The entire idea of prism is hitting tier 1 providers and mass communications providers. If they haven't rooted your exchange gear, they don't need to - your upstream providers entire stream is being copied. I can't think of many providers that couldn't be intercepted. When new transportation mediums arrive, who cares.. You already have a copy from their provider or peer. Sent from my Mobile Device. -------- Original message -------- From: ryangard@gmail.com Date: 07/12/2013 8:52 PM (GMT-08:00) To: Cc: nanog@nanog.org Subject: Re: Office 365..? how Microsoft handed the NSA access to encrypted messages It wouldn't be. When the endpoint in question is compromised, there isn't any amount of tunneling or obscurity between point a and point b that will resolve it. Only thing you can do is change to a solution that you have more control over. Sent on the TELUS Mobility network with BlackBerry -----Original Message----- From: Warren Bailey <wbailey@satelliteintelligencegroup.com> Date: Sat, 13 Jul 2013 00:12:37 To: Nick Khamis<symack@gmail.com>; Justin M. Streiner<streiner@cluebyfour.org> Reply-To: Warren Bailey <wbailey@satelliteintelligencegroup.com> Cc: nanog@nanog.org<nanog@nanog.org> Subject: Re: Office 365..? how Microsoft handed the NSA access to encrypted messages That doesn't sound like it would be effective in this instance? Sent from my Mobile Device. -------- Original message -------- From: Nick Khamis <symack@gmail.com> Date: 07/12/2013 1:06 PM (GMT-08:00) To: "Justin M. Streiner" <streiner@cluebyfour.org> Cc: nanog@nanog.org Subject: Re: Office 365..? how Microsoft handed the NSA access to encrypted messages We are currently working on something right now where all connections are doing over an encrypted vpn. We are bringing SIP, email, search, and cloud to the tunnel. You can contact me off list if you would like to know more. Nick Khamis