Why the NSA is breaking our encryption -- and why we should care | Matthew Green | TEDxMidAtlantic
Вставка
- Опубліковано 6 жов 2024
- This talk was given at a local TEDx event, produced independently of the TED Conferences. Encryption dates back to the Founding Fathers and the Bill of Rights. Now, the United States National Security Agency is breaking and undermining core encryption technologies that power the Internet, saying it's being done for our own protection from terrorists. But are we sacrificing our freedoms for fear?
Matthew Green is an Assistant Research Professor of Computer Science at the Johns Hopkins University. His research focuses on computer security and cryptography, and particularly the way that cryptography can be used to promote individual privacy. His work includes techniques to securely access medical databases, enhance the anonymity of Bitcoin, and to analyze deployed security systems. Prior to joining the Johns Hopkins faculty he served as a Senior Technical Staff Member at AT&T Laboratories.
About TEDx, x = independently organized event In the spirit of ideas worth spreading, TEDx is a program of local, self-organized events that bring people together to share a TED-like experience. At a TEDx event, TEDTalks video and live speakers combine to spark deep discussion and connection in a small group. These local, self-organized events are branded TEDx, where x = independently organized TED event. The TED Conference provides general guidance for the TEDx program, but individual TEDx events are self-organized.* (*Subject to certain rules and regulations)
Tor network does not secure your communication, it only make you anonymous. Tor exit nodes (can be setup by anyone) can read your data if you are not accessing data via HTTPS.
If you are only accessing hidden services it does secure it, but exit nodes as you described can sometimes be dodgy.
Tor has already been broken.
@ollux paeternax which can be use to have our privacy?
@@crollinsphoto how so
“You’re not paranoid. Everybody out there is out to get you.” My day-to-day life would be the cure for insomnia.
Actually, he is studying maps. After all a crypto-system is just a map from plain text to cipher text and visa-versa.
It will only encourage people to develop better encryption.
I'd like to hear more how the NSA is (supposedly) weakening encryption. Did they solve the prime factorization problem which is what powers RSA encryption?
they can use quantum computers, for example
RoundDuckMan ok but what makes the NSA more capable of doing this than anyone else? once the technology exists, it's up to the highest bidder. So we had better discover a new, stronger encryption scheme.
Michael Butler True, heck Codecrypt (I think that's their name) is making quantum-resistant encryption. So the battle goes on. :P
+Michael Butler They made the maintainer of RSA (and many other encryption algorithms) to pretty much have a certain set of "default" prime numbers. So now the NSA is pretty much running around with an infinite keyring, and they're like "Let's try this key. Nope. Now the next one!" until they get someone's private key.
Check out numberphile, they have an episode about that. The published encryption code looks good, but its cooked and only mathematicans can pick up on it.
A makes a scrambled char set, then creates a one time pad from that set. A sends that pad (not the scrambled char set just the otp), to the recipient. The recipient (B) creates their scrambled char set and sends back their created one time pad created from that set (not B's scrambled char set) to A. Now A has B's otp and B has A's otp. They each use their otp's they got from each other to send msgs. A will be able to decrypt B's msgs (sent using A's otp) because A has the original A char set. B will be able to decrypt A's msgs because A is using B's otp and B has original B char set and can decrypt A's msgs. E in the middle will not have access to A scrambled or B scrambled, only the A otp and B otp. What do you think?
This needs more views
The way he pronounces "cryptography" totally sounds like "cartography", which sounds confusing lol. Both are fascinating, esp cryptography.
There's always cryptocartography where you make secret maps. Not to be confused with cartocryptography which is making maps to all your secret codes...
But the real question should be: What can we do about it?
Pierce Sonnenberg vote better
Answer: Nothing.
Movie > Enemy of the State, Gene Hackman
I was seriously freaking out over how good the autogenerated cc is in this video but then "insight furred" replaced "enciphered" and I now breathe again...
Congrats Professor
Funny he would advertise for Truecrypt: one year later, it was found out to be compromised.
Ok I gotta more than likely a dumb ass question but I'm going to ask it anyways cuz ftw what rhymes with swipe?
superreverbfreak Skype
5:00
Funnily enough, asymmetric encryption originated at the GCHQ.
democracy is so screwed
Regular text and cell calls are not encrypted actually... but the connection to the cell tower can be... except that the towers can be spoofed. So much of the phone and now wireless infrastructure is terribly designed from a security perspective.
Publicly available phones never have been encrypted have they? You can encrypt modern cell phone voice and text end to end using apps though. Some of those apps can also be used to attack you (Whatsapp being one example that has happened).
I think my Florida Congressman is in it. it's like Orson Welles book 1984
1984 is George Orwell (from which we get Orwellian), not Orson Welles
The speaker never really addressed the question in the title: Why the NSA is breaking our encryption. He gave good reasons for why they shouldn't, but that's a different question.
It's all helping to set up the framework needed to fulfill the Biblical prophesies about the end times. It's so overwhelming clear now that there is really no excuse for ignoring the one and only most important event in all of history. An event that depending on how you respond to it will affect your eternal destiny. That event, of course, is death and resurrection of Jesus Christ. What you do about Jesus is all that really matters in life (and death).
I am curious where those documents are from that is showed. Where they part of the Snowden files?
+Agent StephenG yes they are
+Agent StephenG archive.org/details/NSA-PRISM-Slides
Heard of "Windtalkers" ????
Any one tell me that how can i make a new Security algorithm (Symmetric or asymmetric ).Tell me about working of algorithm.Its mine Assignment And present in class.Not already Algorithms present in class sir said present your own idea so Help me Please.
you should use the impenetrable substitution cipher, where A=1, B=2, etc., Z=26.....; no one will ever catch on, and the code is unbreakabe!
Where the #mind is without #fear and the head is held high;
Where knowledge is #free;
Where the world has not been broken up into fragments
By narrow domestic walls
Where words come out from the depth of #truth;
Where tireless striving stretches its arms towards perfection;
Where the clear stream of #reason has not lost its way
Into the dreary desert sand of dead habit;
Where the mind is led forward by thee
Into ever-widening #thought and action;
Into that heaven of #freedom, My Father, let my #country awake.
...............................
#notimeforcaution #badwolf #redpill #datadarwinism
Sefra Correa Marielyn Correa Wilson Correa watch
They want to be like God. The all seeing eye on your dollar bills is a prime example. The devil is a jealous entity
Superficial talk, but he is probably about that NSA agent sitting among the crowd.
Cell phone data going over the air is not enecrypted SS7 exploit proves this.
people are like: Zzzz
As always.a meaning discovered by Greece.
If we prevent the NSA from discovering how to break common encryption techniques, then we may be leaving those discoveries to a more malicious group of people. Sure, surveillance is bad, but avoiding surveillance is a great motivation to develop better encryption techniques. If someone is breaking our encryption techniques, I would prefer it be the NSA over a group with malevolent intent.
the reality is that the nsa forces most software to have backdoors built in, at one level or a other. Which then is expolited when said agents move on to other jobs.
Forcing software to be crippled is like forcing all cars to drive at 5mph tops to save lives.
Like the NSA doesn't have a malevolent intent.
mispellt 'led' gives me a tummy ache
if someone routinely visits Israel. maaaybe they have other interests than the US but thats just a hunch
uripre, that's what they want you to believe, but it's all b.s.
foggyblues13 It is all BS. If you were Al-Qaeda, ISIS or whatever, you'd just get on the dark web and talk fairly freely. Why our surface internet needs to be monitored and the reasons that they are giving for this is pure bullshit.
Why they are so concerned about monitoring us normal folk though I don't fully understand. Anyone?
balls can be eyes.
😢
Nothing is safer than pen and paper... good luck G-ogle
This video really makes me question his expertise in his profession. Does he not know that cryptography algorithms are made public for the purpose of getting others to test its ability to withstand attempts to decrpyt. This video is pretty misleading he must never heard of kerckhoffs principle. But I do agree that NSA has crossed boundaries by recording and storing information once they crack an algorithm but what have they done with the information that was so wrong? Have they blackmailed anyone no..
+mastaskep So it's better to wait until after the fact? By then it is too late. There is no reason why large letter organizations have authority and control over anyone's info. Paste your SSN and admit you won't worry. That can't be true.
+Wis Canson Dude I did say they crossed boundaries by recording and storing information. I am quite sure NSA has my SSN and yours anyway......
***** Ok, so now one must act. You mentioned they have not blackmailed anyone. Would you please elaborate?
There has not been, to me recollection, any nefarious activities by the government agencies where they use non-criminal information about you. For instance, if you were some high level official that cheats on his wife and they got into your phone records and blackmailed you into doing something against your will.
+mastaskep No one can against anyone's will. Unless, of course, if they threaten your life. As I have stated no one, not limited to but including government, should have even the slightest of access to anyone's info.
Those civilian encryptions, even if created by Americans, are not only used by Americans, but also by Al-Qaeda, Iran or any other nutter.
*Your safety depends on the ability of the NSA to decrypt those encryptions.*
+uripre hahahaha ur a funny one
and then the NSA decryption will, in turn, end up being used by the other nutter down the road against any target they choose