Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

It started being enforced only after major USA ISPs started injecting malware into every HTTP page. If it was a theoretical concern I might agree with you, but in reality, it actually happened which overrules any theoretical arguments. Also, PRISM.




> Also, PRISM.

PRISM works fine to recover HTTPS-protected communications. If anything NSA would be happier if every site they could use PRISM on used HTTPS, that's simply in keeping with NOBUS principles.


> PRISM works fine to recover HTTPS-protected communications

Source:


https://en.wikipedia.org/wiki/PRISM

They collect it straight from the company after it's already been transmitted. It's not a wiretap, it's more akin to an automated subpoena enforcement.


They also do wiretaps, and the exact name of the program is not relevant.

Oh it’s way more pervasive.

That’s just what the public knows. It goes far beyond that.

Most of the good projects in DoD space have Star Wars names. BESPIN, JEDI, etc. PRISM is a mechanism, one aspect of a much larger machine.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: