Stories
Slash Boxes
Comments

SoylentNews is people

posted by martyb on Sunday December 15 2019, @06:15PM   Printer-friendly
from the task-the-NSA-with-making-it dept.

Senate Judiciary Committee Interrogates Apple, Facebook About Crypto

In a hearing of the Senate Judiciary Committee yesterday, while their counterparts in the House were busy with articles of impeachment, senators questioned New York District Attorney Cyrus Vance, University of Texas Professor Matt Tait, and experts from Apple and Facebook over the issue of gaining legal access to data in encrypted devices and messages. And committee chairman Sen. Lindsey Graham (R-S.C.) warned the representatives of the tech companies, "You're gonna find a way to do this or we're going to do it for you."

The hearing, entitled "Encryption and Lawful Access: Evaluating Benefits and Risks to Public Safety and Privacy," was very heavy on the public safety with a few passing words about privacy. Graham said that he appreciated "the fact that people cannot hack into my phone, listen to my phone calls, follow the messages, the texts that I receive. I think all of us want devices that protect our privacy." However, he said, "no American should want a device that is a safe haven for criminality," citing "encrypted apps that child molesters use" as an example.

"When they get a warrant or court order, I want the government to be able to look and find all relevant information," Graham declared. "In American law there is no place that's immune from inquiry if criminality is involved... I'm not about to create a safe haven for criminals where they can plan their misdeeds and store information in a place that law enforcement can never access it."


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 2) by jasassin on Sunday December 15 2019, @09:21PM

    by jasassin (3566) <jasassin@gmail.com> on Sunday December 15 2019, @09:21PM (#932478) Homepage Journal

    I was trying out the PMKID wireless hacking for WPA2 encryption on WiFi routers. I got a few PMKID's from some CenturyLink routers around here and emailed them to a friend of mine with an Nvidia RTX 2080 video card to brute force the passwords with hashcat64. I emailed him a command line to run the brute force attack with 8 digits/characters. It took his video card 6 minutes and 20 seconds to complete the hashes. There were no passwords so I did some googling about Century Link routers and squinted to see an image of the default router setup on one. Low and behold the CenturyLink routers by default have 14 digit/character passwords. So I emailed him the new command line to increase the brute force to 14 characters/digits, and the ETA for hash completion jumped from 6 minutes and 20 seconds to over 400 years. Have fun hacking that.

    The moral of this story is use long passwords.

    --
    jasassin@gmail.com GPG Key ID: 0xE6462C68A9A3DB5A
    Starting Score:    1  point
    Karma-Bonus Modifier   +1  

    Total Score:   2