To: Red Steel
If you read the entire report you'll see that they don't actually 'break' the codes. i.e., they have no way to break a random GPG/PGP encrypted message. What they are doing is subverting protocols and putting in back doors. Look up "crypto-ag", and you'll find a really good historical example of same.
Check out this article by Bruce Schneier.
16 posted on
09/06/2013 10:48:24 AM PDT by
zeugma
(Is it evil of me to teach my bird to say "here kitty, kitty"?)
To: zeugma
If you read the entire report you'll see that they don't actually 'break' the codes. i.e., they have no way to break a random GPG/PGP encrypted message. What they are doing is subverting protocols and putting in back doors. Look up "crypto-ag", and you'll find a really good historical example of same.
Check out this article by Bruce Schneier. In addition to the damage they've done directly by weakining Internet security, they'd done a huge amount of indirect economic damage -- nobody will be able to trust any American-sourced security products (unless they're fully open-sourced) for a long time, if ever. That is going to cost the tech sector billions of dollars.
37 posted on
09/07/2013 2:25:06 PM PDT by
shego
To: zeugma
Check out this article by Bruce Schneier. Thanks for that link. Schneier is usually good.
40 posted on
09/07/2013 11:46:40 PM PDT by
TChad
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson