DailyExposition

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Tuesday, September 17, 2013

Can Creating Your Own Encryption Keys Prevent NSA Spying?

Posted on 8:43 PM by Unknown
Could we prevent NSA spying if every user was able to create their own encryption key? The NSA has been retrieving data from some of the largest companies for years, and that is because they were able to gain access to their servers (with or without permission details are still not known), and that means that they could in theory bypass encrypted information. What If we allowed every user to create their own encryption key.

When you encrypt something on lets say Google they have a set algorithm that will scramble those letters into nonsense data. Except to a programmer, who could in theory reverse engineer the algorithm. While this is very unlikely it is technically possible which would mean that if they did not know about the snooping a programmer managed to reverse engineer the algorithm and therefore know every encrypted piece of data. Now this is common with poorly built algorithms which are open to many flaws, but is it possible that every tech company made the same mistake or that there was some sort of work around.

Therefore if anyone had the ability to create their own encryption key would it be possible to block all of that snooping? For instance if everyone could write and disguise their own password could they get past it? The answer to this is yes and no, and it can be both. The reason is they cant discover every ones password UNLESS they all started to use the same formula. For instance a password of 123 is encrypted as abc, and this other guy is 456 with a password of def, then it would be possible. The best way for this to work is if everyone had their own unique system or tied it to something random. Famous equations can be reversed engineered easily.

For us to do this, we would literally have to rewrite most of our current security solutions, because the idea would take so much time, and resources but would it pay off.

The idea sounds amazing on pen and paper, however most users are lazy. Most people refuse to use 2-step verification why would they write their own encryption key? Security? Privacy? The fact is both of these would improve, but how do you convince the consumer to do something like this, and that is why the idea has not been explored. The average users do not care enough to actually work on something like this.

Comodo an internet security firm has started to use this in their cloud back-up service. They give 5 gigabytes free, so this might be something to look into if you wish to secure your documents under your own lock and key.

Visit Their Site: Here!
Email ThisBlogThis!Share to XShare to Facebook
Posted in malware, security | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Gaming Communities
    Many gamers out there are looking for quality content and are looking to get their name out there. Now what if I said I found a website that...
  • What Is Adware
    Adware one of the most commonly misunderstood form of malware right next to the common virus. The issue with Adware is people try to assume...
  • What Is Quick Scoping
    Many people in call of duty say that they are good at quick scoping, and many people don't know what this is. So in this article I will ...
  • Which Internet Browser Should I Use
    Most people have heard of the big 3 or 5 internet browsers . However many of you don't know of the many other internet browsers out ther...
  • Youtube Monetization Not Available In Your Country
    As we all know today thousands maybe millions of users are not able to monetize their newly submitted videos. Now Google at the time of this...
  • Free Online Classes
    Coursera is a website that offers college classes for free to anyone who knows how to use the internet. They started this website under the ...
  • Tera Sorcerer Skill List
    Before I go into the full skill list let me break down what the sorcerer is. The sorcerer in Tera is a character of mass destruction. They a...
  • Black Ops 2 Review
    Black-ops 2 is another game in the well known Call of Duty series. This game is a lot like all the other games it has multiplayer, and it is...
  • Internet Browser Test Results
    From my last post on this issue someone pointed out that it looked like I was favoring Google Chrome. Now while I like its UI the best it sc...
  • Attention All Bloggers Sociable Ad Ware
    Many bloggers use the app known as sociable which allows people to share their site with a click of a button however from my recent testing ...

Categories

  • 2013
  • 2013 Total Security
  • Android
  • Anti-Virus
  • antivirus
  • Apple
  • Asynchrony
  • Bitdefender
  • Bitdefender Wallet
  • Blackberry
  • Car dealership
  • cloud storage
  • CNET
  • Computer Support
  • computers
  • coupons
  • CX
  • Data loss
  • Direct selling
  • Download
  • Editor's Choice
  • forums
  • free software
  • Gamer
  • gaming
  • general
  • Google
  • HTML
  • internet
  • Internet access
  • ios 6 jailbreak
  • iOS 6.1 Jailbreak Tweaks
  • Jumpshot
  • LeBron James
  • Linux
  • Loader (computing)
  • loading
  • malware
  • malware encyclopedia
  • Miami Heat
  • Microsoft
  • Mobile security
  • Nokia
  • PageSpeed
  • Personal computer
  • Play Station 4
  • Product Reviews
  • Program
  • Programming
  • science
  • Searching
  • security
  • Servers
  • Shareware
  • SONY
  • technology
  • Tesla
  • Tesla Motors
  • top 5 ios
  • top 5 ios 6 cydia tweaks
  • Trade
  • videogames
  • Web page
  • Website
  • White House
  • Windows
  • Windows 8
  • Windows Update
  • worm
  • Xbox
  • Xbox 360
  • Xbox One
  • Yahoo
  • Youtube

Blog Archive

  • ▼  2013 (170)
    • ▼  September (15)
      • CEO Steve Ballmer Goes Out With A Song
      • Youtube Comments Block List
      • Why Are Apple fans So Devoted?
      • Should Blackberry Sell?
      • Microsoft Joins Other Tech Companies With Buybacks
      • Can Creating Your Own Encryption Keys Prevent NSA ...
      • Google To Ditch Cookies For Advertising
      • Microsoft To Buy Nokia's Phone Division
      • Google Street View Car In Three Seperate Accidents
      • Advanced Systemcare 7 Beta
      • Nokia Android Phone Was Real
      • Google Passwords Are Dead
      • Google To Be Sued Over Privacy Issues
      • Microsoft And Google To Sue The NSA
      • Google Watches Employee Snack Habit
    • ►  August (13)
    • ►  July (13)
    • ►  June (16)
    • ►  May (29)
    • ►  April (28)
    • ►  March (30)
    • ►  February (22)
    • ►  January (4)
Powered by Blogger.

About Me

Unknown
View my complete profile