It seems like the NSA tried lobby and install mass-surveillance of all people on this planet as soon as 1993.
“First and most urgent, the current debate over the use of encryption undermines the promotion of privacy tools. The U.S. government proposed a technological backdoor with the Clipper Chip in the early 1990s, using the same arguments heard today. It failed spectacularly. Although technology has evolved since, the fundamentals of encryption have not. Policymakers in the United States and other countries should recognize that anything less than intact cryptography puts all users at risk. Developers cannot build software that allows law enforcement to access encrypted communications but prevents malicious actors from exploiting that access. Cryptography cannot distinguish good people from bad, so a backdoor for one is a backdoor for all.
Software tools for end-to-end encryption have been available to users since the early 1990s, when Phil Zimmerman created a program called Pretty Good Privacy (PGP) and released it to the public free of charge. However, nonexpert users have faced a number of challenges with these tools from the beginning. In a 1998 paper, “Why Johnny Can’t Encrypt,” Alma Whitten and J. D. Tygar documented problems facing users of PGP. The authors found that participants had difficulty performing even basic tasks like encrypting and decrypting messages. Further studies have replicated these results with a variety of software programs.
…
Finally, a recent resurgence of a decades-old debate around the propriety of encryption technologies—particularly as they relate to law-enforcement efforts to thwart terrorism or investigate crimes—is creating tremendous uncertainty for software developers.
Apple and Google have both made upgrades to support user-controlled encryption by default in strategic products (iMessage’s encrypted chat, Android’s encrypted file system).
However, these nascent investments are unlikely to be followed by large-scale integration of privacy-preserving technologies, given that a multitude of conflicting requirements around cryptography loom on the horizon in different jurisdictions. For the United States, it is especially unfortunate that this debate emerges at a time when confidence in technology companies’ ability to protect user data is still suffering from the fallout of the Edward Snowden revelations.”
src: http://www.cfr.org/privacy/protecting-data-privacy-user-friendly-software/p37551
The Clipper chip was a chipset that was developed and promoted by the United States National Security Agency[1] (NSA) as an encryption device, with a built-in backdoor, intended to be adopted by telecommunications companies for voice transmission. It was announced in 1993 and by 1996 was entirely defunct.
Contents
Crypto: How the Code Rebels Beat the Government Saving Privacy in the Digital Age is a book written by Steven Levy about cryptography, and was published in 2001. Levy details the emergence of public key cryptography, digital signatures and the struggle between the NSA and the cypherpunks. The book also details the creation of DES, RSA and the Clipper chip.[1][2]
Bullrun (stylized BULLRUN) is a clandestine, highly classified program to crack encryption of online communications and data, which is run by the United States National Security Agency (NSA).[1][2] The British Government Communications Headquarters (GCHQ) has a similar program codenamed Edgehill. According to the BULLRUN classification guide published by The Guardian, the program uses multiple methods including computer network exploitation,[3] interdiction, industry relationships, collaboration with other intelligence community entities, and advanced mathematical techniques.
Information about the program’s existence was leaked in 2013 by Edward Snowden. Although Snowden’s documents do not contain technical information on exact cryptanalytic capabilities because Snowden did not have clearance access to such information,[4] they do contain a 2010 GCHQ presentation which claims that “vast amounts of encrypted Internet data which have up till now been discarded are now exploitable”.[1] A number of technical details regarding the program found in Snowden’s documents were additionally censored by the press at the behest of US intelligence officials.[5] Out of all the programs that have been leaked by Snowden, the Bullrun Decryption Program is by far the most expensive. Snowden claims that since 2011, expenses devoted to Bullrun amount to $800 million. The leaked documents reveal that Bullrun seeks to “defeat the encryption used in specific network communication technologies”.[6]
Related Articles:
http://www.cfr.org/privacy/protecting-data-privacy-user-friendly-software/p37551
https://www.schneier.com/academic/paperfiles/paper-keys-under-doormats-CSAIL.pdf
liked this article?
- only together we can create a truly free world
- plz support dwaves to keep it up & running!
- (yes the info on the internet is (mostly) free but beer is still not free (still have to work on that))
- really really hate advertisement
- contribute: whenever a solution was found, blog about it for others to find!
- talk about, recommend & link to this blog and articles
- thanks to all who contribute!