Feature

Encryption: Are there any secrets on the Web?

The NSA has cracked common forms of encryption used not just by terrorists, but also by regular consumers and businesses.

Is anything online safe? asked Larry -Seltzer in ZDNet.com. Last week, a joint report from The Guardian, The New York Times, and ProPublica.org revealed that the National Security Agency had managed to crack many common forms of encryption used on the Internet not just by terrorists, but also by regular consumers and businesses. The NSA’s efforts appear mostly geared “to get around the cryptography rather than to break it directly,” often using “black-hat methods.” The truly upsetting revelation is that the NSA is allegedly working hand in hand with tech companies to gain backdoor access, allowing analysts “to sniff traffic to these sites unimpeded by encryption.”

Let’s not freak out, said Sean Lawson in Forbes.com. “The fact is that the NSA is not likely to want into your, or my, computer.” The real problem is that other people might. It now appears that some common tools—like the encryption many companies use to protect their private networks and the 4G/LTE encryption used by wireless carriers—might be vulnerable to NSA intrusion. But such encryption can still “provide protection against the more likely threat, which is a malicious actor in the coffee shop sniffing traffic and stealing personal information from other users.” The key to personal Internet security is to stay vigilant. It makes no sense to abandon tools that enhance your privacy out of concern over “a ubiquitous adversary that is likely not targeting you, and that you likely could not stop anyway.”

And there are plenty of such tools at your disposal, said Bruce Schneier in The Guardian. As long as you’re using the latest software, the best encryption available, and a strong password, odds are your data will be safe, at least from the garden-variety hackers that do the most damage. But if you’re concerned, start using software like Tor, which anonymizes your network activity. Hackers and the NSA might target Tor users and others who encrypt their communications, “but it’s work for them.” And by taking those precautions, “you’re much better protected than if you communicate in the clear.” For the absolute highest security, break the chain of transmission with an “air gap.” That is, buy a new computer that has never been connected to the Internet and transfer files only on physical media, such as USB sticks. And don’t trust commercial or proprietary security software, especially from larger vendors. “My guess is that most encryption products from large U.S. companies have NSA-friendly back doors.” Open-source products are much more difficult for hackers to secretly infiltrate or modify.

Recommended

Australia swears in new prime minister while votes are still being counted
Penny Wong, Anthony Albanese, Richard Marles
Quick change

Australia swears in new prime minister while votes are still being counted

Analyst: Russian forces are 'bludgeoning their way through' Severodonetsk
A destroyed bridge in Severodonetsk.
war in ukraine

Analyst: Russian forces are 'bludgeoning their way through' Severodonetsk

Anthony Albanese ousts Scott Morrison in Australian election
Anthony Albanese.
in with the new

Anthony Albanese ousts Scott Morrison in Australian election

Biden concludes visit in South Korea, heads to Japan
Joe Biden.
next stop

Biden concludes visit in South Korea, heads to Japan

Most Popular

The deadly heat wave frying India and Pakistan
Heat in India.
Briefing

The deadly heat wave frying India and Pakistan

Russia claims to have captured Mariupol
Russian soldier in Mariupol.
big if true

Russia claims to have captured Mariupol

Archbishop denies Pelosi communion over abortion rights
Nancy Pelosi.
church and state

Archbishop denies Pelosi communion over abortion rights