{"id":28307,"date":"2014-12-29T22:41:37","date_gmt":"2014-12-30T03:41:37","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/snowden-leaks-reveal-encryption-programs-that-nsa-couldnt-break.php"},"modified":"2014-12-29T22:41:37","modified_gmt":"2014-12-30T03:41:37","slug":"snowden-leaks-reveal-encryption-programs-that-nsa-couldnt-break","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/snowden-leaks-reveal-encryption-programs-that-nsa-couldnt-break.php","title":{"rendered":"Snowden leaks reveal encryption programs that NSA couldn&#8217;t break"},"content":{"rendered":"<p><p>A  military no trespassing sign shown in front of Utah's NSA Data  Center in Bluffdale, Utah.  <\/p>\n<p>    Image: Rick Bowmer\/Associated Press  <\/p>\n<p>      By Rex Santus2014-12-29      21:13:57 UTC    <\/p>\n<p>    A new report on documents leaked to the press by whistleblower    Edward    Snowden highlights some security tools the National    Security Agency has cracked  and those it hasn't  in its    widespread surveillance of digital communication.  <\/p>\n<p>    The NSA had trouble breaking some forms of encryption,    according to a report in the German newsmagazine Der Spiegel that listed seven    coauthors, including Laura Poitras, who directed the Snowden    documentary Citizenfour. The    encryption and security-breaking problems the NSA encountered    were ranked on a scale of 1 to 5, from \"trivial\" to    \"catastrophic.\" Facebook chat, for example, was considered    \"trivial.\"  <\/p>\n<p>    The NSA had \"major\" problems (the fourth level) with Zoho, an encrypted    email service, as well as Tor, the network and software that helps    users browse the Internet anonymously. Tor sends information    through a variety of a relay nodes, managed by volunteers, that    make it difficult to tell who or where the web traffic    originated from.  <\/p>\n<p>    Government security specialists also had trouble with    Truecrypt, a software program used for file encryption that was    shuttered earlier this year. PGP, an early    encryption program for email that was founded in 1991, still    proved a formidable opponent to the NSA.  <\/p>\n<p>    The situation only became \"catastrophic\" when a    user constructed a sort of Frankenstein's monster of privacy    protection: The Tor network atop other anonymizing    services, certain instant messengers and phone encryption apps    like RedPhone, for example.  <\/p>\n<p>    Some combinations rendered a \"near-total loss\/lack of insight    to target communications, presence,\" according to Der    Spiegel's review of the NSA documents, which was also    presented at Berlin-based hacking group Chaos    Computer Club's annual conference this weekend in Germany.  <\/p>\n<p>    Nothing is bulletproof, of course. The government has found    its way into Tor before, and    malicious hackers targeted the anonymity network just last    week. Using a combination of privacy methods is the best way to    avoid NSA surveillance.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read more:<br \/>\n<a target=\"_blank\" href=\"http:\/\/mashable.com\/2014\/12\/29\/snowden-nsa-problems-encryption\/?utm_campaign=Mash-Prod-RSS-Feedburner-All-Partial&utm_cid=Mash-Prod-RSS-Feedburner-All-Partial&utm_medium=feed&utm_source=rss\/RK=0\/RS=qsqzoSFGeZ3__RiWNxmg0MjdEgU-\" title=\"Snowden leaks reveal encryption programs that NSA couldn't break\">Snowden leaks reveal encryption programs that NSA couldn't break<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> A military no trespassing sign shown in front of Utah's NSA Data Center in Bluffdale, Utah. Image: Rick Bowmer\/Associated Press By Rex Santus2014-12-29 21:13:57 UTC A new report on documents leaked to the press by whistleblower Edward Snowden highlights some security tools the National Security Agency has cracked and those it hasn't in its widespread surveillance of digital communication<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-28307","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/28307"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=28307"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/28307\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=28307"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=28307"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=28307"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}