Slashdot: John Gilmore Analyzes NSA Obstruction of Crypto In IPSEC

Scott Elcomb psema4-Re5JQEeQqe8AvxtiuMwx3w at public.gmane.org
Mon Sep 9 02:28:29 UTC 2013


On Sun, Sep 8, 2013 at 9:42 PM, William Muriithi
<william.muriithi-Re5JQEeQqe8AvxtiuMwx3w at public.gmane.org> wrote:
> Imagine every connection from IPv6 being encrypted by default,
> isn't that kind of cute?

Not really.  I've been seeing quite a number of posts on several
mailing lists the last few days regarding broken encryption.  Some
sample articles:*

Tor:
<http://boingboing.net/2013/09/07/90-percent-of-tor-keys-can-be.html>
<http://techcrunch.com/2013/09/07/the-nsa-can-read-some-encrypted-tor-traffic/>
<http://arstechnica.com/security/2013/09/majority-of-tor-crypto-keys-could-be-broken-by-nsa-researcher-says/>

SSL:
<http://www.zdnet.com/has-the-nsa-broken-ssl-tls-aes-7000020312/>
<http://www.extremetech.com/computing/165849-nsa-and-gchq-have-broken-internet-encryption-created-backdoors-that-anyone-could-use>
<http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security>

I'm not a security specialist and don't feel competent enough to
comment - other than to say that I suppose it's still better to use
encryption than not, and that I don't have much faith left for widely
used schemes.

Best,
- Scott.


* 3 recent articles for each, from first page of Google Search results
(on "Tor Broken" & "SSL Broken" respectively).  There are plenty of
other sources discussing these though.

-- 
  Scott Elcomb
  @psema4 on Twitter / Identi.ca / Github & more

  Atomic OS: Self Contained Microsystems
  http://code.google.com/p/atomos/

  Member of the Pirate Party of Canada
  http://www.pirateparty.ca/
--
The Toronto Linux Users Group.      Meetings: http://gtalug.org/
TLUG requests: Linux topics, No HTML, wrap text below 80 columns
How to UNSUBSCRIBE: http://gtalug.org/wiki/Mailing_lists





More information about the Legacy mailing list