Premium Content

Access "Fixing the math in the wake of Snowden's NSA surveillance reveal"

Published: 29 Jan 2014

One of the responses to early salvos of former NSA contractor Edward Snowden's surveillance releases was "trust the math." That's how security veteran Bruce Schneier put it in a posting to his blog site. Snowden himself, when answering reader questions on the Guardian website, said, "Encryption works. Properly implemented strong cryptosystems are one of the few things that you can rely on." A lot of us heaved a huge sigh of relief upon hearing that. Not because NSA surveillance will reveal our big, dark secrets, but if the security community can't say with confidence that it stores the world's digital data securely, it's time to dismantle the industry. And beyond that, privacy is essential. A sense of privacy fosters self-aware, independent identities, which are fundamental to creating modern civilization. Problems in theory It appears Snowden was wrong -- at least, partially -- about NSA's access to encrypted data. Or, perhaps, he was putting a lot of weight on the phrase "properly implemented." Because if you had hung your trust on RSA, the security ... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features
    • Beyond the Page: Cyberthreats by Johannes B. Ullrich

      This February 2014 Information Security magazine supplement takes a deeper look into cyberthreats and examines advanced threat techniques including watering hole attacks and sophisticated spear phishing.

    • The changing face of advanced malware detection by David Strom, Contributor

      It's a new year of advanced threats, malicious code and holes to plug, but security teams are fighting back with help from global services.

More Premium Content Accessible For Free

  • Continuous monitoring program demystified
    ism_1014.png
    E-Zine

    For many security teams, "continuous monitoring" is a vague concept associated with FISMA compliance. A continuous monitoring program can be simple ...

  • Does Windows 8.1 meet the demands of the BYOD age?
    windows_shopping_8-1.png
    E-Handbook

    The variety and sheer number of network endpoints, users and devices in the enterprise today is driving IT's demands for enhanced security features ...

  • Application security policy after Heartbleed
    ISM_0914.png
    E-Zine

    Enterprises leverage open source software for the perceived quality of the code, but the Heartbleed flaw has made many question their use of ...