[148760] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

[Cryptography] On Security Architecture, The Panopticon,

daemon@ATHENA.MIT.EDU (ytrezq)
Thu Dec 26 21:16:39 2013

X-Original-To: cryptography@metzdowd.com
Date: Fri, 27 Dec 2013 02:31:16 +0000
From: ytrezq <ytrezq@myopera.com>
To: cryptography@metzdowd.com
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com

About Third Parties --

In the age were all server is going to be hosted in the cloud, security 
is something harder than before. What about setting an HTTPS server if 
the DAAS provider can receive a search warrant for the  silent seizure 
of it's client encryption keys? The solution for this is to secure the 
servers databases and keys in a way they would be encrypted even in RAM!

About making things easy --

Well, I posted an off-topic comment 
here(http://my.opera.com/chooseopera/blog/2013/10/31/important-announcement-about-your-my-opera-account?startidx=1680#comments) 
about a theoretical solution which could work if The RAW Socket API get 
Realsed.
Remember here that tor isn't really for anonymity, but rather than a 
decentralized network which offer 'public' access. Opera 
unite(http://my.opera.com/addons/blog/2012/04/24/sunsetting-unite-and-widgets?startidx=350#comments) 
was a solution where Opera software controlled the proxy responsible for 
real public access when they shut-downed it many users realized setting 
up an FTP server was hard and making it public without IPV6 was harder. 
Nobody talked about key generations in the comments of the shut-down page.
_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography

home help back first fref pref prev next nref lref last post