The July/August issue of acmqueue is out now
The recent exposure of the
Several
The privacy of some strata of the population has been restricted. In many
Many employees sign away most of their rights to privacy while "on the clock," up to and including accepting
Any person can have the right to privacy removed through whatever passes for judicial oversight in their country of residence, so that authorities can confirm or deny a suspicion of illegal activities. People in a foreign country may not have any right to privacy. Depriving them of their privacy is called "espionage," a fully legal and usually
This follows directly from the first two points: if a
Widely available, practically unbreakable cryptography drastically changed the balance of power, and the 9/11 terrorist attack in New York City 12 years ago acted as a catalyst throughout the world for stronger investigative powers that would allow plans for terrorist activity to be discovered before they could be carried out.
Skype offers an interesting insight into just how far a
To me, as an experienced eBay user, that explanation didn't make any sense at all, certainly not for the kinds of goods I usually
Then some weird rumors started to circulate: eBay had bought Skype without the source code and regretted the purchase. There seemed to be something to those rumors, because eBay sold Skype back to the founder, for a lot less money.
Head scratching now became a serious risk of baldness for people trying to keep track, because then Microsoft bought Skype for a pile of money, and this time the purchase included the source code. Then Microsoft changed the architecture: it centralized Skype so that all Skype conversations would go through a Microsoft server somewhere in the world. At this point human rights activists who had relied on Skype for a clear channel out of oppressive regimes started to worry.
Some may speculate that the disclosures by former NSA (National Security Agency) contractor Edward Snowden seem to support the theory that Microsoft bought Skype to give the NSA access to the unencrypted conversations through Skype, although we don't know if that's the case, nor what NSA paid for Microsoft's assistance if so.
With expenditures of this scale, there are a whole host of things one could buy to weaken encryption. I would contact providers of popular cloud and
In the long run, nobody is going to notice that the symmetric keys are not
Major
Building backdoors into computing devices goes without saying. Consider the
No, I don't trust my smartphone with any secrets.
You could also hire a bunch of good programmers, pay them to get deeply involved in open source projects, and have them sneak vulnerabilities into the source code. Here is how the result could look:
In September 2006, somebody pointed out that Valgrind complained about a particular code line and managed to get it removed from the Debian version of OpenSSL. Only two years later did somebody realize that this reduces the initial randomness available to the cryptographic functions to almost nothing: a paltry 32,000 different states.1
As spymaster, I would have handed out a bonus: weakening cryptographic key selection makes
Open source projects are built on trust, and these days they are barely conscious of national borders and largely unaffected by any
To an intelligence agency, a
As long as politics trumps encryption, fighting the battle for privacy with encryption is a losing proposition. In the past quarter century, international trade agreements have been the big thing: free movement of goods across borders and oceans, to the mutual benefit of all parties.
I guess we all assumed that information and privacy rights would receive the same mutual respect as property rights did in these agreements, but we were wrong.
We can all either draw our cloud services back home or deal only with companies subject to the same jurisdiction as
Another option is to give privacy rights the same protection as property rights in trade agreements, up to and including economic retaliation if a
The only surefire way to gain back our privacy is also the least likely: the citizens of all nation- states must empower politicians who will defund and dismantle the espionage machinery and instead rely on international cooperation to expose and prevent terrorist activity.
It is important to recognize that there will be no
There will also always be a role for encryption, for
1. Schneier, B. 2008. Random number bug in Debian Linux. Schneier on Security blog; http://www.schneier.com/blog/archives/2008/05/random_number_b.html.
LOVE IT, HATE IT? LET US KNOW [email protected]
Poul-Henning Kamp([email protected]) is one of the primary developers of the FreeBSD operating system, which he has worked on from the very beginning. He is widely unknown for his
© 2013 ACM
![]()
Originally published in Queue vol. 11, no. 7—
see this item in the ACM Digital Library
Meng-Day (Mandel) Yu, Srinivas Devadas - Pervasive, Dynamic Authentication of Physical Items
The use of silicon PUF circuits
Nicholas Diakopoulos - Accountability in Algorithmic Decision-making
A view from computational journalism
Olivia Angiuli, Joe Blitzstein, Jim Waldo - How to De-identify Your Data
Balancing statistical accuracy and subject privacy in large social-science data sets
Jim Waldo, Alan Ramos, Weina Scott, William Scott, Doug Lloyd, Katherine O'Leary - A Threat Analysis of RFID Passports
Do RFID passports make us vulnerable to identity theft?
(newest first)
Displaying 10 most recent comments. Read the full list here>What good does any encryption do you, if you get detained and told to hand over your passwords or be thrown in jail ?
It will eventually do the same good that Rosa Parks refusing to give up her seat on the bus did, despite the fact that she was immediately arrested and hauled off to jail. If she had given up her seat and gone home to write letters to her senators and congressmen, her grandchildren might still be sitting in the back of the bus to this very day.
The same good that all of Gandhi's protests did, despite the fact that there was always a troop of British soldiers right there to club the protesters down and haul him off to jail. If he had spent his days writing letters to the queen asking her for redress of his grievances, the British would have stayed until they had stripped India bare of every resource, right down to the top soil.
This is not politics, this is a struggle. If you really think the national security state is going to give up the immense power it has accrued just because people ask them kindly to stop, you are a complete... I better not say it. If people resist and make it difficult for the government to get what they want without use of force, there will be injustices and outrage, and eventually we will win. If we go on dumping the entirety of our lives onto the cloud and signing online petitions asking them to please remember their oaths to protect the constitution, they will eventually chip away our rights until there is nothing left.
This site or someone on the internet invalidates my signed messages.
The problem with "cloud" providers is that they are a man-in-the-middle accumulating massive amounts of data. So they are a sitting duck for the NSA - no warrants necessary, all data aggregated in one place and hugely simpler than trying to individually going after millions of end users.
This is why encryption *is* important. Client-side encryption allows end-users to protect their own data (with encryption) and control who has access to it (with keys). Fundamentally, your data on someone else's disk isn't yours, but your encrypted data on someone else's disk isn't theirs either.
Note that the essence here is file-level encryption controlled by the end-user. It isn't about link encryption (SSL) or storage encryption (disk) which is what most cloud providers tout. They do this to deflect attention from their business model which is to centralise all power and control "server-side".
Thankfully, emerging companies (such as Lockbox www.lock-box.com) empower users to do all their own encryption/decryption and key management client-side. When all the keys and encryption/decryption is client-side, the cloud is "blind" to all (encrypted) data being stored and shared and thus removes all the usual cloud risks of hackers, rogue administrators, complicit third parties and prying governments. Using Lockbox as the example, the NSA is pretty stuffed - no keys (they are client-side), no ciphertext (users can store their data in any S3 server worldwide) and no access to the application (which comes out of Australia).
Have you ever done this for all the services you're currently using on the web ? If the response is "no", then you understand the problem of trust that we've been having with mandatory encryption forever.
What I'm noticing as a user is that I'm getting more and more bad cert warnings. This never ever happened 10 years ago. Now there is a trend of enforcing https everywhere and many sites don't care enough about their certs, or use CAs that are not known in any-but-the-very-latest-browser, etc... In the end, I'm still finding myself to click on the certs details all the day but I know many people who blindly click on the proper buttons without even thinking about it. What we're doing is just to incite users to ignore security for non-important things and get used to this. We should only annoy the user when there is a compelling reason for doing so. It's the same principle as the noisy alarms we can hear all the day in large cities. Who cares anymore about a ringing alarm ? Once in a while it might be a real one though but it remains ignored or unnoticed... A good example how excess of security reduces security.
Someone used the analogy with locks. I can go further : right now you have a lock on your door and this is required by your insurance company. If your doorlock doesn't work well, you'll run to the store to buy another one and replace it. Now imagine that your insurance company requires a properly working lock on each and every window and door *inside* your house in exchange for a much cheaper insurance price. You end up with 20 locks in your house that will constantly have to open and close when entering and leaving your house. They'll fail much more often and you'll get used to sometimes go outside with one of them not locked or not fully working, and will be used not to care much about it. Except the day someone comes into your house by breaking the main doorlock which was properly working, the insurance will not cover this because you had one faulty lock inside. The conclusion is : only enforce security where it really matters and leave the choice to users when it does not. It will avoid them getting used to false alarms.
Last, the weaker point is always the clueless end user. You can't force them to understand their computer because this is complex science. We all know people around us using a completely infected windows PC with an outdate anti-virus configured to shut up because it is the way their PC works best *for them*. When you shout at them, they tell you that if they re-enable it, they can't consult their bank account online, they can't check their kid's photos without clicking on warnings all the time etc... These people don't need a secure operating system in the first place. They just need a browser to go to the net once in a while just like they open their radio. By adding many security features there we're making their experience too much complicated for them and they finally completely disable security to get what they need.
It did.
What good does any encryption do you, if you get detained and told to hand over your passwords or be thrown in jail ? http://www.bbc.co.uk/news/uk-23776243
This is a political problem, not an encryption problem.
context: comment on the article "Columns > The Bikeshed - More Encryption Is Not the Solution" (by Poul-Henning Kamp on July 1, 2013) (http://queue.acm.org/detail.cfm?id=2508864) on http://queue.acm.org (ACM Queue)
"on all HTTPS connections out of the country, the symmetric key cannot be random; it must come from a dictionary of 100 million random-looking keys that I provide."
Fine.
"The key from the other side? Slip that in there somewhere, and I can find it (encrypted in a Set-Cookie header?)."
What? I don't understand what this means or why this is part of your attack procedure. You already selected a finite set of keys that the service will use with the clients, so you can decrypt any traffic you intercept by simply running through this set of keys, without furthur information from or privileged access to the service.
"In the long run, nobody is going to notice that the symmetric keys are not randomyou would have to scrutinize the key material in many thousands of connections before you would even start to suspect something was wrong."
Wrong. A cryptographer performing a black box audit on a service would be quick to try various methods of cryptanalysis, especially testing the randomness of key material. Thousands is not a big number for computers or even the internet. And indeed, due to the birthday problem, it would only take thousands (not 100 million) of connections for me to discover that the service has duplicate keys, which would make me think its entropy source is broken. I'd then proceed to connect a few billion times using multiple IP addresses to record all the keys.
But yes, your point that it is possible to bribe providers to give you a backdoor is true.
"That is the basic problem with cryptography as a means of privacy: it works only if both ends work at it in good faith."
Yes. This is why end-to-end encryption exists. Instead of putting your trust in a stupid little corporation, you encrypt your data to the recipient's private key, and the mail server or chat server simply can't see what's been said. Ironically, from the title of this article, I assumed it was going to be about some pitfall in end-to-end encryption, or about cascade ciphers...
"Consider the stock-quote application for my smartphone, shown in figure 1. I can neither disable nor delete this app, and it has permission to access everything the phone can do."
That's your own problem.
"You could also hire a bunch of good programmers, pay them to get deeply involved in open source projects, and have them sneak vulnerabilities into the source code."
This only works on *nix based operating systems because they are monotlihic and trust all code for no reason. More and more effort is now being put into operating systems which are both small enough to verify by one or a few people and give minimal privileges to programs. In fact, half a century ago, the capability security model was created, where you don't need to trust any code except the kernel, which is very small.
Maybe this article should have been called "Linux/Windows Is Not the Solution", or "The cloud Is Not the Solution".
"Politics, Not Encryption, Is the Answer"
WTF? -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.20 (GNU/Linux)
iEYEARECAAYFAlH9rsAACgkQ3PGpByoQpZEAKACdHBtSFQ002Lk1zzQdCKm5sNZw rq8An2pq6u7HlfDY16ddP2iTX4aazKR0 =m27J -----END PGP SIGNATURE-----
I havn't read that specific case, but I belive the SCOTUS decided that since he had accepted the "gift"voluntarily, it was constitutionally OK.
Recently I belive SCOTUS held that slapping a GPS-tracker on a suspects car required a court order, the crucial difference being that the suspect was not involved and did not consent.
Displaying 10 most recent comments. Read the full list here