@srki
Sve si mogao da čuješ i vidiš na Discovery Chanel u jednom dokumentarcu na tu temu(emitovano je cirka pre 2 godine). A što se tiče buđeta NASA-e i NSA podaci su tačni. A evo i potvrde mog komentara:
Citat:
NSA attempting to design crack-proof computer
NSA has exacting requirements for special computer chips. Because of the difficulty of satisfying its needs on the commercial market, and because of the highly classified nature of some of the chips, NSA opened a facility in 1991 to fabricate otherwise unobtainable devices. Applications Specific Integrated Circuits (ASIC) are produced in the Class 10 clean room within this facility. Microchips are manufactured, not only for NSA's supercomputers, but also for systems throughout the Department of Defense and the Intelligence Community.
Citat:
Software emulation firm VMware announced it has teamed up with researchers at the National Security Agency to create a nearly crack-proof computer that can place sensitive data in virtual vaults inside the PC.
The concept, assuming it works, would streamline the methods intelligence agencies use to manage data. At present, the NSA--the military surveillance arm of the United States intelligence community--physically separates networks carrying data of a particular classification. For example, top-secret data might be kept on a different computer than data classified merely as sensitive material. Sometimes, in order for a worker to have access to the information they need, up to six different computers can be on a single desk.
That type of security is called--in typical intelligence community jargon--an "air gap." It works, but its days could be numbered, said Ed Bugnion, founder and manager of research and development for Palo Alto, Calif.-based VMware.
"I believe we have a solution out there that provides security comparable to having multiple computers," he said.
Called "NetTop," VMware's answer would turn each computer into a number of virtual PCs running on a Linux computer that would sit on each worker's desk. The security system would erect supposedly impenetrable, but virtual, walls between public data and more sensitive information on the same computer.
If successful, the project could mean huge cost savings and convenience for the NSA and other security-conscious government agencies by eliminating one or more computers--and a variety of network components--cluttering desktops at the agency.
Saving money through software
Paul Pittelli, director of information assurance research at the NSA, said the move is part of the agency's new emphasis on saving money through the use of commercial software.
"Users in the national security community have an increasing need for commercial off-the-shelf software," he said in a statement. "We currently require them to use different computers for different applications." That, Pittelli said, will stop if efforts like NetTop succeed.
VMware's plan is to use an offshoot of the company's current virtual machine technology that allows Linux users to install and run Windows or any other PC-based operating system on top of Linux.
The reason the company believes it can succeed is because it doesn't emulate the software but the hardware underneath.
"Java needs a proprietary environment to run," said VMware's Bugnion. "We can run arbitrary operating systems within the PC." Last year, the company also released a version of its software that runs on Windows NT and 2000, enabling users to run Linux (or any other operating system) in a virtual machine on top of Windows.
Makes sense
NetTop will run on top of a more secure distribution of Linux that the NSA has developed and an initial version of which it released in December 2000.
While nothing is certain in security, University of New Haven's Professor of Digital Forensics Investigation Fred Cohen said VMware's idea seems to be a good one.
"It makes sense," he said, adding that "the current VMware technology is not up to a level of assurance necessary for this."
To make Linux secure, Cohen said, better handling of various access levels--essentially, the ability to classify data for various secrecy ratings--needs to be added.
But Cohen agreed the decision to run the VMware technology on top of Linux, not Windows, is key to a government agency like the NSA.
In a nod to the open-source community, he said that--for the NSA's purposes--seeing the source code and testing its security is extremely important. "You wouldn't want to do it on Windows NT, because you know nothing about what is going on inside NT," he said.
PGP it is open to middle-man attacks if the public key is provided over the Internet:
Basically, a "middle man" attack can exist for transfer of ANY data over the Internet - including secure communications. The jist of it comes in the form of a "control" computer in-between the two communicating computers. The "control" computer receives data from person A, decrypts it with "their" keys...has a look...re-encrypts it with "their" keys and sends it to person B . Person B of course thinks he/she has the public key of person A but in actual fact person B has the public key of the "control" computer, THUS all encrypted data sent either way can always be decrypted by the control computer...and of course person A thinks he/she has the public key of person B but in actual fact, he/she has the public key of the "control" computer The only way a middle-man attack can work is if it intercepts the transmission of the first keys. This can also easily be done for SSL as well...
You think you are living in a secure environment but in actual fact it can be very insecure
The example I gave for unbreakable encryption is actually called "single pad" - totally different to PGP and is unbreakable (except brute force and even that is impossible is the part of the pad used to encrypt the data is very large (ie key length wise)) as there is no use of key pairs. The only problem is conveniance - you have to get a copy of the "single pad" to the sender and receiver.
A obavezno pročitaj i ovaj tekst
http://jya.com/nsa-sun.htm,
http://home.flash.net/~bob001/echelon.htm,
http://jya.com/nsa-study.htm,
http://www.mail-archive.com/th...thepowerhour.com/msg00171.html
I na samome kraju, pa možda sam ja stvarno ŠPIJUN??????????????????
[Ovu poruku je menjao haarp2 dana 02.09.2004. u 22:14 GMT]