google cloud exploitation

Snowden reveals Project Muscular. How did NSA broke Google Cloud?

New documents leaked by him Edward Snowden accuse the US National Security Service (NSA) of being able to break the links between the Google and Yahoo datacenters.
Η The Washington Post, citing the documents he received from Edward Snowden, says the NSA is able to have hundreds of millions of user accounts from around the world.
google-cloud-exploitation

In a document classified as "top secret" dated January 9, 2013, it is stated that the service is able to send records daily from Yahoo and Google's data centers at its headquarters in Fort Meade. In the past 30 days, it is reported that the service managed to collect 181 million new records, including metadata as well as the content of communications.

The project, codenamed “,” operates in collaboration with the British secret service GCHQ, and aims to tap into the cables connecting the data centers of large Internet technology companies.

The project uses the weaknesses of the systems as alleged by the service Cloud of Google and Yahoo That is, where their customers' data is stored.

Both they use private fiber optic cables owned by businesses Tier 1, but leased to the Internet giants to have the speed, safety (!) and reliability (!) they need.

The leaked NSA transparency, entitled "Google Cloud Exploitation, ”Presents handwritten notes with a plan that explains how the service can access foreign networks. The manuscript shows a lot of evidence and with a smile please the point where the encryption is bypassed "SSL added and removed here. "

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).