“It’s worth considering the various vectors of technical and legal data-gathering that high-level adversaries in America and Britain (and likely other countries, at least in the ‘Five Eyes‘ group of anglophone allies) are likely using in parallel to go after a given target. So far, the possibilities include: A company volunteers to help (and gets paid for it). Spies copy the traffic directly off the fiber. A company complies under legal duress. Spies infiltrate a company. Spies coerce upstream companies to weaken crypto in their products/install backdoors. Spies brute force the crypto. Spies compromise a digital certificate. Spies hack a target computer directly, stealing keys and/or data, sabotage.”
Related posts:
US troops arrive in Poland, Latvia for 'drills'
Silicon Valley House Sells for $117.5 Million
The Snowden case: U.S. data and security industries weakened
US government: We can jail you indefinitely for not decrypting your data
Van Jones rips Obama’s ‘ridiculous’ denial of domestic spying operations
NSA building a ‘quantum computer’ to break all forms of encryption
Judge ejects Sikh from court for refusing to remove ‘that rag’ from his head
Lead bullets for artists in Buenos Aires
FAA Proposes Worldwide Laptop Ban For Checked Bags On Int'l Flights
How “omnipotent” hackers tied to NSA hid for 14 years -- found at last
Gold imports jump 102% in Pakistan; ban imposed
Ex-Soros Advisor Sells Japan Holdings, Shorts Bonds; Sees Crash, Default, Hyperinflation
Health Insurance Premiums Continue To Rise Under Obamacare
Former Narcotics Detective Blows Whistle on the Justice System
Security Hole in Samsung Smart TVs Could Allow Remote Spying