Two cryptographers warned that commercial encryption likely includes backdoors for the NSA; one expert warned that Microsoft is the most likely suspect in weakening encryption systems. For the past decade, the NSA has been busy thwarting encryption that millions of netizens count on to guard the privacy of their electronic communications. Based on NSA documents from whistleblower Edward Snowden, the New York Times, The Guardian and ProPublica published details of how the NSA has cracked, circumvented, or formed covert partnerships with software and hardware vendors to have backdoors built into their products.After reading “hundreds of top-secret NSA documents,” cryptographer Bruce Schneier gave five pieces of advice on how to best keep your electronic communication secure against the NSA. One of the most alarming revelations is that he felt the need to buy a new computer that “has never been connected to the internet” to use as an air gap. To transfer a file from his secure PC and his internet computer, he uses a USB stick.You should still encrypt, even Snowden said it works before he added, “Properly implemented strong crypto systems are one of the few things that you can rely on.”Schneier agreed but also warned us to “be suspicious of commercial encryption software, especially from large vendors. My guess is that most encryption products from large US companies have NSA-friendly back doors, and many foreign ones probably do as well.” Meanwhile, cryptographer Matthew Green suggested the commercial encryption code that we should be most concerned about being weakened belongs to Microsoft. “If we’re talking about commercial encryption code, the lion’s share of it uses one of a small number of libraries. The most common of these are probably the Microsoft CryptoAPI (and Microsoft SChannel) along with the OpenSSL library.” Green added:Of the libraries above, Microsoft is probably due for the most scrutiny. While Microsoft employs good (and paranoid!) people to vet their algorithms, their ecosystem is obviously deeply closed-source. You can view Microsoft’s code (if you sign enough licensing agreements) but you’ll never build it yourself. Moreover they have the market share. If any commercial vendor is weakening encryption systems, Microsoft is probably the most likely suspect.forty percent of the SSL servers! Moreover, even third-party encryption programs running on Windows often depend on CAPI components, including the random number generator. That makes these programs somewhat dependent on Microsoft’s honesty. And this is a problem because Microsoft IIS powers around 20% of the web servers on the Internet — and nearly The Guardian previously reported that the NSA worked with Microsoft to allow the interception of users’ private communications. The NSA obtained “pre-encryption access to Microsoft’s most popular services, including Outlook e-mail, Skype Internet phone calls and chats, and SkyDrive, the company’s cloud storage service,” added the New York Times. “Microsoft asserted that it had merely complied with ‘lawful demands’ of the government, and in some cases, the collaboration was clearly coerced. Some companies have been asked to hand the government the encryption keys to all customer communications, according to people familiar with the government’s requests.” In a different article, “The US government has betrayed the internet,” Schneier wrote:By subverting the internet at every level to make it a vast, multi-layered and robust surveillance platform, the NSA has undermined a fundamental social contract. The companies that build and manage our internet infrastructure, the companies that create and sell us our hardware and software, or the companies that host our data: we can no longer trust them to be ethical internet stewards.He said we need to take the internet back and called for engineers with insider knowledge to turn into whistleblowers. If you know about the NSA subverting products or protocols, Schneier asks you to come forward and tell the truth about such unethical activity. He has heard from five people, but he needs to hear from 50. “There’s safety in numbers, and this form of civil disobedience is the moral thing to do.”Schneier also calls on people to innovate, “to re-engineer the internet to prevent wholesale spying,” and to “make surveillance expensive again.” In closing, he added, “To the engineers, I say this: we built the internet, and some of us have helped to subvert it. Now, those of us who love liberty have to fix it.”Image credit: TechFlash Todd via ResourceSpaceLike this? Here’s more posts:4 billion call records added daily to AT&T database for DEA phone surveillanceBlack Hat: Smart TVs are the ‘perfect target’ for spying on youSchool starts mass social media surveillance of students for their ‘safety’Privacy & security nightmares: Hacking smart toilets, smart toys, smart homesResearchers develop attack framework for cracking Windows 8 picture passwordsCareful Windows Phone 8 users, connect to rogue Wi-Fi & hackers can steal passwordsUK govt leak police destroyed Guardian hard drives to stop secret surveillance storiesIs having your photo featured on Bing homepage enough reason to give up your rights?Not cyber myths: Hacking oil rigs, water plants, industrial infrastructureCautionary tales: Teen beauty queen and baby spied on via hacked camerasMicrosoft Research: Secret tags in 3D-printed objects, hooked to the Internet of ThingsBlack Hat: It’s not ‘tricky’ for hackers to turn your phone into a SpyPhoneImplanted RFID chips to implanted invisible headphones: Modded bodies and privacyFollow me on Twitter @PrivacyFanatic Related content news Dow Jones watchlist of high-risk businesses, people found on unsecured database A Dow Jones watchlist of 2.4 million at-risk businesses, politicians, and individuals was left unprotected on public cloud server. By Ms. Smith Feb 28, 2019 4 mins Data Breach Hacking Security news Ransomware attacks hit Florida ISP, Australian cardiology group Ransomware attacks might be on the decline, but that doesn't mean we don't have new victims. A Florida ISP and an Australian cardiology group were hit recently. By Ms. Smith Feb 27, 2019 4 mins Ransomware Security news Bare-metal cloud servers vulnerable to Cloudborne flaw Researchers warn that firmware backdoors planted on bare-metal cloud servers could later be exploited to brick a different customer’s server, to steal their data, or for ransomware attacks. By Ms. Smith Feb 26, 2019 3 mins Cloud Computing Security news Meet the man-in-the-room attack: Hackers can invisibly eavesdrop on Bigscreen VR users Flaws in Bigscreen could allow 'invisible Peeping Tom' hackers to eavesdrop on Bigscreen VR users, to discreetly deliver malware payloads, to completely control victims' computers and even to start a worm infection spreading through VR By Ms. Smith Feb 21, 2019 4 mins Hacking Vulnerabilities Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe