[10709] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Schneier on Bernstein factoring machine

daemon@ATHENA.MIT.EDU (Derek Atkins)
Wed Apr 17 14:30:39 2002

To: Russell Nelson <nelson@crynwr.com>
Cc: cryptography@wasabisystems.com
From: Derek Atkins <derek@ihtfp.com>
Date: 17 Apr 2002 10:51:21 -0400
In-Reply-To: <15549.29533.794267.755437@desk.crynwr.com>
Message-ID: <sjmy9fm9y52.fsf@kikki.mit.edu>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii

Russell Nelson <nelson@crynwr.com> writes:

> The union of the two sets of "cryptography users" and "paranoid
> people" is necessarily non-empty.  Who would bother to use
> cryptography sans a threat model?  And if you've got a non-empty
> threat model, then by definition you're paranoid.

I think it's really about degree.  I don't agree that having a
non-empty threat model implies you a paranoid.

You could have a threat model of "I don't want my sister or parents to
read this" which is very different than "I don't want the NSA or KGB
to read this".  I would certainly call both of these statements a
"non-empty threat model".  I would certainly call the latter threat
model "paranoid"; I would NOT call the former threat model paranoid --
I would call it a "normal teenager" :)

-derek

-- 
       Derek Atkins
       Computer and Internet Security Consultant
       derek@ihtfp.com             www.ihtfp.com

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com

home help back first fref pref prev next nref lref last post