Feeds

Scariest NSA revelation yet: Spooks are RUBBISH at CIPHERS

'Encrypted' Tweet takes world+dog a moment or two to solve

Remote control for virtualized desktops

The NSA (yes, that NSA) has triggered a bit of a Tweet-storm, followed by helpless fits of giggles among geeks, by posting a job-ad-Tweet that used a simple Roman-style substitution cipher.

tpfccdlfdtte pcaccplircdt dklpcfrp?qeiq lhpqlipqeodf gpwafopwprti izxndkiqpkii krirrifcapnc dxkdciqcafmd vkfpcadf. #MissionMonday #NSA #news

— NSA (@NSACareers) May 5, 2014

The Tweet creeped out some people, but has since been revealed as the first of what the agency says will be an ongoing recruitment campaign seeking “the best and brightest” – and this is where the fits of giggles start.

As noted by the Washington Post, the message uses a simple substitution cipher to obfuscate a fairly prosaic message: “want to know what it takes to work at nsa? check back each monday as we explore careers essential to protecting your nation.”

Not only is the code simple, the ciphertext contains very obvious clues. That there's just one question mark in the text suggests strongly there's an actual question in the text, along the way making rather a mess of the format of using 12 characters in each block of text and hinting strongly that the spaces are meaningless.

El Reg will allow this much: while this cipher is lame, a bright spark in the agency's social media team could have a longer-term plan to generate ongoing interest in the game, by using a more modern and sophisticated cipher on each round.

If the NSA follows history, we guess next Monday's challenge will be a polyalphabetic cipher. ®

Secure remote control for conventional and virtual desktops

Whitepapers

Seattle children’s accelerates Citrix login times by 500% with cross-tier insight
Seattle Children’s is a leading research hospital with a large and growing Citrix XenDesktop deployment. See how they used ExtraHop to accelerate launch times.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.