Jump to content
Nytro

The NSA Is Breaking Most Encryption on the Internet

Recommended Posts

Posted

[h=2]September 5, 2013[/h] [h=3]The NSA Is Breaking Most Encryption on the Internet[/h] The new Snowden revelations are explosive. Basically, the NSA is able to decrypt most of the Internet. They're doing it primarily by cheating, not by mathematics.

It's joint reporting between the Guardian, the New York Times, and ProPublica.

I have been working with Glenn Greenwald on the Snowden documents, and I have seen a lot of them. These are my two essays on today's revelations.

Remember this: The math is good, but math has no agency. Code has agency, and the code has been subverted.

Sursa: Schneier on Security: The NSA Is Breaking Most Encryption on the Internet

Posted

How to remain secure against NSA surveillance by Bruce Schneier, link-ul articolului a fost postat de nytro may sus

...

1) Hide in the network. Implement hidden services. Use Tor to anonymize yourself. Yes, the NSA targets Tor users, but it's work for them. The less obvious you are, the safer you are.

2) Encrypt your communications. Use TLS. Use IPsec. Again, while it's true that the NSA targets encrypted connections – and it may have explicit exploits against these protocols – you're much better protected than if you communicate in the clear.

3) Assume that while your computer can be compromised, it would take work and risk on the part of the NSA – so it probably isn't. If you have something really important, use an air gap. Since I started working with the Snowden documents, I bought a new computer that has never been connected to the internet. If I want to transfer a file, I encrypt the file on the secure computer and walk it over to my internet computer, using a USB stick. To decrypt something, I reverse the process. This might not be bulletproof, but it's pretty good.

4) Be suspicious of commercial encryption software, especially from large vendors. My guess is that most encryption products from large US companies have NSA-friendly back doors, and many foreign ones probably do as well. It's prudent to assume that foreign products also have foreign-installed backdoors. Closed-source software is easier for the NSA to backdoor than open-source software. Systems relying on master secrets are vulnerable to the NSA, through either legal or more clandestine means.

5) Try to use public-domain encryption that has to be compatible with other implementations. For example, it's harder for the NSA to backdoor TLS than BitLocker, because any vendor's TLS has to be compatible with every other vendor's TLS, while BitLocker only has to be compatible with itself, giving the NSA a lot more freedom to make changes. And because BitLocker is proprietary, it's far less likely those changes will be discovered. Prefer symmetric cryptography over public-key cryptography. Prefer conventional discrete-log-based systems over elliptic-curve systems; the latter have constants that the NSA influences when they can.

...

Posted (edited)

E vorba de principiu. Tie ti-ar placea sa stea unu cu urechea lipita de geam cand vorbesti cu nevastata in casa?

Mie nu. Mi s-ar parea dubios si neetic.

Edited by tpad
Posted
Prefer conventional discrete-log-based systems over elliptic-curve systems; the latter have constants that the NSA influences when they can.

...

Interesant. Deci RSA in loc de ECDH.

Posted

NSA e ca Securitatea pe timpu comunistilor, dar vecinu nu se mai uita pe vizor sa vada cine intra sau cine iese, ci se uita la lista ta de prieteni pe fb (eh,mai pe langa dat,dar e o idee amuzanta) .

Posted

acelasi subiect, mai pe larg in limba romana, acu are logica: " Prefer symmetric cryptography over public-key cryptography"

NSA poate descifra sistemele criptate de pe Internet

NSA este capabil? s? decodeze principalele sisteme de criptare pe Internet, fie c? e vorba de e-mail sau tranzac?ii bancare, conform dezv?luirilor f?cute joi de pres? care risc? s? aduc? noi critici fa?? de metodele de supraveghere ale agen?iei de informa?ii americane.

Al?turi de agen?ia britanic? GCHQ, Agen?ia na?ional? de securitate (NSA) "a compromis în mare parte garan?iile date de companiile de Internet clien?ilor lor cu privire la securitatea comunica?ilor", afirm? The Guardian, aflat la originea acestor dezv?luiri al?turi de New York Times ?i ProPublica.

Cele trei jurnale se bazeaz? pe documente furnizate de Edward Snowden, fostul consultant al NSA ale c?rui dezv?luiri din luna iunie au provocat o polemic? puternic? în Statele Unite ?i în întreaga lume cu privire la impactul asupra libert??ilor publice ?i vie?ii private.

În pofida promisiunilor de transparen?? ale pre?edintelui Barack Obama cu privire la aceste programe, multiplicarea dezv?luirilor, inclusiv cele de joi, deseneaz? conturul unei organiza?ii foarte puternice cu capacit??i de intruziune care par nelimitate.

Comunica?iile pe Internet sunt supuse cript?rii informatice automate, fie c? este vorba de e-mailuri, mesaje instant, tranzac?ii bancare online sau transfer de date medicale.

În cadrul unui program ultra-secret numit Bullrun, agen?ia de informa?ii american? poate "sparge" aceste sisteme de criptare (VPN, SSL) ?i descifra ceea ce se transfer?, afirm? New York Times, Guardian ?i ProPublica, o organiza?ie non-profit specializat? în jurnalismul de investiga?ie.

Conform acestor documente al c?ror con?inut nu este divulgat, NSA ?i GCHQ au reu?it s? ob?in? "cheile" pentru diferite sisteme de criptare datorit? supercalculatoarelor ?i cooper?rii unor companii de Internet, ob?inut? uneori prin intermediul ordinelor judec?tore?ti.

Dezv?luirile precedente ale lui Edward Snowden au permis deja aducerea la lumin? a unor programe ale agen?iei americane, precum cel de adunare a milioane de metadate telefonice (num?rul de telefon, durata apelului) ?i de supraveghere a Internetului (Prism).

Îns? "spargerea codurilor" este misiunea principal? a agen?iei, fondat? în 1952, care se ocup? de intercept?rile electronice.

Aceasta este o prioritate, conform unui document din 2007, citat de Times "În viitor, superputerile vor fi recunoscute pe baza puterii programelor lor de analiz? criptologic?".

"Este pre?ul ce trebuie pl?tit pentru ca Statele Unite s? p?streze un acces ?i o utilizare neîngr?dit? a spa?iului virtual", continu? documentul.

New York Times ?i ProPublica raporteaz? c? responsabili americani de informa?ii le-au cerut s? nu publice aceste date, temându-se c? aceste dezv?luiri vor determina anumite ?inte ale programului s? î?i schimbe metodele de criptare sau modul de comunicare.

"Presa nu au men?ionat anumite aspecte îns? au decis s? publice articolul din cauza importan?ei unei dezbateri publice asupra ac?iunilor administra?iei, care sl?besc mijloacele cele mai puternice ce trebuie s? protejeze via?a privat? a americanilor ?i a tuturor", afirm? New York Times.

Solicitat? de AFP, direc?ia na?ional? de informa?ii (ODNI) american? nu a f?cut niciun comentariu.

Dac? aceast? capacitate de a descifra comunica?iile securizate poate ajuta la prevenirea atentatelor, aceasta risc? s? aib? ?i "consecin?e neprev?zute sl?bind securitatea comunica?iilor", mai noteaz? cotidianul.

"Riscul atunci când se creeaz? o poart? de acces în sisteme este de a nu fi singurii care o exploateaz?", explic? Matthew Green, un cercet?tor în criptografie citat de New York Times.

"Chiar dac? NSA dispune de mai mult? putere pentru a înc?lca via?a noastr? privat? în numele securit??ii cibernetice, ea face Internetul mai pu?in sigur ?i ne expune hackerilor, spionajului str?in ?i unei supravegheri ilegale", a denun?at într-un comunicat asocia?ia de ap?rare a drepturilor civile ACLU.

#

  • Upvote 1

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...