zlacker

[return to "Inside the NSA's War on Internet Security"]
1. diafyg+S1[view] [source] 2014-12-28 20:54:14
>>Fabian+(OP)
THESE DOCUMENTS CONTAIN EVIDENCE OF ATTACKS ON VPN, SSL, TLS, SSH, TOR. What do we do now? No seriously, what do we do?

The full list of documents: http://www.spiegel.de/international/world/nsa-documents-atta...

The accompanying lecture: http://streaming.media.ccc.de/relive/6258/

Also, obligatory: https://eff.org/donate

◧◩
2. logn+6r[view] [source] 2014-12-29 08:52:04
>>diafyg+S1
I do not have confidence in an engineering fix. Fixes will be broken. It's possible to use encryption to thwart marketers or cyber-crime rings, but we'll never have a sustainable edge on intel agencies without policy changes.

That said, better encryption will raise the cost of NSA's surveillance which might eventually lead to policy reform (when budget hawks are forced to act). And it might mean their dragnets have to be more targeted which could slow the expanding the definition of "terrorist".

I think the most effective actions would be to make the public outraged over cracked encryption and surveillance. And even with all these leaks, that hasn't happened IMO (debatable I know). Outrage would happen if people understood how this has real-life effects. Storytelling is what's needed, not white-papers and tech blogs.

edit: wanted to add that Bruce Schneier gave an excellent talk on the topic of your question, https://www.youtube.com/watch?v=3v9t_IoOgyI

◧◩◪
3. jmnico+Ut[view] [source] 2014-12-29 10:03:33
>>logn+6r
"cracked encryption" is not the problem, after all it's their job to do it. The problem is that they use it to listen on non legitimate targets like random civilians.
[go to top]