Saturday, September 07, 2013

[bpobkjdq] Auditing the cryptographic endpoints

It appears that the NSA succeeds in decrypting the internet by compromising the endpoints, rather than brute forcing the middle.  Unsurprising.  (For example, hacking in and stealing a private key, rather than brute forcing a public key.)

More importantly, we are not powerless.  At least one endpoint of any communication we directly control.

If stopping the NSA is too large a initial task, we can carefully monitor the endpoint we control and log who accesses it how.

No comments :