Welcome to DU! The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards. Join the community: Create a free account Support DU (and get rid of ads!): Become a Star Member Latest Breaking News General Discussion The DU Lounge All Forums Issue Forums Culture Forums Alliance Forums Region Forums Support Forums Help & Search

Bosonic

(3,746 posts)
Fri Aug 9, 2013, 12:03 PM Aug 2013

German companies to automatically encrypt emails

Source: AP

BERLIN (AP) — Two of Germany's biggest Internet service providers say they will encrypt customers' emails by default following reports that the U.S. National Security Agency monitors international electronic communications.

Deutsche Telekom AG and United Internet AG say emails sent by their customers will be automatically encrypted starting Friday.

Initially the encryption will only be secure between customers of Deutsche Telekom's T-Online service and United Internet's GMX and WEB.DE services.

The companies claim these three providers account for two-thirds of primary email addresses in Germany.

Read more: http://bigstory.ap.org/article/german-companies-automatically-encrypt-emails

36 replies = new reply since forum marked as read
Highlight: NoneDon't highlight anything 5 newestHighlight 5 most recent replies
German companies to automatically encrypt emails (Original Post) Bosonic Aug 2013 OP
Good on them! n/t devils chaplain Aug 2013 #1
I am sure am glad that Cryptoad Aug 2013 #3
It doesn't matter how much they know. A good password can't be decrypted, even by the NSA. n/t devils chaplain Aug 2013 #4
passwords,,,,,, Cryptoad Aug 2013 #7
You are freaking clueless. devils chaplain Aug 2013 #8
Open Source,,,? Cryptoad Aug 2013 #13
Let's see them break Chinese encryption, toad Lugal Zaggesi Aug 2013 #14
one Q,,,,, Cryptoad Aug 2013 #22
Linux n/t Lugal Zaggesi Aug 2013 #23
Most large key encryption techniques rely on mathematical theory FarrenH Aug 2013 #20
such assumption are Cryptoad Aug 2013 #21
So instead of responding to every post FarrenH Aug 2013 #24
Do you believe ,,,, Cryptoad Aug 2013 #26
To be honest I don't understand the question FarrenH Aug 2013 #27
Are you under the impression that all keys are generated by the kernel? FarrenH Aug 2013 #28
What is a good password? ConcernedCanuk Aug 2013 #12
I find "bob1234" works well. Nye Bevan Aug 2013 #15
Bob ? dipsydoodle Aug 2013 #17
ditto dipsydoodle Aug 2013 #9
This message was self-deleted by its author dipsydoodle Aug 2013 #2
Good for Germany. Whether it helps or not they took a stand. snappyturtle Aug 2013 #5
In other news... Javaman Aug 2013 #6
So they are turning on TLS, transport level encryption. Paulie Aug 2013 #10
Germans must free themselves from US occupation Luschnig Aug 2013 #11
Grrr! Snowden! What hath thou wrought!!! nt Bonobo Aug 2013 #16
There will be a HUGE backlash against this spying nightmare usGovOwesUs3Trillion Aug 2013 #18
The backlash will also be economic dipsydoodle Aug 2013 #19
Some of the backlash is an automatic function FarrenH Aug 2013 #25
cool! Egnever Aug 2013 #29
False analogy usGovOwesUs3Trillion Aug 2013 #30
Wait what? Egnever Aug 2013 #31
Yep usGovOwesUs3Trillion Aug 2013 #33
I see Egnever Aug 2013 #35
That was/is an illegal warrant usGovOwesUs3Trillion Aug 2013 #36
Go for it Zorro Aug 2013 #32
Yes, it does usGovOwesUs3Trillion Aug 2013 #34

Cryptoad

(8,254 posts)
7. passwords,,,,,,
Fri Aug 9, 2013, 12:42 PM
Aug 2013

are only needed for access thru the "Front Door".
geeez. I am continuely amazed by the lack of IT knowledge.......

Cryptoad

(8,254 posts)
13. Open Source,,,?
Fri Aug 9, 2013, 03:19 PM
Aug 2013

You really think cause it is open source it is more secure from being decrypted? Seems I am not the one who is clueless? Especially as far as it come encryption and decryption !

 

Lugal Zaggesi

(366 posts)
14. Let's see them break Chinese encryption, toad
Fri Aug 9, 2013, 05:02 PM
Aug 2013

German companies can be pressured by Americans, sure, just like UK poodles. Any country that has to allow American military bases on their soil are biotch-slapped by the shrinking "superpower". See "Japan".

But you won't get squat from the Chinese.
Let's see the NSA brute force decrypt a trillion Chinese emails.

FarrenH

(768 posts)
20. Most large key encryption techniques rely on mathematical theory
Sun Aug 11, 2013, 07:16 AM
Aug 2013

that makes decrypting an intractable mathematical problem without the key. Unless the NSA has overturned complexity theory, how do you see them doing what you claim they can do?

Out of reach of US secret surveillance laws, any hacking would have to involve a man-in-the-middle attack on multiple foreign servers.

FarrenH

(768 posts)
24. So instead of responding to every post
Sun Aug 11, 2013, 11:05 AM
Aug 2013

Last edited Sun Aug 11, 2013, 11:42 AM - Edit history (3)

with statements about the naivity or ignorance of the poster, why not elaborate on the mechanisms you think could easily be exploited to get around it? I'm a programmer and have written encryption code myself. Granted, I'm not a security expert but I have a fairly good understanding of the technology. Don't assume you're talking to people with no technical knowledge. Enlighten me

Bearing in mind, too, that the issue here is mass surveillance involving automatic detection of keywords in large volumes of mail. Arduous processes involving social engineering, et al, are not viable to achieve this even for an organisation with the resources of the NSA.

I'm well aware, for instance, that hackers can target individual computers with keyloggers, et al, or use malware to propagate same, but its relatively easy to guard against simple malware propagation. I can't see that being turned into some kind of reliable, production-line process. I'm not sure how these companies are encrypting mail but since its the provider that's doing it, not end users, I assume the security basics are in place.

Single and detectable hacking instances are not evidence that the process can be industrialized the way the NSA has done in the USA using a combination of technology and privileged access. I know its common cause in the hacking community that anything can be hacked (despite some notable examples of systems that have never been hacked in the face of considerable effort), but having friends who's jobs involved actively responding to breaches at ISPs, I also know that its only a temporary condition for companies that employ skilled staff to actively detect and respond to such breaches. Many former hackers and very good ones at that are employed in the industry.

Being able to breach a system once is not the same as being able to easily sustain an undetected breach for long or even moderate periods of time.

Cryptoad

(8,254 posts)
26. Do you believe ,,,,
Sun Aug 11, 2013, 03:10 PM
Aug 2013

that any OS can be designed that can reproduce any encryption key use by the OS?

FarrenH

(768 posts)
27. To be honest I don't understand the question
Sun Aug 11, 2013, 05:13 PM
Aug 2013

Last edited Sun Aug 11, 2013, 06:16 PM - Edit history (2)

I mean, if the implication is that the hacks can somehow be built into the operating system, then obviously a custom built, hardened installation of Linux circumvents that, and those were SOP at a previous company I worked at which was full of security gurus.

FarrenH

(768 posts)
28. Are you under the impression that all keys are generated by the kernel?
Sun Aug 11, 2013, 06:14 PM
Aug 2013

ssh-keygen is a utility, not part of the kernel. So if you're using that, it's not the "operating system" that is generating the key - or using it. The only other thing I imagine you might be referring to is a backdoor built into the OS by an OS vendor like Microsoft - a backdoor that sniffs application messaging, key presses and so on and transmits that to some outside party.

But this is precisely why the "open-source" aspect of Linux makes it more, not less secure. Anyone who knows what they're doing can pull down the source code and compile a custom build of the OS kernel themselves. This means they can find back doors in the code and close them before compiling.

 

ConcernedCanuk

(13,509 posts)
12. What is a good password?
Fri Aug 9, 2013, 02:26 PM
Aug 2013

.
.
.

mine are words that do not exist, and numbers that have nothing to do with my age or birthdate.

My computer cannot be accessed (I hope), without typing in a password, again,a word that does not exist except to me.

However, my passwords are fairly short, as is my memory.

Does the length of the password make a difference?

I'm thinking it does.

CC

Response to Bosonic (Original post)

Javaman

(62,534 posts)
6. In other news...
Fri Aug 9, 2013, 12:39 PM
Aug 2013

teabaggers ranted and raved today at the German government about them using "big brother" techniques to control people's emails.

one teabagger was quoted as saying, "I want my email free and 'uncrypted' and away from prying eyes!!!"

the reporter on the scene shook his head in bewilderment.

Paulie

(8,462 posts)
10. So they are turning on TLS, transport level encryption.
Fri Aug 9, 2013, 01:35 PM
Aug 2013

The emails themselves will remain unencrypted on the servers. TLS is something but if poorly implemented does little for a man in the middle attack.

 

Luschnig

(32 posts)
11. Germans must free themselves from US occupation
Fri Aug 9, 2013, 01:56 PM
Aug 2013

This is the first step of ridding the county of American domination. Not only have the Americans been snooping on Germans but also the their puppet regime in Berlin has been snooping on Germans to punish them if they have anti-occupation ideas. Encrypting emails is a first step in liberating Germany.

 

usGovOwesUs3Trillion

(2,022 posts)
18. There will be a HUGE backlash against this spying nightmare
Sat Aug 10, 2013, 05:33 PM
Aug 2013

I believe we are heading to a place were everything will be encrypted by default.

That will keep the totalitarians busy for a few million years

dipsydoodle

(42,239 posts)
19. The backlash will also be economic
Sat Aug 10, 2013, 05:58 PM
Aug 2013

That's already started.

On the brightside for the time being at least the trans Atlantic trade agreement will likely be a non starter. Europe needs partners it can trust.

 

Egnever

(21,506 posts)
29. cool!
Sun Aug 11, 2013, 09:01 PM
Aug 2013

Just think of all the pedophiles and other deviants that no longer have to worry about their email.

Damn those totalitarians! Despite the fact you cant point to a single persecuted person.

 

usGovOwesUs3Trillion

(2,022 posts)
33. Yep
Sun Aug 11, 2013, 10:02 PM
Aug 2013

Backed up with probable cause, of course.

Check out the 4th amendment, all details are there.

Then let's talk.

 

usGovOwesUs3Trillion

(2,022 posts)
36. That was/is an illegal warrant
Sun Aug 11, 2013, 10:10 PM
Aug 2013

As it doesn't meet the standard.

Of course it does for the totalitarian privacy PIRATES.

But not to most reasonable people.

 

usGovOwesUs3Trillion

(2,022 posts)
34. Yes, it does
Sun Aug 11, 2013, 10:04 PM
Aug 2013

Content metadata.

Network metadata is like reading the envelope, not as serious as the content.

Huge difference, my friend.

Latest Discussions»Latest Breaking News»German companies to autom...