Communication





Internet Communication - Spiegel online: LINK ¤ SPIEGEL ONLINE

_________________________________________

 

  • "encrypted Internet communication - is the use of mathematics !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

 

_________________________________________

  • "to protect communications - from spying !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 


 

 

_________________________________________

  • "but not all technologies lived up - to what they promised - like Skype !"

 

 

 

 

 

_________________________________________

  • "documents from the NSA - described virtual private networks - VPN !"

 

 

 

 

_________________________________________

  • "1,000 requests an hour - of VPN connections !"

 

 

 

 

 

_________________________________________

  • "VPN was often used - by companies and institutions - operating from multiple offices - and locations !"

 

 

 

 

 

_________________________________________

  • "the documents described - the Internet Protocol Security - Ipsec !"

 

 

 

 

_________________________________________

  • "and the Point-to-Point Tunneling Protocol - PPTP !"

 

 

 

 

 

_________________________________________

  • "the documents described - https connections - 10 million !"

 

 

 

 

_________________________________________

  • "and SSL connections - billions - for one week !"

 

 

 

 

 

 

_________________________________________

  • "the documents described - five levels !"

 

 

 


_________________________________________

  • "a document's path - through the Internet - was classified as "trivial" - by them !"

 

 

 

 

 

_________________________________________

  • "Facebook chats - were considered a "minor" task - for them !"

 

 

 

 

 

_________________________________________

  • "the documents described - the fourth level - troublesome for them !"

 

 

 

 

_________________________________________

  • ""major" problems - for messages sent - through heavily encrypted - email service providers !"

 

 

 

 

 

_________________________________________

  • "like "Zoho" - or the users of the - "Tor" network !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

 

 

_________________________________________

  • "Tor - otherwise known as the "Onion Router" - is free and open source software !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

 

_________________________________________

  • "that allows users - to surf the web - through a network - of more than 6,000 linked - volunteer computers !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

 

 

_________________________________________

  • "its software automatically - encrypts data - in a way - that ensures !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

 

_________________________________________

  • "that no single computer - in the network - has all of a user's - information !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

 

 

 

_________________________________________

  • "the documents described - "major" problems - for them !"

 

 

 


_________________________________________

  • "with "Truecrypt" - a program for encrypting files - on computers !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

 

 

_________________________________________

  • "and a protocol called - "Off-the-Record" - OTR !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 


 

_________________________________________

  • "for encrypting - instant messaging !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! - ( used by - Edward Snowden !!!!!!!!!!!!!!!!!!!!!!!! )"

 

 

 

 

 

_________________________________________

  • "both are programs - whose source code - can be viewed !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

 

_________________________________________

  • "modified - shared - and used - by anyone !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

 

 

_________________________________________

  • "experts agree - that open source software programs - are far more secure !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 


 

 

_________________________________________

  • "than a closed system - of a company - like Microsoft !"

 

 

 

 

 

 

_________________________________________

  • "the documents described - "catastrophic" - for them !"

 

 

 

 

_________________________________________

  • "at level five - when a subject uses - a combination !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

 

 

_________________________________________

  • "of "Tor" - the instant messaging system - "CSpace"  !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

 

_________________________________________

  • "or a system for Internet telephony - voice over IP - called "ZRTP"  !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

 

 

_________________________________________

  • "( a document described - "this type of combination resulted - in a "near-total loss" - for them"  ! )"

 

 

 

 

 

_________________________________________

  • "ZRTP - which is used to securely encrypt - conversations !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

 

_________________________________________

  • "and text chats - on mobile phones !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

 

 

_________________________________________

  • "is used in free - and open source programs - like "RedPhone" - and "Signal"  !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

 

 

 

_________________________________________

  • "the "Z" - in "ZRTP" - stands for one of its developers - Phil Zimmermann !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 


 

 

_________________________________________

  • "the same man who created - PGP - "Pretty Good Privacy"  !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

 

 

_________________________________________

  • "which is still - the best - and the most common !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

 

_________________________________________

  • "encryption program - for emails - and documents - in use today !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

 

 

_________________________________________

  • "Phil Zimmermann wrote PGP - in 1991 - but it remains too robust for them - to crack !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

 

_________________________________________

  • "( a document described - "no decrypt was available - for PGP - encrypted messages"  ! )"

 

 

 

 

 

_________________________________________

  • "PGP continues - to be developed - and various versions - are available today !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

 

_________________________________________

  • "one widely used is - "GNU Privacy Guard" - GnuPG !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

 

 

_________________________________________

  • "a document described - "that they used - "PGP" - themselves"  !"

 

 

 

 

 

 

 

 

 

______________________________________________________________________________

Cellphone Networks - the Intercept: LINK ¤ the INTERCEPT

_________________________________________

 

  • "documents from the NSA - described cellphone networks !"

 

 

 

 

_________________________________________

  • "70 percent - of cellphone networks worldwide ! - ( 701 - of 985 ! )"

 

 

 

 

 

_________________________________________

  • "the documents described - "Auroragold"  !"

 

 

 

 

_________________________________________

  • "cellphone network operators - confidential company planning papers !"

 

 


 

 

_________________________________________

  • "they tried to find - security weaknesses - in cellphone technology !"

 

 


 

_________________________________________

  • "and they looked at - upgrades - in encryption technology !"

 

 

 

 

 

 

_________________________________________

  • "the documents described - 1,201 email - "selectors"  !"

 

 


 

_________________________________________

  • "internal company details - from employees !"

 

 

 

 

 

_________________________________________

  • "the documents described - the GSM Association - or the GSMA !"

 

 

 

 

_________________________________________

  • "800 cellphone - software - and Internet companies !"

 

 


 

 

_________________________________________

  • "like Sony - Nokia - Samsung - Ericsson - and Vodafone !"

 

 

 

 

_________________________________________

  • "as well as Verizon - AT&T - Microsoft - and Facebook !"

 

 

 

 

 

_________________________________________

  • "the documents described - technical documents !"

 

 

 

 

_________________________________________

  • "circulated among the - GSMA’s members - known as - "IR.21s"  !"

 

 

 

 

 

_________________________________________

  • "an IR.21 - contained information - a document described !"

 

 

 


_________________________________________

  • "they searched for - security vulnerabilities - in the communication systems !"

 

 

 


 

 

 

 

 

______________________________________________________________________________

two Memos - Washington Post: LINK ¤ WASHINGTON POST

_________________________________________

 

  • "two memos were released - written by then-assistant attorney general - Jack Goldsmith !"

 

 

 

 

_________________________________________

  • "he concluded only that - when the USA had been thrust - into an armed conflict !"

 

 

 

 

 

_________________________________________

  • "and the president - determined in his role - as commander in chief !"

 

 

 

 

_________________________________________

  • "he would had inherent - constitutional authority - to order - US warrantless wiretapping !"

 

 

 

 

 

_________________________________________

  • "it had been the program - code-named "Stellar Wind" - communications on US soil !"

 

 

 

 

 

_________________________________________

  • "these memos showed - that lawyers had not been able !"

 


 

 

_________________________________________

  • "to put the program - on sound legal footing !"

 

 

 


 

 

 

 

 

______________________________________________________________________________

no Mass Surveillance - the Guardian: LINK ¤ the GUARDIAN

_________________________________________

 

  • "secret - massive - and indiscriminate surveillance - cannot be justified !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

 

_________________________________________

  • "the most senior - human rights official in Europe - concludes !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

 

 

_________________________________________

  • "Nils Muižnieks - the commissioner for human rights - at the Council of Europe !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

 

_________________________________________

  • "who has the power - to intervene as a third party !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

 


_________________________________________

  • "in cases - sent to the European court of human rights - ECHR - in Strasbourg !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

 

_________________________________________

  • "calls for greater transparency - and stronger democratic oversight !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

 

 

_________________________________________

  • "suspicionless mass retention - of communications data - is fundamentally contrary - to the rule of law !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

 

 

_________________________________________

  • "states - should not resort to it - or impose compulsory retention of data - by third parties !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

 

_________________________________________

  • "secret - massive - and indiscriminate - surveillance programmes !"

 

 

 

 

 

_________________________________________

  • "are not in conformity - with European human rights law !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

 

_________________________________________

  • "and cannot be justified - by national security !"

 

 

 

 

 

 

_________________________________________

  • "such interferences - could only be accepted - if they are strictly necessary !"

 

 

 

 

_________________________________________

  • "and proportionate - to a legitimate aim !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

 

 

_________________________________________

  • "our right to privacy - must not be compromised !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

 

_________________________________________

  • "and democratic oversight - needs to be more robust !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

 

 

_________________________________________

  • "no states - European or otherwise - should access data - stored in another country !"

 

 

 

 

_________________________________________

  • "without the express consent - of the other country - or countries - involved !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

 

 

_________________________________________

  • "and we need a clear - explicit - and sufficiently circumscribed - legal basis - in international law !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

 

 

 

 

 

 

 

 

 

 


______________________________________________________________________________

COMMUNICATION
- Wikipedia EN:
LINK ¤ COMMUNICATION

______________________________________________________________________________

______________________________________________________________________________



Internet Kommunikation - Spiegel online:
LINK ¤ SPIEGEL ONLINE

_________________________________________

 

  • "Verschlüsselung - ist die Nutzung - mathematischer Methoden !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

_________________________________________

  • "um Kommunikation - vor Ausspähung - zu schützen !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

_________________________________________

  • "aber nicht alle Verschlüsselungstechniken hielten - was sie versprachen - wie Skype !"

 

 

 

_________________________________________

  • "Dokumente der NSA - beschrieben VPN - "Virtual Private Networks"  !"

 

 

_________________________________________

  • "pro Stunde - 20.000 VPN-Verbindungen !"

 

 

 

_________________________________________

  • "VPN - nutzten vor allem Mitarbeiter - von Firmen und Institutionen - mit mehreren Standorten !"

 

 

 

_________________________________________

  • "die Dokumente beschrieben - Projekt "Fourscore"  !"

 


_________________________________________

  • "das Protokoll - PPTP - und das etwas bessere Verfahren - IPSEC ! - ( Schlüssel ! )"

 

 


_________________________________________

  • "die Dokumente beschrieben - https-Verbindungen !"

 

_________________________________________

  • "pro Tag - zehn Millionen !"

 

 

 

 

_________________________________________

  • "die Dokumente beschrieben - fünf Gruppen !"

 

 

_________________________________________

  • "als "trivial" - galt für diese der Weg - den ein Dokument im Netz nahm !"

 

 

 

_________________________________________

  • "eine "einfache Aufgabe" - waren für diese - Facebook-Chats !"

 

 

 

_________________________________________

  • "die Dokumente beschrieben - Stufe vier - größere Probleme für diese !"

 

 

_________________________________________

  • "E-Mail-Dienstleister - die auf starke Verschlüsselung - setzen !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

_________________________________________

  • "etwa - Zoho !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

_________________________________________

  • "oder das für anonymes Surfen - im Internet entwickelte - "Tor"-Netz !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

_________________________________________

  • "Tor - steht für "The onion router" - und ist eine freie - offene Software !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

_________________________________________

  • "mit der sich der Nutzer - einen verschlungenen Weg - durch mehr als 6000 Computer - von Freiwilligen bahnt !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

_________________________________________

  • "die Daten werden - wie bei einer Zwiebel - von einer Verschlüsselung !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

_________________________________________

  • "nach der anderen umhüllt - und wieder befreit !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

 

_________________________________________

  • "die Dokumente beschrieben - "größere Probleme" - für diese !"

 

 

_________________________________________

  • "bei Truecrypt - einem Programm zur Verschlüsselung - von Dateien - auf Computern !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

_________________________________________

  • "und beim sogenannten - Off-the-record-Protokoll - OTR !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

_________________________________________

  • "das zur Codierung - von Chats - benutzt wird !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! - ( wie auch von - Edward Snowden !!!!!!!!!!!!!!!!!!!!!!!! )"

 

 

 

_________________________________________

  • "beides sind - Open-Source-Projekte - also Programme !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

_________________________________________

  • "deren Quellcode - jeder Interessierte - einsehen kann !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

_________________________________________

  • "solche Software - darin sind sich die Experten einig - ist viel sicherer !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

_________________________________________

  • "als ein geschlossenes System - wie etwa von der Firma - Microsoft !"

 

 

 

 

_________________________________________

  • "die Dokumente beschrieben - "katastrophal" - für diese !"

 

 

_________________________________________

  • "wenn man eine Kombination - aus Tor !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

_________________________________________

  • "und einem weiteren Anonymisierungsdienst - nutzt !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

_________________________________________

  • "wie dem quelloffenen - Instant-Messaging-System - Cspace !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

_________________________________________

  • "( ein Dokument beschrieb - "fast vollständiger Verlust von Erkenntnissen über die Kommunikation" - bei der Kombination - für diese ! )"

 


 

_________________________________________

  • "zur sicheren Verschlüsselung - von Gesprächen - und Textchats !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

_________________________________________

  • "auf Mobiltelefonen - gibt es das Protokoll - ZRTP !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

_________________________________________

  • "es wird etwa in den - Open-Source-Programmen - RedPhone - und Signal - verwendet !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

 

_________________________________________

  • "entwickelt hat ZRTP - unter anderen - Phil Zimmermann !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

_________________________________________

  • "der Mann - der den bis heute gebräuchlichsten - und besten - Verschlüsselungsstandard !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

_________________________________________

  • "für E-Mails - und Dokumente - geschaffen hat !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

_________________________________________

  • "er ist bekannt unter der Abkürzung - PGP - ausgeschrieben - "Pretty Good Privacy"  !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

_________________________________________

  • "Phil Zimmerman schrieb PGP - im Jahr 1991 - dieser Verschlüsselungsstandard ist für diese - nicht zu knacken !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

_________________________________________

  • "PGP gibt es heute - in verschiedenen weiterentwickelten - Varianten !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

 

_________________________________________

  • "eine häufige ist - "GNU Privacy Guard"  !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"

 

 

_________________________________________

  • "ein Dokument beschrieb - "dass diese selbst - PGP benutzten"  !"

 

 

 

 

 

 

 

______________________________________________________________________________

Mobilfunkanbieter - Spiegel online: LINK ¤ SPIEGEL ONLINE

_________________________________________

 

  • "Dokumente der NSA - beschrieben Mobilfunkanbieter !"

 

 

_________________________________________

  • "70 Prozent - der Mobilfunkbetreiber - weltweit !"

 

 

 

_________________________________________

  • "die Dokumente beschrieben - die Suche !"

 

 

_________________________________________

  • "nach technischen Schwachstellen - in den Netzen !"

 

 

 

_________________________________________

  • "die Dokumente beschrieben - eine Operation mit dem Namen - "Auroragold"  !"

 

 

_________________________________________

  • "1200 E-Mail-Konten - von Mitarbeitern - der Branche !"

 

 

 

_________________________________________

  • "technische Informationen - und vertrauliche Dokumente - und Pläne !"

 

_________________________________________

  • "in denen die Anbieter - Informationen - über das Funktionieren ihrer Netze - austauschten !"

 

 

 

 

 

 

 

______________________________________________________________________________

KOMMUNIKATION - Wikipedia DE:
LINK ¤ KOMMUNIKATION
______________________________________________________________________________




communication - 14388CO
designed by Free CSS Templates | powerd by pluck | hosted by akis