Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Feds tell Web firms to turn over user account passwords
Cnet ^ | 25 July, 2013 | Declan McCullagh

Posted on 07/25/2013 3:49:38 PM PDT by Errant

The U.S. government has demanded that major Internet companies divulge users' stored passwords, according to two industry sources familiar with these orders, which represent an escalation in surveillance techniques that has not previously been disclosed.

If the government is able to determine a person's password, which is typically stored in encrypted form, the credential could be used to log in to an account to peruse confidential correspondence or even impersonate the user. Obtaining it also would aid in deciphering encrypted devices in situations where passwords are reused.

"I've certainly seen them ask for passwords," said one Internet industry source who spoke on condition of anonymity. "We push back."

(Excerpt) Read more at news.cnet.com ...


TOPICS: Constitution/Conservatism; Crime/Corruption; Extended News; Government
KEYWORDS: benghazi; computers; cyber; fastandfurious; impeachnow; irs; loadurgunsboys; nsa; passwords; security
Navigation: use the links below to view more comments.
first 1-2021-4041-6061-80 ... 181-184 next last
No Comment... I'd be banned for life if I said what I'm thinking about our so-called "representatives" in "FREAKING" Washington DC who are letting this CRAP happen...
1 posted on 07/25/2013 3:49:38 PM PDT by Errant
[ Post Reply | Private Reply | View Replies]

To: Errant

I will say it: folk off


2 posted on 07/25/2013 3:50:40 PM PDT by yldstrk (My heroes have always been cowboys)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Errant

Oh hell NO!!!!!!!!!!!!!!!!!!!!!!


3 posted on 07/25/2013 3:51:13 PM PDT by svcw (Stand or die)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Errant

So they can pull child porn down into anybody’s account and then prosecute them. Proving the government did it, would be next to impossible.

Of course, if they wanted to do that, it would probably be hard to stop them password or not.


4 posted on 07/25/2013 3:52:00 PM PDT by DannyTN
[ Post Reply | Private Reply | To 1 | View Replies]

To: Errant

Any company I do business with turns my pass word over to the FEDS will lose my business.........FOREVER!


5 posted on 07/25/2013 3:52:02 PM PDT by svcw (Stand or die)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Errant

Go to biometrics on the local host. Nothing stored on the remote server.


6 posted on 07/25/2013 3:54:09 PM PDT by Ben Mugged (The number one enemy of liberalism is reality.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Errant
But a [Google] spokesperson said the company has "never" turned over a user's encrypted password.

So they decrypt it first?

7 posted on 07/25/2013 3:56:16 PM PDT by NonValueAdded (Unindicted Co-conspirators: The Mainstream Media)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Errant

Idiots,

Passwords are not stored in a modern system. A one way cryptographic hash is stored instead. In reality, passwords are not checked directly. They are run through a complex hashing program that CAN NOT BE REVERSED and the output of the hash is stored.

To verify a password, the submitted password is put through the same hash and the output is compared to the stored hash. If they match then the proper password has been submitted.


8 posted on 07/25/2013 3:56:36 PM PDT by taxcontrol
[ Post Reply | Private Reply | To 1 | View Replies]

To: butterdezillion

Ping.


9 posted on 07/25/2013 3:57:54 PM PDT by SatinDoll (NATURAL BORN CITIZEN: BORN IN THE USA OFCITIZEN PARENTS)
[ Post Reply | Private Reply | To 1 | View Replies]

To: DannyTN

ya , people going to be setup big time


10 posted on 07/25/2013 3:58:25 PM PDT by molson209
[ Post Reply | Private Reply | To 4 | View Replies]

To: NonValueAdded

The passwords are not encrypted, they are hashed. The difference being that an encrypted password can be “reversed” using a key. A hash CAN NOT BE reversed.


11 posted on 07/25/2013 3:58:31 PM PDT by taxcontrol
[ Post Reply | Private Reply | To 7 | View Replies]

To: Errant

This proves the Feds are even stupider than I thought. Any good system does not store passwords, it stores a hash of the password. You can give the hashed value to anyone and it does not give them access. When you enter your password, that value is encrypted and then compared to the hash value.


12 posted on 07/25/2013 3:59:00 PM PDT by Flick Lives (We're going to be just like the old Soviet Union, but with free cell phones!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Errant

Hmmmm, with your password, a government agent could use your account to establish a search history of any sort they may so desire.

In court they could make you look like any sort of monster that fits a narrative.


13 posted on 07/25/2013 3:59:34 PM PDT by null and void (You don't know what "cutting edge" means till you insult Mohammed.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: svcw

This is all creating a HUGE opportunity for some smart geek to start a Spy Free version of Facebook, Gmail..etc

The old established outfits are forever tainted in the public’s mind now.

To keep feds at bay locate offshore and store no data that is unencrypted and make certain only the user has the keys.


14 posted on 07/25/2013 4:01:05 PM PDT by Bobalu (It is not obama we are fighting, it is the media.)
[ Post Reply | Private Reply | To 5 | View Replies]

To: taxcontrol

If any company is storing passwords in the open or even in encrypted form, they are going to get sued for doing this. We store customer passwords as one-way hashes exactly so these types of requests can never be complied with.


15 posted on 07/25/2013 4:02:05 PM PDT by vbmoneyspender
[ Post Reply | Private Reply | To 8 | View Replies]

To: Errant

If the evil thug in our White House and his supporters want to do this lawfully, they need individual warrants, based “upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized”.

Instead, the general strategy for these data and just about everything else has been to collect everything on everyone and sort through our lives at leisure. The far left very obviously don’t care about freedom, the law, or the Constitution, so it comes down to just how brutal their forces are willing to get and just how firm decent people are willing to be in resisting tyranny.


16 posted on 07/25/2013 4:02:54 PM PDT by Pollster1 ("Shall not be infringed" is unambiguous.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: taxcontrol
It's INCONCEIVABLE that a hash code could be reversed.


17 posted on 07/25/2013 4:03:09 PM PDT by null and void (You don't know what "cutting edge" means till you insult Mohammed.)
[ Post Reply | Private Reply | To 11 | View Replies]

To: Flick Lives; taxcontrol

There are ways around it. If you have access to the database, you don’t need the frontend.


18 posted on 07/25/2013 4:03:28 PM PDT by Errant
[ Post Reply | Private Reply | To 12 | View Replies]

To: Errant

19 posted on 07/25/2013 4:03:33 PM PDT by TurboZamboni (Marx smelled bad & lived with his parents most his life.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Errant

Considering the feral government’s attitude toward our privacy, I wonder why it’s so concerned about its privacy. Is it trying to hide things?


20 posted on 07/25/2013 4:04:19 PM PDT by Standing Wolf
[ Post Reply | Private Reply | To 1 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-4041-6061-80 ... 181-184 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson