Skip to comments.
NSA Breaks Most Codes (Digital Encryption Used by Business)
Wheeling News-Register ^
| September 6, 2013
Posted on 09/06/2013 10:32:48 AM PDT by Red Steel
click here to read article
Navigation: use the links below to view more comments.
first 1-20, 21-40, 41-57 next last
1
posted on
09/06/2013 10:32:48 AM PDT
by
Red Steel
To: Red Steel
write in pig-latin THEN encrypt it
2
posted on
09/06/2013 10:33:27 AM PDT
by
Mr. K
(Lies, Damned Lies, Statistics, and then Democrat Talking Points.)
To: Mr. K
Put an islamic prayer at the top and they’ll ignore it.
3
posted on
09/06/2013 10:34:12 AM PDT
by
driftdiver
(I could eat it raw, but why do that when I have a fire.)
To: Mr. K
4
posted on
09/06/2013 10:34:45 AM PDT
by
Lazamataz
(Early 2009 to 7/21/2013 - RIP my little girl Cathy. You were the best cat ever. You will be missed.)
To: Red Steel
“Security experts told the news organizations such a code-breaking practice would ultimately undermine Internet security and leave everyday Web users vulnerable to hackers”
Yep. If facebook, google, etc have installed backdoors for the NSA to use to get around encryption, then it is only a matter of time before hackers find those backdoors too.
5
posted on
09/06/2013 10:35:03 AM PDT
by
Boogieman
To: Red Steel
Legal Codes?
Moral Codes?
Ethics Codes?
6
posted on
09/06/2013 10:35:06 AM PDT
by
WayneS
(Don't blame me, I voted for Kodos...)
To: Red Steel
7
posted on
09/06/2013 10:35:12 AM PDT
by
TexasCajun
(Creepy-Ass Cracka -- Don't Call Me Cracker)
To: driftdiver
or a picture of Odumbo as a jpg...
8
posted on
09/06/2013 10:38:37 AM PDT
by
max americana
(fired liberals in our company after the election, & laughed while they cried (true story))
To: Red Steel
‘Most Codes’?.......I wanna know which ones they didn’t break!.............
9
posted on
09/06/2013 10:39:27 AM PDT
by
Red Badger
(It is dangerous to be right in matters where established men are wrong. .....Voltaire)
To: Red Steel
If it comes out that major Class 1 certificate authorities are compromised, the list of root CAs is going to shrink real quick.
Sadly, because Microsoft is considered a root CA for some things, I doubt we’ll see it happen or hear about it.
This is bad news all around.
10
posted on
09/06/2013 10:41:56 AM PDT
by
rarestia
(It's time to water the Tree of Liberty.)
To: TexasCajun
Breaks or were given?
**********************
Google uses a combination of shady but legal tax dodge strategies (double Irish, routing all sales through subsidiaries in countries with no corporate taxation .. etc.) to legally avoid paying taxes in the USA ... many companies have been hounded into paying those taxes although they used the very same strategies... I’m not implying anything here but this makes me go HMMMMM...
11
posted on
09/06/2013 10:43:42 AM PDT
by
Neidermeyer
(I used to be disgusted , now I try to be amused.)
To: Neidermeyer
Google uses a combination of shady but legal tax dodge strategies Good for Google. Their purpose is make money for their shareholders, not support idiotic government redistribution schemes.
12
posted on
09/06/2013 10:46:23 AM PDT
by
from occupied ga
(Your government is your most dangerous enemy)
To: Red Steel
Mention you’re an illegal alien in all your emails and electronic correspondence and government will send you tax paid prizes, gifts and a list of laws you can completely ignore.
13
posted on
09/06/2013 10:46:30 AM PDT
by
dragnet2
(Diversion and evasion are tools of deceit)
To: Red Badger
The one unbreakable code is one-time pad. Some privately made, unpublished audio CD might suffice for the pad (using a new segment of it each time) for a whole lot of messages.
14
posted on
09/06/2013 10:47:04 AM PDT
by
HiTech RedNeck
(The Lion of Judah will roar again if you give him a big hug and a cheer and mean it. See my page.)
To: rarestia
It may turn out that domains with a self-signed certificate are the most secure of all...
To: Red Steel
If you read the entire report you'll see that they don't actually 'break' the codes. i.e., they have no way to break a random GPG/PGP encrypted message. What they are doing is subverting protocols and putting in back doors. Look up "crypto-ag", and you'll find a really good historical example of same.
Check out this article by Bruce Schneier.
16
posted on
09/06/2013 10:48:24 AM PDT
by
zeugma
(Is it evil of me to teach my bird to say "here kitty, kitty"?)
To: from occupied ga
I wouldn’t begrudge it to Google either. But to see the law bent to favor Google over other companies is disappointing.
17
posted on
09/06/2013 10:48:31 AM PDT
by
HiTech RedNeck
(The Lion of Judah will roar again if you give him a big hug and a cheer and mean it. See my page.)
To: Neidermeyer
So what's to stop these guys from profiting from this stolen data?
How do we ever rid ourselves of this beast?
18
posted on
09/06/2013 10:48:50 AM PDT
by
corkoman
To: proxy_user
Well, setting up a certificate authority on a virtual Ubuntu server and hosting your own internal CA is not incredibly difficult for someone willing to read a how-to or wiki.
PKI will go in the crapper if it comes out that public CAs are compromised. We’ll all need to start using symmetric cryptography, but then how do we verify communications without sharing the key or a cert?
19
posted on
09/06/2013 10:57:50 AM PDT
by
rarestia
(It's time to water the Tree of Liberty.)
To: Lazamataz
20
posted on
09/06/2013 10:58:41 AM PDT
by
Mr. K
(Lies, Damned Lies, Statistics, and then Democrat Talking Points.)
Navigation: use the links below to view more comments.
first 1-20, 21-40, 41-57 next last
Disclaimer:
Opinions posted on Free Republic are those of the individual
posters and do not necessarily represent the opinion of Free Republic or its
management. All materials posted herein are protected by copyright law and the
exemption for fair use of copyrighted works.
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson