It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
“It’s no longer a matter of ‘if’ this technology works, but a matter of ‘when’ it will be implemented. Several countries worldwide, including the US, are now requesting VSPs (Voice Service Providers) to provide LI access to qualified law agencies. It is only a matter of time when it will become mandatory for all VSPs.”
Originally posted by Ex_CT2
reply to post by AtticusRye
...For our own safety and security, of course, to save us from the big, bad terrorists.
What can I say? The NSA builds a megalithic data-gathering center in Utah--what are they gonna do with it? Probably not fill it with public by-the-hour pool tables....
“This research is groundbreaking because it is the first method of breaking single-key AES that is (slightly) faster than brute force,” Nate Lawson, a cryptographer and the principal of security consultancy Root Labs, wrote in an email. “However, it doesn't compromise AES in any practical way.”
Originally posted by Bedlam
reply to post by miniatus
Well, basically the thing's an enshrined man-in-the-middle system. They intend for VOIP to be brought under CALEA, or whatever CALEA-esque system pertains in the particular country, and in order to use Skype, Vonage et al you'll have to relay that connection through the ISPs 'relay server', which has access to the unencrypted data.
However, as far as the other goes, we were told by an NSA wonk at a fairly exclusive meeting at Redstone years ago that they'd solved the issue with real-time decryption of prime number factoring systems like AES. I know that the IEEE were making strides on that and were told by the NSA to stop working on it, that back in the early 80's. It was a stink back then, but they dropped further publication on it. A decade later, NSA suddenly dropped all objections to encrypted phone calls made using prime number encryption, this was right after the Clipper chip was shown to be vulnerable to simple attacks and was dropped.
At the meeting, that came up, someone asked why the Clipper chip had died with no replacement since it had been a big bone of contention for NSA, and the guy said 'key escrow systems are no longer necessary as encryption of this type is no longer an issue for us' quote unquote. It hit the trade rags briefly, the guy never came back again (alas), I assume he was moved on to other work.edit on 8-3-2013 by Bedlam because: (no reason given)
Originally posted by PlausibleDeniability
Hey Bedlam, much respect to you sir for all the incredibly interesting info you've contributed to this board over the years but sometimes you might as well be speaking tongues. This is one of those times. Can you explain all that in English please? It sounds very very interesting but all the schmucks like me can only understant half of it.
Thanks
Originally posted by PlausibleDeniability
Thank you Bedlam, very interesting info. So it sounds like your saying the NSA has found a way to break AES encryption, which by all accounts is close enough to being impossible to break that it might as well be just that.
How is this possible?
Do you think this kind of tech is even close to being possible? Sounds like SciFi to me but I would not be surprised if our unlimited black budget found a way...
I just enlisted in the army in a mos that deals with a lot of this kind of thing so its all become that much more interesting to me.