It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
pookle
Their job is not to protect YOU, so why should they?
brazenalderpadrescorpio
reply to post by SaturnFX
I don't think that they're bad at their job. I believe that things like this are a distraction from deeper things that they are involved in.
pookle
And how does one check?
brazenalderpadrescorpio
reply to post by Aazadan
My point is that I'm positive that things like this are a smokescreen. The NSA deals in magic.
swanne
SaturnFX
two people familiar with the matter said.
two people familiar with the matter. Hm, how can we be sure that this is not just yet another counter-Intel tactic from the Kremlin? See Operation INFEKTION.
edit on 11-4-2014 by swanne because: (no reason given)
brazenalderpadrescorpio
reply to post by SaturnFX
I don't think that they're bad at their job. I believe that things like this are a distraction from deeper things that they are involved in.
pookle
You do realise who controls the CA's (Certificate Authorities) right?
Aazadan
brazenalderpadrescorpio
reply to post by SaturnFX
I don't think that they're bad at their job. I believe that things like this are a distraction from deeper things that they are involved in.
I agree, the only reason this flaw wasnt fixed was because it showed they were watching but it also gave them a great way to spy in a way they couldnt overtly before...they had a free pass and they took it!
It's doing things like this that make them bad at their job. There is a global protocol to software when it comes to hacking and bug reporting specifically because it makes everyone more secure. The software vendors either learn about vulnerabilities and patch them or the people know of the vulnerable software and avoid it. This for example is why antivirus companies all cooperate with each other to provide the most comprehensive virus definitions.
This is not a distraction, things like this are the NSA's #1 priority. They attack technology from many angles (hacking attempts, bribing vendors, and more) to create or find software vulnerabilities and then use said vulnerabilities to monitor communications. Keeping heartbleed secret for their own use (and the use of anyone else who finds it) is the #1 goal of the agency. I would bet every dollar I'll earn for the rest of my life that whoever published this bug, has gotten a visit from the NSA and told not to do such things in the future.
pookle
And how does one check?
Attack the website yourself. See first hand if it's vulnerable.
eloheim
Longtime luker finally getting around to joining (first post!)...
Anyway, just wondering if anyone knows if any of the NSA's person stuff was affected by the bug? It seems like if they did know about it or even create it they would have had to take measures against it exposing themselves or their associates. I'd be suspicious if they switched away from using openSSL shortly after the bad update (or warned their friends to), and "VERY" suspicious if they did so right BEFORE it showed up!