[148760] in cryptography@c2.net mail archive
[Cryptography] On Security Architecture, The Panopticon,
daemon@ATHENA.MIT.EDU (ytrezq)
Thu Dec 26 21:16:39 2013
X-Original-To: cryptography@metzdowd.com
Date: Fri, 27 Dec 2013 02:31:16 +0000
From: ytrezq <ytrezq@myopera.com>
To: cryptography@metzdowd.com
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com
About Third Parties --
In the age were all server is going to be hosted in the cloud, security
is something harder than before. What about setting an HTTPS server if
the DAAS provider can receive a search warrant for the silent seizure
of it's client encryption keys? The solution for this is to secure the
servers databases and keys in a way they would be encrypted even in RAM!
About making things easy --
Well, I posted an off-topic comment
here(http://my.opera.com/chooseopera/blog/2013/10/31/important-announcement-about-your-my-opera-account?startidx=1680#comments)
about a theoretical solution which could work if The RAW Socket API get
Realsed.
Remember here that tor isn't really for anonymity, but rather than a
decentralized network which offer 'public' access. Opera
unite(http://my.opera.com/addons/blog/2012/04/24/sunsetting-unite-and-widgets?startidx=350#comments)
was a solution where Opera software controlled the proxy responsible for
real public access when they shut-downed it many users realized setting
up an FTP server was hard and making it public without IPV6 was harder.
Nobody talked about key generations in the comments of the shut-down page.
_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography