(Credit: Photo illustration by James Martin/CNET)

The U.S. government has demanded that major Internet companies divulge users' stored passwords, according to two industry sources familiar with these orders, which represent an escalation in surveillance techniques that has not previously been disclosed.

If the government is able to determine a person's password, which is typically stored in encrypted form, the credential could be used to log in to an account to peruse confidential correspondence or even impersonate the user. Obtaining it also would aid in deciphering encrypted devices in situations where passwords are reused.

"I've certainly seen them ask for passwords," said one Internet industry source who spoke on condition of anonymity. "We push back."

A second person who has worked at a large Silicon Valley company confirmed that it received legal requests from the federal government for stored passwords. Companies "really heavily scrutinize" these requests, the person said. "There's a lot of 'over my dead body.'"

Some of the government orders demand not only a user's password but also the encryption algorithm and the so-called salt, according to a person familiar with the requests. A salt is a random string of letters or numbers used to make it more difficult to reverse the encryption process and determine the original password. Other orders demand the secret question codes often associated with user accounts.

"This is one of those unanswered legal questions: Is there any circumstance under which they could get password information?"
--Jennifer Granick, Stanford University

A Microsoft spokesperson would not say whether the company has received such requests from the government. But when asked whether Microsoft would divulge passwords, salts, or algorithms, the spokesperson replied: "No, we don't, and we can't see a circumstance in which we would provide it."

Google also declined to disclose whether it had received requests for those types of data. But a spokesperson said the company has "never" turned over a user's encrypted password, and that it has a legal team that frequently pushes back against requests that are fishing expeditions or are otherwise problematic. "We take the privacy and security of our users very seriously," the spokesperson said.

A Yahoo spokeswoman would not say whether the company had received such requests. The spokeswoman said: "If we receive a request from law enforcement for a user's password, we deny such requests on the grounds that they would allow overly broad access to our users' private information. If we are required to provide information, we do so only in the strictest interpretation of what is required by law."

Apple, Facebook, AOL, Verizon, AT&T, Time Warner Cable, and Comcast did not respond to queries about whether they have received requests for users' passwords and how they would respond to them.

Richard Lovejoy, a director of the Opera Software subsidiary that operates FastMail, said he doesn't recall receiving any such requests but that the company still has a relatively small number of users compared with its larger rivals. Because of that, he said, "we don't get a high volume" of U.S. government demands.

The FBI declined to comment.

Some details remain unclear, including when the requests began and whether the government demands are always targeted at individuals or seek entire password database dumps. The Patriot Act has been used to demand entire database dumps of phone call logs, and critics have suggested its use is broader. "The authority of the government is essentially limitless" under that law, Sen. Ron Wyden, an Oregon Democrat who serves on the Senate Intelligence committee, said at a Washington event this week.

Large Internet companies have resisted the government's requests by arguing that "you don't have the right to operate the account as a person," according to a person familiar with the issue. "I don't know what happens when the government goes to smaller providers and demands user passwords," the person said.

An attorney who represents Internet companies said he has not fielded government password requests, but "we've certainly had reset requests -- if you have the device in your possession, than a password reset is the easier way."

Source code to a C implementation of bcrypt, a popular algorithm used for password hashing.

Source code to a C implementation of bcrypt, a popular algorithm used for password hashing.

(Credit: Photo by Declan McCullagh)

Cracking the codes
Even if the National Security Agency or the FBI successfully obtains an encrypted password, salt, and details about the algorithm used, unearthing a user's original password is hardly guaranteed. The odds of success depend in large part on two factors: the type of algorithm and the complexity of the password.

Algorithms, known as hash functions, that are viewed as suitable for scrambling stored passwords are designed to be difficult to reverse. One popular hash function called MD5, for instance, transforms the phrase "National Security Agency" into this string of seemingly random characters: 84bd1c27b26f7be85b2742817bb8d43b. Computer scientists believe that, if a hash function is well-designed, the original phrase cannot be derived from the output.

But modern computers, especially ones equipped with high-performance video cards, can test passwords scrambled with MD5 and other well-known hash algorithms at the rate of billions a second. One system using 25 Radeon-powered GPUs that was demonstrated at a conference last December tested 348 billion hashes per second, meaning it would crack a 14-character Windows XP password in six minutes.

SOURCE HERE

Views: 49

Reply to This

Replies to This Discussion

best thing to do in this situation is change it.....on a regular basis, I'd say @ least once a week

RSS

"Destroying the New World Order"

TOP CONTENT THIS WEEK

THANK YOU FOR SUPPORTING THE SITE!

mobile page

12160.info/m

12160 Administrators

 

Latest Activity

Doc Vega posted blog posts
40 minutes ago
Sandy posted photos
11 hours ago
Sandy posted videos
yesterday
Sandy commented on Sandy's photo
Thumbnail

Screenshot_20260327-101250~2

"One data center uses 45 megawatts per day. How is this sustainable?"
yesterday
tjdavis posted a video

[OFFICIAL TRAILER] The Grand Deception

Enjoy the videos and music you love, upload original content, and share it all with friends, family, and the world on YouTube.
yesterday
Doc Vega posted a blog post
Thursday
Роман posted a blog post

Архітектурне планування двоповерхового будинку: ключові рішення для комфортного простору

Проєктування двоповерхового будинку — це складний, але захоплюючий процес, що поєднує…See More
Thursday
Sandy posted videos
Wednesday
Doc Vega's 5 blog posts were featured
Wednesday
tjdavis's blog post was featured
Wednesday
cheeki kea's blog post was featured
Wednesday
Less Prone favorited Sandy's photo
Wednesday
Sandy posted photos
Wednesday
Doc Vega posted a blog post

After Querying GROK over the 1952 Washington National Sightings

The Washington National Sightings (also called the 1952 Washington, D.C. UFO incident, the…See More
Tuesday
Doc Vega posted blog posts
Monday
tjdavis posted a video

I Tried AI for Fun. Now I’ve Got Questions | Jeff Childers From #474 | The Way I Heard It

What does inevitability sound like?That’s not a thruway line—it’s the question I keep coming back to after this conversation with Jeff Childers. Because some...
Monday
Doc Vega commented on Doc Vega's blog post Regrets That Cling to Me
"Cheeki, Thanks so much for the encouragement! "
Sunday
Less Prone favorited tjdavis's video
Mar 22
Burbia commented on Burbia's group The Comment Section is Closed
Mar 21
tjdavis posted a video

The Geography of Iran Explained.

Hey Everyone,This is my attempt to humanize the people and country of Iran. I hope I can educate people on the geography of this country outside of what we ...
Mar 21

© 2026   Created by truth.   Powered by

Badges  |  Report an Issue  |  Terms of Service

content and site copyright 12160.info 2007-2019 - all rights reserved. unless otherwise noted