Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Why bother asking DDG itself when traffic can be intercepted and logged at their ISP?


That's why you should https everywhere.

https://www.eff.org/https-everywhere


IIRC HTTPS would encrypt your data from your ISP.


Until PRISM subpoenas DDG and gets their private keys -- after which they can decrypt the SSL traffic.


Not necessarily possible even with the private keys. If you use an SSL cipher with ephemeral keys, such as the DHE_* or ECDHE_* family of ciphers, then an eavesdropper with a recorded but not MITMed conversation cannot decrypt it even with the server's private SSL key.

See http://vincent.bernat.im/en/blog/2011-ssl-perfect-forward-se... for example.


Which of course they do not. Google uses ECDHE_RSA. DDG uses RSA. ixquick, "the world's most private search engine", uses RSA. Bing does not even offer https.


Google does pin their keys in Chrome though, so they know if there is a MITM (and they have, Chrome's certificate pinning led to DigiNotar's downfall). It's a non-scalable hack, but definitely a good one for the largest search engine and a leading email provider to be able to provide.


What's preventing the government from coercing DDG to start log collections at their end, and then sealing it with a gag order?


Your ISP probably has these installed on every one of their racks:

http://www.wired.com/threatlevel/2010/03/packet-forensics/




Consider applying for YC's Winter 2026 batch! Applications are open till Nov 10

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: