{"id":7198,"date":"2014-02-27T11:42:46","date_gmt":"2014-02-27T16:42:46","guid":{"rendered":"http:\/\/www.opensource.im\/?p=7198"},"modified":"2014-02-27T11:42:46","modified_gmt":"2014-02-27T16:42:46","slug":"qa-schneier-on-trust-nsa-spying-and-the-end-of-us-internet-hegemony","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/nsa-spying\/qa-schneier-on-trust-nsa-spying-and-the-end-of-us-internet-hegemony.php","title":{"rendered":"Q&#038;A: Schneier on trust, NSA spying and the end of US internet hegemony"},"content":{"rendered":"<p><p>        Avere takes Edge-Core to the cloud  <\/p>\n<p>    RSA 2014 Bruce Schneier is the    man who literally wrote the book on modern encryption,    publishing Applied Cryptography in 1994, and for the    past 20 years has been an important and sometimes outspoken    voice in the security industry.  <\/p>\n<p>    He founded the firm Counterpane Internet Security (later sold    to BT), and is also a board member of the Electronic Frontier    Foundation and an Advisory Board Member of the Electronic    Privacy Information Center.  <\/p>\n<p>    More recently he's been working on documents released by Edward    Snowden on NSA activities and presented his findings at this    year's RSA conference in San Francisco. The Register    took the opportunity of sitting down with Schneier at the event    and chewing through the current state of security, privacy and    government intrusion online.  <\/p>\n<p>    The Reg: This conference opened with     a statement from RSA chief Art Coviello regarding the use of the flawed NSA-championed Dual    Elliptic Curve Deterministic Random Bit Generator in an    encryption toolkit product.  <\/p>\n<p>    Coviello said RSA did all it could to secure its software.    What's your take on the affair?  <\/p>\n<p>    Schneier: I believe that's true. When NIST came out with    that RNG standard, it was one of four choices available, and    those choices tracked other crypto suites. It made sense in a    holistic way that there should be an elliptic curve in there.    It was slower, it was kludgier, but some people thought that    was a plus, not a minus.  <\/p>\n<p>    By 2007 there was the first inkling that there might be a    backdoor, but it was just guessing and it is part of the NIST    standard. Any toolkit that says \"we're compliant\" [with a    particular standard], which I'm sure is a requirement for all    sorts of contracts, had to implement it.  <\/p>\n<p>    My guess is that RSA didn't know anything was amiss and when a    large customer comes in with technical changes that dont    really matter you just do them. I think RSA was more a victim    here, and I think it's been unfortunate that over the last    couple of months they haven't been able to tell their story    clearly.  <\/p>\n<p>    It's hard to tease out who did what and when. Certainly, I    didn't boycott the RSA conference  I'm here for    myself and the attendees, not for RSA  and if I was going to    list companies to boycott because of their NSA collaboration,    RSA wouldnt even make the top 10.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Excerpt from:<br \/>\n<a target=\"_blank\" href=\"http:\/\/go.theregister.com\/feed\/www.theregister.co.uk\/2014\/02\/27\/qa_schneier_on_trust_nsa_spying_and_the_end_of_us_internet_hegemony\" title=\"Q&A: Schneier on trust, NSA spying and the end of US internet hegemony\">Q&A: Schneier on trust, NSA spying and the end of US internet hegemony<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Avere takes Edge-Core to the cloud RSA 2014 Bruce Schneier is the man who literally wrote the book on modern encryption, publishing Applied Cryptography in 1994, and for the past 20 years has been an important and sometimes outspoken voice in the security industry. He founded the firm Counterpane Internet Security (later sold to BT), and is also a board member of the Electronic Frontier Foundation and an Advisory Board Member of the Electronic Privacy Information Center<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[46],"tags":[],"class_list":["post-7198","post","type-post","status-publish","format-standard","hentry","category-nsa-spying"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/7198"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=7198"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/7198\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=7198"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=7198"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=7198"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}