NSA has access to all popular smartphonesThe U.S. National Security Agency has the ability to read user data on the three most popular smartphone platforms, including the protected platform BlackBerry, Spiegel reported.

NSA created a special group to work with mobile platforms. Group worked on interception of contact lists, SMS-trafic location data of users, as well as some documents. The article indicates that the NSA has access to at least 38 features of iPhone, and in addition, NSA also has access to computers when users connect their mobile devices to synchronize.

The article did not provide specific details on how exactly the NSA acts, so it is unclear whether they use undocumented features of mobile phones, or get the access from the operator, or NSA use some other methods. Spiegel asked the press service of the BlackBerry for comments, but they said they never build-in any “engineering master keys” to its products; however BlackBerry declined to comment possible cooperation with the NSA.

Spiegel reports that NSA works with the mobile operators and device manufacturers did not create anything special for NSA however they guess about the hidden devices that NSA could possibly install inside the mobile phones.

Last week, the New York Times published an article with evidences that the NSA has techniques for cracking most modern cryptographic algorithms. NY Times did not indicate the way NSA breaks down the mathematically robust algorithms for today, NY Times reports that the agency is using the most advanced supercomputers and advanced methods of crypto-analysts.

Errate Security Company reports that it has conducted research and can say with responsibility that most of the crypto keys of Tor network can be broken by NSA, as most of the keys have no protection.

Rob Graham, CEO of Errata Security, said that his company has created its own Tor-node routing and began studying the entering connections. 76 % of 22,920 random selected connections used a 1024-bit keys DH (Diffie-Hellman). Technically, this method of encryption is considered as completely stable. This key can be broken only by a supercomputer. “I think that no one will deny the fact that today’s supercomputers can quickly crack the 1024 RSA / DH keys” – Graham wrote in a blog.

“NSA has invested billions of dollars in building the park of supercomputers. NSA purchased specialized crypto- analytical chips that are probably designed to quick brute force of keys,” – he writes.

“Not many Tor users use the latest version of the software ( 0.2.4 ) , which uses DH with elliptic curves, which makes it difficult to hack. Others use weak keys. Of course, I’m just making an assumption, you may find that the new version of Tor is simple enough to crack “ – he writes.