New Documents Reveal Which Encryption Tools The NSA Couldn't CrackThe VergeDec. 29, 2014 |
Mike Johnson Pushes Debunked Lie That Israeli Babies Were 'Cooked in Ovens' On October 7
'Sniper Seen on Roof Overlooking Pro-Palestine Protest' at Indiana University
'It Has to Be Stopped': Netanyahu Demands Pro-Palestine Protests at U.S. Colleges Be Shut Down
'These Protesters Belong in Jail': Gov. Abbott Cheers Arrest of Pro-Palestine Protesters at UT Austin
Claim Jewish Student Was 'Stabbed In The Eye' by Pro-Palestine Protester Draws Mockery After Video Released
The most impressive news to come out of the dump is that, as of 2012, certain emails and chats were still indecipherable by the NSA database when they had been encrypted with the right tools. Reports describe "major problems" following users across the Tor network, or deciphering messages sent through heavily encrypted email providers like Zoho. The agency reported similar problems when deciphering files that had been encrypted with TrueCrypt, an open-source disk-encryption program that was discontinued earlier this year. PGP encryption tools and OTR chat encryption also caused major problems for the agency, causing entire messages to disappear from the system, leaving only the message: "No decrypt available for this PGP encrypted message." Not every service fared so well. Following a particular file across the web is marked as "trivial," while decrypting emails sent through the Russian mail service "Mail.ru" is marked as "moderate." Virtual private networks also offer little protection: documents show the NSA planning the capacity to surveil 20,000 VPN connections per hour. Perhaps most alarming, the NSA seems to have completely circumvented the HTTPS system, which is used to secure connections between websites and browsers. By late 2012, the agency expected to be able to intercept 10 million HTTPS connections per day. Read More |