Visitors Now:
Total Visits:
Total Stories:
Profile image
By Jeffrey R. Hardin
Contributor profile | More stories
Story Views

Now:
Last Hour:
Last 24 Hours:
Total:

How to Design — And Defend Against — The Perfect Security Backdoor | By Bruce Schneier| via Milinet|

Thursday, October 17, 2013 11:22
% of readers think this story is Fact. Add your two cents.

(Before It's News)

Image

  • 1287638854_086aa1ab0b_b
  • How to Design — And Defend Against — The Perfect Security Backdoor
  • Wednesday, October 16
  • 14 Comments
  • We already know the NSA wants to eavesdrop on the internet. It has secret agreements with telcos to get direct access to bulk internet traffic. It has massive systems like TUMULT, TURMOIL, and TURBULENCE to sift through it all. And it can identify ciphertext — encrypted information — and figure out which programs could have created it.

    But what the NSA wants is to be able to read that encrypted information in as close to real-time as possible. It wants backdoors, just like the cybercriminals and less benevolent governments do.

    And we have to figure out how to make it harder for them, or anyone else, to insert those backdoors.

 

Filed under: Miscellaneuos News



Source: http://jericho777.wordpress.com/2013/10/17/how-to-design-and-defend-against-the-perfect-security-backdoor-by-bruce-schneier-via-milinet/

Report abuse

Comments

Your Comments
Question   Razz  Sad   Evil  Exclaim  Smile  Redface  Biggrin  Surprised  Eek   Confused   Cool  LOL   Mad   Twisted  Rolleyes   Wink  Idea  Arrow  Neutral  Cry   Mr. Green

Top Stories
Recent Stories

Register

Newsletter

Email this story
Email this story

If you really want to ban this commenter, please write down the reason:

If you really want to disable all recommended stories, click on OK button. After that, you will be redirect to your options page.