[148330] in cryptography@c2.net mail archive
Re: [Cryptography] Explaining PK to grandma
daemon@ATHENA.MIT.EDU (dan@geer.org)
Sat Nov 30 23:07:02 2013
X-Original-To: cryptography@metzdowd.com
From: dan@geer.org
To: jamesd@echeque.com
In-Reply-To: Your message of "Thu, 28 Nov 2013 14:32:35 +1000."
<5296C763.1000703@echeque.com>
Date: Sat, 30 Nov 2013 22:14:13 -0500
Cc: cryptography@metzdowd.com
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com
"James A. Donald" writes:
| On 2013-11-28 07:39, Phillip Hallam-Baker wrote:
| > The NSA can't compromise every endpoint without being noticed.
|
| For defending against NSA, we don't really have to prevent active
| attacks. We merely have to make it reasonably feasible for the
| seriously sophisticated paranoid to have a chance of detecting active
| attacks.
|
| If very powerful adversary gets observed observing, it loses, since the
| information is valuable to its adversaries.
|
| The guy in Nigeria, on the other hand, will have no hesitation in
| committing active attacks and will not much worry even if a very large
| proportion of them get detected.
+1
Absolutely correct.
--dan
_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography