Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Submission + - The NSA's Ultimate Goal: Undo Internet Privacy

Hugh Pickens DOT Com writes: Time Magazine reports that the new round of disclosures from former NSA contractor Edward Snowden has revealed the intelligence agency’s ultimate goal: undo Internet privacy as we know it and that the NSA has circumvented or cracked some of the most widely used encryption software in its effort to monitor global communications. “This is the golden age of spying,” one former NSA analyst told the NY Times. Among the revelations is that the NSA circumvents encryption by simply collaborating with cooperative technology companies. Other times the NSA has acquired encryption keys by hacking into a company’s servers. According to The New York Times, by 2006, the NSA had cracked the communications of three foreign airlines, one travel reservation system, one foreign government’s nuclear department and a different foreign government’s Internet service. The NSA has also successfully foiled several of the world’s standard encryption methods, including SSL (Secure Sockets Layer), VPN (virtual private networks), and the encryption on 4G (fourth generation) smartphones. But strong, non-commercial encryption systems still seem to thwart the NSA’s efforts with PGP having long been a cause for NSA anxiety. When PGP-inventor Phil Zimmerman announced the Zfone telephone encryption technology, NSA analysts reportedly received the news in an email titled “This can’t be good.”

Submission + - "Trusted" computing to contain key logger? 2 question at end.

charliemerritt writes: As I hear more about "Mystery Meat" trusted computing being installed, undocumented, no schematics, CLOSED everything — well I do not come close to trusting a software OFF switch. There are not enough Open Source Paranoids to get Open Everything Motherboards, I guess at least not at a price most of us can afford. With all the stories about the NSA running a parallel fibre system leading to Ft George Mead, or Utah — with all major carriers corrupted with FISA "say nothing" orders... HOW could I trust a "Trusted" computer. What do they snoop? Where is it sent? Where is that forwarded? — Well that last question I know, "To contact the NSA, just pick up the phone and start talking". Can "Wire Shark" (and friends) block, or flag trusted computing information?

Good Grief, I built an Altair 8800 — in those days peripheral boards came as "you solder the chips in and save $50" and a template driver was included, so that you could write your own, better one. These drivers were super well documented with references to test points on the board. Yes clock speeds were around 1-2 MegHz, with "wait states" included for stability — technology has passed out of the garage.

Mother COBOL (Grace Hopper) handed out Nano Seconds (one foot strings) at the start of a speech. Nano Second = Clock Speed of 1 GigHz. A 2 Gig Mobo has two clock ticks alive at one time — not to mention distance between pins — FAR beyond a guy/gal with a soldering iron, hemostat and jeweller's loop. So we must TRUST the magicians and their 4 layer Mobos. — HOW do we do that?

A key logger would be pure simplicity,
I hear about NSA Ordering (via FISA) the
keys, seeds, salt, and keystrokes of clients.
(Oh BTW, key loggers in anything you import or build)
Keystrokes should never go further than your box, damn it!

Can we form a TRUSTED COMPUTER (from a customer POV) certification .org?
Can we get a software suite that monitors our modem connection automatically, with alerts? ...cm

Submission + - Feds demand user passwords (cnet.com)

An anonymous reader writes: Following the /. story on the Feds demanding the SSL keys, now the feds are demanding the user passwords, and in some cases, the encryption algorithm and salt

If the government is able to determine a person's password, which is typically stored in encrypted form, the credential could be used to log in to an account to peruse confidential correspondence or even impersonate the user. Obtaining it also would aid in deciphering encrypted devices in situations where passwords are reused.

...

Some of the government orders demand not only a user's password but also the encryption algorithm and the so-called salt, according to a person familiar with the requests. A salt is a random string of letters or numbers used to make it more difficult to reverse the encryption process and determine the original password. Other orders demand the secret question codes often associated with user accounts.

I'm next expecting to see the regulation or law demanding that all users use plain text for all web transactions, to catch terrorists and for the children

Comment Re:Valid Reasons (Score 1) 356

I think you misunderstand what 501(c)(3)'s are, and how they compare to for-profit corps.Having headed a (c)(3), (c)(4), and for profit companies, maybe I can help.

A not for profit, (any of the (c)'s, they all just exist for differing purposes), is supposed to lose (or more properly use) money for certain purposes for which it is formed. If I form the "Red Wiggler Defense League" to educate people about how modern land use is wiping out that worm, I can incorporate as a (c)(3) educational org and accept donations to fund that effort. I can pay my self a salary as a worker for the org, create worm shaped gimmicks to sell as fund raisers, and even make a profit on them, enough to fund the whole organization, BUT I must put that profit back into the organization and not give it to other people of for profit corps. I can donate some it to the "Earthworm Defense Fund", another (c)(3), or form a (c)(4) that's related and fund it with some of the money, to lobby for changes in the law. I can also abuse the money by giving myself a $250,000 salary, use of an organizationally owned car and home, etc, but you usually only get away with that if you're United Way or the like.

As a (c)(3), my profits are not taxed, because they are all flowing back into my charity work, and not for making me rich. Because I'm a (c)(3), you get to deduct any donations you make to me from your net income for income tax purposes. It's treated just like you didn't make 'X' amount when you file.

As a corporation, all my profits are taxed, but that should not be confused with income. If I spend $600K a year paying for programmers to make my software better, that money is deducted from the income I make to figure my profits. If my company spent 10 million to make 100K, I only got taxed on 100K. I can take that 100K and (after paying corporate taxes on it) return it to investors, buy a competitor, whatever I want. Of course, the Investors will also be taxed on any money they receive from the corp, hence the double taxation of corporate profits.

As a corporation, I can't take donations from others to help make my software better without counting that as income, and possibly adding tax liability to it. As a (c)(3), I can. That's really just about the only advantage of doing my development as a (c)(3) or some other (c) code.

Submission + - 3 Habitable Super-Earths Found Orbiting Nearby Star (discovery.com) 1

astroengine writes: Gliese 667C is a well-studied star lying only 22 light-years from Earth in the constellation of Scorpius, but it appears to have been hiding a pretty significant secret. The star has at least six exoplanets in orbit, three of which orbit within the star’s “habitable zone” — the region surrounding a star that’s not too hot and not too cold for liquid water to exist on their surfaces. Astronomers already knew that Gliese 667C had three worlds in orbit, one in the star’s habitable zone, but the finding of three more exoplanets, two of which are also in the habitable zone is a huge discovery. Finding one small planet in a star’s habitable zone is exciting, but finding three is historic. “The number of potentially habitable planets in our galaxy is much greater if we can expect to find several of them around each low-mass star — instead of looking at ten stars to look for a single potentially habitable planet, we now know we can look at just one star and find several of them,” said Rory Barnes, of the University of Washington, co-author of the study, in an ESO press release Tuesday (June 25).

Slashdot Top Deals

No man is an island if he's on at least one mailing list.

Working...