The NSA is hinting hard that it has cracked the fiber optic barrier and finds encryption 'no more than speed bump'. As usual, might be true (esp. the parts about tracking phones and tapping undersea fiber), but bring truckload of salt to the party.
A Personal Blog
by Michael Froomkin
Laurie Silvers & Mitchell Rubenstein Distinguished Professor of Law
University of Miami School of Law
My Publications | e-mail
All opinions on this blog are those of the author(s) and not their employer(s) unelss otherwise specified.
Who Reads Discourse.net?
Readers describe themselves.
Please join in.Reader Map
Recent Bluessky Posts- Allow me to predict there's no chance this will happen: "provisional reopening of the Strait of Hormuz—contingent on ... the release of billions of dollars in frozen Iranian assets, and a plan to compensate Iran for damages incurred". So, more war? www.dropsitenews.com/p/exclusive-... May 23, 2026 Michael Froomkin
- History is re-written by the losers. May 23, 2026 Jo Wolff
- Whack-a-mole, or what happens when brownshirts have no fear of courts or consequences. Be sure and read more in the post's comments. May 22, 2026 Michael Froomkin
- Indeed. bsky.app/profile/mora... May 22, 2026 Michael Froomkin
- Democrats say Donald Trump should stop taking bribes, freeing criminals, suppressing clean energy, defunding research, and driving up the cost of living. These Chinese government officials disagree. May 22, 2026 NY Times Pitchbot
Recent Comments
- KK Ho on Introduction
- Michael on Robot Law II is Now Available! (In Hardback)
- Mulalira Faisal Umar on Robot Law II is Now Available! (In Hardback)
- Michael on Vince Lago Campaign Has No Shame
- Just me on Vince Lago Campaign Has No Shame
Subscribe to Blog via Email
Join 51 other subscribers
As I read the article, it seems to be saying that the NSA has figured out how to grab data from fiber optic transmissions, but I’m not sure it clearly states that they have figured out how to decode public-key encryption using some other means than brute force; it mentions encryption as a signal that a given message is “interesting” (that is, itthose exchanging the messages have something to hide).
My understanding is that there is still no proof that a person’s private key cannot be derived from the public key, yet there is no known algorithm that can do this (besides brute force, which is effectively forestalled by increasing key length). Perhaps other more knowledgeable readers can comment, but I personally believe this problem to be both formidable and, for the foreseeable future, intractable. Indeed, if it were publicly revealed that a private key could be easily determined from an examination of the public key, it would throw the entire infrastructure of electronic commerce (not to mention international finance) into absolute chaos…
You-all should visit The Pink Bunny of Battle (http://pfaff.tcc.virginia.edu).
The article actually says that when they’ve identified someone who’s sending encrypted mail, and identified him as a target of interest, they can generally find ways to get the data which don’t involve breaking the encryption directly (perhaps along the lines of the remote screen-reading from Cryptonomicon… at any rate, let your imagination run riot).