[cryptome] NSA Spy-by-Crypto

Steve Kinney admin at pilobilus.net
Fri Jan 22 14:02:49 PST 2016


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 01/22/2016 03:46 PM, Michael Best wrote:

> How does "spy-by-crypto" work?

If you can't beat them, buy them out:  Compromised cryptographic
tools are a rich source of intelligence.

Historical example:

http://www.mediafilter.org/caq/cryptogate/

Current example:

https://www.schneier.com/blog/archives/2015/12/nsagchq_exploit.html

:o)



> On Fri, Jan 22, 2016 at 2:53 PM, John Young <jya at pipeline.com 
> <mailto:jya at pipeline.com>> wrote:
> 
> DIRNSA said at Atlantic Council on 21 January that NSA spying 
> ("intelligence") and information protection (IAD) to be meshed.
> Separation not suitable for current requirement.
> 
> Outside partners to aid dual tech: spy-by-crypto.
> 
> 
> 
> 

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=Rfi6
-----END PGP SIGNATURE-----



More information about the cypherpunks mailing list