Yes in case someone missed this,  a very interesting little post from 
washington post titled: 
How we know the NSA had access to internal Google and Yahoo cloud data
http://www.washingtonpost.com/blogs/the-switch/wp/2013/11/04/how-we-know-the-nsa-had-access-to-internal-google-and-yahoo-cloud-data/



--joshua

On Nov 6, 2013, at 5:52 PM, "Marcus G. Daniels" <mar...@snoutfarm.com> wrote:

> On 11/6/13, 5:30 PM, Owen Densmore wrote:
>> I think the inter-mail-server hops are encrypted, or I certainly hope so!  
>> And the clients all support encryption or alternatively use https web-apps.
> Some providers use more lighter protocols like LMTPA (Local Mail Transfer 
> Protocol) for internal transfers.   The idea being that if the mail doesn't 
> hit the internet then the physical security of the ISP is sufficient, even 
> though the ISP switches over to TLS security for the delivery once the data 
> is headed for the internet.  And Google does the latter.  But for Google 
> their internal network is world spanning, and delegated off to other 
> companies fiber infrastructure.   Question is, does Google have a fastpath 
> for gmail-to-gmail deliveries that does not use any encryption?  According to 
> the leaked slides, the NSA was busy deconstructing the Google and Yahoo 
> internal protocols, so they must have thought it would be profitable.  (And 
> Google engineers say that the slides indeed reveal proprietary information.)
>  
> Marcus
> ============================================================
> FRIAM Applied Complexity Group listserv
> Meets Fridays 9a-11:30 at cafe at St. John's College
> to unsubscribe http://redfish.com/mailman/listinfo/friam_redfish.com

============================================================
FRIAM Applied Complexity Group listserv
Meets Fridays 9a-11:30 at cafe at St. John's College
to unsubscribe http://redfish.com/mailman/listinfo/friam_redfish.com

Reply via email to