NSA spied through Angry Birds, other apps: report (2014)

Alleged NSA–Rovio Arrangement

  • One commenter recounts bar talk from a Rovio employee claiming NSA paid ~$10M to keep inter‑server Riak traffic unencrypted so it could be tapped off AWS fiber.
  • Others question credibility: could have been a joke, or really about ad networks or US-based analytics whose data NSA harvested indirectly.
  • Some note it would fit “business as usual”: buying access, working through US ad-tech and cloud providers, and exploiting plaintext metadata.
  • Comparison is made to a documented $10M NSA deal with a US crypto vendor, suggesting such sums are plausible for weakening security.
  • Regulatory interference is mentioned: an ISP engineer says routers could encrypt peering/customer links, but a government regulator blocked enabling it.

Strength of Modern Encryption vs Practical Attacks

  • Multiple comments emphasize that brute-forcing AES‑256 is physically impossible with any realistic energy or time budget (“boil the oceans”–style calculations).
  • Corrections refine the math (average of 2^255 trials, energy per AES block, AES‑128 vs AES‑256), but all agree brute force is infeasible.
  • Others stress the big caveat: this assumes no structural weakness is found and implementations/randomness are sound; history shows real systems often fail there.
  • DES history is cited: NSA strengthened it against differential cryptanalysis but forced a short key, making brute force tractable.
  • Discussion of covert entropy reduction and hardware backdoors (e.g., management engines, RNG bias, microcode) underlines that math can be perfect while implementations are subverted.
  • Several argue it’s cheaper and strategically safer for NSA to buy backdoors or induce bad practices than to reveal any truly spectacular cryptanalytic capability; parallel construction is mentioned as a way to hide sources.

Mass Surveillance, “Old News,” and Definitions

  • Some dismiss the article as old news about “who uses this app,” not mic/camera spying.
  • Others push back: why collect it at all, and on what constitutional basis?
  • NSA denials are called word games around “collection”: large-scale ingestion can be deemed not “collected” until selected for analysis, sidestepping formal limits.
  • Commenters distinguish ad-tech’s pervasive but commercial surveillance from state surveillance that can feed arrests, deportations, and long-term sabotage of security.

Ad-Tech, Analytics, and Data Flows

  • Multiple comments note it’s often easier to get data from third-party analytics and ad SDKs than from each app vendor.
  • Angry Birds is framed as an example: heavy use of US ad networks, AWS, and plentiful plaintext metadata pre‑“TLS everywhere.”
  • One participant tracks SDK usage across apps and argues that most include multiple trackers; proposes more self-hosted analytics and open tools so game/app data stays on first-party servers.

TikTok, Foreign Platforms, and Free Speech

  • The thread broadens into why states block foreign platforms (China blocking US tech; arguments that US “should” block TikTok).
  • One side sees banning a single foreign app as mainly a security/ownership issue; anything said there could be said on other platforms.
  • Others frame it as a speech issue: government selectively banning a major distribution channel (especially one that surfaced pro‑Palestine content more than US platforms) effectively shapes which viewpoints can reach mass audiences.
  • There’s debate over whether the TikTok ban is driven by security (Chinese espionage) or by political fear of a hostile, hard‑to‑pressure recommender system; some suggest “free speech” arguments are mostly PR cover.