Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

NSA Breaks Most Codes (Digital Encryption Used by Business)
Wheeling News-Register ^ | September 6, 2013

Posted on 09/06/2013 10:32:48 AM PDT by Red Steel

Private encryption systems cracked or bypassed by agency

WASHINGTON (AP) - The National Security Agency, working with the British government, has secretly been unraveling encryption technology that billions of Internet users rely upon to keep their electronic messages and confidential data safe from prying eyes, according to published reports Thursday based on internal government documents.

The NSA has bypassed or altogether cracked much of the digital encryption used by businesses and everyday Web users, according to reports in the New York Times, Britain's Guardian newspaper and the news website ProPublica. The reports describe how the NSA invested billions of dollars since 2000 to make nearly everyone's secrets available for government consumption.

In doing so, the NSA built powerful supercomputers to break encryption codes and partnered with unnamed technology companies to insert "back doors" into their software, the reports said. Such a practice would give the government access to users' digital information before it was encrypted and sent over the Internet.

"For the past decade, NSA has led an aggressive, multipronged effort to break widely used Internet encryption technologies," according to a 2010 briefing document about the NSA's ...Security experts told the news organizations such a code-breaking practice would ultimately undermine Internet security and leave everyday Web users vulnerable to hackers

...One document said GCHQ had been trying for years to exploit traffic from companies like Google, Yahoo, Microsoft and Facebook.

(Excerpt) Read more at theintelligencer.net ...


TOPICS: Crime/Corruption; Extended News; Government
KEYWORDS: nsa
Navigation: use the links below to view more comments.
first 1-2021-4041-57 next last

1 posted on 09/06/2013 10:32:48 AM PDT by Red Steel
[ Post Reply | Private Reply | View Replies]

To: Red Steel

write in pig-latin THEN encrypt it


2 posted on 09/06/2013 10:33:27 AM PDT by Mr. K (Lies, Damned Lies, Statistics, and then Democrat Talking Points.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Mr. K

Put an islamic prayer at the top and they’ll ignore it.


3 posted on 09/06/2013 10:34:12 AM PDT by driftdiver (I could eat it raw, but why do that when I have a fire.)
[ Post Reply | Private Reply | To 2 | View Replies]

To: Mr. K

Um day.


4 posted on 09/06/2013 10:34:45 AM PDT by Lazamataz (Early 2009 to 7/21/2013 - RIP my little girl Cathy. You were the best cat ever. You will be missed.)
[ Post Reply | Private Reply | To 2 | View Replies]

To: Red Steel

“Security experts told the news organizations such a code-breaking practice would ultimately undermine Internet security and leave everyday Web users vulnerable to hackers”

Yep. If facebook, google, etc have installed backdoors for the NSA to use to get around encryption, then it is only a matter of time before hackers find those backdoors too.


5 posted on 09/06/2013 10:35:03 AM PDT by Boogieman
[ Post Reply | Private Reply | To 1 | View Replies]

To: Red Steel

Legal Codes?

Moral Codes?

Ethics Codes?


6 posted on 09/06/2013 10:35:06 AM PDT by WayneS (Don't blame me, I voted for Kodos...)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Red Steel

Breaks or were given?


7 posted on 09/06/2013 10:35:12 AM PDT by TexasCajun (Creepy-Ass Cracka -- Don't Call Me Cracker)
[ Post Reply | Private Reply | To 1 | View Replies]

To: driftdiver

or a picture of Odumbo as a jpg...


8 posted on 09/06/2013 10:38:37 AM PDT by max americana (fired liberals in our company after the election, & laughed while they cried (true story))
[ Post Reply | Private Reply | To 3 | View Replies]

To: Red Steel

‘Most Codes’?.......I wanna know which ones they didn’t break!.............


9 posted on 09/06/2013 10:39:27 AM PDT by Red Badger (It is dangerous to be right in matters where established men are wrong. .....Voltaire)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Red Steel

If it comes out that major Class 1 certificate authorities are compromised, the list of root CAs is going to shrink real quick.

Sadly, because Microsoft is considered a root CA for some things, I doubt we’ll see it happen or hear about it.

This is bad news all around.


10 posted on 09/06/2013 10:41:56 AM PDT by rarestia (It's time to water the Tree of Liberty.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: TexasCajun

Breaks or were given?
**********************
Google uses a combination of shady but legal tax dodge strategies (double Irish, routing all sales through subsidiaries in countries with no corporate taxation .. etc.) to legally avoid paying taxes in the USA ... many companies have been hounded into paying those taxes although they used the very same strategies... I’m not implying anything here but this makes me go HMMMMM...


11 posted on 09/06/2013 10:43:42 AM PDT by Neidermeyer (I used to be disgusted , now I try to be amused.)
[ Post Reply | Private Reply | To 7 | View Replies]

To: Neidermeyer
Google uses a combination of shady but legal tax dodge strategies

Good for Google. Their purpose is make money for their shareholders, not support idiotic government redistribution schemes.

12 posted on 09/06/2013 10:46:23 AM PDT by from occupied ga (Your government is your most dangerous enemy)
[ Post Reply | Private Reply | To 11 | View Replies]

To: Red Steel

Mention you’re an illegal alien in all your emails and electronic correspondence and government will send you tax paid prizes, gifts and a list of laws you can completely ignore.


13 posted on 09/06/2013 10:46:30 AM PDT by dragnet2 (Diversion and evasion are tools of deceit)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Red Badger

The one unbreakable code is one-time pad. Some privately made, unpublished audio CD might suffice for the pad (using a new segment of it each time) for a whole lot of messages.


14 posted on 09/06/2013 10:47:04 AM PDT by HiTech RedNeck (The Lion of Judah will roar again if you give him a big hug and a cheer and mean it. See my page.)
[ Post Reply | Private Reply | To 9 | View Replies]

To: rarestia

It may turn out that domains with a self-signed certificate are the most secure of all...


15 posted on 09/06/2013 10:48:11 AM PDT by proxy_user
[ Post Reply | Private Reply | To 10 | View Replies]

To: Red Steel
If you read the entire report you'll see that they don't actually 'break' the codes. i.e., they have no way to break a random GPG/PGP encrypted message. What they are doing is subverting protocols and putting in back doors. Look up "crypto-ag", and you'll find a really good historical example of same.

Check out this article by Bruce Schneier.

16 posted on 09/06/2013 10:48:24 AM PDT by zeugma (Is it evil of me to teach my bird to say "here kitty, kitty"?)
[ Post Reply | Private Reply | To 1 | View Replies]

To: from occupied ga

I wouldn’t begrudge it to Google either. But to see the law bent to favor Google over other companies is disappointing.


17 posted on 09/06/2013 10:48:31 AM PDT by HiTech RedNeck (The Lion of Judah will roar again if you give him a big hug and a cheer and mean it. See my page.)
[ Post Reply | Private Reply | To 12 | View Replies]

To: Neidermeyer

So what's to stop these guys from profiting from this stolen data?

How do we ever rid ourselves of this beast?

18 posted on 09/06/2013 10:48:50 AM PDT by corkoman
[ Post Reply | Private Reply | To 11 | View Replies]

To: proxy_user

Well, setting up a certificate authority on a virtual Ubuntu server and hosting your own internal CA is not incredibly difficult for someone willing to read a how-to or wiki.

PKI will go in the crapper if it comes out that public CAs are compromised. We’ll all need to start using symmetric cryptography, but then how do we verify communications without sharing the key or a cert?


19 posted on 09/06/2013 10:57:50 AM PDT by rarestia (It's time to water the Tree of Liberty.)
[ Post Reply | Private Reply | To 15 | View Replies]

To: Lazamataz

am hay ot nay


20 posted on 09/06/2013 10:58:41 AM PDT by Mr. K (Lies, Damned Lies, Statistics, and then Democrat Talking Points.)
[ Post Reply | Private Reply | To 4 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-4041-57 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson