Find a Question:
“NSA can largely encrypted Internet eavesdropping thanks backdoors’
The U.S. Secret Service NSA enables internet via ssl, ssh, vpn connections and mobile networks eavesdropping by vulnerabilities in encryption standards. In some cases, the secret service vulnerabilities built themselves.
NSA The Secret Service can not circumvent any encryption standards or render harmless, but many, if claiming the New York Times and ProPublica in a joint article on the basis of documents provided Edward Snowden. via The Guardian The NSA operates not only, but works with secret services of four other countries: Canada, Great Britain, Australia and New Zealand. Internally, the project known under the code name “Bullrun”.
The NSA uses supercomputers to crack encryption but also collaborates with technology companies to build backdoors into products so that the encryption could be bypassed completely. Which companies are to cooperate, is unknown: it is at least to companies within and outside the United States. In addition, cracks the NSA computer, to read before encryption is applied. Posts Moreover, the secret service builds vulnerabilities in encryption algorithms that include used in SSL and VPN connections and 4G networks. Because the NSA has extensive expertise in the field of cryptography, the service think about it often algorithms.
Although The New York Times and ProPublica mention any names of affected algorithms, according to the article, however, that one of the algorithms in 2006 standard has been elevated by the U.S. government and which security researchers in 2007 found significant vulnerabilities. That suggests that it comes to Dual_EC_DRBG algorithm developed by the NSA itself and is used for random number generators. From that algorithm has already been suspected that the NSA would have built. backed by Reliable random number generators are important for the operation of encryption algorithms, but this turns out to lead rng if a user has a specific set of numbers. The garden
Furthermore, the British intelligence service GCHQ focus along with the NSA decrypting Internet traffic served through Yahoo, Microsoft’s mail servers, Facebook and Google. For decrypting Google traffic would be in 2012 found a new entry, so mention the documents. What this means exactly is not clear from the articles, and is also unclear whether the tech companies cooperate or that the NSA traffic itself is able to decipher. Finally, the NSA an internal database encryption keys for different commercial products that use encryption, the service allows to decrypt automatically. Traffic
Many precise details about the leaks are not there. The New York Times and ProPublica have after consultation with staff of the NSA, who asked not to publish the article specific details removed. That should prevent foreign secret services can also provide access. The media say despite having published because they say important finding that a public debate on the impact of the practices of privacy arises.’s Own to the article
In the nineties did the NSA and the U.S. White House in public backdoors built into encryption algorithms, but after considerable public consternation was refrained. “And so they have done anyway, but without telling anyone,” said cryptography expert Paul Kocher told The New York Times and ProPublica.
According to the NSA, it is important to crack encryption because the secret service could not do its job. Otherwise Critics argue that the security of communication may be compromised when encryption algorithms are deliberately weakened under pressure: after all, it may also use third parties. The news follows earlier revelations by whistleblower Edward Snowden also released showing that the U.S. intelligence without too much trouble would get to communicate online. Outside accessViewing:-120
Answer this Question
You must be Logged In to post an Answer.
Not a member yet? Sign Up Now »
Star Points Scale
Earn points for Asking and Answering Questions!