Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

New Snowden documents say NSA can break common Internet encryption
Reuters ^ | Sep 5, 2013 | Joseph Menn

Posted on 09/05/2013 4:00:28 PM PDT by Kaosinla

(Reuters) - The U.S. National Security Agency has secretly developed the ability to crack or circumvent commonplace Internet encryption used to protect everything from email to financial transactions, according to media reports citing documents obtained by former NSA contractor Edward Snowden.

The Guardian, The New York Times and journalistic nonprofit ProPublica reported on Thursday that the U.S. intelligence agency used a variety of means, ranging from the insertion of "back doors" in popular tech products and services, to supercomputers, secret court orders and the manipulation of international processes for setting encryption standards.

The publications said the NSA and its British partner Government Communications Headquarters (GCHQ) reported making strides against Secure Sockets Layer technology, which protects millions of websites beginning in "Https," and virtual private networks, which are common for remote office workers and for people seeking to obscure their locations.

(Excerpt) Read more at reuters.com ...


TOPICS: Constitution/Conservatism; Front Page News; Government; News/Current Events
KEYWORDS: leaker; nsa; privacy; snowden

1 posted on 09/05/2013 4:00:28 PM PDT by Kaosinla
[ Post Reply | Private Reply | View Replies]

To: Kaosinla

Sorry, but to this I’ll contribute a “duh”.


2 posted on 09/05/2013 4:06:45 PM PDT by TheZMan (Buy more ammo.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Kaosinla

Is anyone genuinely surprised by this?


3 posted on 09/05/2013 4:06:50 PM PDT by Shadow44
[ Post Reply | Private Reply | To 1 | View Replies]

To: Kaosinla

What about PGP?


4 posted on 09/05/2013 4:07:19 PM PDT by OpusatFR
[ Post Reply | Private Reply | To 1 | View Replies]

To: TheZMan

Exactly!

I believe that the reason that there is so many patches and updates to an O/S and other software is due to co.’s leaving programming insecure at the behest of the NSA and other intelligence tentacles.


5 posted on 09/05/2013 4:13:24 PM PDT by Kaosinla (The More the Plans Fail. The More the Planners Plan.)
[ Post Reply | Private Reply | To 2 | View Replies]

To: Shadow44

Anybody elsewhere in the world is NOT going to use a computer system that has servers based in the US. They’d be crazy stupid to do so.


6 posted on 09/05/2013 4:16:11 PM PDT by glorgau
[ Post Reply | Private Reply | To 3 | View Replies]

To: Shadow44

The important thing is that this NSA mess is being periodically brought into the public eye, so that said public is still thinking about come time for elections in 2014, 2016 and thereafter. Then, those running for office who actually intend to do something productive about this will shock everyone. That is the fundamental issue at this point.


7 posted on 09/05/2013 4:18:57 PM PDT by freedom46and2
[ Post Reply | Private Reply | To 3 | View Replies]

To: Kaosinla

Seems the NSA can do everything but detect enemy activity. But then I realize WE ARE THE ENEMY of the current United States Government.


8 posted on 09/05/2013 4:36:29 PM PDT by onedoug
[ Post Reply | Private Reply | To 1 | View Replies]

To: Abathar; Abcdefg; Abram; Abundy; albertp; Alexander Rubin; Allosaurs_r_us; amchugh; ...



Libertarian ping! Click here to get added or here to be removed or post a message here!

9 posted on 09/05/2013 4:41:06 PM PDT by bamahead (Few men desire liberty; most men wish only for a just master. -- Sallust)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Kaosinla

The NSA can probably crack most encryption methods but they will expend significant resources to do so, so they probably don’t unless you catch their interest. Everyone should include some encrypted random data in their messages to keep them busy. It takes even longer for them to figure out it’s crap.


10 posted on 09/05/2013 6:48:33 PM PDT by dmcnash (Back off! I'm a Scientist.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Ernest_at_the_Beach; martin_fierro; ShadowAce; Swordmaker

Gee, there’s an effin’ surprise. I’ve always gotten a good laugh at the estimates for the length of time (greater than the age of the universe) required to do a brute-force crack of the higher-end encryptions, when all it takes is multiple fast CPUs working on bit-copied images of the files or drives using multiple virtual machines, or farmed out like Folding-At-Home. Thanks Kaosinla.


11 posted on 09/05/2013 7:06:31 PM PDT by SunkenCiv (It's no coincidence that some "conservatives" echo the hard left.)
[ Post Reply | Private Reply | View Replies]

To: Shadow44

Ain’t it the truth! I’ve been trying to tell people for years that the government uses all communication technology to spy on us. We volunteered.


12 posted on 09/05/2013 7:55:18 PM PDT by VerySadAmerican (".....Barrack, and the horse Mohammed rode in on.")
[ Post Reply | Private Reply | To 3 | View Replies]

To: Kaosinla

That’s a good workable theory for all but M$.


13 posted on 09/06/2013 6:25:47 PM PDT by Paladin2
[ Post Reply | Private Reply | To 5 | View Replies]

To: Kaosinla
The Fourth amendment (and the First soon to follow), is null and void. And there is only one way to go back...

...or is there?

5.56mm

14 posted on 09/06/2013 6:31:31 PM PDT by M Kehoe
[ Post Reply | Private Reply | To 1 | View Replies]

To: M Kehoe
The Fourth amendment (and the First soon to follow), is null and void. And there is only one way to go back... ...or is there?

I believe there are a (very) few options. And questions of scale that may affect the available options.

15 posted on 09/06/2013 6:35:36 PM PDT by tacticalogic ("Oh, bother!" said Pooh, as he chambered his last round.)
[ Post Reply | Private Reply | To 14 | View Replies]

This supposed capability really shouldn’t concern anyone in the practical sense.

“Common Internet encryption” primarily secures the transmission of sensitive data that is otherwise readable at the endpoints where vulnerabilities exceed the risk the NSA “might” impose.

Remember, Congress is responsible for policy and funding.


16 posted on 10/09/2013 1:18:44 AM PDT by Gene Eric (Don't be a statist!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Kaosinla
Alexander the Geek aspires to find needles in the haystack.

But, before he can do that, he needs to assemble the haystack.

Reportedly, there are problems. If only NSA were as competent and cost-effective as Google! But NSA is government. So there is little hope!

NSA can't break existing encryption, properly deployed. But it's mostly not properly deployed.

17 posted on 10/09/2013 2:00:56 AM PDT by cynwoody
[ Post Reply | Private Reply | To 1 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson