PogoWasRight.org

Menu
  • About
  • Privacy
Menu

Research Shows NSA Exploited Flaws to Decrypt Huge Amounts of Communications Instead of Securing the Internet

Posted on October 15, 2015June 26, 2025 by Dissent

Andrew Crocker writes:

According to an award-winning paper presented at a security conference earlier this week by a group of prominent cryptographers, the NSA has used its access to vast computing power as well as weaknesses in the commonly used TLS security protocol in order to spy on encrypted communications, including VPNs, HTTPS and SSH. As two of the researchers, Alex Halderman and Nadia Heninger explained, it was previously known that the NSA had reached a “breakthrough” allowing these capabilities. The paper represents a major contribution to public understanding by drawing a link between the NSA’s computing resources and previously known cryptographic weaknesses.

Read more on EFF.

No related posts.

Category: Featured NewsSurveillanceU.S.

Post navigation

← Court case threatens physician-patient confidentiality
Facebook, Google, Amazon and other big tech companies just slammed a proposed US cybersecurity law →

Search

Contact Me

Email: info[at]pogowasright.org
Security Issue: security[at]pogowasright.org
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]pogowasright.org

Research Report of Note

A report by EPIC.org:

State Attorneys General & Privacy: Enforcement Trends, 2020-2024

Categories

Recent Posts

  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation
  • Who’s watching the watchers? This Mozilla fellow, and her Surveillance Watch map

RSS Recent Posts at DataBreaches.net

  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
©2025 PogoWasRight.org. All rights reserved.