Difference between revisions of "CRYPTANALYTICS"

From Buggedplanet.info
Jump to navigationJump to search
Line 8: Line 8:
 
|-
 
|-
 
|20141229||spiegel.de||[http://www.spiegel.de/netzwelt/netzpolitik/snowden-dokumente-nsa-attacken-auf-ssl-vpn-ssh-tor-a-1010553.html NSA-Attacken auf SSL, VPN, SSH, Tor etc.: Das sind die Snowden-Dokumente]||[[NSA]] / [[CRYPTANALYTICS]]
 
|20141229||spiegel.de||[http://www.spiegel.de/netzwelt/netzpolitik/snowden-dokumente-nsa-attacken-auf-ssl-vpn-ssh-tor-a-1010553.html NSA-Attacken auf SSL, VPN, SSH, Tor etc.: Das sind die Snowden-Dokumente]||[[NSA]] / [[CRYPTANALYTICS]]
 +
|-
 +
|20141228||spiegel.de||[http://www.spiegel.de/media/media-35532.pdf GCHQ Document: BULLRUN]||[[GCHQ]] / [[BULLRUN]] / [[CRYPTANALYTICS]]
 
|-
 
|-
 
|20141228||spiegel.de||[http://www.spiegel.de/media/media-35530.pdf NSA Document: User´s Guide for PRISM Skype Collection]||[[NSA]] / [[US-984XN]] / [[S3531]] / [[SKYPE]] / [[CRYPTANALYTICS]]
 
|20141228||spiegel.de||[http://www.spiegel.de/media/media-35530.pdf NSA Document: User´s Guide for PRISM Skype Collection]||[[NSA]] / [[US-984XN]] / [[S3531]] / [[SKYPE]] / [[CRYPTANALYTICS]]

Revision as of 16:51, 30 December 2014

Articles

Date Source Title Tags
20141229 spiegel.de NSA, GCHQ und Co.: Die Unsicherheitsbehörden NSA / GCHQ / CRYPTANALYTICS
20141229 spiegel.de NSA-Attacken auf SSL, VPN, SSH, Tor etc.: Das sind die Snowden-Dokumente NSA / CRYPTANALYTICS
20141228 spiegel.de GCHQ Document: BULLRUN GCHQ / BULLRUN / CRYPTANALYTICS
20141228 spiegel.de NSA Document: User´s Guide for PRISM Skype Collection NSA / US-984XN / S3531 / SKYPE / CRYPTANALYTICS
20141228 spiegel.de NSA Document: LONGHAUL end-to-end attack orchestration and key recovery service NSA / LONGHAUL / CRYPTANALYTICS
20141228 spiegel.de NSA Document: SCARLETFEVER NSA / TURMOIL / WEALTHYCLUSTER / TEe / SCARLETFEVER / SSL/TLS / CRYPTANALYTICS
20141228 spiegel.de NSA Document: VoIP NSA alias NSA / VPN / VOIP / CRYPTANALYTICS
20141228 spiegel.de NSA Document: Net Defense from Encrypted Communications NSA / TURMOIL / BLUESNORT / GALLANTWAVE / XKEYSCORE / LONGHAUL / NETFLOW / FULL SNORT / POPQUIZ / TUTELAGE / CRYPTANALYTICS
20141228 spiegel.de NSA Document: SIGDEV Conference 2012 - (U) Making Things Measureable: Technology trending Challenges and Approaches NSA / CRYPTANALYTICS
20141228 spiegel.de CSEC Document: TLS Trends: A roundatable discussion on current usage and future directions (CSEC Document) CSEC / SSL/TLS / CRYPTANALYTICS
20141228 spiegel.de GCHQ Document: Innov8 Experiment Profile Cryptanalytic Services GCHQ / SSL/TLS / CRYPTANALYTICS
20141228 spiegel.de NSA Document: Secure Sockets Layer (SSL) / Transport Layer Security (TLS) NSA / SCARLETFEVER / SSL/TLS / CRYPTANALYTICS
20141228 spiegel.de GCHQ Document: TLS trends at GCHQ GCHQ / FLYINGPIG / SSL/TLS / CRYPTANALYTICS
20141228 spiegel.de NSA Document: TURMOIL/APEX/APEX High Level Describtion Document NSA / APEX / TURMOIL / FASHIONCLEFT / HAMMERMILL / HAMMERSTEIN / HAMMERCHANT / IPSEC / VPN / VOIP / CRYPTANALYTICS
20141228 spiegel.de NSA Document: Analytic Challenges from Active-Passive Integration NSA / S324 / VPN / CRYPTANALYTICS
20141228 spiegel.de NSA Document: POISENNUT Virtual Private Network Attack Orchestrator (VAO) NSA / WEALTHYCLUSTER / POISENNUT / TURMOIL / VPN / CRYPTANALYTICS
20141228 spiegel.de NSA Document: VPN SigDev Basics NSA / VPN / CRYPTANALYTICS
20141228 spiegel.de GCHQ Document: Profiling SSL and Attributing Private Networks GCHQ / FLYINGPIG / HUSH PUPPY / VPN / CRYPTANALYTICS
20141228 spiegel.de NSA Document: Virtual Private Network Transform Engine Emulator (TEe) NSA / TEe / CRYPTANALYTICS / VPN
20141228 spiegel.de NSA Document: POISENNUT Product NSA / POISENNUT / VPN / CRYPTANALYTICS
20141228 spiegel.de NSA Document: TURMOIL GALLANTWAVE NSA / TURMOIL / GALLANTWAVE / VPN / CRYPTANALYTICS
20141228 spiegel.de NSA Document: TURMOIL VPN PROCESSING NSA / TURMOIL / VPN / CRYPTANALYTICS
20141228 spiegel.de NSA Document: VALIANTSURF Data Network Cipher (DNC) exploitation NSA / VALIANTSURF / VPN / CRYPTANALYTICS
20141228 spiegel.de NSA Document: GALLANTWAVE@scale / GALANTWAVE @volume NSA / GALLANTWAVE / LONGHAUL / VPN / CRYPTANALYTICS
20141228 spiegel.de NSA Document: VALIANTSURF (VS) Capabilities NSA / TURMOIL / VALIANTSURF / CRYPTANALYTICS / VPN
20141228 spiegel.de NSA Document: VS MALIBU IKE and ESP Metadata Flows NSA / MALIBU / TURMOIL / VALIANTSURF / VPN / CRYPTANALYTICS
20141228 spiegel.de NSA Document: SPIN 15 VPN Story NSA / TURMOIL / VPN / CRYPTANALYTICS
20141228 spiegel.de NSA Document: TURMOIL IPSEC VPN Sessionization NSA / TURMOIL / IPSEC / VPN / CRYPTANALYTICS
20141228 spiegel.de NSA Document: Fielded Capability: End-to-End VPN SPIN 9 Design Review NSA / TURBULENCE / TURMOIL / PRESSUREWAVE / TOYGRIPPE / KEYCARD / XKEYSCORE / TUBE / IPSEC / VPN / CRYPTANALYTICS
20141228 spiegel.de NSA Document: Intro to the VPN Exploitation Process NSA / PINWALE / TOYGRIPPE / XKEYSCORE / FOURSCORE / VULCANDEATHGRIP / IPSEC / PPTP / SSL/TLS / VPN / SSH / CRYPTANALYTICS / S31176
20141228 spiegel.de NSA Document: NIRAL EDGE Newsletter September 2008 Editiion NSA / AES / TUNDRA / TAU / CRYPTANALYTICS
20141228 spiegel.de GCHQ Document: Crypt Ops Data Store User Guide GCHQ / CRYPTANALYTICS
20141228 spiegel.de NSA Document: SIGINT Strategy Threads 4 and 7 (from SID Today) NSA / CRYPTANALYTICS
20141228 spiegel.de NSA Document: Classification Guide for Cryptanalysis NSA / CRYPTANALYTICS
201401228 spiegel.de NSA Document: Intercept with PGP encrypted message

NSA / PGP / GPG / CRYPTANALYTICS

20141228 spiegel.de NSA Document: Crypt Discovery Joint Collaboration Activity NSA / GCHQ / CRYPTANALYTICS
20141228 spiegel.de NSA Document: Cryptographic Modernization (CryptoMod) Classification Guide 3-9 NSA / CRYPTANALYTICS
20141228 spiegel.de NSA Document: What Your Mother Never Told You About SIGDEV Analysis NSA / CRYPTANALYTICS
201401228 spiegel.de NSA Document: Internet Anonymity 2011 NSA / CRYPTANALYTICS / TOR / VPN
201401228 spiegel.de NSA Document: A potential technique to deanonymise users of the TOR network NSA / TOR / CRYPTANALYTICS
201401228 spiegel.de NSA Document: Tor Hidden Services - How Hidden is ´Hidden´ ? NSA / TOR / CRYPTANALYTICS
201401228 spiegel.de NSA Document: A potential technique to deanonymise users of the TOR network NSA / TOR / CRYPTANALYTICS
201401228 spiegel.de NSA Document: TOR deanonymisation research (MIP) NSA / TOR / CRYPTANALYTICS
201401228 spiegel.de NSA Document: Tor: Overview of Existing Techniques NSA / TOR / CRYPTANALYTICS
20141229 spiegel.de Snowden-Dokumente: Was die NSA knacken kann - und was nicht NSA / CRYPTANALYTICS
20141228 spiegel.de NSA Documents: Attacks on VPN, SSL, TLS, SSH, Tor NSA / CRYPTANALYTICS
20141228 spiegel.de Prying Eyes: Inside the NSA's War on Internet Security NSA / CRYPTANALYTICS