On Tue, Jun 25, 2013 at 5:47 PM, Mark Seiden <m...@seiden.com> wrote:
> maybe he just used other people's ssh keys that were protected by a weak (or 
> no) passphrase?
>
> "fabricate" is a pretty strong word, but under the "least untruthful" 
> standard that James Clapper says he's applied to
> congressional testimony, there are numerous interpretive possibilities.
What's more likely is there were little/no/improper access controls
(Bradley Manning FTW!), and the the government is "fabricating" the
claim.

Jeff

> On Jun 25, 2013, at 2:32 PM, Natanael <natanae...@gmail.com> wrote:
>
>> That depends on the system. Consider how HDCP encryption was broken;
>>
>> https://en.wikipedia.org/wiki/High-bandwidth_Digital_Content_Protection
>>
>> It used a scheme where access to enough keys allowed you to calculate the 
>> master key, breaking the entire scheme.
>>
>>
>> 2013/6/25 Bill Scannell <b...@scannell.org>
>> This Daily Beast story on Causa Snowden 
>> (http://www.thedailybeast.com/articles/2013/06/25/greenwald-snowden-s-files-are-out-there-if-anything-happens-to-him.html)
>>  contains the following sentence:
>>
>> "Last week NSA Director Keith Alexander told the House Permanent Select 
>> Committee on Intelligence that Snowden was able to access files inside the 
>> NSA by fabricating digital keys that gave him access to areas he was not 
>> allowed to visit as a low-level contractor and systems administrator. "
>>
>> How would one fabricate a digital key?
_______________________________________________
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography

Reply via email to