Welcome to DU!
The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards.
Join the community:
Create a free account
Support DU (and get rid of ads!):
Become a Star Member
Latest Breaking News
General Discussion
The DU Lounge
All Forums
Issue Forums
Culture Forums
Alliance Forums
Region Forums
Support Forums
Help & Search
General Discussion
Related: Editorials & Other Articles, Issue Forums, Alliance Forums, Region ForumsNSA: All your encrypted emails & logins belong to us.
After the NSA accidentally captures an email between two Americans...
...The simple fact that the data is encrypted and that the NSA wants to crack it may be enough to let the agency keep it indefinitely.
...In other words, privacy advocates may be facing a nasty Catch-22: Fail to encrypt your communications, and theyre vulnerable to any eavesdroppers surveillance. But encrypt them, and they become legally subject to eavesdropping by the most powerful surveillance agency in the world.
http://www.forbes.com/sites/andygreenberg/2013/06/20/leaked-nsa-doc-says-it-can-collect-and-keep-your-encrypted-data-as-long-as-it-takes-to-crack-it/?partner=yahootix
InfoView thread info, including edit history
TrashPut this thread in your Trash Can (My DU » Trash Can)
BookmarkAdd this thread to your Bookmarks (My DU » Bookmarks)
7 replies, 1194 views
ShareGet links to this post and/or share on social media
AlertAlert this post for a rule violation
PowersThere are no powers you can use on this post
EditCannot edit other people's posts
ReplyReply to this post
EditCannot edit other people's posts
Rec (19)
ReplyReply to this post
7 replies
= new reply since forum marked as read
Highlight:
NoneDon't highlight anything
5 newestHighlight 5 most recent replies
NSA: All your encrypted emails & logins belong to us. (Original Post)
Eric J in MN
Jun 2013
OP
napoleon_in_rags
(3,991 posts)1. We should find out the policy on steganography.
http://en.wikipedia.org/wiki/Steganography
Searching for steganography in unecrypted mail could make it subject too, could it not? In that context, probably better to go with the encryption, at least SSL or whatever.
edit: Answered by Wired
http://www.wired.com/threatlevel/2013/06/five-fun-facts-on-the-nsa-leak/
So its lumped in with the encrypted stuff.
Searching for steganography in unecrypted mail could make it subject too, could it not? In that context, probably better to go with the encryption, at least SSL or whatever.
edit: Answered by Wired
Per the document: In the context of a cryptanalytic effort, maintenance of technical data bases requires retention of all communications that are enciphered or reasonably believed to contain secret meaning, and sufficient duration may consist of any period of time during which encrypted material is subject to, or of use in, cryptanalysis.
http://www.wired.com/threatlevel/2013/06/five-fun-facts-on-the-nsa-leak/
So its lumped in with the encrypted stuff.
Kennah
(14,352 posts)2. I just send encrypted porn
The Internet is for porn
The Internet is for porn
Porn, porn, porn, porn
The Internet is for porn
Pholus
(4,062 posts)3. Sounds like "somebody" doesn't have enough real work to do...
I'm wondering if it's worthwhile to start attaching encrypted images to each and every email just to make sure my tax dollars are used instead of wasted.
Perhaps a collection of my old soviet jokes, with the punchlines updated to the NSA/CIA would be a lovely gift for them.
ThoughtCriminal
(14,050 posts)4. I think I'll email a few terrabytes of encrypted random numbers
just to keep them busy for the next few decades.
jazzimov
(1,456 posts)5. ONLY if the Director submits IN WRITING
that the encrypted information is necessary for cryptanalysis.
Jarla
(156 posts)6. Then what do they mean by ALL?
Section 5(3)a:
In the context of a cryptanalytic effort, maintenance of technical data bases
requires retention of all communications that are enciphered or reasonably
believed to contain secret meaning, and sufficient duration may consist of any
period of time during which material is subject to, or of use in cryptanalysis.
In the context of a cryptanalytic effort, maintenance of technical data bases
requires retention of all communications that are enciphered or reasonably
believed to contain secret meaning, and sufficient duration may consist of any
period of time during which material is subject to, or of use in cryptanalysis.
Th1onein
(8,514 posts)7. Hey! Are you a rascist? nt