{"id":66245,"date":"2015-07-12T14:44:43","date_gmt":"2015-07-12T18:44:43","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/a-few-thoughts-on-cryptographic-engineering-on-the-nsa\/"},"modified":"2015-07-12T14:44:43","modified_gmt":"2015-07-12T18:44:43","slug":"a-few-thoughts-on-cryptographic-engineering-on-the-nsa","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/a-few-thoughts-on-cryptographic-engineering-on-the-nsa\/","title":{"rendered":"A Few Thoughts on Cryptographic Engineering: On the NSA"},"content":{"rendered":"<p><p>Let me tell you the story of my tiny brush with  the biggest   crypto story of the year.  <\/p>\n<p>    A few weeks ago I received a call from a reporter at ProPublica, asking me    background questions about encryption. Right off the bat I knew    this was going to be an odd conversation, since this gentleman    seemed convinced that the NSA had vast capabilities to defeat    encryption. And not in a 'hey,d'ya think the    NSA has vast capabilities to defeat encryption?' kind of    way.No, he'd already established the defeating. We    were just haggling over the details.  <\/p>\n<p>    Oddness aside it was a fun (if brief) set of conversations,    mostly involving hypotheticals. If the NSA could do this, how    might they do it? What would the impact be? I admit that at    this point one of my biggest concerns was to avoid coming off    like a crank. After all, if I got quoted soundingtoo    much like an NSA conspiracy nut, my colleagues would laugh    at me. Then I might not get invited to the cool security    parties.  <\/p>\n<p>    All of this is a long way of saying that I was totally    unprepared for today's bombshell revelationsdescribing    the NSA's efforts to defeat encryption. Not only does the    worst possible hypothetical I discussed appear to be true, but    it's true on a scale I couldn't even imagine. I'm no longer the    crank. I wasn't even close to cranky enough.  <\/p>\n<p>    And since I never got a chance to see the documents that    sourced the NYT\/ProPublica story -- and I would give my    right armto see them-- I'm determined to make    up for this deficit with sheer speculation. Which is exactly    what this blog post will be.  <\/p>\n<p>    'Bullrun' and 'Cheesy Name'  <\/p>\n<p>    If you haven't read the     ProPublica\/NYT or     Guardian stories, you probably should. The TL;DR is that    the NSA has been doing some very bad things. At a combined cost    of $250 million per year, they include:<\/p>\n<p>    How to break a cryptographic system  <\/p>\n<p>    There's almost too much here for a short blog post, so I'm    going to start with a few general thoughts. Readers of this    blog should know that there are basically three ways to break a    cryptographic system. In no particular order, they are:<\/p>\n<p>    So which code should we be concerned about? Which    hardware?  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See original here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/blog.cryptographyengineering.com\/2013\/09\/on-nsa.html\" title=\"A Few Thoughts on Cryptographic Engineering: On the NSA\">A Few Thoughts on Cryptographic Engineering: On the NSA<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Let me tell you the story of my tiny brush with the biggest crypto story of the year. A few weeks ago I received a call from a reporter at ProPublica, asking me background questions about encryption <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/a-few-thoughts-on-cryptographic-engineering-on-the-nsa\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94881],"tags":[],"class_list":["post-66245","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/66245"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=66245"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/66245\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=66245"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=66245"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=66245"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}