[15092] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Difference between TCPA-Hardware and a smart card (was: example:

daemon@ATHENA.MIT.EDU (bear)
Mon Dec 29 19:03:01 2003

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Mon, 29 Dec 2003 13:24:29 -0800 (PST)
From: bear <bear@sonic.net>
To: Seth David Schoen <schoen@loyalty.org>
Cc: Antonomasia <ant@notatla.org.uk>, cme@acm.org,
	cryptography@metzdowd.com
In-Reply-To: <20031223215339.GB7556@zork.net>



On Tue, 23 Dec 2003, Seth David Schoen wrote:

>When attestation is used, it likely will be passed in a service like
>HTTP, but in a documented way (for example, using a protocol based on
>XML-RPC).  There isn't really any security benefit obtained by hiding
>the content of the attestation _from the party providing it_!

It's not the parties who are interested in security alone we're worried
about.  There is an advantage in profiling and market research, so I
expect anyone able to effectively subvert the protocols to attempt
to hide the content of remote attestataion.

				Bear

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post