[148733] in cryptography@c2.net mail archive
Re: [Cryptography] Serious paranoia...
daemon@ATHENA.MIT.EDU (Bill Cox)
Thu Dec 26 13:42:10 2013
X-Original-To: cryptography@metzdowd.com
In-Reply-To: <1539807291.20131225122537@gmail.com>
Date: Thu, 26 Dec 2013 08:48:11 -0500
From: Bill Cox <waywardgeek@gmail.com>
To: "cryptography@metzdowd.com" <cryptography@metzdowd.com>
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com
--===============4668034254957461051==
Content-Type: multipart/alternative; boundary=089e0111c09a7c198404ee703a42
--089e0111c09a7c198404ee703a42
Content-Type: text/plain; charset=ISO-8859-1
I regret using "lame" and "crazy rant". I apologize for that. I'll try to
be less inflammatory going forward. I am glad some people responded
seriously about the "shill" question. I didn't know if there would be
several others who felt there seem to be shills now and then or not. The
answer seems to be not many, and I appreciate that answer.
You said, "there is a lot to fear about scrypt" and that kind of statement
sets of my spidey senses. You also said, "one could also ask how safe it
is to sprinkle the secret all over the RAM." I assume you made that
statement knowing that scrypt calls PBKDF2_SHA256 on the password as it's
first step, and "the secret" will be interpreted by most readers as the
password rather than it's hash. Now many of the new poorly informed
readers like me that have joined this list after the Snowden leaks may be
misinformed about scrypt, fearing that it spreads the plaintext password
all over RAM. You probably did that unintentionally, but that's exactly
the sort of thing I suspect the NSA would want.
What scares me is the nearly useless (against custom hardware attacks)
hard-coded key stretching in the tools that protect most of us. When you
turned my question about why we don't properly protect our passwords to a
discussion of why should fear scrypt, I suspected a shill. Sorry about
that. The title of this thread is "serious paranoia" after all. After the
Snowden leaks, just how paranoid should we be?
I suspect the moderators have allowed non-technical discussions like this
in light of the Snowden revelations. There are some serious expert crypto
guys on this list, and I appreciate that some of them are taking the time
to answer these sorts of questions.
By the way, I like the word "dork" because of this Dilbert series:
http://search.dilbert.com/comic/Dorkage
I'll try and find some other way to describe people who are likely not
aware that they are misleading the public.
--089e0111c09a7c198404ee703a42
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable
<div dir=3D"ltr">I regret using "lame" and "crazy rant"=
. =A0I apologize for that. =A0I'll try to be less inflammatory going fo=
rward. =A0I am glad some people responded seriously about the "shill&q=
uot; question. =A0I didn't know if there would be several others who fe=
lt there seem to be shills now and then or not. =A0The answer seems to be n=
ot many, and I appreciate that answer.<br>
<br>You said, "there is a lot to fear about scrypt" and that kind=
of statement sets of my spidey senses. =A0You also said, "one could a=
lso ask how safe it is to sprinkle the secret all over the RAM." =A0I =
assume you made that statement knowing that scrypt calls=A0PBKDF2_SHA256 on=
the password as it's first step, and "the secret" will be in=
terpreted by most readers as the password rather than it's hash. =A0Now=
many of the new poorly informed readers like me that have joined this list=
after the Snowden leaks may be misinformed about scrypt, fearing that it s=
preads the plaintext password all over RAM. =A0You probably did that uninte=
ntionally, but that's exactly the sort of thing I suspect the NSA would=
want.<div>
<br></div><div>What scares me is the nearly useless (against custom hardwar=
e attacks) hard-coded key stretching in the tools that protect most of us. =
=A0When you turned my question about why we don't properly protect our =
passwords to a discussion of why should fear scrypt, I suspected a shill. =
=A0Sorry about that. =A0The title of this thread is "serious paranoia&=
quot; after all. =A0After the Snowden leaks, just how paranoid should we be=
?<div>
<br></div><div><div>I suspect the moderators have allowed non-technical dis=
cussions like this in light of the Snowden revelations. =A0There are some s=
erious expert crypto guys on this list, and I appreciate that some of them =
are taking the time to answer these sorts of questions.</div>
</div></div><div><br></div><div>By the way, I like the word "dork"=
; because of this Dilbert series:</div><div><br></div><div><a href=3D"http:=
//search.dilbert.com/comic/Dorkage">http://search.dilbert.com/comic/Dorkage=
</a><br>
</div><div><br></div><div>I'll try and find some other way to describe =
people who are likely not aware that they are misleading the public.</div><=
/div>
--089e0111c09a7c198404ee703a42--
--===============4668034254957461051==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography
--===============4668034254957461051==--