Has the NSA Been Using the Heartbleed Bug as an Internet Peephole?
When ex-government contractor Edward Snowden exposed the NSAs widespread efforts to eavesdrop on the internet, encryption was the one thing that gave us comfort. Even Snowden touted encryption as a saving grace in the face of the spy agencys snooping. Encryption works, the whistleblower said last June. Properly implemented strong crypto systems are one of the few things that you can rely on.
But Snowden also warned that crypto systems arent always properly implemented. Unfortunately, he said, endpoint security is so terrifically weak that NSA can frequently find ways around it.
This week, that caveat hit home in a big way when researchers revealed Heartbleed, a two-year-old security hole involving the OpenSSL software many websites use to encrypt traffic. The vulnerability doesnt lie in the encryption itself, but in how the encrypted connection between a website and your computer is handled. On a scale of one to ten, cryptographer Bruce Schneier ranks the flaw an eleven.
Though security vulnerabilities come and go, this one is deemed catastrophic because its at the core of SSL, the encryption protocol so many have trusted to protect their data. It really is the worst and most widespread vulnerability in SSL that has come out, says Matt Blaze, cryptographer and computer security professor at the University of Pennsylvania. But the bug is also unusually worrisome because it could possibly be used by hackers to steal your usernames and passwords for sensitive services like banking, ecommerce, and web-based email and by spy agencies to steal the private keys that vulnerable web sites use to encrypt your traffic to them.
more
http://www.wired.com/2014/04/nsa-heartbleed/