[148330] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: [Cryptography] Explaining PK to grandma

daemon@ATHENA.MIT.EDU (dan@geer.org)
Sat Nov 30 23:07:02 2013

X-Original-To: cryptography@metzdowd.com
From: dan@geer.org
To: jamesd@echeque.com
In-Reply-To: Your message of "Thu, 28 Nov 2013 14:32:35 +1000."
	<5296C763.1000703@echeque.com>
Date: Sat, 30 Nov 2013 22:14:13 -0500
Cc: cryptography@metzdowd.com
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com


"James A. Donald" writes:
 | On 2013-11-28 07:39, Phillip Hallam-Baker wrote:
 | > The NSA can't compromise every endpoint without being noticed.
 | 
 | For defending against NSA, we don't really have to prevent active 
 | attacks.  We merely have to make it reasonably feasible for the 
 | seriously sophisticated paranoid to have a chance of detecting active 
 | attacks.
 | 
 | If very powerful adversary gets observed observing, it loses, since the 
 | information is valuable to its adversaries.
 | 
 | The guy in Nigeria, on the other hand, will have no hesitation in 
 | committing active attacks and will not much worry even if a very large 
 | proportion of them get detected.

+1

Absolutely correct.

--dan

_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography

home help back first fref pref prev next nref lref last post