[148273] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: [Cryptography] Explaining PK to grandma

daemon@ATHENA.MIT.EDU (Nico Williams)
Tue Nov 26 12:50:18 2013

X-Original-To: cryptography@metzdowd.com
Date: Tue, 26 Nov 2013 11:17:54 -0600
From: Nico Williams <nico@cryptonector.com>
To: Jon Callas <jon@callas.org>
In-Reply-To: <E6758FC9-BD91-428A-ADDC-292C011A3339@callas.org>
Cc: Cryptography Mailing List <cryptography@metzdowd.com>,
	Phillip Hallam-Baker <hallam@gmail.com>, David Mercer <radix42@gmail.com>
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com

On Tue, Nov 26, 2013 at 08:50:16AM -0800, Jon Callas wrote:
> On Nov 26, 2013, at 5:08 AM, Phillip Hallam-Baker <hallam@gmail.com> wrote:
> > I think everyone is barking up the wrong tree here.
> > 
> > How do you explain how the car works to gran? [...]
> 
> Agree totally. It has to be so simple as to be invisible, [...]

But users have to understand the risks [inherent in driving a killing
machine such as a car, or sending sensitive data over any one
transport].

I believe users need to know, and be educated if need be, about scams
(e.g., phishing) and how to recognize when they are at risk.  Some
details necessarily bleed through the abstractions ("cars burn gas").

When I tried out the padlock analogy last yesterday, my audience got the
MITM problem mainly when I mentioned relying on 411 as an online
directory.  Finding analogies that make real risks evident to the
uninitiated is important, provided we can find such analogies of course.

Nico
-- 
_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography

home help back first fref pref prev next nref lref last post