Hacker News new | past | comments | ask | show | jobs | submit login
Secret contract tied NSA and security industry pioneer (reuters.com)
899 points by bbatsell on Dec 20, 2013 | hide | past | favorite | 320 comments



NSA invents weak (Back Door present) crypto algo.

Pushes RSA to make it a Default in a key function (RNG) by giving them $10 Million.

NSA points to RSA as an early adopter and gets NIST to certify it.

Millions of systems are now protected by an RSA product that the NSA deliberately weakened.

Any sufficiently skilled rogue actor can attack virtually any business that uses these RSA products -

NSA (Cyber security Command) gets even more money to "Protect" us from said Rogue actors.

So all-in-all good investment on their part

Edit: Spelling fixed per commenter pointing out the difference between rouge and rogue. I did imply malicious actors not red-cheeked actors (not that they are mutually exclusive).


Lucky Green, who appears to have had inside knowledge of this deal based on this mailing list post from September, seems to disagree that this was a good investment:

http://lists.randombit.net/pipermail/cryptography/2013-Septe...

The particularly relevant portion is this:

"This was $10M wasted. While this vendor may have had a dominating position in the market place before certain patents expired, by the time DoD/NSA paid the $10M, few customers used that vendor's cryptographic libraries.

There is no reason to believe that the $250M per year that I have seen quoted as used to backdoor commercial cryptographic software is spent to any meaningful effect."

Interestingly the mailing list post doesn't seem to mention the use of RSA's adoption as a factor in the NIST standard, so it's possible that while their knowledge was more advanced than the public's they didn't know about that side-effect.


There's enough wrong with what the NSA has been doing, and enough reasons to encourage people to take an interest in how to curtail, or at least better police, their actions without resorting to tawdry conspiracy theories.

The NSA doesn't "protect" anyone. They are an intelligence agency. Their mandate is to collect information. The group you're thinking of, the one that's actually supposed to "protect" the network, is US Cyber Command: http://en.wikipedia.org/wiki/United_States_Cyber_Command


"As part of the National Security Presidential Directive 54/Homeland Security Presidential Directive 23 (NSPD 54), signed on January 8, 2008 by President Bush, the NSA became the lead agency to monitor and protect all of the federal government's computer networks from cyber-terrorism." [Emphasis added]

https://en.wikipedia.org/wiki/NSA#Mission


Yes but their funding is not dependent on how secure RSA tokens are.

NSA did this to advance their mission, not to make a few extra bucks.


The point is that it advanced the intelligence gathering half of their mission while seriously compromising the protective half of their mission.


USCC doesn't protect anyone either. They, like most of the Department of "Defense", are almost entirely offense in nature.


The best defence is a good offence.


Asymmetric warfare with multiple adversaries doesn't work that way. For example, Stuxnet did not make U.S power plants safe from malicious attackers. I recommend reading Ralph Langner's op-ed in the New York Times.

http://www.nytimes.com/roomfordebate/2012/06/04/do-cyberatta...


It did make word temporarily safer from Iran nuclear bomb though. Of course, it is only temporary, but almost everything you do is.

As for the article, it claims that Stuxnet "opened the Pandora box", but it did nothing of the sort. Stuxnet by itself did not enable anything that wasn't possible before - it was possible for malicious actors to create attacks on US networked infrastructure, and it still is. Stuxnet changed nothing there. Criminals and security professionals know the possibilities for a long time. And are using them. Making it sound as if the evil US has again spoiled the paradise for everyone makes no sense, and the author, being the expert in the field, should have known better, but looks like his political views overcame his professional judgement here.


Does anyone series believe that Iran is a threat to the world. How about basing threat levels on previous actions? For example, who invades countries most often? Or who's military kills the most people? I've heard about WMD threats before - and who did the invading and killing in the end? That saga ended with almost everyone looking bad.


Define "threat to the world". Can Iran destroy the whole world? Fortunately, not. Can Iran destabilize, hurt and incite violence? Not only can, it is doing it right now.

>>> basing threat levels on previous actions?

That would be stupid because it means that only the second action can be countered. Given how first action can cause devastating consequences, limiting oneself to only reacting to a second one would be terminally stupid. American administration, for example, was justly criticized for sleeping through 9/11, and acting unprepared when it happened. Generals like to prepare for the past wars, it is much easier, but there's no reason to condone such behavior.

>>> who invades countries most often?

Invasions can differ. If Nazi Germany invaded Poland once, and Britain invaded Nazi Germany once, they are not equal.

>>> who's military kills the most people?

Again, depends on the people. If Al-Qaida kills 3000 Americans in 9/11, and then Americans kill 10000 Al-Qaida fighters after that, I'd say good job, they only should have done it earlier, so we would have 3000 less victims.

>>> That saga ended with almost everyone looking bad.

It looks bad to you because you take an impossible position that fighting evil should be done without hurting anyone. It would be nice if there was a nice, fluffy, unicorn-land evil that you could fight by issuing a strongly-worded declaration of condemnation and maybe refuse to send them a Christmas card next time. Unfortunately, real evil is much harder and messier to fight.


I like that you use the term evil. Its good versus evil right? Bush didn't get far with that terminology. I'm not alone in feeling that a period of non-interventionism from America might help. The interventions of late have been fumbled and clumsy when put in a positive light. Torture, killing and ugly unilateralism. Recent acts in the Middle East may have killed tens of thousands of militants, but does anyone think it has knocked back the numbers? The hundreds of thousands of innocent (and not-quite innocent) killed and wounded have family and friends. Those people are no longer friends of America. The question that never seems to be asked, is why did September 11 happen. Sure, American intelligence failed. But somewhere further back, diplomacy failed. It takes a pretty unhappy situation for people to arrange such an horrific act, why did they end up like that? And what can be done to prevent it happening again? Bombing and invading hasn't worked. What's plan B?


>>> I'm not alone in feeling that a period of non-interventionism from America might help.

I know. People that thought if USA sees no evil, hears no evil and refuses to speak about evil then all troubles would happen to somebody else existed since there was such thing as USA. They were wrong then and are still as wrong now.

>>> The question that never seems to be asked, is why did September 11 happen

You must be kidding me. One has to be unusually dense or unwilling to hear to ignore the deafening choir of non-interventionists and generic America-is-root-of-all-evil crowd blaming America for what happened at 9/11. Of course, it only tells us about them, not about why this heinous atrocity has really happened. The solution there is simple - these terrorists saw America as their enemy, and given the opportunity to deal a heavy blow to the enemy - opportunity enabled in some measure by complacency of the American administration, who for a long time thought terror is something that happens in bad places like Middle East but can't happen in America, despite many warnings to the contrary - given that opportunity, they struck their blow. One doesn't need any more complicated theory than that. As for why they chose America as their enemy - one doesn't need too much theory in that either, given that ideologists of Al-Qaeda explain it all by themselves. Their goals as religious fanatics dreaming of subjugating other people to their rule are incompatible with America's role as a world power strategically and with America's support of people unwilling to accept radical islamist rule tactically. Of course Al-Qaeda is the enemy of America - what else could they be, given that their premises are diametrically opposed to every premise this country is built on?

>>> Bombing and invading hasn't worked.

What you're calling "worked"? To make the strategy, you first have to define the goal. If the goal is "to ensure America is never the target of a terrorist attack", the solution is simple - America must cease to exist. If America exists, it can be target of a terrorist attack, and there's no known way to prevent it with 100% certainty. One, however, can make it harder to do, and for that there are many various plans, both good and bad.


> Define "threat to the world". Can Iran destroy the whole world? Fortunately, not. Can Iran destabilize, hurt and incite violence? Not only can, it is doing it right now.

So strictly speaking, the US is the bigger evil because it is doing all those things right now, and has the capability of destroying the world through nuclear holocaust.

> Again, depends on the people. If Al-Qaida kills 3000 Americans in 9/11, and then Americans kill 10000 Al-Qaida fighters after that, I'd say good job, they only should have done it earlier, so we would have 3000 less victims.

This line of reasoning. This here. That is evil.

"Depends on the people", oh my god.

By the way the US has already killed far more than 10,000 in response to the WTC attacks. And not just "fighters" either.

And if you still somehow can say this was warranted--I have no (nice) words if you do--ask yourself why they hijacked those planes in the first place. It wasn't because "mwuahaha let's do something evil against those unfaithful white men dogs" (the hijackers themselves maybe were told something like this, a variation on your "it depends on the people"), but the actual cause was the US' meddling in the Middle East in earlier decades (during the Gulf Wars and before) that ended up killing their guys. Which made them decide that a mission like this was a completely reasonable response. Someone might have even claimed something ridiculous like "we should have done a 9/11-type attack much earlier, and save all those victims" (which makes about as much sense as your claim that killing 10,000 AQ fighters sooner would somehow have prevented 9/11).

They have about as much claim of being the "good guys" as the US. Which is, none whatsoever.


>>> So strictly speaking, the US is the bigger evil because it is doing all those things right now

No, it is not.

>>> This line of reasoning. This here. That is evil.

But I if under "evil" you understand "defending yourself against attack" then I can understand why you call the US "evil". However, it is your private meaning of the world "evil", unknown to the rest of the world.

>>> "Depends on the people", oh my god.

Of course it does. One is justified to use violence in defense against attack. I'm surprised it needs to be explained.

>>> By the way the US has already killed far more than 10,000 in response to the WTC attacks.

The US killed people in war, it is true. That, unfortunately, the only way to fight wars. If you invent some way to win wars without killing anybody, be sure to tell, it would be most wonderful invention. Until you do that, that's the way we have. When attacked, there's only two ways to behave - submit to the attacker or fight back. I don't think submitting would be a good option.

>>> the actual cause was the US' meddling in the Middle East

Very funny word that "meddling". Like "I shot this guy because he was meddling with my robbery and was trying to stop me, so I'm completely in the right". Of course US is "meddling" - without that "meddling" real evil - you know, guys like Hitler, Hussein, Pol Pot, etc. - would feel much freer to perpetrate their evil deeds. "Meddling" is the only moral thing to do if you see people's rights violated and freedoms infringed.

>>> Which made them decide that a mission like this was a completely reasonable response.

The fact that it seemed reasonable to them means nothing. Everybody thinks their behavior is reasonable - murderers, robbers, rapists, thieves, serial killers - all of them think they're very reasonable people in unusual circumstances that make them do those things. There are very few people that say "I'm evil to do this, but I will still do it". Yet it is evil to do what they do, and your relativism and attempt to present it as if there's no right and wrong but only somebody's opinion can only lead to a moral bankruptcy.


>>>> So strictly speaking, the US is the bigger evil because it is doing all those things right now

> No, it is not.

??? Yes it is!

It's replaced countries leaders with ones more suitable to US interests. Thrown entire countries into a state of war. That's destabilizing.

I'm going to hope we can agree that throwing bombs on people is hurting them?

Finally, if providing terrorist organisations (AQ was an "ally" back then) with weaponry isn't "inciting violence", then I don't know what is. Also quite destabilizing to the region btw.

> Of course US is "meddling" - without that "meddling" real evil - you know, guys like Hitler, Hussein, Pol Pot, etc. - would feel much freer to perpetrate their evil deeds. "Meddling" is the only moral thing to do if you see people's rights violated and freedoms infringed.

I'm going to ask you to be a bit more skeptical than that. You do know that the US gov / military has routinely lied about their intents to the US people right? So you should at least give some consideration to the following:

Saving the poor people of the Middle East from those evil dictators was not the reason for getting involved at all.

Gaining political and military control over one of the largest deposits of fossil fuels, of course is.

Why do I believe this is the case? Because there's TONS of terrible evil being committed to poor people all over the world, many of these things would be quite the low hanging fruit to get involved with. But instead, the US picks this rich and relatively well-armed hornet's nest to get sucked in by. Oops.

Judging that in the category of "saving people from evil / having their rights violated and freedoms infringed", it's pretty much an abject failure. With those very same resources they could have saved so much more lives if they really cared for that, at the cost of so much less lives of American soldiers, if they even cared for THAT.

There are so many really real evil guys in the world, committing really really bad atrocities on the people they sit on top of, in countries you really never hear about because they're poor and far away and not really interesting (untrue, Tajikistan is super interesting).

Also it's super easy propaganda-wise to paint the cause for fighting in a far-away country as something heroic and moral, when it's really about oil, power and control. There's a few more motivating factors besides those, but none of them amount to "because we're the good guys".

Finally to address your point about relativism and moral bankruptcy. IF I could truly and honestly believe that the US primary goal in the Middle East is to save these people from evil dictators and provide them with freedom and human rights (c'mon! it can't even provide those to US citizens at home!), if I could believe that to be true, then I'd probably be mostly in agreement with you, really. Doing good is a good thing.

It's just that, from the outside, it seems pretty obvious that the US is not there with the intent to do good to the people, but to control the natural resources and sources of power.

Every time you seen people all "yay! the evil dictator is gone!" it turned out to be a photo-op, didn't you notice? Didn't you see the zoomed-out version of that well-directed scene where they toppled Saddam's statue? Tanks! Cameras! Action! Most non-actor people were instead wondering "when will the US stop occupying our country". The REAL celebrations you won't see, will happen when your soldiers finally leave (aka, never).


Yes, Iran's totalitarian leadership is a threat to its neighbors, particularly Israel.


A war between Israel and Iran would be an epic disaster; too bad to even consider leaders of either country being that stupid. I think the arming of Israel with nuclear weapons is probably the biggest mistake the US has ever made... If Israel didn't have nuclear weapons there would be no way I'd consider Iran trying to get them (at almost any cost - we should have aiming for a nuclear free world), but with the situation as it is I wholly sympathise with their position.


Fortunately, leaders of Israel do not rely on your consideration when determining what is necessary to protect their country. It is very nice that you wouldn't consider Iran attacking Israel if Israel didn't have advanced weapons - but there's a little wrinkle in this otherwise perfect argument. Iran doesn't need your consideration to attack Israel - they are perfectly capable of doing so without it, and already doing it, albeit through proxies. If Israel did not possess advanced weaponry, they would do it directly - as was done many times before in history, and only the repeated failure taught those countries that direct attack does not work. Some of them learned the lesson and reluctantly accepted the existence of Israel, some just concluded they need a different, smarter tactics.


It was far more France than the US that enabled Israel's nuclear program.

(A ground war between Israel and Iran is a practical impossibility, by the way - neither country has the strategic reach for that).


Oh maybe France sold them the material, but we all know America is consulted all the way on these things. If America had have said no it wouldn't have happened.


Well, the nuclear industry disagrees with you.

According to their experts, a nuclear Iran is a good idea.

http://en.wikipedia.org/wiki/File:Shah_of_Iran_building_two_...


It's funny how oil was running out in the 70s and still running out 40 years later. I'd imagine it will be running out pretty much the same way in 40 years, and 40 years after that.

Besides that, that Iran doesn't exist anymore.


>I'd imagine it will be running out pretty much the same way in 40 years, and 40 years after that.

It will run out, though. The only questions are when, and what the contingencies will be once it does.


Or it won't, since technology will replace the need for it long before that. We don't use horses to drive our cars not because we've run out of horses.


Well, there's some unsubstantiated optimism if I've ever seen it. Let's hope you're right, but right now the physics and economics do not support your exuberance.


It is substantiated by centuries of human history. And by physics and economics too. Particularly, economics teaches us that when resource's price raises, attractiveness of substitutes and thus investment into improving these substitutes raise considerably. And physicists are working on solving problems that block our progress for finding alternatives right now (e.g. on increasing energy density for electrical storage, increasing energy efficiency of solar cells) - and there are some encouraging signs there too. E.g. this one: http://www.nature.com/nature/journal/vaop/ncurrent/full/natu... may allow producing solar energy much cheaper than before.


A catchy sound byte, but in almost all practical situations, the best defence is avoiding conflict. In fights: flee. In international affairs: diplomacy.


That is disasterous. That logic is why Chaimberlain allowed Hitler to get more and more and more power. ("Surely they'll agree to peace if we just let them have Poland.")

It is also why my generation (I'm 27) will eventually have to fight a nuclear war that pits Iran against Israel and possibly the US.

That war will potentially kill millions. And whose fault will it be? Obama's and Bush's. They will (if history is just and we don't change course) go down in history as potentially making mistakes that killed millions, just as Stalin and Hitler did.

Or we could insist now (or, ideally, a few years ago) that Iran not develop nuclear weapons capability, if necessary fighting a minor tactical war to stop them.

(There is NO reason to have Vietnam IV, where Afghanistan and Iraq are Vietnam II and III. Except of course socialism for defense contractors and altruism as we throw away trillions "re-building" the latter two countries.)


The reality is that Britain wasn't ready. Chamberlain bought us the time needed to power up to fight the Battle of Britain in 1940. Which we won. 2 years later, having profited from selling weapons to both sides, America sees which way the wind is blowing and decides to join the winning team.

PS You forgot Clinton bombing pharmaceutical plants in Sudan, then taking his eye off the ball to play his sax, schmooze with Hollywood and chase skirts, while the wheels of 9/11 were set inexorably in motion.


Battle of Britain was won because the Canadian air force shot down huge numbers of Messerschmitts, and because a German pilot screwed up and bombed London against orders not to do so, instead of focusing on air strips and bases. Result was Allies bombed German cities in retaliation and Hitler ordered London destroyed which took the focus off disabling the Royal AF, and allowed Britain to regain air superiority and stop the attack. Anyways this has nothing to do with RSA taking a bribe to sell feeble crypto products


Your contortions, while amusing, rewrite history in order to maintain your unhealthy obsession with America's alleged wickedness. Sure, Europe won the war and the US tagged along. Right. Whatever you need to believe to try to hold your precious worldview together, reality be damned.


The reality is probably that neither the US nor Russia could have defeated Germany alone. The GP is wrong that the US joined the "winning side" though - they joined the losing side, because a Europe united under one hostile power would be a fundamental security threat to the US.


They could have. If they have started early. Longer they waited, harder it got to achieve.


Neville Chamberlain signed the Munich Agreement which allowed Germany to annex parts of Czechoslovakia at the end of September 1938.

World War 2 started when Germany decided to invade Poland in late 1939. Germany was never given Poland.

You get even the most basic history wrong and then proceed to say that Bush and Obama are historically equivalent to Stalin and Hitler?

Never let facts get in the way of a good dogma.


> World War 2 started when Germany decided to invade Poland in late 1939.

Germany and the Soviet Union. Sure, the Soviets attacked after the Germans, but they split Poland between them before the invasion.



> That is disasterous.

You should have hedged with "can be" instead of "is." Fighting preemtive wars can be disastrous too.

> my generation (I'm 27) will eventually have to fight a nuclear war that pits Iran against Israel and possibly the US

Do you seriously believe that? Sure, Iran will get to throw their weight around a bit more with nuclear power, but they're not that desperate or stupid.

> Obama and Bush ... will go down in history ... just as Stalin and Hitler did

No.

> a minor tactical war [would] stop [Iran from developing nuclear weapons]

Maybe. You complain about "throwing away trillions" fighting silly wars and re-building countries. You do realize that the exact same sell (fight a minor war, stop the terrorists!) was used for the last two multi-trillion-dollar debacles, right?

Either we give them a bloody nose and they just try again (keeping their cards closer to their chest this time) or we spend trillions trying to install another puppet government.


It is also why my generation (I'm 27) will eventually have to fight a nuclear war that pits Iran against Israel and possibly the US.

No, we won't. There is simply no geopolitical logic to Iran and Israel going to war.


Umm, Iran is run by a council of religious fanatics. There is no logic to Iran.


That may be (although it amounts to a gross oversimplification), but it's still a functional government and a self-interested bureaucracy. Daily life goes on in Iran much as anywhere else. Council of religious fanatics notwithstanding, and its occasional grandiloquent pronouncements also notwithstanding, Iran's government is mostly full of administrators and workers that implement things like water treatment, motor vehicle registration, low-income housing, zoning, meat inspection, and energy. There is most definitely logic to Iran, much as to any other actually-existing government.

There's even logic to its foreign relations, underneath the ideological veneer. Imagine if someone thought US policy actually worked literally as presidential speeches suggest; you'd think they're an ignorant tool. "Everyone knows that speeches are just speeches," you'd say, with no connection to the actual practice of governance. It may surprise you to learn that it's like that in any state, including Iran.

Disclaimer: US citizen living in Armenia, NW of Iran. None of the very numerous Iranians here leave one with the impression that they are from a place with "no logic". Turn off Fox News.


> Imagine if someone thought US policy actually worked literally as presidential speeches suggest; you'd think they're an ignorant tool. "Everyone knows that speeches are just speeches," you'd say, with no connection to the actual practice of governance.

I don't agree with this at all. For instance, Obama has done what he promised: More big government programs and spending, nationalized healthcare. People knew what they were getting with Obama when he ran for President. There are a lot of problems with America but I can't stand it when people attack it for reasons that it actually doesn't deserve.

> None of the very numerous Iranians here leave one with the impression that they are from a place with "no logic".

I was referring to the government, which was pretty explicit. Fundamentally, there is a tradeoff between religiosity and logic in any religious government. The two are opposites. We cannot assume that Iran will never instigate a war for religious reasons, or that no rogue element of its government will ever share its weapons with outside religious groups.

> Turn off Fox News.

We can discuss the issues, but you cannot dismiss me by trying to claim I'm ignorant. I actually don't even watch Fox News, but I disagree with maligning Americans who do.


1. Obama most certainly did not implement "nationalised" healthcare. Nationalised healthcare refers to a state-owned and operated healthcare sector. In any case, whatever it is that the administration implemented, there seem to be some doubts as to its viability.

I can point you to a litany of campaign and post-inaugural promises that are widely perceived to be broken by a large cross-section of people, from closing Guantánamo to definitively and swiftly ending American involvement in Afghanistan and Iraq.

2. "We cannot assume that Iran will never instigate a war for religious reasons, or that no rogue element of its government will ever share its weapons with outside religious groups."

So, factionalism exists within the Iranian state? And what is the American state, a univocal monolith? For an overplayed but relevant example, I give you Iran Contra, or, for that matter, the runaway intelligence apparatus that Snowden helped put into sharper relief.

The point being that there are semi-autonomous appendages to any non-trivially-sized state. It should come as no surprise to anyone that there are extremist elements within Iran. Indeed, I would be willing to grant you that the extremist elements are more prominently positioned and influential within Iran's state. That's a far cry from "there is no logic to Iran". What does that even mean?


The way in which Iran has conducted its foreign policy strongly suggests that the usual constraints of geopolitics apply to it. This is unsurprising, as these constraints are essentially independent of the complexion of a national government.


USA made a war claiming that Iraq had Nuclear weapons. Apparently it didn't. The only one who gained anything from Iraq war, were 7 USA-based oil companies.

Iran has lost the war vs Iraq a some years ago. As a European, I don't see Iran as a threat. But you probably do...


That's wrong. We do know that they had been trying to develop nuclear weapons for years. The first reactor was bought from France in the 70s and the Israelis bombed Iraq a few times to stop them from developing nuclear weapons. The same will happen with Iran if they do not stop enriching uranium above energy-related levels. Back to Iraq, there was evidence that was presented to Congress, and if you ask most of the people who voted to authorize the war based on the evidence, such as Hillary or John Kerry, they say they have no regrets in voting that way (i.e. http://www.cnn.com/2004/ALLPOLITICS/04/21/iraq.hillary/). Now, in hindsight, whether all that evidence was correct is an entirely different debate.


If you explain to me why Iran can not have nuclear weapons while USA and Israel (and France and the UK and Russia and Korea and China) can I'll give it a second thought.

My personal view is that the USA was interested in the oil sitting there. End of story. Same thing with Ghadafi. The rest is politics to justify a war that doesn't make any sense.

Indeed the Iraq war was Blair's political destruction in the UK. Why do you think no one wants to attack Syria? Out of lack of evidence ? At that level you don't need evidence, you create them...


Your personal view is wrong, and, even worse, not very smart. It does not make any sense to spend this much money on getting Iranian oil - it could be just bought much cheaper (if all sanctions and impediments were removed), and US has plenty of oil that is not being developed anyway.

>>> Why do you think no one wants to attack Syria?

Because attack presumes you need to achieve something. There's nothing in Syria that can be achieved right now that would be a desirable target. Assad is evil, islamic fundamentalists that battle him are evil too, US has no power and no political will to reform Syria and make anything good out of that mess. Neither does anybody else. That's why Assad is not being removed - because after removing him nobody knows how to clean up the mess.


We're not talking about fistfights here.

The best solution is to prevent the problems; I hope you understand while reading this article (which went here on HN some time ago):

http://news.yahoo.com/german-police-used-only-85-bullets-aga...


Not if you're a 800-pound gorilla against 30kg monkeys...

Then offense is just offence.


Enough monkeys could take even 800-pound gorilla. In fact, it is considered a common knowledge that some bipedal monkeys regularly took 16000-pound mammoths, ate them and made dwellings out of their bones. So if I were a gorilla I wouldn't underestimate 30kg monkeys. Especially if they have advanced weaponry.


In theory maybe.

In actual life, the 800-pound gorilla is beating the shit out of monkeys, invades their villages, pushes them diplomatically, installs his lackey-monkeys in power in their jungles, and steals their resources.

And he counts any nick or scratch on his body (inflicted by the monkeys tiny hands) as worthy of the lives of 10,000 monkeys -- which he considers almost subhuman and even talks openly of "bombing them back to stone age".

Oh, and he maintains that he's the righteous and good one in all this, and it's doing it for their own good.


If you look at what happens in the jungles, all this was happening before the colonial powers came in, and is still happening when they left. So, without going too much into appropriateness of calling these people "monkeys", I'd suggest maybe the gorilla is not the biggest problem they face.


White House: NSA and Cyber Command to stay under one boss

http://arstechnica.com/tech-policy/2013/12/white-house-nsa-a...


NSA IA is actually the lead for all IT/technical intelligence defense for both USG and other US entities vs. foreign intelligence/military agencies.


No conspiracy theory requried, as it does not require /intention/ on the part of the NSA. This can simply be Pavlov-style reinforcement: misguided ideas get amplified by rewarding the behaviour with budget increases.


>No conspiracy theory requried

Conspiracy doesn't mean aliens and Disney being frozen.

It just means people/organisations doing something together in secret.

What the NSA and partners have done is very much a conspiracy -- by definition.

As the great writer Gore Vidal once put it, "Americans have been trained by media to go into Pavlovian giggles at the mention of 'conspiracy' because for an American to believe in a conspiracy he must also believe in flying saucers or, craziest of all, that more than one person was involved in the JFK murder."


My point being they that the conditioning/feedback-loop may exist even in the case where the people involved are not aware of it. It is possible to have agents working independently, on their own compartmentalized pieces of the larger mission, each being influenced in a (apx) similar manner.Given the history of the NSA (and FBI) I would wager there probably is a significant amount of conspiracy in the department.

Money is a powerful conditioning force, and humans miss the "obvious" things that are influencing them all the time.


>Any sufficiently skilled rouge actor

Not quite - finding the actual magic number that enables the backdoor would involve solving the discrete log problem for the suspicious constant in the spec. A more likely scenario is some disgruntled employee steals the number and sells it to the highest bidder.


Minor quibble (and yes I'm as outraged by this as you are) - but "rouge" means "a red powder or cream used as a cosmetic for coloring the cheeks or lips", whereas "rogue" means "a person or thing that behaves in an aberrant, faulty, or unpredictable way", which is what you mean in this comment.


Another quibble: A "rouge" is also a one-point scoring play unique to Canadian Football.


The problem of a backdoor is that actually, anyone can use it

http://www.nytimes.com/2011/06/04/technology/04security.html...


Just a side note, rouge = red, rogue = villain/scoundrel/etc... I hate being that guy but it happened twice and triggered my have to post response.

Tshuß!


Just a side note, "Tschüß!" = bye/cheers/etc; "Tshuß!" = I can't spell German.

I hate being that guy but … wait, I'm lying, I love it, but I normally try to restrain myself.


How many times did you check your comment to make sure all grammar and punctuation is perfect? :)


Is wasn't perfect. There was a space between "but" and the ellipsis. Not to mention the several other mistakes.


I disagree that the space between "but" and the ellipsis is a mistake, and the first citation I found (http://grammar.ccc.commnet.edu/grammar/marks/ellipsis.htm) supports me.

However, lest anyone think I think I'm perfect, I'll point out that I omitted the period after "etc".


It wasn't... You know, I hate being the guy that hate those who hate being that guy, but couldn't resist.


"You know, I hate being the guy that hate those who hate being that guy, but couldn't resist."

It is "I hate being the guy that hates those who hate being that guy" :-)


Mate! :)


ah, nice!


*hates those


Which _several_ other mistakes?


note, -> note:

guy -> guy,

using 'but' twice in the sentence

etc -> etc. (noted by author)

in general, the phrasing of the second sentence is questionable. perhaps it should be two sentences with a period after "I'm lying"


"Tschüß" = I can't spell German either, or I haven't been paying attention for over a decade.

In many instances, "ß" has been replaced by "ss", namely where the resulting sound ought to be sharp and short. Schuss, Tschüss, Nuss.


It's actually "tschüss" or "tschüs".


You're wrong on points 5 and 6. Dual_EC_DRBG is not "unsafe" per se; it's just that the constants chosen could be precalculated so as to allow easier prediction of the resulting random numbers. This doesn't mean that the numbers the constant was calculated from are easily calculable by an attacker.


Not that many people use / used BSAFE. However, the news is still pretty mind blowing because it makes you wonder what else the NSA is doing.


Eagerly awaiting tptacek's retraction to his insistence that this was not a backdoor.

Edit: Nevermind, apparently he already did a mere 8 hours ago, replying to my own comment. Shortly before this broke.

https://news.ycombinator.com/item?id=6941366


The beauty of this backdoor, for all its faults, is that it was reasonable to believe that it wasn't a backdoor. And it was also reasonable to believe that it was. This backdoor is quite deniable, elegantly so.

So far I have disagreed with tptacek when it comes to what's backdoored and not. But I can understand his reasoning, and it's quite sensible.


[deleted]


> Jesus, what a tool you are. I absolutely believe you: I think you read this story and eagerly awaited its implications to some random person on HN.

Huh, I've seen your patience tested on HN before, which tends to elicit mostly restrained responses save for a bit of snark, but that's the first instance of actual name calling I've noticed. I'm genuinely curious how this comment annoyed you. The tone I'd expect is more of a "yeah, you got me" <kneeslap>. Instead it sounds like I'm accidentally trolling you.

For what it's worth, I did legitimately get excited to run to HN to play "told you so". After months of debate over this issue across numerous threads, I'm not going to lie, vindication is momentarily exciting.

> For what it's worth, my take on Dual EC (before learning more about it) was the same as noted NSA apologist Bruce Schneier.

Wait, tptacek is calling Bruce Schneier an NSA apologist?

Aside from being absurd, your claim that you shared the same opinion is also false. Your own comment here directly contradicts this, and you even dismiss Schneier's credentials upthread, yet appeal to his authority in your comment:

https://news.ycombinator.com/item?id=6424920

"I am aware that Schneier believes Dual_EC to be backdoored. I'm aware that Dual_EC comes from NSA. I would not use Dual_EC and would flag it if I saw it in an app I assessed. But I would still, right now, with the information I have, bet against it being an NSA backdoor. Not because I trust the NSA, but because it's a very dumb backdoor."

Edit: In reply to a now deleted comment by tptacek.


> Wait, tptacek is calling Bruce Schneier an NSA apologist?

I think that was intended as sarcasm. He's defending his previous position by saying that he (previously) had the same opinion as Bruce Schneier, whom no one would accuse of being partial to the NSA.


Your series of comments in this thread is way below the threshold for positive contributions to any HN discussion.


I'm curious as to your opinion of tptacek's deleted comment, and whether that was above or below the positive contribution threshold.


It was a reply to a taunt.


I'd say the original comment by lawnchair_larry comes off as a bit gauche... as if the XKCD "someone is wrong on the internet!" guy came here to post. I never saw the deleted comment, but it seems that after the initial frustration wore off, Thomas thought the better of it.

I've had my disagreements with some of Thomas' positions, including several over crypto/politics stories like this, but if you run out like that to play "gotcha!" it just doesn't feel right.


Whereas repeated pro-NSA apologies are? How many people would approve of them and how would they respond to them, if the person making them wasn't also all powerful in a forum?


> Jesus, what a tool you are.

This sounds like the start of a pretty angry prayer.


you'll probably get downvoted, but it made me laugh.


It actually get 60 net up-votes


Your reaction to this story was wondering if it can be used to demonstrate another member of HN being wrong in the past? Petty


When 'tptacek is wrong, he's obnoxiously wrong, especially in his inability to believe in government misbehavior, and his willingness to denigrate "message board nerds" on that sort of matter. (See also his attacks on Greenwald when the Snowden story started.) So personally I was looking forward to seeing somebody comment about him.


Pretty much. Not only that, but he's incredibly influential, so to see him get knocked down a peg does a lot of good.


This is a bit much and was not at all the motivation behind my comment.


This is what happens when you make it personal, though. I try to let being right be its own reward, not a license to tell people how wrong they were.


tptacek has the most karma on HN (even moreso than pg): https://news.ycombinator.com/leaders (for reference, pg has 149712 karma at the time of writing; tptacek has 165020 and the next person has 88887) His opinion is respected by many (and many accept what he says without question). A retraction by tptacek reminds us all to think critically

lawnchair_larry's comment is equivalent to questioning the president or a major celebrity, which oftentimes isn't a personal grudge.


What I do is just not read the usernames (beyond roughly scanning the word to figure out who replied to who). No really, I mean that, I don't even know your username.

That makes for a wonderful experience really. I interact with this nameless entity and each post is largely valued by its responses (I often leave an article open for a few hours to let the comments ripen a bit, that also adds a lot).


I think HN might be designed to encourage this, judging from the lighter color given to the post metadata line.


Comparing someone with high comment karma to the president is a bit absurd, no? The president could more aptly be compared to forum moderators on any given discussion website, as both have some executive power.


Yeah, I get that a lot too. Also his attitude towards open source cryptography related projects is strange and totally unjustified imho.


He's had a perfectly friendly attitude towards GPG, and in the case of others you can see ample evidence that his skepticism is justified. Maybe if the open source cryptography projects you're referring to weren't bad projects then the attitude would be strange.


cryptocat sucks, plain and simple.


> When 'tptacek is wrong, he's obnoxiously wrong, especially in his inability to believe in government misbehavior

For the record, this is incorrect. In past interactions he has stated his concerns over certain of NSA's "misbehavior".


Not just 'another member of HN', the most high-rated, the most prolific member of HN who is very often found shaping the direction of discussions here and is now a considerable voice in the security community. He's also someone that new tech startup founders listen to when deciding what to use and what not to use.


I know who tptacek is, I've read some of his papers, I've applied to the crypto challenges, I've disagreed with him in the past about the importance of BSAFE to the industry. It still comes across as petty to launch into a meta discussion of who's right and who's wrong on HN when there's much more interesting topics to consider based on this article's revelations.


> [...] but RSA said in a statement: "RSA always acts in the best interest of its customers [...]

True, you just have to keep in mind that their customer is the NSA.


RSA is thinking they can claim ignorance in the case of the DRBG being weak / possibly backdoored.


They were either corrupt or incompetent. This can't look OK for them.


From the BSAFE product page:

"RSA BSAFE Crypto Kernel offers versions of popular cryptographic algorithms optimized for both small code size and high performance. Unlike alternatives such as open source, our technology is backed by highly regarded cryptographic experts." [emphasis added]


Typo; they left out "door".


Well NSA do have highly regarded crypto guys. And they do back the technology.


Truth in advertising, that.


This is really hilarious.


It never claimed that those experts were working in the customer's best interest, though. ;)


LOL


>> https://news.ycombinator.com/item?id=6942165 tptacek 5 hours ago | link I am not generally a believer in the theory that NSA actively subverts Internet standards† †(my best guess is that the standards NSA was actively subverting were about international telephony; subverting the IETF is a little like subverting the Linux kernel --- doable, but bad tradecraft)

Does this count?(not trying to be sarcastic or a smart-a##), I just want to get a handle on what I should or should not trust these days. Seeing that RSA SecurID VPN dongle pic in the article scared me. I've pretty much been looking to your comments to give me a baseline.


Personally, I think one of the things you can't trust these days are comments by tptacek.


Either you're insinuating that 'tptacek is a malicious actor, or that he's incompetent. That's a pretty serious allegation to make without providing any evidence whatsoever. Do you have any? I'm sure you can dig up a few examples of things that he said which were incorrect, but very few of those will not have been followed by a correction at some point, and either way your insinuations seem to go beyond "being wrong some of the time".

HN is incredibly fortunate to count members like 'tptacek as part of its community. We should be behaving in ways which encourage more comments and commenters of his ilk, not less.


Unsurprisingly you're already being down-voted. For a community that prides itself on being rational and home to spirited debate, when it comes to the NSA, any contrarian opinions (or even alternative perspectives) tend to be quickly attacked and silenced.

If you read some of the first threads when the NSA revelations broke out, there are heated discussions with various viewpoints and arguments. Now, it appears that most of these users have become tired of being instantly downvoted, and instead avoid these subjects entirely.

I hope that tptacek continues to participate in these security policy discussions, not only for his extensive domain knowledge, but also because he is not afraid to voice beliefs that disagree with prevailing opinion. And right or wrong, its very refreshing.


> If you read some of the first threads when the NSA revelations broke out, there are heated discussions with various viewpoints and arguments.

Always mixed with a steady groan of "enough of NSA stories" and "none of this is surprising". The heated discussions were in no small part about wether this was even the problem it was made out to be and wether it should even be discussed (to this extent).

Not that I agree with downvoting instead of replying, or with bashing tptacek (Everybody loves telling experts "I told you so". Doesn't make us experts tho :P), but I don't agree with your narrative either. It's not falsifiable, anyway. People might just as well have given up on trying to downplay this, and walked away instead, which would be even worse. Why speculate. Bashing and downvoting for disagreement without argument sucks either way.


> Either you're insinuating that 'tptacek is a malicious actor, or that he's incompetent.

There is a large area missed called psychological bias. People who has close friends working in highly controversial areas has a tendency to become a bit irrational in the view of the controversy. An attack on the NSA becomes an attack of the friend. If NSA is immoral and wrong, the friends choice of occupation must be wrong, thus the friend must be wrong, thus an attack on NSA is an attack of the friend.


>Do you have any?

Don't really have a dog in this fight, but: up until today, there was no evidence "the NSA created and promulgated a flawed formula for generating random numbers to create a "back door" in encryption products".

Were people wrong to be suspicious?


There was previous evidence, it just wasn't as conclusive as a contract with RSA: https://en.wikipedia.org/wiki/Dual_EC_DRBG#Controversy


You can definitely trust technical information from tptacek. But you should treat his speculation as you would anyone else.


I disagree with many of tptacek's opinions but honestly he's one of the reasons this site is great. He is capable of arguing with people with strongly opposing views with civility, which is something that is entirely too rare these days. He's also capable of admitting when he's wrong and being gracious when proven right. Also entirely too rare these days. I'd rather have a thousand tptaceks on this site than zero.


> He is capable of arguing with people with strongly opposing views with civility

You're clearly talking about a different tptacek, widely known on this site for his coarsely abrasive, impossibly high friction, social interactions and not admitting he's wrong on issues trivial or important. He's also widely known for a being an expert in his field.

All that being said, I agree with you that this site is more valuable with him on it and regularly participating. He's one of the actual experts in their field that makes this a much better forum than any other. IMHO, it's well worth the comment burn to talk and debate (friendly or not) with somebody of his caliber.

And being wrong every once in a while (regardless of his rightness in this case) does not make him either incompetent or malicious. It just makes him human.


tptacek, widely known on this site for his coarsely abrasive, impossibly high friction, social interactions and not admitting he's wrong on issues trivial or important. He's also widely known for a being an expert in his field.

What are you talking about? Whatever caricature you're illustrating here is not Thomas Ptacek.

With the way you've been talking, I would've suspected you were a newer member, but you've been around for three years or so. So I simply have no idea what you're talking about.

Would you please point out precisely which comments you take issue with? https://www.hnsearch.com/search#request/comments&q=by%3Atpta...

I think the thing to remember about Thomas, and me, and everyone else, is that we're all human, and we all have different moods which influence our behavior. Thomas's, on average, is exemplary.


I'm glad to see that he's got both of us defending him.

I'm talking about the same tptacek who I've personally butted heads with where he couldn't even accept being wrong about how to make stew (looking back, that was exactly 1 year ago to the day!)

I respect tptacek very much for his domain knowledge and expertise. He has great theories on hiring practices and cooking among others. He's one of the names I look for on HN.

But he requires lots of care and effort. I have to mentally peel back about half of his posts to remove the snark and assholery and get to the juicy bits. But those bits are usually there and usually worth the effort to get to.

That's okay, I'm a grown up and can deal with high friction in order to enjoy interacting with somebody who's truly intelligent. tptacek is just one of those types that comes with lots of smarts and lots of difficult personality and that's okay.

And for the record I'm also aware that I can be rather high friction and assholish as well, and not nearly as insightful as tptacek.


EDIT: You know what, I'm not going to dignify this any further, other than to say that I don't want HN to be however you think HN should be. By saying "he requires lots of care and effort," you're discouraging people like Thomas from participating, and therefore making our community worse as a result. How would you feel if you saw someone talking like that about you?


I'm not even sure what your responding to?! In no way am I insinuating that tptacek shouldn't participate here or that his voice isn't extremely valuable. I'm not being facetious when I said I'm glad we're both defending him.

I'm logically one of the last people to defend him here having butted heads with him so much, but in fact I deeply value his presence here.

> How would you feel if you saw someone talking like that about you?

I'd probably agree with them. I'm not a high-school kid afraid of how my peers will see me and neither is tptacek. I've said as much about his communication style to him directly.

I highly doubt that tptacek doesn't have enough self-awareness to know that he's a high maintenance debate partner. There's no reason to paint him as a saint, he's just a guy. A very smart guy, but he has his foibles and flaws, which are far outweighed by his contributions. But to ignore those more difficult parts of his personality does him a disservice by not seeing him in his entirety.

I respect the entire person (as much as I can see through the limited lens of HN) not just the parts I think are praiseworthy.


https://news.ycombinator.com/item?id=6944628

> Jesus, what a tool you are.

How very civil and gracious.


He deleted, i.e. retracted it. In full. To harp on about it instead of talking about the story kinda sucks. We're talking about mass surveillance and everything being recorded, and look at what we are doing. Repeat after me: every day is a new day.


Sometimes it's tough to contain righteous internet rage. I think he knows that crossed the line and that is why he deleted the comment.


.. or he's doing Image Management.


He's a human being, and thus imperfect. He's still much easier to have a conversation with than 99% of the posters on HN.


As much as he can get under one's skin, and as much as he can be abrasive, and any number of other things, I trust his opinions on security and crypto.

He's rational to a fault--unfortunately, that means that when facts change he may be left with egg on his face. I don't think there's anything wrong with how he's handled this stuff.


>...I trust his opinions on security and crypto.

And here, ladies and gents, is exactly why we'll continue to inhabit an exploitable world forevermore.


Trusting tptacek in the form of completing and learning from the Matasano crypto challenges would lead to a much less exploitable world forevermore.

It's okay to provisionally trust the word of someone who has previously and clearly demonstrated actual competence.


I'm also doing the Matasano crypto challenges and they are pretty priceless, don't know of anywhere else who offers a similar learning experience by breaking stuff, for free even.


You've got to trust something, eventually.


I find tptacek's remarks to be enjoyable, generally speaking. In regards to crypto, I value his opinion highly, especially compared to my own novice opinion.

That said, I seldom trust anything I cannot verify. In matter s of crypto, that often means that I accept some things as magically working, and accept that the magic could wear off at any minute. Same thing with CPUs. I know generally how they work, and understand bitwise logic, but for the most part, they're just magic boxes that I've got enough experience with to have an expectation of.

In matters of the government, the fault I find with tptacek's arguments (and I hadn't even realized that it was a thing until this thread, but now I'm caught up) is that I think it is naive to trust the government. The federal government is something that our founding fathers encouraged us to be suspicious of. They specifically prescribed that, in order for our democracy to thrive, that we should be ever vigilant in regards to those we entrust with power.

Assuming good faith on the part of the NSA is naive, whether or not they're acting scandalously. Assuming good faith on the part of any politician is naive.

That isn't to suggest that we should never trust anything the government does, but if there's ever the potential for abuse, we should expect that potential to be abused at some point. If there's a loophole that could be exploited in any way, we should expect that it will be.

This diatribe isn't really directed at this comment, per se, but at your "have to trust __something__" comment, which I completely agree with as a generality. As humans, we routinely put trust into a great deal of people and things all the time, but I disagree that a government, even a pristine, flawless, immaculate government, is deserving of that trust, and it is our duty as citizens to thoroughly distrust it.


After reading tptacek's comments in the latest thread about Telegram https://news.ycombinator.com/item?id=6940665 I can only agree. He insisted Telegram team should abandon its custom solution without providing any actual proof that it's vulnerable. His advice was to rely only on "modern" algorithms (mostly the ones included in "NSA Suite B Cryptography"), but he provided zero evidence why these algorithms should be more secure than the ones already in use.


In cryptography, the expectation is that the person presenting the algorithm should substantiate their claims, preferably with a proof. Saying that something is secure because it hasn't been broken yet does not settle well with people. And when it does happen, it's clearly caveated ("assuming the hardness of Discrete Logarithms", for example).

That aside, your challenge smacks of snake oil. I gave an analogy earlier that captures the essence of the complaints:

Suppose I am selling fire-proof safes. These are designed to protect your documents and valuables from thieves and from fire and other events.

The normal way people set up tests is to put some documents and valuables in a box and actually try to break it (MythBusters style, bringing out cool machinery and trying different ways). For fire resistance, there is a rating system (https://en.wikipedia.org/wiki/Fire-resistance_rating) and a standard way to test.

The Telegram proposition is: we are going to place the safe in Fort Knox. If you can't break the safe that is in Fort Knox, then clearly our safe is secure.

People are arguing that in order to break the safe, you have to break into Fort Knox. And for all intents and purposes that's not going to happen. You could have put a cardboard box in Fort Knox but no one can tell the difference because of the way you structured the challenge.

In that sense, you aren't testing the real-life security.


You guys are still failing to appreciate that your composition of cryptographic primitives is unproven, which means it is probably broken. Why is it probably broken? Because most compositions of crypto primitives are broken and your adversary is so formidable he will find the smallest problem.

In cryptography, you either prove it is safe or you consider it broken. Your choice should be considered broken until you prove otherwise.


This is a really bad and somewhat frustrating comment (if you're trolling, nicely done). He's absolutely correct about Telegram and this is not how you run crypto contests. This isn't even a tptacek opinion, it's a "everybody who has any reputation in the crypto field" opinion.

Edit: Oh, you're the Telegram employee who designed the contest. I encourage you to read moxie's blog post, and Schneiers rebuttals to crypto contests that are probably linked all over your other threads.


I think Pavel is providing the financial backing for Telegram, rather than being an employee -http://en.wikipedia.org/wiki/Pavel_Durov


Ah, the Telegram HN account just said he "proposed the contest", so I assumed employee. If he is the financier, then it is not surprising that he doesn't understand why his crypto contest is a bad idea.


right and it also explains why the Telegram guys went ahead with his suggestion, because they're presumably keen to keep their main financial backer happy.

I don't think there's any attempt to sell snakeoil here, this is a case of a road to hell being paved with good intentions. To people not well versed in cryptography the things Pavel is saying and the approach Telegram is taking all seem completely reasonable, and the people who do do crypto and are responding might as well be talking a different language. To them the flaws and red flags are so obvious that their responses are incredulous, which has led to the vitriolic back and forth we've seen - neither side can comprehend the other's position. This is Dunning-Kruger[0].

[0] http://en.wikipedia.org/wiki/Dunning%E2%80%93Kruger_effect


With all due respect, nothing can be "obvious" unless it is proven. You cannot take something for granted just because a respected cryptographer says that. Not after we learned that NSA pushes backdoors using respected firms and people in the crypto-community.


By this reasoning you should presumably agree that the onus is on Telegram to prove the security of their system, not on the rest of the cryptography community to prove that it is insecure. Telegram have completely failed to do this. Even if Telegram had a formal proof of their system (and implementation), would you be in a position to read and understand that proof? I suspect not. Like me, you'd have to trust a group of respected cryptographers to do that job for you, so I don't really know what you're trying to say here. Just because one or two respected cryptographers appear to have become NSA tools, does not mean everyone has.

Also note that it's not a case of one random crypto guy saying that Telegram's approach is flawed, but a case of virtually the entire crypto community saying that the approach is flawed. Does this not ring alarm bells for you? How can you judge that the Telegram guys know their stuff and aren't leading you down the garden path or are themselves deluded?

With your backing, there is a real chance for Telegram to bring secure communications to the masses. This is indisputably a noble goal, but the areas that Telegram should be innovating in are in UI and features - not cryptography. There is no such thing as mostly correct, 'good enough' cryptography, either the system is secure, or it's insecure - there is basically no middle ground. If you fail, it's a bit more serious than your typical software bug - innocent people can literally die - the very people that need this the most are the most at risk. These are the reasons Telegram have been met with such a frosty reception here. Because they come across as arrogant in an area where arrogance is the absolute least desirable trait.


The wish to broaden the contest is understandable and already taken into account http://bit.ly/1htlEod

What I was saying in the comment above, however, had nothing to do with the contest. I expressed concern about tptacek's aggressive promotion of one algorithms (branded as "modern") over the other (claimed as "anachronistic") without any substantial proof. https://news.ycombinator.com/item?id=6941934

This is really alarming.


Could you please provide some proof that you are who you claim you are? Like a post on your VK page? Thanks.


This comment on VK by id1 (Pavel) clearly states he participates in recent HN threads. I think it's fairly safe to assume he is who he is.

https://vk.com/roem?w=wall-20537665_23327

Here's an unedited Google Translate translation (I read it, and I think it conveys the message):

As I see it , there is not so much Anonymus as creators local competitor - TextSecure under Android . Telegram gathered a lot of users , and they're rightly fuss . The boys are torn between argument " either too new algorithm , why is it , if there is a proven " and your " algorithm either too old , why is it when new ." Nevertheless , trade on HN gives thousands of registrations Anglo-Saxons and tons of references .

I think the debate will be a good end to the competition announcement decoding traffic Telegram. Let's say I was ready to open all of my correspondence traffic since registration in Telegram and give $ 200,000 to anyone who will decipher it and tell you how . As a result Telegram or detect and close the loophole for special services, or - more likely - will receive another proof of the inviolability of their protocol


Ok, thanks.

Here's another comment of his further down:

Я помню первый обзор о ВКонтакте на Хабрахабре, кажется, в 2006 году. Эксперты делились комментариями вроде "кто они такие", "еще одна соцсеть не нужна" и "на php пишут только нубы". Неудивительно, что HackerNews, построенный примерно тех же принципах (карма, ранжирование), создает чувство deja vu.

Тем не менее, будет здорово, если там объявятся не только любители поговорить, но и те, кто реально прочитает документацию к MTProto.

Which roughly translates to:

I remember the first reviews of VK back in 2006. The experts were saying "who are they?", "we don't need another social network", "only noobs write in php". It is not surprising that HN is built on the exact same principles (karma, rankings), brings up a deja vu.

However, it would be great if someone who actually read the MTProto docs can show up, and not just those who like to talk.


In this case, it doesn't actually matter who he is, so there is no need really. Our responses would not be different if it were someone else saying the same thing.


RSA SecurID was already compromised in 2011, and RSA more or less tried to hush-hush it: digitaltrends.com/computing/rsa-securid-data-stolen-by-a-nation-state/


Seeing that RSA SecurID VPN dongle pic in the article scared me.

Why do you think they put it there?


IETF is very different from the NIST.


...which is why Theo Deraadt is now suddenly everyone's best friend, despite his personality. :) OpenSSH and its mother project, OpenBSD, are now all that is left of our civilization's freedom to think.

Thanks, Theo, for never selling us out; for being such an uncompromising bastard; for not being like the RSA. May Athena gird you for war against the Spartans.


Most of what Deraadt says makes sense and I almost always agree with him but he can be an asshole. It has turned a lot of people off, from what I can see.


I wonder if any of the executives involved with this deal will have a moment of clarity and make a public statement - "I was directly told by representatives of the U.S. Government that if we did not take this deal there would be direct and material consequences for both my company and myself. Here is the names of the people I met with, here is a log of the meetings. If I am jailed or in some other fashion publicly discredited through an otherwise seemingly unrelated matter in the future, you should always remember that I have made this public statement."


Other executives have.

Look at what happened to Qwest CEO Joseph Nacchio after challenging illegal NSA warrantless wiretapping requests. (Hint: he just got out of federal prison about two months ago.)

http://online.wsj.com/news/articles/SB1000142405270230398390... Mr. Nacchio said he still believes his insider-trading prosecution was government retaliation for rebuffing requests in 2001 from the National Security Agency to access his customers' phone records. His plans to use that belief as a defense at trial never materialized; some of the evidence he wanted to use was deemed classified and barred from being introduced. To Mr. Nacchio, the revelations of former NSA contractor Edward Snowden, who leaked documents saying the agency monitors the email and phone records of Americans, have justified his own stance. He contended the NSA's request was illegal. "I feel vindicated," he said. "I never broke the law, and I never will."


Nacchio defrauded shareholders out of millions of dollars. Let's be careful about who we're valorizing.


I'm generally curious about this. I have no idea how to judge Nacchio's career. Can you point some facts proving this point of view?

Or maybe: How was his position any different than yours, if you had a request from the NSA that you wouldn't want to fulfil, knowing that rejecting it could destroy your company, what would you do?


The issue is, imo, very murky but as I understand it:

NSA approached Nacchio and Qwest to do what they were doing with AT&T and Verizon. Qwest had previously helped the NSA intercept all comms in Salt Lake City during the Olympics but told the NSA they weren't interested in cooperating. Nacchio sells some stock. Qwest is suddenly dropped as the favored vendor for a huge government contract leading to a drop in Qwest's share price and earnings.

The US federal goverment's position was that Nacchio knew the contract was going to get dropped and cashed out early - insider trading. Nacchio contended that he was just selling stock and that the government had pulled the contract to entrap and prosecute him in the current case.


Read the indictment. Nacchio was convicted along with several other executives of running a pump and dump scam.

Despite being specifically prohibited from trading based on insider information, Nacchio first became aware that their earnings guidance was "a huge stretch", that to meet them would involve growing revenue from a line of business that had been failing to grow revenue and that had actually been underperforming that year, that they had (apparently) lost important contracts, and that it had become essentially impossible for them to hit their numbers. Then, after learning all that, but before any of it was disclosed to investors, Nacchio dumped over $100MM worth of his stock.

Nacchio controlled the earnings targets for Qwest. He set them dishonestly high and allowed them to be released to the public over the objections of many of his own executives. The stock performed as a result. Then, when it became obvious that the public would soon learn that those projections were impossible to meet, he sold his stock for $100MM.

Nacchio went down within a year of Enron and just a few years after Worldcom. It was the end of an era in which the big accounting firms had conspired with large corporations to swindle the public out of billions of dollars. Nacchio was a crook, not a Fourth Amendment hero.

Are the executives at JPMC crooks? I don't know. If they are, which is not outside the realm of possibility, they should go down too. But what JPMC people do has nothing at all to do with the fact that Qwest's executives defrauded the public to the tune of over $100MM.


So now his character is even bigger enigma. If the guy was a crook and fine with ripping stockholders out of 100MM tune, then how come he didnt want to play along with NSA? If he was greedy then he should have gone along with NSA offer. What could be his motive to say no to NSA? Wouldn't he know, at the time, saying no to the Gov may result in his contracts being shut off??


> Are the executives at JPMC crooks?

Yes. (Edited for reasons)


> Let's be careful about who we're valorizing

So perhaps this guy is indeed a slimeball.

Fabricated up claims are by their nature nearly indistinguishable from real ones, and outright fabrication isn't the only unethical recourse: there is always panopticon powered selective prosecution— how many felonies have you committed this month?

Regardless, we can observe now that the result will be time in prison and tptacek on HN diligently countering any claim of governmental misconduct. The insight here isn't related to Nacchio's character, it's that claiming that the government is retaliating for failing to comply with their unlawful demands doesn't provide protection.


Too bad he didn't work for a Chase.


Think of it from the executives perspective:

Option A: keep mouth shut, make a shit ton of money

Option B: become a martyr, face prison time

People like Snowden are rare.


>>People like Snowden are rare.

In all honesty, Snowden is a 30 year old single dude, and as far as I know, he doesn't have kids. Do you think he would have done what he did if he had a family to look after?

In my opinion a person's first responsibility is to their family. So yeah, if you're married (like these executives probably are) and you're facing the choice between option A and option B, you should absolutely pick option A.


So the nuclear family combined with a distributed economy is basically a convenient tool for justifying atrocities of all kinds. Just feeding the kids, right?

Maybe not having kids is actually the morally correct choice, then?


Don't be a fool. You would let your children go hungry and live a worse life (directly because of your actions) out of principle? It's not simple. Having a family can be a beautiful thing. Not having one and spilling the beans on something morally reprehensible can be too.


>Don't be a fool.

Classy.

>You would let your children go hungry and live a worse life

No. Read what I wrote. The words are right there.

If the choice is "have children and commit evil to feed them" and "don't have children and don't commit evil", I choose the former. As should, I think, any right-thinking person.

The question is probabilistic. What are the chances that the former happens? What are the chances that the latter happens?

Choose accordingly.

The question is also systemic. There exists the possibility that forces larger than the individual have decided to normalize the nuclear family (and also romanticize the vision of having said family) in order to serve evil ends. What is the probability that that is the case? As time goes on, it looks far more probable than we once thought. People like you think families are in themselves beautiful. Any means justify the ends of preserving them. Seems like an excellent tool for keeping a population right where you want them.

Look up the history of the nuclear family. Notice it didn't exist pre-industrialization. Why's that?

You're taking humans -> have children for granted. I'm arguing against that dogma. Because as paradoxical as it may sound, it is trite dogma at this point in wealthy societies. We don't need these additional people, we don't need this extravagant life. It's not a matter of survival anymore. So what is it all accomplishing? What's the end?

>Having a family can be a beautiful thing.

For my morality, concerns of beauty don't trump concerns of humanity. If my having children perpetuates a cycle of exploitation, murder, pain, suffering, etc. etc. etc, then I don't have children. Regardless of how "beautiful" my experience of those children may be. It really is that simple.

And if a (wo)man tells me "I just did it to feed my kids" after committing some reprehensible act, I sympathize, because (s)he made a terrible decision in having children to start with. But I still condemn him/her.


That's a good point actually. Maybe we need more ethical loners without emotional attachments in a positions of power.


Like a celibate priesthood?


I here note that one can be sexually active without reproducing. No children doesn't imply celibacy.


Certainly the case. Historically, less the case but still the case...


What are you saying? That because Snowden didn't have an extension to his own bloodline that it was easy for himself to come forward and blow the whistle?


I can't vouch for whether or not that is what he was saying, but if so, it's pretty likely to be true. People with families, right or wrong, tend to place the security of their family's future above their own political beliefs.

Snowden's actions were brave, regardless of his family status, and I don't wish to downplay that even one iota, but yes, if he had a wife and three kids, it likely would have made his actions even more of a longshot.


Maybe, we, as a community, could lessen that dilemma by helping the families of martyrs.


Also, to reward the hiring of whistle-blowers. A company that hires people with a history of raising the alarm should be more trustworthy.


Tim Cook could have easily mentioned something then, if the profiles I've read of him are true.


Snowden had a girlfriend, AFAIK.


A high salary, a hot girlfriend, nice house in Hawaii.

Good relationship with parents.

I'd say that is a lot to give up, in order to take the risk of being a whistleblower.

http://www.telegraph.co.uk/news/worldnews/northamerica/usa/1...


And what if it were very common to take jobs just to hack the internal network, scour it for sensitive-looking data, and dump it all publicly for the sake of fame? I am pretty sure most "executives" would not be happy with that norm


My guess is that most people educated enough and promoted enough to get access to such information wouldn't risk years of efforts for potential fame. I'd say most of the whistle-blowers want to remain anonymous.


Those aren't the only options. Anyone with any smarts can figure out how to quietly and anonymously leak a lot of these details. The fact is that they were too cowardly to do even that though.


If they do it anonymously nobody will believe the docs and say they are just elaborate hoaxes by tinfoil hatters...


These aren't the details that need to be 'leaked' anonymously - the whole point for the original suggestion to work as intended requires a public claim from aranking officer of that company; the actual info isn't important but the public testimony is.


As somebody who has been in IT for almost two decades, I can't think of a safe way to get a file off our corporate LAN without leaving a trail leading to me.

I realize it's an argument from ignorance fallacy, and maybe there are such ways, but I'm not aware of them.


Curiously someone claiming to have a safe way is also arguing from ignorance: "maybe there are ways to detect this, but I am not aware of them".


With sufficient level of access, it should be possible to erase trails and to create false ones.


The end of RSA (the company)? I find it absurd that a security company no less, would hear many veteran cryptographers say this is backdoored a decade ago, and still going ahead and using it - as the default! Who stakes the whole reputation of their company in the field for a meager $10 million (I assume RSA was pretty big back then, too)? It's insane.

RSA, much like NIST, can not, and should not be trusted any longer. All of their customers should be warned, and advised to quit them ASAP. Companies need to learn this is just unacceptable.


Serious question: Is there an alternative? I've never seen a secure fob that wasn't from RSA.


I like Yubikeys: https://www.yubico.com/. They show up as a USB keyboard, so you don't have to type the codes in.

There are some disadvantages. Yubikeys use a shared secret instead of public key crypto. Also, the one-time password is iteration-based, not time-based. On the bright side, you can program Yubikeys with your own secrets. They may not be as secure as properly configured RSA tokens, but they're much better than authing with just a password or client cert.


Yubikey NEO (latest revision) is like the one you already have + a java card that comes with a PGPcard app (and supposedly, you can write your own apps)

They don't have a timer like the RSA key fobs, and need a USB or NFC connection - but are generally very reliable, and given their constraints.

The questiion, of course, is what reason you have to believe that yubico (and for that matter, gemalto, g10code and the rest) are not similarly in bed with the NSA.


Trusting trust :) This is one of, but not the main reasons why we build our own (Bloomberg B-Unit, PDF is the only good pic I see: http://www.bloomberg.com/professional/files/2013/11/b-unit_3...)


Quis custodiet ipsos custodes?

Speaking of "trust", Bloomberg lost quite a lot of it when their reporters spied on their customers.

Bloomberg Spying Went On For Years After Execs Knew: Report http://www.valuewalk.com/2013/08/bloomberg-spying-went-on-fo...

You were probably just as horrified as most of the other employees at Bloomberg when that info became public. The bad apples cost Bloomberg a lot of reputation. My point is that "trust" is very elusive, very easy to lose, very hard to gain.

OTOH, are the "bad apples" at Bloomberg who condoned that behavior still in positions of power? Did they even get a slap on the wrist? If I were at Goldman, JPM, Citi, etc. I wouldn't "trust" Bloomberg until I saw some higher up people fall on their sword for that fiasco.


If I were at Goldman et al. I would expect Bloomberg to treat employees that successfully use underhanded tactics, as business as usual, the same way I would probably have seen such employees (and maybe myself) treated by my own organization: "Job well done boys, but you better cool it for awhile. BWA ha ha ha! Have a cigar and a hooker."


One of the original developers behind OpenSSH (Dug Song) started a competitor to RSA called Duo Security just a few years ago.

They sell Gemalto IDProve 100 tokens and support Yubikey, but advise using their patent pending push based 2FA authentication because: "Login requests are signed with an asymmetric PKCS#1 v1.5 key pair, which provides a stronger identity assertion than passcodes and prevents “RSA-style” breaches." From https://www.duosecurity.com/duo-push

They're used by companies like Facebook, Twitter, Sony, Arbor Networks, MIT, etc.

So yes, RSA has some strong competition.


Fastmail uses the YubiKey for two factor authentication.

http://www.yubico.com/


and LastPass


Both of mine are http://vasco.com


Gemalto.


I've worked with them on a chip and PIN* port from Java to the .Net Micro Framework. Very talented bunch of guys.

* My preference anyway to RSA.


Maybe the 10M carrot came with even a bigger stick


Perhaps I am not reading the article correctly, but it sounds to me like RSA products can no longer be trusted.


No, it sounds like no product from any American company can be trusted as long as the current regime is in place.

At least that's the message that comes through loud and clear in the rest of the world.


What makes you think the NSA isn't willing to work with countries outside of the US, either directly or through another spy agency?


Only the same things that makes me think american companies would not accept money from foreign spy agencies.


Willing, sure, but probably less able, at least outside of the close allies like the UK.


Why less able?


Threatening with legal punishment for noncompliance doesn't work, and neither does appealing to patriotism.


Are you seriously asking why a branch of the the USA's government has less power outside of the USA?


if you consider the fact that the nsa and cia often collaborate closely, and then look at the amount of influence the cia has often displayed in the past, towards foreign countries/regimes etc., gejjaxxita's question seems quite reasonable.


Plus the blackmail opportunities spying affords.


The same influence approach ($10m to choose a supposedly okay algorithm) would work just as well for most similar non-American companies, it isn't claimed that RSA did this because of some mandate which would fail if they'd be headquartered in, say, France.


Why keep the contract secret though?


Of course the contract must be kept secret for PR and product reputation reasons.

It's just as if an antivirus company to accept a contract with a major adware distributor to keep their products marked as appropriate - legal, but best kept secret.


That's quite a leap from the information in that article.


That article is merely one piece of information in a long chain (Echelon, the Snowden revelations, Lavabit), and all of them add up to the conclusion that you better not trust any US-based/originated IT security system.


> any US-based/originated IT security system

Perhaps, but the poster to which I replied said any US company, period. Could be he meant what you meant, but that's not what he said.


Add it to all previous and you have some basis.

Companies that have been compromised[1] - MS, Apple, Facebook, Google, Yahoo, Carriers, Backbone providers - now they are going after security providers. From the big guys only Intel is standing. And that may as well be the next leak.

Also think if they subverted some of the big guys antiviral software - it runs at ring 0 usually.

[1] Blackmail, threats, bribes, lawful intercepts, warrants, NSLs


Assuming that the preference of which algorithm is used in an encryption standard can be influenced by $10 million, then I I'd say you read the article correctly. Very alarming...


It sounds to me like they should be sued for selling a product that was knowingly less secure than they claimed.


That's how I read it.


The NSA's story about how they need to secretly do these things to fight the war on terror makes less sense with each new revelation.

Terrorists don't use VPN dongles.

What is really going on here?


Heh...I certainly had a good chuckle at this comment. I don't honestly think that the NSA ever paid more than lip-service to the "war on terror". They've been doing the same job since long before Sept. 11, 2001. Before the "war on terror" it was the "cold war", there just happens to have been an awkward gap in between...

The NSA is in the business of Signals Intelligence. Their job, plainly stated, is to have access to as much communication between non-US entities as humanly possible. What makes their job difficult is that, over the course of the last few decades, it's become increasingly the case that much of the communication between non-US entities travels via US-based channels using technology originated in the US. Somewhere along the line, when forced to balance "as much communication" and "non-US entities", the NSA clearly chose in favor of accessing those communications at any cost.


This is a very well-put comment.

The core cause there would seem to be sharing comm channels with foriegn actors--the same thing that makes our position with regards to the 'net so awesome also means that the NSA is kind of forced to get involved closer to home. It's a tricky tradeoff.


It's the same reason you never see James Bond negotiating with foreign heads of state. You don't send an assassin to do a diplomat's job. Everything that is being revealed about the NSA's actions, this buying of influence especially, is positively reprehensible...BUT it is important to keep an eye on where the blame really lies: with the people that let their assassins dictate their foreign policy and domestic priorities.


If "non-US entities" includes businesses outside the US as well, I'd agree. Revelations recently [1] that the spying went beyond countries/heads of state. I wouldn't be surprised to learn that companies were being targeted for US based companies' benefit.

[1] http://www.theguardian.com/uk-news/2013/dec/20/gchq-targeted...


You are making an assumption that the primary target of SIGINT is terrorists, but in reality it's actually nation states. I think another story just came out today about GCHQ targeting EU officials and embassies.


Nation states are likely to roll their own dongles though. The folk that use these are bluechips meeting due diligence requirements.


NSA also does commercial espionage to harm non-US bluechip companies, which are quite likely to use those dongles for internal data.


Businesses use RSA VPN dongles, and the stories that are starting to surface now are more about economic espionage.

"Follow the money" is a slippery slope.


Terrorists don't, but the banks that they use probably do. You've gotta break into a lot of systems before you get to the information you want.


>Terrorists don't use VPN dongles.

The story isn't about VPN dongles, it's about a backdoor in an encryption product sold by RSA.


How do you know?

Even if you're right, Airbus does.


Not surprised.

One of the security guys who worked for General Magic (GM made an early mobile OS with some security features) told me that he had a visit from the NSA. The NSA tried to get him to leak bits of the keys in the GM protocols. "Just here and there. I've got dozens of these," said one of the NSA reps.

This would have been early 90s.

The NSA has been doing domestic stuff like this for a long time.


$10Mi? That's a very cheap price for trashing your companies reputation.

More importantly, it confirms that DRBD is backdoored or at least weak enough to be subverted.


"it represented more than a third of the revenue that the relevant division at RSA had taken in during the entire previous year"


> DRBD

You mean DRBG [1], right? I hope DRBD [2] isn't backdoored.

[1] http://en.wikipedia.org/wiki/Dual_EC_DRBG [2] http://en.wikipedia.org/wiki/Distributed_Replicated_Block_De...


I think Dr. Evil was at the bargaining table


a better price than "do it or we will destroy you".


Lucky Green was the first to mention this: http://lists.randombit.net/pipermail/cryptography/2013-Septe...


"RSA, now a subsidiary of computer storage giant EMC Corp, urged customers to stop using the NSA formula after the Snowden disclosures revealed its weakness." - Just shake my head at this. As news is revealed that all these companies were complicit, they cry foul and "warn" users? RSA deserves to lose all international customers who refuse to buy their products because of hidden backdoors.


Quote possible that one arm of the company was an aware of the other arms actions. Probable, in fact. If most of the company knew of the backdoor, it would have leaked.


When the news about DUAL_EC_DRBG first came out, RSA defended their actions of inclusion and making it a default option by stating that it was at the time a popular choice. Back then I was aghast that a noted security company would make choices based on pure hipsterism. (My apologies to all hipsters, but in this case the word is in place.)

This news on the other hand makes it clear that RSA was not only being incompetent. They were being actively malicious. We've already seen anecdotes in this thread about NSA making house calls to security product vendors as far back as the 90's, so we must assume they haven't given up that venue and are still pushing their ideas, as well as pushing the vendors.

With that proof comes something a lot bigger: every single security product from a US company is now suspect. By logical extension, I will say that similar paranoia should be applied to all security products from Five Eyes countries.

The long-term financial fallout should be interesting material for future chroniclers.


Shouldn't this destroy RSA as a company? If your in security, and your security can't be trusted...


It should, but AT&T's still in business and their collaboration with the state to spy on customers has been known for a long time.


AT&T is explicitly selling "we connect you", not "we secure you."


RSA is now owned by EMC


RSA is commercially dead. There's no excuse.

Also, closed-source hardware HSMs are blackboxes that are fundamentally paranoia-inducing. There's no reason to trust that the vendor, supply chain and/or manufacturers didn't backdoor them or introduce other attack surfaces. The only way to trust an implementation is decap a sample of ASICs and match features against masks you generated... from sources you trust (whether open source or yours).

If it's a black box, there's no way to trust it (all modern CPUs, N/S-bridge, memory, flash (ssd), hd controllers, on and on.)

Conclusion: We need more open-source hardware that is production-quality (BSD licensed)! This would be very expensive in terms of people time, but it's necessary move since corporations can't be trusted.


Not necessarily. Organisations which wish to cooperate with the government (and they are legion) may still consider RSA. Though one wonders if NSA advised government organisations to avoid RSA. Hmmm.


I use one of these tokens for work. Spying is one thing but destroying encryption is another evil thing to do. If the NSA has introduced bugs in crypto then who's to say someone else can exploit the same crypto.


i wonder if Snowden has any detailed info on the NSA indroduced/forced backdoors (he obviously was aware about their existence in general like pretty much everybody in the world who isn't a tptacek's religious follower) and this or something like this is what keeps him alive - ie. NSA is afraid of dead man switch while other side(s) hopes that Snowden will reveal more and specifically useful for actual hacking info with time.


so that's the thing that scares me

a nsa official just did an obvious trial-balloon of pardoning snowden in exchange for return of all the docs [1]

but now that snowden is in russia, you have to assume that many nation-states have seen all these docs. so really, the nsa is worried that you and I will see them

fucking amazing

[1] http://www.theguardian.com/world/2013/dec/15/nsa-edward-snow...


The conditions for the pardon have never made sense, because as I understand it Snowden has already shared most if not all of his information with at least Greenwald and Poitras. He no longer has control over what will be shared with the public.


This is one of the many issues people have with what the NSA is doing. Weak crypto means not only the NSA can exploit it but possibly many other criminals.


I don't think this fiasco is related to the tokens but yes the tokens has other problems such that it didn't need NSA to break it.


I wasn't sure I skimmed half the article. It did have a giant image of one the tokens though.


It's a bad image, because it conveys an idea that's different from the story, but I can see why they used it -- from the general public's perspective the tokens are pretty much the most recognizable symbol of RSA.


Who in their right mind would use an American technology product at this point? You would be an idiot to think that it wasn't backdoored by the NSA.


Unfortunately, I think there's still a pretty large market of people who just don't give a crap about being NSA'd. Nothing to hide, and all of that.

That said it's likely individual consumers who are likely to have this attitude rather than businesses.


Seems like their customers now have an excellent case for commercial fraud against RSA.


the r in rsa is ron rivest who was responsible for some very elegant ideas. his papers, that i've read, are generally very simple and clear. but he also wrote md2 [an old hash, n longer used] which contains some "magic numbers" that no-one can explain. they are supposed to be derived from pi, but no-one knows how... http://crypto.stackexchange.com/questions/11935/how-is-the-m... (i even emailed him, but was shrugged off; i know it's silly and paranoid, but...)

anyway, i wonder what happens now to all the customers that use rsa dongles? big, international, political organisations...


TLDR: "RSA's contract made Dual Elliptic Curve the default option for producing random numbers in the RSA toolkit."

Dual_EC_DRBG was a NIST standard.


From the article:

"RSA adopted the algorithm even before NIST approved it. The NSA then cited the early use of Dual Elliptic Curve inside the government to argue successfully for NIST approval, according to an official familiar with the proceedings."


More specifically, it was RSA's "BSAFE" product which is problematic and was paid to be a default.


If it only cost $10m to bribe one of the biggest security companies around, how much does it cost to bribe a single open source developer who volunteers on tools like OpenSSL? What if you add blackmail to the mix?

Makes me realize that we need bitcoin-style "hack or bruteforce our encryption schemes and you can legitimately get paid lots of money" bug bounties.


This is why you want some people who are not primarily motivated by money. (Neither necessarily ascetics.)

In turn, why you want a society where a decent quality of life is not just obtainable but reliable without an all-consuming level of competition with others. (E.g. an independent researcher can actually gain access to and participate in a large and reasonably priced health insurance risk pool. And where money is not the overriding, if not sole, determination of judicial proceedings.)

Going very general in my comment, security is both a community effort and a personal responsibility. The more we "outsource" our own security ("Just trust us." -- Three Letter Agencies and private contractors), the more the price goes up while the quality of the results goes down.

You get the government you pay for, or... if you are more concerned about a quality, effective government, the government you participate in.

Hopefully, the pendulum is beginning to swing back from "pay for" to "participate in".


> In turn, why you want a society where a decent quality of life is not just obtainable but reliable without an all-consuming level of competition with others.

Is financial instability really a problem for most people qualified for this type of work? I imagine most of these people are approaching or well within the 6 figure range and that accepting some sort of bribe would just be icing on top.


Luckily, open source can't include secret code. That's the point.


What about binary-only drivers? http://en.wikipedia.org/wiki/Binary_blob


Reminds me of http://xkcd.com/538/ except instead of a $5 wrench, it was $10 Million and a few handshakes.


I remember looking over EMC's acquisitions when all of this starting breaking. EMC acquisitions just read like someone building a surveillance system: RSA, multiple deep packet inspection companies, enterprise clustered postgres, elitigation, forensics and threat analysis, Government-risk-analysis... and if you google around you'll see they kept their investments as secret as they could.

https://angel.co/emc

EMC bought every single major corporate partner technology in 2009/2010. EMC is the private honeypot for the entire program. The corporate store is EMC and only EMC. EMC and EMC ventures can go to hell for building this, knowing about it, and continually profiting from it. Profit from investment in a partner of an illegal government program specifically designed to make illegal money from human rights violations should be considered illegal. All of the major money behind EMC knew what was going on. If you did a private benefit analysis, it would be all EMC. Thank you. =)


In case you didn't know, EMC bought RSA in 2006. Shutting down RSA just means re-branding all the products as something else.


Reuters just broke this link. So here's the new one:

http://www.reuters.com/article/2013/12/21/us-usa-security-rs...


I believe we heard that some months before already. The biggest problem is IMHO their libcrypto still being used in Java and MS Windows.


From Mikko Hypponnen:

https://twitter.com/mikko/status/414147944984485889

"I'm ashamed on behalf of the whole industry."


It's going to be interesting what this does to the RSA Conference in SF 24-28 FEB; I wonder if people will pull out, or what?

I'm looking at how to incorporate this as an example in my talk.


> "RSA always acts in the best interest of its customers and under no circumstances does RSA design or enable any back doors in our products. Decisions about the features and functionality of RSA products are our own."

This means one of two things: Either this is a blatant lie by RSA, or RSA is not competent enough to evaluate cryptograpic algorithms. Neither possibility paints them in a favorable light.


"under no circumstances does RSA bla bla ..."

"Does." Present tense. Doesn't say anything about what happened in the past. Maybe their contract even included NSA services to launder language to be plausibly deniable, since that has also emerged as one of the NSA's core competencies.


This is going to end RSA


The reaction from the average IT architect is to just select another vendor that provides yet another closed-source, blackbox hardware security solution, backdoored by who know which government(s) &| other entities. Open source hardware is (un)fortunately a necessary requirement (verilog/vhdl, firmware sources and no blackbox SoCs), samples of which are periodically verified by destructive and nondestructive means. Very, very costly, but doable and raises confidence.


Authy was already on its way to doing it anyway. Glad to see it sped it up for a YC alum.


But, but, but .. Canada just made prostitution legal.


We already knew back in September that this was happening. All this story adds is details about the actual contract between RSA and NSA.


Its a sad commentary on a lack of ethics in parts of the tech industry. This industry isn't leading us where we want to go.


It is taking us towards a libertarian utopia where those with money decide where we go.


Privacy: Pre-internet term(from Latin: privatus "separated from the rest, deprived of something, esp. office, participation in the government", from privo "to deprive") used to describe the ability for human beings to seclude themselves or information about themselves and thereby reveal themselves selectively.


Please forgive my ignorance of these kinds of security issues....

I remember at one point, way back when, it was recommended to use RSA keys over DSA, when creating an SSH public key. Is this this the same algorithm, by the same company?

Does this mean that SSH can't be trusted if you're using an RSA key, versus some other type?


RSA the company has nothing to do with RSA the algorithm.

Well, "nothing" isn't strictly correct, but connecting them is more like the Kevin Bacon game. Rest assured that this story has nothing whatsoever to do with RSA keys.


No, it doesn't mean that at all. RSA is the same algorithm based on https://en.wikipedia.org/wiki/RSA_%28cryptosystem%29 as it always was, and it and its use in openssh have received lots of scrutiny. That the company has the same name is immaterial.


This reminds me of the MS-Novell deal, which was done in a similar way and has similar problems.


But "everyone" agreed it wasn't actually a backdoor. I wonder if that will get walked back finally.


Was this money tax free? How does that sort of thing work?

I hope bsafe licensees sue. Any one know of any serious efforts to replace some of the standard cipher suites in common code? AES -> Serpent, SHA -> Whirlpool etc...



I'm getting a "Page Not Found" message.Here's another version of the article: http://www.reuters.com/article/2013/12/20/us-usa-security-rs...


That did not work for me either.


What implications does this have for RSA?


Hopefully the end of them. It's the only thing that matters to these mercenaries...


I strongly agree.

Crypto is something where reputation is sine qua non. After the 2011 data breech they lost a lot of it. Now how can anyone trust them ever again?


It's Bad.


http://www.techweekeurope.co.uk/news/rsas-art-coviello-anony...

Paid shill

Want to see money flow from federal government to RSA and EMC over time.


What is the likelihood that anyone will face investigation or prosecution over this?


Any European citizen know what is needed for the European Commission for Competition to put a tariff to American imports so they stop destroying the European industry making undeclared and illegal subsidies?


Louis Althusser's coinage of RSA as "Repressive State Apparatus" in Lenin and Philosophy seems deliciously ironic now.


Goodbye RSA and thanks for all monopolistic practices and shitty products. ALL CRYPTO SHOULD BE OPEN SOURCE AND PATENT FREE!


NIST, NIST, NIST.... wait, aren't those the same guys we were supposed to trust on the 9/11 commission report....


10M sounds like a downpayment, I dont believe RSA would lay their cred on the line for such a paltry amount.


So RSA sells its customers for $10 million, and NSA wastes $10 million.


EMC own RSA. We just purchased a bunch of EMC kit. Can we trust it?


Are my RSA PGP keypairs now compromised? How do I tell?


I'd love to see a class-action lawsuit.

This shit must be punished.


I don't know anything about RSA as a company. What does this say about RSA as an algorithm and the company's founders?


How does this affect the average consumer?




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: