The NSA is hinting hard that it has cracked the fiber optic barrier and finds encryption 'no more than speed bump'. As usual, might be true (esp. the parts about tracking phones and tapping undersea fiber), but bring truckload of salt to the party.
A Personal Blog
by Michael Froomkin
Laurie Silvers & Mitchell Rubenstein Distinguished Professor of Law
University of Miami School of Law
My Publications | e-mail
All opinions on this blog are those of the author(s) and not their employer(s) unelss otherwise specified.
Who Reads Discourse.net?
Readers describe themselves.
Please join in.Reader Map
Recent Bluessky Posts- Jotwell Jurisprudence: Carlos Bernal, The Object of Legal Interpretation, JOTWELL (May 1, 2026) (reviewing Francisco J. Urbina, The Object of Interpretation, 114 Geo. L.J. __ (forthcoming 2026), available at SSRN (Feb. 11, 2025)), juris.jotwell.com/the-object-o.... May 1, 2026 Jotwell
- Jotwell IP: Lisa Larrimore Ouellette, Clinical Trial Transparency and Patent Prior Art, JOTWELL (Apr 30, 2026) (reviewing Dennis Byrski & Lucy Xiaolu Wang, Marketing Authorization and Strategic Patenting: Evidence from Pharmaceuticals, 247 J. Pub. Econ. 105415 (2025)), ip.jotwell.com/clinical-tri... April 30, 2026 Jotwell
- Had one been elected promising national health that would have been strong evidence of a winning coalition for it. That sort of thing becomes a self-fulfilling prophecy sometimes. Electoral campaigns are not the moment to discuss the nuts and bolts of horse-trading. They're the time to inspire. April 29, 2026 Michael Froomkin
- Emma Cave, Keeping Pace with Technological Advances, JOTWELL (April 29, 2026) (reviewing Neera Bhatia, Technology, Health, and Law in Life and Death Before the Cradle to Beyond the Grave (2025)), health.jotwell.com/keeping-pace.... April 29, 2026 Jotwell
- Seems to me there ought to be a problem if large numbers of women whose married names didn't match their birth names will need to get a passport in order to vote, and that passport will come with a partisan portrait. www.thebulwark.com/p/exclusive-... April 29, 2026 Michael Froomkin
Recent Comments
- KK Ho on Introduction
- Michael on Robot Law II is Now Available! (In Hardback)
- Mulalira Faisal Umar on Robot Law II is Now Available! (In Hardback)
- Michael on Vince Lago Campaign Has No Shame
- Just me on Vince Lago Campaign Has No Shame
Subscribe to Blog via Email
Join 51 other subscribers
As I read the article, it seems to be saying that the NSA has figured out how to grab data from fiber optic transmissions, but I’m not sure it clearly states that they have figured out how to decode public-key encryption using some other means than brute force; it mentions encryption as a signal that a given message is “interesting” (that is, itthose exchanging the messages have something to hide).
My understanding is that there is still no proof that a person’s private key cannot be derived from the public key, yet there is no known algorithm that can do this (besides brute force, which is effectively forestalled by increasing key length). Perhaps other more knowledgeable readers can comment, but I personally believe this problem to be both formidable and, for the foreseeable future, intractable. Indeed, if it were publicly revealed that a private key could be easily determined from an examination of the public key, it would throw the entire infrastructure of electronic commerce (not to mention international finance) into absolute chaos…
You-all should visit The Pink Bunny of Battle (http://pfaff.tcc.virginia.edu).
The article actually says that when they’ve identified someone who’s sending encrypted mail, and identified him as a target of interest, they can generally find ways to get the data which don’t involve breaking the encryption directly (perhaps along the lines of the remote screen-reading from Cryptonomicon… at any rate, let your imagination run riot).