Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon. Entire thread

NSA has broken most encryption

Name: Anonymous 2013-09-05 18:46

No, really! I'm not just making shit up this time:

http://www.nytimes.com/2013/09/06/us/nsa-foils-much-internet-encryption.html?hp&_r=0

The agency has circumvented or cracked much of the encryption, or digital scrambling, that guards global commerce and banking systems, protects sensitive data like trade secrets and medical records, and automatically secures the e-mails, Web searches, Internet chats and phone calls of Americans and others around the world, the documents show.
I hope you don't have your plots to *redacted* the *redacted* with a *redacted* and your CP stored on Google Drive, no matter how much encryption you applied[i]![/i]

In related news, the NSA stores all encrypted data, "just in case". https://www.techdirt.com/articles/20130620/15390323549/nsa-has-convinced-fisa-court-that-if-your-data-is-encrypted-you-might-be-terrorist-so-itll-hang-onto-your-data.shtml
In other words, if your messages are encrypted, the NSA is keeping them until they can decrypt them. And, furthermore, as we noted earlier, the basic default is that if the NSA isn't sure about anything, it can keep your data.

Name: Anonymous 2013-09-05 18:56

The full extent of the N.S.A.’s decoding capabilities is known only to a limited group of top analysts from the so-called Five Eyes: the N.S.A. and its counterparts in Britain, Canada, Australia and New Zealand. Only they are cleared for the Bullrun program, the successor to one called Manassas — both names of an American Civil War battle. A parallel GCHQ counterencryption program is called Edgehill, named for the first battle of the English Civil War of the 17th century.
What's with the Civil War names?

Name: Anonymous 2013-09-05 18:58

According to an intelligence budget document leaked by Mr. Snowden, the N.S.A. spends more than $250 million a year on its Sigint Enabling Project, which “actively engages the U.S. and foreign IT industries to covertly influence and/or overtly leverage their commercial products’ designs” to make them “exploitable.”
Oh fuck, this explains EVERYTHING.

Name: Anonymous 2013-09-05 19:01

>>2
It's a conspiracy. A redneck conspiracy.

Name: Anonymous 2013-09-05 19:02

>>3
Yeah I don't think they are really doing this respectably (to a cryptographer or hacker). They probably only have the brightest minds in getting companies to give them access.

Name: Anonymous 2013-09-05 19:07

>>5
You realize they are the largest employer of mathematicians in the world, right? The spooks, they are usually pretty good at what they do, which is usually gaining as much power as possible and exploiting everything and everyone to get even more power, and that includes exploiting smart people who would otherwise being doing stuff that would actually benefit society.

Name: Anonymous 2013-09-05 19:11

>>6
SSL is nothing. I doubt they have AES cracked.

Name: Anonymous 2013-09-05 19:11

The whole internet is an NSA program designed to replace telephone and mail communication with digital text-based communication.

Why spend money on developing OCR and voice-recognition when you can just convince the masses to avoid speech and paper in the first place?

Name: Anonymous 2013-09-05 19:22

>>5-7
I think >>3 is more about side channel attacks. Why bother trying to inject flaws in the obvious targets such as the SSL or crypto libraries (which probably hundreds of people have reviewed) when you can instead put buffer overflows in the bulk of the code which nobody really bothers auditing (or isn't even auditable due to its closed source nature)?

Name: Anonymous 2013-09-05 19:24

The agency also expected to gain full unencrypted access to an unnamed major Internet phone call and text service
Pervs

Name: Anonymous 2013-09-05 19:29

https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html
". . . you should worry about a new random-number standard that includes an algorithm that is slow, badly designed and just might contain a backdoor for the National Security Agency."
November 15, 2007
Chalk one up for the tinfoil hats.

Name: Anonymous 2013-09-05 19:39

>>11
Other than the position that they are controlled by grey shapeshifting aliens, have the tinfoil-hatters been wrong?

Name: Anonymous 2013-09-05 19:40

Well, I don't trust any new microprocessor, that's why I do all my crypto using an old 486 with my own homebrew CSPRNG using a geiger counter! it's the only way to go..
https://en.wikipedia.org/wiki/RdRand
http://cryptome.org/2013/07/intel-bed-nsa.htm

Name: Anonymous 2013-09-05 19:42

>>11-12
Time will prove that Internet/computer security is the one field where tinfoil-hatters' claims were far less outrageous than reality itself.

Name: Anonymous 2013-09-05 19:58

>>12
Old white men are the equivalent of grey shapeshifting aliens.

Name: Anonymous 2013-09-05 20:01

>>13
You could use AMD.

Name: Cudder !.0fAIwYvVk 2013-09-05 20:14

>>16
That's slower than the 486.

Name: Anonymous 2013-09-05 20:28

Bitcoin is NSA distributed-computing botnet for the purpose of breaking RSA-1024 AND giving them leverage over the FBI / ATF / ICE by tracking sales of illicit goods across state and international boundaries.

Name: Anonymous 2013-09-05 20:31

>>17
Shalom!

Name: Anonymous 2013-09-05 21:04

I could use any RE'd CPU

Name: Anonymous 2013-09-05 22:27

I'd say we should start work on our own CPU, but I just know one of you fuckers is a plant and will put a backdoor it it.

Name: Anonymous 2013-09-05 22:46

>>21
If it's open source it'll be pretty hard to backdoor it. In any case it's better than just using a closed source CPU from a security standpoint.

Name: Anonymous 2013-09-05 22:48

>>22
b-but t-th-the NSA can do anything!!!!

Name: Anonymous 2013-09-05 23:04

>>22
I don't think there are enough people able to audit physical architecture on anything even approaching a modern unit, not to mention all the other shit that would have to be done.

Name: Anonymous 2013-09-05 23:06

There's really nothing we can do when the government is colluding with corporations. Schneier has written up a good essay [1].

[1]http://www.schneier.com/blog/archives/2013/09/the_nsa_is_brea.html

Name: Anonymous 2013-09-05 23:09

>>24
How complex is it really?

Name: Anonymous 2013-09-05 23:14

>>24
*cough* opencores.net *cough* *cough* homebrewcpu.com *cough* *ughck* *cough* mycpu.eu

What were we talking about? Oh about open schematics hardware? I see. Here is something I found during my hackboard research:
https://en.wikipedia.org/wiki/List_of_single-board_computers

Name: Anonymous 2013-09-05 23:15

>>22
It doesn't have to be overt. It could be a hack that makes it 5000 times faster and use 99% less power, but causes an obscure bug when a second bug in a completely different part of the code is active. There is only a one in a quadrillion chance that something would trigger it on accident would cause it, but it suddenly becomes active when a specially crafted sequence is fed to it.

Then the feds see your Cyberfunk Manifesto and you get killed in a fly-by shooting.

Name: Anonymous 2013-09-05 23:16

>>27
Wow man get that cough checked, you might have the flu.

Name: Anonymous 2013-09-05 23:17

>>25
"I think one of the more surprising revelations in one of your articles today is that you still use Windows for most things. Seriously?!?
How and why?"

Yeah, well.

Name: Anonymous 2013-09-05 23:18

>>27
We are talking about creating our own processor equivalent to modern ones like an Intel Core i7-4960X.

Name: Anonymous 2013-09-05 23:19

I'm working on a TCP/IP stack (in 6502 assembly) for the Super Nintendo. I don't think Nintendo would have let them put a backdoor in it.

Name: Anonymous 2013-09-05 23:24

>>28
and you get killed in a fly-by shooting.

Fuckin cowards. It only works in open areas like the desert. Against retarded goat herders. Even if the area was open the Vietcong would of wiped the floor with us and our stupid drones.

Come on, send one SOG guy to do the assassination. Aren't those guys supposed to be trained for that kind of shit? To be real life supersoldiers? I bet they can do it better than the drones and especially cost much less. Fuckin obama admin technophiles thinking humans are useless. The drones are being built and controlled by humans anyways.

Name: gfys 2013-09-05 23:24

>>27
Nah, I seem to have gotten a case of lackadaisical bronchitis.

Name: Anonymous 2013-09-05 23:30

In a nice jungle, where everything is hot, and wearing under your gear anti-IR technology.

What now, Obama?

Name: youtu.be/vEtlX9yHwo0?t=33s 2013-09-05 23:31

>>34
s/>>27/>>29/
>>31
Then start learn how to make CPUs, and proper VHDL code.
>>32
Nice.
--Uzebox

Name: Anonymous 2013-09-05 23:34

>>33
Drones do something that specials ops can't, and it's much more important: they strike fear into everyone in the area. Any passing object overhead could be ready to rain death from above on a crowd of people.It's pretty hard to smuggle a rawkit launcher around and still remain stealthy, so it limits you to sniper shots. That not only takes skill that can't be replicated with a simple cp sandnigger_murder_program.rom /dev/drone *right click*->copy *right click*->paste, and also has the disadvantage of not blowing anything up. Also, if a drone is shot down, it can't reveal secrets and doesn't count as a casualty, which makes it much more acceptable for a tired public than seeing ever increasing numbers of their children killed to fight a war which has long since lost meaning.

Name: acae-ca.org 2013-09-05 23:35

>>35
We are doing fine.

Name: Anonymous 2013-09-05 23:37

>>35
Napalm the jungle. Agent orange is also acceptable.

>>37
Do strike-throughs not work? ``cp sandnigger_murder_program.rom /dev/drone'' was supposed to be stricken-through.

Name: Anonymous 2013-09-05 23:41

>>27
I didn't mean that creating an open-source CPU and architecture is impossible, just that the critical mass of people with the knowledge and experience of creating modern units and the willingness to do so simply is not out there (and the NSA already knows about all of them). Plus, given the necessity of generating the chips with specialized CAD software, that would have to be open-source and even more rigorously audited.

Newer Posts
Don't change these.
Name: Email:
Entire Thread Thread List