Welcome to DU! The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards. Join the community: Create a free account Support DU (and get rid of ads!): Become a Star Member Latest Breaking News General Discussion The DU Lounge All Forums Issue Forums Culture Forums Alliance Forums Region Forums Support Forums Help & Search

FarrenH

(768 posts)
24. So instead of responding to every post
Sun Aug 11, 2013, 11:05 AM
Aug 2013

Last edited Sun Aug 11, 2013, 11:42 AM - Edit history (3)

with statements about the naivity or ignorance of the poster, why not elaborate on the mechanisms you think could easily be exploited to get around it? I'm a programmer and have written encryption code myself. Granted, I'm not a security expert but I have a fairly good understanding of the technology. Don't assume you're talking to people with no technical knowledge. Enlighten me

Bearing in mind, too, that the issue here is mass surveillance involving automatic detection of keywords in large volumes of mail. Arduous processes involving social engineering, et al, are not viable to achieve this even for an organisation with the resources of the NSA.

I'm well aware, for instance, that hackers can target individual computers with keyloggers, et al, or use malware to propagate same, but its relatively easy to guard against simple malware propagation. I can't see that being turned into some kind of reliable, production-line process. I'm not sure how these companies are encrypting mail but since its the provider that's doing it, not end users, I assume the security basics are in place.

Single and detectable hacking instances are not evidence that the process can be industrialized the way the NSA has done in the USA using a combination of technology and privileged access. I know its common cause in the hacking community that anything can be hacked (despite some notable examples of systems that have never been hacked in the face of considerable effort), but having friends who's jobs involved actively responding to breaches at ISPs, I also know that its only a temporary condition for companies that employ skilled staff to actively detect and respond to such breaches. Many former hackers and very good ones at that are employed in the industry.

Being able to breach a system once is not the same as being able to easily sustain an undetected breach for long or even moderate periods of time.

Good on them! n/t devils chaplain Aug 2013 #1
I am sure am glad that Cryptoad Aug 2013 #3
It doesn't matter how much they know. A good password can't be decrypted, even by the NSA. n/t devils chaplain Aug 2013 #4
passwords,,,,,, Cryptoad Aug 2013 #7
You are freaking clueless. devils chaplain Aug 2013 #8
Open Source,,,? Cryptoad Aug 2013 #13
Let's see them break Chinese encryption, toad Lugal Zaggesi Aug 2013 #14
one Q,,,,, Cryptoad Aug 2013 #22
Linux n/t Lugal Zaggesi Aug 2013 #23
Most large key encryption techniques rely on mathematical theory FarrenH Aug 2013 #20
such assumption are Cryptoad Aug 2013 #21
So instead of responding to every post FarrenH Aug 2013 #24
Do you believe ,,,, Cryptoad Aug 2013 #26
To be honest I don't understand the question FarrenH Aug 2013 #27
Are you under the impression that all keys are generated by the kernel? FarrenH Aug 2013 #28
What is a good password? ConcernedCanuk Aug 2013 #12
I find "bob1234" works well. Nye Bevan Aug 2013 #15
Bob ? dipsydoodle Aug 2013 #17
ditto dipsydoodle Aug 2013 #9
This message was self-deleted by its author dipsydoodle Aug 2013 #2
Good for Germany. Whether it helps or not they took a stand. snappyturtle Aug 2013 #5
In other news... Javaman Aug 2013 #6
So they are turning on TLS, transport level encryption. Paulie Aug 2013 #10
Germans must free themselves from US occupation Luschnig Aug 2013 #11
Grrr! Snowden! What hath thou wrought!!! nt Bonobo Aug 2013 #16
There will be a HUGE backlash against this spying nightmare usGovOwesUs3Trillion Aug 2013 #18
The backlash will also be economic dipsydoodle Aug 2013 #19
Some of the backlash is an automatic function FarrenH Aug 2013 #25
cool! Egnever Aug 2013 #29
False analogy usGovOwesUs3Trillion Aug 2013 #30
Wait what? Egnever Aug 2013 #31
Yep usGovOwesUs3Trillion Aug 2013 #33
I see Egnever Aug 2013 #35
That was/is an illegal warrant usGovOwesUs3Trillion Aug 2013 #36
Go for it Zorro Aug 2013 #32
Yes, it does usGovOwesUs3Trillion Aug 2013 #34
Latest Discussions»Latest Breaking News»German companies to autom...»Reply #24