NSA has direct access to tech giants' systems for user data, secret files reveal

Discussion in 'privacy general' started by Dermot7, Jun 6, 2013.

  1. deBoetie

    deBoetie Registered Member

    Joined:
    Aug 7, 2013
    Posts:
    1,832
    Location:
    UK
    Normally, the Guardian would report a snippet at least, which makes me suspect a D-notice. Which, in the context of forthcoming legislation, if true, would be extremely bad.
     
  2. Dermot7

    Dermot7 Registered Member

    Joined:
    Dec 20, 2009
    Posts:
    3,430
    Location:
    Surrey, England.
    Indeed, I would have expected extensive coverage in the Guardian, and at least a mention on the "Beeb", and searching turned up a single "mainstream" example which surprised me http://www.dailymail.co.uk/news/art...-Karma-Police-according-leaked-documents.html
     
  3. dogbite

    dogbite Registered Member

    Joined:
    Dec 13, 2012
    Posts:
    1,290
    Location:
    EU
  4. Amanda

    Amanda Registered Member

    Joined:
    Aug 8, 2013
    Posts:
    2,115
    Location:
    Brasil
    Who would've thought we'd see Snowden on Twitter. It's kind of weird, actually.
     
  5. mirimir

    mirimir Registered Member

    Joined:
    Oct 1, 2011
    Posts:
    9,252
    How do we know that it's him?
     
  6. dogbite

    dogbite Registered Member

    Joined:
    Dec 13, 2012
    Posts:
    1,290
    Location:
    EU
  7. Amanda

    Amanda Registered Member

    Joined:
    Aug 8, 2013
    Posts:
    2,115
    Location:
    Brasil
    We don't :) Even if it's a verified account, there's no way of possibly knowing that's actually him. Unless, of course, he makes a video and states that's actually his account.
     
  8. deBoetie

    deBoetie Registered Member

    Joined:
    Aug 7, 2013
    Posts:
    1,832
    Location:
    UK
    Regarding GCHQ's "Karma Police", apart from the indiscriminate humongous scale of it all, I see in the documents that data mining is a tasty opportunity for them.
    A more certain way of unlawfully targeting the innocent and generating mountains of useless dross I cannot imagine.
     
  9. driekus

    driekus Registered Member

    Joined:
    Nov 30, 2014
    Posts:
    489
    Agreed.
    My question though is if the US government is treating retweeting ISIS post as a aiding terrorism will it consider retweeting Snowden posts as aiding Treason?

    My other thought is that everybody who follows Snowden has been tagged as potentially hostile to the US.
     
  10. mirimir

    mirimir Registered Member

    Joined:
    Oct 1, 2011
    Posts:
    9,252
    For sure, no?
     
  11. Dermot7

    Dermot7 Registered Member

    Joined:
    Dec 20, 2009
    Posts:
    3,430
    Location:
    Surrey, England.
    http://www.bbc.co.uk/news/uk-34444233
     
  12. Palancar

    Palancar Registered Member

    Joined:
    Oct 26, 2011
    Posts:
    2,402
    As I have mentioned before; I don't think it would be worth the effort to attempt to make a smartphone "secure" by my definition of the word. I know there are forums and websites that will say otherwise, but I think its just avoiding a reality check. Sure, you can harden against a punk thief or kiddie script but not against "3 letter agencies". My .02
     
  13. deBoetie

    deBoetie Registered Member

    Joined:
    Aug 7, 2013
    Posts:
    1,832
    Location:
    UK
    Apparently 1.36 million followers already.
     
  14. Kerodo

    Kerodo Registered Member

    Joined:
    Oct 5, 2004
    Posts:
    8,013
  15. lotuseclat79

    lotuseclat79 Registered Member

    Joined:
    Jun 16, 2005
    Posts:
    5,390
    How is NSA breaking so much crypto?

    Reference: The NSA sure breaks a lot of "unbreakable" crypto. This is probably how they do it.

    -- Tom
     
  16. J_L

    J_L Registered Member

    Joined:
    Nov 6, 2009
    Posts:
    8,738
  17. BoerenkoolMetWorst

    BoerenkoolMetWorst Registered Member

    Joined:
    Dec 22, 2009
    Posts:
    4,873
    Location:
    Outer space
    Always good this gets attention, but ideally people would already be aware of this. Note that this info was already available 5 months ago when the WeakDH/Logjam attack became public:
    https://weakdh.org/
     
  18. Palancar

    Palancar Registered Member

    Joined:
    Oct 26, 2011
    Posts:
    2,402
    AirVpn uses a 4096 DH key and ALL primes on EVERY Air server are unique. This attack requires lots of time and money, which the Gov seems to be willing to spend. Once they break the prime and users are dumb enough to employ the same one everywhere they actually don't break your one server but millions of them. Does that make sense to use such a common prime? They are not likely to break a 4096 DH key and the return would be so small since the prime is on only one server. OH and what happens when the server prime gets swapped plus perfect forward secrecy keeps changing things anyway. Get the picture?

    Website owners being lazy sometimes contributes to this stuff.
     
  19. lotuseclat79

    lotuseclat79 Registered Member

    Joined:
    Jun 16, 2005
    Posts:
    5,390
    How to Protect Yourself from NSA Attacks on 1024-bit DH.

    -- Tom
     
  20. BoerenkoolMetWorst

    BoerenkoolMetWorst Registered Member

    Joined:
    Dec 22, 2009
    Posts:
    4,873
    Location:
    Outer space
    As I understand it, breaking a prime allows you to decrypt everything it is used for, doesn´t matter at all if forward secrecy is used. This also proves the point that forward secrecy should not be called perfect forward secrecy. Regularly regenerating an unique prime would offer more true forward secrecy with Diffie Hellman.
     
  21. Mr.X

    Mr.X Registered Member

    Joined:
    Aug 10, 2013
    Posts:
    4,809
    Location:
    .
    http://arstechnica.com/security/201...illions-of-encrypted-web-and-vpn-connections/

    Research to understand the article (credits to CHEF-KOCH)
    http://forums.mydigitallife.info/th...-connections?p=1164054&viewfull=1#post1164054
     
  22. lotuseclat79

    lotuseclat79 Registered Member

    Joined:
    Jun 16, 2005
    Posts:
    5,390
    Apple CEO Tim Cook blasts encryption backdoors

    -- Tom
     
  23. lotuseclat79

    lotuseclat79 Registered Member

    Joined:
    Jun 16, 2005
    Posts:
    5,390
  24. Palancar

    Palancar Registered Member

    Joined:
    Oct 26, 2011
    Posts:
    2,402
  25. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,883
    Location:
    Slovenia, EU
    Use snail mail to thwart spies, Assange tells journalists
    http://www.vanguardngr.com/2015/10/use-snail-mail-to-thwart-spies-assange-tells-journalists/

     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.