interest: With functioning end-to-end encryption, Google would torpedo his own business model. This is in fact based on that the Group can read and analyze our data - and then to present, inter alia for suitable advertising. This of course applies equally to Facebook; so you can write off any hopes about WhatsApp.

Apple, however, earns his money is still with the sale of equipment and Commissions from business apps and content. And they deserve it obviously so good that they - unlike Google and Facebook - have the luxury to leave us our privacy.

What does that mean for us now? Not that we should buy now Apple products. There are too many things that you can refuse to Apple for good reason. But we must not be fobbed off with cloudy promise to respect our privacy and the protection of our business communications to us. Correct and above all simple end-to-end encryption for all could be done - we must demand only finite.


Operator of revenge porn site sentence for a long time in prison

In February the operator of the website was found guilty. Now the sentence is clear: He has to be for 18 years in prison for 31 counts of identity theft, extortion, and conspiracy.

JustitiaIn its judgment, the Court in San Diego, California, remained just below the possible maximum sentence of 20 years. According to the indictment, the 28-year-old Kevin Bollaert earned with his "business model" 30 000 US dollars: he published on intimate images of women and men given to him by the ex-partners at the end of the relationship for having revenge. He invited others posting the pictures including name, age, residence and a link to their Facebook profile. However, authorities say he ran afoul of state laws against identity theft, which prevent even simple personal information like names and addresses from being used "for any unlawful purpose, including with the intent to annoy or harass."  At he offered to delete these pictures from the other website for a payment of $ 350.

Even before the verdict, which ran on identity theft and extortion, Kevin B. was sentenced to pay a fine in the amount of 385 000 US dollars for child pornography. The attorney of one victim announced in his blog post that the victim should have been a minor at the time of the shoot. Accordingly, the Court classified the images in two cases as child pornography, which contributed significantly to the amount of damages. It is also prohibited the defendants ever to publish pictures of the applicant again.

Evidence of the harassing effect was published in the state's complaint against Bollaert. One woman e-mailed Bollaert saying she started getting "nonstop harassing messages" after her photos went up on ugotposted. Another told him she was "scared for my life," continuing: "People are calling my work place and they obtained the information from this site! I did not give permission for anyone to put up those pictures or my personal information. I have contacted the police but these pictures need to come down! Please!"

One Jane Doe victim reported receiving dozens of Facebook and Instagram friend requests after she was featured on the site, as well as text messages with lewd photos and several phone calls, which made her "worried for her safety." Another woman had "over a hundred different sources" try to contact her after her information went up on ugotposted, and she ultimately changed her phone number.

This case shows that nobody can hide himself in the anonymity of the Internet. As soon as a case from a public prosecutor is opened the anonymity gets dropped and the fraudster ends up in the prison!!!



Offset uncomfortable official for the 45th time

Ashok KhemkaNew Delhi - An uncomfortable officer has been placed in India for the 45th time. The NDTV Indian TV channel reported that Ashok Khemka got now moved to a simple job in the Department of Archaeology and Museums of the State of Haryana. Khemka is known all over India, because during his 23-years career he has uncovered numerous corruption scandals - and he was removed from his positions by various governments again and again.

Before Khemka has been transport officer in Haryana. He tweeted after the takeover of the position a few months ago: "We have to decide between road safety, protection of the public good and the environment on the one site and private profit on the other side". He said he wanted to tackle license purchase on the black market and make the names of all illegal profiteers public.

It never came. Now he tweeted: "I have taken great pains to fight corruption and enforce reforms in the transport sector, although my room was very limited and many stakeholders were involved deeply. That moment is now very painful."

What can we expect from a country where such a corruption and fraud is already public and nobody is doing something against it? 

Why should in such a case the business to be honest? 

India is a land of scam?
No! There are after all honest people there too. Don’t throw all into one pot. A good example for a honest person is Ashok Khemka. 
He leads by being a good example and I hope that many people will follow his example.


SPAM from an anti email spammer tool:

A LinkedIn member has asked me to reply to his email address. I have sent an email to him and got immediately a reply from with the following content:

Hello Rudolf Faix,
Your message about "RE: NEW DEFENCE RESEARCH PAPER & BOOK" was waitlisted.
Please add yourself to my Guest List so your messages will be delivered to my Inbox. Use the link below.

Click here to deliver your message

Thank you,
Powered by Boxbe -- "End Email Overload"
Boxbe, Inc. | 65 Broadway, Suite 601 | New York, NY 10006
Privacy Policy | Unsubscribe

Final-Recipient: rfc822;
Diagnostic-Code: X-Boxbe-Notice; message given low priority. To fix, see accompanying notice.
Status: 4.7.0

As I did not send any message to somebody from the domain and I did not subscribe somewhere (see the unsubscribe link under their signature) is this email nothing else than SPAM. Following a link in an unsolicitous email will result in more spam, because with this you'll verify that your email exists. For this I did not press the "Click here to deliver your message" and the "Unsubscribe" link. I simple reported this e-mail as spam. In future, I'll not receive any message from them.

Don't expect any answer from me if you like to communicate with me per e-mail and use a similar service like I'll even will not see in future a confirmation link from If you are too lazy to filter out a few spam messages a week, then it would be better use snail mail instead of e-mail.

The full email headers:

Received: by with SMTP id h138csp1291074ith;
        Thu, 2 Apr 2015 03:16:40 -0700 (PDT)
X-Received: by with SMTP id m64mr40519897qhb.6.1427969800053;
        Thu, 02 Apr 2015 03:16:40 -0700 (PDT)
Return-Path: <>
Received: from ( [])
        by with ESMTPS id v32si4526164qge.71.2015.
        for <>
        (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128);
        Thu, 02 Apr 2015 03:16:40 -0700 (PDT)
Received-SPF: pass ( domain of designates as permitted sender) client-ip=;
       spf=pass ( domain of designates as permitted sender);
       dkim=pass (test mode)
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; s=dyn;;
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; s=dynect1213;;
DomainKey-Signature: a=rsa-sha1; c=nofws; q=dns; s=dyn;;
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple;; s=s1;
	t=1427969796; bh=MFvOv6JBBu06WCfwdUusWnzQxr+9B12zOnpolDxkvgs=;
Date: Thu, 2 Apr 2015 03:16:36 -0700 (PDT)
To: Rudolf Faix <>
Message-ID: <>
Subject: Re: RE: NEW DEFENCE RESEARCH PAPER & BOOK (Action Requested)
MIME-Version: 1.0
Content-Type: multipart/report; 
Envelope-From: <>
Auto-Submitted: auto-replied
X-DynectEmail-Msg-Hash: fRSspyRTfXPA1bNH7n3imVZvebSdS9eyc4kWgmyq9SLBoK2B0cDq/sP+lmBC1F3v2eCnejSeu4OeejcjA6Fc96K38r8qii2AqNEEGQbgd3I=
X-Feedback-ID: R29sZFRyYW5WTVRBcw==:477795:315291:dyn06
List-Unsubscribe: <>, <>

Content-Type: multipart/alternative; 
Content-Disposition: inline
Content-Description: Notification

The contents of this message require a modern email client
for correct display.  If you are reading this message, it may
be because your reader is without MIME support.
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Content-Disposition: inline


Jailbreak via e-mail Scams

JailFile and carved soap gun are past: Modern Fugitive obtained his release by social engineering, as the case of a British prisoner shows.

A prisoner in London succeeded via an e-mail fraud his release.  He smuggled according to the BBC report a smartphone into the jail. He used the smartphone to create a similar sounding domain of the court with a registration of the investigating officer. In e-mails with this TLD he pretended to be a senior official and sent instructions to his dismissal to the prison administration. He got released without difficulty on the 10th of March.

Just three days later, when his defenders wanted to talk to him, the prison staff noticed that M. has been unlawfully removed from the jail. A few days after, M. handed himself later.  So much ingenuity obviously made an impression: both judge and prosecutor M. classified as "brilliant" criminal one, as the BBC writes.

The verdict on the talented social engineer M. is expected in April; he is said to have operated investment fraud under false identities and swindled about more than 1.8 million pounds.