TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

On Encryption

40 pointsby mtoledoover 11 years ago

6 comments

tptacekover 11 years ago
I would not make the assumption that 1024 bit conventional Diffie Hellman is safe.
评论 #6356254 未加载
stock_toasterover 11 years ago
<p><pre><code> &gt; We will also be adding support for something no other provider is currently offering called Elliptic Curve Cryptographic security, with both 256bit and 521bit curves. </code></pre> Any particular reason to not offer 384bit as well?<p>ps. likely a typo: 521 should be 512?<p>edit: Nope. 521 is correct[1]. thanks @mtoledo<p>[1]: <a href="https://en.wikipedia.org/wiki/Elliptic_curve_cryptography#cite_note-24" rel="nofollow">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Elliptic_curve_cryptography#ci...</a>
评论 #6356652 未加载
评论 #6356656 未加载
SilliMonover 11 years ago
If I were the NSA, I would run these VPN services.<p>They provide a perfect honeypot to gather the &quot;illegal&quot; web users or those with something to hide, in one place.
评论 #6358493 未加载
juntoover 11 years ago
If I was the NSA I&#x27;d force&#x2F;put some piece of network hardware that mirrored all VPN traffic exiting PIA&#x27;s endpoints. I would assume that the US, UK and DE endpoints might be monitored without PIA&#x27;s knowledge (unless they own the data centre and&#x2F;or upstream provider?).<p>Then it is fairly simple to start pattern matching the unencrypted traffic exiting your endpoints by matching HTTP headers for each client. Then all they would need is for a VPN user to acces a website that leaks the user&#x27;s identity and you can back match their previous traffic.<p>For example, you search for information on &quot;how to make a bomb&quot; via the VPN. Your browser sends the the HTTP headers, Accept-Language set to Accept-Language: ar-YE,en-US,fr-FR,de-DE;q=0.5 and a user agent of Mozilla&#x2F;5.0 (Windows NT 6.2; Win64; x64; rv:21.0.0) Gecko&#x2F;20121011 Firefox&#x2F;21.0.0. Those HTTP headers aren&#x27;t unique, but they vastly narrow the search scope.<p>Now as that user you visit your Facebook page, and those same matching HTTP headers are passed. Boom, you&#x27;ve just leaked your true identity.
vezzy-fnordover 11 years ago
This is somewhat of a red herring. It&#x27;s more feasible for the NSA to attack from a side channel, and with their influence that&#x27;s what they&#x27;ve been doing. No doubt they may have optimized some attacks on already previously weakened ciphers (such as RC4), but there&#x27;s so many other links to strike.
nlyover 11 years ago
I&#x27;d be interested to hear what VPN providers are doing in terms of physical security and the risk of key theft&#x2F;infiltration.