Slashdot: John Gilmore Analyzes NSA Obstruction of Crypto In IPSEC
Scott Elcomb
psema4-Re5JQEeQqe8AvxtiuMwx3w at public.gmane.org
Mon Sep 9 02:28:29 UTC 2013
On Sun, Sep 8, 2013 at 9:42 PM, William Muriithi
<william.muriithi-Re5JQEeQqe8AvxtiuMwx3w at public.gmane.org> wrote:
> Imagine every connection from IPv6 being encrypted by default,
> isn't that kind of cute?
Not really. I've been seeing quite a number of posts on several
mailing lists the last few days regarding broken encryption. Some
sample articles:*
Tor:
<http://boingboing.net/2013/09/07/90-percent-of-tor-keys-can-be.html>
<http://techcrunch.com/2013/09/07/the-nsa-can-read-some-encrypted-tor-traffic/>
<http://arstechnica.com/security/2013/09/majority-of-tor-crypto-keys-could-be-broken-by-nsa-researcher-says/>
SSL:
<http://www.zdnet.com/has-the-nsa-broken-ssl-tls-aes-7000020312/>
<http://www.extremetech.com/computing/165849-nsa-and-gchq-have-broken-internet-encryption-created-backdoors-that-anyone-could-use>
<http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security>
I'm not a security specialist and don't feel competent enough to
comment - other than to say that I suppose it's still better to use
encryption than not, and that I don't have much faith left for widely
used schemes.
Best,
- Scott.
* 3 recent articles for each, from first page of Google Search results
(on "Tor Broken" & "SSL Broken" respectively). There are plenty of
other sources discussing these though.
--
Scott Elcomb
@psema4 on Twitter / Identi.ca / Github & more
Atomic OS: Self Contained Microsystems
http://code.google.com/p/atomos/
Member of the Pirate Party of Canada
http://www.pirateparty.ca/
--
The Toronto Linux Users Group. Meetings: http://gtalug.org/
TLUG requests: Linux topics, No HTML, wrap text below 80 columns
How to UNSUBSCRIBE: http://gtalug.org/wiki/Mailing_lists
More information about the Legacy
mailing list