| ▲ | matheusmoreira a day ago | ||||||||||||||||||||||||||||||||||||||||||||||||||||
They don't break encryption, they circumvent it. They get into people's computers and access the stored data after it's been decrypted. They stockpile zero day vulnerabilities and use them against their targets in order to install persistent malware. They intercept equipment and literally implant hardware onto the PCBs that let them access the networks. They have access to hordes of government CCTVs. They have real time satellite imaging. They have cellphone tower data. | |||||||||||||||||||||||||||||||||||||||||||||||||||||
| ▲ | cperciva a day ago | parent | next [-] | ||||||||||||||||||||||||||||||||||||||||||||||||||||
They don't break encryption, they circumvent it. To quote a former Chief Scientist of the NSA, Rule #1 of cryptanalysis is "look for plaintext". Implementation flaws are very common. | |||||||||||||||||||||||||||||||||||||||||||||||||||||
| ▲ | monerozcash a day ago | parent | prev [-] | ||||||||||||||||||||||||||||||||||||||||||||||||||||
This is all in line with significantly degraded collection capabilities. They can easily go after specific targets, but bulk collection is no longer viable in the same way it was pre-Snowden. | |||||||||||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||||||||||