back to article NSA: We've learned our lesson after foreign spies used one of our crypto backdoors – but we can't say how exactly

It's said the NSA drew up a report on what it learned after a foreign government exploited a weak encryption scheme, championed by the US spying agency, in Juniper firewall software. However, curiously enough, the NSA has been unable to find a copy of that report. On Wednesday, Reuters reporter Joseph Menn published an …

  1. all ears

    I'd comment, but then I'd have to kill me.

    1. Maelstorm Bronze badge
      Pint

      LOL. Have a pint on me.

      1. NoneSuch Silver badge
        Thumb Down

        "decision to use the NSA-designed Dual EC Pseudorandom Number Generator."

        If NSA wrote it for public use, I'm betting it isn't as random as people think.

        1. Michael Wojcik Silver badge

          No one (who knows anything about it) thinks it's "random" at all. "Deterministic Random Bit Generator", the phrase NIST actually uses, is their (unfortunate) term for cryptographically-strong PRNG.

          Everyone always knew Dual_EC_DRBG was a CPRNG, which meant it deterministically generated a bit stream with statistical properties that were indistinguishable from random under a series of assumptions. The concerns around Dual_EC_DRBG were, first, there's no way to tell whether there's a backdoor (i.e. whether the default constants provided by the NSA via NIST1 were chosen to allow someone with an additional piece of information to predict the output2); and second, it's a rubbish algorithm anyway and so there's no good reason to use it.

          Ever. Even if you don't think there's a back door. And if there isn't a back door, why recommend it in the first place? Probably just an honest mistake.

          1It's worth noting that these constants can be changed, and in fact NIST tells you how to compute a suitable set of alternatives and use them in the DRBG. Of course doing so invalidates any backdoor, and the backdoor is the only reason to use Dual_EC_DRBG.

          2Specifically, SP800-90 specifies the form of the DRBG and provides parameters P, the curve's generator, and Q, both points on the curve. It's not explained where Q comes from. It's a prime curve, so there's some e such that Qe=P (mod p). Given Q, e is hard to find. But say you're proposing an EC-based DRBG, and instead of picking a random point Q, you set Q to be a multiple of P. Then you can easily compute e. And you can recover the internal state of a Dual_EC_DRBG instance by observing about 32 bytes of output. That is a Bad Thing.

        2. gap

          Pseudorandom - i.e. not random. aka. deterministic.

    2. Schultz
      Megaphone

      I'd comment ...

      "NSA policy now requires a fallout plan". So can we take that as confirmation that the NSA systematically subverts encryption in networking gear?

      It might be safe to assume that Huawei equipment does not carry NSA back-doors, considering the efforts of the US government to shut down everything Huawei. But then, others might be listening in. I guess you really need strong end-to-end encryption to assume any degree of privacy. And even then, your computer carries a Security and Management Engine / Platform Security Processor, specifically designed to handle sensitive low-level functions. The NSA would not be worth its budget if they didn't find a way into those. Amiright?

      1. Mage Silver badge
        Black Helicopters

        Re: I'd comment ...

        See also proven NSA / CIA etc backdoors in Cisco gear. Juniper is a major competitor.

        Could Huawei be being banned in USA and UK etc (Five Eyes and friends dominated by USA), because they won't add US backdoors?

        GCHQ audit revealed no backdoors in Huawei, but poor code quality.

        No surprise as that was well known on Huawei routers supplied by many UK & Ireland ISPs. But also true of almost everyone.

        1. Flywheel
          Facepalm

          Re: I'd comment ...

          GCHQ audit revealed no backdoors in Huawei, but poor code quality

          So it could be relatively easy for the Usual Suspects to exploit that code to put in a backdoor? Of course, that could apply to bad actors from any country, not just the 5 Eyes bunch.

          1. Anonymous Coward
            Big Brother

            Re: I'd comment ...

            Most if not all software for network equipment has holes due to sloppy programming that can be exploited (i.e. hacked) to varying degrees. I would assume that any intelligence service you've ever heard of has their collection of them.

            Backdoors, OTOH, are expertly programmed by Five Eyes to allow a much broader range of exploits on demand.

            It's the difference between negligence and aiding and abetting.

            1. Mage Silver badge

              Re: Poor Code

              Not all poor code is exploitable as such. Some poor programming may make something vulnerable to DOS. Or some feature may not work properly or at all. Or it may crash every <nnnn> period of time.

            2. A.P. Veening Silver badge

              Re: I'd comment ...

              I would assume that any intelligence service you've ever heard of has their collection of them.

              And most you haven't heard of*) as well.

              *) And that is the majority for just about everybody who isn't working for an intelligence agency

          2. Anonymous Coward
            Anonymous Coward

            Re: I'd comment ...

            Or it could mean that the backdoors that are there, were in fact copied from 5-eyes and are accessible to GCHQ/5-eyes.

            Never let a little cynicism stand in your way.

      2. Anonymous Coward
        Anonymous Coward

        Re: I'd comment ...

        It's probably safe to assume any closed source psuedo random number generator involved in crypto is compromised in some way.

        To this day information on the Microsoft PRNG is thin on the ground. I've literally got no idea if I can trust the MS PRNG.

        Even if a PRNG is safe, your source of entropy may not be. Servers are notoriously less random than workstations in that regard.

        1. Claptrap314 Silver badge

          Re: I'd comment ...

          As a rule, I would expect that an intentionally weakened generator by an expert would be _stronger_ than some POS put together by a non-expert. See, for instance the custom-rolled PRNG in Systemd.

          The question is: which did u$ employ in this case?

          If you are not publishing your primitives, they ARE junk. Prove me wrong.

          1. Anonymous Coward
            Anonymous Coward

            Re: I'd comment ...

            On an open and broken system is better than closed unknown one.

            I can confidently avoid the former, but I'll never be sure about the latter.

  2. Anonymous Coward
    Anonymous Coward

    How do you avoid US spy gear, it is everywhere.

    Intel ME : https://libreboot.org/faq.html#intel

    AMD PSP: https://libreboot.org/faq.html#amd

    face^H^H^H^Hciabook

    everything that google does (google analytics).

    Cisco

    Apple

    Microsoft telemetry (they record everything that your computer runs and does)

    Amazon, logs everything, everything, everything (Did you search for something 25 years ago, that is still in the archives).

    And then you have the five eyes, which is probably closer to 50 eyes these days.

    And then you have the game consoles and Valves Steam, they track and record everything.

    And every US company must obey all secret FISA court orders, to carry out the wishes of the NSA.

    Who needs backdoors, when they have access to so many front doors.

    1. Anonymous Coward
      Anonymous Coward

      Re: How do you avoid US spy gear, it is everywhere.

      What is the end result of all this you fear?

      Just wondering. It all begs the question so what? I'm sure I'll be downvoted off the planet, but I'm talking specifics here. I see no adverts, ever.

      1. Anonymous Coward
        Anonymous Coward

        Re: How do you avoid US spy gear, it is everywhere.

        "Arguing that you don't care about the right to privacy because you have nothing to hide is no different than saying you don't care about free speech because you have nothing to say." - Ed

        So much active spying capacity would have been the wet dream of the Stasi.

      2. fpx
        Devil

        Re: How do you avoid US spy gear, it is everywhere.

        Can you please explain to this court why, twenty years ago, you googled "iron maiden"? Doesn't that demonstrate your intent to torture someone?

        The data trail that all of us leave behind alwys contain some dubious nuggets that, selectively edited and taken out of context, will make you look bad.

        As foretold by Kafka. We know there is a crime hidden in all of that data, we just have to find it. You will not be in a position to defend yourself, since you will have long forgotten. Too bad.

        1. Efer Brick

          Re: How do you avoid US spy gear, it is everywhere.

          I once googled "bath bombs", I'll turn myself in (after lunch)

          1. Blazde Silver badge

            Re: How do you avoid US spy gear, it is everywhere.

            You monster, Bath is a beautiful place full of the most lovely innocent folk imaginable.

            1. Evil Scot

              Re: How do you avoid US spy gear, it is everywhere.

              Innocent? Not according to 'A Slip of the Keyboard'.

              Sod the truth sell the story.

            2. Anonymous Coward
              Anonymous Coward

              Re: How do you avoid US spy gear, it is everywhere.

              @Blazde

              Until you say "Bath" instead of "Barth"

              Cheers…Ishy

              1. MJI Silver badge

                Re: How do you avoid US spy gear, it is everywhere.

                Bath in a west country accent please.

                Barth depends if posh Barth (soft R) bad or west country Barth (rolled Rs) good, Both, as in toff is even worse.

                1. MJI Silver badge

                  Re: How do you avoid US spy gear, it is everywhere.

                  i mention this because one coworker went to uni there and so did my daughter.

                  Another coworker does a posh boff then gets Bath shouted at him by two annoyed people.

        2. Wellyboot Silver badge

          Re: How do you avoid US spy gear, it is everywhere.

          It might not have been a crime then or even now, but one day with enough manipulation it will be just enough to bring you down.

        3. Mage Silver badge
          Alert

          Re: How do you avoid US spy gear, it is everywhere.

          Maybe said by Cardinal Richelieu?

          Qu'on me donne six lignes écrites de la main du plus honnête homme, j'y trouverai de quoi le faire pendre.

          If you give me six lines written by the hand of the most honest of men, I will find something in them which will hang him.

        4. MachDiamond Silver badge

          Re: How do you avoid US spy gear, it is everywhere.

          "Can you please explain to this court why, twenty years ago, you googled "iron maiden"? Doesn't that demonstrate your intent to torture someone?"

          There was a couple of 20 somethings a couple of years ago that were going to take a trip to Hollywood to spend a week clubbing. One of them tweeted "we're going to destroy America", a slang for partying that the US spy agencies didn't know. The couple got turned around in NY when they went through customs.

          I know my search history is eclectic enough to pull lots of stories of terrorism and mayhem out of. When something interesting is in the news, I'll often do some research since the new agency isn't ever going to be reporting it correctly. I've also worked in commercial fireworks, aerospace and all sorts of other things including being a proper photo-journalist.

          It's readily apparent that governments don't like people that eschew being spoon fed by the MSM and do their own knowledge gathering.

        5. Anonymous Coward
          Anonymous Coward

          Re: How do you avoid US spy gear, it is everywhere.

          *spams palms down and stands up in the dock*

          Give me the sense to wonder

          To wonder if I'm free

          Give me a sense of wonder

          To know I can be me

          Give me the strength to hold my head up

          Spit back in their face

          Don't need no key to unlock this door

          Gonna break down the walls

          Break out of this bad place

          CAN I PLAY WITH MADNESS?

      3. Filippo Silver badge

        Re: How do you avoid US spy gear, it is everywhere.

        The problem is that knowledge is power. Anyone who knows your passwords and entire browsing history has a whole lot of power over you. Of course, I (mostly) could trust my government not to abuse this, because, like you, I live in a functioning democracy and I'm not paranoid. Or maybe I don't, in which case I already have a good reason not to want this to happen. However, bear with me: that is not the point. That is irrelevant. The point is not trust: The point is power.

        When you ask what do we fear, what you are asking is basically: what does it matter if people have power over you, as long as you trust those people not to abuse it?

        The answer is that any power over you must be regulated by law. This is a fundamental axiom of free society. It cannot be conditioned on trust alone. If any entity has the ability to gain power over you without this ability being well-regulated by law, that is a problem. It does not matter how much you trust that entity. The problem is not lack of trust; if I trusted the NSA completely to never abuse the knowledge they have, their ability to gain power over me outside the boundaries of law would _still_ be an unacceptable issue.

        If you do not understand why no entity should be able to gain power over you outside the boundaries of law (oh, and secret laws enforced by secret tribunals don't count for this purpose), I'm afraid I don't have the ability to explain further in a mere comment.

        I do hope, however, that you will realize that having all of your data is not very much different from having a gun to your head, that you can imagine that having a gun to your head is intrinsically problematic, regardless of how much you trust the guy with the finger on the trigger, and that you can agree that it should only be allowed in well-regulated circumstances, and that if it happens outside of those circumstances, it needs to be sanctioned even if nobody actually got shot.

        1. genghis_uk
          Pint

          Re: How do you avoid US spy gear, it is everywhere.

          Very nicely said sir!

          It's already Friday somewhere ->

        2. EnviableOne

          Re: How do you avoid US spy gear, it is everywhere.

          People willing to trade their freedom for temporary security deserve neither and will lose both

          Theres a Franklin quote for every situation

      4. elip

        Re: How do you avoid US spy gear, it is everywhere.

        Some of us are old enough to remember, and come from countries where not all that long ago, our overlords, err representative governments took our fellow citizens to the woods for a chat and put one in their heads. Just one literal example from my childhood in Eastern Europe.

    2. dak
      Linux

      Re: How do you avoid US spy gear, it is everywhere.

      Microsoft don't record ANYTHING that my computer runs or does.

      Nor those of any of my family.

      1. My-Handle

        Re: How do you avoid US spy gear, it is everywhere.

        Really? Even if all those machines run Linux, has anyone in your house ever visited a Microsoft-owned web page, or a web page that embeds bing-related code?

        That's that hypothesis disproven then.

        1. stiine Silver badge

          Re: How do you avoid US spy gear, it is everywhere.

          Or any site for which microsoft has purchased data acess?

      2. Silverburn

        Re: How do you avoid US spy gear, it is everywhere.

        Unless you've been permanently unplugged from power outlet and the network since the early 80's, I'm calling BS on that.

      3. EnviableOne

        Re: How do you avoid US spy gear, it is everywhere.

        one word Office

    3. Doctor Syntax Silver badge

      Re: How do you avoid US spy gear, it is everywhere.

      I wouldn't worry about the Amazon logs. Any attempt to exploit those will simply hide what you were looking for in a mass of irrelevance.

      1. Andy The Hat Silver badge

        Re: How do you avoid US spy gear, it is everywhere.

        You were searching for embedded secret documents, you may also be interested in 1970s curtain fabric and comedic videos of hamsters ...

        1. Ben Bonsall

          Re: How do you avoid US spy gear, it is everywhere.

          So that's why i keep being recommended hamster videos. I'd cleaned every hint of Richard Gere from my search history, could not get it to stop.

    4. Pascal Monett Silver badge

      Valve ? Why are you dragging Valve into this ?

      Do you seriously think that Steam is watching you ?

      Steam is the best game-selling platform there is. If you don't have a connection, you can still play your games. If you do have a connection you can play them online.

      Yes, Valve checks when you log on to verify that you have the right login and password, and that's all. You tell me how Valve can do less and still maintain a business.

      Steam is the only game-selling platform I know that doesn't care where you run it from. I can upgrade my PC, change my disks, change computer ; the only thing Steam wants is my login/password combination. That is a far cry from EA Games or any of the others, who basically consider that any change in hardware is proof that you are filthy thief and you have to re-download your entire collection.

      With EA Games, that even happens when you update your video driver !

      So please, leave Valve out of your otherwise quite plausible list of surveillance entities.

      1. spold Silver badge
        Big Brother

        Re: Valve ? Why are you dragging Valve into this ?

        Username, password, billing info.

        You are playing violent games.

        You are on our terrorist watch-list now, we know who you are, and we are coming to get you.

      2. Mage Silver badge
        Unhappy

        Re: Valve ? If you don't have a connection, you can still play your games.

        Not true for some games, at least to start them.

        Also plenty of older XP / Vista games yet they pulled the plug on XP being able to use an already installed game.

        Also I hate DVD cased games that have no indication on the packaging that are actually only an Internet installer for Steam or something else you can simply go to directly. Not sure when Steam support ends for Win7. But for a long while it's been a better idea to use a PS4 for gaming. I see the optical drives are option versions of 2020 Xbox and PS5.

        Welcome to the 1960s, where you need the connection to a server for anything. Is Office 365 & cloud replacing purely local MS Office? You'd think so searching MS site for Office Patches, Add ons and converters.

    5. bombastic bob Silver badge
      Big Brother

      Re: How do you avoid US spy gear, it is everywhere.

      it's why back doors themselves should NEVER be used. Classic example here, in which OTHERS have discovered the keys, and the existence of the back doors has been revealed, defeating their very purpose and compromising EVERYTHING gummints were attempting to use them for.

      They need to do REAL investigating. You know, like the OLD days.

      Open source may provide a perfect solution to this. How about hardened linux router software that's 100% open source that you can subsequently load onto Cisco's hardware and thereby ELIMINATE the problem? Peer review would find any back doors. Maybe Linus could make it happen?

      1. elip

        Re: How do you avoid US spy gear, it is everywhere.

        Many companies already run their own routing and some switching on open source OSes (Linux, OpenBSD, etc.). Would love to see some larger server/network gear vendors start certifying those stacks on their platforms. For now, I'll just stick to my OpenBSD, on top of Coreboot, on small embedded platforms. :-)

      2. EnviableOne

        Re: How do you avoid US spy gear, it is everywhere.

        I'd rather steer clear of cisco's custom asics, you dont know what backdoors the NSA has put in them

        NIce bit of Dell lowest commen denominator kit:

        https://www.dell.com/ae/business/p/open-networking-switches/pd

        they been selling these bare bones for a while

        1. Anonymous Coward
          Anonymous Coward

          Re: How do you avoid US spy gear, it is everywhere.

          This thread has just reminded me to buy an Open Source router (Turris Omnia), which I've been meaning to for a while.

          I wonder whether the NSA/GCHQ specifically monitor sites selling those, and are going to make an extra effort to probe my systems before it arrives, as I clearly have something to hide?

          1. sev.monster Silver badge

            Re: How do you avoid US spy gear, it is everywhere.

            Thanks for turning me on to Turris, nifty bit of kit.

  3. Anonymous Coward
    Anonymous Coward

    the NSA now claims it can't find the file.

    I actually believe that statement.

    The NSA is probably too bogged down with the vast amount of data it collects on American citizens to stay in power than to be bothered with dealing with the requsts of an actual ELECTED OFFICIAL like or technically enlighted Ron Wyden.

    As a side note on Dual EC..

    there is a very informative blog post by a researcher that was having trouble with his WIFI router over the Christmas holidays where he discovered backdoors and ECB in many, many MANY home routers after poking around:

    https://github.com/elvanderb/TCP-32764

    1. Maelstorm Bronze badge
      Black Helicopters

      Re: the NSA now claims it can't find the file.

      Home routers are crap. But it's not in my router. My router is a full computer locked down so tight, Kim Jong Un would be proud.

    2. Anonymous Coward
      Anonymous Coward

      NSA head is a Trumpsky

      The head of the NSA is one of these, Kremlin-approved, Trump appointees, a man named Richard Grenell.

      https://www.theguardian.com/us-news/2020/feb/19/trump-richard-grenell-director-national-intelligence

      If there is a zero day exploit that NSA has, then Russia has it too. If there's a secret the NSA is holding then Russia has that too. If there's a backdoor NSA holds, then Russia has that backdoor too.

      NSA is compromised. If you've backdoored your kit for the NSA, then you've backdoored your kit for Trump's Russia buddies, you need to close all the backdoors. You've compromised American security.

      Here's Grenell trying to launch a Russian disinformation package against Democrats for this election cycle:

      https://apnews.com/article/election-2020-intelligence-agencies-hillary-clinton-elections-archive-8a9811f5ce2094a9b47c2794e2e887ea

      Here he is launching a Russian wedge package seeking to divide Democrats:

      https://www.thedailybeast.com/team-bernie-fingers-richard-grenell-for-leaking-russia-story

      Here he is, agreeing to tip off (indicted Russian) Lev Parnas and Rudy Guilliani on the Dimitry Firtash case (Firtash is under house arrest in Vienna accused of being a Russian bagman).

      https://nymag.com/intelligencer/2020/02/richard-grenell-director-national-intelligence.html

      "according to now-indicted Giuliani associate Lev Parnas. Parnas told the Daily Beast that he was told to ask Grenell for advance notice if the Department of Justice were to move to extradite an indicted Ukrainian oligarch, Dmytro Firtash, from whom Giuliani hoped to get compromising information. Parnas also claims Grenell said he would comply. It would, to put it mildly, not be normal or legal for an ambassador to tip off a private citizen to a law-enforcement move"

      Just let that sink in for a second, the head of the NSA, offering to give a private citizen, Rudy Guilliani, who meets up with Russian military intelligence agents, secret info on an accused Russian bagman!

      Firtash, in case you don't know where he fits in:

      https://en.wikipedia.org/wiki/Dmytro_Firtash

      "Living in Vienna, Austria, since 2014 Firtash has been resisting extradition to the United States on bribery and racketeering charges, and has sought to have the charges dropped...

      "Firtash is represented by Trump and Giuliani associates Joseph diGenova and his wife Victoria Toensing, having hired them on the recommendation of Giuliani associate Lev Parnas.

      "The New York Times reported in November that Giuliani had directed Parnas to approach Firtash with the recommendation, with the proposition that Firtash could help to provide compromising information on Biden, which Parnas's attorney described was "part of any potential resolution to [Firtash's] extradition matter."[77] "

      "...during the summer of 2019 Firtash associates began attempting to dig up dirt on the Bidens in an effort to solicit Giuliani's assistance with Firtash's legal matters, as well as hiring diGenova and Toensing in July. Bloomberg News also reported that its sources told them Giuliani's high-profile publicity of the Shokin statement had greatly reduced the chances of the Justice Department dropping the charges against Firtash, as it would appear to be a political quid pro quo"

      I don't think they're worried at this point, Russia's involvement is crystal clear, and so I'm expecting Barr to simply drop the charges on Firtash, or for Trump to pre-emptively pardon him.

      Knowing how Trump works, he'll probably pardon Firash, go to Austria in Airforce One, collect a big wad of Rubles in front of the cameras, with Airforce one in the background, say "how can it be illegal I'm doing it right in front of your eyes and no Republican is complaining!" Fox & Friends will cover the story as "American freedom to accept bribes"

      1. Anonymous Coward
        Anonymous Coward

        Re: NSA head is a Trumpsky

        And you fell for the bi-partisan shtick, you think one side is better that the other!? That there are "sides", as I was told when god was a lad, "no matter who you vote for the government always win"

        Please go back to faecesbook with your crappy political posts, we ain't interested, same ac same bullshit posts, boring!

        1. Jimmy2Cows Silver badge

          Re: same ac same bullshit posts, boring!

          Says another AC, without a hint of irony.

          1. Anonymous Coward
            Anonymous Coward

            Re: same ac same bullshit posts, boring!

            Have an up vote Jimmy, from the second ac.

            What I didn't express very well was it's the same ac above who posts long political missives on what seems like every article

      2. Anonymous Coward
        Anonymous Coward

        Re: NSA head is a Trumpsky

        I'm so glad you posted that. I was under the impression the NSA has been around since 1952, started by Harry Truman (D).

        Thanks for setting me straight.

        Would you mind updating this page, they seem to have it all wrong: https://en.wikipedia.org/wiki/National_Security_Agency

    3. Anonymous Coward
      Joke

      Re: the NSA now claims it can't find the file.

      > I actually believe that statement.

      Have they tried searching Wikileaks?

    4. Peter2 Silver badge

      Re: the NSA now claims it can't find the file.

      the NSA now claims it can't find the file.

      Because it's a file stored on computer, and it's been deleted by another countries version of the NSA because the NSA were being unkind about what they said about the opposing spy agency in the report. This action obviously doesn't show up in the logs, because the software keeping the logs had a backdoor built into it that said opposing spy agency exploited which shows why this sort of backdoor is a mistake.

      That, or just admit deliberately lying to their oversight.

    5. Flywheel
      Pirate

      Re: the NSA now claims it can't find the file.

      Actually, I'm quite annoyed that my requests to the NSA and GCHQ (on Twitter) to help me find my missing database dump went unanswered. Presumably both I, and they, have lost that file as well. Bah!

  4. Anonymous Coward
    Facepalm

    Hey, can't have that pesky report show up...

    And complicate the Five Eyes + Japan + India's attempts to create a general encryption backdoor that will never (I repeat--NEVER) get compromised and end up in the hands of crooks or hostile governments.

    1. A.P. Veening Silver badge

      Re: Hey, can't have that pesky report show up...

      With Trump as POTUS, I regard the government of the USA as hostile. And the same goes for the British government with BJ as PM.

      1. thejynxed

        Re: Hey, can't have that pesky report show up...

        It doesn't matter who's in charge, the intelligence community apparatus doesn't care about party affiliation. See CIA & NSA monitoring of Sen. Feinstein's laptop as she was in the middle of a Senate Intelligence Committee meeting when Obama was POTUS.

  5. Anonymous Coward
    Anonymous Coward

    This "backdoors" discussion misses an important point......

    ...a point well understood by anyone (or any group) seeking private conversations.

    *

    Namely....if messaging is encrypted with a private cipher BEFORE the message enters the channel, then IT DOESN'T MATTER ABOUT BACKDOORS. See below for an example of the sort of thing which the spooks might obtain from their backdoor slurp.....

    *

    0F2w1kqF0nLi0BxJ0$I51bj30OlL0bnI1TZ$0UTd

    1dsJ1fQe1LXm1XE607o$10bZ0iNI0Ypm0DKR0ZLQ

    0EIM1HZJ0Zmr0ZaF0zJp0uef14ui0aP50pRY1L$W

    0H3u0zsE08GH17651Wvr11I51Dn=0DFo0GLZ0c0S

    16fA18aW0ChM1Ue80qRE1fAt0s4R1GJp1dq40VbG

    0hkG1SOu01Ni08191Wou1JXD0=EM1EYi0fk50u0h

    0akJ1a$t1hTL0E6l0jff0v940ytJ1UcO0Aae1MS9

    1Hs91MXm0a7P1RPo1PI61RRE1gv306kG1hcG0Igv

    1Cua09Qp0tfN1jVn0iaZ0nzx1lYg18W6052D1TOO

    0HHL0JeY1mce0p5y0WYu03z702vD05RG16wI1NA2

    1L2l0=Ni

    *

    1. You aint sin me, roit
      Black Helicopters

      Using strong encryption, citizen?

      You must have something to hide...

      1. Anonymous Coward
        Anonymous Coward

        Re: Using strong encryption, citizen?

        @You aint sin me, roit

        *

        Who says it's "strong encryption"? It looks like it might be a long list of four-long numbers. Maybe one of those "weak" book ciphers?

        *

        And when did personal privacy get translated into "something to hide"?

        1. A.P. Veening Silver badge

          Re: Using strong encryption, citizen?

          Who says it's "strong encryption"? It looks like it might be a long list of four-long numbers. Maybe one of those "weak" book ciphers?

          It is "strong encryption" if they don't already have the key.

          And when did personal privacy get translated into "something to hide"?

          Right after the power grab by NSA/CIA shortly after 9/11.

    2. Silverburn

      Re: This "backdoors" discussion misses an important point......

      Unless they have your cipher, of course. How many svchost.exe's do you have running perchance? ;-)

      1. Anonymous Coward
        Anonymous Coward

        Re: This "backdoors" discussion misses an important point......

        @silverburn

        Assumption alert....who says the cipher is generated or published on Windows? Could be a Mac, could be Solaris, could be Android, could be Linux...... But I guess Silverburn only knows about M$.....

        1. A.P. Veening Silver badge

          Re: This "backdoors" discussion misses an important point......

          Silverburn was just using the most well known example.

    3. Spoonsinger
      Windows

      Re: 0F2w1kqF0nLi0BxJ0$I51bj30OlL0bnI1TZ$0UTd...etc....

      If you really squint you can see a 3D picture of Richard Stallman eating an iced bun.

    4. Michael Wojcik Silver badge

      Re: This "backdoors" discussion misses an important point......

      Sigh.

      The problem is not whether a handful of technically-adept parties who already have a secure channel for key distribution can maintain confidentiality, or even confidentiality + integrity + authentication (and, hey, throw in non-repudiation if it makes you happy). That's always been possible.

      The problem is government interference with attempts to address the actual difficult questions, like mass cryptography for non-technical parties, key distribution among large groups with no prior secure channel, authentication where there's no existing relationship, and so on.

      Your amateur cryptography is not interesting in this context. It's the equivalent of a pen-and-paper cipher. It might be weak, it might be strong; but it doesn't touch on any interesting problems.

      1. Anonymous Coward
        Anonymous Coward

        Re: This "backdoors" discussion misses an important point......

        @Michael_Wojcik

        Sigh.

        *

        Maybe YOU are missing the point. The "government interference" you describe is EXACTLY THE REASON that "amateur cryptography" is being used. In this context people who seek privacy have absolutely no interest in "interesting problems".......they are building their own privacy tools....because no one out there is solving the privacy problem.

        *

        And this process, over time, is likely to make the problems faced by government snooping MUCH WORSE.....simply because the snoops will face a proliferation of "amateur cryptography" where today they only have to deal with a few targets (SIgnal, RSA, PGP and a few others). And condescending talk about the "amateur" won't make any of this go away!

  6. chivo243 Silver badge
    Facepalm

    I told you so!

    It was just a matter of time. Surprised it took so long, or surprised they are admitting it.

  7. Dave 126 Silver badge

    Argument might go away by itself

    The USA's economic power (upon which its military power depends) depends upon intellectual property and trade secrets - in engineering and technology - which are the chief targets of China's espionage efforts. Making it harder for US firms to secure their data is self-defeating for the US government.

    1. JCitizen
      WTF?

      Re: Argument might go away by itself

      I was going to say, that they have the nerve to insist we private citizens and corporations need government back doors and compromised security to keep us "safe", and then they have something like this happen to them. How can they look us in the eye and seriously demand something like that?

      1. Anonymous Coward
        Anonymous Coward

        Re: Argument might go away by itself

        "How can they look us in the eye and seriously demand something like that?"

        Let me see. Reasons they can ask for this. Let's start with over-officiousness. Add mistrust of the public. And add bureaucratic target-setting processes that don't consider the real world. And demands for a short-term "gotcha" intelligence coup from politicians and their appointees in the DoD/CIA/FBI while setting aside longer-term risks. And the desire to get some sweet, sweet press copy about what the government or a specific agency is doing to protect us from (Choose from and insert du jour terrorist/pedophile/drug kingpin/domestic extremist/Iranian/Chinese/Russkie punching bag here).

        Yeah, I think that covers the reasons fairly well.

        1. JCitizen
          FAIL

          Re: Argument might go away by itself

          @Marketing Hack - for sure! For sure!

    2. CrackedNoggin Bronze badge

      Re: Argument might go away by itself

      The US wouldn't be the first power to self-destructively implode, and it certainly won't be the last.

  8. Ochib

    This file contains the complete set of papers, except for a number of secret documents, a few others which are part of still active files, some correspondence lost in the floods of 1967. Some records which went astray in the move to London and others when the War Office was incorporated in the Ministry of Defence, and the normal withdrawal of papers whose publication could give grounds for an action for libel or breach of confidence or cause embarrassment to friendly governments.

    1. Wellyboot Silver badge

      Leaving for public disclosure a grand total of Zero.

    2. Pascal Monett Silver badge
      Thumb Up

      I see we have another Yes Minister fan.

    3. CAPS LOCK

      Ah yes, the floods of 1967....

      ... so much embarrassing material lost forever...

  9. Mahhn

    Overlap

    This is one of the reasons we like to have "overlap" in our security products. Due to constant proof (like this news story) we have to presume that at least one of our antivirus, firewalls, web filter, VPN, ransomware detectors, components is compromised, by private or nation state criminals - all the time. It's not a happy thing to know your own government is destroying security for the sake of stealing data for insider trading, er I mean keeping us safe from ghost.

  10. Anonymous Coward
    Anonymous Coward

    I've been looked at my comment history here, and in the past, I was definitely wittier, more on-topic and far better informed than I am now.

    Why is this?

    1. JCitizen

      comment history...

      Ever worse for me - I sometimes think I must have been taken over by a hidden personality when I look at what I typed! It's like I don't know who that was, making those remarks, but I know it had to be me.

  11. Silverburn

    Huawei

    Classic US.

    Shit on foreign entities (Hauwei) for *allegedly* leaving snooping doors open.

    Complete radio silence when domestic entities get caught doing the same thing.

    1. thejynxed

      Re: Huawei

      Allegedly has nothing to do with it. Huawei networking gear had (at the time of accusations) hard-coded administration accounts that were logged as being accessed from locations in Shenzen and Guangzhou. Was this malicous activity by the CCP or just Huawei performing remote access to view the stored performance metrics such as error logs on the device is what the ultimate question was and was never answered to the general public, but we did see Huawei earn a permanent US ban, including being banned from purchasing microchips designed by or manufactured by/for US companies as a very public result of these accusations.

  12. ThinkingMonkey

    "Huawei, to Hades with thine evil spying ways! If there's any spying to be done on U.S. citizens, we'll be doing it, thank you." - NSA

  13. steviebuk Silver badge

    Ban VPNs

    And either ban encryption or force companies to create backdoors into that encryption so only the "authorities" will have access. There is no reason to vote or argue against this as ONLY the correct authorities will have access to that backdoor..........WHAT? Someone else exploited it? Shit. Well, lessons have been learned (even though we were fucking warned before hand this would happen).

    The tits.

  14. Anonymous Coward
    Anonymous Coward

    Why would anyone trust a US security product?

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Other stories you might like