{"id":28308,"date":"2014-12-29T22:42:07","date_gmt":"2014-12-30T03:42:07","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/the-encryption-tools-the-nsa-still-cant-crack-revealed-in-new-leaks.php"},"modified":"2014-12-29T22:42:07","modified_gmt":"2014-12-30T03:42:07","slug":"the-encryption-tools-the-nsa-still-cant-crack-revealed-in-new-leaks","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/the-encryption-tools-the-nsa-still-cant-crack-revealed-in-new-leaks.php","title":{"rendered":"The Encryption Tools the NSA Still Can&#8217;t Crack Revealed in New Leaks"},"content":{"rendered":"<p><p>    Most of usat    least the cynical onesassume that the NSA has probably    beaten most of the encryption technologies out there. But    a new report from Der Spiegel that draws on documents    from Edward Snowden's archive shows that this simply isn't    true. There are some tools that the NSA, as recently as two    years ago, couldn't crack.  <\/p>\n<p>    \"[Some users] think the intelligence agency experts are    already so many steps ahead of them that they can crack any    encryption program,\" explains the report. \"This isn't true.\" In    fact, there are several encryption technologies that gave the    NSA trouble. First of all, the documents show that the NSA had    \"major\" issues trying to break the encryption on both     Tor and Zoho, the email service. Truecrypt, the now-defunct freeware service for encrypting files    on your computer, was another thorn in the NSA's side, along    with Off-the-Record, which encrypts instant    messages.  <\/p>\n<p>    Another good tool mentioned is Pretty Good Privacy, which is shocking    given that the protocol is two decades old, originally written    in 1991. But there are also combinations of tools that the NSA    describes as \"catastrophic\" when attempting to crack. Here's    how Der Spiegel describes the special sauce:  <\/p>\n<p>      Things become \"catastrophic\" for the NSA at level five      - when, for example, a subject uses a combination of Tor,      another anonymization service, the instant messaging system      CSpace and a system for Internet telephony (voice over IP)      called ZRTP. This type of combination results in a      \"near-total loss\/lack of insight to target communications,      presence,\" the NSA document states.<\/p>\n<p>    There are also plenty of seemingly secure services that the    report shows are easy for the NSA to monitor, just as you might    already assumeincluding VPNs and the HTTPS connections that    many of us see on a daily basis when logging into banking sites    and other supposedly \"secure\" websites. According to the    report, the NSA intercepted 10 million of those https    connections every day in 2012.  <\/p>\n<p>    Then there are the details about how the NSA proactively fights    encryption online, including attending meetings of groups that    create the standards for encryption, like the Internet    Engineering Task Force. This way, the NSA can influenceand    water downthe internet-wide standards for privacy in a much    longer-term way. In one of the more ironic sections of the new    documents, we learn that while the NSA is responsible for    recommending the best security standards to the US National    Institute of Standards and Technology, at the same time it is    looking for ways to break the tools it recommends.  <\/p>\n<p>    It's a harrowing new look at the NSA's encryption-breaking    prowess, but at the same time, a heartening glimpse of the    freely available tools that still provide a modicum of privacy.    More than anything, it's a reminder that the NSA is throwing    all its weight into cracking these protocolsand none of us can    ever assume that a single encryption tool is truly private. The    entire report is well worth a read. [Der Spiegel]  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>The rest is here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/gizmodo.com\/the-encryption-tools-the-nsa-still-cant-crack-revealed-1675978237\/RK=0\/RS=5sx703WtRxQ1.txfgfXj0AlFMcQ-\" title=\"The Encryption Tools the NSA Still Can't Crack Revealed in New Leaks\">The Encryption Tools the NSA Still Can't Crack Revealed in New Leaks<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Most of usat least the cynical onesassume that the NSA has probably beaten most of the encryption technologies out there. But a new report from Der Spiegel that draws on documents from Edward Snowden's archive shows that this simply isn't true<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-28308","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/28308"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=28308"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/28308\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=28308"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=28308"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=28308"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}