Matches in DBpedia 2016-04 for { <http://dbpedia.org/resource/NOBUS> ?p ?o }
Showing triples 1 to 26 of
26
with 100 triples per page.
- NOBUS abstract "NOBUS, short for \"NObody But US\", are security vulnerabilities which NSA thinks only NSA can exploit. As such, NSA sometimes chooses to leave such vulnerabilities open if NSA finds them, in order to exploit them against NSA's targets. NSA has a dual mission of both attacking foreign systems and defending US systems, so keeping significant vulnerabilities which affect US systems secret is a conflict of interest.You look at a vulnerability through a different lens if even with the vulnerability it requires substantial computational power or substantial other attributes and you have to make the judgment who else can do this? If there's a vulnerability here that weakens encryption but you still need four acres of Cray computers in the basement in order to work it you kind of think \"NOBUS\" and that's a vulnerability we are not ethically or legally compelled to try to patch – it's one that ethically and legally we could try to exploit in order to keep Americans safe from others.NSA is speculated to have used on the order of hundreds of millions of dollars in computing power to break large amounts of encrypted traffic reliant on the Diffie–Hellman key exchange using 1024-bit keys. This vulnerability also affect US traffic, so this would be a good example of Hayden's \"four acres of Cray computers\" definition of NOBUS.The NSA is believed to sometimes buy knowledge about security vulnerabilities on the gray market, from for example Vupen, in order to use them offensively. Christopher Soghoian, Principal Technologist and Senior Policy Analyst at the ACLU's Speech, Privacy and Technology Project, has pointed out that these exploits are not NOBUS, in that anybody else can discover them at any time.The kleptographic backdoor which NSA is widely believed to have inserted into Dual_EC_DRBG is an example of NOBUS, since finding the secret key to that backdoor is a cryptographically hard problem. Though there is at least one example, ScreenOS, where the Dual_EC_DRBG backdoor infrastructure has possibly been used by attackers hostile to the NSA's mission.".
- NOBUS wikiPageID "48918767".
- NOBUS wikiPageLength "3385".
- NOBUS wikiPageOutDegree "9".
- NOBUS wikiPageRevisionID "707757958".
- NOBUS wikiPageWikiLink American_Civil_Liberties_Union.
- NOBUS wikiPageWikiLink Category:National_Security_Agency.
- NOBUS wikiPageWikiLink Cray.
- NOBUS wikiPageWikiLink Diffie–Hellman_key_exchange.
- NOBUS wikiPageWikiLink Dual_EC_DRBG.
- NOBUS wikiPageWikiLink Kleptography.
- NOBUS wikiPageWikiLink ScreenOS.
- NOBUS wikiPageWikiLink Vulnerability_(computing).
- NOBUS wikiPageWikiLink Vupen.
- NOBUS wikiPageWikiLinkText "NOBUS".
- NOBUS wikiPageUsesTemplate Template:Quote.
- NOBUS wikiPageUsesTemplate Template:Reflist.
- NOBUS wikiPageUsesTemplate Template:Whom.
- NOBUS subject Category:National_Security_Agency.
- NOBUS hypernym Vulnerabilities.
- NOBUS comment "NOBUS, short for \"NObody But US\", are security vulnerabilities which NSA thinks only NSA can exploit. As such, NSA sometimes chooses to leave such vulnerabilities open if NSA finds them, in order to exploit them against NSA's targets.".
- NOBUS label "NOBUS".
- NOBUS sameAs Q22907327.
- NOBUS sameAs Q22907327.
- NOBUS wasDerivedFrom NOBUS?oldid=707757958.
- NOBUS isPrimaryTopicOf NOBUS.