TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

On the new Snowden documents

199 pointsby donmccover 10 years ago

6 comments

AlyssaRowanover 10 years ago
Snowden pretty much had <i>root</i> - he had access to more or less everything that wasn&#x27;t airgapped, including things the NSA wasn&#x27;t supposed to have direct access to as part of their data-sharing agreements. (Of course, some ECIs presumably <i>are</i> airgapped - but <i>much</i> less than you probably expect these days.)<p>Not everything is being published, however. There are details from GCHQ STRAP3 (location of individual listening sites) but only STRAP2 documents, and all details of personnel and telephone numbers has been redacted by the journalists (perhaps a little too broadly - for example as in the GCHQ &quot;refer requests for disclosure to&quot; telephone number, you could actually Google it! I think they know by now, however &lt;g&gt;). Snowden wanted to end mass surveillance and sabotage of public security products; not reveal their cryptanalytic advantage to targets. It&#x27;s the journalists who are doing most of the selection, I gather - but they&#x27;ve seen the whole haul, including what is <i>not</i> being published, and the picture is consistent, though (yes) incomplete.<p>My impression has been for some time that their cryptanalytic advantage is not actually vast, but their operational resources truly are. Throwing money at things doesn&#x27;t magically give you breaks to the DLP - but it totally can buy you computing resources that can break 1024-bit Diffie-Hellman. (It mentions Cavium cores - suggesting large, parallel RSA&#x2F;DH-optimised multipliers were on their HPC shopping list. They are much faster at 1024-bit than higher.) It can buy you insiders, or let you conduct operations that threaten or coerce insiders, or conduct astroturfing campaigns to frighten people away from encryption you can&#x27;t break, or further the goals of your agency (which do not necessarily align with the government paying your way - it&#x27;s not so much &quot;oversight&quot; as &quot;don&#x27;t get caught doing anything you shouldn&#x27;t&quot;). You can throw (a lot of) money at military contractors and hope some malware-by-committee comes out that you can use to hack anyone that looks interesting, grab intelligence or keys, or any of the above. And they typically attack from <i>every</i> angle at once.<p>My take on the HPC resources is that they&#x27;re mostly used as brute force CPU&#x2F;GPU power for low-entropy situations - anything where passwords are involved may be vulnerable. Email an encrypted DOC, ZIP or RAR file to someone? They&#x27;re going to at least <i>try</i> it as a matter of course, even <i>en masse</i>, but they&#x27;re not going to give it much juice unless you&#x27;re tasked.<p>Money can&#x27;t give you magic. However you very, very rarely need magic.
评论 #8815006 未加载
huhtenbergover 10 years ago
One thing to keep in mind.<p>It&#x27;s inherently dangerous to assume that NSA doesn&#x27;t pay much of attention to the breaking of fundamental crypto math based on these documents.<p>If they <i>did</i> find a practical weakness in RSA and such, I think it&#x27;s safe to assume it would be assigned the highest level of secrecy and simply won&#x27;t be in range of Snowden&#x27;s document sweep.
评论 #8815416 未加载
评论 #8814176 未加载
diminotenover 10 years ago
Overall I&#x27;d like to commend the writer of this document on what has been by far the most neutral writing I&#x27;ve ever seen on this topic. The writer still takes jabs at the NSA here and there (NSA and Tor, for example), but generally the tone is very neutral.
评论 #8816350 未加载
jostmeyover 10 years ago
I find the story very telling. The NSA is one of the largest employers of mathematicians, and yet it appears that the NSA has had more success simply by using backdoors.<p>I have to wonder if academic progress (like defeating cryptographic algorithms) can be achieved under a climate of secrecy. Without the free exchange of ideas and knowledge, how much progress can be had?
评论 #8816275 未加载
diminotenover 10 years ago
I wonder why the writer claims the recommendations of the presidential review council have been &quot;largely disregarded&quot;. Do we know that&#x27;s the case?
nlover 10 years ago
<i>During the period in question, we know of at least one vulnerability (Heartbleed) that could have been used to extract private keys from software TLS implementations. There are still other, unreported vulnerabilities that could be used today.</i><p>His analysis that there are unreported vulnerabilities in TLS implementations sounds definitive enough to think he knows some of these vulnerabilities.
评论 #8813975 未加载