NSA has direct access to tech giants' systems for user data, secret files reveal

Discussion in 'privacy general' started by Dermot7, Jun 6, 2013.

  1. Pinga

    Pinga Registered Member

    Joined:
    Aug 31, 2006
    Posts:
    1,420
    Location:
    Europe
    Pray tell, what is the optimal time for total world dictatorship? :D
     
  2. mirimir

    mirimir Registered Member

    Joined:
    Oct 1, 2011
    Posts:
    9,252
    It's too late. We're already living in a simulation :eek:
     
  3. FanJ

    FanJ Updates Team

    Joined:
    Feb 9, 2002
    Posts:
    4,657
    One thing in that article from Bruce Schneier is causing some "discussion" in The Netherlands. He writes there that the DigiNotar (the former Dutch CA authority) hack in 2011 is maybe used by the NSA or was maybe the work of the NSA.
    (We had several threads here in the past about that hack of DigiNotar.)
    Is it true? No idea.

    Some Dutch links:

    Dutch Newspaper NRC:
    http://www.nrc.nl/nieuws/2013/09/14/nsa-maakte-gebruik-van-hack-it-bedrijf-diginotar/

    Dutch site Tweakers:
    http://tweakers.net/nieuws/91293/nsa-maakte-misbruik-van-lek-diginotar.html
     
  4. Reality

    Reality Registered Member

    Joined:
    Aug 25, 2013
    Posts:
    1,198
    When all the harbour lights are lined up.

    Some of those harbour lights are to do with the implementation factor. There is a technological aspect that has it's part to play. In other words a few short decades ago, there weren't the necessary things in place that there is now, to fully bring in this system. When "they" pull this thing off, there truly will be no going back until this era has run it's course.

    I agree that's its too late. It is being ushered in right now. The loss of privacy is a means to an end, and only one part to this huge multifaceted prism, which sure has more than 5 eyes. Im sure for those interested enough, a startpage search will reveal who the first leader was to mention the term NWO (New World Order) It was publicly introduced 2 or 3 decades ago, slowly at first until people have heard it so often they don't bat an eye. Other words/phrases used to in conjunction with this to condition people for this era are "globalist village" "Internationalist" and the like.
     
  5. DesuMaiden

    DesuMaiden Registered Member

    Joined:
    Jan 25, 2013
    Posts:
    599
    Re: How the feds asked Microsoft to backdoor BitLocker, their full-disk encryption tool

    Exactly. I heard Diskcryptor is also pretty good, but I would only trust open source software which we can inspect the coding for any backdoors.
     
  6. FreddyFreeloader

    FreddyFreeloader Registered Member

    Joined:
    Jul 23, 2013
    Posts:
    527
    Location:
    Tejas
    Re: How the feds asked Microsoft to backdoor BitLocker, their full-disk encryption tool

    Thanks, Lotus!
     
  7. noone_particular

    noone_particular Registered Member

    Joined:
    Aug 8, 2008
    Posts:
    3,798
    Re: How the feds asked Microsoft to backdoor BitLocker, their full-disk encryption tool

    I opted not to encrypt the main system partition. There's nothing of any value there. The data partitions and a large amount of the external drive are encrypted by Scramdisk, using Blowfish of course.
     
  8. noone_particular

    noone_particular Registered Member

    Joined:
    Aug 8, 2008
    Posts:
    3,798
    A few more things need to be completed. These are some of them.
    1, Governments who won't join the NWO will be eliminated, such as we're seeing in the middle east now.

    2, Genetically modified seeds control the market. Seeds for food that reproduce true to their parents will be illegal or extinct. The same is being applied to livestock now. Look up Monsanto and pig farmers. Well underway and expanding fast.

    3, Alternatives to conventional medicine will be made illegal. Medicinal plants will become someones "intellectual property", even though they were known for centuries. That's the primary purpose of the FDA. This is more than halfway implemented now.

    4, People will be forced to carry or have implanted trackable IDs, RFID type or similar. Services required to live won't be available to those who don't. First steps of its implementation has already been seen in schools.

    5, It will become impossible or illegal to use any non approved equipment on the internet, and nearly impossible to hide your identity without being extremely skilled. Also well underway. Examples, IPv6, Trusted computing, backdoors.
     
  9. Reality

    Reality Registered Member

    Joined:
    Aug 25, 2013
    Posts:
    1,198
    noone_particular

    Absolutely. Everyone who is an honest seeker should find irrefutable evidence for everything you've noted here. The rub is, there are enough bandwagons for one to get on to sink a battle ship, and we are past the point of no return because all these huge things are so far on in the plan no one can stop it. People are waking up but too late. Put it another way, the NWO tentacles are found everywhere around everything.

    There are many things I could add to your list, but specifically with privacy issues, here's another shocker: Smart-meters. Even aside from privacy and security issues, these are a horror story all in their own right BUT those who drill down far enough and in the right direction will find these all lead to the same game plan. Again, everything is being maneuvered into position. Just as what we all see with this ever growing level of surveillance, so there will be no place for dissenters in this system. That's what its all for in the end.

    Look at the illustration and see how the PTB (powers that be) can monitor what youre doing in you own home. Consider what deductions they can come to about your life. :mad:

    https://smartmeterpowerstruggle.wordpress.com/

    When the hammer finally hits it will hit hard.
     
  10. Pinga

    Pinga Registered Member

    Joined:
    Aug 31, 2006
    Posts:
    1,420
    Location:
    Europe
  11. kareldjag

    kareldjag Registered Member

    Joined:
    Nov 13, 2004
    Posts:
    622
    Location:
    PARIS AND ITS SUBURBS
  12. elapsed

    elapsed Registered Member

    Joined:
    Apr 5, 2004
    Posts:
    7,076
    Re: How the feds asked Microsoft to backdoor BitLocker, their full-disk encryption tool

    The usual people spinning theory into fact.

    The article is about how the developers were approached and how they denied adding a backdoor, not about how they bent over and said "sure thing".

    But as always with encryption, it's a case of trust. While you're better off trusting more common forms of open source disk encryption, you can be sure the reason that BitLocker isn't in the normal versions of Windows was the compromise the developers made to shut up the agencies.
     
  13. Dermot7

    Dermot7 Registered Member

    Joined:
    Dec 20, 2009
    Posts:
    3,430
    Location:
    Surrey, England.
  14. mirimir

    mirimir Registered Member

    Joined:
    Oct 1, 2011
    Posts:
    9,252
    That's good!

    Thanks :)
     
  15. Baserk

    Baserk Registered Member

    Joined:
    Apr 14, 2008
    Posts:
    1,321
    Location:
    AmstelodamUM
  16. mirimir

    mirimir Registered Member

    Joined:
    Oct 1, 2011
    Posts:
    9,252
    Actually, the control room looked barely B-movie grade. The steel is unevenly curved in places, and the design is clunky.

    The NSA's overall efficiency and security are no better, it seems ;)
     
  17. JackmanG

    JackmanG Former Poster

    Joined:
    May 21, 2013
    Posts:
    284
    Re: How the feds asked Microsoft to backdoor BitLocker, their full-disk encryption tool

    Schneier's been working with the Snowden documents (in addition to his years of experience in the field), and while he claims no special knowledge, his feeling is that TrueCrypt is less less likely to be backdoored than either PGP Disk or BitLocker. He even uses BitLocker as the example when talking about how it is easier to backdoor proprietary programs in his Guardian piece.
     
  18. mirimir

    mirimir Registered Member

    Joined:
    Oct 1, 2011
    Posts:
    9,252
    Re: How the feds asked Microsoft to backdoor BitLocker, their full-disk encryption tool

    It's not about "theory" vs "fact". It's about what's prudent. If I'm running across the desert in northern Arizona, I don't need to know for sure whether that little dip ahead is a slot canyon or not. I know that it might be, and so I'm careful. See?

    So you think that they'd admit it on the record?

    I totally agree :)

    How can I be sure of that?
     
  19. JackmanG

    JackmanG Former Poster

    Joined:
    May 21, 2013
    Posts:
    284
    On the NSA breaking most encryption on the Internet

    This is basically where the "Majority of Tor crypto keys could be broken by NSA, researcher says" thread comes from. But that's really focused on the Tor implications of this bigger story...

    I was kind of surprised there wasn't a thread for it:

    The NSA Is Breaking Most Encryption on the Internet

    The NSA's Cryptographic Capabilities

    Conspiracy Theories and the NSA

    Matthew Green Speculates on How the NSA Defeats Encryption

    Ed Felten on the damage caused by the NSA secretly breaking the security of Internet systems
     
  20. mirimir

    mirimir Registered Member

    Joined:
    Oct 1, 2011
    Posts:
    9,252
    Re: On the NSA breaking most encryption on the Internet

    Yes, that's the big story :(

    It's hard to say how hosed we are, based on what's been released so far. However, I'm somewhat reassured by Schneier's statement:

    Generally, the best advice seems to be using RSA with 4K keys, Twofish and Serpent, and avoiding AES, DSA and ECC.

    Do I have that right?

    Edit: I didn't :( Move AES to the OK list.
     
    Last edited: Sep 15, 2013
  21. JackmanG

    JackmanG Former Poster

    Joined:
    May 21, 2013
    Posts:
    284
    Re: On the NSA breaking most encryption on the Internet

    Nah, it's a bit better than that, according to Schneier at least. He'd probably avoid ECC, but RSA and DSA are basically the same in terms of cryptanalytic advances. So it's not really about one or the other, it's just about using long enough keys. I would stick to at least 2048, but I see little reason not to go with 4096. RC4 still seems okay, but back in March he suggested we start moving away from it...to something like AES. Which brings to the final point: AES appears okay as well. Better than okay, actually.

    As covered in the links here as well as this article, AES is more than likely secure. (Possibly better than Twofish & Serpent, depending on how you look at it.) In fact, you were the one who posted the link to Schneier's latest endorsement (more or less) of AES. (Granted, there he was just stating he trusts it, but multiple times in the past he's specifically recommended it, even over Twofish.)
     
  22. mirimir

    mirimir Registered Member

    Joined:
    Oct 1, 2011
    Posts:
    9,252
    Re: On the NSA breaking most encryption on the Internet

    OK, fair enough.

    But I've seen advice for years to move from DSA to RSA. In SSH, for example. So is Schneier really saying that they're comparable in practice?
     
  23. Pinga

    Pinga Registered Member

    Joined:
    Aug 31, 2006
    Posts:
    1,420
    Location:
    Europe
  24. Pinga

    Pinga Registered Member

    Joined:
    Aug 31, 2006
    Posts:
    1,420
    Location:
    Europe
    http://www.theguardian.com/commentisfree/2013/sep/15/nsa-mind-keith-alexander-star-trek

    http://www.washingtonpost.com/blogs...ia-director-says-terrorists-love-using-gmail/
     
  25. Pinga

    Pinga Registered Member

    Joined:
    Aug 31, 2006
    Posts:
    1,420
    Location:
    Europe
    Oriana Fallaci
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.