In a post on Wednesday, researchers Alex Halderman and Nadia Heninger presented compelling research suggesting that the NSA has developed the capability to decrypt a large number of HTTPS, SSH, and VPN connections using an attack on common implementations of the Diffie-Hellman key exchange algorithm with 1024-bit primes. Earlier in the year, they were part of a research group that published a study of the Logjam attack, which leveraged overlooked and outdated code to enforce "export-grade" (downgraded, 512-bit) parameters for Diffie-Hellman. By performing a cost analysis of the algorithm with stronger 1024-bit parameters and comparing that with what we know of the NSA "black budget" (and reading between the lines of several leaked documents about NSA interception capabilities) they concluded that it's likely NSA has been breaking 1024-bit Diffie-Hellman for some time now.
The good news is, in the time since this research was originally published, the major browser vendors (IE, Chrome, and Firefox) have removed support for 512-bit Diffie-Hellman, addressing the biggest vulnerability. However, 1024-bit Diffie-Hellman remains supported for the forseeable future despite its vulnerability to NSA surveillance. In this post, we present some practical tips to protect yourself from the surveillance machine, whether you're using a web browser, an SSH client, or VPN software.
Disclaimer: This is not a complete guide, and not all software is covered.
1More
Free VPN - Free download and software reviews - CNET Download.com - 1 views
2More
No VPN on Earth Can Protect Careless Pirates | TorrentFreak - 1 views
2More
Top 10 VPN Service providers which ensure that your browsing stays private and anonymous - 0 views
2More
ISP Provides Free VPN to Protect Customer Privacy | TorrentFreak - 1 views
1More
Europe's 'Net Neutrality' Could Allow Torrent and VPN Throttling - TorrentFreak - 0 views
1More
How you can easily secure your data with OpenVPN a free vpn software - 1 views
1 - 17 of 17
Showing 20▼ items per page