Welcome to DU! The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards. Join the community: Create a free account Support DU (and get rid of ads!): Become a Star Member Latest Breaking News General Discussion The DU Lounge All Forums Issue Forums Culture Forums Alliance Forums Region Forums Support Forums Help & Search

Luminous Animal

(27,310 posts)
Mon Aug 26, 2013, 12:21 PM Aug 2013

Greenwald interview: NSA cannot break the code on Miranda's thumb drives.

JF: [ed. note: Miranda was apparently carrying large amounts of encrypted documents and communications when stopped in Heathrow.] Why are you so confidant the world’s best code breakers can’t break the encryption in [Miranda’s] seized computers?

GG: Because I have read the documents of the world’s best code breakers, and they have talked about their inability to crack certain types of encryption.

JF: How do you think history will remember this whole affair? It is still unfolding but nonetheless, a lot has already gone down. What is Glenn Greenwald’s prediction on the historic legacy of all this?

GG: I think this will be the time the world realizes that the US and its closest allies are trying to build a surveillance system that has as its primary objective the elimination of privacy globally, by which I mean that everyone’s communications electronically will be collected, stored, analyzed and monitored by the US government.
I think it will be seen as the moment that the United States showed its true face to the world in terms of attacks on journalism and their desire to punish anyone who brings transparency.

JF: What precautions would you give to the average internet user vis-a-vis encryption?

GG: I think encryption is vital; I hope that people will use encryption in every way possible. It helps prevent intervening in their private communications, and they should definitely start using encryption.

http://truth-out.org/news/item/18402-i-wont-be-kept-out-of-my-country-for-doing-journalism-exclusive-glenn-greenwald-truthout-interview
203 replies = new reply since forum marked as read
Highlight: NoneDon't highlight anything 5 newestHighlight 5 most recent replies
Greenwald interview: NSA cannot break the code on Miranda's thumb drives. (Original Post) Luminous Animal Aug 2013 OP
Hahahahaha, that is funny. riqster Aug 2013 #1
Even if the NSA is able to break Strong Encryption formercia Aug 2013 #3
Anybody can break any encryption given time and resources. riqster Aug 2013 #4
Well, he's such a computer expert. He knows everything Laura taught him. nt pnwmom Aug 2013 #9
In cryptography, we usually don't call exhaustive key searching "breaking" Recursion Aug 2013 #10
Just using a common term formercia Aug 2013 #42
They aren't impervious to quantum decryption Shivering Jemmy Aug 2013 #96
#1 reason to think that they don't? Aerows Aug 2013 #99
Sure. Get back to us after the few millenia it takes to crack AES-256. EOTE Aug 2013 #14
sorry but never say never... VanillaRhapsody Aug 2013 #40
Unless there is a math breakthrough Paulie Aug 2013 #51
Math processing is the issue...not math VanillaRhapsody Aug 2013 #64
Let's assume that Moore's law remains constant another 20 years (it most likely won't). EOTE Aug 2013 #82
still not good enough.... VanillaRhapsody Aug 2013 #85
You're right, Moore's Law IS no judge. EOTE Aug 2013 #95
there will be.....believe that! VanillaRhapsody Aug 2013 #97
There will be Aerows Aug 2013 #100
IRC has been around since I started...long before the WWW even existed! VanillaRhapsody Aug 2013 #103
I've been here on the WWW for nearly 25 years. Aerows Aug 2013 #105
LOL, me too. I miss the old modem noise. It seemed so cool. When I got a cable modem I thought I.... Logical Aug 2013 #153
I will never ever take it for granted Aerows Aug 2013 #188
I bet. n-t Logical Aug 2013 #192
I think I've griped and moaned Aerows Aug 2013 #193
I know how much I take for granted..... Logical Aug 2013 #194
I will never take running water Aerows Aug 2013 #195
So have I.... VanillaRhapsody Aug 2013 #164
Well, you are really wrong on this. But I love the confidence. n-t Logical Aug 2013 #154
" Just ask the folks that sold the framework for Windows to Bill Gates"? What the hell.... Logical Aug 2013 #152
I wondered. Aerows Aug 2013 #187
I'm going to wave, too Aerows Aug 2013 #120
"...given time and resources..." - Not exactly a true statement. Gravitycollapse Aug 2013 #160
"The full actual computation - checking each key to see if you have found a solution" Aerows Aug 2013 #175
Cool that you thought about it and explained it like I did. Aerows Aug 2013 #177
What information do you have that some of the world's smartest security experts don't? EOTE Aug 2013 #5
Assign a key to every atom in the universe Recursion Aug 2013 #8
I guess we'd need to use more than one universe. nt EOTE Aug 2013 #16
Quantum Shmantum Recursion Aug 2013 #19
Well there's a bs claim Egnever Aug 2013 #128
"We discovered Aerows Aug 2013 #136
We've got some pretty good upper and lower bounds Recursion Aug 2013 #156
Nothing is "crack proof". As you yourself say, riqster Aug 2013 #11
It IS currently crackproof. EOTE Aug 2013 #13
A "matter of time" Aerows Aug 2013 #25
No back door to public key encryption. longship Aug 2013 #45
Every mathematician and every CS geek Aerows Aug 2013 #47
Correct. longship Aug 2013 #61
We're on the same page Aerows Aug 2013 #65
Minor correction. DanTex Aug 2013 #123
Granted. longship Aug 2013 #125
I wouldn't be much of a math nerd if I didn't nitpick about technicalities... DanTex Aug 2013 #129
Me neither. longship Aug 2013 #132
None of us would be Aerows Aug 2013 #134
This message was self-deleted by its author Aerows Aug 2013 #170
Try this one Aerows Aug 2013 #88
As of 2011, the top 10 uncrakced codes and/or cyphers are; greiner3 Aug 2013 #89
Interesting, thanks for posting. n-t Logical Aug 2013 #155
Nobody's even sure if the Voynich manuscript is actually a code Recursion Aug 2013 #157
And it isn't like that hasn't happened before Aerows Aug 2013 #173
You rarely need to brute force the entire keyspace to crack AES-256 Xithras Aug 2013 #54
Rainbow tables and arrays Aerows Aug 2013 #57
Yes, salting can be an effective countermeasure. Xithras Aug 2013 #70
We aren't talking about average users in this case, though Aerows Aug 2013 #71
Most strong passwords WOULD look like that. EOTE Aug 2013 #59
Put in a key within the password Aerows Aug 2013 #69
Doesn't include gibberish words that only the encryptor remembers. Leopolds Ghost Aug 2013 #130
Except often the passcode you type in just unlocks the actual key Recursion Aug 2013 #161
In the weeds Aerows Aug 2013 #167
If it's a big enough keyspace, he's right Recursion Aug 2013 #6
But one does not have to try an infinite number of combinations riqster Aug 2013 #15
Model it as a Bernoulli process Recursion Aug 2013 #18
I believe he is thinking intelligent algorithms Aerows Aug 2013 #26
Thats supposing you don't hit it on the 1,210th try thru dumb luck, lol. Erose999 Aug 2013 #31
Sure, you could even hit it on the first try. EOTE Aug 2013 #34
I appreciate your input on this hueymahl Aug 2013 #38
Sure thing, any time. EOTE Aug 2013 #83
Do the odds change creeksneakers2 Aug 2013 #67
That relies on the random element of the human beings doing encryption Aerows Aug 2013 #117
No Recursion Aug 2013 #158
And if you pad it, too Aerows Aug 2013 #171
Greenwald is seriously ate up railsback Aug 2013 #2
I'm not sure about your definition of "ate up" but if you believe Aerows Aug 2013 #178
Do you really think those massive buildings going up are to house hard drives? railsback Aug 2013 #179
I think there is amateur hour, and then there is Aerows Aug 2013 #180
Ah, so you have no idea what a D-Wave is railsback Aug 2013 #181
I have no need to prove myself. Aerows Aug 2013 #182
Good Gawd railsback Aug 2013 #184
So, Tim Tebow, are you? Aerows Aug 2013 #185
toot! railsback Aug 2013 #189
Get him to write the encryption codes beneath... Aerows Aug 2013 #191
If it's encrypted with 256-bit AES, they can't Spider Jerusalem Aug 2013 #7
And twofish and blowfish take even longer Recursion Aug 2013 #12
The Trusted Platform Module handles Keys up to 2048 bits. formercia Aug 2013 #48
Yada Yada Yada, what the hell, since the files was stolen from NSA who would they think would not be Thinkingabout Aug 2013 #17
No, he probably just used openssl Recursion Aug 2013 #20
You mistake encryption after the fact Aerows Aug 2013 #27
Are you kidding me? They know every key stroke Snowden made while her husband as at NSA, they Thinkingabout Aug 2013 #72
I believed that up until the 3rd press conference. Aerows Aug 2013 #77
Since i have not seen frequent news reports out of the NSA in the years they have been in operation Thinkingabout Aug 2013 #94
You mistake me Aerows Aug 2013 #98
Yes I know about the mountain out of a mole hill but an ant hill but a regular ant hill is smaller Thinkingabout Aug 2013 #102
I guess you aren't familiar with fire-ant hills Aerows Aug 2013 #109
Guess I am familiar with fire ant hills, are you familiar with common red a t hills. Which is Thinkingabout Aug 2013 #110
Where are you from with red ants that don't sting? Aerows Aug 2013 #112
I was referring to the size of the ant hills, the common red ant hill is small and shallow, Thinkingabout Aug 2013 #113
Like this? Aerows Aug 2013 #114
would you say the common ant hill is larger or smaller than fire ant hill? Thinkingabout Aug 2013 #118
I'm asking if that is a common ant hill Aerows Aug 2013 #119
Not in my area but this is a classic example of making a mountain out of an ant hill. Thinkingabout Aug 2013 #124
What is your area, which Indian province do you hale from, sir? Aerows Aug 2013 #126
That doesn't look like a red imported fire ant hill. Jamastiene Aug 2013 #145
Imported Aerows Aug 2013 #146
North Carolina Jamastiene Aug 2013 #147
I'm in the Deep South Aerows Aug 2013 #148
Ouch! Jamastiene Aug 2013 #149
It's either sand or dark earth where I am on the coast Aerows Aug 2013 #150
I see. Jamastiene Aug 2013 #159
I'd show you pictures of what it looked like after Katrina Aerows Aug 2013 #183
And wait a second... here Aerows Aug 2013 #104
That would be an autocorrect not intended, you know sorta like a typo. Thinkingabout Aug 2013 #107
Where did the "husband" come in? Aerows Aug 2013 #108
It was changed by auto correct, i did not type husband. Thinkingabout Aug 2013 #111
Memo to NSA: Snowden copied the files. You already have them. You don't need to break a code. Tierra_y_Libertad Aug 2013 #21
Broken code to be used in the future. Thinkingabout Aug 2013 #22
Actually if they want to know which ones are on the disk, they do. n/t hootinholler Aug 2013 #23
So they can run a spellcheck on them before some whistle blower relaeases them? Tierra_y_Libertad Aug 2013 #24
No, for reverse engineering Aerows Aug 2013 #35
I'm sure he got as much as possible and has the non-relevant stuff safely stashed away somewhere Leopolds Ghost Aug 2013 #138
Me too, but I was trying to make it Aerows Aug 2013 #140
I don't claim to know much Leopolds Ghost Aug 2013 #142
Hey, you! NYC_SKP Aug 2013 #166
Hi NYC SKP! Leopolds Ghost Aug 2013 #176
If I were Snowden et. al Aerows Aug 2013 #29
We need more whistle blowers and hackers to help the NSA check and edit their files. Tierra_y_Libertad Aug 2013 #36
That's kind of the beauty of doing it that way Aerows Aug 2013 #37
Which they desperately want to know Aerows Aug 2013 #39
You mean the thread I started Friday was castigated by the usual suspects hootinholler Aug 2013 #46
Precisely :) Aerows Aug 2013 #49
Like! Vanje Aug 2013 #141
Thank you for all your input on this thread. Luminous Animal Aug 2013 #116
shhh... they are having fun. Warren Stupidity Aug 2013 #106
The NSA is thumbscrewed Blue Owl Aug 2013 #28
I am surprised they would be trying to break any codes. Rex Aug 2013 #30
Sure, someone out there has the encryption key Rstrstx Aug 2013 #41
So is Davey Jones locker. Rex Aug 2013 #43
According to the encryption experts on here Rstrstx Aug 2013 #50
There is always the easiest brute-force method Aerows Aug 2013 #53
Well if the NSA knows exactly what was stolen Rex Aug 2013 #56
They don't Aerows Aug 2013 #186
I can't help but wonder... Ohio Joe Aug 2013 #32
Thank you king-clown of FUD. tridim Aug 2013 #33
If I were the NSA Aerows Aug 2013 #44
Ubiquitous crypto is the NSA 's greatest fear. backscatter712 Aug 2013 #52
That's pretty cool Puzzledtraveller Aug 2013 #174
Rubber-hose Cryptanalysis Aerows Aug 2013 #55
When rubber hose cryptanalysis becomes common, the NSA will truly be the American Gestapo. n/t backscatter712 Aug 2013 #66
I am curious, these Snowden/Greenwald haters here seem upset that they came out with this! Dustlawyer Aug 2013 #58
Thank you, Dustlawyer. Who are these people who are trying to smear GG truth2power Aug 2013 #75
I hope they're not NSA Vanje Aug 2013 #143
"Most all of them seem to be playing the part of Dim-wits." NealK Aug 2013 #165
This warms my heart!!... truth2power Aug 2013 #60
Gonna be real pissed off when he finds out Snowden's key is QWERTY AngryAmish Aug 2013 #62
He's not dumb, you know. I'll bet he used DVORAK instead. :) DisgustipatedinCA Aug 2013 #92
Teh password is always SWORDFISH. Leopolds Ghost Aug 2013 #133
Why does GG say stuff like this: War Horse Aug 2013 #63
why? madrchsod Aug 2013 #79
"Because greenwald is in it for the fame and fortune." War Horse Aug 2013 #84
Uh, I'm here to debate you for the "fame" and "fortune" and I'm related to neither. Aerows Aug 2013 #137
"by which I mean that everyone’s communications electronically will be collected, stored, analyzed deurbano Aug 2013 #90
Those kinds of words are perfect chum for the gullible. Whisp Aug 2013 #93
Because this s such hyperbole nadinbrzezinski Aug 2013 #101
now that`s the funniest thing i`ve read in a long time madrchsod Aug 2013 #68
I disagree with Mr. Greenwald re:encryption saidsimplesimon Aug 2013 #73
I disagree with Mr. Greenwald re:encryption saidsimplesimon Aug 2013 #74
Why are these files encrypted anyway? Aren't they supposed to be leaked and released? arcane1 Aug 2013 #76
They don't want the particular spy agencies and politicians Aerows Aug 2013 #80
Then what's the point of taking the info in the first place? That's what I don't get... arcane1 Aug 2013 #86
Some of it probably has to be parsed through Aerows Aug 2013 #87
In that case, it sounds like Greenwald and Snowden also don't know what they have. arcane1 Aug 2013 #151
Why does that give you "kicks"? Recursion Aug 2013 #163
When my elected government lies to me Aerows Aug 2013 #190
But the claim was the *purpose* of the gradual releases was to get them to lie Recursion Aug 2013 #196
So you agree they lied? Aerows Aug 2013 #197
Who? When? Recursion Aug 2013 #198
I'll just leave this post to stand by itself. Aerows Aug 2013 #199
The Guardian, the Washington Post, Der Spiegal, and the NY Times are not done with Luminous Animal Aug 2013 #115
Yes there is Aerows Aug 2013 #131
So the point is "feeling more powerful than politicians" rather than "the truth"? Recursion Aug 2013 #162
I disagree with Mr. Greenwald re:encryption saidsimplesimon Aug 2013 #78
No one Aerows Aug 2013 #121
If they do break it.... blackspade Aug 2013 #81
This message was self-deleted by its author DevonRex Aug 2013 #91
Wouldn't it just be a total hoot if the only thing on the thumb drives was Zorra Aug 2013 #122
I would think it was extraneous data. Aerows Aug 2013 #127
I'm a bit unclear why Greenwald is relying on thumb drives in the first place to get data to point B Leopolds Ghost Aug 2013 #135
There's a simpler way, and the NSA knows it... jmowreader Aug 2013 #139
In 2013... Leopolds Ghost Aug 2013 #144
Which is why they are so desperate to get their hands on him. Aerows Aug 2013 #168
One thing to remember Aerows Aug 2013 #169
FBI, NSA, et al could'nt even crack this Puzzledtraveller Aug 2013 #172
Kick... SidDithers Aug 2013 #200
Ain't that the truth! nt Andy823 Aug 2013 #201
Nope. The UK is pulling your strings. dkf Aug 2013 #202
Well...unless your husband is such a dumbass he carries the password on paper jmowreader Aug 2013 #203

formercia

(18,479 posts)
3. Even if the NSA is able to break Strong Encryption
Mon Aug 26, 2013, 12:52 PM
Aug 2013

it will take Time and Assets to do so, thus the NSA will have to focus on important targets, rather than wasting Time with Bulk Collection.

riqster

(13,986 posts)
4. Anybody can break any encryption given time and resources.
Mon Aug 26, 2013, 12:55 PM
Aug 2013

Now, had he said "It will take them a long time to break....", he'd not have been talking out of a suboptimal orifice.

But he said what he said.

Recursion

(56,582 posts)
10. In cryptography, we usually don't call exhaustive key searching "breaking"
Mon Aug 26, 2013, 01:01 PM
Aug 2013

I mean, just forcing your way through the keyspace isn't really "breaking" the cipher (for one thing, you never really "know" you've done it if that's all you're doing); breaking it is about finding bit correlations, which (thanks to the NSA, ironically enough) we have ciphers that are impervious to.

formercia

(18,479 posts)
42. Just using a common term
Mon Aug 26, 2013, 02:17 PM
Aug 2013

I think most people get the point. Sometimes it's better not to be so smart.

Shivering Jemmy

(900 posts)
96. They aren't impervious to quantum decryption
Mon Aug 26, 2013, 03:56 PM
Aug 2013

And there is reason to think the NSA has some hardware that can do this.

 

Aerows

(39,961 posts)
99. #1 reason to think that they don't?
Mon Aug 26, 2013, 04:04 PM
Aug 2013

They have had three tries to get out in front of it, but instead, failed miserably by being shown as telling untruths to the American people.

EOTE

(13,409 posts)
14. Sure. Get back to us after the few millenia it takes to crack AES-256.
Mon Aug 26, 2013, 01:05 PM
Aug 2013

Considering that there is no possibility it could be cracked in his lifetime or even his great-great-great-great-great-great-grandson's life, it's a pretty safe bet that GG said it "can't" be broken, rather than for it to take a very long time to break.

 

VanillaRhapsody

(21,115 posts)
40. sorry but never say never...
Mon Aug 26, 2013, 02:11 PM
Aug 2013

in my lifetime computers have gone from room size to palm size...

Just sayin'

 

VanillaRhapsody

(21,115 posts)
64. Math processing is the issue...not math
Mon Aug 26, 2013, 02:41 PM
Aug 2013

processing speeds have dramatically increased in the years (since the mid 80's) that I have been on computers and the Internet. You cannot even fathom what even 20 yrs of technology will bring.

EOTE

(13,409 posts)
82. Let's assume that Moore's law remains constant another 20 years (it most likely won't).
Mon Aug 26, 2013, 03:13 PM
Aug 2013

That means that we'll have another 13 or so periods where potential processing power will double (240 months/18 months). That means that potential processing power will be about 8192 times greater than it is today. All that means is that AES 256 could potentially be cracked within a few millenia rather than a few million years using some of the best technology of the day. Using conventional computing methods, we are extremely far away from breaking AES 256. Now, if we see some breakthroughs in Quantum Computing in the next few decades, machines like that might come quite a bit closer.

 

VanillaRhapsody

(21,115 posts)
85. still not good enough....
Mon Aug 26, 2013, 03:22 PM
Aug 2013

you cannot even grok what it will be and Moore's Law is no judge. Just ask the folks that sold the framework for Windows to Bill Gates. Who could have guessed?

EOTE

(13,409 posts)
95. You're right, Moore's Law IS no judge.
Mon Aug 26, 2013, 03:53 PM
Aug 2013

Moore's Law has recently been proven to be too optimistic, processors haven't been keeping pace. Again, barring some massive quantum leap in processing power (such as large scale quantum computing), AES 256 won't be crackable for a very long time. As it stands, no one needs to worry about the NSA accessing their documents if they're encrypted using AES 256.

 

Aerows

(39,961 posts)
105. I've been here on the WWW for nearly 25 years.
Mon Aug 26, 2013, 04:20 PM
Aug 2013

It will be here long after I am not. I was here when I got an upgrade for my 2400 baud modem to a 14400 and thought I was godlike.

 

Logical

(22,457 posts)
153. LOL, me too. I miss the old modem noise. It seemed so cool. When I got a cable modem I thought I....
Mon Aug 26, 2013, 10:23 PM
Aug 2013

was in heaven.

 

Aerows

(39,961 posts)
188. I will never ever take it for granted
Tue Aug 27, 2013, 08:02 PM
Aug 2013

when Katrina blew in and destroyed all the infrastructure for months, it was a wake up call. I have a back up for back ups, these days.

 

Aerows

(39,961 posts)
193. I think I've griped and moaned
Tue Aug 27, 2013, 09:09 PM
Aug 2013

in every way possible about how horrible it was, but it taught me some things.

And I *still* wouldn't want to go through it despite what it taught me because it sucked ass for weeks on end. I was thrilled when I got my first taste of Taco Bell 5 months after the storm hit, and I still had to go 30 miles to get it. That's how bad it sucked.

When you realize how damn much you love milk, can't get it except in tiny quantities, that's pretty much when you know how bad it sucked.

When you celebrate that you can finally flush a toilet? It's like Christmas and you run around flushing all of them just because YOU CAN. That's how you know it sucked.

 

Logical

(22,457 posts)
194. I know how much I take for granted.....
Tue Aug 27, 2013, 09:15 PM
Aug 2013

and have never lost it. I can imagine how eye opening it must be.

 

Aerows

(39,961 posts)
195. I will never take running water
Tue Aug 27, 2013, 09:20 PM
Aug 2013

and flushing a toilet for granted -ever- again.

But I'm also steel-spined enough to actually ride out a disaster, all that comes with it and rebuild, while bitching about it incessantly.

 

VanillaRhapsody

(21,115 posts)
164. So have I....
Tue Aug 27, 2013, 12:00 AM
Aug 2013

900 baud in fact...I was one of damn few females with the hobby back then....

could we even think then that such powerful computer processors would be in the very pockets of most people as they are now?

 

Logical

(22,457 posts)
152. " Just ask the folks that sold the framework for Windows to Bill Gates"? What the hell....
Mon Aug 26, 2013, 10:21 PM
Aug 2013

does that mean?

 

Aerows

(39,961 posts)
187. I wondered.
Tue Aug 27, 2013, 08:00 PM
Aug 2013

I didn't take too much time trying to figure it out, but if you get an answer that is intelligible, let me know LOL.

 

Aerows

(39,961 posts)
120. I'm going to wave, too
Mon Aug 26, 2013, 05:40 PM
Aug 2013
get back to me when you have the computing power of a star, sitting in a black hole vacuum to cool it.

Gravitycollapse

(8,155 posts)
160. "...given time and resources..." - Not exactly a true statement.
Mon Aug 26, 2013, 11:34 PM
Aug 2013
http://en.wikipedia.org/wiki/Landauer%27s_principle

http://en.wikipedia.org/wiki/Brute-force_attack#Theoretical_limits

There is a physical argument that a 128-bit symmetric key is computationally secure against brute-force attack. The so-called Landauer limit implied by the laws of physics sets a lower limit on the energy required to perform a computation of kT · ln 2 per bit erased in a computation, where T is the temperature of the computing device in kelvins, k is the Boltzmann constant, and the natural logarithm of 2 is about 0.693. No irreversible computing device can use less energy than this, even in principle.[2] Thus, in order to simply flip through the possible values for a 128-bit symmetric key (ignoring doing the actual computing to check it) would theoretically require 2128 − 1 bit flips on a conventional processor. If it is assumed that the calculation occurs near room temperature (~300 K) the Von Neumann-Landauer Limit can be applied to estimate the energy required as ~1018 joules, which is equivalent to consuming 30 gigawatts of power for one year. This is equal to 30×109 W×365×24×3600 s = 9.46×1017 J or 262.7 TWh (more than 1/100th of the world energy production).[citation needed] The full actual computation – checking each key to see if you have found a solution – would consume many times this amount.
 

Aerows

(39,961 posts)
175. "The full actual computation - checking each key to see if you have found a solution"
Tue Aug 27, 2013, 01:30 PM
Aug 2013

Would definitely take many more times that amount, because it doesn't take into account necessary maintenance of the machine, downtime due to excessive heat, and backup to store the keys that were non-functional while the machine was down for necessary maintenance.

I love efficient hardware probably more than is healthy, but even in the best case scenario, you have to always add at least 5% downtime/suboptimal functionality to any box on the planet at BEST. That's provided that there never is a hardware failure or a power interruption. Or that you need to move it somewhere in it's 20 year life span. Or that it's rack needs to be re adjusted. Or that it's switching interface died. Or that it got too cold one day in the server room, or too hot.

All of that shit happens.

 

Aerows

(39,961 posts)
177. Cool that you thought about it and explained it like I did.
Tue Aug 27, 2013, 07:17 PM
Aug 2013

There are some things that it takes about 10 people to explain so that people GET IT. Particularly when they are invested in not understanding and not getting it as a function of their profession.

EOTE

(13,409 posts)
5. What information do you have that some of the world's smartest security experts don't?
Mon Aug 26, 2013, 12:56 PM
Aug 2013

AES-192 and AES-256 will remain pretty much crack proof for a rather long time to come. 2^256 is an almost incomprehensibly large number.

Recursion

(56,582 posts)
8. Assign a key to every atom in the universe
Mon Aug 26, 2013, 12:59 PM
Aug 2013

And you still are talking about maybe 1/3rd of the keyspace

EOTE

(13,409 posts)
13. It IS currently crackproof.
Mon Aug 26, 2013, 01:02 PM
Aug 2013

All of the worlds computers could be working in concert and it would STILL take thousands of years to crack AES-256. So, for all intents and purposes, it IS uncrackable.

 

Aerows

(39,961 posts)
25. A "matter of time"
Mon Aug 26, 2013, 01:46 PM
Aug 2013

is rather relative. If there is no back door to AES-256 encryption, which is highly unlikely but could be possible as a very long shot, breaking it even with GPU's, which far eclipse CPU's in parallel processing necessary to brute force a key, you are looking at maybe your children's children getting it. And that's with intelligent algorithms and Moore's law on GPU's.

longship

(40,416 posts)
45. No back door to public key encryption.
Mon Aug 26, 2013, 02:17 PM
Aug 2013

The mathematics is well known and actually kind of simple.

It depends on mathematical functions that are one way, lacking an analytical solution to the inverse function except for exhaustive search.

If the key space is large enough there is not enough computer resources on the planet to crack the code in any reasonable amount of time.

Since the mathematics is fairly simple, usually depending on the product of very large prime numbers -- finding prime factors is not analytically solvable, the algorithms are fairly simple as well. The security is inherent because the functions are designed to be one way trap doors.

Many encryption programs are released in open source which cannot credibly be claimed has back doors. If there were the hundreds of programmers all over the world working on these programs would be aware of it. If you believe there are back doors, get the source code yourself and point it out.

And No! Strong encryption -- available on any home computer -- is not crackable either. So, it's secure.

 

Aerows

(39,961 posts)
47. Every mathematician and every CS geek
Mon Aug 26, 2013, 02:21 PM
Aug 2013

has searched for one, and as I said, it's a very long shot. I should have said to the nearest black hole long shot.

I've inspected and compiled the source, and like you, I know there isn't. I always leave the door open for the possible, no matter how out of this world improbable it is.

Practically speaking, though, I agree.

longship

(40,416 posts)
61. Correct.
Mon Aug 26, 2013, 02:38 PM
Aug 2013

It would be easier to find security holes in the protocols than sneak in a back door. But as you point out, CS majors and such are ever tightening up those protocols and eliminating those holes.

In short, I am pretty damned sure that strong encryption is fairly impervious to systematic attacks. The math isn't that complex; it's number theory after all. (Integer arithmetic, for those who don't know.) It works because things like factoring very large numbers has no analytic solution.

 

Aerows

(39,961 posts)
65. We're on the same page
Mon Aug 26, 2013, 02:42 PM
Aug 2013

If it could have been done, it would have been done long ago, and protocol exploits to get to the machine data storehouse that has the clear data is far easier than cracking it once it gets anywhere.

DanTex

(20,709 posts)
123. Minor correction.
Mon Aug 26, 2013, 06:02 PM
Aug 2013

It's true that there is currently no efficient factoring algorithm, and it is probably true that there will never be one, at least until quantum computers become workable.

However, there is no proof that factoring can't be solved efficiently. The only "proof" is that people have been trying to find an algorithm for ages and haven't been able to. Then again, people have also been trying for ages to prove that factoring can't be solved efficiently, and they haven't been able to do that either.

Still, I agree with you. For practical purposes, public key encryption is unbreakable.

longship

(40,416 posts)
125. Granted.
Mon Aug 26, 2013, 07:00 PM
Aug 2013

But as you point out, there's no reason to expect that such a reverse solution exists. And that's exactly why these particular algorithms are chosen for implementing the trap door.

But I stand corrected. You are of course correct.

I grovel at your feet and beg forgiveness.



longship

(40,416 posts)
132. Me neither.
Mon Aug 26, 2013, 07:51 PM
Aug 2013

But as a former math teacher I understand people's resistance. I dumb things down a bit to make it easier while still getting the point across.

But sometimes pedantry is called for. It certainly isn't objectionable.

 

Aerows

(39,961 posts)
134. None of us would be
Mon Aug 26, 2013, 07:58 PM
Aug 2013
Math nerds aren't the most efficient of folk, but we are the most explicit of folk, and do expend our resources.

Response to DanTex (Reply #123)

 

Aerows

(39,961 posts)
88. Try this one
Mon Aug 26, 2013, 03:35 PM
Aug 2013

The!quick@brown#fox$jumps%over^the&lazy*dog(

Easiest sentence in the world to remember, as are the spacers. You just have to know what those spacers are and that sentence is.

 

greiner3

(5,214 posts)
89. As of 2011, the top 10 uncrakced codes and/or cyphers are;
Mon Aug 26, 2013, 03:35 PM
Aug 2013

" 1. The Phaistos Disk is considered the most important example of hieroglyphic inscription from Crete. Discovered in 1903, both sides of the clay disc are covered with hieroglyphs arranged in a spiral zone, impressed on the clay when it was damp. Forty five different types of signs have been distinguished, of which a few can be identified with the hieroglyphs in use in the Proto- palatial period.

2. Linear A is one of two linear scripts used in ancient Crete discovered and named by Arthur Evans. Linear B was deciphered in 1952 by Michael Ventris and was used to write Mycenaean Greek. Linear A is partially understood but parts of it produce works unrelated to any known language.

3. Kryptos is a sculpture by the American artist James Sanborn, located on the grounds of the Central Intelligence Agency in Langley, Virginia. Since its dedication in 1990, there has been much speculation about the meaning of the encrypted messages it bears.

4. Chinese Gold Bar Cipher. In 1933, seven gold bars allegedly issued to a General Wang in Shanghai, China. These gold bars, which contain pictures, Chinese writing, some form of script writing, and cryptograms in Latin letters, appear to represent metal certificates related to a bank deposit with a U.S. Bank and the Chinese writing has been translated, and discusses a transaction in excess of $300,000,000."

http://www.telegraph.co.uk/news/newstopics/howaboutthat/8293375/Top-10-uncracked-codes.html

Alan Turing allegedly built the first computer in order to break the German's code used in WWII recently made famous in the movie U-571.

If the Germans had not been so methodical, the code may never have been broken, but hooray for our side, there was this one lapse of anal retentiveness.

Recursion

(56,582 posts)
157. Nobody's even sure if the Voynich manuscript is actually a code
Mon Aug 26, 2013, 11:26 PM
Aug 2013

Some people think it's just complete gibberish written by a quack to impress his patients.

 

Aerows

(39,961 posts)
173. And it isn't like that hasn't happened before
Tue Aug 27, 2013, 11:54 AM
Aug 2013

in history. But typically, when people go to extremes to ensure data, it usually has high-value.

At this point, anyone claiming that Snowden does not possess high-value data is an idiot, naive, or both.

Xithras

(16,191 posts)
54. You rarely need to brute force the entire keyspace to crack AES-256
Mon Aug 26, 2013, 02:29 PM
Aug 2013

A dictionary attack using all known words in common languages, including all possible spelling variations (including l33t), word combinations, capitalization variations, injected numbers, potential reversals, etc., etc., will break 95% of encrypted documents using a key count in the tens of billions. That still sounds like an incredibly large number, but the NSA has the equipment to crack that relatively quickly.

256-bit AES is only "uncrackable" if your password looks like this:
6D4;502e44412e33694@3a445d752G53225c2^7e3821274a4E5d5e7d70+

A typical password, created by a user trying to come up with something "complicated, will look like this:
"E$t@c0ntRa$eñA3smVyD|fí<il"
("this password is very hard", in a foreign language, using random casing and character replacement).

Most people want passwords that they can remember, which typically means words, names, or numbers that have meaning to them. This narrows the keyspace to a more manageable subset of possible keys. That first password could take a hundred million years to crack. I'd be shocked if it took the NSA two days to crack the second.

The weakness in AES isn't the technology, but the humans who use it.

 

Aerows

(39,961 posts)
57. Rainbow tables and arrays
Mon Aug 26, 2013, 02:36 PM
Aug 2013

make things easier, but there are ways of making it a hell of a lot harder. Just one salt can make a difference. Distributing the salt throughout the pw with a pattern only known to a few can make it worse - it becomes easy to know the password, but without the correct salt, hard to break. It seems naive that Snowden and company wouldn't know this.

Xithras

(16,191 posts)
70. Yes, salting can be an effective countermeasure.
Mon Aug 26, 2013, 02:48 PM
Aug 2013

IF the user bothers to actually use it and generate a useful salt. In my experience, most don't.

Most security problems can be directly attributed to user laziness. Encryption is no different.

And even when the user is paying attention, there's always the rubber hose method.

 

Aerows

(39,961 posts)
71. We aren't talking about average users in this case, though
Mon Aug 26, 2013, 02:49 PM
Aug 2013

We are talking about people that probably gave a great deal of thought to it, considering who they work for. And then left for Russia so they can't be rubber hosed.

EOTE

(13,409 posts)
59. Most strong passwords WOULD look like that.
Mon Aug 26, 2013, 02:37 PM
Aug 2013

But let's assume he chose a 256 bit encryption key that's solely comprised of commonly used words and phrases. Well then, maybe all of the world's computers working in concert would be able to find the encryption key within a hundred or so years instead of millions.

 

Aerows

(39,961 posts)
69. Put in a key within the password
Mon Aug 26, 2013, 02:48 PM
Aug 2013

in that you distribute, say, a number within a few characters of the password on an ultra-long. You not only have to know the password, you have a salt, too. That's about as easy to remember as tying your shoes if it is something like a birthday distributed, say, over every 3 characters of a bunch of easy words to remember to separate them.

Johnny1Likes2granny3smith4apples5to6go7with8his9pancakes

Hard to remember? Not really. Hard to brute-force? Incredibly.

Recursion

(56,582 posts)
161. Except often the passcode you type in just unlocks the actual key
Mon Aug 26, 2013, 11:37 PM
Aug 2013

with no indication of success or failure except whether or not the final decryption makes sense. So you're (conceivably) shrinking the keyspace at the cost of greatly increasing the time per trial.

Though this gets somewhat into the weeds of what particular system he's using.

 

Aerows

(39,961 posts)
167. In the weeds
Tue Aug 27, 2013, 11:13 AM
Aug 2013

but really what is the reality of what strong encryption is about. You can decrypt, and still have gibberish because there are layers of encryption. It's like the old Russian eggs with an egg holding a smaller egg, holding yet another smaller egg until you get to the real thing.

And it's not really in the weeds. It's causing more time to be used to decrypt. Reverse engineering to rebuild data blocks would be so ugly that it is more time consuming than pure decrypting, but then decrypting becomes worse than just finding the person, beating the hell out of them and getting the keys.

It's truly no surprise why Snowden fled and why they want to get their hands on him personally.

Recursion

(56,582 posts)
6. If it's a big enough keyspace, he's right
Mon Aug 26, 2013, 12:59 PM
Aug 2013

With a good block cypher and a long enough key we're talking "more combinations than there are atoms in the universe" kind of stuff.

riqster

(13,986 posts)
15. But one does not have to try an infinite number of combinations
Mon Aug 26, 2013, 01:05 PM
Aug 2013

Indeed, the chances of getting anywhere near the theoretical maximum before cracking the cipher are remote.

The theory says it'll take forever. But redo life is different.

Recursion

(56,582 posts)
18. Model it as a Bernoulli process
Mon Aug 26, 2013, 01:16 PM
Aug 2013

At 1,000,000 attempts per second, each having 2^-256 p of success, my cocktail napkin calculation tells me E(t) for hitting the correct key is several trillion years.

 

Aerows

(39,961 posts)
26. I believe he is thinking intelligent algorithms
Mon Aug 26, 2013, 01:47 PM
Aug 2013

and rainbow tables. Even with those you are looking at 100 years.

EOTE

(13,409 posts)
34. Sure, you could even hit it on the first try.
Mon Aug 26, 2013, 02:00 PM
Aug 2013

Your chances are a good deal better of winning Powerball a good 30 or so times in a row, but it could happen.

hueymahl

(2,495 posts)
38. I appreciate your input on this
Mon Aug 26, 2013, 02:07 PM
Aug 2013

It's hard for most folks (myself included), to comprehend numbers this large. One of the reasons lotteries make so much money, but I digress.

Your examples are spot on. Thanks.

EOTE

(13,409 posts)
83. Sure thing, any time.
Mon Aug 26, 2013, 03:15 PM
Aug 2013

I have a very hard time comprehending numbers of that size as well. I just know that numbers like that are several orders of magnitude beyond the point where my head begins to spin. There are really no practical applications for numbers of that size unless you are speaking of encryption keys or in terms of the total number of particles in the universe.

creeksneakers2

(7,473 posts)
67. Do the odds change
Mon Aug 26, 2013, 02:46 PM
Aug 2013

if they know what they are looking for? They could use common terms from the documents. Maybe some of them even have letterhead.

 

Aerows

(39,961 posts)
117. That relies on the random element of the human beings doing encryption
Mon Aug 26, 2013, 05:19 PM
Aug 2013

to use passwords found in the documents. No one with any sense would. They would just do a long string sentence broken up with symbols and numbers so that it is easy to remember, but hard to crack.

Recursion

(56,582 posts)
158. No
Mon Aug 26, 2013, 11:28 PM
Aug 2013

There's no partial decryption of a modern block cipher; every part of the document is mixed in with every other part.

 

Aerows

(39,961 posts)
178. I'm not sure about your definition of "ate up" but if you believe
Tue Aug 27, 2013, 07:22 PM
Aug 2013

he is dealing with encryption at amateur levels, I suggest that you are probably not as aware of how encryption works as many are. It's nice to try to play him as an idiot, though. It helps everyone sort out them very easily. .

 

railsback

(1,881 posts)
179. Do you really think those massive buildings going up are to house hard drives?
Tue Aug 27, 2013, 07:26 PM
Aug 2013

Ever see the size of a D-Wave and the amount of space it needs to keep cool?

Yes, certainly is amateur hour.

 

Aerows

(39,961 posts)
180. I think there is amateur hour, and then there is
Tue Aug 27, 2013, 07:31 PM
Aug 2013

... really amateur hour. Railsback, you are playing in the wrong schoolyard if you think that is going to convince and sway.

Truly, hon. Try harder, though.

It is entertaining.

 

Aerows

(39,961 posts)
182. I have no need to prove myself.
Tue Aug 27, 2013, 07:39 PM
Aug 2013

I have done so many times over. But I think you have failed, and are grasping on every single shred of illusion to keep from drowning in ridicule.

Nothing will save you from yourself, after all, since you realize you don't really know what you are claiming you know. That's where it starts and where it ends.

Once you get over that, you put on the big boy/girl pants and start being a real IT professional.

 

railsback

(1,881 posts)
184. Good Gawd
Tue Aug 27, 2013, 07:53 PM
Aug 2013

Tom Brady is a professional quarterback. So is Tim Tebow. One is brilliant, one sucks bad… but both are professional quarterbacks. I deal with corporate 'pro' graphic designers who don't even know how to use channels in PS. They, too, toot their own horns. Believe me, its a common problem.

 

Aerows

(39,961 posts)
191. Get him to write the encryption codes beneath...
Tue Aug 27, 2013, 08:13 PM
Aug 2013

oh wait. He sucks so bad as a quarterback, they would use a high school student. Why doesn't he just play tight end, a position he would be good at? Oh wait. Egotistical to the point of detriment of his team by not playing in a position that he would be good at.

 

Spider Jerusalem

(21,786 posts)
7. If it's encrypted with 256-bit AES, they can't
Mon Aug 26, 2013, 12:59 PM
Aug 2013

or rather, they can't do it in any kind of reasonable time.

50 supercomputers that could check a billion billion (10¹⁸ ) AES keys per second (if such a device could ever be made) would, in theory, require about 3×10⁵¹ years to exhaust the 256-bit key space.

http://en.wikipedia.org/wiki/Brute-force_attack#Theoretical_limits

Thinkingabout

(30,058 posts)
17. Yada Yada Yada, what the hell, since the files was stolen from NSA who would they think would not be
Mon Aug 26, 2013, 01:11 PM
Aug 2013

Able to break the code. It has probably furnished the key information from what the data was to what it is now, it would be easy to break the code. Again GG tried to play with the big boys and again he has been played. Someone needs,to put up the money for him and his gang to go to basic spy school, maybe then he will not be caught making dumb statements like this one. Mark another untruth up to GG, integrity down even more.

 

Aerows

(39,961 posts)
27. You mistake encryption after the fact
Mon Aug 26, 2013, 01:49 PM
Aug 2013

for encryption done before the acquisition of the documents. After the fact, it's not in the hands of the NSA anymore.

Thinkingabout

(30,058 posts)
72. Are you kidding me? They know every key stroke Snowden made while her husband as at NSA, they
Mon Aug 26, 2013, 02:50 PM
Aug 2013

Know the files he stole, they will break the code using both the encrypted and the files and then they will have the code they need for future reference.

 

Aerows

(39,961 posts)
77. I believed that up until the 3rd press conference.
Mon Aug 26, 2013, 02:57 PM
Aug 2013

Then I realized that they have no clue, because getting in front of this story didn't work. Now they are doing a disinformation campaign (hiring Cass Sunstein) and having the UK try to pass information off to the Independent in hope that they report erroneous things to shield the GCHQ. They can shout - Bad data! must be wrong!

Truth is, the trust has been shattered, and trying to generate more false information is going to end with all agencies involved look like liars and untrustworthy mouthpieces to the government than they already do. It's going to harm the newspapers. How long before they get tired of not making a profit because they are no longer credible due to being force fed erroneous information?

Oh, I'm sorry, my friend, but this genie is very much out of the lamp, and shoving toothpaste back in the tube has never worked very well.

Thinkingabout

(30,058 posts)
94. Since i have not seen frequent news reports out of the NSA in the years they have been in operation
Mon Aug 26, 2013, 03:52 PM
Aug 2013

It does not surprise me we are not seeing frequent news articles written. They are in the security business and nit the news reporting business. I don't know why it is important to put the toothpaste back in the tube which came out in 2005. The NSA should just sit back and let GG and his cronies do whatever they choose and continue to do the work needed by the NSA. All the reporting has not convinced me there is a problem except for some to make a mountain out of an ant hill.

 

Aerows

(39,961 posts)
98. You mistake me
Mon Aug 26, 2013, 03:59 PM
Aug 2013

The three news conferences by the President, and all the other ones attempting to placate the American public that they aren't being spied upon.

Each time, their talking points have been decimated as blatant untruths. That's why I know they really don't know.

Funny you should mention a mountain and an ant hill, when it is usually a mountain and a mole hill.

This really is a Mountain of an fire-ant hill, and a lot of people have tried sitting on it to make it stop.

Thinkingabout

(30,058 posts)
102. Yes I know about the mountain out of a mole hill but an ant hill but a regular ant hill is smaller
Mon Aug 26, 2013, 04:15 PM
Aug 2013

Than a mole hill, just to put a more proper perspective on this situation.

 

Aerows

(39,961 posts)
109. I guess you aren't familiar with fire-ant hills
Mon Aug 26, 2013, 04:41 PM
Aug 2013

smaller, but one hell of a lot worse. You must not be from the US.

Thinkingabout

(30,058 posts)
110. Guess I am familiar with fire ant hills, are you familiar with common red a t hills. Which is
Mon Aug 26, 2013, 04:49 PM
Aug 2013

Smaller?

Thinkingabout

(30,058 posts)
113. I was referring to the size of the ant hills, the common red ant hill is small and shallow,
Mon Aug 26, 2013, 05:05 PM
Aug 2013

Fire ant hills are large and go very deep.

 

Aerows

(39,961 posts)
126. What is your area, which Indian province do you hale from, sir?
Mon Aug 26, 2013, 07:40 PM
Aug 2013

We could be neighbors and friends.

Jamastiene

(38,187 posts)
145. That doesn't look like a red imported fire ant hill.
Mon Aug 26, 2013, 09:17 PM
Aug 2013

Red imported fire ant hills aren't very tall on the surface, but go deep into the ground.

Also, I would advise anyone not to try to sit on one, or even stand on one. I stood near one for too long and learned I can strip nekked in the yard and put an ice cube directly on my skin and still feel like I was on fire with the fires of hell, lol.

Red imported fire ants don't play. They mean business when they bite and sting, which is what they do. They bite first to hold on, then sting and hang on so they can continue to pump venom as long as it takes to make you know you got to close to their colony. They are vicious little shits. I have zillions of them in the yard.

P.S. Thank you for this informative sub-thread. I have learned a lot reading it. There is still a lot I don't know, but wow, this thread was great reading.

 

Aerows

(39,961 posts)
146. Imported
Mon Aug 26, 2013, 09:19 PM
Aug 2013

Where are you, my dear? Refresh my memory... I'm sorry, I knew where you live, but I can't remember.

Jamastiene

(38,187 posts)
147. North Carolina
Mon Aug 26, 2013, 09:22 PM
Aug 2013

Our red imported fire ant hills aren't quite that tall. Of course, we do have a local, native fire ant, plus the red imported fire ants here. I've seen pictures of them that are different out west though, more like in your picture. They seem to be a bit more entrenched out west and their mound structures are different too.

 

Aerows

(39,961 posts)
148. I'm in the Deep South
Mon Aug 26, 2013, 09:24 PM
Aug 2013

where they just form up in balls and float to sting you if there is a flood.

Jamastiene

(38,187 posts)
149. Ouch!
Mon Aug 26, 2013, 10:00 PM
Aug 2013

I've seen videos of how they will form little rafts with their bodies to keep their queen and young safe during floods. They are amazing little ants, if you can find a way to observe them without pissing them off at you. You'll catch hell from them if you get too close and they sense you staring too long.

I'm in that little strip of NC that has what they call ultisols, aka red clay. That stuff is sloshy and icky red when it is wet and turns really really hard almost like concrete when it is dry.
https://en.wikipedia.org/wiki/Ultisols

I'm surprised the fire ants can manage to build anything in that stuff, but parts of the Deep South has a lot of ultisols too, doesn't it?

 

Aerows

(39,961 posts)
150. It's either sand or dark earth where I am on the coast
Mon Aug 26, 2013, 10:07 PM
Aug 2013

You don't really have much clay here. Jacksonville, FL had more clay than we do. It's a very odd geological situation where I am. We are on high ground, but less than a mile from the Gulf.

Jamastiene

(38,187 posts)
159. I see.
Mon Aug 26, 2013, 11:34 PM
Aug 2013

I hope you are well outside of the flood plain, but y'all have the worst hurricanes too. Our hurricanes in NC have been sparse the last few years. Most of them have headed to the Gulf. The flood from just rain has been higher than usual in NC this year. I live near a deep pond, but I am on high ground, outside of the flood plain. Still, when it rains, my front yard looks a little like this:

It is not quite that bad now, because I have been working with it, trying to get centipede grass there to cut down on the slushy mess and erosion. It's much better now than it was, but still a slushy mess when it rains.

That could be one reason the fire ants here build lower to the ground. Another reason is that bedrock is only a few inches down, according to one guy who does work for me here. He knows about that stuff and says he hit pure bedrock very close to the surface. The fire ants have the clay and that to deal with.

I tried to plant an azalea here and it bent my spade. I was so proud. I had oiled the handle of that spade and used it for more than 20 years with no problems. I had grown up with crappy gardening tools that had been left outside and not treated. So, it was my first spade that my own. It was just my size, a little shorter than the usual length spade.

P.S. That picture is from the Wiki page on ultisols (red clay), not my actual front yard. It's just an example of how that stuff looks when it rains. I wanted to make that a little clearer. This is the page I got it from:
https://en.wikipedia.org/wiki/Ultisols

 

Aerows

(39,961 posts)
183. I'd show you pictures of what it looked like after Katrina
Tue Aug 27, 2013, 07:53 PM
Aug 2013

But we pretty much were without electricity, huddled together in bathtubs with our cats and thankful to be alive.

I'm serious. It was that bad. I don't ever want to be in the bathtub with my cat, hearing the walls BREATHE like they would implode, praying we would survive.

The eye passed over my geographic location. I was scared shitless, and I am unashamed to say so. Have a hurricane of that magnitude pass over your house, while you have your pets huddled in the safest place in your home while you feel the walls contract and expand and see if it isn't nearly a religious experience.

I survived no electricity for a month, and no water for 6 weeks. And I was thankful that I was alive and so were my family members and pets.

 

Aerows

(39,961 posts)
104. And wait a second... here
Mon Aug 26, 2013, 04:19 PM
Aug 2013

Snowden, *her* husband? Uh, what? Surely you didn't mean to slur Snowden in such a homophobic manner with this post. *Her* Husband?

Greenwald is a male. Snowden is a male. Greenwald's husband is a male. Who in the hell are you talking about/what are you talking about?

Thinkingabout

(30,058 posts)
107. That would be an autocorrect not intended, you know sorta like a typo.
Mon Aug 26, 2013, 04:32 PM
Aug 2013

Unintended error, it happens.

 

Tierra_y_Libertad

(50,414 posts)
24. So they can run a spellcheck on them before some whistle blower relaeases them?
Mon Aug 26, 2013, 01:42 PM
Aug 2013

I guess it would be embarrassing to let people see grammatical errors and bad punctuation on Ultra Top Secret Eyes Only files.

 

Aerows

(39,961 posts)
35. No, for reverse engineering
Mon Aug 26, 2013, 02:00 PM
Aug 2013

and the true panic is the fact that they have no idea what he has. That way, they can't get out in front of the story, which is what has repeatedly messed them up during this. That's also why slow release has been so effective - authorities say one thing, a week later he proves that they've lied.

I'd make CERTAIN to wad up extraneous data in the middle of it, just to keep them guessing and to make sure reverse engineering isn't possible. Kind of like wrapping individual balls of items as you ship them so that they don't get broken, and it's impossible to know where the actual item starts and the padding ends.

Leopolds Ghost

(12,875 posts)
138. I'm sure he got as much as possible and has the non-relevant stuff safely stashed away somewhere
Mon Aug 26, 2013, 08:10 PM
Aug 2013

For "greymail" purposes.

Leopolds Ghost

(12,875 posts)
142. I don't claim to know much
Mon Aug 26, 2013, 08:28 PM
Aug 2013

But there are ways of doing video conferencing over secure encrypted connection which means that he could just send each other the files over the same protocol, e.g. xmpp. Based on what has been reported in the paper, Snowden's worry is "man in the middle" (MITM) attacks. However having a trusted go-between eliminates those attacks if they already share an unhacked key that they can encode the key signatures in.

I only learned about this stuff recently because I've always been concerned about the issue since an activist group I'm familiar with IRL has been fighting this sort of thing tooth and nail. Well, that and I was one of the lone nuts harping about the issue on DU years ago...

...aaand... now I'm probably on a watchlist.

 

Aerows

(39,961 posts)
29. If I were Snowden et. al
Mon Aug 26, 2013, 01:50 PM
Aug 2013

I would have made sure to put extraneous data within the encrypted file to obscure file sizes. That also makes reverse engineering attacks impossible if the extraneous data is peppered widely enough through the "meat" of the data.

 

Aerows

(39,961 posts)
37. That's kind of the beauty of doing it that way
Mon Aug 26, 2013, 02:06 PM
Aug 2013

you can do it twenty different ways with the same encryption key, and no matter how it is released, without the key it is useless because you don't know what is real data, what isn't and there is no way to do a comparison with data even if you knew to the letter what he took.

Which I was thinking they did, but now? I'm pretty sure they have no idea if he covered his tracks well enough. Hell, a single backup tape duplicated, then placed right back would be enough to throw a monkey wrench into assessments of what he has in his possession.

 

Aerows

(39,961 posts)
39. Which they desperately want to know
Mon Aug 26, 2013, 02:09 PM
Aug 2013

so they can get in front of the story and have a plausible explanation. So far, every time they have told a lie, it has been countered.

We haven't seen much, because I think they have figured out that they don't know what he has, and now they are trying to plant stories. See the one by the Independent, and Snowden swiftly stated they had nothing from him.

hootinholler

(26,449 posts)
46. You mean the thread I started Friday was castigated by the usual suspects
Mon Aug 26, 2013, 02:21 PM
Aug 2013

and then sank like a rock?

Yeah.

Personally I think I'm going to start carrying a thumb with a tarball of lolcat images encrypted.

Maybe I'll hire a server in Oz to send encrypted copies of 4chan images flying around the intertubes bouncing them off of other servers.

It's like we need the opposite of a DDOS attack and more like a clog the pipe with encrypted lolcats attack.

Rstrstx

(1,399 posts)
41. Sure, someone out there has the encryption key
Mon Aug 26, 2013, 02:13 PM
Aug 2013

They're probably trying to find that instead of figuring it out themselves. Whether on someone's computer or written on a sheet of paper or in a vault it's out there

And it sure sounds like he just admitted that Miranda was indeed transporting something more serious than video games or vacation pictures

 

Rex

(65,616 posts)
43. So is Davey Jones locker.
Mon Aug 26, 2013, 02:17 PM
Aug 2013

True you have a billion in one chance of finding the key, as compared to a trillion in one of ever breaking the code.

Rstrstx

(1,399 posts)
50. According to the encryption experts on here
Mon Aug 26, 2013, 02:24 PM
Aug 2013

Cracking the code by brute force is wayyyyy smaller, more like one in a Brazilian. But finding the key, well they probably have some idea of where to start looking. Still long odds, but I'm not sure they are willing to waste the time given that they already have anything that would ever be on those drives

 

Rex

(65,616 posts)
56. Well if the NSA knows exactly what was stolen
Mon Aug 26, 2013, 02:34 PM
Aug 2013

then that helps. The way they were doing such a shitty job in outsourcing, makes me wonder if they maybe don't know the full extent of what is stolen. The hair on fire response of firing 90% of their sysadmins doesn't sound very encouraging that they do. The fact that they are right back with dealing with Booz Allen makes me think they don't really care. Guess they will get some kind of TARP deal from Obama.

 

Aerows

(39,961 posts)
44. If I were the NSA
Mon Aug 26, 2013, 02:17 PM
Aug 2013

I'd be worried about a backup job that failed ostensibly, then was restarted. Job failures do happen, it's the nature of the beast. That's where I would find a goldmine that didn't get traced to me, personally, only the backup operator.

That's why I would have them hanging wondering what in the hell I had ( and more importantly, how I got it), because sometimes it isn't easy to determine what failed, why, and how much you can recover, if any. You can't get out in front of a story if you don't know the ammo that another entity has. You can go on TV and declare "I didn't sleep with that woman" and out pops a dress with your semen on it. You can declare that you aren't spying on Americans, out pops documents that prove it covers at the least 75% of all domestic communications. Out pops a warrant signed by a court that ostensibly states that you can legally dump everyone on Verizon's business communication networks traffic.

It proves that the government is full of bullshit, and that they can't be trusted. Once their credibility is eroded, you release the big ol' bomb.

That is the danger the NSA feels is facing them, and I wouldn't doubt it. It could also be detrimental to the US, but only because policy put in place has been detrimental. Unfortunately, shit rolls down hill, and the 99% are the ones that usually face the shit.

backscatter712

(26,355 posts)
52. Ubiquitous crypto is the NSA 's greatest fear.
Mon Aug 26, 2013, 02:26 PM
Aug 2013

Using modern algorithms, on basic open source software, you can encrypt your data so that all the supercomputers in Fort Meade can't crack them.

I have a bachelor's in computer science, and I've seen the math personally, so I can vouch for the strength of modern crypto.

Puzzledtraveller

(5,937 posts)
174. That's pretty cool
Tue Aug 27, 2013, 11:58 AM
Aug 2013

I wish I knew more about that sort of thing. My interest was piqued oddly enough reading about the Zodiac killer and his unsolved ciphers, particularly z340. I know I'm butchering this but it was said that it would many computers hundreds of years constantly operating to crack it. I recently grabbed some books on codes and code breaking but not in the computer age. I can only imagine just how complex and unsolvable some encryption can be these days.

Dustlawyer

(10,495 posts)
58. I am curious, these Snowden/Greenwald haters here seem upset that they came out with this!
Mon Aug 26, 2013, 02:37 PM
Aug 2013

Are they NSA guys trying to influence us? Why would they attack the leaking of such important information letting us know our government has been spying on us? Is it b/c Greenwald is a lawyer, a reporter? This story is so much bigger than these 2 men responsible for letting us know our government has been lying and spying on us in violation of our Constitution! It's like they cannot wait for these guys to be arrested and stand for their "show trial!" Crazy!
Thanks Snowden and Greenwald! I for one don't care about the BS being floated about them personally. I want what they revealed to stop, but now I cannot EVER be sure it did. The info is too valuable for them to ever stop spying, regardless of what they say!

truth2power

(8,219 posts)
75. Thank you, Dustlawyer. Who are these people who are trying to smear GG
Mon Aug 26, 2013, 02:54 PM
Aug 2013

and everyone he's ever known?

Authoritarian mindset, maybe. Or...NSA guys.

Vanje

(9,766 posts)
143. I hope they're not NSA
Mon Aug 26, 2013, 08:31 PM
Aug 2013

Their posts, argument style, use of facts, evidence and prose, don't seem like the product of very clever minds.
Most all of them seem to be playing the part of Dim-wits.


NealK

(1,864 posts)
165. "Most all of them seem to be playing the part of Dim-wits."
Tue Aug 27, 2013, 12:06 AM
Aug 2013

Well there's one spewing nonsense that seems to be proud to play the part of a Dim-wit, so much so that the first syllable of the word Dimwit is part of their DU name:

http://www.democraticunderground.com/10023536344#post33

War Horse

(931 posts)
63. Why does GG say stuff like this:
Mon Aug 26, 2013, 02:41 PM
Aug 2013

"the US and its closest allies are trying to build a surveillance system that has as its primary objective the elimination of privacy globally"

Such hyperbole is going to turn away lots of people who may otherwise have been more than willing to listen.

madrchsod

(58,162 posts)
79. why?
Mon Aug 26, 2013, 03:02 PM
Aug 2013

because greenwald is in it for the fame and fortune.
he has to stay in the picture otherwise he`ll be forgotten just like snowden is.

War Horse

(931 posts)
84. "Because greenwald is in it for the fame and fortune."
Mon Aug 26, 2013, 03:21 PM
Aug 2013

That's debatable.

But you make a good point. Leaking in parts to stay relevant.

 

Aerows

(39,961 posts)
137. Uh, I'm here to debate you for the "fame" and "fortune" and I'm related to neither.
Mon Aug 26, 2013, 08:10 PM
Aug 2013

I think some of you guys just freak out because you don't understand technology, and you pretty much think nobody else does either.

You are free to rant from your corner of insecurity, but I assure you that there are many that DO understand and how it will impact you. We illustrate how your rights can be destroyed or confiscated, and we stand up for that with regard to information rights.

We don't even need you to thank us. We do it because it is the right thing to do.

deurbano

(2,894 posts)
90. "by which I mean that everyone’s communications electronically will be collected, stored, analyzed
Mon Aug 26, 2013, 03:37 PM
Aug 2013

and monitored by the US government."

If you read the whole statement, I don't think it's sounds particularly hyperbolic, given what we already know.

That doesn't mean someone will actually be reading, watching or listening to all of it (which wouldn't be possible). And it doesn't mean the communications will be stored forever, either (I assume).

Full quote:

"I think this will be the time the world realizes that the US and its closest allies are trying to build a surveillance system that has as its primary objective the elimination of privacy globally, by which I mean that everyone’s communications electronically will be collected, stored, analyzed and monitored by the US government. "

 

Whisp

(24,096 posts)
93. Those kinds of words are perfect chum for the gullible.
Mon Aug 26, 2013, 03:51 PM
Aug 2013

and Glenn knows that, the gulls, not so much.

 

nadinbrzezinski

(154,021 posts)
101. Because this s such hyperbole
Mon Aug 26, 2013, 04:12 PM
Aug 2013

That people know this is confirmation over what has been suspected around the world.

I am sorry you can't conceive of it

madrchsod

(58,162 posts)
68. now that`s the funniest thing i`ve read in a long time
Mon Aug 26, 2013, 02:47 PM
Aug 2013

i guess greenwald has to say something shocking to stay in the news.


by the way ...when is he coming back to the usa?

saidsimplesimon

(7,888 posts)
73. I disagree with Mr. Greenwald re:encryption
Mon Aug 26, 2013, 02:52 PM
Aug 2013

luminous, what's with the script that appears below your link to truth out?

"I won't rest until there is a L(l)ibertarian boogyman under every DUer's bed."

I've dumped all things Microsoft, Google, and Facebook. If Verizon, or ATT were my provider, they would receive my cancellation notice. Who wants to pay any company to collect and share personal information?

saidsimplesimon

(7,888 posts)
74. I disagree with Mr. Greenwald re:encryption
Mon Aug 26, 2013, 02:54 PM
Aug 2013

luminous, what's with the script that appears below your link to truth out?

"I won't rest until there is a L(l)ibertarian boogyman under every DUer's bed."

I've dumped all things Microsoft, Google, and Facebook. If Verizon, or ATT were my provider, they would receive my cancellation notice. Who wants to pay any company to collect and share personal information?

 

arcane1

(38,613 posts)
76. Why are these files encrypted anyway? Aren't they supposed to be leaked and released?
Mon Aug 26, 2013, 02:55 PM
Aug 2013

That's the one most confusing thing about this whole saga.

 

Aerows

(39,961 posts)
80. They don't want the particular spy agencies and politicians
Mon Aug 26, 2013, 03:02 PM
Aug 2013

to know what they have. If the various ones did, they would go on television and lie. In fact, they have. But since they have no idea what Snowden has, each time they have gone on television and lied, they have been called out as liars. That erodes the credibility of the spy agencies, and any public official speaking on behalf of them, as well it should.

That's what has them in knots. They don't know what they can lie about and can't, because the second they lie, he releases something. Which, they kind of deserve for lying to the very people that work to elect them.

 

arcane1

(38,613 posts)
86. Then what's the point of taking the info in the first place? That's what I don't get...
Mon Aug 26, 2013, 03:23 PM
Aug 2013

It made sense when documents and slides were being released and published, but I don't see the point of keeping the rest of it a secret.

 

Aerows

(39,961 posts)
87. Some of it probably has to be parsed through
Mon Aug 26, 2013, 03:29 PM
Aug 2013

so that no one is put in danger. And otherwise, they get their kicks on watching politicians and the agencies squirm.

I don't begrudge them that at all, since politicians and government officials have told so many lies to the American public and discredited so many whistleblowers that told the truth.

 

Aerows

(39,961 posts)
190. When my elected government lies to me
Tue Aug 27, 2013, 08:09 PM
Aug 2013

I have proof that they lied to me, even though I just suspected they lied to me before, yes, I get a kick knowing that I have confirmation that I'm not an idiot for thinking my government lied to me. I KNOW they did.

I have CONFIRMATION that they did.

Now, ask yourself why that might be important information for a citizen in a Democratic society.

Recursion

(56,582 posts)
198. Who? When?
Tue Aug 27, 2013, 10:53 PM
Aug 2013

Some people's job is to lie, some of the time, so I'm definitely sure there have been lies told.

Luminous Animal

(27,310 posts)
115. The Guardian, the Washington Post, Der Spiegal, and the NY Times are not done with
Mon Aug 26, 2013, 05:10 PM
Aug 2013

their reporting.

There is more to come.

 

Aerows

(39,961 posts)
131. Yes there is
Mon Aug 26, 2013, 07:50 PM
Aug 2013

and they aren't going to give government a way to get out in front of the story so that they can create plausible lies.

I look forward to the next revelation, because it is going to show yet another pack of lies we have been told. The American people are strong, resilient and robust - but we hate lies and being lied to. That's what the agencies know, and why they are tied up in knots with these revelations.

saidsimplesimon

(7,888 posts)
78. I disagree with Mr. Greenwald re:encryption
Mon Aug 26, 2013, 03:00 PM
Aug 2013

luminous, what's with the script that appears below your link to truth out?

"I won't rest until there is a L(l)ibertarian boogyman under every DUer's bed."

I've dumped all things Microsoft, Google, and Facebook. If Verizon, or ATT were my provider, they would receive my cancellation notice. Who wants to pay any company to collect and share personal information?

 

Aerows

(39,961 posts)
121. No one
Mon Aug 26, 2013, 05:42 PM
Aug 2013

But when the government does it, and they can imprison you for life, it's entirely different.

In case you couldn't differentiate between the two.

blackspade

(10,056 posts)
81. If they do break it....
Mon Aug 26, 2013, 03:12 PM
Aug 2013

I hope they end up watching episodes of My Little Pony.
It would serve the NSA right if they wasted all their time for a kids cartoon.

Response to Luminous Animal (Original post)

Zorra

(27,670 posts)
122. Wouldn't it just be a total hoot if the only thing on the thumb drives was
Mon Aug 26, 2013, 05:55 PM
Aug 2013

Ed Snowden says hi!

Have a nice day, thank you for playing.


 

Aerows

(39,961 posts)
127. I would think it was extraneous data.
Mon Aug 26, 2013, 07:43 PM
Aug 2013

I'd use it to make the data untraceable by size and content.

That's just me, though.

Leopolds Ghost

(12,875 posts)
135. I'm a bit unclear why Greenwald is relying on thumb drives in the first place to get data to point B
Mon Aug 26, 2013, 08:02 PM
Aug 2013

I mean, that would make sense if both parties in question were not already known...? From a spy-vs-spy perspective, that is.

If both parties are not worried about calling attention to their location and the fact that they are in communication with each other, why not just use the same strong encryption to send each other the data directly? Using a non-web protocol? In my limited understanding, but the go-between only has to exchange public key signatures, which they should be able to pass on by other means.

jmowreader

(50,553 posts)
139. There's a simpler way, and the NSA knows it...
Mon Aug 26, 2013, 08:11 PM
Aug 2013

Eventually Greenwald is going to give the key to someone. On the internet, nothing remains secret long; eventually someone will put the key on his Facebook page, and someone who is sick of Greenwald's shit will e-mail it to the NSA.

 

Aerows

(39,961 posts)
168. Which is why they are so desperate to get their hands on him.
Tue Aug 27, 2013, 11:17 AM
Aug 2013

Rubber hose is far easier than cracking a key of this nature.

You can state, confidently, that they know, but it is clearer than crystal to everyone that is familiar with this technology why and that they don't. That's why he's in Russia. That's why they are desperate to get him back in the US.

 

Aerows

(39,961 posts)
169. One thing to remember
Tue Aug 27, 2013, 11:27 AM
Aug 2013

Physical access to the data stands up to no security measure. Physical access to people knowing the keys only stands up as long as they are tortured.

Why do you think they want their hands on Snowden so badly? He had physical access. Help me other DUers that know about server rooms and securing information to explain this.

I'm trying to think up an analogy, but I have things to do today and haven't arrived at one, yet.

 

dkf

(37,305 posts)
202. Nope. The UK is pulling your strings.
Fri Aug 30, 2013, 01:08 PM
Aug 2013

@ggreenwald: @MichaelKelleyBI Good encryption requires multiple passwords, not just one. That pw allows no access to documents, period.

Latest Discussions»General Discussion»Greenwald interview: NSA ...