[146453] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: [Cryptography] Separating concerns

daemon@ATHENA.MIT.EDU (Phill)
Wed Aug 28 14:37:49 2013

X-Original-To: cryptography@metzdowd.com
From: Phill <hallam@gmail.com>
In-Reply-To: <CAN7nBXdXjG3Haw49DJ=hp+HdROE7R7soNK_Cj=hX4RYhZv7mLA@mail.gmail.com>
Date: Wed, 28 Aug 2013 14:31:05 -0400
To: =?windows-1252?Q?Far=E9?= <fahree@gmail.com>
Cc: "cryptography@metzdowd.com" <cryptography@metzdowd.com>
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com


On Aug 28, 2013, at 2:04 PM, Far=E9 <fahree@gmail.com> wrote:

> On Wed, Aug 28, 2013 at 4:15 PM, Phill <hallam@gmail.com> wrote:
>> My target audience, like Perry's is people who simply can't cope with an=
ything more complex than an email address. For me secure mail has to look f=
eel and smell exactly the same as current mail. The only difference being t=
hat sometime the secure mailer will say 'I can't contact that person secure=
ly right now because=85'
>> =

> I agree with Perry and Phill that email experience should be
> essentially undisturbed in the normal case, though it's OK to add an
> additional authorization step.
> =

> One thing that irks me, though, is the problem of the robust, secure
> terminal: if everything is encrypted, how does one survive the
> loss/theft/destruction of a computer or harddrive? I'm no ignoramus,
> yet I have, several times, lost data I cared about due to hardware
> failure or theft combined with improper backup. How is a total newbie
> to do?

You have to have key backup to address that security goal. And that will ne=
cessarily mean that you increase your coercion risk. And which security goa=
l you choose to satisfy is likely to depend on your situation.

One solution would be to back up your private key and put the shares in one=
 or more bank safes. But then you are vulnerable to a coercion attack on yo=
ur bank. Which you can address by putting the shares in a tamper evident ba=
g but only if you go to the bank regularly to audit it.


One of the features of this problem is that if you make absolute security a=
 requirement you are going to go absolutely potty trying to solve every ele=
ment. Fortunately we can still do a lot of good by providing a system that =
prevents wholesale abuses.

I am not a crypto-absolutist. I don't particularly want to be giving crypto=
 to terrorists. When I was 18 I woke up to hear that the IRA had attempted =
to murder my cousin. =


However I don't want to be giving intercept power to Putin who murders peop=
le with poisoned teapots on the streets of London either. And I certainly d=
on't trust the NSA and GCHQ with the wholesale intercept capability reveale=
d by Snowden.


> Most newbies rely on things surviving despite their lack of explicit
> caution. Currently, they do it by basically trusting Google or some
> other company with their mail. Whichever way you do things to make
> them responsible for keys will lead to either (1) failure because it's
> technically too hard, and/or (2) automated attacks on the weak point
> that handles things for them.

And for a company it is almost certain that 'secure against intercept by an=
y government other than the US' is an acceptable solution.


> That's a lot of yak to shave to provide end-users (or even average
> geeks) with seemless secure email.


I am currently working on a podcast history of the web to publicize my expe=
rt witness practice. Which had me looking at the reason Tim Berners Lee suc=
ceeded where Ted failed. The thing that distinguished their efforts was not=
 the problems they solved. Ted had 120% of the Web ten years before Tim sta=
rted.

The difference was that Tim realized that some of the problems were very ha=
rd and could be punted on for a first draft. Then after the Web took off it=
 built out infrastructure that made it possible for others to fill in the g=
aps. So Ted had search built in. Tim had a hole which was filled by others.


_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography

home help back first fref pref prev next nref lref last post