@bert_hubert Notice dat het allemaal past in de werkelijke bedoelingen van #bigtech alle informatie te verzamelen en te bundelen in Amerikaanse handen (#cia #nsa #palantir) zie #youtube #withneywebb

Part 1 Israeli Company Comverse Infosys & Amdoc Wiretap For The NSA

#surveillance #state #backdoor #israel #history #nsa #fbi #infosec #opsec #osint #politics #geopolitics #wiretapping #video #fyp

Part 2 Israeli Company Comverse Infosys & Amdoc Wiretap For The NSA

#surveillance #state #backdoor #israel #history #nsa #fbi #infosec #opsec #osint #politics #geopolitics #wiretapping #video #fyp

Part 1 Israeli Companies Comverse Infosys & Amdoc Wiretap For The NSA

#surveillance #state #backdoor #israel #history #nsa #fbi #infosec #opsec #osint #politics #geopolitics #wiretapping #video #fyp

Part 1 Israeli Companies Comverse Infosys & Amdoc Wiretap For The NSA

#surveillance #state #backdoor #israel #history #nsa #fbi #infosec #opsec #osint #politics #geopolitics #wiretapping #video #fyp

in all this merry djb bashing 1 thing i didn't hear from the people representing the interests of the #nsa, is why is it important that when the nsa wants 2 use naked pqkems, they have to be #IETF standardized? why do we need a naked #standard when everyone else wants hybrids? the ietf is international, the nsa is national, so why not task NIST with a national standard? would these people also vehemently protect the interests of the kgb if they wanted an other perfectly secure naked #pqkem?
🌘 美國國家安全局與網際網路工程任務組的博弈:後量子密碼學標準化的腐敗與審查(二)
➤ 揭露 NSA 如何利用 IETF 推動弱化密碼標準,同時掩蓋腐敗與審查。
https://blog.cr.yp.to/20251123-corruption.html
本文是關於美國國家安全局(NSA)如何透過影響網際網路工程任務組(IETF)來推動弱化密碼學標準化的系列文章的第二篇。作者指出,NSA 過去曾透過影響標準,例如 RC4 和 Dual EC,導致長期的安全漏洞。如今,NSA 試圖將後量子密碼學(PQC)標準推向僅包含 PQ 的弱化版本,即使他們自己內部使用更強的密碼學。文章進一步揭露了 IETF 的「安全區域總監」規避關鍵議題,以及異議聲音如何被審查,儘管 IETF 自稱開放。
+ 這篇文章揭露了令人不安的真相,NSA 竟然在推動弱化密碼技術,這對網路安全構成了嚴峻威脅。IETF 的角色令人失望。
+ 作者對 NSA 的策略分析得鞭闢入裡,特別是將其與過去的案例(如 RC4)連結,讓人對後量子密碼學的未來感到憂慮。審查的部
#後量子密碼學 #NSA #IETF #標準化 #審查
cr.yp.to: 2025.11.23: NSA and IETF, part 2

Edward Snowden #NSA released documents about a man working for the government who abused his power to get into a civilian's information, then subsequently released it to the town the civilian lived in to cause a fued. #App ❄️🧛🩸🦇

DOJ filings allege that an NSA contractor misused a government workstation for harmful activity involving minors. Monitoring tools reportedly detected the behavior. The contractor’s employment ended after his arrest, and he remains innocent until proven guilty.

The case prompts renewed discussion on insider-risk models, endpoint monitoring, and oversight in high-trust environments.

💬 Thoughts on strengthening insider-risk controls without over-surveilling legitimate analysts?

Source: https://www.forbes.com/sites/the-wiretap/2025/11/26/nsa-contractor-groomed-teenage-girls-on-reddit-doj-alleges/

Follow @technadu for responsible cybersecurity coverage.

#CyberSecurity #InsiderRisk #DOJ #NSA #ThreatManagement #InfoSec #Monitoring #TechNadu

by accident i stumbled on this review by the #NSA on Bruce Schneiers "Applied Crypto" book from long ago.
×