The book of inspiration

June 24, 2015

Counter Interception

Filed under: tech — zproxy @ 11:47 pm

recently leaked documents appear to reveal that the NSA, the United States National Security Agency, logs very high volumes of internet traffic and retains captured encrypted communication for later cryptanalysis.

  • Almost all of the websites run by companies involved in the PRISM programme do not use PFS.

A rainbow table is a precomputed table for reversing cryptographic hash functions, usually for cracking password hashes. Tables are usually used in recovering a plaintext password up to a certain length consisting of a limited set of characters.

If the key is the same size as the plaintext, and “truly” random (at least from the POV of the attacker) it’s a OTP; aka unbreakable.

Central to Google’s business model is the collection of huge quantities of data about hundreds of millions of people.

When a user tries to access a website which is on the suspected list, the traffic will be rerouted to the interceptor where the URL will be matched against the lists of URLs. If there is a match, the request will be blocked, otherwise, the request will be let through. Since websites and others large providers clean their system before it enters the suspected list, these sites will never end up on the suspected list and hence no traffic to the major sites will be re-routed.

Before a web request is to be made, one should resolve the DNS via multiple known root servers, do a trace and have a look at the reported route. One of the reported routers may be actively intercepting the traffic. See also:

Request to resolver1.opendns.com timed-out

Request to google-public-dns-a.google.com timed-out

can’t find enclosedworld.com: Server failed

Most Internet users typically don’t have much control over the path their Internet data travels. That can prove problematic because routers in certain parts of the world will modify data passing through and effectively censor the content.

Your IP address, 385.101.107.57, has been automatically identified as a Tor exit node. Editing through Tor is blocked to prevent abuse.

Advertisements

Create a free website or blog at WordPress.com.

%d bloggers like this: