It appears that the NSA succeeds in decrypting the internet by compromising the endpoints, rather than brute forcing the middle. Unsurprising. (For example, hacking in and stealing a private key, rather than brute forcing a public key.)
More importantly, we are not powerless. At least one endpoint of any communication we directly control.
If stopping the NSA is too large a initial task, we can carefully monitor the endpoint we control and log who accesses it how.
No comments :
Post a Comment