{"id":16407,"date":"2013-07-25T12:37:55","date_gmt":"2013-07-25T19:37:55","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=16407"},"modified":"2013-08-16T13:15:08","modified_gmt":"2013-08-16T20:15:08","slug":"feds-request-encryption-keys-from-web-firms-now-what","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/feds-request-encryption-keys-from-web-firms-now-what\/","title":{"rendered":"Feds Request Encryption Keys from Web Firms &#8211; Now What?"},"content":{"rendered":"<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/07\/FedsRequestKeys.jpg\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-16413\" alt=\"SONY DSC\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/07\/FedsRequestKeys.jpg\" width=\"500\" height=\"335\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/07\/FedsRequestKeys.jpg 500w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/07\/FedsRequestKeys-150x100.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/07\/FedsRequestKeys-300x201.jpg 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/a><\/p>\n<p>The <a href=\"https:\/\/www.intego.com\/mac-security-blog\/top-5-ineffective-ways-to-protect-yourself-from-government-surveillance\/\" target=\"_blank\">NSA saga<\/a> continues!\u00a0In this chapter, we find that the\u00a0<a href=\"http:\/\/news.cnet.com\/8301-13578_3-57595202-38\/feds-put-heat-on-web-firms-for-master-encryption-keys\/\" target=\"_blank\">Feds are requesting SSL master-keys<\/a>\u00a0from Internet companies, in order to decrypt Web traffic in transit. On one level, this is rather worrying, because it means the NSA is looking to further increase their ability to go digging around in people\u2019s digital drawers. But is it really as bad as it might initially appear?<\/p>\n<p>Many commenters have said that the current methods of surveillance are most effective against only the daftest of criminals. Any criminal worth their salt knows how to evade all but the most targeted surveillance. The recent government attempts to increase the breadth of tracking won\u2019t really force them to get any sneakier.<\/p>\n<p>At the moment, it looks as if most of the Internet companies that were contacted have denied the Feds request, and will fight back against any attempt to force the issue. But if you\u2019d rather not wait to see how this pans out, there is a simple way to get around the SSL issue: <b>Encrypt your files and text before transmission. <\/b><\/p>\n<p>It\u2019s a universal security truism that you can\u2019t be 100% protected against someone sufficiently determined to breach your defenses. So on-disk encryption is not necessarily going to protect you if you\u2019re <a href=\"http:\/\/www.theverge.com\/2013\/5\/16\/4336994\/metadata-matters-how-phone-records-and-obsolete-laws-harm-privacy\" target=\"_blank\">specifically targeted<\/a>, but it should keep out the broad surveillance efforts that have been in the news lately. There are a number of ways and <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-use-apples-built-in-features-to-encrypt-files-and-folders\/\" target=\"_blank\">tools to help you<\/a> do this, which we will explore in more depth in future posts.<\/p>\n<p>What are your favorite encryption tools? Do you prefer to encrypt files individually, in specific folders or small disk images? Or do you just encrypt your whole drive?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The NSA saga continues!\u00a0In this chapter, we find that the\u00a0Feds are requesting SSL master-keys\u00a0from Internet companies, in order to decrypt Web traffic in transit. On one level, this is rather worrying, because it means the NSA is looking to further increase their ability to go digging around in people\u2019s digital drawers. But is it really [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":16417,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13],"tags":[555,553,61,453,557],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"The NSA saga continues!\u00a0In this chapter, we find that the\u00a0Feds are requesting SSL master-keys\u00a0from Internet companies, in order to decrypt Web traffic in\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/feds-request-encryption-keys-from-web-firms-now-what\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Feds Request Encryption Keys from Web Firms - Now What? - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"The NSA saga continues!\u00a0In this chapter, we find that the\u00a0Feds are requesting SSL master-keys\u00a0from Internet companies, in order to decrypt Web traffic in\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/feds-request-encryption-keys-from-web-firms-now-what\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2013-07-25T19:37:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2013-08-16T20:15:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/07\/FedsRequestKeysFT.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"268\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lysa Myers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/feds-request-encryption-keys-from-web-firms-now-what\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/07\/FedsRequestKeysFT.jpeg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/07\/FedsRequestKeysFT.jpeg\",\"width\":400,\"height\":268},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/feds-request-encryption-keys-from-web-firms-now-what\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/feds-request-encryption-keys-from-web-firms-now-what\/\",\"name\":\"Feds Request Encryption Keys from Web Firms - Now What? - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/feds-request-encryption-keys-from-web-firms-now-what\/#primaryimage\"},\"datePublished\":\"2013-07-25T19:37:55+00:00\",\"dateModified\":\"2013-08-16T20:15:08+00:00\",\"description\":\"The NSA saga continues!\\u00a0In this chapter, we find that the\\u00a0Feds are requesting SSL master-keys\\u00a0from Internet companies, in order to decrypt Web traffic in\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/feds-request-encryption-keys-from-web-firms-now-what\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/feds-request-encryption-keys-from-web-firms-now-what\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/feds-request-encryption-keys-from-web-firms-now-what\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Feds Request Encryption Keys from Web Firms &#8211; Now What?\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/feds-request-encryption-keys-from-web-firms-now-what\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/feds-request-encryption-keys-from-web-firms-now-what\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\"},\"headline\":\"Feds Request Encryption Keys from Web Firms &#8211; Now What?\",\"datePublished\":\"2013-07-25T19:37:55+00:00\",\"dateModified\":\"2013-08-16T20:15:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/feds-request-encryption-keys-from-web-firms-now-what\/#webpage\"},\"wordCount\":293,\"commentCount\":2,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/feds-request-encryption-keys-from-web-firms-now-what\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/07\/FedsRequestKeysFT.jpeg\",\"keywords\":[\"encryption keys\",\"Feds\",\"Government Surveillance\",\"NSA\",\"web firms\"],\"articleSection\":[\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/feds-request-encryption-keys-from-web-firms-now-what\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\",\"name\":\"Lysa Myers\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"caption\":\"Lysa Myers\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"The NSA saga continues!\u00a0In this chapter, we find that the\u00a0Feds are requesting SSL master-keys\u00a0from Internet companies, in order to decrypt Web traffic in","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/feds-request-encryption-keys-from-web-firms-now-what\/","og_locale":"en_US","og_type":"article","og_title":"Feds Request Encryption Keys from Web Firms - Now What? - The Mac Security Blog","og_description":"The NSA saga continues!\u00a0In this chapter, we find that the\u00a0Feds are requesting SSL master-keys\u00a0from Internet companies, in order to decrypt Web traffic in","og_url":"https:\/\/www.intego.com\/mac-security-blog\/feds-request-encryption-keys-from-web-firms-now-what\/","og_site_name":"The Mac Security Blog","article_published_time":"2013-07-25T19:37:55+00:00","article_modified_time":"2013-08-16T20:15:08+00:00","og_image":[{"width":400,"height":268,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/07\/FedsRequestKeysFT.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Lysa Myers","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/feds-request-encryption-keys-from-web-firms-now-what\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/07\/FedsRequestKeysFT.jpeg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/07\/FedsRequestKeysFT.jpeg","width":400,"height":268},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/feds-request-encryption-keys-from-web-firms-now-what\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/feds-request-encryption-keys-from-web-firms-now-what\/","name":"Feds Request Encryption Keys from Web Firms - Now What? - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/feds-request-encryption-keys-from-web-firms-now-what\/#primaryimage"},"datePublished":"2013-07-25T19:37:55+00:00","dateModified":"2013-08-16T20:15:08+00:00","description":"The NSA saga continues!\u00a0In this chapter, we find that the\u00a0Feds are requesting SSL master-keys\u00a0from Internet companies, in order to decrypt Web traffic in","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/feds-request-encryption-keys-from-web-firms-now-what\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/feds-request-encryption-keys-from-web-firms-now-what\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/feds-request-encryption-keys-from-web-firms-now-what\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Feds Request Encryption Keys from Web Firms &#8211; Now What?"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/feds-request-encryption-keys-from-web-firms-now-what\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/feds-request-encryption-keys-from-web-firms-now-what\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a"},"headline":"Feds Request Encryption Keys from Web Firms &#8211; Now What?","datePublished":"2013-07-25T19:37:55+00:00","dateModified":"2013-08-16T20:15:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/feds-request-encryption-keys-from-web-firms-now-what\/#webpage"},"wordCount":293,"commentCount":2,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/feds-request-encryption-keys-from-web-firms-now-what\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/07\/FedsRequestKeysFT.jpeg","keywords":["encryption keys","Feds","Government Surveillance","NSA","web firms"],"articleSection":["Security &amp; Privacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/feds-request-encryption-keys-from-web-firms-now-what\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a","name":"Lysa Myers","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","caption":"Lysa Myers"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/07\/FedsRequestKeysFT.jpeg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-4gD","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/16407"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=16407"}],"version-history":[{"count":14,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/16407\/revisions"}],"predecessor-version":[{"id":16437,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/16407\/revisions\/16437"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/16417"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=16407"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=16407"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=16407"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}