| ▲ | monerozcash 3 days ago | ||||||||||||||||||||||||||||||||||
>You're assuming that despite their budget not having changed meaningfully, no repercussions against anyone from the historical leaks, the continued renewal of the patriot act and unchanged mission of the intelligence community orgs that somehow they've wound down. That they've stopped R&D and tailored access ops. That's not at all what I'm assuming. I'm stating that the environment has become much more hostile to them, reducing their capabilities because all the super low hanging fruit is gone. The part where they're able to hack almost anyone they want hasn't changed. >You look at things from your perspective where decrypting traffic alone is all too important. If you can see all the metadata, why would you do that? Metadata lets you select a target sure. Having full content takes as they used to allows you to easily find new targets by simply matching keywords, that particularly cool capability has practically disappeared post-Snowden. >they want to know who's downloading tails, who's using signal, who's committing to interesting git repos, who the source of some journalist is, what people a politician has been messaging on whatsapp I don't think this really reflects what the previously leaked files suggest their main interests to be. >what people a politician has been messaging on whatsapp Whereas before they'd have been able to get that information off the wire together with the message content (for all messages, in real time!). Now? They actually have to actively compromise Facebook to get that for a single user. It's also worth noting that the previously leaked NSA documents seem to suggest that the NSA was not particularly busy breaking the law by hacking American companies. > even if they can't readily implant targets, they can successfully perform targeted MITM attacks, even with typical non-mTLS/non-pinned TLS setups. Because of CT, such MITM attacks will not work without creating noise that's visible to the whole world. | |||||||||||||||||||||||||||||||||||
| ▲ | notepad0x90 2 days ago | parent [-] | ||||||||||||||||||||||||||||||||||
You've made really good points, I get what you're saying now. They can't do simple keyword searches over unencrypted traffic anymore. But even in 2010 lots of important traffic was over https, and anyone worth their salt used https for important things. I don't think even back then they were hoping for incidental intercept of unencrypted traffic. That was just icing on the cake, the main purpose as I understood was metadata mining, and not just the internet but phone calls and sms as well. As far as tailored access, there is lots of speculation there, and they're well within their rights to hack servers outside of the US. I don't think any information as to what organizations they compromised has ever been revealed, but they certainly had the capability and it is only reasonable to presume they improved upon that capability. But they can have the capability and not choose to wield it, but really doesn't sound like their M.O. > I don't think this really reflects what the previously leaked files suggest their main interests to be. I strongly disagree. I wish i had the time to compile evidence to back that up but plenty exists if you look it up. Matter of fact, I recall some of NSA's leadership oppose things like backdooring encryption or apps because they don't need it, and it only hurts the nation's security. | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||