google cloud exploitation

Snowden reveals Project Muscular. How did NSA broke Google Cloud?

New documents leaked by him Edward Snowden blame the US National Security Agency (NSA) for having managed to break the ties that connect the datacenters ) of Google and Yahoo.
Η The Washington Post, citing the documents he received from Edward Snowden, says the NSA is able to have hundreds of millions of user accounts from around the world.
google-cloud-exploitation

In a document classified as "top secret" dated January 9, 2013, it is stated that the is able to send millions of records daily from Yahoo and Google data centers to its Fort Meade headquarters. In the past 30 days, it is reported that the service managed to collect 181 million new records, including metadata as well as the content of communications.

The project, codenamed “Muscular, ”Operates in collaboration with the British secret service GCHQ, and aims to enter the cables connecting the data centers of the two major Internet technology companies.

The project uses the weaknesses of the systems as alleged by the service Cloud of Google and Yahoo That is, where their customers' data is stored.

Both companies use private fiber-optic cables that belong to businesses Tier 1, αλλά εκμισθώνονται στους γίγαντες του Διαδικτύου για να έχουν την , The (!) and the reliability(!) they need.

The leaked NSA transparency, entitled "Google Cloud Exploitation, ”Presents handwritten notes with a plan that explains how the service can access foreign networks. The manuscript shows a lot of evidence and with a smile please the point where the encryption is bypassed "SSL added and removed here. "

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.089 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).