[10709] in cryptography@c2.net mail archive
Re: Schneier on Bernstein factoring machine
daemon@ATHENA.MIT.EDU (Derek Atkins)
Wed Apr 17 14:30:39 2002
To: Russell Nelson <nelson@crynwr.com>
Cc: cryptography@wasabisystems.com
From: Derek Atkins <derek@ihtfp.com>
Date: 17 Apr 2002 10:51:21 -0400
In-Reply-To: <15549.29533.794267.755437@desk.crynwr.com>
Message-ID: <sjmy9fm9y52.fsf@kikki.mit.edu>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Russell Nelson <nelson@crynwr.com> writes:
> The union of the two sets of "cryptography users" and "paranoid
> people" is necessarily non-empty. Who would bother to use
> cryptography sans a threat model? And if you've got a non-empty
> threat model, then by definition you're paranoid.
I think it's really about degree. I don't agree that having a
non-empty threat model implies you a paranoid.
You could have a threat model of "I don't want my sister or parents to
read this" which is very different than "I don't want the NSA or KGB
to read this". I would certainly call both of these statements a
"non-empty threat model". I would certainly call the latter threat
model "paranoid"; I would NOT call the former threat model paranoid --
I would call it a "normal teenager" :)
-derek
--
Derek Atkins
Computer and Internet Security Consultant
derek@ihtfp.com www.ihtfp.com
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com