On Tue, Jun 25, 2013 at 5:47 PM, Mark Seiden <m...@seiden.com> wrote: > maybe he just used other people's ssh keys that were protected by a weak (or > no) passphrase? > > "fabricate" is a pretty strong word, but under the "least untruthful" > standard that James Clapper says he's applied to > congressional testimony, there are numerous interpretive possibilities. What's more likely is there were little/no/improper access controls (Bradley Manning FTW!), and the the government is "fabricating" the claim.
Jeff > On Jun 25, 2013, at 2:32 PM, Natanael <natanae...@gmail.com> wrote: > >> That depends on the system. Consider how HDCP encryption was broken; >> >> https://en.wikipedia.org/wiki/High-bandwidth_Digital_Content_Protection >> >> It used a scheme where access to enough keys allowed you to calculate the >> master key, breaking the entire scheme. >> >> >> 2013/6/25 Bill Scannell <b...@scannell.org> >> This Daily Beast story on Causa Snowden >> (http://www.thedailybeast.com/articles/2013/06/25/greenwald-snowden-s-files-are-out-there-if-anything-happens-to-him.html) >> contains the following sentence: >> >> "Last week NSA Director Keith Alexander told the House Permanent Select >> Committee on Intelligence that Snowden was able to access files inside the >> NSA by fabricating digital keys that gave him access to areas he was not >> allowed to visit as a low-level contractor and systems administrator. " >> >> How would one fabricate a digital key? _______________________________________________ cryptography mailing list cryptography@randombit.net http://lists.randombit.net/mailman/listinfo/cryptography