Free Republic
Browse · Search
General/Chat
Topics · Post Article

To: PieterCasparzen
The secret court orders, retroactive immunity, non-disclosure requirements, etc.

http://www.theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-order

No, I'm not. If the phone can be intercepted prior to delivery they can install hardware or software on it that serves their needs. I also told you that the NSA intercepts data at the carrier. Your article specifically refers to an order to Verizon, a carrier.

The NSA intercepted Meta data, the kind of data that passed through carriers. . . however, it is entirely possible, as security experts have claimed is possible, they did intercept Angela Merkel's iphone and installed a device in it, an exploit that requires physical possession of the device to compromise the built in security.. If so, then the fault should lie with her security people for not checking what she was using. They should have provided her a randomly purchased iphone.

It turns out the NSA was monitoring the phones of all GERMAN Chancellors since 2002, five years before the release of the iPhone. . . using signal intercept techniques. . . Either through the carriers, or more surreptitious means.

I suspect the NSA is using a surreptitious "man-in-the-middle" approach as more and more unaffiliated cell towers are being discovered located around the country, and perhaps the world. These spurious cellular towers act as normal towers, passing on calls, data, etc., but seems to not be connected to any carrier, yet could easily intercept what passes through before being passed on. Why not bypass the need for even secret blanket search warrants by merely grabbing it out of the air?

Your second link refers to an algorithm to decrypt Secure Socket Layer encryption used in Internet website traffic. . . the very thing we're talking about in what is EASY to decrypt and to place an unnoticed decryption algorithm into. Sorry. It's just not the same thing as 128 bit password encryption.

31 posted on 09/20/2014 1:07:25 PM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 22 | View Replies ]


To: Swordmaker
Your second link refers to an algorithm to decrypt Secure Socket Layer encryption used in Internet website traffic. . . the very thing we're talking about in what is EASY to decrypt and to place an unnoticed decryption algorithm into. Sorry. It's just not the same thing as 128 bit password encryption.

What do you mean by "password encryption" ?

In your first post to me, you said "The owners of the devices encrypt their data to 128 bit encryption with a key only they have."

Is the Apple phone supposed to be secure because it keeps the data stored on it encrypted ? That's only protection for the case where the "bad guy", "spy" physically takes a phone and wants to access the data.

If data going to and coming from a phone can be decrypted and viewed then security is pretty much out the window.

This would apply to all phones, really all devices hooked to the internet. If an attacker is determined, the device (computer, phone, etc.) better be hardened, that is, not responsive to attempts to break in.

The owners/users of most compromised computers and phones do not know they are compromised.

The attacker may be black hat or white hat, government or non-government.
33 posted on 09/20/2014 2:09:49 PM PDT by PieterCasparzen (We have to fix things ourselves)
[ Post Reply | Private Reply | To 31 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson