[149084] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: [Cryptography] Boing Boing pushing an RSA Conference boycott

daemon@ATHENA.MIT.EDU (Kent Borg)
Thu Jan 16 09:19:39 2014

X-Original-To: cryptography@metzdowd.com
Date: Thu, 16 Jan 2014 08:48:12 -0500
From: Kent Borg <kentborg@borg.org>
To: cryptography@metzdowd.com
In-Reply-To: <2A0EFB9C05D0164E98F19BB0AF3708C711E91F9ED0@USMBX1.msg.corp.akamai.com>
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com

This is a multi-part message in MIME format.
--===============6921491475811866409==
Content-Type: multipart/alternative;
 boundary="------------030108040303000905010706"

This is a multi-part message in MIME format.
--------------030108040303000905010706
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit

On 01/15/2014 03:33 PM, Salz, Rich wrote:
> Agree. So why is a boycott a good thing? Why punish someone for being 
> tricked? (Not specifically directed to Ian). It seems to me the better 
> object lesson is one of the strongest cryptography companies in the 
> world (at the time) was tricked into possibly making many of their 
> customers vulnerable. How can we move forward from this?

I want everyone to see blood (figuratively), and be afraid.  For their 
jobs, for their reputations.

Every few minutes some other business has a data breach, and it seems 
their big worry is always publicity ("Can we kill a messenger?").  Let's 
up the stakes.  I want to see a little operant conditioning, apply some 
pain to mistakes, and see people trying to avoid being part of blunders.

Security doesn't sell, let's at least make security blunders cost.

RSA needs to be seen as having paid dearly for their very bad mistake.  
People in corporations need to be able to invoke "RSA" and have others 
shudder.  I don't care if others have also done bad things, I want RSA 
made an example.  How much worse could they have behaved?  Make an 
example of them.

How much money did EMC pay for RSA?  I want EMC (and others) to see that 
a purchase can be destroyed if they misbehave and just cash the big 
check.  Did EMC managers encourage them to be profitable, praise them 
for the nice haul?  I think we can assume "yes".  Did EMC put /any/ real 
effort into policing RSA's integrity?  We don't know, but I guess "not 
really"; clearly it was not enough.  Make EMC pay for that.

Security doesn't sell.  At least make security blunders cost.

-kb


--------------030108040303000905010706
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit

<html>
  <head>
    <meta content="text/html; charset=ISO-8859-1"
      http-equiv="Content-Type">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    <div class="moz-cite-prefix">On 01/15/2014 03:33 PM, Salz, Rich
      wrote:<br>
    </div>
    <blockquote
cite="mid:2A0EFB9C05D0164E98F19BB0AF3708C711E91F9ED0@USMBX1.msg.corp.akamai.com"
      type="cite">
      Agree. So why is a boycott a good thing? Why punish someone for
      being tricked? (Not specifically directed to Ian). It seems to me
      the better object lesson is one of the strongest cryptography
      companies in the world (at the time) was tricked into possibly
      making many of their customers vulnerable. How can we move forward
      from this?</blockquote>
    <br>
    I want everyone to see blood (figuratively), and be afraid.&nbsp; For
    their jobs, for their reputations.<br>
    <br>
    Every few minutes some other business has a data breach, and it
    seems their big worry is always publicity ("Can we kill a
    messenger?").&nbsp; Let's up the stakes.&nbsp; I want to see a little operant
    conditioning, apply some pain to mistakes, and see people trying to
    avoid being part of blunders.<br>
    <br>
    Security doesn't sell, let's at least make security blunders cost.<br>
    <br>
    RSA needs to be seen as having paid dearly for their very bad
    mistake.&nbsp; People in corporations need to be able to invoke "RSA" and
    have others shudder.&nbsp; I don't care if others have also done bad
    things, I want RSA made an example.&nbsp; How much worse could they have
    behaved?&nbsp; Make an example of them.&nbsp; <br>
    <br>
    How much money did EMC pay for RSA?&nbsp; I want EMC (and others) to see
    that a purchase can be destroyed if they misbehave and just cash the
    big check.&nbsp; Did EMC managers encourage them to be profitable, praise
    them for the nice haul?&nbsp; I think we can assume "yes".&nbsp; Did EMC put <i>any</i>
    real effort into policing RSA's integrity?&nbsp; We don't know, but I
    guess "not really"; clearly it was not enough.&nbsp; Make EMC pay for
    that.&nbsp; <br>
    <br>
    Security doesn't sell.&nbsp; At least make security blunders cost.<br>
    <br>
    -kb<br>
    <br>
  </body>
</html>

--------------030108040303000905010706--

--===============6921491475811866409==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography
--===============6921491475811866409==--

home help back first fref pref prev next nref lref last post