TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

On Encryption

40 点作者 mtoledo超过 11 年前

6 条评论

tptacek超过 11 年前
I would not make the assumption that 1024 bit conventional Diffie Hellman is safe.
评论 #6356254 未加载
stock_toaster超过 11 年前
<p><pre><code> &gt; We will also be adding support for something no other provider is currently offering called Elliptic Curve Cryptographic security, with both 256bit and 521bit curves. </code></pre> Any particular reason to not offer 384bit as well?<p>ps. likely a typo: 521 should be 512?<p>edit: Nope. 521 is correct[1]. thanks @mtoledo<p>[1]: <a href="https://en.wikipedia.org/wiki/Elliptic_curve_cryptography#cite_note-24" rel="nofollow">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Elliptic_curve_cryptography#ci...</a>
评论 #6356652 未加载
评论 #6356656 未加载
SilliMon超过 11 年前
If I were the NSA, I would run these VPN services.<p>They provide a perfect honeypot to gather the &quot;illegal&quot; web users or those with something to hide, in one place.
评论 #6358493 未加载
junto超过 11 年前
If I was the NSA I&#x27;d force&#x2F;put some piece of network hardware that mirrored all VPN traffic exiting PIA&#x27;s endpoints. I would assume that the US, UK and DE endpoints might be monitored without PIA&#x27;s knowledge (unless they own the data centre and&#x2F;or upstream provider?).<p>Then it is fairly simple to start pattern matching the unencrypted traffic exiting your endpoints by matching HTTP headers for each client. Then all they would need is for a VPN user to acces a website that leaks the user&#x27;s identity and you can back match their previous traffic.<p>For example, you search for information on &quot;how to make a bomb&quot; via the VPN. Your browser sends the the HTTP headers, Accept-Language set to Accept-Language: ar-YE,en-US,fr-FR,de-DE;q=0.5 and a user agent of Mozilla&#x2F;5.0 (Windows NT 6.2; Win64; x64; rv:21.0.0) Gecko&#x2F;20121011 Firefox&#x2F;21.0.0. Those HTTP headers aren&#x27;t unique, but they vastly narrow the search scope.<p>Now as that user you visit your Facebook page, and those same matching HTTP headers are passed. Boom, you&#x27;ve just leaked your true identity.
vezzy-fnord超过 11 年前
This is somewhat of a red herring. It&#x27;s more feasible for the NSA to attack from a side channel, and with their influence that&#x27;s what they&#x27;ve been doing. No doubt they may have optimized some attacks on already previously weakened ciphers (such as RC4), but there&#x27;s so many other links to strike.
nly超过 11 年前
I&#x27;d be interested to hear what VPN providers are doing in terms of physical security and the risk of key theft&#x2F;infiltration.