#I accidentally shared this in a server instead of a private chat
Explore tagged Tumblr posts
homoeroticgrappling · 10 months ago
Text
Tumblr media Tumblr media
67 notes · View notes
fairyqueenofthedragons · 4 years ago
Text
The Magic Begins
Fablekingdom chapter 2
As I'm following canon set up of chapters, it starts with set up still. I am trying to show a slightly different dynamic between the siblings, while keeping the spirit of it. There will be bigger changes later on, but obviously the beginning is hard to change majorly, especially just arriving lol.
(Find Chapter One with a server of “Fk ch 1)
Hope you enjoy the chapter :D
Come chat with me on discord: https://discord.gg/8Vc6w9JWxv
OO OO OO OO OO OO OO OO
Kendra had been sitting in the car for hours.
She and Seth had done just about everything they could think of to handle the boredom, but she’d finished her two books, they’d played a dozen rounds of tic-tac-toe, and he’d moved onto trying to beat her at chopsticks (that game with your fingers). Seth had had a few comics, but he’d gone through them faster then she had her books. Even his handheld video game couldn’t hold his attention anymore.
“I thought you said that Grandpa Sorenson lived in Connecticut, not India,” Seth grumbled.
Mom sighed, having listened to Seth’s complaints for the last hour, “It won’t be much longer. Enjoy the scenery.”
She’d said that the last six times.
“It’s boring! I’m hungry, can we stop for food?”
Kendra was on Seth’s side here; the scenery was boring.
Mom pulled up the grocery bag full of snacks, “How about some Peanut butter and crackers instead?”
Seth shot Kendra a pained look but reached for the crackers regardless.
“Ooh, I want some Almond Roca,” Dad said without taking his eyes from the road.
He’s still managed to keep to his New Year’s resolution of keeping Almond Roca on hand at all times.
“Do you want anything Kendra?”
“No, I’m fine.”
Kendra turned her gaze outside as Seth munched on his snack. When was this drive going to be over? At least Grandfathers house can’t be as boring as this drive.
Honestly, Kendra wasn’t happy they were being sent off to stay with their grandparents just because of some cruise. She wished her family would just let them come with… or maybe just her, Seth might be too young (and too annoying).
They would be gone for seventeen days! Kendra couldn’t believe they’d just leave them like this.
They’re getting it for free, them and all the aunts and uncles on her mom’s side. They didn’t win a contest or anything to get it, they got the cruise because Kendra’s grandparents had asphyxiated.
Grandma and Grandpa Larsen had been visiting relatives in South Carolina. Unfortunately, the trailer they lived in had some gas leak and they’d all died in their sleep. The grandparents had specified a long time ago that when they died all their kids and spouses were to use an allocated sum of money to go on a Scandinavian cruise.
Grandchildren were not invited.
“We’re almost there kids!” Kendra’s dad said cheerfully.
“Yay,” Seth grumbled. “Then you guys can abandon us for your fancy cruise.”
“Won’t you get bored stuck on a boat for seventeen days?” Kendra asked hopefully.
Dad caught her eye in the rearview mirror. “The food is supposed to be incredible, top reviews. Snails, fish eggs, the works. It’s gonna be great.”
Mom wacked his arm.
“We’re not all that excited about the trip kids,” Mom said sadly. “I doubt your grandparents envisioned an accidental death when they made the request. The cruise is to honor their memory more than for fun.”
“What kind of death did they plan then?” Seth muttered.
Kendra couldn’t help but agree, who planned their death?
The ship stops in ports as you go,” Dad said, deliberately redirecting the conversation. “You get to disembark for part of the time.”
“Are you at least going to get us something?” Kendra asked. “If you’re just going to leave us at your parent’s house.”
“Of course we will dear,” Mom reassured. “We’ll get you some chocolates, maybe some books, maybe there will be cool jewelry!”
“I want a sword,” Seth said. “A sharp one.”
“I think it’s great for you kids that you get to stay with my parents,” Dad added. “I mean, they never invite anyone to stay with them. It’s definitely better than some cruise.”
Kendra shared a look with Seth, their parents were full of it.
“They’re hermits,” Seth argued. “We barely know them!”
“They’re my parents,” Dad said. “I survived, you’ll have fun.”
The car passed through a small town, only a few buildings lined the road, many seeming old a run down. There didn’t appear to be anything more interesting than a small library at the corner.
“It’s very exciting,” Dad continued. “Like I said, they never invite anyone. You’ll have a blast.”
Kendra tried hard not to roll her eyes. She knew for a fact that they hadn’t been invited. Kendra had overheard their mom when she approached Grandpa Sorenson about letting the kids stay with him at the funeral.
The funeral itself hadn’t been fun at all, it was creepy seeing her grandparents all dressed up fancy with lots of makeup. It didn’t look like them at all.
Those grandparents, the Larsen’s, they were the ones that they’d known. They’d come to lots of holidays and done many long visits with Kendra’s family. But Kendra couldn’t remember seeing the Sorenson’s much since Seth had started second grade.
Grandma and Grandpa Sorenson had inherited an estate in Connecticut around the time her parents were married. All the stories she’d heard were fantastical, filled with fairies and demons and witches. They were obviously fake, it made her think the place was something very boring.
Honestly, everyone was shocked when grandpa Sorenson had shown up at the funeral. It’d been more than eighteen months since either grandparent had visited anywhere.
He’d apologized that Grandma Ruth hadn’t been able to come, she’d fallen ill, but it really was the norm for only one to show up.
But at the end Kendra had overheard Mom talking to Grandpa Sorenson, cajoling him into watching her and Seth. She’d been heading to the bathroom but paused when she’d overheard them at the corner.
“Why can’t they stay with Marci?”
“Normally they would, but Marci is coming on the cruise.”
Kendra had risked a peek and seen Grandpa Sorenson standing across from her mom.
“Where are Marci’s kids going?”
“To her in-laws.”
“What about a baby-sitter?”
Grandpa had seemed almost pleading then, his expression tight.
“Two and a half weeks is a long time for a sitter. You’ve mentioned before something about having them over…”
“Yes, I do recall… But does it have to be late June? What about July?”
“The cruise is on a time frame. What’s the difference?”
He’d rubbed his face with a sigh.
“Things are extra busy then… I don’t know, Marla. I’m not that good with kids. Is there no where else they could go?”
“I’m sorry Stan,” Mom said, sounding on the verge of tears. “I know things are busy for you, and I don’t want to go on this cruise. You did so good with them when they were younger, I know you don’t see them often but… This cruise was important to my parents, so I want to go for them. If you can’t take care of the kids we can stay behind-“
“No,” Grandpa Sorenson interrupted with a sigh. “It’s fine. I’m sure we can find some place to lock them up.”
So, no, Grandpa Sorenson did not invite them.
Seth finished his crackers and pulled his game back out, flipping through the cartridges.
“Which game should I play?”
Kendra leaned over, “The fashion one.”
He rolled his eyes, “That one is just for character design.”
“Then make an elf.”
“I don’t want to!”
“You asked which you should do.”
“Nevermind, your suggestion is dumb.”
Seth ended up picking a fighting game and started it up.
Kendra got bored of watching quickly and turned to look out the windows. The trees were large and dark, little light slipping through the branches.
She jolted when they turned onto a gravel driveway.
“Look at that sign,” Seth said.
She followed his finger to see signs hanging on the side of the road.
Private Property
No Trespassing
Trespassers Will Be Persecuted
Please respect our privacy
“What are all these signs?” Kendra muttered.
“Oh, you know Grandpa Sorenson,” her dad said cheerfully. “Such a sense of humor.”
“I think they’re funny,” Seth declared. “Can we get some for our house?”
Kendra frowned at them as the car continued up the long driveway, no house anywhere in sight.
There were more signs as they went.
Beware of the Dog
We do not call 911
Beware of .12 Gauge
No Public Access at any Time
Owner Shoots
Kendra leaned back. This seems so… pleasant.
“I like that one,” Seth said pointing at the Owner Shoots sign.
Kendra shook her head as they finally reached the end of the driveway. Before them was a wrought-iron fence topped with fleurs-de-lis. Open in their path was a large double gate. She peered around but couldn’t see the end of the fence through the trees.
Even after passing through the gates there was still no sign of the house through the trees, until suddenly the trees cut off.
A large house came into view suddenly. It wasn’t quite a mansion, but was definitely larger than most houses Kendra had seen.
It was constructed out of dark wood and stone, old looking but solid and in good shape. The grounds around it were much more impressive though. There was a massive flower garden blooming in front of the house, with manicured hedges and a fish pond. It seemed to wrap around the side of the house too. Kendra wondered what flowers there were, and if there was a vegetable garden as well.
Further back Kendra could see a massive barn, at least five stories tall and topped with a large weather vane that she couldn’t quite make out but seemed shaped like an animal, but not a rooster.
“Oh, it’s lovely,” Mom said. “I wish we were all staying.”
Kendra blinked, “You’ve never been here?”
“No,” Mom said sadly. “Your father came here a few times before we were married.”
Dad nodded, “Yeah. There are some wild stories about this place, haha, I’ve told you a few of them.”
Seth yawned, “Yeah, like the evil witch in a shack.”
“Or the demon in the chapel.”
“Aren’t there trolls over one hill?”
Their dad laughed, “Yeah, my dad used to tell some wild stories. You should hear the ones Aunt Sophie would tell sometimes. She swears she met satyrs one time.”
The two shared an exasperated look.
“Anyways, you’ll have a blast. We never stayed long, but it was always entertaining. Worst comes to worst you can just hang out in the pool.”
Kendra rolled her eyes. Honestly, they were too old to believe all those fairy tales.
The car pulled to a stop just outside the garage as the front door open.
Grandpa Sorenson stepped out, followed by a tall, lanky man and a thin, older woman. Mom, Dad, Seth, and Kendra hopped out of the car.
The older woman was unfamiliar to Kendra, and so was the man. The woman had white hair streaked with black strands, and yet her face seemed ageless, her age impossible to place. Her skin was a tawny olive tone that appeared completely flawless, her black hair was pin-straight and framed her face.
The man had messy brown hair to go with matching brown eyes that studied them intently. He came over to the van, helping Dad open the back and begin removing suitcases.
“Just place the things inside,” Grandpa told Dad. “Dale will take them up to the bedroom.”
“Where’s Mom?” Dad asked looking around.
“She’s visiting your Aunt Edna.”
Dad looked surprised. “In Missouri?”
“Edna’s dying,” Grandpa said grimly.
Kendra had barely heard of Aunt Edna, and never met her, so she wasn’t that affected by it. Dad seemed upset thought.
She shifted awkwardly, studying the house to distract herself from their conversation.
The windows were cool, with bubbly glass. And there were bird nests under the eaves. She also noticed a lot of butterflies fluttering around.
Mom suddenly drew their attention and Seth and her scrambled to gather their things from the car and shove it all in their backpacks to bring in.
“I’ll grab the pillows if you grab the blankets?” Seth offered.
“Sure,” Kendra agreed, reaching for the blanket Seth had brought for napping on the car ride while he snagged her pillow.
Seth also snagged his ‘emergency kit’, a cereal box filled with odds and ends he thought would come in handy.
The two hurried after their parents, reaching them at the front door.
“Oh, there you are,” Mom said. “Got everything?”
“Yeah,” Seth huffed. “Except a ticket to go on the cruise.”
Mom sighed, ruffling Seth’s hair. “We’ll miss you too.”
He groaned, swiping at her hand as she turned to Kendra.
“Watch out for your brother, and both of you stay out of trouble, okay?”
Kendra nodded, “We’ll do our best.”
“So who’s this?” Dad was asking Grandpa.
“This is Lena, our housekeeper,” Grandpa said. “She helps around the house while Dale helps me tend to the grounds.”
“Nice to meet you,” Dad said.
“A pleasure,” Lena agreed with a soft accent. Kendra couldn’t quite place it, yet it reminded her of the ocean.
Lena opened the door, beckoning them inside.
“Oh, the home is beautiful,” Mom said. “I wish we had time for a tour.”
“Maybe when you get back,” Grandpa offered.
Kendra looked around. The house really was beautiful.
The glossy wood floors shone in the light and a low table in the entry hall held a beautifully painted ceramic vase with wilting flowers placed in it. There was a tall, brass coatrack off to one side beside a black bench with a high, carved back. It looked old and very interesting.
“Thank you again for letting the kids stay with you,” Dad said. “I don’t know what we would’ve done without you.”
Grandpa nodded, looking a bit awkward.
“It’s our pleasure.”
“I wish we could visit some,” Dad said. “But we’re on a really tight schedule.”
Grandpa pat his shoulder, “I understand, another time. Don’t let us keep you from your trip.”
“Thanks, Dad.”
Dad turned to Kendra and Seth, ruffling Seth’s hair.
“Have fun kids, we’ll be back before you know it.”
“Be good,” Mom said, hugging Kendra then Seth. “Do whatever Grandpa Sorenson tells you.”
Kendra sniffed, tears welling up. She swallowed hard and nodded, “Have a fun cruise.”
“Bring us back souvenirs,” Seth reminded.
Mom laughed, “The best ones.”
“We love you kids,” Dad said as he headed to the door.
Mom hugged them both one last time then went after him.
Kendra hurried after them, watching as they climbed into the SUV and start it up. Dad honked the horn as he pulled out, turning around and driving away. Kendra watched until the SUV vanished into the trees.
She tried not to think that her parents were probably relieved to be off without Seth and her. They were probably delighted for the vacation, not caring that they’d abandoned their two kids alone in a pretty, but creepy home with a grandparent they barely know.
Seth was poking around the entrance room, poking at one of the cabinets and picking up one of the intricate pieces of a decorative chess set.
Grandpa stood awkwardly, watching Seth and wincing when Seth put down a piece too hard.
“Leave the chess pieces alone,” Kendra told Seth. “They look expensive and breakable.”
“It’s fine,” Grandpa said, looking relieved when Seth put them down. He cleared his throat, “Shall I show you to your room?”
“Okay,” Seth said. “When’s lunch?”
Grandpa coughed, “It’s a bit past lunch but we can make you a snack to hold you till dinner.”
Seth nodded eagerly, “I’m starving.”
Kendra followed silently as Grandpa went up the stairs and down a carpeted hall to the foot of a narrow wooden staircase leading up to a white door.
“We don’t often have guests, especially children,” Grandpa explained. “I think you’ll be the most comfortable in the attic.”
Kendra was expecting something dark and musty, like the attic back home, but when he opened the door she saw it was actually very nice.
It was set up like a cheerful playroom. Spacious, clean, and bright, the long room had two beds at the far end, one wall covered in bookshelves and a couple of dressers, and the other held two wardrobes and some toy chests. There was a unicorn rocking horse sitting to the side, and a full dollhouse in one corner with a small piano in the other. Sitting beside of one of the dressers was a hen in a cage.
Seth went straight for the chicken. “Cool!” He poked a finger through the slender bars, trying to pet the soft looking feathers.
“Be careful, Seth,” Kendra warned. “Be gentle.”
“He’ll be fine,” Grandpa soothed. “Goldilocks is more a house pet than a barnyard hen. Your grandmother usually takes care of her, but since she’s gone I thought you kids might enjoy taking care of her for now. You’ll need to feed her, clean her cage, and collect her eggs.”
Seth looked delighted, “She lays eggs?”
“An egg or two a day if you keep her well fed,” Grandpa confirmed, motioning to a white plastic bucket full of kernels. “One scoop in the morning and in the evening should be good. I’ll show you how to change the lining of her cage in a few days. Make sure she has plenty of water and a tiny bowl of milk each morning.”
“Milk?”
He smiled mysteriously, “That’s the secret behind the eggs.”
“Can we take her out?” Seth asked, now stroking her feathers.
“Be gentle,” Grandpa said. “And put her back after.”
“Is it okay for us to play with the toys?” Kendra asked, studying the dollhouse. “Some of these look expensive.”
“Toys should be played with,” Grandpa said. “Just try to take care of them and that will be enough.”
“Awesome,” Seth said, going over to the piano and banging on the keys.
Kendra blinked, the notes sounded different than a piano. She couldn’t quite place what was off.
“While you stay here, this room is your space,” Grandpa said. “Within reason of course. I won’t pick up this space, nor bother you about it, as long as you treat the rest of the house with respect.”
“Alright,” Kendra agreed.
“Sounds good,” Seth nodded.
“I also have some unfortunate news. We’re in the height of tick season, have you heard of Lyme disease?”
Seth shook his head, but Kendra considered for a moment.
“I think so, but I can’t remember what it is.”
“It was originally discovered in the town of Lyme, Connecticut, not too far from here. You can catch it from tick bites, and during tick season the woods here are full of ticks.”
“What’s it do?” Seth asked.
“It starts out as a rash,” Grandpa said. “But it leads to arthritis, paralysis, and heart failure. And on top of that, ticks in general are bad to have. If you try to pull them off the heads detach, makes them hard to remove.”
“Gross,” Kendra muttered.
Grandpa nodded, “They’re very small and hard to see, at least until they fill up on blood, then they get as large as grapes.”
“Wow,” Seth said. “Can’t you just use bug spray?”
Grandpa nodded, “That can help, but isn’t a guarantee. The point is, you kids aren’t allowed to go into the woods. Stay on the lawn, play in the pool, explore the gardens, but stay away from the woods. I won’t be taking you to the hospital for Lyme disease.”
They both nodded.
“Good. As long as you follow that rule it’ll be fine. Break it and I’ll have to take away your outdoor privileges for your own safety.”
Seth winced, “Right, got it.”
“We understand,” Kendra assured him.
Grandpa nodded again, looking satisfied.
“One last thing,” he continued. “You’ll also need to stay out of the barn. There’s a lot of old tools and ladders and rusty pieces of farm equipment. I don’t want to risk you getting injured or getting tetanus.”
“Okay,” Seth agreed easily.
“Sounds reasonable,” Kendra said.
“Is there a TV?” Seth asked, poking at a canvas on an easel by one of the toy chests.
“No TV, or radio. We don’t get good reception out here, and it’s very expensive to run lines out.”
“When’s dinner?”
“In a few hours, Lena will be bringing up a snack for you soon. On that note, if you need anything, go to Lena. I’m very busy handling the upkeep of the property, so Lena will help with whatever you need.” He motioned to a purple cord hanging against the wall near one of the beds. “Tug the cord if you need her.”
“Alright, will we eat in one of the dining rooms?”
Grandpa nodded, “When I’m able to join you yes. On the days I’m too busy, like today, you can eat in here, in the kitchen, or anywhere else in the house. As long as you keep everything relatively clean you’re free to eat where you’re comfortable.”
“Wow,” said Seth. “Mom and Dad never let us eat in our rooms!”
Grandpa’s lips twitched, “Well, if it seems you can’t clean up after yourselves I may put a limit on it. But for now, you’re free to eat where you please.”
“Awesome,” Seth muttered.
Kendra’s smiled, that did sound nice.
“Now then, I need to go and complete my chores. I’ll likely not see you again till tomorrow.” He turned to leave but paused, pulling out a tiny key ring from his coat pocket. “Each of these keys fit something in this room. See if you can figure out what each unlocks.”
Kendra accepted the keyring curiously and Grandpa headed out, shutting the door gently behind him.
Seth had opened a toy chest now and was examining the contents. The toys were old-fashioned but in excellent condition. Soldiers, dolls, puzzles, stuffed animals, wooden blocks, some blocks shaped like logs, and others.
Kendra went to the window, a telescope put before it. She tried to peer through the eyepiece but couldn’t get it to focus right no matter how much she adjusted the knobs.
Pulling away she studied the window, realizing they were made of bubbly glass like the front of the house.
She unfastened the latch, pushing the window open. Even without the telescope she could see far into the forest. She moved the telescope closer and peered through it. After a moment of adjusted the knobs she could see even the leaves of the trees in clear detail.
“Oh, let me see,” Seth said, peering over her shoulder.
“Give me a bit, I just started looking.”
“But I wanna see.”
“Go play with the toys some,” Kendra huffed. “I’ll let you look after I’m done.”
“But sharing is caring,” Seth insisted.
“I said you could look, let me use it first though. I was using it already.”
Seth squinted, “What are you even looking at?”
“The trees.”
“Boring, let me see. I’ll look at something more interesting.”
Kendra rolled her eyes but stepped away, not wanting to deal with his whining.
“Fine but let me close the window. I don’t want bugs to come in.”
“Sure, whatever,” Seth studied the telescope as she closed the window and went off to study the dressers.
They were carved elegantly with fairies and unicorns and fiery birds.
She ran her fingers over the intricate patterns, she wished she had something like this at home.
She shook her head, going to look at the wardrobes, it reminded her of the Lion, the Witch, and the Wardrobe. She wondered if she stepped in would she find a mystical land on the other side.
“This stupid thing won’t even focus,” Seth complained.
Kendra smiled.
OO OO OO OO OO OO OO OO OO OO
Thanks for reading! Don't forget to reblog and leave a review, they feed my soul.
What did you think of the room? What changes do you think their foreknowledge will bring? What things did you dislike from the original series that you'd like changed?
lmk if you’d like to be tagged.
11 notes · View notes
raibo888 · 5 years ago
Text
cravings.
i crave many things.
i crave the feeling of my mom’s weight pressing down against my shoulders, tired from her calls and her work and needing a hug to recharge. 
of my sister excitedly showing me something that she’s made, the smile on her face so different from the scowl that usually covers it. 
of my brother giggling at me from the other side of a phone screen because even though we’re all stuck inside and i haven’t seen him in person for weeks, he still wants to show off his toys and his drawings.
of my dad laughing because i accidentally pressed the acceleration pedal instead of the break and the car lurches for a harrowing second, but instead of being scary it’s just funny.
of my grandma pretending that she hasn’t eaten my lychee jelly even though everyone in the house and her knows that she did, but she’s proud enough to never admit it.
of me and my grandpa staring guiltily at each other because we both came down at the same time to have a midnight snack, but neither of us will mention it in the morning.
of my stepmom smiling gratefully as i distract my baby brother so that she can get a few hours of rest.
of my step-grandparents giving us gifts from shanghai every time they come back even though they’re under literally no obligation to.
of my dog resting his head on my lap.
of my friends laughing uproariously in the cafeteria tables even though what we said wasn’t even funny to begin with.
of staying in a boba shop for hours playing cards.
of playing jazz music in the private study rooms.
of half-heartedly paying attention to lectures as we secretly share food.
of five-hour long facetimes because we can’t see each other anymore.
of the brief ten-minute moments where i have to return a plate, or money, and i see a friend for the first time in days.
of people whom i’ve never met chatting animatedly with me on a server.
of sending hugs to strangers through the internet.
of baking cookies at night.
of standing outside in the coolness of spring and i can smell the rain, but it’s not here yet so why not stay outside for a little longer?
of walks that devolve into philosophical conversations.
of drawing something just right, smiling when i finish.
of hearing a song that fits my mood perfectly, whether it’s something nice that wraps around me in comfort or bounces around me in excitement.
of finally hitting that high note that i swore i couldn’t reach last week.
of getting the chords right when i’m only guessing.
of feeling that burst of inspiration that can set me off for weeks.
of the moment when my grade arrives and i’m sure i did badly, except i actually didn’t.
of knowing that no matter how much i fucked up today, i made someone a little happy.
of receiving kindness and being able to reciprocate.
of being content with what i have despite knowing that it could be better.
i crave that feeling that’s something of a weird mix of love and happiness and contentment. because what are these emotions without one another? can you be happy without love? joyous without being content?
it’s nice to be happy. forget the world sucks for just a second to be happy.
6 notes · View notes
0100100100101101 · 8 years ago
Link
IN EARLY DECEMBER 2016, Adam was doing what he’s always doing, somewhere between hobby and profession: looking for things that are on the internet that shouldn’t be. That week, he came across a server inside New York University’s famed Institute for Mathematics and Advanced Supercomputing, headed by the brilliant Chudnovsky brothers, David and Gregory. The server appeared to be an internet-connected backup drive. But instead of being filled with family photos and spreadsheets, this drive held confidential information on an advanced code-breaking machine that had never before been described in public. Dozens of documents spanning hundreds of pages detailed the project, a joint supercomputing initiative administered by NYU, the Department of Defense, and IBM. And they were available for the entire world to download.
The supercomputer described in the trove, “WindsorGreen,” was a system designed to excel at the sort of complex mathematics that underlies encryption, the technology that keeps data private, and almost certainly intended for use by the Defense Department’s signals intelligence wing, the National Security Agency. WindsorGreen was the successor to another password-cracking machine used by the NSA, “WindsorBlue,” which was also  documented in the material leaked from NYU and which had been previously described in the Norwegian press thanks to a document provided by National Security Agency whistleblower Edward Snowden. Both systems were intended for use by the Pentagon and a select few other Western governments, including Canada and Norway.
Adam, an American digital security researcher, requested that his real name not be published out of fear of losing his day job. Although he deals constantly with digital carelessness, Adam was nonetheless stunned by what NYU had made available to the world. “The fact that this software, these spec sheets, and all the manuals to go with it were sitting out in the open for anyone to copy is just simply mind blowing,” he said.
He described to The Intercept how easy it would have been for someone to obtain the material, which was marked with warnings like “DISTRIBUTION LIMITED TO U.S. GOVERNMENT AGENCIES ONLY,” “REQUESTS FOR THIS DOCUMENT MUST BE REFERRED TO AND APPROVED BY THE DOD,” and “IBM Confidential.” At the time of his discovery, Adam wrote to me in an email:
All of this leaky data is courtesy of what I can only assume are misconfigurations in the IMAS (Institute for Mathematics and Advanced Supercomputing) department at NYU. Not even a single username or password separates these files from the public internet right now. It’s absolute insanity.
The files were taken down after Adam notified NYU.
Intelligence agencies like the NSA hide code-breaking advances like WindsorGreen because their disclosure might accelerate what has become a cryptographic arms race. Encrypting information on a computer used to be a dark art shared between militaries and mathematicians. But advances in cryptography, and rapidly swelling interest in privacy in the wake of Snowden, have helped make encryption tech an effortless, everyday commodity for consumers. Web connections are increasingly shielded using the HTTPS protocol, end-to-end encryption has come to popular chat platforms like WhatsApp, and secure phone calls can now be enabled simply by downloading some software to your device. The average person viewing their checking account online or chatting on iMessage might not realize the mathematical complexity that’s gone into making eavesdropping impractical.
The spread of encryption is a good thing — unless you’re the one trying to eavesdrop. Spy shops like the NSA can sometimes thwart encryption by going around it, finding flaws in the way programmers build their apps or taking advantage of improperly configured devices. When that fails, they may try and deduce encryption keys through extraordinarily complex math or repeated guessing. This is where specialized systems like WindsorGreen can give the NSA an edge, particularly when the agency’s targets aren’t aware of just how much code-breaking computing power they’re up against.
Adam declined to comment on the specifics of any conversations he might have had with the Department of Defense or IBM. He added that NYU, at the very least, expressed its gratitude to him for notifying it of the leak by mailing him a poster.
While he was trying to figure out who exactly the Windsor files belonged to and just how they’d wound up on a completely naked folder on the internet, Adam called David Chudnovsky, the world-renowned mathematician and IMAS co-director at NYU. Reaching Chudnovsky was a cinch, because his entire email outbox, including correspondence with active members of the U.S. military, was for some reason stored on the NYU drive and made publicly available alongside the Windsor documents. According to Adam, Chudnovsky confirmed his knowledge of and the university’s involvement in the supercomputing project; The Intercept was unable to reach Chudnovsky directly to confirm this. The school’s association is also strongly indicated by the fact that David’s brother Gregory, himself an eminent mathematician and professor at NYU, is listed as an author of a 164-page document from the cache describing the capabilities of WindsorGreen in great detail. Although the brothers clearly have ties to WindsorGreen, there is no indication they were responsible for the leak. Indeed, the identity of the person or persons responsible for putting a box filled with military secrets on the public internet remains utterly unclear.
An NYU spokesperson would not comment on the university’s relationship with the Department of Defense, IBM, or the Windsor programs in general. When The Intercept initially asked about WindsorGreen the spokesperson seemed unfamiliar with the project, saying they were “unable to find anything that meets your description.” This same spokesperson later added that “no NYU or NYU Tandon system was breached,” referring to the Tandon School of Engineering, which houses the IMAS. This statement is something of a non sequitur, since, according to Adam, the files leaked simply by being exposed to the open internet — none of the material was protected by a username, password, or firewall of any kind, so no “breach” would have been necessary. You can’t kick down a wide open door.
The documents, replete with intricate processor diagrams, lengthy mathematical proofs, and other exhaustive technical schematics, are dated from 2005 to 2012, when WindsorGreen appears to have been in development. Some documents are clearly marked as drafts, with notes that they were to be reviewed again in 2013. Project progress estimates suggest the computer wouldn’t have been ready for use until 2014 at the earliest. All of the documents appear to be proprietary to IBM and not classified by any government agency, although some are stamped with the aforementioned warnings restricting distribution to within the U.S. government. According to one WindsorGreen document, work on the project was restricted to American citizens, with some positions requiring a top-secret security clearance — which as Adam explains, makes the NYU hard drive an even greater blunder:
Let’s, just for hypotheticals, say that China found the same exposed NYU lab server that I did and downloaded all the stuff I downloaded. That simple act alone, to a large degree, negates a humongous competitive advantage we thought the U.S. had over other countries when it comes to supercomputing.
The only tool Adam used to find the NYU trove was Shodan.io, a website that’s roughly equivalent to Google for internet-connected, and typically unsecured, computers and appliances around the world, famous for turning up everything from baby monitors to farming equipment. Shodan has plenty of constructive technical uses but also serves as a constant reminder that we really ought to stop plugging things into the internet that have no business being there.
The WindsorGreen documents are mostly inscrutable to anyone without a Ph.D. in a related field, but they make clear that the computer is the successor to WindsorBlue, a next generation of specialized IBM hardware that would excel at cracking encryption, whose known customers are the U.S. government and its partners.
Experts who reviewed the IBM documents said WindsorGreen possesses substantially greater computing power than WindsorBlue, making it particularly adept at compromising encryption and passwords. In an overview of WindsorGreen, the computer is described as a “redesign” centered around an improved version of its processor, known as an “application specific integrated circuit,” or ASIC, a type of chip built to do one task, like mining bitcoin, extremely well, as opposed to being relatively good at accomplishing the wide range of tasks that, say, a typical MacBook would handle. One of the upgrades was to switch the processor to smaller transistors, allowing more circuitry to be crammed into the same area, a change quantified by measuring the reduction in nanometers (nm) between certain chip features. The overview states:
The WindsorGreen ASIC is a second-generation redesign of the WindsorBlue ASIC that moves from 90 nm to 32 nm ASIC technology and incorporates performance enhancements based on our experience with WindsorBlue. We expect to achieve at least twice the performance of the WindsorBlue ASIC with half the area, reduced cost, and an objective of half the power. We also expect our system development cost to be only a small fraction of the WindsorBlue development cost because we carry forward intact much of the WindsorBlue infrastructure.
Çetin Kaya Koç is the director of the Koç Lab at the University of California, Santa Barbara, which conducts cryptographic research. Koç reviewed the Windsor documents and told The Intercept that he has “not seen anything like [WindsorGreen],” and that “it is beyond what is commercially or academically available.” He added that outside of computational biology applications like complex gene sequencing (which it’s probably safe to say the NSA is not involved in), the only other purpose for such a machine would be code-breaking: “Probably no other problem deserves this much attention to design an expensive computer like this.”
Andrew “Bunnie” Huang, a hacker and computer hardware researcher who reviewed the documents at The Intercept’s request, said that WindsorGreen would surpass many of the most powerful code-breaking systems in the world: “My guess is this thing, compared to the TOP500 supercomputers at the time (and probably even today) pretty much wipes the floor with them for anything crypto-related.” Conducting a “cursory inspection of power and performance metrics,” according to Huang, puts WindsorGreen “heads and shoulders above any publicly disclosed capability” on the TOP500, a global ranking of supercomputers. Like all computers that use specialized processors, or ASICs, WindsorGreen appears to be a niche computer that excels at one kind of task but performs miserably at anything else. Still, when it comes to crypto-breaking, Huang believes WindsorGreen would be “many orders of magnitude … ahead of the fastest machines I previously knew of.”
But even with expert analysis, no one beyond those who built the thing can be entirely certain of how exactly an agency like the NSA might use WindsorGreen. To get a better sense of why a spy agency would do business with IBM, and how WindsorGreen might evolve into WindsorOrange (or whatever the next generation may be called), it helps to look at documents provided by Snowden that show how WindsorBlue was viewed in the intelligence community. Internal memos from Government Communications Headquarters, the NSA’s British counterpart, show that the agency was interested in purchasing WindsorBlue as part of its High Performance Computing initiative, which sought to help with a major problem: People around the world were getting too good at keeping unwanted eyes out of their data.
Under the header “what is it, and why,” one 2012 HPC document explains, “Over the past 18 months, the Password Recovery Service has seen rapidly increasing volumes of encrypted traffic … the use of much greater range of encryption techniques by our targets, and improved sophistication of both the techniques themselves and the passwords targets are using (due to improved OPSec awareness).” Accordingly, GCHQ had begun to “investigate the acquisition of WINDSORBLUE … and, subject to project board approval, the procurement of the infrastructure required to host the a [sic] WINDSORBLUE system at Benhall,” where the organization is headquartered.
In April 2014, Norway’s Dagbladet newspaper reported that the Norwegian Intelligence Service had purchased a cryptographic computer system code-named STEELWINTER, based on WindsorBlue, as part of a $100 million overhaul of the agency’s intelligence-processing capabilities. The report was based on a document provided by Snowden:
The document does not say when the computer will be delivered, but in addition to the actual purchase, NIS has entered into a partnership with NSA to develop software for decryption. Some of the most interesting data NIS collects are encrypted, and the extensive processes for decryption require huge amounts of computing power.
Widespread modern encryption methods like RSA, named for the initials of the cryptographers who developed it, rely on the use of hugely complex numbers derived from prime numbers. Speaking very roughly, so long as those original prime numbers remain secret, the integrity of the encoded data will remain safe. But were someone able to factor the hugely complex number — a process identical to the sort of math exercise children are taught to do on a chalkboard, but on a massive scale — they would be able to decode the data on their own. Luckily for those using encryption, the numbers in question are so long that they can only be factored down to their prime numbers with an extremely large amount of computing power. Unluckily for those using encryption, government agencies in the U.S., Norway, and around the globe are keenly interested in computers designed to excel at exactly this purpose.
Given the billions of signals intelligence records collected by Western intelligence agencies every day, enormous computing power is required to sift through this data and crack what can be broken so that it can be further analyzed, whether through the factoring method mentioned above or via what’s known as a “brute force” attack, wherein a computer essentially guesses possible keys at a tremendous rate until one works. The NIS commented only to Dagbladet that the agency “handles large amounts of data and needs a relatively high computing power.” Details about how exactly such “high computing power” is achieved are typically held very close — finding hundreds of pages of documentation on a U.S. military code-breaking box, completely unguarded, is virtually unheard of.
A very important question remains: What exactly could WindsorBlue, and then WindsorGreen, crack? Are modern privacy mainstays like PGP, used to encrypt email, or the ciphers behind encrypted chat apps like Signal under threat? The experts who spoke to The Intercept don’t think there’s any reason to assume the worst.
“As long as you use long keys and recent-generation hashes, you should be OK,” said Huang. “Even if [WindsorGreen] gave a 100x advantage in cracking strength, it’s a pittance compared to the additional strength conferred by going from say, 1024-bit RSA to 4096-bit RSA or going from SHA-1 to SHA-256.”
Translation: Older encryption methods based on shorter strings of numbers, which are easier to factor, would be more vulnerable, but anyone using the strongest contemporary encryption software (which uses much longer numbers) should still be safe and confident in their privacy.
Still, “there are certainly classes of algorithms that got, wildly guessing, about 100x weaker from a brute force standpoint,” according to Huang, so “this computer’s greatest operation benefit would have come from a combination of algorithmic weakness and brute force. For example, SHA-1, which today is well-known to be too weak, but around the time of 2013 when this computer might have come online, it would have been pretty valuable to be able to ‘routinely’ collide SHA-1 as SHA-1 was still very popular and widely used.”
A third expert in computer architecture and security, who requested anonymity due to the sensitivity of the documents and a concern for their future livelihood, told The Intercept that “most likely, the system is intended for brute-forcing password-protected data,” and that it “might also have applications for things like … breaking older/weaker (1024 bit) RSA keys.” Although there’s no explicit reference to a particular agency in the documents, this expert added, “I’m assuming NSA judging by the obvious use of the system.”
Huang and Koç both speculated that aside from breaking encryption, WindsorGreen could be used to fake the cryptographic signature used to mark software updates as authentic, so that a targeted computer could be tricked into believing a malicious software update was the real thing. For the NSA, getting a target to install software they shouldn’t be installing is about as great as intelligence-gathering gifts come.
The true silver bullet against encryption, a technology that doesn’t just threaten weaker forms of data protection but all available forms, will not be a computer like WindsorGreen, but something that doesn’t exist yet: a quantum computer. In 2014, the Washington Post reported on a Snowden document that revealed the NSA’s ongoing efforts to build a “quantum” computer processor that’s not confined to just ones and zeroes but can exist in multiple states at once, allowing for computing power incomparable to anything that exists today. Luckily for the privacy concerned, the world is still far from seeing a functional quantum computer. Luckily for the NSA and its partners, IBM is working hard on one right now.
Repeated requests for comment sent to over a dozen members of the IBM media relations team were not returned, nor was a request for comment sent to a Department of Defense spokesperson. The NSA declined to comment. GCHQ declined to comment beyond its standard response that all its work “is carried out in accordance with a strict legal and policy framework, which ensures that our activities are authorised, necessary and proportionate, and that there is rigorous oversight.”
15 notes · View notes
theladysuz-blog · 7 years ago
Text
Mark Zuckerberg
Mark Zuckerberg - How Accurate Was the Movie The Social Network?
Check here also - WhatsApp Conference Calls
Altering the Facts Makes for Great Drama but Poor History: A Review of Aaron Sorkin's movie "The Social Network"
Aaron Sorkin earned a stellar reputation as the producer of "West Wing," an idealistic TV show about a smart and sophisticated American president with good ethics and equally good policies. Having high expectations for a Sorkin production, I was disappointed in his current release, "The Social Network."
"The Social Network" is the story of Mark Zuckerberg, the co-founder of Facebook, which has 800 million users worldwide and is currently estimated to be worth $25 billion. That's no small feat for a 26-year-old entrepreneur. How did he do it?
Zuckerberg, played beautifully by Jesse Eisenberg, is a 19-year-old student at Harvard as the movie opens. He is having drinks with his girlfriend, and manages to insult her and offend the audience within less than five minutes of crisp, sardonic dialogue. Sorkin establishes immediately that Zuckerberg is arrogant, insufferable and Mensa material, and we cheer when his girlfriend, Erica, breaks up with him. A frustrated and intoxicated Zuckerberg returns to his dorm, thinking that he will create a social media site where Harvard men can rate female students in terms of their attractiveness. He calls the site "FaceMash."
It's a powerful scene, arguing that the birth of Facebook was motivated by teen angst and revenge. The only problem is that it never occurred. Zuckerberg didn't even know a woman named Erica, although he did drunkenly blog about a Harvard coed named Jessica Alona, but he denies that he ever went out with her or that she was the driving force behind Facebook. In fact, Mark had the same girlfriend for the last eight years and she is now his wife.
After the so-called romantic breakup, Mark conferred with his friend Eduardo Saverin (well played by Andrew Garfield), seeking a logarithm that would enable him to hack into various "face books" that were already in existence in individual Harvard dorms. Meanwhile, Zuckerberg was approached by Tyler and Cameron Winklevoss, twins who asked if Mark would program a dating website for students that would be based on exclusivity; only Harvard students need apply. The site would be called the HarvardConnection (later renamed ConnectU). Zuckerberg was given the private server location and password for the unfinished HarvardConnection site and the code, with the understanding that he would finish the necessary programming.
He agreed verbally to this arrangement, exchanged 52 e-mails with the brothers and had several in-person meetings, but never delivered the work that he'd promised. Instead, he provided a long list of excuses as to why he couldn't meet with the twins. Then one day, to their shock and dismay, they discovered that Mark had been secretly working with Eduardo and Mark's roommate, Dustin Moskovitz, to launch what was then called "The Facebook."
The twins sued Zuckerberg for stealing their idea and alleged that he used part of their programming code. They were awarded $65 million in damages; however, since then, the Winklevoss brothers claimed that Facebook stock was undervalued at the time and they're really entitled to $466 million. The litigation continues.
Zuckerberg led the twins to believe that he was actively working with them when in fact he was working behind their back to establish something similar, but not identical, to their site. The twins wanted to devise a dating site for Harvard students and to expand this across the country. Zuckerberg's site had little to do with dating. It was a place where people could make friends, network, find a date, or simply chat with their nephews, colleagues or children away at school. Moreover, Zuckerberg's original hot-or-not, drunken FaceMash included both men and women. Sorkin omitted this important detail because he wants us to believe that Mark Z. was angry enough at the imaginary Erica that he would have created a website just for men to humiliate and insult women, and have fun doing so. But the site was never that way. Women could also rate men. And there was no Erica. Ergo, Sorkin's hypothesis for Mark Zuckerberg's basis for forming Facebook was false.
As "The Facebook" was catching on like wildfire, another young genius became involved. Sean Parker was one of the instigators of the now defunct Napster, an application that allowed people to download music for free. This infuriated and worried many musicians; ironically, Justin Timberlake played Sean Parker in the film - I hope he took some pleasure in that role since he must've lost a lot of money to Napster! Unlike Zuckerberg who was basically a studious guy with an obsession for programming, Parker was already leading the glamorous life in Los Angeles. He was a party boy who thought big and made Eduardo look small in Mark's eyes. Mark had to decide between the two of them. Would he pursue Parker's vision of Facebook, funded through venture capitalists, or would he stick with his best friend and company CFO Eduardo and their smalltime advertisers, even though Eduardo had refused to move out to California when Mark wanted to advance the business there?
Ethically-challenged Zuckerberg opted for the latter and left his best friend in the dust by writing Saverin out of future Facebook contracts once they reached the 1 million user mark; his share went from 34% of the company to.03%. Saverin was enraged; he sued in April of 2005 and won back a 5% share of Facebook, worth 1.3 billion, as well as an undisclosed amount of money. Parker had a 7% share in Facebook which was revoked when he was busted for cocaine use. Zuckerberg maintains a 24% share although Sorkin leads us to believe he still owns 51%.
Sorkin relied entirely on interviews with Eduardo Saverin to make this production, which was based on the book The Accidental Billionaires by Ben Mezrich. Not surprisingly, Mark Zuckerberg refused to be interviewed. Consequently, the movie can't help but be biased in Saverin's favor.
Since the courts had already established that Zuckerberg was guilty of intellectual property theft, there was no need for Sorkin to embellish. "The Social Network" would have benefited by sticking more closely to the facts, which were dramatic enough.
The movie poses hard ethical questions. It makes us ask ourselves if we are complicit. Do you have a Facebook account? Are you helping to keep the accidental billionaires rich? If you wouldn't wear a T-shirt that says, "Free Bernie Madoff," why would you support Zuckerberg?
Finally, the movie acts as a Rorschach test - in exit polls, people under 40 viewed Zuckerberg as a visionary genius with drive, purpose and ambition: a young man who saw a golden opportunity and took advantage of it. Those over 40 saw him as cold, morally bankrupt and cutthroat. In that respect, "The Social Network" succeeds as a provocative film and it is excellent entertainment. But I fear that many people will mistake this fascinating half-truth for a documentary, and that it most definitely is not.
0 notes
96thdayofrage · 8 years ago
Link
IN EARLY DECEMBER 2016, Adam was doing what he’s always doing, somewhere between hobby and profession: looking for things that are on the internet that shouldn’t be. That week, he came across a server inside New York University’s famed Institute for Mathematics and Advanced Supercomputing, headed by the brilliant Chudnovsky brothers, David and Gregory. The server appeared to be an internet-connected backup drive. But instead of being filled with family photos and spreadsheets, this drive held confidential information on an advanced code-breaking machine that had never before been described in public. Dozens of documents spanning hundreds of pages detailed the project, a joint supercomputing initiative administered by NYU, the Department of Defense, and IBM. And they were available for the entire world to download.
The supercomputer described in the trove, “WindsorGreen,” was a system designed to excel at the sort of complex mathematics that underlies encryption, the technology that keeps data private, and almost certainly intended for use by the Defense Department’s signals intelligence wing, the National Security Agency. WindsorGreen was the successor to another password-cracking machine used by the NSA, “WindsorBlue,” which was also  documented in the material leaked from NYU and which had been previously described in the Norwegian press thanks to a document provided by National Security Agency whistleblower Edward Snowden. Both systems were intended for use by the Pentagon and a select few other Western governments, including Canada and Norway.
Adam, an American digital security researcher, requested that his real name not be published out of fear of losing his day job. Although he deals constantly with digital carelessness, Adam was nonetheless stunned by what NYU had made available to the world. “The fact that this software, these spec sheets, and all the manuals to go with it were sitting out in the open for anyone to copy is just simply mind blowing,” he said.
He described to The Intercept how easy it would have been for someone to obtain the material, which was marked with warnings like “DISTRIBUTION LIMITED TO U.S. GOVERNMENT AGENCIES ONLY,” “REQUESTS FOR THIS DOCUMENT MUST BE REFERRED TO AND APPROVED BY THE DOD,” and “IBM Confidential.” At the time of his discovery, Adam wrote to me in an email:
All of this leaky data is courtesy of what I can only assume are misconfigurations in the IMAS (Institute for Mathematics and Advanced Supercomputing) department at NYU. Not even a single username or password separates these files from the public internet right now. It’s absolute insanity.
The files were taken down after Adam notified NYU.
Intelligence agencies like the NSA hide code-breaking advances like WindsorGreen because their disclosure might accelerate what has become a cryptographic arms race. Encrypting information on a computer used to be a dark art shared between militaries and mathematicians. But advances in cryptography, and rapidly swelling interest in privacy in the wake of Snowden, have helped make encryption tech an effortless, everyday commodity for consumers. Web connections are increasingly shielded using the HTTPS protocol, end-to-end encryption has come to popular chat platforms like WhatsApp, and secure phone calls can now be enabled simply by downloading some software to your device. The average person viewing their checking account online or chatting on iMessage might not realize the mathematical complexity that’s gone into making eavesdropping impractical.
The spread of encryption is a good thing — unless you’re the one trying to eavesdrop. Spy shops like the NSA can sometimes thwart encryption by going around it, finding flaws in the way programmers build their apps or taking advantage of improperly configured devices. When that fails, they may try and deduce encryption keys through extraordinarily complex math or repeated guessing. This is where specialized systems like WindsorGreen can give the NSA an edge, particularly when the agency’s targets aren’t aware of just how much code-breaking computing power they’re up against.
Adam declined to comment on the specifics of any conversations he might have had with the Department of Defense or IBM. He added that NYU, at the very least, expressed its gratitude to him for notifying it of the leak by mailing him a poster.
While he was trying to figure out who exactly the Windsor files belonged to and just how they’d wound up on a completely naked folder on the internet, Adam called David Chudnovsky, the world-renowned mathematician and IMAS co-director at NYU. Reaching Chudnovsky was a cinch, because his entire email outbox, including correspondence with active members of the U.S. military, was for some reason stored on the NYU drive and made publicly available alongside the Windsor documents. According to Adam, Chudnovsky confirmed his knowledge of and the university’s involvement in the supercomputing project; The Intercept was unable to reach Chudnovsky directly to confirm this. The school’s association is also strongly indicated by the fact that David’s brother Gregory, himself an eminent mathematician and professor at NYU, is listed as an author of a 164-page document from the cache describing the capabilities of WindsorGreen in great detail. Although the brothers clearly have ties to WindsorGreen, there is no indication they were responsible for the leak. Indeed, the identity of the person or persons responsible for putting a box filled with military secrets on the public internet remains utterly unclear.
An NYU spokesperson would not comment on the university’s relationship with the Department of Defense, IBM, or the Windsor programs in general. When The Intercept initially asked about WindsorGreen the spokesperson seemed unfamiliar with the project, saying they were “unable to find anything that meets your description.” This same spokesperson later added that “no NYU or NYU Tandon system was breached,” referring to the Tandon School of Engineering, which houses the IMAS. This statement is something of a non sequitur, since, according to Adam, the files leaked simply by being exposed to the open internet — none of the material was protected by a username, password, or firewall of any kind, so no “breach” would have been necessary. You can’t kick down a wide open door.
Tumblr media
The documents, replete with intricate processor diagrams, lengthy mathematical proofs, and other exhaustive technical schematics, are dated from 2005 to 2012, when WindsorGreen appears to have been in development. Some documents are clearly marked as drafts, with notes that they were to be reviewed again in 2013. Project progress estimates suggest the computer wouldn’t have been ready for use until 2014 at the earliest. All of the documents appear to be proprietary to IBM and not classified by any government agency, although some are stamped with the aforementioned warnings restricting distribution to within the U.S. government. According to one WindsorGreen document, work on the project was restricted to American citizens, with some positions requiring a top-secret security clearance — which as Adam explains, makes the NYU hard drive an even greater blunder:
Let’s, just for hypotheticals, say that China found the same exposed NYU lab server that I did and downloaded all the stuff I downloaded. That simple act alone, to a large degree, negates a humongous competitive advantage we thought the U.S. had over other countries when it comes to supercomputing.
The only tool Adam used to find the NYU trove was Shodan.io, a website that’s roughly equivalent to Google for internet-connected, and typically unsecured, computers and appliances around the world, famous for turning up everything from baby monitors to farming equipment. Shodan has plenty of constructive technical uses but also serves as a constant reminder that we really ought to stop plugging things into the internet that have no business being there.
The WindsorGreen documents are mostly inscrutable to anyone without a Ph.D. in a related field, but they make clear that the computer is the successor to WindsorBlue, a next generation of specialized IBM hardware that would excel at cracking encryption, whose known customers are the U.S. government and its partners.
Experts who reviewed the IBM documents said WindsorGreen possesses substantially greater computing power than WindsorBlue, making it particularly adept at compromising encryption and passwords. In an overview of WindsorGreen, the computer is described as a “redesign” centered around an improved version of its processor, known as an “application specific integrated circuit,” or ASIC, a type of chip built to do one task, like mining bitcoin, extremely well, as opposed to being relatively good at accomplishing the wide range of tasks that, say, a typical MacBook would handle. One of the upgrades was to switch the processor to smaller transistors, allowing more circuitry to be crammed into the same area, a change quantified by measuring the reduction in nanometers (nm) between certain chip features. The overview states:
The WindsorGreen ASIC is a second-generation redesign of the WindsorBlue ASIC that moves from 90 nm to 32 nm ASIC technology and incorporates performance enhancements based on our experience with WindsorBlue. We expect to achieve at least twice the performance of the WindsorBlue ASIC with half the area, reduced cost, and an objective of half the power. We also expect our system development cost to be only a small fraction of the WindsorBlue development cost because we carry forward intact much of the WindsorBlue infrastructure.
Tumblr media
Çetin Kaya Koç is the director of the Koç Lab at the University of California, Santa Barbara, which conducts cryptographic research. Koç reviewed the Windsor documents and told The Intercept that he has “not seen anything like [WindsorGreen],” and that “it is beyond what is commercially or academically available.” He added that outside of computational biology applications like complex gene sequencing (which it’s probably safe to say the NSA is not involved in), the only other purpose for such a machine would be code-breaking: “Probably no other problem deserves this much attention to design an expensive computer like this.”
Andrew “Bunnie” Huang, a hacker and computer hardware researcher who reviewed the documents at The Intercept’s request, said that WindsorGreen would surpass many of the most powerful code-breaking systems in the world: “My guess is this thing, compared to the TOP500 supercomputers at the time (and probably even today) pretty much wipes the floor with them for anything crypto-related.” Conducting a “cursory inspection of power and performance metrics,” according to Huang, puts WindsorGreen “heads and shoulders above any publicly disclosed capability” on the TOP500, a global ranking of supercomputers. Like all computers that use specialized processors, or ASICs, WindsorGreen appears to be a niche computer that excels at one kind of task but performs miserably at anything else. Still, when it comes to crypto-breaking, Huang believes WindsorGreen would be “many orders of magnitude … ahead of the fastest machines I previously knew of.”
But even with expert analysis, no one beyond those who built the thing can be entirely certain of how exactly an agency like the NSA might use WindsorGreen. To get a better sense of why a spy agency would do business with IBM, and how WindsorGreen might evolve into WindsorOrange (or whatever the next generation may be called), it helps to look at documents provided by Snowden that show how WindsorBlue was viewed in the intelligence community. Internal memos from Government Communications Headquarters, the NSA’s British counterpart, show that the agency was interested in purchasing WindsorBlue as part of its High Performance Computing initiative, which sought to help with a major problem: People around the world were getting too good at keeping unwanted eyes out of their data.
Under the header “what is it, and why,” one 2012 HPC document explains, “Over the past 18 months, the Password Recovery Service has seen rapidly increasing volumes of encrypted traffic … the use of much greater range of encryption techniques by our targets, and improved sophistication of both the techniques themselves and the passwords targets are using (due to improved OPSec awareness).” Accordingly, GCHQ had begun to “investigate the acquisition of WINDSORBLUE … and, subject to project board approval, the procurement of the infrastructure required to host the a [sic] WINDSORBLUE system at Benhall,” where the organization is headquartered.
Tumblr media Tumblr media
In April 2014, Norway’s Dagbladet newspaper reported that the Norwegian Intelligence Service had purchased a cryptographic computer system code-named STEELWINTER, based on WindsorBlue, as part of a $100 million overhaul of the agency’s intelligence-processing capabilities. The report was based on a document provided by Snowden:
The document does not say when the computer will be delivered, but in addition to the actual purchase, NIS has entered into a partnership with NSA to develop software for decryption. Some of the most interesting data NIS collects are encrypted, and the extensive processes for decryption require huge amounts of computing power.
Widespread modern encryption methods like RSA, named for the initials of the cryptographers who developed it, rely on the use of hugely complex numbers derived from prime numbers. Speaking very roughly, so long as those original prime numbers remain secret, the integrity of the encoded data will remain safe. But were someone able to factor the hugely complex number — a process identical to the sort of math exercise children are taught to do on a chalkboard, but on a massive scale — they would be able to decode the data on their own. Luckily for those using encryption, the numbers in question are so long that they can only be factored down to their prime numbers with an extremely large amount of computing power. Unluckily for those using encryption, government agencies in the U.S., Norway, and around the globe are keenly interested in computers designed to excel at exactly this purpose.
Given the billions of signals intelligence records collected by Western intelligence agencies every day, enormous computing power is required to sift through this data and crack what can be broken so that it can be further analyzed, whether through the factoring method mentioned above or via what’s known as a “brute force” attack, wherein a computer essentially guesses possible keys at a tremendous rate until one works. The NIS commented only to Dagbladet that the agency “handles large amounts of data and needs a relatively high computing power.” Details about how exactly such “high computing power” is achieved are typically held very close — finding hundreds of pages of documentation on a U.S. military code-breaking box, completely unguarded, is virtually unheard of.
A very important question remains: What exactly could WindsorBlue, and then WindsorGreen, crack? Are modern privacy mainstays like PGP, used to encrypt email, or the ciphers behind encrypted chat apps like Signal under threat? The experts who spoke to The Intercept don’t think there’s any reason to assume the worst.
“As long as you use long keys and recent-generation hashes, you should be OK,” said Huang. “Even if [WindsorGreen] gave a 100x advantage in cracking strength, it’s a pittance compared to the additional strength conferred by going from say, 1024-bit RSA to 4096-bit RSA or going from SHA-1 to SHA-256.”
Translation: Older encryption methods based on shorter strings of numbers, which are easier to factor, would be more vulnerable, but anyone using the strongest contemporary encryption software (which uses much longer numbers) should still be safe and confident in their privacy.
Still, “there are certainly classes of algorithms that got, wildly guessing, about 100x weaker from a brute force standpoint,” according to Huang, so “this computer’s greatest operational benefit would have come from a combination of algorithmic weakness and brute force. For example, SHA-1, which today is well-known to be too weak, but around the time of 2013 when this computer might have come online, it would have been pretty valuable to be able to ‘routinely’ collide SHA-1 as SHA-1 was still very popular and widely used.”
A third expert in computer architecture and security, who requested anonymity due to the sensitivity of the documents and a concern for their future livelihood, told The Intercept that “most likely, the system is intended for brute-forcing password-protected data,” and that it “might also have applications for things like … breaking older/weaker (1024 bit) RSA keys.” Although there’s no explicit reference to a particular agency in the documents, this expert added, “I’m assuming NSA judging by the obvious use of the system.”
Huang and Koç both speculated that aside from breaking encryption, WindsorGreen could be used to fake the cryptographic signature used to mark software updates as authentic, so that a targeted computer could be tricked into believing a malicious software update was the real thing. For the NSA, getting a target to install software they shouldn’t be installing is about as great as intelligence-gathering gifts come.
The true silver bullet against encryption, a technology that doesn’t just threaten weaker forms of data protection but all available forms, will not be a computer like WindsorGreen, but something that doesn’t exist yet: a quantum computer. In 2014, the Washington Post reported on a Snowden document that revealed the NSA’s ongoing efforts to build a “quantum” computer processor that’s not confined to just ones and zeroes but can exist in multiple states at once, allowing for computing power incomparable to anything that exists today. Luckily for the privacy concerned, the world is still far from seeing a functional quantum computer. Luckily for the NSA and its partners, IBM is working hard on one right now.
Repeated requests for comment sent to over a dozen members of the IBM media relations team were not returned, nor was a request for comment sent to a Department of Defense spokesperson. The NSA declined to comment. GCHQ declined to comment beyond its standard response that all its work “is carried out in accordance with a strict legal and policy framework, which ensures that our activities are authorised, necessary and proportionate, and that there is rigorous oversight.”
Documents
Documents published with this story:
IBM: Pages From WindsorGreen ASIC Status Report 12 07 2012 (from NYU files)
GCHQ: Excerpt from Hpc Overview 1011 (from Snowden files)
0 notes