Bad dog NSA!! Bad dog!!

More details are emerging over the United States NSA and the UK GCHQ and their collective abilities to capture and decrypt supposedly secure internet communications.


So basically any kind of information you send over the internet even over HTTPS can be read by the NSA? I’ve been unable to find more in-depth information about this regarding which encryption methods are ‘broken’, I mean, is AES still safe for local encryption?

Lets see what happens now, seeing as the whole infrastructure of HTTPS seems to be flawed (If I understand the articles correctly) will we see any new solutions for a secure connection or is it one of those things where they go, “Meeh, we’ll get to it eventually” and then there are holes in that ‘solution’ too?

Basically the NSA has won the title of being the biggest ahes of the internet from 4chan. 88) (It’s a joke btw, I mean that 4chan were the a-holes of the Internet)

You know that something is wrong when you don’t fear the common hackers and malware writers spying on you anymore, but rather fear the governments spying on you.

Oh also, apparently and allegedly the Swedish FRA has been working with the NSA, so I don’t think it’s out of the question that the FRA is handing over data to the NSA which the NSA is able to decrypt, but that’s just speculating.
I’m quickly starting to lose hope in Sweden, my mother country or whatever you call it, I once believed we were a leading country in the issues of privacy etc, however I have learned that we are indeed not, and that makes me very depressed. I mean, what do we have to do to get some darn privacy? It’s obvious that encryption etc isn’t going to cut it forever, we need to fix the problem, being the governments trying to remove every single part of privacy we have left. But that’s going in on politics too much, better not go there because lol forum policies. =3

Some more reading :

How NSA access was built into Windows : How NSA access was built into Windows | Telepolis

Quote from Explaining the latest NSA revelations – Q&A with internet privacy experts | James Ball and Bruce Schneier | The Guardian :

this deliberate weakening of the cryptographic systems that protect Internet banking only put us at greater risk from criminals and other espionage agencies.

I think there is still uncertainty whether this is true or not, but in the event that it is true I thought “Why not block the file?” but then I actually looked up what other things it does and realized Microsoft wasn’t that stupid to make a dedicated file for NSA back-door but rather make it heavily integrated with other features to make sure it wouldn’t be disabled without a loss of other features. :stuck_out_tongue:

Edit to clarify: I don’t think there is uncertainty whether there is a key called NSAKEY, but rather whether it is really a key for the NSA to do the things said, honestly it probably is given the nature of NSA and Microsoft’s apparent willingness to co-operate.
I wish more games were available for Linux so that I could finally switch OS. :cry:

Yes provided there is no key Linux engineer and/or open software developer embedded by the NSA. Just think at who develop Selinux! :wink:

Who and for whom are we afraid of? It’s really a pity to think that we are all afraid of ourselves more than we are of any other danger, natural or accidental. The mere fact that everyone around me is so afraid of having their data accessed makes me more afraid of them than I am of the people reading my data to make sure I’m not a threat.

In a publicly accessible communication terminal such as the internet, I don’t mind people overhearing or eavesdropping for the right purposes. What I do hate is when people eavesdrop for the sake of rumor and media propaganda. I hate people rummaging through my things hoping to rob me of something, but I don’t mind the security guard rummaging through my bag in search of a bomb. I could engage the guard to an argument that I’m not a terrorist, exhaust all my reasons why I could not possibly be a threat, but that’s unreasonable and idiotic, an embarrassment I hope never to encounter in my entire life.

It’s not that difficult to gather information on anyone, and believe me the “researcher” wasn’t even trying. Now what happens when you allow a man full privacy? There’s few research, none of the ones I read seem archived yet in the internet. Some of them are, well, quite normal. Others are…less desirable.

No wonder the TOR usage doubled :slight_smile:

It’s hard to hide something in open source-code.

Hard but not impossible :