New Documents Reveal Which Encryption Tools the NSA Couldn’t Crack

A report in Der Spiegel has shed new light on the NSA’s encryption-breaking programs, and put a spotlight on the handful of programs that are still giving them trouble. The findings, based on leaked documents, were also presented onstage at the Chaos Computer Club Conference in Hamburg by researcher Jacob Appelbaum and Laura Poitras, who took the findings as a call to action.

Reports describe “major problems” following users across the Tor network, or deciphering messages sent through heavily encrypted email providers like Zoho. The agency reported similar problems when deciphering files that had been encrypted with TrueCrypt, an open-source disk-encryption program that was discontinued earlier this year. PGP encryption tools and OTR chat encryption also caused major problems for the agency, causing entire messages to disappear from the system, leaving only the message: “No decrypt available for this PGP encrypted message.”

The report claims that the NSA has little difficulty in decoding VPN (Virtual Private Network) connections and that the NSA seems to have completely circumvented the HTTPS system, which is used to secure connections between websites and browsers. If the NSA can decode these “security” products, can other agencies, companies, and hackers?

If you prefer to keep your online activities private, you need to read the article by Russell Brandom in The Verge web site at http://goo.gl/ItkNF8.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s