Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

N.S.A. Foils Much Internet Encryption
New York Times ^ | September 5, 2013 | NICOLE PERLROTH, JEFF LARSON and SCOTT SHANE

Posted on 09/05/2013 12:14:05 PM PDT by Alter Kaker

The National Security Agency is winning its long-running secret war on encryption, using supercomputers, technical trickery, court orders and behind-the-scenes persuasion to undermine the major tools protecting the privacy of everyday communications in the Internet age, according to newly disclosed documents.

The agency has circumvented or cracked much of the encryption, or digital scrambling, that guards global commerce and banking systems, protects sensitive data like trade secrets and medical records, and automatically secures the e-mails, Web searches, Internet chats and phone calls of Americans and others around the world, the documents show.

Many users assume — or have been assured by Internet companies — that their data is safe from prying eyes, including those of the government, and the N.S.A. wants to keep it that way. The agency treats its recent successes in deciphering protected information as among its most closely guarded secrets, restricted to those cleared for a highly classified program code-named Bullrun, according to the documents, provided by Edward J. Snowden, the former N.S.A. contractor.

(Excerpt) Read more at nytimes.com ...


TOPICS: Foreign Affairs; Front Page News; News/Current Events
KEYWORDS: nsa; security; snowden
Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-80 ... 101-107 next last
To: Alter Kaker

This leak makes me wonder a bit about the security of AES.

Personally I like Blowfish and RC4 .. many think RC4 is weak but I think it’s fine if properly implemented. It’s very easy to code RC4 for use in embedded systems. I love RC4 for its elegance and simplicity. http://ciphersaber.gurus.org/

ECC is what we need to use for public key, it’s what the NSA uses.

I imagine the NSA uses a lot of custom ASIC chips for code breaking...probably made in their own Fab. I bet NSA would be great at Bitcoin mining.

The ability of NSA to decrypt a particular implementation or type of encryption is tested by foreign adversaries by encoding false info with the system and watching to see if the U.S. takes any action based on that info.

Don’t trust anything but open-source encryption products.

For the most critical data I’d recommend the two parties create a truly random set of data using a noise source like brownian noise. Both parties must hold this data and keep it secure. This allows the parties to add a one-time-pad step to their usual encryption routine. The one-time-pad is unbreakable by any method, even when powerful quantum computers come on line they will have no hope of penetrating a one-time-pad system. The big problem with one-time-pad is you are taken back to the bad old days of the key exchange problem...secret data that must be shared by all users, it’s a drag!

Steganography must still be a huge problem for the NSA since there are nearly limitless ways to implement it. Just a few bits inside a huge data set can hold important info...how do you discern this??


41 posted on 09/05/2013 1:53:36 PM PDT by Bobalu (Bobo the Wonder Marxist leads Operation Rodeo Clown against Syria)
[ Post Reply | Private Reply | To 1 | View Replies]

To: The Antiyuppie
AAMTD SFSF SH%G)E DFWERJPA-id
%&HTJLS: PM. @! RTB..?Q

Hey, no shit! I was just going to say the same thing!

CA....

42 posted on 09/05/2013 1:56:59 PM PDT by Chances Are (Seems I've found that silly grin again....)
[ Post Reply | Private Reply | To 38 | View Replies]

To: Black Agnes

I do that now. About the only thing I’ll use plastic for is gasoline since it’s less stressful to pay at the pump than to deal with idiots in line inside and the idiots running the cash register.


43 posted on 09/05/2013 1:58:01 PM PDT by Orangedog (An optimist is someone who tells you to 'cheer up' when things are going his way)
[ Post Reply | Private Reply | To 21 | View Replies]

To: cherry; GeronL

Browse in an incognito window if you don’t want cookies.


44 posted on 09/05/2013 1:58:18 PM PDT by Lonesome in Massachussets (Doing the same thing and expecting different results is called software engineering.)
[ Post Reply | Private Reply | To 4 | View Replies]

To: Lonesome in Massachussets

and use duckduckgo for a search engine


45 posted on 09/05/2013 1:59:08 PM PDT by GeronL
[ Post Reply | Private Reply | To 44 | View Replies]

To: I want the USA back

It’s mathematics, it’s not hard to tell if a bunch of bits is random or contains a pattern. True randomness is very hard to do. Once data is encrypted it still can contain some non-randomness that can be discerned. The job is to decrypt to the most non-random state you can. The most non-random state might still be something like a simple book cypher so it won’t be readable yet...or it could be plain-text.

Subtle steganography is a real headache for those looking for secret meaning in masses of data.


46 posted on 09/05/2013 1:59:58 PM PDT by Bobalu (Bobo the Wonder Marxist leads Operation Rodeo Clown against Syria)
[ Post Reply | Private Reply | To 39 | View Replies]

To: Alter Kaker

V’z abg jbeevrq, V hfr gur fhcre frpher naq gurbergvpnyyl haoernxnoyr EBG13 nytbevguz.


47 posted on 09/05/2013 2:00:41 PM PDT by Lonesome in Massachussets (Doing the same thing and expecting different results is called software engineering.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Chances Are

“Hey, no shit! I was just going to say the same thing!”

I guess I will have to block FR from my 11 year old granddaughter.


48 posted on 09/05/2013 2:00:53 PM PDT by TexasGator
[ Post Reply | Private Reply | To 42 | View Replies]

To: I want the USA back

You are more or less on to it. Bobalu’s answer is correct, but let me elaborate some. They might look for common English words. See here for how it was done a Bletchley Park:

http://en.wikipedia.org/wiki/Bombe#Bombe_menu

Read the entire article it’s terribly interesting.


49 posted on 09/05/2013 2:12:50 PM PDT by Lonesome in Massachussets (Doing the same thing and expecting different results is called software engineering.)
[ Post Reply | Private Reply | To 39 | View Replies]

To: Alter Kaker

this is going to kill the cloud computing bandwaggon.


50 posted on 09/05/2013 2:14:12 PM PDT by longtermmemmory (VOTE! http://www.senate.gov and http://www.house.gov)
[ Post Reply | Private Reply | To 1 | View Replies]

To: GeronL

Have your brother at least, install DoNotTrackMe from the FF apps.


51 posted on 09/05/2013 2:15:06 PM PDT by max americana (fired liberals in our company after the election, & laughed while they cried (true story))
[ Post Reply | Private Reply | To 6 | View Replies]

To: Black Agnes

I use cash everywhere, regardless of business size.


52 posted on 09/05/2013 2:16:37 PM PDT by max americana (fired liberals in our company after the election, & laughed while they cried (true story))
[ Post Reply | Private Reply | To 21 | View Replies]

To: qman; proxy_user

there is a solution.

of course, I won’t put it out without being able to properly monetize it

which is the sticky wicket


53 posted on 09/05/2013 2:27:10 PM PDT by sten (fighting tyranny never goes out of style)
[ Post Reply | Private Reply | To 19 | View Replies]

To: sten

The only way I see to insure privacy is to encrypt and decrypt on a separate, standalone computer that is never connected to the network.


54 posted on 09/05/2013 2:31:48 PM PDT by tacticalogic ("Oh, bother!" said Pooh, as he chambered his last round.)
[ Post Reply | Private Reply | To 53 | View Replies]

To: Alter Kaker

Microsoft is one of the companies that has installed a back door into their vaunted ‘Bitlocker’ encryption protocol:

http://westlawinsider.com/law-and-techology/german-government-bans-windows-8-use-nsa-spying-puts-american-companies-risk/


55 posted on 09/05/2013 2:47:26 PM PDT by MeganC (A gun is like a parachute. If you need one, and don't have one, you'll never need one again.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Alter Kaker

56 posted on 09/05/2013 2:49:08 PM PDT by Travis McGee (www.EnemiesForeignAndDomestic.com)
[ Post Reply | Private Reply | To 1 | View Replies]

To: proxy_user

One of my recent (and now unused) passwords was FUBO01202017

It’s be a shame if that went totally wasted on some Democrat at the NSA.


57 posted on 09/05/2013 2:52:08 PM PDT by MeganC (A gun is like a parachute. If you need one, and don't have one, you'll never need one again.)
[ Post Reply | Private Reply | To 23 | View Replies]

To: Black Agnes

Commercial encryption is already non-useful with regards to national level eavesdropping.

It’s not the specific communications that are necessarily vulnerable, it’s the exploits sold by international corporations to anyone who is willing to pay. The exploits allow access for further information gathering (such as key logger software).

Do you have a new printer? Do you have a new mouse? Do you have the most recent update of Acrobat? Exploits of drivers and productivity software is major business these days.

Guess who pays megabucks for these exploits? Every major intelligence organization.

However, criminal enterprises worry me most; and now my perception is that many overseas criminal enterprises work hand in hand with state sponsored cyber eavesdropping organizations.

Sorry to wax long winded. Just my reason for keeping as minimal an internet presence as possible.

R
Toad


58 posted on 09/05/2013 3:07:05 PM PDT by Toadman (To anger a Conservative, tell a lie. To anger a liberal, tell the truth.)
[ Post Reply | Private Reply | To 18 | View Replies]

To: qman

Problem though is to remember all those characters.


59 posted on 09/05/2013 3:21:14 PM PDT by Biggirl (“Go, do not be afraid, and serve”-Pope Francis)
[ Post Reply | Private Reply | To 19 | View Replies]

To: Travis McGee

Revolt is coming.

Soon it will all fail.


60 posted on 09/05/2013 3:22:22 PM PDT by Biggirl (“Go, do not be afraid, and serve”-Pope Francis)
[ Post Reply | Private Reply | To 56 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-80 ... 101-107 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson