While anything is certainly possible, I agree with David. To the best of my 
knowledge, we have no reason to believe that the NSA can crack the 
cryptographic protocols themselves. All leaked information available on this 
topic that I’m aware of, from Snowden to Room 641a to the FBI/Apple debate all 
reinforce this position, as they focus on attack vectors that exist outside of 
the cryto itself. This actually highlights the benefits of strong e2e 
encryption (as opposed to simply securing your communication to a public 
website that then cooperates with surveillance agencies).

On a meta-level, the argument that “the NSA can crack any encryption, therefore 
we should assume China can too, therefore we should assume encryption is 
insecure, therefore we should not even bother using e2e encryption” is… 
remarkably concerning, especially in an age of bad actors and misinformation.

Spencer

> On Jun 14, 2020, at 11:48, David Stodolsky <[email protected]> wrote:
> 
> 
> 
>> On 14 Jun 2020, at 20:37, Yosem Companys <[email protected] 
>> <mailto:[email protected]>> wrote:
>> 
>> The US’s NSA can crack any encryption in the world and listen to any 
>> communications it wants. 
> 
> Not true. Strong crypto can’t be cracked.
> 
> 
> dss
> 
> David Stodolsky, PhD                   Institute for Social Informatics
> Tornskadestien 2, st. th., DK-2400 Copenhagen NV, Denmark
> [email protected] <mailto:[email protected]>          
> Tel./Signal: +45 3095 4070
> 
> -- 
> Liberationtech is public & archives are searchable from any major commercial 
> search engine. Violations of list guidelines will get you moderated: 
> https://lists.ghserv.net/mailman/listinfo/lt. Unsubscribe, change to digest 
> mode, or change password by emailing [email protected].

-- 
Liberationtech is public & archives are searchable from any major commercial 
search engine. Violations of list guidelines will get you moderated: 
https://lists.ghserv.net/mailman/listinfo/lt. Unsubscribe, change to digest 
mode, or change password by emailing [email protected].

Reply via email to