« First « Previous Comments 22 - 28 of 28 Search these comments
APOCALYPSEFUCK is Comptroller says
Here's the fucking question everyone's got to ask: are the Certificate Authorities' private keys, the root keys each uses to create every certificate used for establishing a crypto channel on the Intenet, *all* in the hands of the fucking NSA?
VeriSign Hacked, Successfully and Repeatedly, in 2010
www.schneier.com/blog/archives/2012/02/verisign_hacked.html‎
Feb 3, 2012 - When certificate authorities get hacked, and certificates issued, your client may automatically trust MITM SSL connections from these devices.
After what we heard, I'm pretty sure the NSA has certificate authorities private keys. And that means they can pretend to be your bank or whoever.
As far as other hacking are concerned, there are revocation lists.
c2 is an expert in backdoor access
I'm just kiddin, continue the debate, please
They probably give competitive information about non US companies. (and foreign countries are likely doing the same).
washing machines.! thats it.. how about which cola i drink.. Coke or Pepsi...
After what we heard, I'm pretty sure the NSA has certificate authorities private keys. And that means they can pretend to be your bank or whoever.
Them BIG claims ... few if any can deliver.
70% of the NSA budget goes to private contractors.
tech moves fast.. far too fast for Govt to handle.. there are not that many, and certainly not many at all in Govt payroll to handle all this... who else is gonna build and run the servers but the likes of experts from HP, Dell, Microsoft and other firms ?
APOCALYPSEFUCK is Comptroller says
What the use if the root certificate is compromised?
Revoking ALL the certs it issued is a solution but not one that would leave the CA standing.
But was it really compromised by hackers? If so they should indeed go out of business.
I guess they don't consider NSA having it as 'compromized'.
I'm just kiddin
No, your obsession is showing - yet again.
A silver lining of NSA leaking personal information might be if they finally drag Bop69 out of the closet by leaking his browsing metadata. Fap33, instead of fapping endlessly over your obsession, just go out and get some.
« First « Previous Comments 22 - 28 of 28 Search these comments
http://www.wired.com/threatlevel/2013/06/encryption-foiled-wiretaps/
Encrypt everything even random bits. They make great honeypots.