« First « Previous Comments 19 - 28 of 28 Search these comments
The US gov is clearly acting like the lowest of police state.
If Americans are not bothered by that, then, I guess, what's next?
A police state like China ? The NSA actions are akin to counter espionage. Their actions is to stop the bad guys, be it Chinese hackers, drug smugglers, and international terrorists.
Im pleased with NSA actions.. hope they do well.
Your comment puzzles me. If NSA can get secret back doors installed in companies' software, why can't companies get secret back doors installed into NSA's software? Why do you imagine the data can flow in only one direction? In any event, competitors' interest in GOOG's data could go far beyond operating a competing business, it might also include advance information about acquisitions, strategy, etc.
Yes I'm sure Google will try to ensure that only the NSA can access their backdoor. Was that your point? That's not particularly reassuring.
Backdoors in NSA software? You mean would the NSA willingly give access to private companies into their databases? These guys deal in secrecy. They don't let information go where other countries could spy it. So I think this is unlikely. They probably give competitive information about non US companies. (and foreign countries are likely doing the same).
Was that your point?
No, you seem to have misinterpreted it completely.
You mean would the NSA willingly give access to private companies into their databases?
You seem to be shifting between NSA as a single entity, leakers within the NSA, and possibly other countries. You're obviously somewhat familiar with the Edward Snowden story, so you are probably aware that he worked for private contractors for the NSA. 70% of the NSA budget goes to private contractors. The whole is obviously more porous than some people understood previously, e.g. "the NSA" (which you write of as if it were one individual with a will of its own, rather than an agency full of many people with independent wills of their own).
APOCALYPSEFUCK is Comptroller says
Here's the fucking question everyone's got to ask: are the Certificate Authorities' private keys, the root keys each uses to create every certificate used for establishing a crypto channel on the Intenet, *all* in the hands of the fucking NSA?
VeriSign Hacked, Successfully and Repeatedly, in 2010
www.schneier.com/blog/archives/2012/02/verisign_hacked.html‎
Feb 3, 2012 - When certificate authorities get hacked, and certificates issued, your client may automatically trust MITM SSL connections from these devices.
After what we heard, I'm pretty sure the NSA has certificate authorities private keys. And that means they can pretend to be your bank or whoever.
As far as other hacking are concerned, there are revocation lists.
c2 is an expert in backdoor access
I'm just kiddin, continue the debate, please
They probably give competitive information about non US companies. (and foreign countries are likely doing the same).
washing machines.! thats it.. how about which cola i drink.. Coke or Pepsi...
After what we heard, I'm pretty sure the NSA has certificate authorities private keys. And that means they can pretend to be your bank or whoever.
Them BIG claims ... few if any can deliver.
70% of the NSA budget goes to private contractors.
tech moves fast.. far too fast for Govt to handle.. there are not that many, and certainly not many at all in Govt payroll to handle all this... who else is gonna build and run the servers but the likes of experts from HP, Dell, Microsoft and other firms ?
APOCALYPSEFUCK is Comptroller says
What the use if the root certificate is compromised?
Revoking ALL the certs it issued is a solution but not one that would leave the CA standing.
But was it really compromised by hackers? If so they should indeed go out of business.
I guess they don't consider NSA having it as 'compromized'.
I'm just kiddin
No, your obsession is showing - yet again.
A silver lining of NSA leaking personal information might be if they finally drag Bop69 out of the closet by leaking his browsing metadata. Fap33, instead of fapping endlessly over your obsession, just go out and get some.
« First « Previous Comments 19 - 28 of 28 Search these comments
http://www.wired.com/threatlevel/2013/06/encryption-foiled-wiretaps/
Encrypt everything even random bits. They make great honeypots.