Discussion in 'privacy general' started by Dermot7, Jun 6, 2013.
If President Obama wanted the NSA to quit storing phone metadata, he’d act now
If the NSA, GCHQ, etc. didn't know about the Heartbleed vulnerability in advance, I'll guess they have a lot of people working feverishly right now.
Study Shows Flawed U.S. Encryption Standard Could Be Broken in Seconds
"If the NSA did have the keys to the backdoor in a random number generator it could break some encryption without trouble."
NSA Spied On Human Rights Groups, Says Snowden
Austria is one of the six countries the NSA is intercepting all of its telecommunications
See: Why The Conversation Should Be Required Viewing at the NSA
"Francis Ford Coppola's psychological thriller, which turns 40 today, may be the best exploration of the dangers of surveillance that pop culture has ever produced."
NSA monitors WiFi on US planes ‘in violation’ of privacy laws:
NSA Said to Exploit Heartbleed Bug for Intelligence for Years
NSA denies report it exploited Heartbleed for years
It was interesting (re)reading this pre-Snowden March 2012 article: The NSA Is Building the Country’s Biggest Spy Center (Watch What You Say).
NSA denied the gist of the March 2012 article mentioned in the last post.
Backbone taps + unencrypted (or MITM'd due to lack of certificate checks, etc) MTA<->MTA exchanges = ?
How the NSA shot itself in the foot by denying prior knowledge of Heartbleed vulnerability
Silicon Valley could force NSA reform, tomorrow. What's taking so long?.
Obama lets NSA use zero-day flaws given “clear national security” need
Edward Snowden defends decision to question Vladimir Putin on surveillance
From Government Surveillance and Internet Search Behavior (paper):
As Europe erupts over US spying, NSA chief says government must stop media.
Maths spying: The quandary of working for the spooks.
Note: Click on > Read full article at the above webpage
Heartbleed: Understanding When We Disclose Cyber Vulnerabilities (statement from White House)
Emoji: The ultimate NSA-proof method of communication.
Codes that substitute symbols or images for words instead of letters are far more difficult to break. The character set becomes much larger. Analysis based on letter frequency becomes useless. Without knowing what the wordset used by the symbols is, it's nearly impossible to assign meanings to any of them, assuming that the images aren't so simple as to make it obvious.
Separate names with a comma.