On Tue, Jun 25, 2013 at 5:17 PM, Bill Scannell b...@scannell.org wrote:
This Daily Beast story on Causa Snowden
(http://www.thedailybeast.com/articles/2013/06/25/greenwald-snowden-s-files-are-out-there-if-anything-happens-to-him.html)
contains the following sentence:
Last week NSA Director
At 12:55 PM 11/8/2013, you wrote:
Snowden persuaded other NSA workers to give up passwords,
http://www.reuters.com/article/2013/11/08/net-us-usa-security-snowden-idUSBRE9A703020131108.
The revelation that Snowden got access to some of the material
he leaked by using colleagues' passwords
On Tue, Jun 25, 2013 at 5:17 PM, Bill Scannell b...@scannell.org wrote:
This Daily Beast story on Causa Snowden
(http://www.thedailybeast.com/articles/2013/06/25/greenwald-snowden-s-files-are-out-there-if-anything-happens-to-him.html)
contains the following sentence:
Last week NSA Director
that if Snowden has access to them - other people who wish to have
access may also have these document - too bad none of them seem to care
to educate the public or to expose the incredibly illegal interpretation
The incidence/depth of leakers/leaks over time seems to be increasing.
Whether or
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 06/28, Nico Williams wrote:
How would one fabricate a digital key?
They probably meant something that sounds close. E.g., minted a
certificate, or a ticket, or token, or whatever the thing is, by
subverting an issuing authority or its
On Tue, Jun 25, 2013 at 6:01 PM, Peter Gutmann
pgut...@cs.auckland.ac.nz wrote:
How would one fabricate a digital key?
They probably meant something that sounds close. E.g., minted a
certificate, or a ticket, or token, or whatever the thing is, by
subverting an issuing authority or its processes
This Daily Beast story on Causa Snowden
(http://www.thedailybeast.com/articles/2013/06/25/greenwald-snowden-s-files-are-out-there-if-anything-happens-to-him.html)
contains the following sentence:
Last week NSA Director Keith Alexander told the House Permanent Select
Committee on Intelligence
That depends on the system. Consider how HDCP encryption was broken;
https://en.wikipedia.org/wiki/High-bandwidth_Digital_Content_Protection
It used a scheme where access to enough keys allowed you to calculate the
master key, breaking the entire scheme.
2013/6/25 Bill Scannell
On Jun 25, 2013, at 5:38 PM, Thor Lancelot Simon wrote:
On Tue, Jun 25, 2013 at 05:17:04PM -0400, Bill Scannell wrote:
This Daily Beast story on Causa Snowden
(http://www.thedailybeast.com/articles/2013/06/25/greenwald-snowden-s-files-are-out-there-if-anything-happens-to-him.html)
contains
maybe he just used other people's ssh keys that were protected by a weak (or
no) passphrase?
fabricate is a pretty strong word, but under the least untruthful standard
that James Clapper says he's applied to
congressional testimony, there are numerous interpretive possibilities.
On Jun 25,
On Tue, Jun 25, 2013 at 5:47 PM, Mark Seiden m...@seiden.com wrote:
maybe he just used other people's ssh keys that were protected by a weak (or
no) passphrase?
fabricate is a pretty strong word, but under the least untruthful
standard that James Clapper says he's applied to
congressional
Bill Scannell b...@scannell.org writes:
Last week NSA Director Keith Alexander told the House Permanent Select
Committee on Intelligence that Snowden was able to access files inside the
NSA by fabricating digital keys that gave him access to areas he was not
allowed to visit as a low-level
12 matches
Mail list logo