Stories
Slash Boxes
Comments

SoylentNews is people

posted by janrinok on Thursday June 04 2015, @11:53PM   Printer-friendly

THE NATIONAL SECURITY Agency knows Edward Snowden disclosed many of its innermost secrets when he revealed how aggressive its surveillance tactics are. What it doesn't know is just how much information the whistle-blower took with him when he left.

For all of its ability to track our telecommunications, the NSA seemingly has little clue exactly what documents, or even how many documents, Snowden gave to the media. Like most large organizations, the NSA had tools in place to track who accessed what data and when. But Snowden, a system administrator, apparently was able to cover his tracks by deleting or modifying the log files that tracked that access.

An Estonian company called Guardtime says it has a solution to that: using the same ideas that underpin the digital currency Bitcoin, the company says it can ensure no one can alter digital files, not even an organization's most senior executives or IT managers. The idea is to stop the next Snowden in his tracks by making it impossible to tamper with data, such as the NSA log files, in secret.


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 3, Interesting) by davester666 on Friday June 05 2015, @07:48AM

    by davester666 (155) on Friday June 05 2015, @07:48AM (#192411)

    Did Snowden "tamper" with the data? As in, modify it in some way.

    Everything I have read indicates that he copied it.

    So, this would help in verifying that the information someone copies is legit.

    Excellent.

    Starting Score:    1  point
    Moderation   +1  
       Interesting=1, Total=1
    Extra 'Interesting' Modifier   0  
    Karma-Bonus Modifier   +1  

    Total Score:   3  
  • (Score: 2) by kaszz on Friday June 05 2015, @01:22PM

    by kaszz (4211) on Friday June 05 2015, @01:22PM (#192506) Journal

    He modified the logs of the accessed data it seems.
    Kind of "vi /var/log/messages"..

  • (Score: 2) by Snow on Friday June 05 2015, @02:51PM

    by Snow (1601) on Friday June 05 2015, @02:51PM (#192551) Journal

    No, I think the idea is that you take a copy of the log file, hash it, and then insert the hash into the blockchain. The integrity of the .log file can then be verified against the hash signature in the blockchain to confirm that it hasn't been altered. This would make it impossible to cover your tracks by altering .log files after the fact without it being detected.

    • (Score: 2) by Snow on Friday June 05 2015, @02:51PM

      by Snow (1601) on Friday June 05 2015, @02:51PM (#192553) Journal

      Ugh, just reread your comment... Sorry, I think I need more coffee.