Here's the straight dope: It turns out the US and UK governments have been running programs for a few years to insert backdoors into often-used security software and crack into the databases of Google and Yahoo, Facebook and Skype, and more.
No, I'm not shitting you.
In addition, it turns out they've been gathering logs of encrypted data for years, and internal memos have come up of times when they break into the logs they've copied.
Most people, when faced with the possibility of government spying, say something like "I can use SSL so it's fine." or "I'll just stop pirating now". But what happens when it turns out the government has a backdoor into widely-used security software? The software and/or algorithm you're using might not do crap against their spying. And what about all the data and logs they've already collected for years? These actions didn't start last week, they might have logs of personal calls you made two years ago on Skype.
The government is fine with people thinking that "I'll just send this encrypted" or "I'll just stop using this service" because they're in already, and they've been in for years.
Of course, the moment all these documents came to light, there was a shitstorm. People are not taking this news lightly, and some agencies have responded to the complaints.
Wait...
Source 1
Source 2
No, I'm not shitting you.
The NSA spends $250m a year on a program which, among other goals, works with technology companies to "covertly influence" their product designs.
[...]
The program "actively engages US and foreign IT industries to covertly influence and/or overtly leverage their commercial products' designs"
[...]
Among other things, the program is designed to "insert vulnerabilities into commercial encryption systems". These would be known to the NSA, but to no one else, including ordinary customers, who are tellingly referred to in the document as "adversaries".
In addition, it turns out they've been gathering logs of encrypted data for years, and internal memos have come up of times when they break into the logs they've copied.
Classified briefings between the agencies celebrate their success at "defeating network security and privacy".
Most people, when faced with the possibility of government spying, say something like "I can use SSL so it's fine." or "I'll just stop pirating now". But what happens when it turns out the government has a backdoor into widely-used security software? The software and/or algorithm you're using might not do crap against their spying. And what about all the data and logs they've already collected for years? These actions didn't start last week, they might have logs of personal calls you made two years ago on Skype.
The government is fine with people thinking that "I'll just send this encrypted" or "I'll just stop using this service" because they're in already, and they've been in for years.
Many users assume — or have been assured by Internet companies — that their data is safe from prying eyes, including those of the government, and the N.S.A. wants to keep it that way. The agency treats its recent successes in deciphering protected information as among its most closely guarded secrets
Of course, the moment all these documents came to light, there was a shitstorm. People are not taking this news lightly, and some agencies have responded to the complaints.
Which is TOTALLY why they're trying to hack into Facebook's databases, right?The agencies insist that the ability to defeat encryption is vital to their core missions of counter-terrorism and foreign intelligence gathering.
Wait...
Source 1
Source 2