How the NSA spies on us
NSA’s collection of eavesdropping resources enables it to tap global web communication. The instruments for targeted tapping of individual web surfers are even more powerful. There is no useful solution to avoid /protect them against this – except for turning off the PC.
Internet
- Web Communication, Tapping of Internet nodes and submarine cables.
- Router, Routing data traffic to the NSA server through backdoors
- IT company networks, Monitoring transfers between data centres
- Encryption, Creating or using loopholes in crypto-standards
- Contacts, Demanding customer data from providers
- Video chat, Spying out Skype connections
- Web storage, Accessing Cloud contents via secret court orders
Software
- Operating system, Finding unknown loopholes, breaking in through WLAN
- Browser, Installing Trojans via manipulated websites
- Cookies, Requesting and analysing PREF cookies of Google
- Programmes, Making use of exploits, manipulating downloads
Hardware
- BIOS, Spying on all system activities using a rootkit
- Hard disk, Monitoring data transfer of the internal memory
- Monitor, Recording monitor contents
- Webcam, Turning it on and taking a photo of the user
- Keyboard, Recording keyboard movements
- USB port, Spying on data traffic
How well web service providers protect us
The NSA also eavesdrops on IT giants. They fight back with encryption mechanisms and data transfers – between data centres and with the user. Almost everyone can provide optional HTTPS support, but the strict HSTS is offered only by a few. Stronger protection for HTTPS (PFS, STARTTLS) has only just started emerging.
Encryption is becoming a trend
Cryptography is still not a standard but is emerging slowing. The use of encrypted services and anonymisation technologies has shown a steady rise between July and November 2013 alone. However, the majority of surfers are still not interested in encryption.
WEB USERS USE THE FOLLOWING ENCRYPTED SERVICES