[147970] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: [Cryptography] [RNG] /dev/random initialisation

daemon@ATHENA.MIT.EDU (Jerry Leichter)
Sat Nov 2 19:52:29 2013

X-Original-To: cryptography@metzdowd.com
From: Jerry Leichter <leichter@lrw.com>
In-Reply-To: <5274656B.7020300@echeque.com>
Date: Sat, 2 Nov 2013 15:49:39 -0400
To: jamesd@echeque.com
Cc: cryptography@metzdowd.com
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com

On Nov 1, 2013, at 10:37 PM, James A. Donald wrote:
> I sent a dummy skype text that referenced a secret url on my own website, created for this test and never used before or since.
> 
> Shortly thereafter, got a hit on that url.
That's not the NSA - it's Microsoft.  This pattern has been reported befor; it's the result of Microsoft searching for "evil" URL's (those that have drive-by malware, mainly, though I suppose they look for other stuff, too).

See http://www.tomsguide.com/us/Malware-Spam-Skype-Reading-Messages-URLs,news-17036.html for one discussion.

(That's not to say NSA doesn't *also* do this, though with Microsoft already doing it, they would get more bang for the buck by just getting hold of the Microsoft databases.)
                                                        -- Jerry

_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography

home help back first fref pref prev next nref lref last post