{"id":26706,"date":"2013-09-08T17:36:00","date_gmt":"2013-09-08T15:36:00","guid":{"rendered":"http:\/\/blog.coaster.de\/wp\/?p=26706"},"modified":"2013-09-08T17:36:00","modified_gmt":"2013-09-08T15:36:00","slug":"nsa-creates-backdoors-in-consumer-software","status":"publish","type":"post","link":"https:\/\/www.gruen-wald.de\/wordpress\/internet-co\/nsa-creates-backdoors-in-consumer-software\/","title":{"rendered":"NSA creates backdoors in consumer software"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft\" title=\"NSA\" src=\"http:\/\/blog.coaster.de\/wp\/wp-content\/uploads\/2013\/06\/prism-and-refraction-of-light-into-rainbow-2-AJHD.jpg\" alt=\"\" width=\"193\" height=\"256\" \/>Another interesting and important revelation from Snowden and Greenwald happened last week about the NSA implementing backdoors in security software &#8211; including pretty much every mobile phone device like iOS and Android. While this is nothing too surprising (or even new), it&#8217;s still alarming to see how encryption software making you believe that it is for your safety, is actually a commercial trojan horse sold for a lot of money. Take care of what software you use (open source is still a good way to go here).<\/p>\n<p>For example, the NSA released an encryption standard called Dual_EC_DRBG. This standard was also ratified by NIST, the National Institute of Standards and Technology. While people used it in believe, it&#8217;s a safe standard, the NSA deliberately built weak aspects into the code to be able to predict the outcome. The weakness was already reported on in 2007, but it wasn&#8217;t proved (and taken seriously) until now.<\/p>\n<p>Check out the Friday-Episode of Democracy Now! with Glenn Greenwald for an <a href=\"http:\/\/www.democracynow.org\/2013\/9\/6\/\">update directly from the source (after headlines)<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Another interesting and important revelation from Snowden and Greenwald happened last week about the NSA implementing backdoors in security software&hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","_links_to":"","_links_to_target":""},"categories":[11],"tags":[],"class_list":["post-26706","post","type-post","status-publish","format-standard","hentry","category-internet-co"],"_links":{"self":[{"href":"https:\/\/www.gruen-wald.de\/wordpress\/wp-json\/wp\/v2\/posts\/26706"}],"collection":[{"href":"https:\/\/www.gruen-wald.de\/wordpress\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.gruen-wald.de\/wordpress\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.gruen-wald.de\/wordpress\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.gruen-wald.de\/wordpress\/wp-json\/wp\/v2\/comments?post=26706"}],"version-history":[{"count":0,"href":"https:\/\/www.gruen-wald.de\/wordpress\/wp-json\/wp\/v2\/posts\/26706\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.gruen-wald.de\/wordpress\/wp-json\/wp\/v2\/media?parent=26706"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.gruen-wald.de\/wordpress\/wp-json\/wp\/v2\/categories?post=26706"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.gruen-wald.de\/wordpress\/wp-json\/wp\/v2\/tags?post=26706"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}