By now much of the U.S. reading and tweeting public is familiar with PRISM, the program (formerly known as top-secret) through which the Maryland-based National Security Agency collects file transfers, live chats and the contents of people’s e-mails by directly accessing the servers of such companies as Google, Facebook, Apple, Skype and more.
Such companies were quick to disassociate themselves with PRISM, claiming they had never heard of the program. But what’s the impact of PRISM?
As of right now, there is none, says Matthew Green, encryption expert and associate professor in Johns Hopkins University‘s Department of Computer Science and the Information Security Institute. But that doesn’t mean there isn’t cause for concern.
He explains in this Q&A:
Right now the real concern comes from a set of related measures that we refer to as CALEA II. This refers to a set of proposals designed to address the “problem” of end-to-end encrypted communications, possibly by adding “backdoors” to voice and IM software with this capability.
We learned from the PRISM slide deck that some services (like Skype and PalTalk) already have some kind of wiretap capability. There seems to be a movement in Washington to mandate such eavesdropping backdoors on all software, even possibly in open source software. This would obviously extend the eavesdropping capabilities in PRISM and would make it very difficult to hide from government eavesdropping.
Before you go...
To keep our site paywall-free, we’re launching a campaign to raise $25,000 by the end of the year. We believe information about entrepreneurs and tech should be accessible to everyone and your support helps make that happen, because journalism costs money.
Can we count on you? Your contribution to the Technical.ly Journalism Fund is tax-deductible.
Join our growing Slack community
Join 5,000 tech professionals and entrepreneurs in our community Slack today!