NSA has direct access to tech giants' systems for user data, secret files reveal

Discussion in 'privacy general' started by Dermot7, Jun 6, 2013.

  1. anniew

    anniew Registered Member

    Joined:
    Mar 15, 2013
    Posts:
    92
    Re: On the NSA breaking most encryption on the Internet

    Are these the guys that are helping them "cheat"?

    Hacking Team promo ad discussed on The Verge

    They seem to promise that they can help law enforcement "stealthily" monitor pretty much any modern off the shelf system with their Da Vinci program. :blink:

    Is this credible?
     
  2. kareldjag

    kareldjag Registered Member

    Joined:
    Nov 13, 2004
    Posts:
    622
    Location:
    PARIS AND ITS SUBURBS
  3. Hermescomputers

    Hermescomputers Registered Member

    Joined:
    Jan 9, 2006
    Posts:
    1,069
    Location:
    Toronto, Ontario, Canada, eh?
    Apparently Canada, was a big supporter, and also helped develop, and even finance the process...

    http://www.thestar.com/business/tec...it_in_undermining_internet_privacy_geist.html

    Here is more from the Toronto Star!
    http://www.thestar.com/news/world/2...yption_leaving_web_users_open_to_hackers.html

    Canada the good no more... sigh! o_O

    Educate yourselves - Support the work of https://www.eff.org/
    Help protect the Internet from the unscrupulous, hostile businesses lobby, and the control fanatics!
     
    Last edited: Sep 17, 2013
  4. mirimir

    mirimir Registered Member

    Joined:
    Oct 1, 2011
    Posts:
    9,252
    This hints at a topic that hasn't received much (if any) attention.

    We know that Snowden started with NSA contractors under their "let's hire hackers" program. He ended up collecting all sorts of embarrassing documents, which are being gradually revealed by Greenwald etc.

    But what of the many other "hackers" that they hired? What have they learned and appropriated? Maybe they aren't so idealistic as Snowden. For example, what about the malware coders that helped create Stuxnet etc? What were they able to access?

    We may never learn the worst NSA leaks until it's far too late :(
     
  5. lotuseclat79

    lotuseclat79 Registered Member

    Joined:
    Jun 16, 2005
    Posts:
    5,390
  6. Pinga

    Pinga Registered Member

    Joined:
    Aug 31, 2006
    Posts:
    1,420
    Location:
    Europe
    http://www.washingtonpost.com/blogs...nt-snowden-will-probably-become-an-alcoholic/
     
  7. Reality

    Reality Registered Member

    Joined:
    Aug 25, 2013
    Posts:
    1,198
    The Google monster again :blink:

    http://arstechnica.com/information-technology/2013/09/why-the-nsa-loves-googles-chromebook/

     
  8. Pinga

    Pinga Registered Member

    Joined:
    Aug 31, 2006
    Posts:
    1,420
    Location:
    Europe
  9. lotuseclat79

    lotuseclat79 Registered Member

    Joined:
    Jun 16, 2005
    Posts:
    5,390
  10. Pinga

    Pinga Registered Member

    Joined:
    Aug 31, 2006
    Posts:
    1,420
    Location:
    Europe
  11. lotuseclat79

    lotuseclat79 Registered Member

    Joined:
    Jun 16, 2005
    Posts:
    5,390
    Last edited: Sep 20, 2013
  12. lotuseclat79

    lotuseclat79 Registered Member

    Joined:
    Jun 16, 2005
    Posts:
    5,390
  13. lotuseclat79

    lotuseclat79 Registered Member

    Joined:
    Jun 16, 2005
    Posts:
    5,390
    NSA Leaks Could Spur Security Renaissance.

    -- Tom
     
  14. lotuseclat79

    lotuseclat79 Registered Member

    Joined:
    Jun 16, 2005
    Posts:
    5,390
    Whistleblowers and the Crypto-Anarchist Underground: An Interview with Andy Greenberg.

    Note: Andy Greenberg is a Forbes reporter who is interviewed by DJ Pangburn regarding Greenberg's book This Machine Kills Secrets in the above linked article.

    -- Tom
     
  15. lotuseclat79

    lotuseclat79 Registered Member

    Joined:
    Jun 16, 2005
    Posts:
    5,390
  16. lotuseclat79

    lotuseclat79 Registered Member

    Joined:
    Jun 16, 2005
    Posts:
    5,390
    The Effects Of The Snowden Leaks Aren't What He Intended.

    -- Tom
     
  17. mirimir

    mirimir Registered Member

    Joined:
    Oct 1, 2011
    Posts:
    9,252
    Paul Syverson said this recently on tor-talk:

    https://lists.torproject.org/pipermail/tor-talk/2013-September/030097.html

    In his reply, Griffin Boyce stated:

    https://lists.torproject.org/pipermail/tor-talk/2013-September/030099.html

    As I understand it, initial Tor developers convinced their Navy funders that, in order for the system to provide anonymity and privacy to US agents etc, they had to create a huge crowd of unrelated Tor users by publishing the design. That must have blown some minds ;)
     
  18. Bruce Scheiner "They have betrayed us"

    They have betrayed us, that is all I'll say on this whole mess.

    And the British have a monitoring system for TOR called flying pig, what that system does is still up for debate but the best bet's on traffic analysis.
     
  19. lotuseclat79

    lotuseclat79 Registered Member

    Joined:
    Jun 16, 2005
    Posts:
    5,390
  20. lotuseclat79

    lotuseclat79 Registered Member

    Joined:
    Jun 16, 2005
    Posts:
    5,390
    The Foreign Intelligence Surveillance Act - What’s Working and What Needs Fixing?.

    -- Tom
     
  21. lotuseclat79

    lotuseclat79 Registered Member

    Joined:
    Jun 16, 2005
    Posts:
    5,390
    Foreign Intelligence Court Releases Controversial Opinion on Domestic Telephone Records Program.

    Related: NSA Telephone Records Surveillance.

    -- Tom
     
  22. lotuseclat79

    lotuseclat79 Registered Member

    Joined:
    Jun 16, 2005
    Posts:
    5,390
    Here are two articles relevant to the discussion of NSA backdoors:

    Software Transparency

    The Debian OpenSSL Bug: Backdoor or Security Accident?.

    The question is when according to Linus’s Law: “given enough eyeballs, all bugs are shallow.” is it enough to guarantee the absence of security holes where enough means enough qualified experts on the basis of experience to know for what to look when the source code has been verified, but the machine code correspondence to the source code has not?

    -- Tom
     
  23. Pinga

    Pinga Registered Member

    Joined:
    Aug 31, 2006
    Posts:
    1,420
    Location:
    Europe
    http://mondediplo.com/openpage/destroying-the-right-to-be-left-alone
     
  24. mirimir

    mirimir Registered Member

    Joined:
    Oct 1, 2011
    Posts:
    9,252
    Our job, as I see it, is to simplify and popularize the tools necessary for privacy, work on better tools, and so on. People need to know that there's "hope" -- or rather, that privacy is still possible.

    I don't believe that it's "hopeless" -- that there's no possibility. Consider that VPN service usage is growing, perhaps exponentially, in response to increasing efforts to fight "piracy", inhibit free expression and organizing, etc, etc. "Installation of Hotspotshield VPN software experienced 1000% growth over the weekend in Turkey in the wake of anti-government protests." <-http://blog.hotspotshield.com/2013/06/04/hotspot-shield-experiences-tenfold-increase-in-the-wake-of-recent-turkish-unrest/->. More generally, I've read that many established VPN providers are experiencing rapid growth, especially in response to the NSA documents via Snowden. The number of VPN services has also been increasing rapidly, as market growth becomes increasingly obvious.

    Privacy advocates have much greater credibility as threats to privacy have become increasingly well known. The iron fist is becomming increasingly clear through its tattered glove ;)

    Consider how many major providers (especially Google, and even Microsoft and Apple) are implementing stronger privacy. They must, in order to survive. It's becoming increasingly impossible for global providers to sell out to even global TLAs, given viral information sharing on the Internet.

    All considered, I'm optimistic :)
     
  25. Alec

    Alec Registered Member

    Joined:
    Jun 8, 2004
    Posts:
    480
    Location:
    Dallas, TX
    Seriously? You guys view the NSA's snooping on email and collecting phone meta-data as that important?

    Personally, I view quotes like the first as referring to situations akin to being a witness to an actual murder or something like that... not to some governmental infringement of the oxymoronic, and so-called right to "Internet Privacy"; and the second quote is highly dubious in its claim of "most important [revelation] in US history". Moreover, such oversight and inspection and is not even unexpected by anyone who has paid attention to technology for the last 20 years. And why the outrage solely at America, when we are by no means the only government participating in these activities. I honestly do not see why someone like Edward Snowden would ruin his life, and exile themselves to some human rights wasteland like Russia, China, or Venezuela in order to supposedly "reveal" what everyone with half a brain already assumed.

    And who knew that John Cusack was such a supporter of Internet privacy?!? :p
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.