NSA top-secret catalogue of keys can unlock the world’s security architecture

TECHi's Author Alfie Joshua
Opposing Author Dailydot Read Source Article
Last Updated
TECHi's Take
Alfie Joshua
Alfie Joshua
  • Words 60
  • Estimated Read 1 min

Ever organization, from government agencies to major corporations, rely on security companies to provide them with the security architecture they need to protect their information. However, for years the NSA has been able to slip into the vast majority of these systems and has been able to create a top-secret catalogue os keys can unlock the world’s security architecture.

Dailydot

Dailydot

  • Words 97
  • Estimated Read 1 min
Read Article

Around the world, corporations, nonprofits and government agencies depend on the computer security architecture made by companies like Cisco, Juniper, and Huawei to protect their most valuable secrets. But for years the vast majority of these systems have been compromised. A 2008 document obtained by German newspaper Der Spiegel reveals the National Security Agency has been able to slip into the majority of systems made by the major players in the computer security industry, thanks to an entire catalog of resilient and hard-to-detect backdoors, some of which are capable of burrowing as deep as a computer’s motherboard.

Source

NOTE: TECHi Two-Takes are the stories we have chosen from the web along with a little bit of our opinion in a paragraph. Please check the original story in the Source Button below.

Balanced Perspective

TECHi weighs both sides before reaching a conclusion.

TECHi’s editorial take above outlines the reasoning that supports this position.

More Two Takes from Dailydot

France considers restricting public Wi-Fi and Tor to combat terrorism
France considers restricting public Wi-Fi and Tor to combat terrorism

Often more frightening than terrorist attacks themselves are the asinine laws that politicians will propose in their wake. When the horrors…

China is now arresting hackers at the request of the United States
China is now arresting hackers at the request of the United States

China and the United States reached some important agreements and understandings regarding cybersecurity last month, but a lot of people…

YouTube Live will be taking on Twitch later this year
YouTube Live will be taking on Twitch later this year

There was a time last year when everyone was certain that Google was going to acquire Twitch, the undisputed king…

Apple knew about iCloud’s vulnerabilities well before the attack
Apple knew about iCloud’s vulnerabilities well before the attack

In a recent interview with Charlie Rose on PBS, Apple CEO Tim Cook said that the iCloud breach that leaked…