<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>GL.IB.LY &#187; NSA</title>
	<atom:link href="http://gl.ib.ly/tag/nsa/feed/" rel="self" type="application/rss+xml" />
	<link>http://gl.ib.ly</link>
	<description>Thoughts on security, computing, business and stuff!</description>
	<lastBuildDate>Sun, 18 May 2014 11:51:56 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.1</generator>
	<item>
		<title>Internet privacy opinion after the NSA revelations</title>
		<link>http://gl.ib.ly/stuff/2013/10/06/internet-privacy-opinion-nsa-revelations/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=internet-privacy-opinion-nsa-revelations</link>
		<comments>http://gl.ib.ly/stuff/2013/10/06/internet-privacy-opinion-nsa-revelations/#comments</comments>
		<pubDate>Sun, 06 Oct 2013 06:27:12 +0000</pubDate>
		<dc:creator><![CDATA[tariq]]></dc:creator>
				<category><![CDATA[Stuff]]></category>
		<category><![CDATA[funny]]></category>
		<category><![CDATA[lol]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[opinion]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[xkcd]]></category>

		<guid isPermaLink="false">http://gl.ib.ly/?p=52</guid>
		<description><![CDATA[<p>Made me laugh &#160; Transcript The Philosopher: Megan: &#8220;Privacy&#8221; is an impractical way to think about data in a digital world so unlike the one in which our soci&#8211; Ponytail: So bored. The Crypto Nut: Cueball: My data is safe behind<span class="ellipsis">&#8230;</span><div class="read-more"><a href="http://gl.ib.ly/stuff/2013/10/06/internet-privacy-opinion-nsa-revelations/">Read more &#8250;</a></div><!-- end of .read-more --></p><p>The post <a href="http://gl.ib.ly/stuff/2013/10/06/internet-privacy-opinion-nsa-revelations/">Internet privacy opinion after the NSA revelations</a> appeared first on <a href="http://gl.ib.ly">GL.IB.LY</a>.</p>]]></description>
				<content:encoded><![CDATA[<p>Made me laugh</p>
<p><a href="http://gl.ib.ly/wp-content/uploads/2013/10/privacy_opinions1.png"><img class="aligncenter size-medium wp-image-53" alt="xkcd comic" src="http://gl.ib.ly/wp-content/uploads/2013/10/privacy_opinions1.png" width="676" /></a></p>
<p>&nbsp;</p>
<h2>Transcript</h2>
<p style="padding-left: 30px;">The Philosopher:</p>
<dl style="padding-left: 30px;">
<dd style="padding-left: 30px;">Megan: &#8220;Privacy&#8221; is an impractical way to think about data in a digital world so unlike the one in which our soci&#8211;</dd>
<dd style="padding-left: 30px;">Ponytail: <b><i>So bored.</i></b></dd>
</dl>
<p style="padding-left: 30px;">The Crypto Nut:</p>
<dl style="padding-left: 30px;">
<dd style="padding-left: 30px;">Cueball: My data is safe behind six layers of symmetric and public-key algorithms.</dd>
<dd style="padding-left: 30px;">Friend: What data is it?</dd>
<dd style="padding-left: 30px;">Cueball: Mostly me emailing with people about cryptography.</dd>
</dl>
<p style="padding-left: 30px;">The Conspiracist:</p>
<dl style="padding-left: 30px;">
<dd style="padding-left: 30px;">Cueball talks to Megan.</dd>
<dd style="padding-left: 30px;">Cueball: These leaks are just the tip of the iceberg. There&#8217;s a warehouse in Utah where the NSA has the <i>entire</i> iceberg. I don&#8217;t know how they got it there.</dd>
</dl>
<p style="padding-left: 30px;">The Nihilist:</p>
<dl style="padding-left: 30px;">
<dd style="padding-left: 30px;">Megan: Joke&#8217;s on them, gathering all this data on me as if anything I do means anything.</dd>
</dl>
<p style="padding-left: 30px;">The Exhibitionist:</p>
<dl style="padding-left: 30px;">
<dd style="padding-left: 30px;">Cueball is watching a surveillance console, Officer Ponytail stands behind him.</dd>
<dd style="padding-left: 30px;">Console: <i>Mmmm,</i> I sure hope the NSA isn&#8217;t watching me bite into these juicy strawberries!! <i>Oops,</i> I dripped some on my shirt! Better take it off. Google, are you there? Google, this lotion feels soooo good.</dd>
<dd style="padding-left: 30px;">Cueball: Um.</dd>
</dl>
<p style="padding-left: 30px;">The Sage:</p>
<dl style="padding-left: 30px;">
<dd style="padding-left: 30px;">Beret Guy and Cueball sitting at a table.</dd>
<dd style="padding-left: 30px;">Beret Guy: I don&#8217;t know or care what data <i>anyone</i> has about me. Data is imaginary. This burrito is real.</dd>
</dl>
<p>&nbsp;</p>
<p>The post <a href="http://gl.ib.ly/stuff/2013/10/06/internet-privacy-opinion-nsa-revelations/">Internet privacy opinion after the NSA revelations</a> appeared first on <a href="http://gl.ib.ly">GL.IB.LY</a>.</p>]]></content:encoded>
			<wfw:commentRss>http://gl.ib.ly/stuff/2013/10/06/internet-privacy-opinion-nsa-revelations/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Paranoia deepens for security people as hardware trojans cloak</title>
		<link>http://gl.ib.ly/security/2013/09/18/parania-deepens-security-hardware-trojans-cloak/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=parania-deepens-security-hardware-trojans-cloak</link>
		<comments>http://gl.ib.ly/security/2013/09/18/parania-deepens-security-hardware-trojans-cloak/#comments</comments>
		<pubDate>Wed, 18 Sep 2013 08:47:28 +0000</pubDate>
		<dc:creator><![CDATA[tariq]]></dc:creator>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[amd]]></category>
		<category><![CDATA[computer security]]></category>
		<category><![CDATA[doping]]></category>
		<category><![CDATA[hardware trojan]]></category>
		<category><![CDATA[intel]]></category>
		<category><![CDATA[logic gate]]></category>
		<category><![CDATA[microcode]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[processor]]></category>
		<category><![CDATA[rng]]></category>
		<category><![CDATA[transistor]]></category>
		<category><![CDATA[trojan]]></category>

		<guid isPermaLink="false">http://gl.ib.ly/?p=22</guid>
		<description><![CDATA[<p>I remember being back in college writing little trojans for windows and linux. Hardware trojans troubled one of my lecturers. He had been paranoid, for a great number of years, about the complexity of computer chips and during one such<span class="ellipsis">&#8230;</span><div class="read-more"><a href="http://gl.ib.ly/security/2013/09/18/parania-deepens-security-hardware-trojans-cloak/">Read more &#8250;</a></div><!-- end of .read-more --></p><p>The post <a href="http://gl.ib.ly/security/2013/09/18/parania-deepens-security-hardware-trojans-cloak/">Paranoia deepens for security people as hardware trojans cloak</a> appeared first on <a href="http://gl.ib.ly">GL.IB.LY</a>.</p>]]></description>
				<content:encoded><![CDATA[<p>I remember being back in college writing little trojans for windows and linux. Hardware trojans troubled one of my lecturers. He had been paranoid, for a great number of years, about the complexity of computer chips and during one such comversation about microcode &#8212; one of the biggest evils he could imagine &#8212; he asked his colleague &#8220;the number of years that have passed since a single person understood the complexity of a microchip&#8221;. The non-challant reply was &#8220;plenty&#8221;.</p>
<p>Well I wonder how he would feel after <a href="http://people.umass.edu/gbecker/BeckerChes13.pdf">a paper</a> <a href="http://www.infoworld.com/d/security/security-researchers-create-undetectable-hardware-trojans-227062?page=0,1&amp;source=rss_security&amp;utm_source=feedburner&amp;utm_medium=twitter&amp;utm_campaign=Feed%3A%20Secureslinger%20%28SecureSlinger%29">was released</a> this month showing that you can change the logic gates of a microprocessor by changing the doping of transistors. Such changes, the trojan, would not be visible (functionaly or optically) and the underlying circuitry would be unaffected. As <a href="https://www.schneier.com/blog/archives/2013/09/surreptitiously.html">Brucie suggests</a> one of the best things to do with this is attack the random number generator (RNG) by lowering the entropy of random numbers. Random numbers underpin modern cryptography and should they become predictable then all security is lost.</p>
<p><em>Oh so what about that stuff with micro-code? </em>Tbh I don&#8217;t know, the more I learned the more dangerous it seemed. Here is an excerpt from <a href="http://cryptome.org/jya/intel-bug.htm">another article:</a></p>
<blockquote><p>But Intel&#8217;s biggest security feature may lie in keeping the technical<br />
details behind its BIOS Update technology a closely guarded secret. &#8220;There is<br />
no documentation,&#8221; said Frank Binns, an architect in Intel&#8217;s<br />
microprocessor group. &#8220;It&#8217;s not as if you can get an Intel &#8216;Red Book&#8217;<br />
with this stuff written down. It&#8217;s actually in the heads of less than 10<br />
people in the whole of Intel.</p></blockquote>
<p>Interesting,  this thing [levels of encryption within the processor that prevents malicious encrypted microcode updates] is known by a few people at Intel and bunch of people over at the NSA, a fair assumption given current revelations &#8212; I wish they&#8217;d tell me where I left my coke!</p>
<p>The post <a href="http://gl.ib.ly/security/2013/09/18/parania-deepens-security-hardware-trojans-cloak/">Paranoia deepens for security people as hardware trojans cloak</a> appeared first on <a href="http://gl.ib.ly">GL.IB.LY</a>.</p>]]></content:encoded>
			<wfw:commentRss>http://gl.ib.ly/security/2013/09/18/parania-deepens-security-hardware-trojans-cloak/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Linus Torvalds responds to petition to remove RdRand from /dev/random</title>
		<link>http://gl.ib.ly/stuff/2013/09/17/linus-torvalds-responds-to-petition-to-remove-rdrand-from-dev-random/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=linus-torvalds-responds-to-petition-to-remove-rdrand-from-dev-random</link>
		<comments>http://gl.ib.ly/stuff/2013/09/17/linus-torvalds-responds-to-petition-to-remove-rdrand-from-dev-random/#comments</comments>
		<pubDate>Tue, 17 Sep 2013 12:04:56 +0000</pubDate>
		<dc:creator><![CDATA[tariq]]></dc:creator>
				<category><![CDATA[Stuff]]></category>
		<category><![CDATA[linus]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[random]]></category>
		<category><![CDATA[rdrand]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[stupid]]></category>

		<guid isPermaLink="false">http://gl.ib.ly/?p=14</guid>
		<description><![CDATA[<p>Really funny petition at http://www.change.org/en-GB/petitions/linus-torvalds-remove-rdrand-from-dev-random-4 Linus’ reply: Where do I start a petition to raise the IQ and kernel knowledge of people? Guys, go read drivers/char/random.c. Then, learn about cryptography. Finally, come back here and admit to the world that<span class="ellipsis">&#8230;</span><div class="read-more"><a href="http://gl.ib.ly/stuff/2013/09/17/linus-torvalds-responds-to-petition-to-remove-rdrand-from-dev-random/">Read more &#8250;</a></div><!-- end of .read-more --></p><p>The post <a href="http://gl.ib.ly/stuff/2013/09/17/linus-torvalds-responds-to-petition-to-remove-rdrand-from-dev-random/">Linus Torvalds responds to petition to remove RdRand from /dev/random</a> appeared first on <a href="http://gl.ib.ly">GL.IB.LY</a>.</p>]]></description>
				<content:encoded><![CDATA[<p>Really funny petition at <a href="http://www.change.org/en-GB/petitions/linus-torvalds-remove-rdrand-from-dev-random-4">http://www.change.org/en-GB/petitions/linus-torvalds-remove-rdrand-from-dev-random-4</a></p>
<p>Linus’ reply:</p>
<blockquote><p>Where do I start a petition to raise the IQ and kernel knowledge of people? Guys, go read drivers/char/random.c. Then, learn about cryptography. Finally, come back here and admit to the world that you were wrong. Short answer: we actually know what we are doing. You don’t. Long answer: we use rdrand as <em>one</em> of many inputs into the random pool, and we use it as a way to <em>improve</em> that random pool. So even if rdrand were to be back-doored by the NSA, our use of rdrand actually improves the quality of the random numbers you get from /dev/random. Really short answer: you’re ignorant.</p>
<p>&nbsp;</p></blockquote>
<p>The post <a href="http://gl.ib.ly/stuff/2013/09/17/linus-torvalds-responds-to-petition-to-remove-rdrand-from-dev-random/">Linus Torvalds responds to petition to remove RdRand from /dev/random</a> appeared first on <a href="http://gl.ib.ly">GL.IB.LY</a>.</p>]]></content:encoded>
			<wfw:commentRss>http://gl.ib.ly/stuff/2013/09/17/linus-torvalds-responds-to-petition-to-remove-rdrand-from-dev-random/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
