Welcome to DU! The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards. Join the community: Create a free account Support DU (and get rid of ads!): Become a Star Member Latest Breaking News General Discussion The DU Lounge All Forums Issue Forums Culture Forums Alliance Forums Region Forums Support Forums Help & Search

eridani

(51,907 posts)
Wed Sep 11, 2013, 05:37 AM Sep 2013

Dear Stupid, Stupid NSA

http://readersupportednews.org/opinion2/424-national-security/19299-focus-dear-stupid-stupid-nsa

In other words, instead of just building a better lock pick, you are trying to make sure that all locks are faulty by design.

What is so jaw-droppingly idiotic about your actions is that you have not only subverted key elements of modern cryptography, but you have also appointed yourself as the guardian of the knowledge that the resulting vulnerabilities exist. And if your own security systems were up to the task, then those secrets wouldn't be sitting in the offices of the New York Times and ProPublica.

One must possess a Panglossian view on things to assume that Edward Snowden was the first person out of the many thousands in his position to make away with such material. He brought it to the public, and without that move there's a good chance you wouldn't have even known he took it. So who else has it? Bet you have no idea. So well done; you've probably put your own citizens at risk.

But let's ignore that distinct likelihood for a moment, and concentrate on the aftermath of Snowden's revelations.

If the first tranche of those revelations will hit the U.S. Web services and cloud economy hard-estimates vary as to how hard, and only time will tell-then the crypto scandal is going to do the same to the U.S. security industry. In fact, it's probably going to hurt more. Most people have too much invested in American Web services to pull out on short notice; it's relatively trivial in many cases to switch security services.
13 replies = new reply since forum marked as read
Highlight: NoneDon't highlight anything 5 newestHighlight 5 most recent replies
 

Katashi_itto

(10,175 posts)
1. Whats awesome is this is the beginning of the end of Copyrights, patents, etc.
Wed Sep 11, 2013, 05:48 AM
Sep 2013

How can companies do business online when they know everything they do, that's propriety, is being collected and sold to the highest bidder. Why respect patents and such then?

Another reason EU is quietly looking at building a 2nd separate internet.

joshcryer

(62,270 posts)
2. Always online DRM.
Wed Sep 11, 2013, 05:52 AM
Sep 2013

That's the eventual capitalist reality. You can't view content without being connected to a cloud allowing it. Microsoft tried this with the XBox One. The gaming community lost its collective shit over it (rightly so) and Microsoft backed down. Turns out their little Kinect device was going to spy on users on a 24/7 basis and make ads "interactive," so if you were watching an ad on TV the device would notice it, and put up some eye tracking stuff so you get interested, then you could, with other users watching the ad live, interact with the ad. It's like freaking mindgames times a million. Like all those flash ads that have mini-games? Only this would be on your TV and unskippable, unavoidable.

Microsoft didn't get to do that, yet, at least, as a full feature of their system, but it's the beginning and you can expect more and more devices to go in that direction at least until open source fixes the situation, which it will, it'll just be behind by a bit.

Wabbajack_

(1,300 posts)
5. Seperate internet?
Wed Sep 11, 2013, 08:22 AM
Sep 2013

Interesting.

I'm tired of the copyright Nazis taking down videos and streams of things I want to see.

 

Katashi_itto

(10,175 posts)
7. Not sure if that part will happen, but the idea is to prevent US from stealing.
Wed Sep 11, 2013, 08:41 AM
Sep 2013

What is really interesting is EU is waking up to how much money can be made by having a separate, competing internet.

joshcryer

(62,270 posts)
4. Sort of, the net is going to become a fully encrypted grid.
Wed Sep 11, 2013, 05:56 AM
Sep 2013

And that will allow services to continue to exist. Much like the ability to jailbreak our devices citizens will earn the right to be fully encrypted. That may come with a price, however, with an always online connected world.

KurtNYC

(14,549 posts)
8. Encryption still works, and I thought we had "the right to be fully encrypted" now (?)
Wed Sep 11, 2013, 09:22 AM
Sep 2013
3) Assume that while your computer can be compromised, it would take work and risk on the part of the NSA – so it probably isn't. If you have something really important, use an air gap. Since I started working with the Snowden documents, I bought a new computer that has never been connected to the internet. If I want to transfer a file, I encrypt the file on the secure computer and walk it over to my internet computer, using a USB stick. To decrypt something, I reverse the process. This might not be bulletproof, but it's pretty good.

4) Be suspicious of commercial encryption software, especially from large vendors. My guess is that most encryption products from large US companies have NSA-friendly back doors, and many foreign ones probably do as well. It's prudent to assume that foreign products also have foreign-installed backdoors. Closed-source software is easier for the NSA to backdoor than open-source software. Systems relying on master secrets are vulnerable to the NSA, through either legal or more clandestine means.

5) Try to use public-domain encryption that has to be compatible with other implementations. For example, it's harder for the NSA to backdoor TLS than BitLocker, because any vendor's TLS has to be compatible with every other vendor's TLS, while BitLocker only has to be compatible with itself, giving the NSA a lot more freedom to make changes. And because BitLocker is proprietary, it's far less likely those changes will be discovered. Prefer symmetric cryptography over public-key cryptography. Prefer conventional discrete-log-based systems over elliptic-curve systems; the latter have constants that the NSA influences when they can.



http://www.theguardian.com/world/2013/sep/05/nsa-how-to-remain-secure-surveillance

dickthegrouch

(3,173 posts)
11. Stuxnet traversed that air gap
Wed Sep 11, 2013, 03:31 PM
Sep 2013

In exactly the same way described here - porting the malware across to the air gapped system on a USB stick.

There is NO guarantee that there is no malware in any part of the updates or data or documents that you want to transfer.

joshcryer

(62,270 posts)
13. The NSA's metadata gathering is at the network switch level.
Wed Sep 11, 2013, 10:49 PM
Sep 2013

It's the core where they then decide who to attack and where. They may have a whole crap load of software vulnerabilities stacked up, but they're not going out and attacking everyone because the virus companies and the hackers would find that, very very quickly. The NSA is very likely making custom payloads for each and every legitimate target, otherwise their entire operation gets cracked open within days.

With a fully encrypted networking grid it will be impossible to tell who's IP belongs to who, and where a message originated. We're talking several levels and rounds of encryption, obfuscation, and network pathing. From an outside observer grabbing data from a thousand network switches it would just look like random data, static, there would be nothing, absolutely no sign of any data actually being transferred everywhere. That's what a fully encrypted grid looks like.

Jerry442

(1,265 posts)
6. "He brought it to the public,...
Wed Sep 11, 2013, 08:26 AM
Sep 2013

"... and without that move there's a good chance you wouldn't have even known he took it."

Exactly. How many dozens (hundreds?) of Snowdens are out there with motives other than informing the public?

 

randome

(34,845 posts)
10. Who in their right mind does not expect LE agencies to be able to unenrypt stuff?
Wed Sep 11, 2013, 02:08 PM
Sep 2013

Do we really want the darker side of human nature -child pornographers, money launderers, human trafficking, drug cartels- to have a way to hide their activities from legally issued warrants?

Is it the contention that if it's in some type of code, prosecutors should simply toss the evidence?
[hr][font color="blue"][center]You should never stop having childhood dreams.[/center][/font][hr]

dickthegrouch

(3,173 posts)
12. They have very cleverly
Wed Sep 11, 2013, 03:35 PM
Sep 2013

Put us all into a Catch-22 situation with respect to encrypted data.
It is now an offense (at least in the UK, and maybe in the US by now) not to provide the keys (even if you've genuinely forgotten them). Even though they have no concrete evidence Silence in this case can be tantamount to self conviction.
All the "best" law makes it so that you're damned if you do and damned if you don't (just think back to Salem Witch trials, it's no different today).

Latest Discussions»General Discussion»Dear Stupid, Stupid NSA