The entire idea of prism is hitting tier 1 providers and mass communications 
providers. If they haven't rooted your exchange gear, they don't need to - your 
upstream providers entire stream is being copied. I can't think of many 
providers that couldn't be intercepted. When new transportation mediums arrive, 
who cares.. You already have a copy from their provider or peer.


Sent from my Mobile Device.


-------- Original message --------
From: ryang...@gmail.com
Date: 07/12/2013 8:52 PM (GMT-08:00)
To:
Cc: nanog@nanog.org
Subject: Re: Office 365..? how Microsoft handed the NSA access to encrypted 
messages


It wouldn't be. When the endpoint in question is compromised, there isn't any 
amount of tunneling or obscurity between point a and point b that will resolve 
it. Only thing you can do is change to a solution that you have more control 
over.
Sent on the TELUS Mobility network with BlackBerry

-----Original Message-----
From: Warren Bailey <wbai...@satelliteintelligencegroup.com>
Date: Sat, 13 Jul 2013 00:12:37
To: Nick Khamis<sym...@gmail.com>; Justin M. Streiner<strei...@cluebyfour.org>
Reply-To: Warren Bailey <wbai...@satelliteintelligencegroup.com>
Cc: nanog@nanog.org<nanog@nanog.org>
Subject: Re: Office 365..? how Microsoft handed the NSA access to encrypted
 messages

That doesn't sound like it would be effective in this instance?


Sent from my Mobile Device.


-------- Original message --------
From: Nick Khamis <sym...@gmail.com>
Date: 07/12/2013 1:06 PM (GMT-08:00)
To: "Justin M. Streiner" <strei...@cluebyfour.org>
Cc: nanog@nanog.org
Subject: Re: Office 365..? how Microsoft handed the NSA access to encrypted 
messages


We are currently working on something right now where all connections
are doing over an encrypted vpn. We are bringing SIP, email, search,
and cloud to the tunnel.

You can contact me off list if you would like to know more.

Nick Khamis

Reply via email to