Announcement

Collapse
No announcement yet.

NSA cracks most internet encryption tech.

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • NSA cracks most internet encryption tech.

    War is Peace. Freedom is Slavery. Ignorance is Strength.


    WASHINGTON (AP) — The National Security Agency, working with the British government, has secretly been unraveling encryption technology that billions of Internet users rely upon to keep their electronic messages and confidential data safe from prying eyes, according to published reports based on internal U.S. government documents.

    The NSA has bypassed or altogether cracked much of the digital encryption used by businesses and everyday Web users, according to reports Thursday in The New York Times, Britain's Guardian newspaper and the nonprofit news website ProPublica. The reports describe how the NSA invested billions of dollars since 2000 to make nearly everyone's secrets available for government consumption.

    In doing so, the NSA built powerful supercomputers to break encryption codes and partnered with unnamed technology companies to insert "back doors" into their software, the reports said. Such a practice would give the government access to users' digital information before it was encrypted and sent over the Internet.

    "For the past decade, NSA has led an aggressive, multipronged effort to break widely used Internet encryption technologies," according to a 2010 briefing document about the NSA's accomplishments meant for its UK counterpart, Government Communications Headquarters, or GCHQ. Security experts told the news organizations such a code-breaking practice would ultimately undermine Internet security and leave everyday Web users vulnerable to hackers.

    The revelations stem from documents leaked by former NSA contractor Edward Snowden, who sought asylum in Russia this summer. His leaks, first published by the Guardian, revealed a massive effort by the U.S. government to collect and analyze all sorts of digital data that Americans send at home and around the world.

    Those revelations prompted a renewed debate in the United States about the proper balance between civil liberties and keeping the country safe from terrorists. President Barack Obama said he welcomed the debate and called it "healthy for our democracy" but meanwhile criticized the leaks; the Justice Department charged Snowden under the federal Espionage Act.

    Thursday's reports described how some of the NSA's "most intensive efforts" focused on Secure Sockets Layer, a type of encryption widely used on the Web by online retailers and corporate networks to secure their Internet traffic. One document said GCHQ had been trying for years to exploit traffic from popular companies like Google, Yahoo, Microsoft and Facebook.

    GCHQ, they said, developed "new access opportunities" into Google's computers by 2012 but said the newly released documents didn't elaborate on how extensive the project was or what kind of data it could access.

    Even though the latest document disclosures suggest the NSA is able to compromise many encryption programs, Snowden himself touted using encryption software when he first surfaced with his media revelations in June.

    During a Web chat organized by the Guardian on June 17, Snowden told one questioner that "encryption works." Snowden said that "properly implemented strong crypto systems" were reliable, but he then alluded to the NSA's capability to crack tough encryption systems. "Unfortunately, endpoint security is so terrifically weak that NSA can frequently find ways around it," Snowden said.

    It was unclear if Snowden drew a distinction between everyday encryption used on the Internet — the kind described in Thursday's reports — versus more-secure encryption algorithms used to store data on hard drives and often requires more processing power to break or decode. Snowden used an encrypted email account from a now-closed private email company, Lavabit, when he sent out invitations to a mid-July meeting at Moscow's Sheremetyevo International Airport.

    The operator of Lavabit LLC, Ladar Levison, suspended operations of the encrypted mail service in August, citing a pending "fight in the 4th (U.S.) Circuit Court of Appeals." Levison did not explain the pressures that forced him to shut the firm down but added that "a favorable decision would allow me to resurrect Lavabit as an American company."

    The government asked the news organizations not to publish their stories, saying foreign enemies would switch to new forms of communication and make it harder for the NSA to break. The organizations removed some specific details but still published the story, they said, because of the "value of a public debate regarding government actions that weaken the most powerful tools for protecting the privacy of Americans and others."

    Such tensions between government officials and journalists, while not new, have become more apparent since Snowden's leaks. Last month, Guardian editor Alan Rusbridger said that British government officials came by his newspaper's London offices to destroy hard drives containing leaked information. "You've had your debate," one UK official told him. "There's no need to write any more."

  • #2
    I always considered this old news. There is somewhat of a a legitimate security reason for doing this (What the NSA is doing) and you should never assume what you're doing is all that secure. Encryption is one of many steps that help and as the article mentions - they'd just compromise the end point.

    Edit: I do not like that they are snooping "American's" traffic. However, I'm not sure this article would be a 100% transparent if it's true American's or terrorists on American soil. On the other hand, I don't doubt that the government is doing it either. However, to think the NSA/CIA...etc have not or will not figure out ways to decrypt network traffic is short sighted. They've been figuring out ways to do such things for years.
    Originally posted by MR EDD
    U defend him who use's racial slurs like hes drinking water.

    Comment


    • #3
      Counter:


      Toshiba has invented a quantum cryptography network that even the NSA can’t hack

      By Bernhard Warner
      September 4, 2013


      If you’ve got communications that absolutely cannot be intercepted—whether you’re a NSA whistleblower, the president of Mexico, or Coca-Cola—quantum cryptography is the way to go.

      It harnesses the bizarro-world properties of quantum physics to ensure that information sent from point A to point B isn’t intercepted. The laws of physics dictate that nobody—not even the NSA—can measure a quantum system without disrupting it.

      The problem, as Edward Snowden could probably tell you, is that quantum cryptography is still in its infancy. It only works over relatively short distances, and the required gear—including lasers and a dedicated fiber optic network—is prohibitively expensive, limiting its use to a handful of research labs, corporations and governments.

      A new research paper from scientists at Toshiba brings quantum cryptography a baby-step closer to the masses. The paper, published today in Nature, explains how to expand a point-to-point quantum network with only two users into a “quantum access network” with up to 64 users.



      “This kind of communication cannot be defeated by future advances in computing power, nor new mathematical algorithms, nor fancy new engineering,” said co-author Andrew Shields, head of the Quantum Information Group of Toshiba Research Europe. “As long as the laws of physics hold true, it will ensure that your communications are fully secured.”

      A quantum network uses specially polarized photons to encode an encryption key—a very long series of numbers and letters that can unlock a digital file. The photons are then sent down a fiber optic cable until they reach their destination, a photon detector, which counts them, and delivers the key to the intended recipient. If the photons are interfered with, the individual packets of information are forever altered and the recipient can see the telltale signs of tampering.



      The Toshiba team focused its efforts on improving the photon detector, and created a system that counts up to 1 billion photons per second, which makes it feasible to add more people to the network. “Our breakthrough is we’ve developed an architecture that is point-to-multipoint. This greatly increase the number of potential users in the network, and reduces costs,” Shields said.

      Current quantum cryptography systems from companies like ID Quantique start at around $50,000, and only connect two parties at a time. “If up to 64 people can share a single photon detector than you can spread out those costs,” Shields said.

      The next step toward mainstreaming quantum crypto is increasing the distance that photons can travel before they degrade—currently the record is 200 km (124 miles) using a dedicated fiber optic cable. But researchers are working on ways to transmit quantum bits on so-called “noisy” fiber that carries other information, which means that the day may not be far away when your Gmail may have a quantum key.

      Until then, it’s probably safer to assume that Big Brother is listening.
      If you’ve got communications that absolutely cannot be intercepted—whether you’re a NSA whistleblower, the president of Mexico, or Coca-Cola—quantum cryptography is the way to go.

      Comment


      • #4
        This is why I send all all of my important messages by carrier pigeon. Mike Tyson is a genius.

        Comment


        • #5
          Originally posted by BP View Post
          This is why I send all all of my important messages by carrier pigeon. Mike Tyson is a genius.


          Comment


          • #6
            I think there is some five digit cipher that NSA still hasn't figured out.

            Comment


            • #7
              Originally posted by BP View Post
              This is why I send all all of my important messages by carrier pigeon. Mike Tyson is a genius.
              "It is in truth not for glory, nor riches, nor honours that we are fighting, but for freedom - for that alone, which no honest man gives up but with life itself."

              Comment


              • #8
                I agree, nothing new here, they've been doing this all along. What good is data you can't read?

                Comment


                • #9
                  And at that Iron Mike pic.

                  Comment


                  • #10
                    Encryption isn't encryption if it isn't 1024+ RSA/DM

                    Those jokers only have built in back doors and very weak/old methods broken.

                    NIST says 2048 bit RSA will be good at least until 2030.
                    Last edited by majorownage; 09-07-2013, 07:38 PM.
                    Full time ninja editor.

                    Comment

                    Working...
                    X