A new round of NSA documents by Edward Snowden appeared online late Sunday. The latest PDF files published by Der Spiegel show the five-nation online alliance with the Five Eyes project aimed at monitoring other countries. The United States, the United Kingdom, Australia, Canada and New Zealand all seem to have allied themselves to overcome barriers to Internet security protocols.
Leaked files may be a bit old as they cover the period from 2010 to 2012, but they offer some interesting details of how spies were trying to break strong online encryption.
A 18-13 (2011) XNUMX file (PDF) of XNUMX June, for example, mentions tempting details about "A possible technique for deanonymizing TOR network users".
The investigation reveals that the Secret Service Secret Service of GCHQ believed they could violate Tor.
The document is marked "UK TOP SECRET STRAP1 COMINT”And states:
We will present a technique that can deanonymise the given TOR web-browsing packet times between the client and the security node and the packet times from the output node filtered into a single circuit. The percentage of false positives appears to be fairly low and so we suggest that we develop this technique.
The required data is not currently collected. The following additional sources are required for this technique to work data:
- The Second-accurate packet connections to the TOR exit nodes that control packets and is characterized by a unique circuit identifier.
- Second-accurate packet connection between customers, TOR nodes and TOR security node. These data could be obtained by using SIGINT [signal information] or running guard nodes. SIGINT's solution would require up-to-date feeds of consensus documents (TORs). The IP addresses of the TOR could then be extracted from the consensus documents for filtering them from the SIGINT system.
At the time of writing JTRIG [Joint Threat Research Intelligence Group] is investigating collection data from the output nodes and ICTR-FSP experiments with a data stream of the guard nodes.
They eventually concluded that "a broader control" was necessary to be able to have better results in the "percentage of false positives". He recommended that Brit Ghosts should try to deanonymize using JTRIG TOR as a first step.
Another slide of the GCHQ (PDF) is presented because the anonymous network is bothering government interceptions.
"Very 'bad' people use Tor," he says, adding, "Covert Services hide content on the Web that still exists!", "It 's almost impossible to understand who is talking to whom,"
Below the documents mention PGP decryption efforts (which are still safe (?)), AES (which is constantly under pressure, but there is no evidence that it has been violated) and OTR (safe but its application found to be problematic ).
Shared secret keys or passwords are required to achieve a VPN breach before they can decipher the SSL protocols.
For hacking σε VPN, την ημερομηνία έκδοσης του αρχείου που διέρρευσε, ήταν απαραίτητο το hacking στο royter, ή τον υπολογιστή του θύματος. Τελευταία λύση μια δικαστική απόφαση που θα ανάγκασε το διαχειριστή συστήματός της εταιρείας, να παραδώσει τα SSL ιδιωτικά κλειδιά.
A Transparency of it NSA also states that the SSH service had been successfully broken by the agents.
It has long been known that Skype belongs to the NSA and clearly should not be used by anyone seeking its security. Similarly, there were no surprises for the fact that PPTP is broken.
[tweet_embed id = 549373435101843456]