How NSA access was built into Windows

Gene Heskett gene.heskett at verizon.net
Wed Jan 17 04:34:45 UTC 2007


On Tuesday 16 January 2007 11:47, Bruno Wolff III wrote:

[...]

>Remember that the NSA also has it as its job to to secure systems. If it
>puts in back doors, they are going to be ones that only they can take
>advantage of.
>
>SELinux is not something that is going to give them access with its
> advertised features, so it is not likely a place where they would try
> to insert backdoors (any more than in any other part of the kernel).
>
>Strong encryption is a different issue. They have pretty much given up
> on directly outlawing it (though the government did drop the case
> against DJB before they lost again at the supreme court).

Which they would have (lost that is), and that would have left a lot of 
people with egg on their faces.

> What they 
> seem to be doing now is putting pressure on businesses not to provide
> strong encryption for the masses. Especially in telephony. There is
> some reason that end to end encryption isn't standard in digital
> phones.

That, from an engineering standpoint, is far more likely to be a 
consideration of latency and power consumption than in the difficulty of 
doing it.  Strong encryption is both power hungry, and slow.  No one 
would long tolerate a cellphone that only had 15 minutes talk time, and 
wasted 2-3 seconds for each turnaround in the conversation and cost $50 
more than one without it because of the royalty payments such a device 
might incur.  We are all too darned used to the instantainious(sp) nature 
of the analog phone.

Even skype's delays bug the heck out of me.

-- 
Cheers, Gene
"There are four boxes to be used in defense of liberty:
 soap, ballot, jury, and ammo. Please use in that order."
-Ed Howdershelt (Author)
Yahoo.com and AOL/TW attorneys please note, additions to the above
message by Gene Heskett are:
Copyright 2007 by Maurice Eugene Heskett, all rights reserved.




More information about the fedora-list mailing list