Free Republic
Browse · Search
News/Activism
Topics · Post Article

Breathtaking -- both the scale of the NSA's exploits and the scale of this leak.
1 posted on 09/05/2013 12:14:05 PM PDT by Alter Kaker
[ Post Reply | Private Reply | View Replies ]


Navigation: use the links below to view more comments.
first 1-2021-22 next last
To: Alter Kaker

And what they can’t break, they record until they can.


2 posted on 09/05/2013 12:17:16 PM PDT by Jack of all Trades (Hold your face to the light, even though for the moment you do not see.)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Alter Kaker
all I know is I was looking up a recipe for "cowboy beef" a couple of weeks ago and today Amazon emails me about a Cowboy recipe book.....

keep your friends close and your enemies closer...

4 posted on 09/05/2013 12:25:43 PM PDT by cherry
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Alter Kaker

Our government practically owns and operates Google and Facebook, too.


5 posted on 09/05/2013 12:27:36 PM PDT by GeorgeWashingtonsGhost
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Alter Kaker

“Properly implemented strong crypto systems are one of the few things that you can rely on,” he said, though cautioning that the N.S.A. often bypasses the encryption altogether by targeting the computers at one end or the other and grabbing text before it is encrypted or after it is decrypted.”

The usual method used is either to steal the encryption passphrase, or use a passphrase-guessing program. These programs are quite useful if you know a lot about the target.


7 posted on 09/05/2013 12:30:10 PM PDT by proxy_user
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Alter Kaker

The NSA are wussies living in their mothers’ basements reading everyone’s emails to get their jollies.

Haven’t stopped a single terrorist attack, by all indications.

The Tsarnaevs are laughing at them.


8 posted on 09/05/2013 12:30:41 PM PDT by Uncle Miltie (Are Marines required to salute Al Qaeda yet?)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Alter Kaker
I read previous articles saying that the NSA is able to read the weaker PTPP encryption, but not the stronger L2TP/IPSec or OpenVPN protocols, at least not in anything approaching near-real time.

I think it's like cracking WEP, but not WPA2.

-PJ

9 posted on 09/05/2013 12:31:16 PM PDT by Political Junkie Too (If you are the Posterity of We the People, then you are a Natural Born Citizen.)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: rarestia

ping


22 posted on 09/05/2013 12:46:10 PM PDT by null and void (I'm betting on an Obama Trifecta: A Nobel Peace Prize, an Impeachment, AND a War Crimes Trial...)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Alter Kaker
So NSA deliberately interfered with encryption standards so that it could create backdoors for itself?

Great. Just great!

28 posted on 09/05/2013 12:58:14 PM PDT by Timber Rattler (Just say NO! to RINOS and the GOP-E)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Alter Kaker

FWIW my credit union just called and said Visa had notified them my debit card was on a list that had been hacked. But nothing appears to be missing. And they are sending me a new card.


30 posted on 09/05/2013 1:07:16 PM PDT by bigheadfred (INFIDEL)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Alter Kaker

We need to shut this shit down or we are slaves, and our futures is the ovens.


31 posted on 09/05/2013 1:15:43 PM PDT by LowTaxesEqualsProsperity
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Alter Kaker

Any encryption scheme merely delays and increases the effort needed to read a message. That should be well understood by anyone who uses any encryption scheme. In some ways encryption makes your communications more vulnerable as attention tends to be focused on encrypted messages, rather than the vast number of clear text messages.

Of course the best way to keep your message safe is to use a one time use code, not a repeated cipher.

The other thing that protects your messages is the provision of vast amounts of false information with similar cipher techniques to those used with your true information. To work best, this is done with a plan as to the false ideas you want your enemy to think is true, and the true ideas you want your enemy not to know.

During WWII Germany tried to present an image of great strength, so enemies would be discouraged. They sought to plant the notion that they were manufacturing 1400 tanks a month.

Analysis of a few captured tanks in north Africa put the lie to that. The serial numbers were collected and seemed to all be very close together. Analysis of castings showed that the parts came from a small number of masters, and that put an upper limit on the rate of manufacture.

For people who seek to look behind the lies disseminated by propagandists, there is a good Wikipedia article on “The German Tank Problem”.


33 posted on 09/05/2013 1:16:38 PM PDT by donmeaker (Blunderbuss: A short weapon, ... now superceded in civilized countries by more advanced weaponry.)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Alter Kaker; All

To all Freepers; Get some kind of encryption software for your email. Send 50 emails a day with a single message: “Drink more Ovaltine.”


35 posted on 09/05/2013 1:17:49 PM PDT by TangoLimaSierra (To the left the truth looks like Right-Wing extremism.)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Alter Kaker

It’s always been a race, someone comes up with a way of protecting something and then someone that wants that comes up with a way to crack that protection. The NSA has been doing what governments always do which is to constantly seek power and advantage. SSL and VPN’s are mostly based on public key cryptography that is old and in dire need of replacement and has been known to be vulnerable for some time. Even the newer public key algorithms are not anywhere near as good as AES so don’t expect any of them to provide protection against any government because they won’t.

The distressing thing is not that we are vulnerable but that the USG has bought and paid for so many technology companies and service providers that the encryption methods have become moot because they are using back doors to suck up everything before the data hits any encryption device. We’ve been sold out by Facebook, Goggle, Yahoo, Microsoft, Verizon, AT&T, etc.

Snowden did tremendous damage to our countries ability to suck up foreign intelligence and more than likely a lot of damage to the US economy long term as I see most countries moving away from US based suppliers and more towards either open source or suppliers from second and third world (read not China, Russia, UK, etc.). If I was a non-US based company or country I’d certainly be shopping elsewhere now and would imagine that a lot of them are scrambling to do just that.


37 posted on 09/05/2013 1:37:47 PM PDT by trapped_in_LA
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Alter Kaker

How does a decrypter know it has been successful? How does it know the difference between gibberish and clear text? It’s a computer program and doesn’t understand anything. Does it look for words like “the” and “bomb”?
Don’t real terrorists use words like “the” and “Package”? Wouldn’t it write in code, like “Aunt Susie is going to deliver the package to New York”
And anyway, why would a true terrorist write in English?

In other words, if the decrypter doesn’t know what it’s looking for, what does it look for?

I would like to know. Not being flippant, for a change.


39 posted on 09/05/2013 1:44:53 PM PDT by I want the USA back
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Alter Kaker

This leak makes me wonder a bit about the security of AES.

Personally I like Blowfish and RC4 .. many think RC4 is weak but I think it’s fine if properly implemented. It’s very easy to code RC4 for use in embedded systems. I love RC4 for its elegance and simplicity. http://ciphersaber.gurus.org/

ECC is what we need to use for public key, it’s what the NSA uses.

I imagine the NSA uses a lot of custom ASIC chips for code breaking...probably made in their own Fab. I bet NSA would be great at Bitcoin mining.

The ability of NSA to decrypt a particular implementation or type of encryption is tested by foreign adversaries by encoding false info with the system and watching to see if the U.S. takes any action based on that info.

Don’t trust anything but open-source encryption products.

For the most critical data I’d recommend the two parties create a truly random set of data using a noise source like brownian noise. Both parties must hold this data and keep it secure. This allows the parties to add a one-time-pad step to their usual encryption routine. The one-time-pad is unbreakable by any method, even when powerful quantum computers come on line they will have no hope of penetrating a one-time-pad system. The big problem with one-time-pad is you are taken back to the bad old days of the key exchange problem...secret data that must be shared by all users, it’s a drag!

Steganography must still be a huge problem for the NSA since there are nearly limitless ways to implement it. Just a few bits inside a huge data set can hold important info...how do you discern this??


41 posted on 09/05/2013 1:53:36 PM PDT by Bobalu (Bobo the Wonder Marxist leads Operation Rodeo Clown against Syria)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Alter Kaker

V’z abg jbeevrq, V hfr gur fhcre frpher naq gurbergvpnyyl haoernxnoyr EBG13 nytbevguz.


47 posted on 09/05/2013 2:00:41 PM PDT by Lonesome in Massachussets (Doing the same thing and expecting different results is called software engineering.)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Alter Kaker

this is going to kill the cloud computing bandwaggon.


50 posted on 09/05/2013 2:14:12 PM PDT by longtermmemmory (VOTE! http://www.senate.gov and http://www.house.gov)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Alter Kaker

Microsoft is one of the companies that has installed a back door into their vaunted ‘Bitlocker’ encryption protocol:

http://westlawinsider.com/law-and-techology/german-government-bans-windows-8-use-nsa-spying-puts-american-companies-risk/


55 posted on 09/05/2013 2:47:26 PM PDT by MeganC (A gun is like a parachute. If you need one, and don't have one, you'll never need one again.)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Alter Kaker

56 posted on 09/05/2013 2:49:08 PM PDT by Travis McGee (www.EnemiesForeignAndDomestic.com)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Alter Kaker
"PLEASE LOG IN

Log in to manage your products and services from The New York Times and the International Herald Tribune.
"

No thanks.


64 posted on 09/05/2013 3:57:44 PM PDT by familyop
[ Post Reply | Private Reply | To 1 | View Replies ]


Navigation: use the links below to view more comments.
first 1-2021-22 next last

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson