Bitcoin Forum
June 10, 2024, 02:39:58 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: Bitcoins - Secured by NSA designed Encryption or Backdoored ?  (Read 2087 times)
xb0x (OP)
Full Member
***
Offline Offline

Activity: 181
Merit: 100


Better don't say if you don't know!


View Profile
September 13, 2013, 09:13:30 PM
 #1

It's been nearly three months since Edward Snowden started telling the world about the National Security Agency & mass surveillance of global communications.
After the last week report that the National Security Agency has leveraged its cooperative relationships with specific industry partners to insert vulnerabilities into Internet security products.

Bitcoin, a virtual currency, a peer-to-peer electronic cash system, which is generated on a logarithmic scale by dedicated miners who run software that generate the complex hash codes which make up a Bitcoin.
The integrity of Bitcoin depends on a hash function called SHA-256, which was designed by the NSA and published by the National Institute for Standards and Technology (NIST).
Is it hard to believe that could the intelligence community have a secret exploit for Bitcoin? & While there is no evidence yet to support the speculation.
If you assume that the NSA did something to SHA-256, which no outside researcher has detected, what you get is the ability, with credible and detectable action, they would be able to forge transactions. The really scary thing is somebody finds a way to find collisions in SHA-256 really fast without brute-forcing it or using lots of hardware and then they take control of the network. Cryptography researcher Matthew D. Green of Johns Hopkins University said.
Bitcoin has recently added in the watchlist of the New York Department of Financial Services, the California Department of Financial Institutions and U.S Government is asking all intelligence & agencies & for information on how it plans to deal with Bitcoin.
The NSA apparently possesses groundbreaking capabilities against encrypted voice and text communication and has invested billions of dollars since 2000 to make nearly everyone & secrets available for government consumption by & cracking every encryption. But we donknow precisely how much, maybe including Bitcoin too?

Last month, we reported an Android security vulnerability</a> which resulted in the theft of coins, because of Weak random number generators (RNGs) was implicated in Bitcoin.& Is it possible that this vulnerability was known to be weak by the NSA, and that bitcoin thieves simply stumbled upon the security hole first?


( Source ) More? Here :  http://thehackernews.com/2013/09/NSA-backdoor-bitcoin-encryption-sha256-snowden.html



So, what do you think about it?
Carlton Banks
Legendary
*
Offline Offline

Activity: 3430
Merit: 3074



View Profile
September 13, 2013, 09:37:22 PM
 #2

I think that,

This is wrong:
Bitcoin, a virtual currency, a peer-to-peer electronic cash system, which is generated on a logarithmic scale by dedicated miners who run software that generate the complex hash codes which make up a Bitcoin.

This is riiiight, but 20 years field use + expert/academic analysis hasn't produced viable exploit etc....
The integrity of Bitcoin depends on a hash function called SHA-256, which was designed by the NSA and published by the National Institute for Standards and Technology (NIST).
Is it hard to believe that could the intelligence community have a secret exploit for Bitcoin? & While there is no evidence yet to support the speculation.
If you assume that the NSA did something to SHA-256, which no outside researcher has detected, what you get is the ability, with credible and detectable action, they would be able to forge transactions. The really scary thing is somebody finds a way to find collisions in SHA-256 really fast without brute-forcing it or using lots of hardware and then they take control of the network.

This is speculation about exploits, only hard facts are institutional policies and intents:  

Bitcoin has recently added in the watchlist of the New York Department of Financial Services, the California Department of Financial Institutions and U.S Government is asking all intelligence & agencies & for information on how it plans to deal with Bitcoin.
The NSA apparently possesses groundbreaking capabilities against encrypted voice and text communication and has invested billions of dollars since 2000 to make nearly everyone & secrets available for government consumption by & cracking every encryption. But we donknow precisely how much, maybe including Bitcoin too?

And that this is the only aspect of the quoted piece that deals with known and fully understood exploits:

Last month, we reported an Android security vulnerability</a> which resulted in the theft of coins, because of Weak random number generators (RNGs) was implicated in Bitcoin.& Is it possible that this vulnerability was known to be weak by the NSA, and that bitcoin thieves simply stumbled upon the security hole first?

Vires in numeris
p2pbucks
Hero Member
*****
Offline Offline

Activity: 642
Merit: 500


Evolution is the only way to survive


View Profile
September 13, 2013, 11:31:48 PM
 #3

there is no backdoor in a open discussed algorithm
kjlimo
Legendary
*
Offline Offline

Activity: 2114
Merit: 1031


View Profile WWW
September 14, 2013, 04:39:40 AM
 #4

If a billion isn't enough to entice people to crack it, I don't know what would be enough...

Coinbase for selling BTCs
Fold for spending BTCs
PM me with any questions on these sites/apps!  http://www.montybitcoin.com


or Vircurex for trading alt cryptocurrencies like DOGEs
CoinNinja for exploring the blockchain.
empoweoqwj
Hero Member
*****
Offline Offline

Activity: 518
Merit: 500


View Profile
September 14, 2013, 04:41:53 AM
 #5

'After the last week report that the National Security Agency has leveraged its cooperative relationships with specific industry partners to insert vulnerabilities into Internet security products.'

And none of them are open source. which is the point. bitcoin is open source. if it wasn't, it would be dead in the water.
Kluge
Donator
Legendary
*
Offline Offline

Activity: 1218
Merit: 1015



View Profile
September 14, 2013, 05:09:24 AM
Last edit: September 14, 2013, 05:24:07 AM by Kluge
 #6

ETA: Didn't realize this thread remained active. No reason for me to spout off on things I don't know. Smiley https://bitcointalk.org/index.php?topic=288545.0
StarfishPrime
Sr. Member
****
Offline Offline

Activity: 358
Merit: 250


View Profile
September 14, 2013, 03:31:33 PM
Last edit: September 14, 2013, 03:59:20 PM by StarfishPrime
 #7

...
Last month, we reported an Android security vulnerability</a> which resulted in the theft of coins, because of Weak random number generators (RNGs) was implicated in Bitcoin.& Is it possible that this vulnerability was known to be weak by the NSA, and that bitcoin thieves simply stumbled upon the security hole first?

( Source ) More? Here :  http://thehackernews.com/2013/09/NSA-backdoor-bitcoin-encryption-sha256-snowden.html

So, what do you think about it?
The likelihood that the RNG "problem" was at least known to certain agencies should be considered high.

Any bitcoin address, existing or future, created using a compromised or purposely weakened RNG is vulnerable to address collision by brute force (the probability is so close to zero it can be ignored with a good RNG algorithm). "Offline" storage (i.e. paper wallets, USB keys etc) are not exempt if they were created using a compromised RNG.
It's a trivial and virtually undetectable attack that could be conducted entirely offline with nothing more than a copy of the blockchain (except for sweeping the bitcoin of course).

Similar attacks on deterministic wallets are already commonplace: Just try a brain wallet with "Hello World" (or "Goodbye Bitcoin") as a passphrase...

                         
    ¦                     
  ¦    ¦¦¦               
¦¦  ¦¦¦¦                 
                             ¦¦  ¦¦¦¦
                          ¦ ¦¦ ¦¦¦¦                     
                         ¦¦¦¦¦¦¦¦
                        ¦¦¦¦¦¦¦
                        ¦¦¦¦¦¦
                  ¦¦¦  ¦¦¦¦¦¦
                   ¦ ¦¦¦¦¦¦

                    ¦¦  ¦ ¦¦¦¦
                    ¦¦    ¦¦¦¦
                    ¦¦  ¦ ¦¦¦¦
                   ¦¦¦  ¦ ¦¦¦¦¦
                ¦¦¦¦    ¦ ¦¦¦¦¦¦¦¦
             ¦¦¦¦¦    ¦ ¦¦ ¦¦¦¦¦¦¦¦¦¦
          ¦¦¦¦¦       ¦  ¦   ¦¦¦¦¦¦¦¦¦¦¦
        ¦¦¦¦         ¦        ¦¦¦¦¦¦¦¦¦¦¦¦
     ¦¦¦¦          ¦      ¦    ¦¦¦¦¦¦¦¦¦¦¦¦¦¦
    ¦¦¦         ¦¦         ¦   ¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦
   ¦¦        ¦¦         ¦¦  ¦   ¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦
  ¦¦       ¦          ¦ ¦¦   ¦  ¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦
 ¦¦¦     ¦¦          ¦   ¦    ¦  ¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦
¦¦¦     ¦          ¦      ¦   ¦¦ ¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦
¦¦¦    ¦        ¦¦         ¦¦  ¦ ¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦
¦¦¦   ¦¦     ¦¦         ¦   ¦  ¦ ¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦
¦¦¦   ¦     ¦¦         ¦¦¦   ¦ ¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦
 ¦¦   ¦¦    ¦        ¦    ¦  ¦ ¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦
 ¦¦    ¦   ¦        ¦¦    ¦  ¦ ¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦
  ¦¦    ¦  ¦¦       ¦     ¦  ¦ ¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦
   ¦¦    ¦  ¦      ¦      ¦  ¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦
    ¦¦¦   ¦ ¦¦     ¦¦     ¦  ¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦
     ¦¦¦   ¦ ¦¦     ¦¦    ¦ ¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦
       ¦¦¦¦  ¦ ¦¦    ¦  ¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦
          ¦¦¦¦¦¦  ¦¦  ¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦
             ¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦
                        ¦¦

.
TorCoin.....
¦
¦
¦
¦
  Fully Anonymous TOR-integrated Crypto
               ¦ Windows     ¦ Linux     ¦ GitHub     ¦ macOS
     ¦
     ¦
     ¦
     ¦
.
   ANN THREAD
     ¦
     ¦
     ¦
     ¦
[/center]
StarfishPrime
Sr. Member
****
Offline Offline

Activity: 358
Merit: 250


View Profile
September 14, 2013, 03:48:13 PM
 #8

'After the last week report that the National Security Agency has leveraged its cooperative relationships with specific industry partners to insert vulnerabilities into Internet security products.'

And none of them are open source. which is the point. bitcoin is open source. if it wasn't, it would be dead in the water.

Unfortunately there's no guarantee or requirement that bitcoin clients, online wallets, paper wallet generators etc. use verified, open source random number generation instead of some generic Windows or Android SDK "random()" function.
 

                         
    ¦                     
  ¦    ¦¦¦               
¦¦  ¦¦¦¦                 
                             ¦¦  ¦¦¦¦
                          ¦ ¦¦ ¦¦¦¦                     
                         ¦¦¦¦¦¦¦¦
                        ¦¦¦¦¦¦¦
                        ¦¦¦¦¦¦
                  ¦¦¦  ¦¦¦¦¦¦
                   ¦ ¦¦¦¦¦¦

                    ¦¦  ¦ ¦¦¦¦
                    ¦¦    ¦¦¦¦
                    ¦¦  ¦ ¦¦¦¦
                   ¦¦¦  ¦ ¦¦¦¦¦
                ¦¦¦¦    ¦ ¦¦¦¦¦¦¦¦
             ¦¦¦¦¦    ¦ ¦¦ ¦¦¦¦¦¦¦¦¦¦
          ¦¦¦¦¦       ¦  ¦   ¦¦¦¦¦¦¦¦¦¦¦
        ¦¦¦¦         ¦        ¦¦¦¦¦¦¦¦¦¦¦¦
     ¦¦¦¦          ¦      ¦    ¦¦¦¦¦¦¦¦¦¦¦¦¦¦
    ¦¦¦         ¦¦         ¦   ¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦
   ¦¦        ¦¦         ¦¦  ¦   ¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦
  ¦¦       ¦          ¦ ¦¦   ¦  ¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦
 ¦¦¦     ¦¦          ¦   ¦    ¦  ¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦
¦¦¦     ¦          ¦      ¦   ¦¦ ¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦
¦¦¦    ¦        ¦¦         ¦¦  ¦ ¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦
¦¦¦   ¦¦     ¦¦         ¦   ¦  ¦ ¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦
¦¦¦   ¦     ¦¦         ¦¦¦   ¦ ¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦
 ¦¦   ¦¦    ¦        ¦    ¦  ¦ ¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦
 ¦¦    ¦   ¦        ¦¦    ¦  ¦ ¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦
  ¦¦    ¦  ¦¦       ¦     ¦  ¦ ¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦
   ¦¦    ¦  ¦      ¦      ¦  ¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦
    ¦¦¦   ¦ ¦¦     ¦¦     ¦  ¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦
     ¦¦¦   ¦ ¦¦     ¦¦    ¦ ¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦
       ¦¦¦¦  ¦ ¦¦    ¦  ¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦
          ¦¦¦¦¦¦  ¦¦  ¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦
             ¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦
                        ¦¦

.
TorCoin.....
¦
¦
¦
¦
  Fully Anonymous TOR-integrated Crypto
               ¦ Windows     ¦ Linux     ¦ GitHub     ¦ macOS
     ¦
     ¦
     ¦
     ¦
.
   ANN THREAD
     ¦
     ¦
     ¦
     ¦
[/center]
ArticMine
Legendary
*
Offline Offline

Activity: 2282
Merit: 1050


Monero Core Team


View Profile
September 15, 2013, 12:05:49 AM
Last edit: September 15, 2013, 05:12:07 AM by ArticMine
 #9

Quote
Encryption works. Properly implemented strong crypto systems are one of the few things that you can rely on. Unfortunately, endpoint security is so terrifically weak that NSA can frequently find ways around it.
Edward Snowden http://www.theguardian.com/world/2013/jun/17/edward-snowden-nsa-files-whistleblower

I prefer to go directly to the source. So what are the endpoints here? For most people the endpoints are:
1) A Microsoft Windows computer (or even far worse a Windows 8 RT device). Note: Early versions of Microsoft Windows such as Windows 3.1 or Windows NT may be fine.
2) A mobile device running  IOS
3) A mobile device running unrooted Android
4) A MacOS computer. It is possible this is a low risk in a propriety OS; however Apple's strong support for lockdown in IOS means that MacOS should not be trusted also

The backdoors are likely in blobs of propriety code in a propriety OS or in add on propriety applications such as CarrierIQ http://en.wikipedia.org/wiki/Carrier_IQ that require root to remove in Android. One must also keep in mind that modern Windows Operating Systems and IOS are designed  from the ground up to lock out the owner of the device from key parts of the OS in order to implement DRM. So the same DRM components in the OS can be used to create all sorts of backdoors outside the device owner's control.

To understand how DRM is so intimately related to back doors on only needs to look at the recent Android vulnerability that was recently used to steal Bitcoins. The vulnerability in Android was detected and Google issued a patch. So far so good, but what happens if the device manufacturer or the telco does not push the patch to the end users? If the device is not rooted the vulnerability remains. If the owner of the device takes back control and roots the device then the owner can secure the device, by installing the patch, and prevent the Bitcoin theft. This however brakes the DRM in the device and makes the MPAA, RIAA and other copyright holders vulnerable to piracy by the device owner.

The choice to me here is very simple, secure Bitcoins, or full DRM support in the OS but not both. I use GNU / Linux for my Bitcoins for this very simple reason and can sleep well at night knowing that the GPL v3 code deep within GNU / Linux helps keep my Bitcoins safe.

Concerned that blockchain bloat will lead to centralization? Storing less than 4 GB of data once required the budget of a superpower and a warehouse full of punched cards. https://upload.wikimedia.org/wikipedia/commons/8/87/IBM_card_storage.NARA.jpg https://en.wikipedia.org/wiki/Punched_card
StarfishPrime
Sr. Member
****
Offline Offline

Activity: 358
Merit: 250


View Profile
September 15, 2013, 06:37:41 PM
 #10

The choice to me here is very simple, secure Bitcoins, or full DRM support in the OS but not both. I use GNU / Linux for my Bitcoins for this very simple reason and can sleep well at night knowing that the GPL v3 code deep within GNU / Linux helps keep my Bitcoins safe.

+1

                         
    ¦                     
  ¦    ¦¦¦               
¦¦  ¦¦¦¦                 
                             ¦¦  ¦¦¦¦
                          ¦ ¦¦ ¦¦¦¦                     
                         ¦¦¦¦¦¦¦¦
                        ¦¦¦¦¦¦¦
                        ¦¦¦¦¦¦
                  ¦¦¦  ¦¦¦¦¦¦
                   ¦ ¦¦¦¦¦¦

                    ¦¦  ¦ ¦¦¦¦
                    ¦¦    ¦¦¦¦
                    ¦¦  ¦ ¦¦¦¦
                   ¦¦¦  ¦ ¦¦¦¦¦
                ¦¦¦¦    ¦ ¦¦¦¦¦¦¦¦
             ¦¦¦¦¦    ¦ ¦¦ ¦¦¦¦¦¦¦¦¦¦
          ¦¦¦¦¦       ¦  ¦   ¦¦¦¦¦¦¦¦¦¦¦
        ¦¦¦¦         ¦        ¦¦¦¦¦¦¦¦¦¦¦¦
     ¦¦¦¦          ¦      ¦    ¦¦¦¦¦¦¦¦¦¦¦¦¦¦
    ¦¦¦         ¦¦         ¦   ¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦
   ¦¦        ¦¦         ¦¦  ¦   ¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦
  ¦¦       ¦          ¦ ¦¦   ¦  ¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦
 ¦¦¦     ¦¦          ¦   ¦    ¦  ¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦
¦¦¦     ¦          ¦      ¦   ¦¦ ¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦
¦¦¦    ¦        ¦¦         ¦¦  ¦ ¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦
¦¦¦   ¦¦     ¦¦         ¦   ¦  ¦ ¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦
¦¦¦   ¦     ¦¦         ¦¦¦   ¦ ¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦
 ¦¦   ¦¦    ¦        ¦    ¦  ¦ ¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦
 ¦¦    ¦   ¦        ¦¦    ¦  ¦ ¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦
  ¦¦    ¦  ¦¦       ¦     ¦  ¦ ¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦
   ¦¦    ¦  ¦      ¦      ¦  ¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦
    ¦¦¦   ¦ ¦¦     ¦¦     ¦  ¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦
     ¦¦¦   ¦ ¦¦     ¦¦    ¦ ¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦
       ¦¦¦¦  ¦ ¦¦    ¦  ¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦
          ¦¦¦¦¦¦  ¦¦  ¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦
             ¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦¦
                        ¦¦

.
TorCoin.....
¦
¦
¦
¦
  Fully Anonymous TOR-integrated Crypto
               ¦ Windows     ¦ Linux     ¦ GitHub     ¦ macOS
     ¦
     ¦
     ¦
     ¦
.
   ANN THREAD
     ¦
     ¦
     ¦
     ¦
[/center]
bitsalame
Donator
Hero Member
*
Offline Offline

Activity: 714
Merit: 510


Preaching the gospel of Satoshi


View Profile
September 16, 2013, 01:25:46 AM
Last edit: September 16, 2013, 02:26:38 AM by bitsalame
 #11

there is no backdoor in a open discussed algorithm

Well, it is really hard to be categorical in saying that there is NO backdoor in open source AT ALL.
Actually being open can allows an army of programmers posing as contributors attempting to introduce a carefully crafted glitch with plausible deniability in mind that could go undetected for a while.

So it is not really impossible, but way more complicated demanding a lot of planning and effort.
The hard part in an algorithm I guess is to be able to convince people that a bad idea is actually a good one.
So I guess that instead of messing with an open algorithm, it would be easier to be messing up with its implementation.

@ArticMine Very insightful. DRMs could be NSA's secret weapons. It would make a lot of sense actually, I always thought that the RIAA and the MPAA had a ridiculous amount of power for mere creative and commercial rights. Especially considering the shady and aggressive tactics to implement DRMs such as the infamous Sony Rootkit.
Dabs
Legendary
*
Offline Offline

Activity: 3416
Merit: 1912


The Concierge of Crypto


View Profile
September 16, 2013, 01:45:33 AM
 #12

People reverse engineer closed sourced apps and tools all the time. Open source makes it a lot easier to dissect something.

There is no backdoor in SHA-2.

The NSA also contributed to the s-box design of DES a long time ago, and it was discovered that they actually strengthened it against differential cryptanalysis.

ArticMine
Legendary
*
Offline Offline

Activity: 2282
Merit: 1050


Monero Core Team


View Profile
September 16, 2013, 03:03:58 AM
 #13

there is no backdoor in a open discussed algorithm

Well, it is really hard to be categorical in saying that there is NO backdoor in open source AT ALL.
Actually being open can allows an army of programmers posing as contributors attempting to introduce a carefully crafted glitch with plausible deniability in mind that could go undetected for a while.

So it is not really impossible, but way more complicated demanding a lot of planning and effort.
The hard part in an algorithm I guess is to be able to convince people that a bad idea is actually a good one.
So I guess that instead of messing with an open algorithm, it would be easier to be messing up with its implementation.

@ArticMine Very insightful. DRMs could be NSA's secret weapons. It would make a lot of sense actually, I always thought that the RIAA and the MPAA had a ridiculous amount of power for mere creative and commercial rights. Especially considering the shady and aggressive tactics to implement DRMs such as the infamous Sony Rootkit.

There is actually a very good case for DRM as an NSA secret weapon. The following NSA document from the Snowden leaks: http://cryptome.org/2013/09/nsa-sigint-enabling-propublica-13-0905.pdf refers in the first paragraph to
Quote
... the consumer and other adversaries ...
with no mention on the other hand of adversaries such as "terrorists" or "foreign governments". This begs the question: In which widespread application of cryptography is the consumer the primary adversary? The answer of course is DRM. The other thing to keep in mind is that between 2001 and 2006 Microsoft spent billions of USD in order to rewrite major parts of Windows. This was ostensibly in order to perform the complete lockdown of the operating system required to support high definition content protection (HDCP) a form of DRM required as part of the Blu-ray specification. Microsoft paid a very high financial price for this so a purely commercial justification is very hard to find here. The move between XP and Vista was a very significant step in the gradual road between the very open nature of Microsoft Windows in the 1990s and the complete lockdown with DRM of Windows 8 RT today.

The Sony rootkit of 2005 http://en.wikipedia.org/wiki/Sony_BMG_copy_protection_rootkit_scandal was very significant because it illustrated very clearly the very close relationship between malware and DRM. In reality they are both trying to solve the same problem with the same adversary, so it is hardly surprising that they would use very similar techniques or that one can be a vector for the other.

Concerned that blockchain bloat will lead to centralization? Storing less than 4 GB of data once required the budget of a superpower and a warehouse full of punched cards. https://upload.wikimedia.org/wikipedia/commons/8/87/IBM_card_storage.NARA.jpg https://en.wikipedia.org/wiki/Punched_card
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!