Web Encryption No Match for the NSA

April 21, 2014 - 2 minutes read

NSA RSA Security

Late last year, Reuters reported that the National Security Agency had struck a secret deal with RSA, one of the world’s leading Internet security providers. According to the Reuters report, the National Security Agency inserted a so-called “back door” into the RSA’s encryption system.

This back door compromised the privacy and security of end users, and further allegations claimed that RSA knowingly distributed the unsecure software. It was later revealed that the National Security Agency paid RSA $10 million as part of their clandestine contract.

New information suggests that this was not the end of the National Security Agency’s attempts to compromise RSA software security. Unidentified university researchers came forward with evidence showing that the NSA created a second security loophole, which was distributed through an RSA security add-on kit. This second tool allegedly enabled the National Security Agency to break through RSA’s standard encryptions tens of thousands of times faster than would normally be possible.

RSA claims that the add-on security kit was pulled from the market after approximately six months, and that the second encryption loophole did not affect very many Internet users. However, at a time when new cybersecurity problems seem to be cropping up like weeds, mobile app developers need to be mindful of ways to make their software less prone to misuse.

While it is virtually impossible to make any type of computer software completely impervious to threats, a forward-thinking Atlanta app development company needs to pay close attention to the security concerns of end users. It’s already common knowledge that the National Security Agency is using mobile apps to collect massive amounts of data, and that fact has many people ill at ease.

With the world moving towards intensified digitization and connectedness, what can be done to help the next generation of mobile apps improve security without compromising performance?

Tags: , , , , , , , ,