XKeyscore
Current NSA Capabilities vs. Pre-Snowden
- One side argues the NSA’s collection capability is “greatly degraded”: most traffic is now encrypted, so they can no longer passively read vast amounts of content as they did pre-Snowden.
- Opponents say that while content interception has changed, overall capabilities are still enormous: they can still “push a button” on specific people, and budget, mission, and authorities have not meaningfully shrunk.
Bulk Collection vs. Targeted Access
- There is broad agreement that bulk, full-take content collection from backbone taps is far less useful now because TLS, E2EE, and encrypted metadata (e.g., via big platforms) are widespread.
- Disagreement focuses on whether this is merely an inconvenience or a “massive loss” of a unique ability: keyword search over everyone’s plaintext content to discover new targets.
Encryption, CAs, and Cloudflare/Google
- Several comments emphasize that modern encryption is not “magically broken” by NSA; attacks must target endpoints, keys, or intermediaries.
- Certificate Transparency and key rotation are cited as reasons why large-scale MITM via bogus certificates (including hypothetical Let’s Encrypt compromise) would be noisy and quickly detectable.
- Some speculate that US intermediaries like Cloudflare (terminating a large fraction of TLS) or big providers (Google, Microsoft, Apple) could be compelled or infiltrated, but others stress:
- No known legal mechanism to demand “everything” from such companies.
- Huge political and commercial risk for companies if such cooperation became known.
TAO, Zero-Days, and Circumventing Encryption
- Many note that NSA’s Tailored Access Operations (and similar units) focus on endpoint compromise: zero-days, implants, hardware interception, OS-level backdoors, mobile spyware comparable to Pegasus, etc.
- Consensus: targeted hacking of “almost anyone” is feasible; doing this at Internet scale without detection is not.
Metadata, AI, and “Store Now, Decrypt Later”
- Metadata is repeatedly described as extremely valuable: who talks to whom, when, over what services, patterns of life, even with Tor/VPNs.
- Some argue dragnet metadata plus ML/AI enables target discovery and selection without decrypting everything.
- “Store now, decrypt later” with future quantum attacks is mentioned but treated as speculative; if that happens the whole landscape changes.
Domestic Use, Parallel Construction, and Cases
- A side-thread discusses “parallel construction” in high-profile criminal cases, asserting that intelligence-derived leads are laundered into seemingly ordinary evidence.
- Specific cases are floated, but others find them weak examples or note that DOJ policy on such use is not binding.
Aims and Target Sets
- One perspective: NSA is primarily focused on foreign governments and terrorism, not random domestic users of Signal/Tails.
- Counterpoint: if someone already associated with foreign threats is using such tools (even in the US), they become legitimate targets, and metadata is enough to flag them.
Second Leaker and Shadow Brokers
- Some links argue XKeyscore details did not all come from Snowden and may instead be from a “second source,” possibly the same entity behind the Shadow Brokers leaks.
- Others note this remains conjecture, albeit grounded in overlap of timeframes and internal NSA locations of the leaked materials.
Encryption, Obfuscation, and Net Neutrality
- One branch advocates fully encrypted, obfuscated traffic (no cleartext SNI, app-pinned keys, Telegram/WeChat-style protocols) to frustrate surveillance and traffic discrimination.
- A reply questions the net neutrality angle: hiding your traffic doesn’t stop ISPs from prioritizing traffic they can identify and favor; the effect would matter only if everyone encrypted/obfuscated similarly.
Classification and Wikipedia Editing
- A meta-thread nitpicks Wikipedia’s use of “secret” vs. “classified,” noting that the program is reportedly Top Secret and that technically information, not systems, are classified.
- Attempts to edit the article wording are blocked by automated anti-vandalism, prompting mild frustration.
Storage and Scaling
- Past claims about “20 TB/day” XKeyscore intake are contrasted with modern hardware improvements and massive growth in global data volume.
- Commenters assume NSA can store far more now, but likely faces a worse ratio of storable content to total global traffic, especially with so much of it encrypted.