Bitcoin Forum

Other => Politics & Society => Topic started by: Wilikon on August 30, 2013, 01:08:11 AM



Title: New Snowden Leak Reports ‘Groundbreaking’ NSA Crypto-Cracking
Post by: Wilikon on August 30, 2013, 01:08:11 AM
The latest published leak from NSA whistleblower Edward Snowden lays bare classified details of the U.S. government’s $52.6 billion intelligence budget, and makes the first reference in any of the Snowden documents to a “groundbreaking” U.S. encryption-breaking effort targeted squarely at internet traffic.

Snowden, currently living in Russia under a one-year grant of asylum, passed The Washington Post the 178-page intelligence community budget request for fiscal year 2013. Among the surprises reported by Post writers Barton Gellman and Greg Miller is that the CIA receives more money than the NSA: $14.7 billion for the CIA, versus $10.8 billion for the NSA. Until this morning it’s generally been believed that the geeky NSA, with its basements full of supercomputers, dwarfed its human-oriented counterparts.

The Post published only 43 pages from the document, consisting of charts, tables and a 5-page summary written by Director of National Intelligence James Clapper. The Post said it withheld the rest, and kept some information out of its reporting, in consultation with the Obama administration to protect U.S. intelligence sources and methods.

One of those methods, though, is hinted at in the Clapper summary — and it’s interesting. Clapper briefly notes some programs the intelligence agencies are closing or scaling back, as well as those they’re pouring additional funds into. Overhead imagery captured by spy satellites was slated for reduction, for example, while SIGINT, the electronic spying that’s been the focus of the Snowden leaks, got a fresh infusion.

“Also,” Clapper writes in a line marked “top secret,” “we are investing in groundbreaking cryptanalytic capabilities to defeat adversarial cryptography and exploit internet traffic.”

The Post’s article doesn’t detail the “groundbreaking cryptanalytic capabilities” Clapper mentions, and there’s no elaboration in the portion of the document published by the paper. But the document shows that 21 percent of the intelligence budget — around $11 billion — is dedicated to the Consolidated Cryptologic Program that staffs 35,000 employees in the NSA and the armed forces.

The rest:
http://www.wired.com/threatlevel/2013/08/black-budget/


Title: Re: New Snowden Leak Reports ‘Groundbreaking’ NSA Crypto-Cracking
Post by: polrpaul on August 30, 2013, 01:17:17 AM
Awesome!


Title: Re: New Snowden Leak Reports ‘Groundbreaking’ NSA Crypto-Cracking
Post by: MysteryMiner on August 30, 2013, 01:31:24 AM
Hmmm what could it be? Large MITM attack against SSL encrypted web traffic using certificates signed by root authorities? Pay millions $ to everyone involved to both keep enthusiastic and keep mouth shut. Thank You America!


Title: Re: New Snowden Leak Reports ‘Groundbreaking’ NSA Crypto-Cracking
Post by: balanghai on August 30, 2013, 01:43:04 AM
That'd be a very awesome rig to mine bitcoins!!!!!!! :o


Title: Re: New Snowden Leak Reports ‘Groundbreaking’ NSA Crypto-Cracking
Post by: polrpaul on August 30, 2013, 01:44:36 AM
That'd be a very awesome rig to mine bitcoins!!!!!!! :o

 ;)


Title: Re: New Snowden Leak Reports ‘Groundbreaking’ NSA Crypto-Cracking
Post by: Rassah on August 30, 2013, 02:47:22 AM
Among the surprises reported by Post writers Barton Gellman and Greg Miller is that the CIA receives more money than the NSA: $14.7 billion for the CIA, versus $10.8 billion for the NSA.

Actually not too surprising, considering CIA's toys include U2 Spy Planes, SR-71 Blackbird, and currently drones.


Title: Re: New Snowden Leak Reports ‘Groundbreaking’ NSA Crypto-Cracking
Post by: theDF on August 30, 2013, 05:21:44 AM
Some of this is not even suprising me anymore  ;)


Title: Re: New Snowden Leak Reports ‘Groundbreaking’ NSA Crypto-Cracking
Post by: balanghai on August 31, 2013, 10:27:12 AM
Maybe this is the reason why primecoin is so difficult to mine now. They are selling 20k XPM a day to cover costs of the equipments!!! ;D


Title: Re: New Snowden Leak Reports ‘Groundbreaking’ NSA Crypto-Cracking
Post by: b!z on August 31, 2013, 01:53:22 PM
"The Post said it withheld the rest, and kept some information out of its reporting, in consultation with the Obama administration to protect U.S. intelligence sources and methods."

Censorship at its finest.


Title: Re: New Snowden Leak Reports ‘Groundbreaking’ NSA Crypto-Cracking
Post by: west77 on September 02, 2013, 09:58:02 AM
"The Post said it withheld the rest, and kept some information out of its reporting, in consultation with the Obama administration to protect U.S. intelligence sources and methods."

Censorship at its finest.
It is, after all, very important to allow the ministry of truth to have the final say in what can be published.


Title: Re: New Snowden Leak Reports ‘Groundbreaking’ NSA Crypto-Cracking
Post by: nlovric on September 02, 2013, 01:02:16 PM
Hmmm what could it be? Large MITM attack against SSL encrypted web traffic using certificates signed by root authorities? Pay millions $ to everyone involved to both keep enthusiastic and keep mouth shut. Thank You America!


Time-Memory-Data (TMD) trade-off, most-likely. Further considerations ULTRA.


Title: Re: New Snowden Leak Reports ‘Groundbreaking’ NSA Crypto-Cracking
Post by: GreenBits on September 05, 2013, 04:50:03 AM
Im not too savvy on all the crypto shit, but does this mean that Pretty Good Privacy isn't so good and private anymore?


Title: Re: New Snowden Leak Reports ‘Groundbreaking’ NSA Crypto-Cracking
Post by: melon on September 05, 2013, 07:06:36 AM
Im not too savvy on all the crypto shit, but does this mean that Pretty Good Privacy isn't so good and private anymore?

its now going to be called kinda-ok privacy w. the acronym (KOP)


Title: Re: New Snowden Leak Reports ‘Groundbreaking’ NSA Crypto-Cracking
Post by: btbrae on September 05, 2013, 07:16:40 PM
Breaking: http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security

Quote
US and UK spy agencies defeat privacy and security on the internet

• NSA and GCHQ unlock encryption used to protect emails, banking and medical records
• $250m-a-year US program works covertly with tech companies to insert weaknesses into products
• Security experts say programs 'undermine the fabric of the internet'

...The document reveals that the agency has capabilities against widely used online protocols, such as HTTPS, voice-over-IP and Secure Sockets Layer (SSL), used to protect online shopping and banking.

Quote
The document also shows that the NSA's Commercial Solutions Center, ostensibly the body through which technology companies can have their security products assessed and presented to prospective government buyers, has another, more clandestine role.

It is used by the NSA to "to leverage sensitive, co-operative relationships with specific industry partners" to insert vulnerabilities into security products. Operatives were warned that this information must be kept top secret "at a minimum".


Title: Re: New Snowden Leak Reports ‘Groundbreaking’ NSA Crypto-Cracking
Post by: Spendulus on September 05, 2013, 07:59:52 PM
Breaking: http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security

Quote
US and UK spy agencies defeat privacy and security on the internet

• NSA and GCHQ unlock encryption used to protect emails, banking and medical records
• $250m-a-year US program works covertly with tech companies to insert weaknesses into products
• Security experts say programs 'undermine the fabric of the internet'

...The document reveals that the agency has capabilities against widely used online protocols, such as HTTPS, voice-over-IP and Secure Sockets Layer (SSL), used to protect online shopping and banking.

Quote
The document also shows that the NSA's Commercial Solutions Center, ostensibly the body through which technology companies can have their security products assessed and presented to prospective government buyers, has another, more clandestine role.

It is used by the NSA to "to leverage sensitive, co-operative relationships with specific industry partners" to insert vulnerabilities into security products. Operatives were warned that this information must be kept top secret "at a minimum".
Of course, since it's existence has now been revealed, the utility of these efforts has been compromised.

If the US ever fell apart like Russia did in 1990-1992 timeframe, and all those NSA creeps were out of jobs with the knowledge of these backdoors....


Title: Re: New Snowden Leak Reports ‘Groundbreaking’ NSA Crypto-Cracking
Post by: Wilikon on September 05, 2013, 10:50:10 PM
I was going to update my thread but I see people keeping track. That is good.

Obviously the bitcoin ecosystem is not surprised by all those revelations. It simply means there is not enough tinfoil hats for everyone on this planet now as it is all factual.


Title: Re: New Snowden Leak Reports ‘Groundbreaking’ NSA Crypto-Cracking
Post by: bitcoindigi on September 06, 2013, 05:38:05 AM
Im not too savvy on all the crypto shit, but does this mean that Pretty Good Privacy isn't so good and private anymore?

its now going to be called kinda-ok privacy w. the acronym (KOP)

lol.

I'd say they won't touch pgp for the next 10ish years. hopefully.

What they're capable of is https, SSL and VoIP, but that's obvious IMO


Title: Re: New Snowden Leak Reports ‘Groundbreaking’ NSA Crypto-Cracking
Post by: Ekaros on September 06, 2013, 05:47:04 AM
Im not too savvy on all the crypto shit, but does this mean that Pretty Good Privacy isn't so good and private anymore?

its now going to be called kinda-ok privacy w. the acronym (KOP)

lol.

I'd say they won't touch pgp for the next 10ish years. hopefully.

What they're capable of is https, SSL and VoIP, but that's obvious IMO

I think PGP is itself still sound. But there is a big trust issues...

Maybe it's time to find a new root authority and not involve it with USA in anyway...


Title: Re: New Snowden Leak Reports ‘Groundbreaking’ NSA Crypto-Cracking
Post by: b!z on September 06, 2013, 10:20:57 AM
Im not too savvy on all the crypto shit, but does this mean that Pretty Good Privacy isn't so good and private anymore?

its now going to be called kinda-ok privacy w. the acronym (KOP)

lol.

I'd say they won't touch pgp for the next 10ish years. hopefully.

What they're capable of is https, SSL and VoIP, but that's obvious IMO

I think PGP is itself still sound. But there is a big trust issues...

Maybe it's time to find a new root authority and not involve it with USA in anyway...

self issued SSL certificates, some sites are already doing this


Title: Re: New Snowden Leak Reports ‘Groundbreaking’ NSA Crypto-Cracking
Post by: Rassah on September 10, 2013, 02:19:00 AM
I was going to update my thread but I see people keeping track. That is good.

Obviously the bitcoin ecosystem is not surprised by all those revelations. It simply means there is not enough tinfoil hats for everyone on this planet now as it is all factual.

We need tinfoil computer cases...  :-\


Title: Re: New Snowden Leak Reports ‘Groundbreaking’ NSA Crypto-Cracking
Post by: PrintMule on September 10, 2013, 05:18:01 PM
"The Post said it withheld the rest, and kept some information out of its reporting, in consultation with the Obama administration to protect U.S. intelligence sources and methods."

Censorship at its finest.

Not quite. Whole article may be total bullshit, or they have no meaningful info, so they at least pretend they have.


Title: Re: New Snowden Leak Reports ‘Groundbreaking’ NSA Crypto-Cracking
Post by: QuantumKiwi on September 11, 2013, 05:16:32 AM
They injected their own modifications into many protocols 10 years ago as major security protocols were being " revamped ".

Its obvious in the SSL layer, see the development history :)


Title: Re: New Snowden Leak Reports ‘Groundbreaking’ NSA Crypto-Cracking
Post by: luv2drnkbr on September 12, 2013, 02:11:48 AM
self issued SSL certificates, some sites are already doing this

ya any privacy conscious site should just have a self signed cert, with the cert fingerprint pgp clear-signed by the site admin or something.


Title: Gov’t standards agency “strongly” discourages use of NSA-influenced algorithm
Post by: Wilikon on September 14, 2013, 04:09:11 PM
NIST: "we are not deliberately... working to undermine or weaken encryption."

http://arstechnica.com/security/2013/09/government-standards-agency-strongly-suggests-dropping-its-own-encryption-standard/

Following revelations about the National Security Agency's (NSA) covert influence on computer security standards, the National Institute of Standards and Technology, or NIST, announced earlier this week it is revisiting some of its encryption standards. But in a little-noticed footnote, NIST went a step further, saying it is "strongly" recommending against even using one of the standards.

The institute sets standards for everything from the time to weights to computer security that are used by the government and widely adopted by industry.

As ProPublica, The New York Times, and The Guardian reported last week, documents provided by Edward Snowden suggest that the NSA has heavily influenced the standard, which has been used around the world. In its statement Tuesday, the NIST acknowledged that the NSA participates in creating cryptography standards "because of its recognized expertise" and because the NIST is required by law to consult with the spy agency. "We are not deliberately, knowingly, working to undermine or weaken encryption," NIST chief Patrick Gallagher said at a public conference Tuesday.

Various versions of Microsoft Windows, including those used in tablets and smartphones, contain implementations of the standard, though the NSA-influenced portion isn't enabled by default. Developers creating applications for the platform must choose to enable it.

The New York Times noted earlier this week that documents provided by Snowden show the spy agency played a crucial role in writing the standard that the NIST is now cautioning against using, which was first published in 2006. The NIST standard describes what is known as an "elliptic curve-based deterministic random bit generator." This bit of computer code is one way to produce random numbers that are the cornerstone of encryption technology used on the Internet. If the numbers generated are not random but in fact predictable, the encryption can be more easily cracked.

The Times reported that the Snowden documents suggest the NSA was involved in creating the number generator. Researchers say the evidence of NSA influence raises questions about whether any of the standards developed by the NIST can be trusted. "NIST's decisions used to be opaque and frustrating," said Matthew Green, a professor at Johns Hopkins University. "Now they're opaque and potentially malicious. Which is too bad because NIST performs such a useful service."

Cryptographers have long suspected the standard in question was faulty. Seven years ago, a pair of researchers in the Netherlands authored a paper that said the random number generator was insecure and that attacks against it could "be run on an ordinary PC." A year after that, in 2007, two Microsoft engineers flagged the standard as potentially containing a backdoor.

Following the criticism, the standard was revised in 2007 to include an optional workaround. The NSA has long been involved in encryption matters at the standards institute. "NIST follows NSA's lead in developing certain cryptographic standards," a 1993 Government Accountability Office report noted. A 2002 law mandates that the NIST set information security standards and lists the NSA merely as one of several other agencies that must be consulted.

Asked how often standards are reopened, NIST spokesperson Gail Porter said, "It's not frequent, but it does happen." She added that it would be "difficult to give you an exact number of times." Asked whether Microsoft would continue to use the encryption standard in some of its software, a spokesperson said the company "is evaluating NIST's recent recommendations and as always, will take the appropriate action to protect our customers." The NSA declined to comment.