The NSA is hinting hard that it has cracked the fiber optic barrier and finds encryption 'no more than speed bump'. As usual, might be true (esp. the parts about tracking phones and tapping undersea fiber), but bring truckload of salt to the party.
A Personal Blog
by Michael Froomkin
Laurie Silvers & Mitchell Rubenstein Distinguished Professor of Law
University of Miami School of Law
My Publications | e-mail
All opinions on this blog are those of the author(s) and not their employer(s) unelss otherwise specified.
Who Reads Discourse.net?
Readers describe themselves.
Please join in.Reader Map
Recent Bluessky Posts- You’d think the fact that Trump has already gotten 3 American soldiers killed with a reckless war of choice would be getting blistering coverage and be pounced on by every Democratic politician in the country When Biden’s Afghan withdrawal saw casualties at Abbey Gate it nearly ended his presidency March 1, 2026 Dan Silverman
- Like Trump promised, I'm so tired of winning. March 1, 2026 Michael Froomkin
- So weird to watch bombings mapped in near-real time. While we sit helpless at home far away. February 28, 2026 Michael Froomkin
- Mood today: www.youtube.com/watch?v=bX7V... February 28, 2026 Michael Froomkin
- Hegseth is wholeheartedly endorsing the core premise of fascism: industry, as part of the private sphere, must be subordinated to the military objectives of the state. February 27, 2026 Corey Rayburn Yung
Recent Comments
- KK Ho on Introduction
- Michael on Robot Law II is Now Available! (In Hardback)
- Mulalira Faisal Umar on Robot Law II is Now Available! (In Hardback)
- Michael on Vince Lago Campaign Has No Shame
- Just me on Vince Lago Campaign Has No Shame
Subscribe to Blog via Email
Join 51 other subscribers
As I read the article, it seems to be saying that the NSA has figured out how to grab data from fiber optic transmissions, but I’m not sure it clearly states that they have figured out how to decode public-key encryption using some other means than brute force; it mentions encryption as a signal that a given message is “interesting” (that is, itthose exchanging the messages have something to hide).
My understanding is that there is still no proof that a person’s private key cannot be derived from the public key, yet there is no known algorithm that can do this (besides brute force, which is effectively forestalled by increasing key length). Perhaps other more knowledgeable readers can comment, but I personally believe this problem to be both formidable and, for the foreseeable future, intractable. Indeed, if it were publicly revealed that a private key could be easily determined from an examination of the public key, it would throw the entire infrastructure of electronic commerce (not to mention international finance) into absolute chaos…
You-all should visit The Pink Bunny of Battle (http://pfaff.tcc.virginia.edu).
The article actually says that when they’ve identified someone who’s sending encrypted mail, and identified him as a target of interest, they can generally find ways to get the data which don’t involve breaking the encryption directly (perhaps along the lines of the remote screen-reading from Cryptonomicon… at any rate, let your imagination run riot).