Hacker News new | past | comments | ask | show | jobs | submit login

The US military is kinda weird because the offensive and defensive sides have opposite interests when it comes to privacy and anonymity.

(1) The defensive side wants the ability to de-anonymize and decrypt everything on demand so they can catch threats to the US.

(2) The offensive side wants to promote anonymous encrypted communications so they can encourage pro-democratic dissent in authoritarian regimes.




Group (1) also wants their adversaries to feel confident that the encryption promoted by (2) is secure, so that they use it to communicate candidly.

It that respect, (2) is just a mouthpiece for (1), provided there’s a back door or vulnerability that only (1) knows about.


> provided there’s a back door or vulnerability that only (1) knows about.

Do you have any examples from existing tools, e.g. Tor, for which that's true? Tor's been around a long time-- surely something would have surfaced at this point, but I haven't really paid attention to it.


Methods provide the highest leverage if you “own” the common element used across the most system components ie the lowest common denominator.

Saying it another way, don’t attack platforms, tools and channels, attack protocols since they are used across platforms, tools and channels

To this end, some examples:

Attack on

1) encryption - RSA backdoor

https://blog.cloudflare.com/how-the-nsa-may-have-put-a-backd...

2) hardware - Processor Backdoor

https://forums.whonix.org/t/expert-claims-nsa-has-backdoors-...

(this link is specifically great for this subject as it lists more than 10 different attack / compromise programs that are being run - with quite a few of them being protocol attacks - in the comments section )

3) networking - network gear firmware backdoor

https://www.cisa.gov/news-events/cybersecurity-advisories/aa...



I think that's the most solid example.


Tor is an interesting example. A number of attacks are made possible by monitoring Tor exit node traffic, especially at the scale nation states can bring to the table.

https://en.m.wikipedia.org/wiki/Tor_(network)#Exit_node_eave...


Sure-- but that structural shortcoming has been a thing for a long time-- I wouldn't consider it a secret vulnerability that Tor was facilitating for US intelligence, as was initially implicated. I'm not in the field, but it seems like it would be way more useful for law enforcement working against criminals naive enough to think tor would be a one-stop op-sec solution (e.g. ANOM) than for nation-state-level counterintelligence.


  I'm not in the field, but it seems like it would be way more useful for law enforcement working against criminals naive enough to think tor would be a one-stop op-sec solution (e.g. ANOM) than for nation-state-level counterintelligence.
you must have noise to hide a signal


If I remember correctly, Tor has been broken due to 'threat actors' owning enough exit nodes to successfully de-anonymize traffic given enough time and information.

pretty sure this is hearsay from a message board, but I can't for the life of me recall where or when I heard this.



Uk gov selling or giving enigma away knowing they had broken it


UK government selling a German product / war gadget? That doesn't make sense.


There is no real evidence that DARPA is morally compromised by the NSA in any way. This is unlike for NIST where there is evidence of such compromise.

Moreover, it is not DARPA doing the development. They fund other entities to do it.


> There is no real evidence that DARPA is morally compromised by the NSA in any way. This is unlike for NIST where there is evidence of such compromise.

Wait. Can you clarify this? I know that NIST's standards were compromised by the NSA or at least there is evidence of it. However, this is not necessarily the same as being morally compromised. The story I've read is that the NIST was taken for a ride by the NSA but weren't in bed with them. Is the narrative I have incorrect?


If you haven't seen it already, there was a post a couple of years ago here that got some traction on this subject, in context of a FOIA-related lawsuit filing by a (I'm to understand) well-regarded cryptologist:

https://news.ycombinator.com/item?id=32360533


That's really informative. Thank you! Thank you!


The defensive side also has a case for strong caring about adversaries de-anonymizing traffic of US citizens and businesses


TOR is PURELY designed for spies to use to hide among the network in countries throughout the world. It needs regular people to believe in it, to use it, but its only real purpose is for the spies. Regular users can and are deanonymised in real time and without using zero days. You just have to look at the network to see that you are almost exclusive connected to a series of entry/relay/exit nodes within 14 Eyes countries who share real-time data with each other. The servers are fast because most are using VPS. There was a time when it was more anonymous, when the relays would actually be random people's own computers across the globe, but it was too slow. The whole thing is gamed, and just because criminals are on there thinking they are anonymous is just because they are allowed to continue to keep the charade alive. I know I am going to be bursting bubbles here for 'true believers', but they have all been gamed for years. I'm surprised this info is Top Secret, it should be utter common sense to everyone by now.


> most are using VPS

The IBM operating system? Or do you just mean they run on VMs?


VPS stands for Virtual Private Server, essentially another word for a VM you can buy from hosting / cloud companies.


Thanks, I'm familiar with that usage but I had only ever heard it used in the context of web hosting companies and colos.

Basically a small VM on a crowded server for tasks like running a Wordpress site. So I was confused about why that was emphasized.

But it looks like it's expanded to cover things like GCP and EC2 which makes more sense.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: