On Fri, 25 May 2012 17:23, ma...@extendedsubset.com said: > Perhaps someone who knows German can better interpret it.
What they likely mean is traffic analysis and that for example the Subject in mails is not encrypted. For SSH my guess is that they were able to break accounts by brute force password cracking. Which is not a surprise given that many SSH users believe that ssh automagically make their root account save and continue to use their lame passwords instead of using PK based authentication. The whole thing is the usual disinformation by German secret services at a parliamentarian investigation committee. This committee is about German secret services snooping on mail “leaving and entering the country”. They seem to use those old Echelon like word lists (sampling 20% of all mails using a list of 16400 different words). Nothing new and likely a copy of what the NSA does for years. For the fun part, we may still be able to annoy them with spooky MIME boundaries. Shalom-Salam, Werner -- Die Gedanken sind frei. Ausnahmen regelt ein Bundesgesetz. _______________________________________________ cryptography mailing list cryptography@randombit.net http://lists.randombit.net/mailman/listinfo/cryptography