(Credit: Photo illustration by James Martin/CNET)

The U.S. government has demanded that major Internet companies divulge users' stored passwords, according to two industry sources familiar with these orders, which represent an escalation in surveillance techniques that has not previously been disclosed.

If the government is able to determine a person's password, which is typically stored in encrypted form, the credential could be used to log in to an account to peruse confidential correspondence or even impersonate the user. Obtaining it also would aid in deciphering encrypted devices in situations where passwords are reused.

"I've certainly seen them ask for passwords," said one Internet industry source who spoke on condition of anonymity. "We push back."

A second person who has worked at a large Silicon Valley company confirmed that it received legal requests from the federal government for stored passwords. Companies "really heavily scrutinize" these requests, the person said. "There's a lot of 'over my dead body.'"

Some of the government orders demand not only a user's password but also the encryption algorithm and the so-called salt, according to a person familiar with the requests. A salt is a random string of letters or numbers used to make it more difficult to reverse the encryption process and determine the original password. Other orders demand the secret question codes often associated with user accounts.

"This is one of those unanswered legal questions: Is there any circumstance under which they could get password information?"
--Jennifer Granick, Stanford University

A Microsoft spokesperson would not say whether the company has received such requests from the government. But when asked whether Microsoft would divulge passwords, salts, or algorithms, the spokesperson replied: "No, we don't, and we can't see a circumstance in which we would provide it."

Google also declined to disclose whether it had received requests for those types of data. But a spokesperson said the company has "never" turned over a user's encrypted password, and that it has a legal team that frequently pushes back against requests that are fishing expeditions or are otherwise problematic. "We take the privacy and security of our users very seriously," the spokesperson said.

A Yahoo spokeswoman would not say whether the company had received such requests. The spokeswoman said: "If we receive a request from law enforcement for a user's password, we deny such requests on the grounds that they would allow overly broad access to our users' private information. If we are required to provide information, we do so only in the strictest interpretation of what is required by law."

Apple, Facebook, AOL, Verizon, AT&T, Time Warner Cable, and Comcast did not respond to queries about whether they have received requests for users' passwords and how they would respond to them.

Richard Lovejoy, a director of the Opera Software subsidiary that operates FastMail, said he doesn't recall receiving any such requests but that the company still has a relatively small number of users compared with its larger rivals. Because of that, he said, "we don't get a high volume" of U.S. government demands.

The FBI declined to comment.

Some details remain unclear, including when the requests began and whether the government demands are always targeted at individuals or seek entire password database dumps. The Patriot Act has been used to demand entire database dumps of phone call logs, and critics have suggested its use is broader. "The authority of the government is essentially limitless" under that law, Sen. Ron Wyden, an Oregon Democrat who serves on the Senate Intelligence committee, said at a Washington event this week.

Large Internet companies have resisted the government's requests by arguing that "you don't have the right to operate the account as a person," according to a person familiar with the issue. "I don't know what happens when the government goes to smaller providers and demands user passwords," the person said.

An attorney who represents Internet companies said he has not fielded government password requests, but "we've certainly had reset requests -- if you have the device in your possession, than a password reset is the easier way."

Source code to a C implementation of bcrypt, a popular algorithm used for password hashing.

Source code to a C implementation of bcrypt, a popular algorithm used for password hashing.

(Credit: Photo by Declan McCullagh)

Cracking the codes
Even if the National Security Agency or the FBI successfully obtains an encrypted password, salt, and details about the algorithm used, unearthing a user's original password is hardly guaranteed. The odds of success depend in large part on two factors: the type of algorithm and the complexity of the password.

Algorithms, known as hash functions, that are viewed as suitable for scrambling stored passwords are designed to be difficult to reverse. One popular hash function called MD5, for instance, transforms the phrase "National Security Agency" into this string of seemingly random characters: 84bd1c27b26f7be85b2742817bb8d43b. Computer scientists believe that, if a hash function is well-designed, the original phrase cannot be derived from the output.

But modern computers, especially ones equipped with high-performance video cards, can test passwords scrambled with MD5 and other well-known hash algorithms at the rate of billions a second. One system using 25 Radeon-powered GPUs that was demonstrated at a conference last December tested 348 billion hashes per second, meaning it would crack a 14-character Windows XP password in six minutes.

SOURCE HERE

Views: 49

Reply to This

Replies to This Discussion

best thing to do in this situation is change it.....on a regular basis, I'd say @ least once a week

RSS

"Destroying the New World Order"

TOP CONTENT THIS WEEK

THANK YOU FOR SUPPORTING THE SITE!

mobile page

12160.info/m

12160 Administrators

 

Latest Activity

Sandy posted a photo
4 hours ago
Less Prone posted a video

President Trump addresses U.N. General Assembly - FULL SPEECH

President Donald Trump speaks at the United Nations General Assembly in New York City.Full video here: https://www.c-span.org/event/white-house-event/preside...
6 hours ago
Burbia posted a video

2 MIN AGO: Western Provinces MAJOR New WEXIT Announcement - Canada EXPLODES!

In a stunning turn of events, Western provinces just made a major new WEXIT announcement — and it’s shaking the foundations of Canadian unity. Is Western sep...
14 hours ago
Doc Vega posted a blog post

How You Provoke a Civil War

In the world of counter intelligence which is simply one aspect of many pertaining to asymmetrical…See More
yesterday
Burbia commented on Burbia's video
Thumbnail

CHARLIE KIRK WAS CNP! JOSH REEVES 9-11-25

"I don't follow as much with Josh Reeves than I use to. He seems to be a documentary producing…"
Friday
Burbia posted a video

CHARLIE KIRK WAS CNP! JOSH REEVES 9-11-25

DONATE-paypal-dayglow76@yahoo.comCashapp-reevesradioVenmo-Josh-Reeves-61FILMS AND AUDIOBOOKS DOWNLOAD STORE-https://store.payloadz.com/results/242828-josh-re...
Friday
Doc Vega posted blog posts
Thursday
tjdavis posted a video

CHARLIE KIRK VIDEO THAT KEEPS GETTING REMOVED OFF OF SEVERAL PLATFORMS

I had not planned to share this publicly, but I believe Advar, who spoke with Charlie Kirk while I was very ill, would have wanted me to. After my interview ...
Thursday
pohonemas33 team commented on Chris of the family Masters's photo
Thumbnail

Gold-Coast-Message

"untuk bermain slot, kamu cukup kunjungi situs kacang99 pasti langsung gacor"
Wednesday
Doc Vega posted blog posts
Wednesday
Burbia posted a blog post

Former President Trump?

When was this article written? It is attributed to Victor Davis Hanson. He is a Fellow at Hoover…See More
Tuesday
Doc Vega posted a blog post

Don’t Go Hunting For Bigfoot

It is October 19, 2019 at 5:46 AM. This will be the last time any visual evidence of Mark is seen…See More
Monday
tjdavis posted a video

Most Corrupt Series: Elizabeth Warren | Forgotten History

Elizabeth Warren has built her reputation as a "reformer", but her political career has also drawn sharp criticism. Questions have been raised about her fina...
Sep 19
Doc Vega commented on Doc Vega's blog post Ashrams and Moonies Perfect Case for Mind Control
"less prone, Thanks for your support Buddy! "
Sep 18
Doc Vega posted a photo

main-thumb-ti-6724328-100-cnsgqkrgkrhyeyyerazynmuwoplecnbx

When will they put Trump on Mt. Rushmore?
Sep 18
Doc Vega's 4 blog posts were featured
Sep 18
Burbia's blog post was featured

Charlie Kirk Assassination

September 10th 2025 in Utah Turning Point USA CEO has been assassinated. Coincidentally,  answering…See More
Sep 18
Charles Magus's blog post was featured

FURTHER PROOF OF WALK-INS! Prisoners of the Dulce Base by Sherry Shriner

There is a real connection between the Cabal and what is happening at this Undergroung…See More
Sep 18
Less Prone favorited Doc Vega's blog post Ashrams and Moonies Perfect Case for Mind Control
Sep 18
Less Prone commented on tjdavis's blog post Sentient World Simulation
"Cannot open the link"
Sep 18

© 2025   Created by truth.   Powered by

Badges  |  Report an Issue  |  Terms of Service

content and site copyright 12160.info 2007-2019 - all rights reserved. unless otherwise noted