{"id":170364,"date":"2014-12-30T00:09:29","date_gmt":"2014-12-30T05:09:29","guid":{"rendered":"http:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/uncategorized\/nsa-docs-reveal-spy-proof-encryption-tools.php"},"modified":"2014-12-30T00:09:29","modified_gmt":"2014-12-30T05:09:29","slug":"nsa-docs-reveal-spy-proof-encryption-tools","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/nsa-2\/nsa-docs-reveal-spy-proof-encryption-tools.php","title":{"rendered":"NSA Docs Reveal Spy-Proof Encryption Tools"},"content":{"rendered":"<p><p>  New material leaked by Edward Snowden shows which Internet  security protocols the NSA had beaten as of 2012 and which  encryption tools were still stymying cyber spies.<\/p>\n<p>    Digital spies in the National Security Administration    cracked Skype's encryption back in 2011 and can make quick work    of the VPNs many businesses believe make their communications    secure.  <\/p>\n<p>    But more robust security protocols and encryption    techniques may still be secure from prying NSA eyes, according    to documents revealed by     former NSA contractor Edward Snowden.  <\/p>\n<p>    Der Spiegel has the rundown on the NSA's battle against    what its training documents described as the \"threat\" of secure    Internet communication. Snowden's documentation is several    years old now, of course. Whether or not U.S. cyber spies have    managed to crack some of the toughest nuts in the intervening    years, like Tor network communications, isn't known.  <\/p>\n<p>    First, the security layers that the NSA considered to be    \"trivial,\" \"minor,\" or \"moderate\" challenges to get through as    of 2012. These include such tasks as simply monitoring a    document as it travels across the Internet, spying on Facebook    chats, and decrypting mail.ru emails, according to the Snowden    documents.  <\/p>\n<p>    But there are others that NSA cryptologists have had a much    tougher time defeating, Der Spiegel noted, as documented    in their sorting of threats \"into five levels corresponding to    the degree of the difficulty of the attack and the outcome,    ranging from 'trivial' to a 'catastrophic.'\"  <\/p>\n<p>    \"Things first become troublesome at the fourth level,\"    according to Der Spiegel, which culled its report from a    specific NSA presentation on Internet security.  <\/p>\n<p>    As of 2012, the agency was having \"major problems in its    attempts to decrypt messages sent through heavily encrypted    email service providers like Zoho or in monitoring users of the    Tor network,\" the newspaper reported. Other \"major,\" or    fourth-level challenges included open-source protocols like    Truecrypt and OTR instant-messaging encryption.  <\/p>\n<p>    \"Experts agree it is far more difficult for intelligence    agencies to manipulate open source software programs than many    of the closed systems developed by companies like Apple and    Microsoft. Since anyone can view free and open source software,    it becomes difficult to insert secret back doors without it    being noticed,\" Der Spiegel noted.  <\/p>\n<p>    The toughest method of Internet communication for the NSA to    crack? It's not any one dark Internet tool but rather a bunch    of them layered on top of each other, according to the Snowden    documents.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Original post:<\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"http:\/\/www.pcmag.com\/article2\/0,2817,2474286,00.asp?kc=PCRSS03069TX1K0001121\/RK=0\/RS=_3XAj6afN2wV19rwp_JXrehxTd8-\" title=\"NSA Docs Reveal Spy-Proof Encryption Tools\">NSA Docs Reveal Spy-Proof Encryption Tools<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> New material leaked by Edward Snowden shows which Internet security protocols the NSA had beaten as of 2012 and which encryption tools were still stymying cyber spies.  <a href=\"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/nsa-2\/nsa-docs-reveal-spy-proof-encryption-tools.php\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"limit_modified_date":"","last_modified_date":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[261463],"tags":[],"class_list":["post-170364","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"modified_by":null,"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/170364"}],"collection":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/comments?post=170364"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/170364\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/media?parent=170364"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/categories?post=170364"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/tags?post=170364"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}