It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Johnathanandheather
reply to post by TwoTonTommy
I remember a day where I got excited about rumors of an open source phone coming to market. Will it ever happen? We could protect our own phones and get suspect files n coding off. Paying upwards of 500 for iPhones and 800 for large iPhones (iPads) we should demand open source.
laytheovers
wow guys, the rest of you must be living very exciting lives.. if a 3 letter agency tapped into my phone they would definitely be bored beyond words..
what is with the vast majority of us western people? we live an entirely predictable existence, we exist in order to consume continuously worried about the further development of our glorified careers until we die from self poisoning really from too much consumption all scripted from start to end and yet every now and then we all enjoy to fantasize the entire security apparatus of our states actually has some interest in spying in our boring realities. Yeah because deep down we are really subversive and dangerous... right because im just pretending im working infront of a pc all day, in truth i am all for world revolution...
for real, why bother ? the vast majority of people i know including myself we leak so many thoughts and details of our every day in social media and the like.. just simply, why bother like ?
seagull
Since I don't own an Iphone, or an I-anything, I'm feeling kinda left out....
I'm so early 20th century....
Except it's not a mathematical breakthrough exactly...the NSA was involved in development of encryption standards and got the standards committee to include inconspicuously flawed algorithms which the NSA knew how to hack. It wouldn't be surprising if the NSA already had access to AES encrypted communications with secure websites on the internet.
Aazadan
You have two routes to go with protection:
First - You can encrypt everything, this guarntees your data will be protected for X time but you're one mathematical breakthrough or quantum computer away from your encryption being broken.
Arbitrageur
Except it's not a mathematical breakthrough exactly...the NSA was involved in development of encryption standards and got the standards committee to include inconspicuously flawed algorithms which the NSA knew how to hack. It wouldn't be surprising if the NSA already had access to AES encrypted communications with secure websites on the internet.
Aazadan
You have two routes to go with protection:
First - You can encrypt everything, this guarntees your data will be protected for X time but you're one mathematical breakthrough or quantum computer away from your encryption being broken.
I thought it was already known they could turn your microphone and camera on anytime they wanted,so while this is in breaking news, it seems like old news to me. I am pretty sure I read it before on ATS.
The documents describe the hackers here as "digital plumbers" capable of "getting the ungettable".
Most San Antonians weren't even aware the NSA had a presence here until 2010, when Westside homeowners started having troubles with their garage door openers.
My garage door stopped opening, homeowner Manuel Zurita told us at the time.
It turned out to be an antenna at the NSA facility was operating on the same frequency.
Read More at: www.news4sanantonio.com...
Arbitrageur
Except it's not a mathematical breakthrough exactly...the NSA was involved in development of encryption standards and got the standards committee to include inconspicuously flawed algorithms which the NSA knew how to hack. It wouldn't be surprising if the NSA already had access to AES encrypted communications with secure websites on the internet.
I thought it was already known they could turn your microphone and camera on anytime they wanted,so while this is in breaking news, it seems like old news to me. I am pretty sure I read it before on ATS.
The National Institute of Standards and Technology (“NIST”) recently announced that it has begun formal review of its standards development process for approving cryptographic algorithms. The notice appears to be a reaction to recent reports in the New York Times regarding the National Security Agency’s (“NSA”) back door access to encrypted data through an NIST-approved cryptographic algorithm. The article suggests that the NSA inserted back door access into the algorithm, one that many companies use to encrypt data sent over the Web.