Security quotes of the week
[Posted September 5, 2013 by jake]
In seeking a balance that puts liberty first, my administration will unwind
the surveillance apparatus to a substantial degree. Some surveillance is
necessary, to be sure. But we will have clear rules and boundaries, and we
will punish those in government who go beyond them. As we have seen
repeatedly in recent years, without genuine accountability, rules and laws
mean nothing.
—
Dan
Gillmor hopes for a 2016 US presidential candidate with a focus on privacy
Right now the upper practical limit on brute force is somewhere under 80
bits. However, using that as a guide gives us some indication as to how
good an attack has to be to break any of the modern algorithms. These days,
encryption algorithms have, at a minimum, 128-bit keys. That means any NSA
cryptoanalytic breakthrough has to reduce the effective key length by at
least 48 bits in order to be practical.
There's more, though. That DES attack requires an impractical 70 terabytes
of known plaintext encrypted with the key we're trying to break. Other
mathematical attacks require similar amounts of data. In order to be
effective in decrypting actual operational traffic, the NSA needs an attack
that can be executed with the known plaintext in a common MS-Word header:
much, much less.
—
Bruce
Schneier is skeptical of claims of NSA decryption superpowers
Most internet users would like to be anonymous online at least occasionally, but many think it is not possible to be completely anonymous online. New findings in a national survey show:
- 86% of internet users have taken steps online to remove or mask their digital footprints—ranging from clearing cookies to encrypting their email, from avoiding using their name to using virtual networks that mask their internet protocol (IP) address.
- 55% of internet users have taken steps to avoid observation by specific people, organizations, or the government
Still, 59% of internet users do not believe it is possible to be completely anonymous online, while 37% of them believe it is possible.
—
Anonymity,
Privacy, and Security Online, a survey by Pew Internet
(
Log in to post comments)