From: Dale <rdalek1967@gmail.com>
To: gentoo-user@lists.gentoo.org
Subject: Re: [gentoo-user] Re: Heartbleed fix - question re: replacing self-signed certs with real ones
Date: Fri, 18 Apr 2014 15:27:28 -0500 [thread overview]
Message-ID: <53518AB0.3040802@gmail.com> (raw)
In-Reply-To: <201404182001.31265.michaelkintzios@gmail.com>
[-- Attachment #1: Type: text/plain, Size: 2872 bytes --]
Mick wrote:
> On Friday 18 Apr 2014 19:08:21 Dale wrote:
>> I'm a little vague on some things but it seems the claim was that NSA
>> had some sort of backdoor that was built in from the beginning of the
>> project for encryption which sounded like it would include httpS and
>> others. Again, the details are fuzzy. I would say that I need to
>> bookmark this sort of thing but I already have so many bookmarks that it
>> is very hard to dig through them as it is. Adding more may be
>> counterproductive, yet again.
>
> I think that you are referring to their Dual_EC_DRBG (Dual Elliptic Curve
> Deterministic Random Bit Generator) which is/was used by RSA Security
(not RSA
> the algorithm developed by Ron Rivest, Adi Shamir and Leonard Adleman).
>
>
http://www.computing.co.uk/ctg/news/2295881/rsa-warns-customers-against-nsa-compromised-security-product#
>
> I don't know if Schneier said, stay away from elliptic curve algos and
use
> symmetric keys instead, because of this. Others have tried to crack
elliptic
> curves and have not been successful - so one has to tread carefully.
Given
> the NSA/NIST and big corporates are all in it up to their neck, I
would guess
> that distrusting *everything* they have or could be behind is a healthy
> attitude to take at the moment. ;-)
>
Well, I just wondered if it was true or not. If the NSA has some sort
of back hack then encryption to them is meaningless. Thing is, I don't
know if it is true or not. I wouldn't be surprised if it is for sure.
I try to keep things as secure as I can and protect myself from the bad
guys but this sort of things makes me wonder if it really does much if
any good. If companies/governments have backdoor ways to get passed it,
then there is no way to know who else can use that too. All it takes is
for one employee/contractor with the knowledge to decide to sell out and
then the whole thing is compromised.
Imagine if it were to come out that there is a backdoor key to all the
encryption that is currently in use. That would really throw a wrench
into the whole internet community. I just read that yet another store
has been hacked into and customer info stolen here in the USA. Waiting
to see it from a reputable source before getting to deep into it.
Of recent, I have seriously thought of encrypting my /home partition.
I'm not a crook but like a guy said once in a TV interview, if a person
looks long enough and hard enough, they will find something then build a
career off building the rest. There are to many laws for anyone to
really be able to safely say they have never broken the law before.
I thought I read that article on Linux Journal but I can't find it there
so it must have been somewhere else. < shrugs >
Thanks.
Dale
:-) :-)
--
I am only responsible for what I said ... Not for what you understood or
how you interpreted my words!
[-- Attachment #2: Type: text/html, Size: 3898 bytes --]
next prev parent reply other threads:[~2014-04-18 20:27 UTC|newest]
Thread overview: 42+ messages / expand[flat|nested] mbox.gz Atom feed top
2014-04-16 10:52 [gentoo-user] Heartbleed fix - question re: replacing self-signed certs with real ones Tanstaafl
2014-04-16 11:14 ` Matti Nykyri
2014-04-16 17:56 ` Tanstaafl
2014-04-17 5:59 ` Matti Nykyri
2014-04-17 6:10 ` Mick
2014-04-17 14:40 ` Matti Nykyri
2014-04-17 15:49 ` Mick
2014-04-17 16:54 ` Joe User
2014-04-17 18:43 ` Matti Nykyri
2014-04-17 20:17 ` [gentoo-user] " walt
2014-04-18 5:50 ` Matti Nykyri
2014-04-18 14:27 ` Dale
2014-04-18 16:45 ` Mick
2014-04-18 18:08 ` Dale
2014-04-18 19:01 ` Mick
2014-04-18 20:27 ` Dale [this message]
2014-04-18 23:33 ` Mick
2014-04-19 15:29 ` Dale
2014-04-19 15:43 ` Matti Nykyri
2014-04-19 19:33 ` Dale
2014-04-19 19:43 ` Joe User
2014-04-19 21:23 ` Dale
2014-04-20 0:18 ` Peter Humphrey
2014-04-20 8:49 ` Mick
2014-04-20 9:21 ` Matti Nykyri
2014-04-20 10:26 ` Mick
2014-04-19 16:11 ` Mick
2014-04-19 18:41 ` Dale
2014-04-20 8:27 ` Mick
2014-04-20 9:10 ` Dale
2014-04-20 12:38 ` Mick
2014-04-20 16:40 ` Matti Nykyri
2014-04-20 17:20 ` Joe User
2014-04-21 6:57 ` Matti Nykyri
2014-04-20 18:36 ` Dale
2014-04-19 11:51 ` [gentoo-user] " Mick
2014-04-19 13:17 ` Joe User
2014-04-19 15:38 ` Matti Nykyri
2014-04-19 16:40 ` Joe User
2014-04-19 17:14 ` Mick
2014-04-20 23:20 ` Mick
2014-04-21 7:11 ` Matti Nykyri
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=53518AB0.3040802@gmail.com \
--to=rdalek1967@gmail.com \
--cc=gentoo-user@lists.gentoo.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox