由买买提看人间百态

boards

本页内容为未名空间相应帖子的节选和存档,一周内的贴子最多显示50字,超过一周显示500字 访问原贴
Military版 - 如何解释NSA获取网络公司数据 NSA没有接入网络公司服务器
相关主题
dealsea 上关于华为手机的评论华为在美再受重创
美国的监听大军NSA那一刻,我们举着国旗,护卫着身别的火炬!
现在通讯这么发达,有什么必要亲自带电脑去中国?印度手机拥有量居然比中国还高?
斯诺登称美英窃取全球数十亿手机SIM卡信息苹果公司被曝歧视华人 华裔顾客购iPad屡遭拒绝
谷歌微软等数十家美国科技巨头组团支持苹果 叫板FBI纽约:愤怒的AT&T客户向AT&T员工开枪射击
用华为手机的, 自求多福吧U.S. Commits $13 Billion to Aid High-Speed Rail
美媒告诫公民:中国想读到你的电邮请问,把verizon手机解锁是不是就可以直接那回国用 (转载)
现在美国情报部门火力全开卖地和卖债对GDP的贡献都很虚的
相关话题的讨论汇总
话题: nsa话题: companies话题: data话题: servers话题: tech
进入Military版参与讨论
1 (共1页)
m********3
发帖数: 3280
1
http://blog.seattlepi.com/techchron/2013/06/07/technically-spea
In the wake of revelations around the extent of the NSA surveillance
programs it’s worth asking how such a program would operate, from a
technical standpoint. The feds have been collecting cell phone, Internet and
credit card data and to detect — and ostensibly stop — crimes.
Recently leaked document and previous court cases indicate much of that data
comes from Internet companies and telecom providers we use every day like
Google, Facebook, Microsoft, Verizon and AT&T. So far each associated-
company has denied knowledge of PRISM or that the government had access to
their computer servers. (Though, it’s highly unlikely government officials
would ever use the term “PRISM” with said tech company.)
But when speaking about complicated computer systems it is easy to play word
games and — technically — tell the truth. “Direct access” or “open-
ended access” are terms that can be truthful simply when you install
another system between the first two or by putting any restriction on the
query.
“I find it extraordinarily unlikely that this could happen without these
companies’ cooperation,” says Dan Auerbach, the Electronic Frontier
Foundation’s staff technologist.
Precious few facts exist about the NSA’s digital dragnet techniques. But
there are a few measures that could be implemented that would still keep the
tech companies honest when they say the NSA didn’t have access to their
servers.
Tech companies could send information about users to the NSA on a regular
basis, with this information mirroring what’s in its servers. Or it could
allow access to an application program interface, which would allow the NSA
to make calls of the data it wanted on users.
But Julian Sanchez, a technology research fellow at the Cato Institute,
points out that the NSA doesn’t want tech companies to be aware of the
agency’s search criteria on user data.
The Washington Post reports that documents that say the arrangement between
the tech companies and the feds allowed “collection managers [to send]
content tasking instructions directly to equipment installed at company-
controlled locations,” rather than directly to company servers.
Big tech companies operate their own data centers — vast buildings packed
with computers that underpin the services we use every day like Hotmail,
Gmail and Facebook. This is where your emails and status updates are
physically stored when called up by a web browser. The NSA could install
devices in the data centers for traffic to pass through and be collected.
Not to mention that the data from your computer has to travel through all
the digital hubs that make up the Internet’s infrastructure to get to those
data centers. Sniffing those would allow collection of user data also.
But this leaves the question of decoding the data since sensitive data is
encrypted with security protocols — “secure socket layer” (SSL). If the
sender and the receiver have the decoding key, then they can send encrypted
user information safely back and forth. Only someone with the key could read
it.
Though Auerbach acknowledges that the NSA is “head and shoulders above the
rest of the world” when it comes to breaking encrypted data, he finds the
possibility of the NSA cracking the code for tech companies “pretty
unlikely.”
However, tech companies could provide those private keys for the SSL
certificates to the NSA. And then the NSA could decrypt the messages itself.
In discussing the various possibilities, Sanchez finds this scenario likely
and calls it “consistent” with other NSA practices, such as the case with
AT&T.
By basically allowing a wiretap of the communication between the servers and
the outside world, and providing the decoder to read the messages, tech
companies could honestly say they don’t allow direct access or a “back
door” to the servers — while still allowing the NSA unrestricted access to
the information.
m********3
发帖数: 3280
2
..
p**********6
发帖数: 3408
3
这相当于王连举把密电码交给鸠山,然后说“我没有出卖任何一份游击队的机密电报”。
By basically allowing a wiretap of the communication between the servers and
the outside world, and providing the decoder to read the messages, tech
companies could honestly say they don’t allow direct access or a “back
door” to the servers — while still allowing the NSA unrestricted access to
the information.
1 (共1页)
进入Military版参与讨论
相关主题
卖地和卖债对GDP的贡献都很虚的谷歌微软等数十家美国科技巨头组团支持苹果 叫板FBI
华为为何一再败走美国?用华为手机的, 自求多福吧
各设备商获取LTE商用合同大比拼美媒告诫公民:中国想读到你的电邮
方舟子有620个门徒了现在美国情报部门火力全开
dealsea 上关于华为手机的评论华为在美再受重创
美国的监听大军NSA那一刻,我们举着国旗,护卫着身别的火炬!
现在通讯这么发达,有什么必要亲自带电脑去中国?印度手机拥有量居然比中国还高?
斯诺登称美英窃取全球数十亿手机SIM卡信息苹果公司被曝歧视华人 华裔顾客购iPad屡遭拒绝
相关话题的讨论汇总
话题: nsa话题: companies话题: data话题: servers话题: tech