Welcome to DU! The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards. Join the community: Create a free account Support DU (and get rid of ads!): Become a Star Member Latest Breaking News General Discussion The DU Lounge All Forums Issue Forums Culture Forums Alliance Forums Region Forums Support Forums Help & Search

hootinholler

(26,449 posts)
Fri Sep 6, 2013, 10:00 AM Sep 2013

A thread for apologies from those who said I was nuts about the NSA

From those right here in this forum who said I was stoopud because I thought the PRISM slides implied that the NSA had cracked commercial encryption. I was told it's AES256 and will take them a brazillian years to crack it and the notion that the NSA had a trick that allows them to decrypt stuff was just nuts. That I was spreading FUD and couldn't possibly know what I am talking about.

Well here's a thread in which you can simply say I'm sorry, and pass along beer and travel money to help me on my way to many adventures.

We still don't know if they have compromised blowfish, but anyone who relies on commercial encryption (which includes all VPN traffic) can consider their stuff compromised.

Now you can also explain to me how someone like the Carlisle Group or the Koch Brothers doesn't have someone just like Snowden except instead of giving stuff to journalists, they simply give stuff to them and keep their mouth shut all the way to the bank.

109 replies = new reply since forum marked as read
Highlight: NoneDon't highlight anything 5 newestHighlight 5 most recent replies
A thread for apologies from those who said I was nuts about the NSA (Original Post) hootinholler Sep 2013 OP
The NSA has been key in developing encryption and security methods. MineralMan Sep 2013 #1
The NSA did the math, not the implementation. hootinholler Sep 2013 #2
Not exactly. The NSA is involved totally in cryptology research MineralMan Sep 2013 #5
All of that s true, but also look at the customized ASIC chips available for bitcoin mining. AtheistCrusader Sep 2013 #16
Frankly, I don't know their exact capabilities, and I'm not a MineralMan Sep 2013 #52
Do you have a cite for that? joshcryer Sep 2013 #26
For what? The NSA developing algorithms and the math behind AES? hootinholler Sep 2013 #27
And this confirmation you speak of Hutzpa Sep 2013 #41
You do deserve apologies, but I don't think you'll be getting any. sabrina 1 Sep 2013 #43
CPU rewrite discussion hueymahl Sep 2013 #46
Thanks for that. n/t hootinholler Sep 2013 #109
here are a couple of articles for those in denial: niyad Sep 2013 #3
Sorry. No apology. longship Sep 2013 #4
No back doors? AtheistCrusader Sep 2013 #17
My main box is Gentoo Linux. longship Sep 2013 #19
A back door need not be obvious. AtheistCrusader Sep 2013 #20
Sounds to me you are probably looking for an answer yourself. nt Hutzpa Sep 2013 #25
I am aware of that, too. longship Sep 2013 #30
I think it's fair to say that the security is suspect hootinholler Sep 2013 #34
Well, I know the math and the tech. longship Sep 2013 #45
Perhaps we are at odds over terminology? hootinholler Sep 2013 #58
Okay, I see where you're going. longship Sep 2013 #61
Claiming that you are a hardware engineer Aerows Sep 2013 #78
Who claimed they were a hardware engineer? longship Sep 2013 #82
Thank heaven you didn't Aerows Sep 2013 #83
This message was self-deleted by its author guyton Sep 2013 #33
And like all such exploits, it was discovered and fixed. longship Sep 2013 #49
This message was self-deleted by its author guyton Sep 2013 #73
Your post brought a smile. Good one. longship Sep 2013 #75
Even Theo & company missed that one, IIRC Recursion Sep 2013 #64
I'd prefer Aerows Sep 2013 #80
Were you around then? hootinholler Sep 2013 #97
+ 1000 Hutzpa Sep 2013 #24
Fucking typical hootinholler Sep 2013 #28
Awww Did I hurt your feelings Hutzpa Sep 2013 #37
This is why you are wasting your time waiting for an apology. Rex Sep 2013 #39
The way you id a partisan loon is as follows: when they wage a war on math ConservativeDemocrat Sep 2013 #42
I certainly never though you were nuts Aerows Sep 2013 #6
I don't have time to read all the articles but isn't this a case of Luminous Animal Sep 2013 #10
They undoubtably use multiple strategies. AtheistCrusader Sep 2013 #21
Alice's problem is always Bob Recursion Sep 2013 #65
You have moved back in the last days Aerows Sep 2013 #70
is still insane to say AES is broken Recursion Sep 2013 #107
There is no doubt PrestonLocke Sep 2013 #67
The people that creep into these threads and attempt to sound like rational Aerows Sep 2013 #71
Sorry if you misunderstood. PrestonLocke Sep 2013 #76
Well Aerows Sep 2013 #77
More money does not always equal best PrestonLocke Sep 2013 #85
Can you elaborate? DanTex Sep 2013 #81
Yes and yes PrestonLocke Sep 2013 #91
That passage is regarding commercial vendors. DanTex Sep 2013 #93
I agree PrestonLocke Sep 2013 #94
Rec and kick-- felix_numinous Sep 2013 #7
rec'd for beer and travel money. progressoid Sep 2013 #8
+1 Matariki Sep 2013 #79
sneaking a backdoor into commercial encryption programs yodermon Sep 2013 #9
Point taken... hootinholler Sep 2013 #11
Good luck with the apology Cryptoad Sep 2013 #12
+1 on that ! lunasun Sep 2013 #15
Also the phone system Rumold Sep 2013 #18
voice calls Cryptoad Sep 2013 #53
any Random Thoughts reference will always get a K&R from me corkhead Sep 2013 #13
+1 nolabear Sep 2013 #29
When I was a young pup working at my first real job in the late 60's and early 70's LiberalArkie Sep 2013 #14
Based on what I've found Hydra Sep 2013 #23
I blame Darth the dick Cheney and His cronies Demeter Sep 2013 #31
Cheney and his cadre are certainly part of the problem Hydra Sep 2013 #55
I think there are good guys at the NSA. For example: Richard Clarke avaistheone1 Sep 2013 #35
Good and bad - the NSA harrassed Martin Hellman, but he became friends with Bobby Inman bananas Sep 2013 #36
No need for me to apologize. zeemike Sep 2013 #22
I apologize for those who refuse to see or admit the possibilities Demeter Sep 2013 #32
I agrree with your first statement, truedelphi Sep 2013 #106
Ego much? n/t PasadenaTrudy Sep 2013 #38
No apologies... devils chaplain Sep 2013 #40
Yeah, there knowledge is based on using softwares Hutzpa Sep 2013 #44
people need to understand that uncrackable encryption still exists... devils chaplain Sep 2013 #48
Could not agree more, my friend! PrestonLocke Sep 2013 #47
There's this thing called Linux... ;) devils chaplain Sep 2013 #50
And who wrote the compiler? You have its source, too? MineralMan Sep 2013 #59
I think you're mixing up hardware based encryption with open source software. PrestonLocke Sep 2013 #62
The compiler was written by Richard Stallman. Here's the source. DanTex Sep 2013 #72
As a newbie, I would have said you were nutz. Clown is Down Sep 2013 #51
Always remember if it can be encrpted, then the encryption can be decrypted. It is all a game, Thinkingabout Sep 2013 #54
Yes, but can the data be decrypted in a reasonable amount of time? PrestonLocke Sep 2013 #63
can you work faster than high powered computer, why yes, the smart ones at NSA, etc Thinkingabout Sep 2013 #68
There is only so much electricity and computing power available, right now. PrestonLocke Sep 2013 #69
Time will tell, I will bet on the code being broken. Thinkingabout Sep 2013 #86
It's a matter of physical laws, not NSA black magic... Gravitycollapse Sep 2013 #84
Hey, you never know PrestonLocke Sep 2013 #87
If the encryption is from their files it will probably be broken in short time, remember they Thinkingabout Sep 2013 #88
Do you understanding the premise of the brute force attack? Gravitycollapse Sep 2013 #89
Regarding what subject, brute force attack applies to many things. Thinkingabout Sep 2013 #90
Uhhh...we are talking about encryption so assume the brute force attack is on that subject. Gravitycollapse Sep 2013 #92
Brute force was before the computers, like brute force required to build the pyrmaids so there is a Thinkingabout Sep 2013 #96
Okay, so your statements lead me to believe you do not understand a brute force attack. Gravitycollapse Sep 2013 #98
If they had a file in which they already know what the file contains and it is encrpyted then the Thinkingabout Sep 2013 #99
How would they have the encryption key for files they did not themselves generate? Gravitycollapse Sep 2013 #100
They would probably get it by spying and stealing information, that works pretty well. Thinkingabout Sep 2013 #101
If the keys are encrypted themselves then that becomes a useless endeavor. Gravitycollapse Sep 2013 #103
Never say never, just watch. Thinkingabout Sep 2013 #104
Your argument is essentially ludicrous. Gravitycollapse Sep 2013 #105
omg someone was right on the Internet Enrique Sep 2013 #56
If a middle level grunt has something an unethical billionaire wants, it will be sold, GoneFishin Sep 2013 #57
Good luck with that Blue_Tires Sep 2013 #60
Interesting article... bobGandolf Sep 2013 #66
What's the NSA? Vashta Nerada Sep 2013 #74
^^^ +1000 alittlelark Sep 2013 #102
yeah...I remember that...and I'm not a techie. But, your posts were always KoKo Sep 2013 #95
K&R woo me with science Sep 2013 #108

MineralMan

(146,317 posts)
1. The NSA has been key in developing encryption and security methods.
Fri Sep 6, 2013, 10:05 AM
Sep 2013

That's the mission they have. Most commercial and public encryption is based on NSA research. Of course the NSA protected its access to encrypted information. If encryption could not be broken, the NSA would be useless. So, it helped people design encryption in order to maintain its abilities to do what its mission requires.

Only people who have not looked think that today's encryption methods came from anywhere but the NSA's research. It's all on the nsa.gov site. Go look, is my advice to people who have a hard time believing that the NSA can access information that is encrypted.

You are correct, of course. I've been saying the same thing all along through this mess.

hootinholler

(26,449 posts)
2. The NSA did the math, not the implementation.
Fri Sep 6, 2013, 10:12 AM
Sep 2013

My understanding at the moment is the exploit is implementation dependent, and not a function of the math that underlies public/private encryption.

MineralMan

(146,317 posts)
5. Not exactly. The NSA is involved totally in cryptology research
Fri Sep 6, 2013, 10:19 AM
Sep 2013

and development. From funding University research to providing modular encryption coding that is used in a wide, wide range of both commercial and open source operating systems and applications, it works hand in hand with developers.

If it has to do with encryption or security of communications, the NSA is right there in the trenches. In fact, it is the central force behind the development of encryption technology.

If the software or OS you use incorporates encryption, there's NSA coding and algorithms in it. Guaranteed.

From education and research to implementation, the NSA is involved wherever cryptology is concerned.

AtheistCrusader

(33,982 posts)
16. All of that s true, but also look at the customized ASIC chips available for bitcoin mining.
Fri Sep 6, 2013, 11:00 AM
Sep 2013

Now imagine you had a black budget in the billions to make your own for whatever purpose you wanted, with no accountability, in secret.

Whatever we've been told about the number of computational operations, and the duration to complete it, to brute force certain levels of encryption... is wrong.

If they don't have a private pair key themselves, if they don't know a vulnerability in the random salt generation table, if they don't have a window into an unencrypted link in the transmission path, if they don't have a way to scrape a key from the initial key pair handshake.. why THEN they just brute force it. And I doubt it takes them long to accomplish.

That's my bet anyway.

MineralMan

(146,317 posts)
52. Frankly, I don't know their exact capabilities, and I'm not a
Fri Sep 6, 2013, 01:25 PM
Sep 2013

professional in the field. However, I do know that the NSA is the most knowledgeable organization on the planet when it comes to encryption and decryption. Anyone who doesn't believe that doesn't know about the NSA.

The NSA is cryptology. They've been innovating in that area for many decades, and have their hands in every research effort. That is their area of expertise, along with collection of ELINT and SIGINT. Nobody else compares.

Can they decrypt stuff? I have no doubt that if anyone can, the NSA can. No doubt at all. If it's important enough, they can turn it into decrypted form.

Do they decrypt routinely? No, probably not. I can't imagine that they are concerned with routinely encrypted communications. Their interest is in important communications dealing with National Security issues. The rest simply doesn't fit into their mission.

Those are my opinions, informed by what they are informed by. I'm secure in those opinions. Others might have different opinions, and they're welcome to them.

hootinholler

(26,449 posts)
27. For what? The NSA developing algorithms and the math behind AES?
Fri Sep 6, 2013, 12:08 PM
Sep 2013

I thought that's common knowledge, but I will try to find documentation tonight when I have more time.

I don't know what the CPU rewrite discussion is, so it could be, but if it is, it's purely accidental.

The slides regarding PRISM that were released early in the cycle implied that the NSA could decrypt VPN traffic content. When I pointed that out I got a rasher of how idiotic and libertarian I was being spreading FUD because it would be unpossible for the NSA to do that.

Yesterday, we have confirmation of the very thing I pointed out as an implication of the slide's content. There's a post upthread with articles from commondreams, but it was also published in The Guardian, The NY Times and even the WaPo has an article in this morning's issue.

Hutzpa

(11,461 posts)
41. And this confirmation you speak of
Fri Sep 6, 2013, 12:46 PM
Sep 2013

is from an article that was put together by whom exactly?

Do you know whether this article was written specifically to gauge how knowledgeable the public is on encryption?

Do you know if this was done to influence an area NSA has no control over?

It could also mean that this article was purposely done for propaganda only.

We don't know these things yet you keep referring to this article as fact.

sabrina 1

(62,325 posts)
43. You do deserve apologies, but I don't think you'll be getting any.
Fri Sep 6, 2013, 12:52 PM
Sep 2013

But if you do, that person would deserve respect for being willing to admit to being wrong. It's not an easy thing to do.

hueymahl

(2,497 posts)
46. CPU rewrite discussion
Fri Sep 6, 2013, 12:56 PM
Sep 2013
http://www.democraticunderground.com/10023264573

Still don't know if there is any truth to it. But it is a vulnerability, and given recent revelations, I think it would be foolish to fully discount that it is not on the NSA's radar, if not actually implemented.

niyad

(113,350 posts)
3. here are a couple of articles for those in denial:
Fri Sep 6, 2013, 10:16 AM
Sep 2013

Latest Snowden Revelation: NSA Sabotaged Electronic Locks
by Jon Healey

The latest Edward Snowden-powered exposé published by the New York Times, ProPublica and the Guardian is, to me, the most frightening. It reveals that the National Security Agency has moved beyond its historic role as a code-breaker to become a saboteur of the encryption systems. Its work has allegedly weakened the scrambling not just of terrorists' emails but also bank transactions, medical records and communications among coworkers. This undated photo provided by the National Security Agency shows its headquarters in Ft. Meade, Md. (Handout / Getty Images / May 11, 2006)

Here's the money graf:

"The NSA hacked into target computers to snare messages before they were encrypted. And the agency used its influence as the world’s most experienced code maker to covertly introduce weaknesses into the encryption standards followed by hardware and software developers around the world."
. . .

http://www.commondreams.org/view/2013/09/06-2


Published on Friday, September 6, 2013 by Deeplinks Blog
Leaks Show NSA is Working to Undermine Encrypted Communications, Here's How You Can Fight Back
by Eva Galperin and Dan Auerbach

Through covert partnerships with tech companies, the spy agencies have inserted secret vulnerabilities into encryption software. (Photograph: Kacper Pempel/Reuters)In one of the most significant leaks to date regarding National Security Agency (NSA) spying, the New York Times, the Guardian, and ProPublica reported Thursday that the NSA has gone to extraordinary lengths to secretly undermine our secure communications infrastructure, collaborating with GCHQ (Britain's NSA equivalent) and a select few intelligence organizations worldwide.

These frightening revelations imply that the NSA has not only pursued an aggressive program of obtaining private encryption keys for commercial products—allowing the organization to decrypt vast amounts of Internet traffic that use these products—but that the agency has also attempted to put backdoors into cryptographic standards designed to secure users' communications. Additionally, the leaked documents make clear that companies have been complicit in allowing this unprecedented spying to take place, though the identities of cooperating companies remain unknown.

Many important details about this program, codenamed Bullrun, are still unclear. For example, what communications are targeted? What service providers or software developers are cooperating with the NSA? What percentage of private encryption keys of targeted commercial products are successfully obtained? Does this store of private encryption keys (presumably procured through theft or company cooperation) contain those of popular web-based communication providers like Facebook and Google?

What is clear is that these NSA programs are an egregious violation of our privacy. We can and should enjoy a future where it is still possible to speak privately with fellow citizens, to freely associate and engage in political activism, and to be left alone when we want to be. If the NSA is allowed to continue building backdoors into our communications infrastructure, as law enforecement agencies have lobbied for, then the communications of billions of people risk being perpetually insecure against a variety of adversaries, ranging from foreign governments to criminals to domestic spy agencies, which would have disastrous economic consequences.

. . . .

http://www.commondreams.org/view/2013/09/06-5



. . . .

As joint reporting by ProPublica and the New York Times explains, according to the documents and interviews with industry officials, the NSA has deployed "custom-built, superfast computers to break codes" and began collaborating with "technology companies in the United States and abroad" to build 'backdoor' entry points into their products and introduce weaknesses into their encryption standards.

The records do not identify which specific companies have been working with the NSA to this extent. However, one document does reveal that a GCHQ team has been working to develop ways into encrypted traffic on the "big four" service providers, named as Hotmail, Google, Yahoo and Facebook.
"By deliberately undermining online security in a short-sighted effort to eavesdrop, the NSA is undermining the very fabric of the internet."
. . . . . .

As one of the NSA documents obtained by the news agencies states, the NSA "actively engages US and foreign IT industries to covertly influence and/or overtly leverage their commercial products' designs," and in turn inserts "vulnerabilities into commercial encryption
systems. "US and British intelligence agencies have successfully cracked much of the online encryption relied upon by hundreds of millions of people to protect the privacy of their personal data, online transactions and emails," the Guardian reports.

"For the past decade, NSA has lead [sic] an aggressive, multi-pronged effort to break widely used internet encryption technologies," a 2010 GCHQ document states. "Vast amounts of encrypted internet data which have up till now been discarded are now exploitable.

. . .

http://www.commondreams.org/headline/2013/09/05-7

longship

(40,416 posts)
4. Sorry. No apology.
Fri Sep 6, 2013, 10:17 AM
Sep 2013

It's still not a credible claim. There isn't enough computer power on the planet to crack the encrypted data. Cracking one message does not help one crack another. That's the way it's designed.

And there are no back doors in open source encryption software.

The claim that NSA can read strong encryption just isn't credible. And anybody who understands the math and the technology is pretty damned sure about that.

The reportage on this is horrible and just plain wrong.

AtheistCrusader

(33,982 posts)
17. No back doors?
Fri Sep 6, 2013, 11:03 AM
Sep 2013

How do you know? How about a back door in the compiler? Did you use an open source compiler you compiled yourself?

How about an inherent and known to them, but not to us, vulnerability in an algorithm?

longship

(40,416 posts)
19. My main box is Gentoo Linux.
Fri Sep 6, 2013, 11:21 AM
Sep 2013

So yes, as a matter of fact, I do compile all my software, including the OS kernel, the compiler, and everything.

As I said, no back doors.

But even if I didn't, there's still no back doors in open source software because it's all traceable to the main source code repositories. There are thousands of eyes on that source.

Claiming otherwise is just making shit up without any evidence.

Sorry, friend. Just not buying that claim. It just is not credible.

AtheistCrusader

(33,982 posts)
20. A back door need not be obvious.
Fri Sep 6, 2013, 11:25 AM
Sep 2013

No blinking lights, no 'tee hee' comments in the source. It could be simple as a known (to them) vulnerability that you have not yet discovered.

They spin the odds in their favor. They can afford the best and the brightest. Every time the public source developers discover a bug or a weakness, and fix it, if the NSA knew about it previously, that 'bug' was actually a perfectly valid back door up until the point it was discovered, and called a bug.

It doesn't need to be introduced to the code repository to be considered a back door.

longship

(40,416 posts)
30. I am aware of that, too.
Fri Sep 6, 2013, 12:20 PM
Sep 2013

That's why I upgrade my software when there are updates available. Because there are sometimes security holes in software ripe for exploit. (Thank goodness there are black hat hackers to find them... which they do.) The code gets fixed and alerts are sent out. The people working on the code are very, very good. That's the way the system works. And it does work very well.

So even if there is an exploit available it may not remain very long. The NSA had better not be banking on a specific security hole for long term.

I'd put real money that the strong encryption is not crackable by NSA or anybody else. If NSA has an exploit, it wouldn't be there for long. And accessing people's net connected computers isn't going to be a very productive strategy for them either when it is easier and cheaper to just intercept the traffic. If that traffic is strong encrypted, they're done. All they know is sender and recipient. Just like phone calls.

If strong encryption was vulnerable we'd be in deep shit. It is what is used for bank transactions and other really important stuff. Thank goodness it isn't crackable.

hootinholler

(26,449 posts)
34. I think it's fair to say that the security is suspect
Fri Sep 6, 2013, 12:33 PM
Sep 2013

Until we know the actual methods used to decrypt things. The NSA's prowess at maths is legendary for good reasons. Subtle flaws (like rounding differences) can enable amazing results. To think that all the corner cases are even known, let alone explored is rather naive.

It may well be that Blowfish remains secure, but at this point I wouldn't make that bet.

longship

(40,416 posts)
45. Well, I know the math and the tech.
Fri Sep 6, 2013, 12:56 PM
Sep 2013

And your claim is just plain wrong.

They call them trap door algorithms for a reason. They are based on mathematical functions within number theory (the mathematics of positive integers) that have no analytical inverse solutions. The only way to solve the inverse is by exhaustive search. That's the way they are designed.

For instance, there is no analytical solution to factoring large integers beyond trial and error. It takes extraordinary resources to mount any kind of attack on such an encrypted message. And by merely lengthening the key one can make the cracking arbitrarily more difficult. that is, in fact, what is done. The key space on strong encryption is mind numbingly huge. To find a solution for just one message is beyond any computer resources for decades, if not centuries. And cracking one message doesn't help you crack another using a different key pair.

A mathematician who finds a way to crack one of these techniques would find instant fame and fortune. Not all of them work at NSA.

And then there's the security of our financial institutions and other heavy users of strong crypto. If a crack existed, they would be in big danger. There are those who would gladly exploit such a crack to wreak havoc. And if NSA knew of a crack they have no guarantee that it wouldn't be discovered outside their shop.

Alas, claiming that NSA can crack strong crypto is just not credible.

hootinholler

(26,449 posts)
58. Perhaps we are at odds over terminology?
Fri Sep 6, 2013, 02:27 PM
Sep 2013

I don't think I've claimed they can crack strong crypto willy-nilly. If I implied that then I'm sorry. I don't know the math intimately but I do have a rudimentary understanding of how it hangs together. I have been in tech for a long time, programming for 25 years and in hardware for 10 before that.

That said, the NSA and the GCHQ have made the assertion that they can decrypt a lot of traffic previously thought secured.

A more general NSA classification guide reveals more detail on the agency's deep partnerships with industry, and its ability to modify products. It cautions analysts that two facts must remain top secret: that NSA makes modifications to commercial encryption software and devices "to make them exploitable", and that NSA "obtains cryptographic details of commercial cryptographic information security systems through industry relationships".


So yeah, it's very unlikely that a brute force attack is what is going on, but, I will stand by my assertion that based on what I known now, commercial encryption is suspect.

longship

(40,416 posts)
61. Okay, I see where you're going.
Fri Sep 6, 2013, 02:52 PM
Sep 2013

That's why I use open source, which nobody can credibly claim has deliberate exploits like are cited.

I understand that Wall Street uses a lot of Unix variants, like Linux, because it is such a great programming platform (which it is). Also, its stability and security is important. At least that's what I've heard.

I learned how bad Microsoft platforms are by programming on them, which I did for years. Windows just plain sucks as a programming platform. Microsoft keeps changing things so dramatically that software is obsoleted before its time. The Unix model is much more stable, especially when interfacing with the kernel.

Also, I can know what's inside the platform with Linux. Windows is a mystery. Beyond the API, one doesn't know shit what's in there. There very well could be back doors and one wouldn't know it. Remember the NSA_KEY item from a few years back?

I wouldn't use Microsoft for anything.

Thank you for the lively and polite discussion. I love interacting with people on these issues. You've made it worthwhile.

Best regards.

 

Aerows

(39,961 posts)
78. Claiming that you are a hardware engineer
Fri Sep 6, 2013, 05:35 PM
Sep 2013

and know the protocols that operate the hardware at the lowest level ... is extremely naive.

Credible is as credible does, and the NSA isn't credible. Neither is anyone that says they understand security, then via their statements prove extensible lack of knowledge.

I'm not going to sit here and tell you that I am a genetic engineer when I can't describe the makeup of the 4 nucleic acids of DNA, so I'd rather not hear it from a person that doesn't know even the first three models of the OSI how network engineering works.

But do proceed, governor.

Tell me how things *really* work. I'm eager to hear it.

longship

(40,416 posts)
82. Who claimed they were a hardware engineer?
Fri Sep 6, 2013, 05:44 PM
Sep 2013

I said I understand the math and the technology. In this case the latter would be how the software works, since strong encryption is software based.

If you have anything constructive to contribute to this discussion I will certainly pay attention. Otherwise, I guess I do not understand your somewhat rude response.

Response to AtheistCrusader (Reply #20)

longship

(40,416 posts)
49. And like all such exploits, it was discovered and fixed.
Fri Sep 6, 2013, 01:09 PM
Sep 2013

And the Morris worm happened a long time ago. The security of the software is much more robust these days.

The bugs get fixed.

NSA has no guarantee that an exploit will remain or that an arbitrary computer will be running a platform with it present. And why hack the computer when they can easily just grab the messages off the backbone, which I think everybody kind of knows is happening? It's cheap and far easier.

The NSA is neither magic nor omnipotent.

BTW. Thanks for the respectful discussion.

Response to longship (Reply #49)

longship

(40,416 posts)
75. Your post brought a smile. Good one.
Fri Sep 6, 2013, 05:07 PM
Sep 2013

But with open source one at least has a chance to determine if there are back doors. In fact, there are often thousands of people involved with the source. Any back door is liable to be discovered.

I was a long time user of sendmail. It was my email server of choice. Yes, it could be a nightmare to set up, but once you had it up and running, it was stable, reliable, and secure. Of course this was after the Morris hack was fixed.

I do not accept your premise that open source is not more secure than closed source. One cannot know in principle whether MS Windows has any back doors since one cannot look at the source code. That alone puts its security into question. That, and the inability to find and resolve bugs, is why I switched to open source in the 90's. I have not looked back since.

Also, Linux is a helluva lot easier to administrate and everything is well documented. It's an entirely open technology with a very large community of people willing to assist with troubles.

Once I had my servers set up daily maintenance was effectively nil. They ran without a single glitch for years.

Recursion

(56,582 posts)
64. Even Theo & company missed that one, IIRC
Fri Sep 6, 2013, 04:01 PM
Sep 2013

However, that's a far cry from arbitrary decryption of Rijndael, let alone twofish.

hootinholler

(26,449 posts)
97. Were you around then?
Fri Sep 6, 2013, 07:46 PM
Sep 2013

I witnessed it live. Slammed us but good.

I'm not claiming they can crack blowfish variants, but until I know opinions of people who really know this shit about the break through in 2010, I'm not going to claim they can't either.

However as a trove for commercial interests, access the NSA corpus would be incredibly valuable. We know from the article that most, if not all, commercial encryption is compromised. Forget the Visa and Mastercard aspects and think about things like corporate sales info for large contractors. Want to know where to invest?

Hutzpa

(11,461 posts)
24. + 1000
Fri Sep 6, 2013, 11:51 AM
Sep 2013

These articles are for the tutti fruiti crowd that believes anything and everything.

Anyone that understands topology will know that this is just plain BS.




Hutzpa

(11,461 posts)
37. Awww Did I hurt your feelings
Fri Sep 6, 2013, 12:37 PM
Sep 2013

My comment wasn't meant for you, but since you made it about you and became offensive in the process,
well, tough luck then.

 

Rex

(65,616 posts)
39. This is why you are wasting your time waiting for an apology.
Fri Sep 6, 2013, 12:40 PM
Sep 2013

You can show them the math and the intel and they will still pretend they are correct. Even in the face of overwhelming evidence. It is just that simple, they don't care about being wrong. They only care about saying you are wrong.

Anyway, goodluck with the apology. People with huge egos don't have the ability to say they were wrong. I ignore the Usual Suspects since their point is just to disrupt and not have an honest argument.

ConservativeDemocrat

(2,720 posts)
42. The way you id a partisan loon is as follows: when they wage a war on math
Fri Sep 6, 2013, 12:51 PM
Sep 2013

President Clinton said the Republicans main problem is with "arithmetic".

The tutti-fruti far-too-extremist-to-be-a-Democrat crowd's main problem is with math.

Same thing.

Here's a clue: no matter how much you hate the President, two plus two still equals four.
And NP-hard problems are still NP-hard (not that you'd even understand what I'm talking about).

- C.D. Proud Member of the Reality Based Community

/ Likely the NSA is just running a bunch of password guessers. "Ilovejihad" isn't exactly a hard to try out.

 

Aerows

(39,961 posts)
6. I certainly never though you were nuts
Fri Sep 6, 2013, 10:20 AM
Sep 2013

And I've always had my suspicions that the NSA cracked some forms of encryption.

Luminous Animal

(27,310 posts)
10. I don't have time to read all the articles but isn't this a case of
Fri Sep 6, 2013, 10:38 AM
Sep 2013

ensnaring the info before encryption? And in other cases, aren't they simply being supplied with the encryption keys?

It this is the case, it seems to me that the NSA doesn't need to crack anything.

 

Aerows

(39,961 posts)
70. You have moved back in the last days
Fri Sep 6, 2013, 04:38 PM
Sep 2013

but you were on the threshhold screaming that it was insanity that encryption was broken. I understand why, and you yourself said why, since you want a position in India in their information security office, but it doesn't make you credible, and it pretty much makes everything a parody of security.

You, and those like you, ARE the problem.

 

Aerows

(39,961 posts)
71. The people that creep into these threads and attempt to sound like rational
Fri Sep 6, 2013, 04:44 PM
Sep 2013

defenders of privacy when all they are doing is PR work for the NSA are the ones that end up looking like jackasses. We have a handful that WANT to work for the NSA, a few that are contractors FOR the NSA, and everyone else that thinks they are a dogshit low agency and shouldn't get another tax dollar. Find another aspiration, and let this one fail all by itself, because now that the US people know, it isn't worth putting in soil to fertilize plants.

PrestonLocke

(217 posts)
76. Sorry if you misunderstood.
Fri Sep 6, 2013, 05:20 PM
Sep 2013

I was trying to point out that it's been widely accepted that the NSA has workarounds for SSL and most VPN encryption.

But so does any white/gray/black hat programmer.

I'm not yet convinced the NSA or anybody can walk through proper encryption in a reasonable amount of time.

I'm not convinced that the guys working at the NSA are more skilled than any good security expert or reverse engineer.

 

Aerows

(39,961 posts)
77. Well
Fri Sep 6, 2013, 05:25 PM
Sep 2013

the best mechanic has the best tools. If you are prepared to announce that even if a shaky gray hat can put together a cracking box full of GPGPUs the NSA can't make one that is better, I'm not prepared to support you and never have been from the get go.

I'm not going to ride in a boat that sinks, and I've stated this position before, got derided for it, and just smiled. You are either a hardware engineer or you aren't.

PrestonLocke

(217 posts)
85. More money does not always equal best
Fri Sep 6, 2013, 05:53 PM
Sep 2013

Of course the NSA has more funds to build a better computer.
Cryptography is not about the size of your machine, or how many CUDA cores you have.

I stated that I do not believe that the NSA has all the best computer scientists in the world. They do not.

Look at our buddy Snowden. He's no genius and even he figured out that the NSA spying was wrong.

Brute force is the last method any code breaker would try. Even the NSA supercomputers are not magic, they still adhere to the laws of physics, for now.

Do you know what the biggest vulnerability to ANY 'secure' system is?

Notice I said workarounds for SSL and VPN? That's because still nobody can crack them using brute force in a reasonable amount of time. The NSA is relying on zero-day vulnerabilities that they themselves have incorporated into commercial software.

It does not take a supercomputer to develop new encryption method. It does not take a supercomputer to find a vulnerability or exploit. A 12 year old genius could hop on a $500 laptop and invent the a new encryption technique that would not be cracked for years. He could also have zero knowledge of hardware engineering.

I'm not asking you to support me or the facts about computer technology, I'm just trying to make you more aware.

DanTex

(20,709 posts)
81. Can you elaborate?
Fri Sep 6, 2013, 05:43 PM
Sep 2013

Are you suggesting the protocols themselves are insecure, or that commercial vendors can't be trusted?

PrestonLocke

(217 posts)
91. Yes and yes
Fri Sep 6, 2013, 06:33 PM
Sep 2013

According to the NSA's 2013 budget requests released by the NY Times:

"The SIGINT Enabling Project actively engages the USA and foregin IT industries to covertly influence and/or overtly leverage their commercial products' designs. These design changes make the sysetms in question exploitable through SIGINT collection (e.g. Endpoint, MidPoint, etc.) with foreknowledge of the modification. To the consumer and other adversaries, however, the systems' security remains intact. In this way, the SIGINT Enabling approach uses commercial technology and insight to manage the increasing cost and technical challenges of discovering and successfully exploiting systems of interest within the ever-more integrated ans security-focused global communications environment."

The NSA is working with vendors and developers to create security vulnerabilities.
Personally, this makes me think more of the ever-growing cloud and web-based services than encrypted hd partitions and pgp emails.

Only compile pre-1992 code on a pre-1992 compiler!

DanTex

(20,709 posts)
93. That passage is regarding commercial vendors.
Fri Sep 6, 2013, 06:42 PM
Sep 2013

For example, let's say I'm running my own OpenVPN server on by own Linux machine. There's no indication from that NYT article that I'm at risk. The articles I've read are very short on details, and it seems like the NSA is relying primarily on weaknesses that they have been able to force into commercial products. But that doesn't mean that the underlying protocols have been broken.

felix_numinous

(5,198 posts)
7. Rec and kick--
Fri Sep 6, 2013, 10:28 AM
Sep 2013

Not to apologize but to say:

Thank you hootinholler!! you were definitely ahead of the curve, and so right--Snowdon not only leaked, but showed the most 'secure' network we have is hackable, and likely transparent for the right price.

yodermon

(6,143 posts)
9. sneaking a backdoor into commercial encryption programs
Fri Sep 6, 2013, 10:35 AM
Sep 2013

is not the same as "cracking commercial encryption". It's called cheating.

hootinholler

(26,449 posts)
11. Point taken...
Fri Sep 6, 2013, 10:38 AM
Sep 2013

However we don't know the full mechanism involved. I think their 'back door' is simply an algorithmic flaw that allows the crack.

But I will be happy to cede the point, after all compromised is compromised, eh?

Cryptoad

(8,254 posts)
12. Good luck with the apology
Fri Sep 6, 2013, 10:42 AM
Sep 2013

I post a month of so back that the NSA could decrypt any message that was generated on any commercial Operating System... You can imagine the responses I got...... I am still waiting for my apologizes...

It amazes me there are so many people who have No Idea that the Internet is a public domain,

lunasun

(21,646 posts)
15. +1 on that !
Fri Sep 6, 2013, 10:55 AM
Sep 2013

It amazes me there are so many people who have No Idea that the Internet is a public domain,

 

Rumold

(69 posts)
18. Also the phone system
Fri Sep 6, 2013, 11:20 AM
Sep 2013

All voice calls are recorded.

call your lawyer on a cell phone, you can't really expect that to be private can you?

Cryptoad

(8,254 posts)
53. voice calls
Fri Sep 6, 2013, 01:26 PM
Sep 2013

are the property of the phone company.... and they don't keep the recording long..... heh?

LiberalArkie

(15,719 posts)
14. When I was a young pup working at my first real job in the late 60's and early 70's
Fri Sep 6, 2013, 10:53 AM
Sep 2013

those of us in our select group thought of the NSA geeks as the good guys. I wonder if we were under a delusion or did they evolve into the bad guys.

I have really began to wonder now about some of the work our group did way back then.

Hydra

(14,459 posts)
23. Based on what I've found
Fri Sep 6, 2013, 11:37 AM
Sep 2013

There may be some good guys, but the secrecy and lack of oversight really allows the most horrid behavior to flourish. That, and some of the people involved in the various Alphabet groups are just plain monsters. Hoover, Dulles, Bush Sr., etc.

I've heard rumors that it was happening before WWII, but after that the permanent war industry and resulting effects really took hold. Also, there seems to be a lot of Nazi influences from that time that haven't been rooted out. The Bushes for instance.

I blame most of where we are today on the selective enforcement of law. Prescott Bush should have been charged with treason for his attempted military coup. The banksters and robber barons that caused the Depression should have had their wealth fined out of existence. It's all snowballed from there into bigger and bigger crimes.

 

Demeter

(85,373 posts)
31. I blame Darth the dick Cheney and His cronies
Fri Sep 6, 2013, 12:29 PM
Sep 2013

I don't know if this country will ever recover from them.

Hydra

(14,459 posts)
55. Cheney and his cadre are certainly part of the problem
Fri Sep 6, 2013, 01:43 PM
Sep 2013

He's been involved in all of this since Nixon and even before that. I swear he just refuses to die.

Even so, he's just a symptom. The fact that what he and the other War Inc peeps do is not punished, they just keep doing it.

 

avaistheone1

(14,626 posts)
35. I think there are good guys at the NSA. For example: Richard Clarke
Fri Sep 6, 2013, 12:34 PM
Sep 2013
http://en.wikipedia.org/wiki/Richard_A._Clarke


I think most of our federal agencies are a mix of good and not so good people.

bananas

(27,509 posts)
36. Good and bad - the NSA harrassed Martin Hellman, but he became friends with Bobby Inman
Fri Sep 6, 2013, 12:35 PM
Sep 2013
http://nuclearrisk.wordpress.com/2011/11/20/ex-spymaster-on-iranian-nuclear-threat/

Ex-Spymaster on Iranian Nuclear Threat
Posted on November 20, 2011 by Nuclear Risk

In a recent interview, retired four-star admiral and former head of the super-secret NSA, Adm. Bobby Inman, portrays a very different Iranian threat from the usual – and a very different approach for dealing with Iran successfully.

<snip>

Inman’s emphasis on cooperation, instead of confrontation, came as no surprise to me. I had the privilege of experiencing this approach first hand in the 1970’s. Back then, NSA was used to having absolute control over all American cryptographic research, so they were rankled when I started publishing papers that they would have classified above Top Secret. I had developed my results without access to the classified literature, so I thought I should be free to publish my work – plus, there was a growing personal and commercial need for encryption that could not be met by classified algorithms. NSA saw things differently, and some elements within the Agency warned that I could be thrown in jail for publishing my work. This confrontation drew major media coverage, including coverage in Science, TIME magazine, and the New York Times.

That battle was in full swing when Inman took over as Director of NSA and, against the advice of all his advisors at the Agency, decided to pay me a visit to see if he could defuse the conflict. I’ll never forget his cutting through the initial tension by telling me, “It’s nice to see you don’t have horns,” which is how the career people at NSA had been portraying me. I repaid the compliment, since their threats had produced a similar picture of NSA in my mind. Inman went on to tell me that he couldn’t see the harm in talking, and talk we did. With that kind of “out of the box” thinking on Inman’s part, what had been an adversarial relationship eventually blossomed into a friendship with enough trust and understanding that Inman is one of the charter signers of my petition asking Congress to authorize a study of the risk inherent in our current nuclear posture.

Inman has a number of other intriguing observations on issues ranging from nuclear weapons to “enhanced interrogation” in his Electric Politics interview, and I highly recommend it to you.

Martin Hellman

zeemike

(18,998 posts)
22. No need for me to apologize.
Fri Sep 6, 2013, 11:32 AM
Sep 2013

Because I would not know an encryption if one bit me on the ass.
But what I do know is that if you have billions in resources there is very little that you cannot do...so I believed you right from the start.

But let me apologize for them if they don't have the integrity to do it themselves.

 

Demeter

(85,373 posts)
32. I apologize for those who refuse to see or admit the possibilities
Fri Sep 6, 2013, 12:30 PM
Sep 2013

The intentions are bad, so how can the results not be?

I further believe they have finally f'd themselves, and it will be coming to a bloody end.

devils chaplain

(602 posts)
40. No apologies...
Fri Sep 6, 2013, 12:43 PM
Sep 2013

I would never trust commercial encryption, then or now. Use open source if you want privacy -- truecrypt and openpgp. NO ONE, not even the NSA, can crack a truecrypt volume with a randomized 30 character password. A lot of people are conflating cracking passwords with installing backdoors, and they are different things entirely.

Hutzpa

(11,461 posts)
44. Yeah, there knowledge is based on using softwares
Fri Sep 6, 2013, 12:55 PM
Sep 2013

and application hence the reference about back door access.

devils chaplain

(602 posts)
48. people need to understand that uncrackable encryption still exists...
Fri Sep 6, 2013, 01:03 PM
Sep 2013

It's just that no corporation wants you to have it. Hence it seems impossible, when it's not.

PrestonLocke

(217 posts)
47. Could not agree more, my friend!
Fri Sep 6, 2013, 01:01 PM
Sep 2013

If one is worried about a back door, one can simply compile the source code from scratch.

MineralMan

(146,317 posts)
59. And who wrote the compiler? You have its source, too?
Fri Sep 6, 2013, 02:47 PM
Sep 2013

Think about it.

What about the CPU in your PC? What's in there? How about the BIOs on your PC? Did you write that or see the source code?

There are many ways to bypass or subvert your encryption. Who made your hardware components? Do they have any government contracts, do you think?

Once you go beyond what you can personally control, you have no control. It is that simple.

PrestonLocke

(217 posts)
62. I think you're mixing up hardware based encryption with open source software.
Fri Sep 6, 2013, 03:51 PM
Sep 2013

Of course source code for many compilers is available.
The compiler preinstalled on most linux distros is the GCC compiler, which is an open source compiler.

The CPU is hardware, it does what the kernel tells it to. Not sure how the govt is going to hack that...

The BIOS is software on a chip, it boots the OS. Once it boots the system, the BIOS is done with its job. It's trivial to install new BIOS software.

Depending on your distro, linux can be all open source, from the kernel up. The hardware is not doing anything that it's not told to.

I definitely have control over whether or not my pc is plugged into a network or the internet.

EDIT: There are logic gates and silicon in my cpu.





 

Clown is Down

(63 posts)
51. As a newbie, I would have said you were nutz.
Fri Sep 6, 2013, 01:19 PM
Sep 2013

But since you were probably nutz anyway, I guess my opinion doesn't matter

Thinkingabout

(30,058 posts)
54. Always remember if it can be encrpted, then the encryption can be decrypted. It is all a game,
Fri Sep 6, 2013, 01:43 PM
Sep 2013

if you can spy on a company, person, etc, then they can spy on you. This is something which works two ways. Just like files was stolen from NSA your personal information can be stolen. If you think you are going to be able to destroy NSA by leaking information you are wrong, NSA has the experts and they can and will make the information you are stealing harder to obtain and the punishment will increase.

Thinkingabout

(30,058 posts)
68. can you work faster than high powered computer, why yes, the smart ones at NSA, etc
Fri Sep 6, 2013, 04:24 PM
Sep 2013

Its all in a game and the ones who think they are so smart to think they can out think every one and encrypt where no one else will know are not so smart. It will probably be faster since if the files encrypted is from the same source then it will be easier.

PrestonLocke

(217 posts)
69. There is only so much electricity and computing power available, right now.
Fri Sep 6, 2013, 04:31 PM
Sep 2013

Properly implemented, there are encryption solutions that all the PCs in the world working together would take thousands of years to crack.

Gravitycollapse

(8,155 posts)
84. It's a matter of physical laws, not NSA black magic...
Fri Sep 6, 2013, 05:49 PM
Sep 2013

The NSA is still subject to the limits of our physical realm. They have no ability to avoid the laws of physics. The amount of energy and time needed to brute force decrypt high bit encrypted files is immense. I do not use "immense" lightly here but more so in a cosmological sense as being outside the realm of current human technology. Like fusion reactors and near-light speed vehicles.

Thinkingabout

(30,058 posts)
88. If the encryption is from their files it will probably be broken in short time, remember they
Fri Sep 6, 2013, 06:17 PM
Sep 2013

Analysis many phone call record daily so decoding encrypted files is only a small stepped for them.

Gravitycollapse

(8,155 posts)
92. Uhhh...we are talking about encryption so assume the brute force attack is on that subject.
Fri Sep 6, 2013, 06:33 PM
Sep 2013

What else would you think I'm referring to?

Do you understand the premise of the brute force attack in breaking encryption?

Thinkingabout

(30,058 posts)
96. Brute force was before the computers, like brute force required to build the pyrmaids so there is a
Fri Sep 6, 2013, 07:36 PM
Sep 2013

Difference. Yes there will be a concerted effort to break any encryption, this has been something national security for many years.

Gravitycollapse

(8,155 posts)
98. Okay, so your statements lead me to believe you do not understand a brute force attack.
Fri Sep 6, 2013, 08:03 PM
Sep 2013

Or why it explains how hi bit encryption is nearly impossible to crack.

A brute force attack is an attempt to decrypt by simply trying all possible solutions to the encryption key. In hi bit encryption, the number of possible solutions is massive.

For example, a 256 bit encryption has 2^256 possible solutions. Consider for a moment how many possible solutions that encompasses. Even with collective super computing power, utilizing millions of GPUs, it would take about 3 sexdecillion years (that's 3 with 50 zeros behind it) to attempt all possible solutions.

That's about 200 billion, 1000 trillion, 1000 trillion times the age of the Universe.

Thinkingabout

(30,058 posts)
99. If they had a file in which they already know what the file contains and it is encrpyted then the
Fri Sep 6, 2013, 08:07 PM
Sep 2013

Decoding will be easier and the encryption code would be known.

Gravitycollapse

(8,155 posts)
100. How would they have the encryption key for files they did not themselves generate?
Fri Sep 6, 2013, 08:09 PM
Sep 2013

Assuming the code isn't given to them, which I have excluded from the discussion of a brute force attack, there would be no way for them to know the solution without trying all possible solutions until they get the answer.

Gravitycollapse

(8,155 posts)
103. If the keys are encrypted themselves then that becomes a useless endeavor.
Fri Sep 6, 2013, 08:22 PM
Sep 2013

Especially considering asymmetric keys. You can bury the encryption/decryption keys far enough to where it becomes impractical to attempt to reveal it through spying or hacking. Especially if the computer systems responsible for key generation and storage are "off the grid" of any network connection.

If you unplug your computer from the internet, and shut off any sort of wireless connectivity, you have created an immensely secure system.

Gravitycollapse

(8,155 posts)
105. Your argument is essentially ludicrous.
Fri Sep 6, 2013, 08:34 PM
Sep 2013

Listen, there is a very, very small possibility that I could grab a golf ball, walk out into the road and throw it up into the sky fast enough to achieve escape velocity and the golf ball would fly into space.

Logically, that is a possible outcome as there is a possible world where such an outcome could exist. Physically, even practically, as we only have this possible world that we exist within, it is an impossibility. Do you understand the difference between the logical and physical conclusions?

In a logical argument, not all premises have to be true independently for the conclusion to be valid. Which is why physical impossibilities can exist even in a valid logical chain.

The argument you propose is valid. But it is not possible in the bounds of our physical world. Do you understand what I'm saying?

GoneFishin

(5,217 posts)
57. If a middle level grunt has something an unethical billionaire wants, it will be sold,
Fri Sep 6, 2013, 01:46 PM
Sep 2013

rules and laws be damned.

The NSA databases are ripe for the picking by the rich and powerful.

Blue_Tires

(55,445 posts)
60. Good luck with that
Fri Sep 6, 2013, 02:52 PM
Sep 2013

Skinner would need to create a separate forum just to hold all my "I was right all along" threads....

KoKo

(84,711 posts)
95. yeah...I remember that...and I'm not a techie. But, your posts were always
Fri Sep 6, 2013, 06:47 PM
Sep 2013

a good read and I saw where there were others saying "NO WAY!"

lol's ....you won the day. And, had concerns that panned out!

Latest Discussions»General Discussion»A thread for apologies fr...