Welcome to DU! The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards. Join the community: Create a free account Support DU (and get rid of ads!): Become a Star Member Latest Breaking News General Discussion The DU Lounge All Forums Issue Forums Culture Forums Alliance Forums Region Forums Support Forums Help & Search

leveymg

(36,418 posts)
31. Decryptions RUs. What may be difficult is decryption of distributed source messages - the
Sat Jun 8, 2013, 01:05 PM
Jun 2013

Last edited Sat Jun 8, 2013, 03:11 PM - Edit history (1)

most compelling NSA arguments for universal interception and storage is the practice by sophisticated adversaries of enslaving many computers with trojans and using each to transmit only tiny partial bursts of encrypted messages.

If you can't read the entire network of slave computers, you won't crack the message, or so the argument goes.

Personally, I find this a compelling technical argument for NSA interception and storage, but I don't think it's necessary to profile everyone to manage this sort of decryption task. The claims that are being made for PRISM efficacy are very weak compared to the costs in public revenue and lost privacy of universal profiling. Please, see, http://www.buzzfeed.com/bensmith/public-documents-contradict-claim-email-spying-foiled-terror

but, but, but.... boston bean Jun 2013 #1
So, in other words, the companies claims that there is "no direct server access" is just double-talk leveymg Jun 2013 #2
Link to the NY Times article: Tech Companies Concede to Surveillance Program Luminous Animal Jun 2013 #3
"Communications with foreign persons" includes most American adults, particularly in business. leveymg Jun 2013 #4
We communicate with foreign persons right here on DU. Luminous Animal Jun 2013 #5
Precisely, even though no warrant or order is required to monitor this place. leveymg Jun 2013 #6
I'd be really surprised if DU hasn't been subpoenaed for some poster's identity information FarCenter Jun 2013 #15
I recall that has been remarked on. But, the chilling effect on DU Admin is the point, here's why: leveymg Jun 2013 #16
Routes are updated periodically, and they change, so it is not that simple FarCenter Jun 2013 #18
I'm sure NSA can navigate through the Innertubes. Frontwards and backwards. leveymg Jun 2013 #21
Routes change periodically, but this happens in mid-stream (peering points) DisgustipatedinCA Jun 2013 #22
The ISPs all must have CALEA-compliant switches. NSA controls those remotely. leveymg Jun 2013 #24
Presumably they still need court-ordered SSL keys to decrypt 443 traffic DisgustipatedinCA Jun 2013 #27
Decryptions RUs. What may be difficult is decryption of distributed source messages - the leveymg Jun 2013 #31
Google "what is my ip" and google will tell you what public address you are coming from FarCenter Jun 2013 #26
Right. I think we're in agreement on this. DisgustipatedinCA Jun 2013 #28
Sounds like they use EDI... or something similar... Ohio Joe Jun 2013 #7
A structured data interchange might be fine for metadata, but not for images or audio. leveymg Jun 2013 #8
EDI can send any type of data Ohio Joe Jun 2013 #9
But, it does acknowledge that the companies are delivering data, and aren't in the dark about PRISM, leveymg Jun 2013 #10
Yes, data is being delivered... Ohio Joe Jun 2013 #11
If the Verizon order is representative, it could be ALL data, including strictly domestic communic- leveymg Jun 2013 #12
I agree, it "Could be" Ohio Joe Jun 2013 #13
The on-line order form tells NSA what books are being ordered from Bezos shop, the CC info, brick leveymg Jun 2013 #17
Assuming that is the data being sent... Ohio Joe Jun 2013 #20
Look at the schematic and tell me why MS was the first to be brought into PRISM leveymg Jun 2013 #23
oh... There is a claim on a ramdom internet picture... Ohio Joe Jun 2013 #25
well nebenaube Jun 2013 #30
Here's a clue: that's a slide from an classified NSA Powerpoint, not "a random internet picture" leveymg Jun 2013 #37
Here is a clue... No, it does not Ohio Joe Jun 2013 #38
on the other hand... nebenaube Jun 2013 #29
No, delivery method and a 'backdoor' have nothing to do with each other... Ohio Joe Jun 2013 #33
if nebenaube Jun 2013 #34
And why would that happen? Ohio Joe Jun 2013 #35
You are too literal to truely function... nebenaube Jun 2013 #39
I am not too literal, you are having some different conversation Ohio Joe Jun 2013 #40
No lockbox for Social Security, but a lockbox for blanket surveillance suffragette Jun 2013 #14
That's exactly the point. If we're insecure enough, we won't demand Social Security. leveymg Jun 2013 #19
Yes, and the money keeps being siphoned from programs that provide actual security for us suffragette Jun 2013 #36
This should make you feel better. For every lockbox their is a lock........... wandy Jun 2013 #32
Latest Discussions»General Discussion»REPORT: Big Tech Working ...»Reply #31