Google is now in a state of panic with the latest revelation about the encryption invasion by the NSA. Google has torrents of information that flow among its data centers around the world. They are now rushing to thwart snooping by the NSA and others the company stated on Friday.
The move illustrates the seriousness of the damage caused by the NSA to the entire technology industry. With the latest announcement that the G20 is going after taxes worldwide not terrorists, this will only fuel the backlash that has unfolded within an American technology industry. Let’s face the facts. YOU HAVE TO BE A MORON TO NOW BUY A NEW COMPUTER WITH WINDOWS 8. The U.S. government officials have long courted any potential partner in spying programs and the courts are stacked with former prosecutors pretending to be independent judges making the Judiciary just another false. protector of human and constitutional rights.
Google’s encryption initiative is now being put into high gear. It has lost tremendous respect and now suffers from a untrustworthy reputation as any independent reliable steward of user’s personal information amid the unbelievable scope of the controversy about the NSA’s PRISM program and efforts to get their hands on what everyone says, thinks, and does globally.
Encrypting information flowing among data centers will not make it impossible for intelligence agencies to hack into individual users of Google services. It will also not have any effect on legal requirements that the company comply with court orders or valid national security requests for data assuming this even has anything to do with terrorism rather than taxes. The ever increasingly widespread use of encryption technology makes mass surveillance more difficult and PGP — whether conducted by governments or other sophisticated hackers.
There are countless utilities available to encrypt files, drives, e-mail, and more using a password. However, if you use a simple password, like your dog’s name, you might as well not bother. On the other hand, a strong, complex password like AB$vPg3z^73Td9wf^51 is impossible to remember. Then you still have to transmit an encrypted document and convey the password to the recipient securely. Good luck with the NSA out there. Public-key cryptography does avoid these problems. Anybody can use your public key to encrypt a message or file. However, only the corresponding private key that remains on your computer will decrypt it.
Public-key cryptography can encrypt a single document to open with different keys or, for hypersecurity, require multiple individuals to supply their keys at once. For convenience, you gain access to your private key using a single secure passphrase, and you can change the passphrase without changing the key. An optional Additional Decryption Key provides emergency access if the main key is lost. PGP Desktop will create one or more public/private-key pairs for you and leverage those keys to handle a complete range of encryption tasks.
A public key, on the other hand, is useless if not available to the public. Therefore, PGP Corporation has established a free global directory service that registers public keys for any user of PGP Desktop or other OpenPGP-compatible products. The global directory automatically handles tasks such as checking whether a key is still in use and confirming registration of new keys. You can also share public keys directly by e-mailing them and validate a received key by checking a unique fingerprint against that of the original.
The NSA seeks to defeat encryption through a variety of means. These include obtaining encryption keys to decode communications, using supercomputers to break codes and influencing encryption standards intimidating companies to make them more vulnerable to outside attack, according to reports Thursday based on documents provided by former NSA contractor Edward Snowden. What is clear, this massive traffic collection is not targeted at terrorist but taxes. Every effort is being made to hunt down money and seize it everywhere. This is what just was agreed upon at the G20 in Russia,
Among the most common tactics used to crack codes is to hack into individual computers or other devices used by people targeted for surveillance, making what amounts to an end run around coded communications. Make no mistake about it, just being connected to the internet opens the door to the NSA. If the NSA wants to get into your system, sorry they are going to get in. Back in late 1998 after we correctly forecast the collapse of Russia that created the Long-Term Capital Management default, the US were trying to hack into out systems. That was the first time I ever saw a dynamic IP that kept changing so rapidly to hide where the source was. I called in our top IP guy who was in the Tokyo office at the time. He created a ping-back that changed rapidly and it went straight to Langley, Va.
SO they have been up to this stuff a long time. Many of the hacking techniques around today were most likely created in government. The U.S. intelligence community has been under fire since the news reports based on Snowden’s documents began revealing remarkable new details about how the federal government collects. Talk to a girlfriend you have on Skype and someone at the NSA is watching.
Snowden has revealed with his documentation that U.S. companies have been willing to be NSA “corporate partners” or “providers” of information. Most have enjoyed the cover of denying these links until Snowden said enough is a enough.
In June, Google and Microsoft asked the Foreign Intelligence Surveillance Court to allow them greater latitude in reporting how much information they turn over to the government. Now Yahoo issued its first “government transparency report,” saying it had received 12,444 requests for data from the U.S. government this year alone, covering the accounts of 40,322 users. There are NOT that many terrorists in the world. This is far beyond the 19 guys and a camel behind the WTC attacks.
There is little question that the news reports detailing the extent of NSA efforts to defeat encryption are very alarming. It was widely presumed that the agency was working to gain access to protected information, but the efforts were far more extensive than understood and reportedly contributed to the creation of vulnerabilities that other hackers, including foreign governments, could exploit. This is about taxes and make no mistake about that.