Here’s an overview of what we know:
Systems manufactured by United States corporations, or corporations chartered in UK, Canada, NZ, or Australia, or which use components from corporations chartered in those countries, likely have backdoors in them, in the hardware or the software of both. IBM’s Lotus Notes key bits, Windows’ _NSAKEY, etcetera. This means anything manufactured by Google, Motorola, Microsoft, Apple, BlackBerry, etcetcetcetc will have backdoors. The existence of these backdoors makes using an encryption program on these devices and/or operating systems a joke; It doesn’t matter if I use a One-Time-Pad on these platforms, if the decrypted message just gets carbon-copied to the NSA.
This was so incredibly obvious for decades, given the fact that the PotUS couldn’t just use an American-made device straight off-the-shelf.
We know that Wikileaks, having seen the leaked documents, is still confident enough in AES to use it to encrypt three different insurance files.
We know that, over the past decade, multiple side-channel attacks and implementation weaknesses have been discovered in SSL/TLS implementations, and that the crypto negotiated by TLS is almost always a relatively weak RC4 — not using PFS, but a static key —
Which we know is likely to be crack able by the NSA, if they throw sufficient resources at it — dedicated appliances, think BitCoin Mining except designed specifically to attack a known weakness.
—
The NSA is relying on the fact that we are still using the network to exchange keys, to exchange secrets.
Those secrets need to be exchanged in-person, in a way that can’t be eavesdropped, such that it will require them to backdoor into a device to get the key material, or break down doors, or wholesale copy every thumb drive that crosses the border - and they can already legally copy every thumb drive and laptop and iPad and sdcard that crosses the border!
The expense. The expense has to be increased exponentially. There has to be a human being involved, a team of human beings involved, in every intercept. It has to be worth framing a person for kiddie porn or drug distribution just to get access to their keys.
We need Open-Source, open-hardware-design ASICs that do nothing but read in two source bitstreams, XOR them, and spits out one (with the obvious hardware interface layers of Bluetooth, file systems, USB, sdcard, etcetera.).
We need open-hardware ASICs that do nothing but dump true physical-noise-derived random numbers, in a SIM card package or SDCARD or USB or something that can be pulled out, swapped out, upgraded, thrown away when or if it is determined to have an implementation weakness — at a price point that is pennies. We need them on a single-layer process, mounted in a clear epoxy, so they can be put under a microscope and audited physically so we can say “this isn’t counterfeit”.
We don’t have these. Why? Because the US government has stepped on the throats of anyone who started moving in those directions without the NSA’s hand puppetting them.
It’s about time that changed.