[146874] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: [Cryptography] In the face of "cooperative" end-points,

daemon@ATHENA.MIT.EDU (james hughes)
Sun Sep 8 23:53:06 2013

X-Original-To: cryptography@metzdowd.com
In-reply-to: <585B8075-A2B8-4D12-80E4-45C21F8C3D71@lrw.com>
From: james hughes <hughejp@mac.com>
Date: Sun, 08 Sep 2013 20:45:32 -0700
To: Jerry Leichter <leichter@lrw.com>
Cc: "Marcus D. Leech" <mleech@ripnet.com>,
	"cryptography@metzdowd.com" <cryptography@metzdowd.com>
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com


--===============0308251246909373783==
Content-transfer-encoding: 7bit
Content-type: multipart/alternative;
 boundary=Apple-Mail-AAD5878D-A65D-4E63-801B-6F0DE01CF36C


--Apple-Mail-AAD5878D-A65D-4E63-801B-6F0DE01CF36C
Content-Type: text/plain;
	charset=us-ascii
Content-Transfer-Encoding: quoted-printable



On Sep 8, 2013, at 1:47 PM, Jerry Leichter <leichter@lrw.com> wrote:

> On Sep 8, 2013, at 3:51 PM, Perry E. Metzger wrote:
>>=20
>> In summary, it would appear that the most viable solution is to make
>> the end-to-end encryption endpoint a piece of hardware the user owns
>> (say the oft mentioned $50 Raspberry Pi class machine on their home
>> net) and let the user interact with it over an encrypted connection
>> (say running a normal protocol like Jabber client to server
>> protocol over TLS, or IMAP over TLS, or https: and a web client.)
>>=20
>> It is a compromise, but one that fits with the usage pattern almost
>> everyone has gotten used to. It cannot be done with the existing
>> cloud model, though -- the user needs to own the box or we can't
>> simultaneously maintain current protocols (and thus current clients)
>> and current usage patterns.

> I don't see how it's possible to make any real progress within the existin=
g cloud model, so I'm with you 100% here.  (I've said the same earlier.)

Could cloud computing be a red herring? Banks and phone companies all give u=
p personal information to governments (Verizon?) and have been doing this lo=
ng before and long after cloud computing was a fad. Transport encryption (re=
gardless of its security) is no solution either.=20

The fact is, to do business, education, health care, you need to share sensi=
tive information. There is no technical solution to this problem. Shared dat=
a is shared data. This is arguably the same as the analogue gap between cont=
ent protected media and your eyes and ears. Encryption is not a solution whe=
n the data needs to be shared with the other party in the clear.=20

I knew a guy one that quipped "link encryptors are iron pipes rats run throu=
gh".=20

If compromised end points are your threat model, cloud computing is not your=
 problem.=20

The only solution is the Ted Kazinski technology rejection principal (as lon=
g as you also kill your brother).




--Apple-Mail-AAD5878D-A65D-4E63-801B-6F0DE01CF36C
Content-Type: text/html;
	charset=utf-8
Content-Transfer-Encoding: quoted-printable

<html><head><meta http-equiv=3D"content-type" content=3D"text/html; charset=3D=
utf-8"></head><body dir=3D"auto"><span style=3D"-webkit-text-size-adjust: au=
to; background-color: rgba(255, 255, 255, 0);"><br><br>On Sep 8, 2013, at 1:=
47 PM, Jerry Leichter &lt;<a href=3D"mailto:leichter@lrw.com" x-apple-data-d=
etectors=3D"true" x-apple-data-detectors-type=3D"link" x-apple-data-detector=
s-result=3D"1">leichter@lrw.com</a>&gt; wrote:<br><br></span><blockquote typ=
e=3D"cite"><font color=3D"#000000"><span style=3D"-webkit-text-size-adjust: a=
uto; background-color: rgba(255, 255, 255, 0);">On Sep 8, 2013, at 3:51 PM, P=
erry E. Metzger wrote:</span></font></blockquote><blockquote type=3D"cite"><=
blockquote type=3D"cite"><font color=3D"#000000"><span style=3D"-webkit-text=
-size-adjust: auto; background-color: rgba(255, 255, 255, 0);"><br></span></=
font></blockquote></blockquote><blockquote type=3D"cite"><blockquote type=3D=
"cite"><font color=3D"#000000"><span style=3D"-webkit-text-size-adjust: auto=
; background-color: rgba(255, 255, 255, 0);">In summary, it would appear tha=
t the most viable solution is to make<br></span></font></blockquote></blockq=
uote><blockquote type=3D"cite"><blockquote type=3D"cite"><font color=3D"#000=
000"><span style=3D"-webkit-text-size-adjust: auto; background-color: rgba(2=
55, 255, 255, 0);">the end-to-end encryption endpoint a piece of hardware th=
e user owns<br></span></font></blockquote></blockquote><blockquote type=3D"c=
ite"><blockquote type=3D"cite"><font color=3D"#000000"><span style=3D"-webki=
t-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);">(say th=
e oft mentioned $50 Raspberry Pi class machine on their home<br></span></fon=
t></blockquote></blockquote><blockquote type=3D"cite"><blockquote type=3D"ci=
te"><font color=3D"#000000"><span style=3D"-webkit-text-size-adjust: auto; b=
ackground-color: rgba(255, 255, 255, 0);">net) and let the user interact wit=
h it over an encrypted connection<br></span></font></blockquote></blockquote=
><blockquote type=3D"cite"><blockquote type=3D"cite"><font color=3D"#000000"=
><span style=3D"-webkit-text-size-adjust: auto; background-color: rgba(255, 2=
55, 255, 0);">(say running a normal protocol like Jabber client to server<br=
></span></font></blockquote></blockquote><blockquote type=3D"cite"><blockquo=
te type=3D"cite"><font color=3D"#000000"><span style=3D"-webkit-text-size-ad=
just: auto; background-color: rgba(255, 255, 255, 0);">protocol over TLS, or=
 IMAP over TLS, or https: and a web client.)<br></span></font></blockquote><=
/blockquote><blockquote type=3D"cite"><blockquote type=3D"cite"><font color=3D=
"#000000"><span style=3D"-webkit-text-size-adjust: auto; background-color: r=
gba(255, 255, 255, 0);"><br></span></font></blockquote></blockquote><blockqu=
ote type=3D"cite"><blockquote type=3D"cite"><font color=3D"#000000"><span st=
yle=3D"-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255,=
 0);">It is a compromise, but one that fits with the usage pattern almost<br=
></span></font></blockquote></blockquote><blockquote type=3D"cite"><blockquo=
te type=3D"cite"><font color=3D"#000000"><span style=3D"-webkit-text-size-ad=
just: auto; background-color: rgba(255, 255, 255, 0);">everyone has gotten u=
sed to. It cannot be done with the existing<br></span></font></blockquote></=
blockquote><blockquote type=3D"cite"><blockquote type=3D"cite"><font color=3D=
"#000000"><span style=3D"-webkit-text-size-adjust: auto; background-color: r=
gba(255, 255, 255, 0);">cloud model, though -- the user needs to own the box=
 or we can't<br></span></font></blockquote></blockquote><blockquote type=3D"=
cite"><blockquote type=3D"cite"><font color=3D"#000000"><span style=3D"-webk=
it-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);">simult=
aneously maintain current protocols (and thus current clients)<br></span></f=
ont></blockquote></blockquote><blockquote type=3D"cite"><blockquote type=3D"=
cite"><font color=3D"#000000"><span style=3D"-webkit-text-size-adjust: auto;=
 background-color: rgba(255, 255, 255, 0);">and current usage patterns.</spa=
n></font></blockquote></blockquote><span style=3D"-webkit-text-size-adjust: a=
uto; background-color: rgba(255, 255, 255, 0);"><br></span><blockquote type=3D=
"cite"><font color=3D"#000000"><span style=3D"-webkit-text-size-adjust: auto=
; background-color: rgba(255, 255, 255, 0);">I don't see how it's possible t=
o make any real progress within the existing cloud model, so I'm with you 10=
0% here. &nbsp;(I've said the same earlier.)</span></font></blockquote><span=
 style=3D"-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 2=
55, 0);"><br>Could cloud computing be a red herring? Banks and phone compani=
es all give up personal information to governments (Verizon?) and have been d=
oing this long before and long after cloud computing was a fad.&nbsp;Transpo=
rt encryption (regardless of its security) is no solution either.&nbsp;<br><=
br>The fact is, to do business, education, health care, you need to share se=
nsitive information. There is no technical solution to this problem. Shared d=
ata is shared data. This is arguably the same as the analogue gap between co=
ntent protected media and your eyes and ears. Encryption is not a solution w=
hen the data needs to be shared with the other party in the clear.&nbsp;<br>=
<br>I knew a guy one that quipped "link encryptors are iron pipes rats run t=
hrough".&nbsp;<br><br>If compromised end points are your threat model, cloud=
 computing is not your problem.&nbsp;</span><div><span style=3D"-webkit-text=
-size-adjust: auto; background-color: rgba(255, 255, 255, 0);"><br></span></=
div><div><span style=3D"-webkit-text-size-adjust: auto; background-color: rg=
ba(255, 255, 255, 0);">The only solution is the Ted Kazinski technology reje=
ction principal (as long as you also kill your brother).<br><br><br></span><=
span style=3D"-webkit-tap-highlight-color: rgba(26, 26, 26, 0.292969); -webk=
it-composition-fill-color: rgba(175, 192, 227, 0.230469); -webkit-compositio=
n-frame-color: rgba(77, 128, 180, 0.230469); -webkit-text-size-adjust: auto;=
"></span><br style=3D"-webkit-tap-highlight-color: rgba(26, 26, 26, 0.296875=
); -webkit-composition-fill-color: rgba(175, 192, 227, 0.230469); -webkit-co=
mposition-frame-color: rgba(77, 128, 180, 0.230469); "></div></body></html>=

--Apple-Mail-AAD5878D-A65D-4E63-801B-6F0DE01CF36C--

--===============0308251246909373783==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography
--===============0308251246909373783==--

home help back first fref pref prev next nref lref last post