On Fri, 25 May 2012 17:23, ma...@extendedsubset.com said:

> Perhaps someone who knows German can better interpret it.

What they likely mean is traffic analysis and that for example the
Subject in mails is not encrypted.  For SSH my guess is that they were
able to break accounts by brute force password cracking.  Which is not a
surprise given that many SSH users believe that ssh automagically make
their root account save and continue to use their lame passwords instead
of using PK based authentication.

The whole thing is the usual disinformation by German secret services at
a parliamentarian investigation committee.  This committee is about
German secret services snooping on mail “leaving and entering the
country”.  They seem to use those old Echelon like word lists (sampling
20% of all mails using a list of 16400 different words).  Nothing new
and likely a copy of what the NSA does for years.  For the fun part, we
may still be able to annoy them with spooky MIME boundaries.


Shalom-Salam,

   Werner

-- 
Die Gedanken sind frei.  Ausnahmen regelt ein Bundesgesetz.

_______________________________________________
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography

Reply via email to