Free Republic
Browse · Search
Topics · Post Article

Skip to comments.

Most Tor Keys May Be Vulnerable To NSA Cracking
Slashdot ^ | 9/6/2013

Posted on 09/07/2013 2:44:34 AM PDT by markomalley

Ars Technica reports that security researcher Rob Graham of Errata Security, after analyzing nearly 23,000 Tor connections through an exit node that Graham controls, believes that the encryption used by a majority of Tor users could be vulnerable to NSA decryption: "About 76 percent of the 22,920 connections he polled used some form of 1024-bit Diffie-Hellman key," rather than stronger elliptic curve encryption. More from the article:

(Excerpt) Read more at ...

TOPICS: Computers/Internet
The referenced article or the excerpt are from a Conde Nast source (cannot be posted to FR). Please use the link above to go to the original.
1 posted on 09/07/2013 2:44:34 AM PDT by markomalley
[ Post Reply | Private Reply | View Replies]

To: markomalley
Consider all civilian crypto schemes broken - the only ones not broken are military ... Russian and Chinese military primarily. A lot of what makes a particular crypto scheme secure is the method and means of transmission. For instance - back in the day - Russian mil used a 4 channel PPM system.

I believe that channel 3 carried the timer signal, while channel one was for voice - usually used for maintenance and some times clear reading of one time 5 day pad code, while the 4th channel was high level encrypted data and voice.

All of that on a single carrier wave - which was complex to break out, however some guy who was a ham in civi life hand-wound copper coils which split the channels into discrete recordable signals.

With the Internet, there are other ways to hide data - like in images. But, that is found in military-like orgs not civi business and personal transactions.

Some guys like to prattle on about this or that distro, but that is all it amounts to - prattle. Each civi scheme is either already broken prior to public release or has built-in backdoors.

Only big mils have the will and money to make and brake secure crypto which only lasts for a while before come other mil breaks it. NSA does not spend major efforts and money on low priority crypto schemes. All traffic is graded according to particular classes - with business ranked just lower than mil air, with civi personal at the bottom.

2 posted on 09/07/2013 5:34:42 AM PDT by PIF (They came for me and mine ... now it is your turn ...)
[ Post Reply | Private Reply | To 1 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794 is powered by software copyright 2000-2008 John Robinson