Create 17-The-Future.md
Chapter 17 unformatted
This commit is contained in:
parent
03f666a902
commit
6a0494c461
766
17-The-Future/17-The-Future.md
Normal file
766
17-The-Future/17-The-Future.md
Normal file
@ -0,0 +1,766 @@
|
||||
17. The Future
|
||||
|
||||
17.1. copyright
|
||||
THE CYPHERNOMICON: Cypherpunks FAQ and More, Version 0.666,
|
||||
1994-09-10, Copyright Timothy C. May. All rights reserved.
|
||||
See the detailed disclaimer. Use short sections under "fair
|
||||
use" provisions, with appropriate credit, but don't put your
|
||||
name on my words.
|
||||
|
||||
17.2. SUMMARY: The Future
|
||||
17.2.1. Main Points
|
||||
- where things are probably going
|
||||
17.2.2. Connections to Other Sections
|
||||
17.2.3. Where to Find Additional Information
|
||||
17.2.4. Miscellaneous Comments
|
||||
|
||||
17.3. Progress Needed
|
||||
17.3.1. "Why have most of the things Cypherpunks talk about *not*
|
||||
happened?"
|
||||
+ Except for remailers and basic crypto, few of the main
|
||||
ideas talked about for so long have actually seen any kind
|
||||
of realization. There are many reasons:
|
||||
A. Difficult to achieve. Both Karl Kleinpaste and Eric
|
||||
Hughes implemented simple first-generation remailers in a
|
||||
matter of _days_, but "digital cash" and "aptical
|
||||
foddering," for example, are not quite so
|
||||
straightforward. (I am of course not taking anything away
|
||||
from Kleinpaste, Hughes, Helsingius, Finney, etc., just
|
||||
noting that redirecting mail messages--and even
|
||||
implementing PGP and things like delay, batching, etc.,
|
||||
into remailers--is a lot easier conceptually than DC-Nets
|
||||
and the like.
|
||||
B. Protocols are confusing, tough to implement. Only a tiny
|
||||
fraction of the "crypto primitives" discussed at Crypto
|
||||
Conferences, or in the various crypto books, have been
|
||||
realized as runnable code. Building blocks like "bit
|
||||
commitment" have not even--to my knowledge--been
|
||||
adequately realized as reusable code. (Certainly various
|
||||
groups, such as Chaum's, have cobbled-together things
|
||||
like bit commitment....I just don't think there's a
|
||||
consensus as to the form, and this has limited the
|
||||
ability of nonspecialists to use these "objects.")
|
||||
C. Semantic confusion as well. While it's fairly clear what
|
||||
"encrypting" or "remailing" means, just what is a
|
||||
"digital bank"? Or a "reputation server"?
|
||||
D. Interoperablity is problematic. Many platforms, many
|
||||
operating systems, many languages. Again, remailers and
|
||||
encryption work because there is a de facto lowest common
|
||||
denominator for them: the simple text block, used in e-
|
||||
mail, editors, input and output from programs, etc. That
|
||||
is, we all mostly know exactly what an ASCII text block
|
||||
is, and crypto programs are expected to know how to
|
||||
access and manipulate such blocks. This largely explains
|
||||
the success of PGP across many platforms--text blocks are
|
||||
the basic element. Ditto for Cypherpunks remialers, which
|
||||
operate on the text blocks found in most mail systems.
|
||||
The situation becomes much murkier for things like
|
||||
digital money, which are not standalone objects and are
|
||||
often multi-party protocols involving time delays,
|
||||
offline processing, etc.
|
||||
E. Lack of an economic motive. We on this list are not being
|
||||
paid to develop anything, are not assisted by anyone, and
|
||||
don't have the financial backing of corporations to
|
||||
assist us. Since much of today's "software development"
|
||||
is actually _deal-making_ and _standards negotiation_, we
|
||||
are left out of lots of things.
|
||||
|
||||
17.4. Future Directions
|
||||
17.4.1. "What are some future directions?"
|
||||
17.4.2. The Future of the List
|
||||
+ "What can be done about these situations?"
|
||||
- That is, given that the Cypherpunks list often contains
|
||||
sensitive material (see above), and given that the
|
||||
current membership list can be accessed by..... what can
|
||||
be done?
|
||||
- Move central server to non-U.S. locale
|
||||
- Or to "cyberspace" (distributed network, with no central
|
||||
server...like FidoNet)
|
||||
- subscribers can use pseudonyms, cutouts, remailers
|
||||
17.4.3. What if encryption is outlawed?
|
||||
- can uuencode (and similar), to at least slow down the
|
||||
filter programs a bit (this is barely security through
|
||||
obscurity, but....)
|
||||
- underground movements?
|
||||
- will Cypherpunks be rounded up?
|
||||
17.4.4. "Should Cypherpunks be more organized, more like the CPSR,
|
||||
EFF, and EPIC?"
|
||||
- Those groups largely are lobbying groups, with a staff in
|
||||
Washington supported by the membership donations of
|
||||
thousands or tens of thousands of dues-paying members. They
|
||||
perform a valuable service, of course.
|
||||
- But that is not our model, nor can it plausibly be. We were
|
||||
formed as an ad hoc group to explore crypto, were dubbed
|
||||
"Cypherpunks," and have since acted as a techno-grasssroots
|
||||
anarchy. No staff, no dues, no elections, no official rules
|
||||
and regulations, and no leadership beyond what is provided
|
||||
by the power of speech (and a slight amount of "final say"
|
||||
provided by the list maintainer Eric Hughes and the machine
|
||||
owner, John Gilmore, with support from Hugh Daniel).
|
||||
- If folks want a lobbying group, with lawyers in Washington,
|
||||
they should join the EFF and/or CPSR.
|
||||
- And we fill a niche they don't try to fill.
|
||||
17.4.5. Difficult to Set Directions
|
||||
- an anarchy...no centralized control
|
||||
- emergent interests
|
||||
- everyone has some axe to grind, some temporary set of
|
||||
priorities
|
||||
- little economic motivation (and most have other jobs)
|
||||
17.4.6. The Heart and Soul of Cypherpunks?
|
||||
+ Competing Goals:
|
||||
+ Personal Privacy
|
||||
- PGP, integration with mailers
|
||||
- education
|
||||
+ Reducing the Power of Institutions
|
||||
- whistelblowers group
|
||||
-
|
||||
- Crypto Anarchy
|
||||
+ Common Purposes
|
||||
+ Spreading strong crypto tools and knowledge
|
||||
- PGP
|
||||
+ Fighting government restrictions and regulations
|
||||
- Clipper/Skipjack fight was a unifying experience
|
||||
+ Exploring new directions in cryptology
|
||||
- digital mixes, digital cash, voting
|
||||
17.4.7. Possible Directions
|
||||
+ Crypto Tools...make them ubiquitous "enough" so that the
|
||||
genie cannot be put back in the bottle
|
||||
- can worry about the politics later (socialists vs.
|
||||
anarchocapitalists, etc.) (Although socialists would do
|
||||
well to carefully think about the implications of
|
||||
untraceable communications, digital cash, and world-wide
|
||||
networks of consultants and workers--and what this does
|
||||
to tax collection and social spending programs--before
|
||||
they work with the libertarians and anarchocapitalists to
|
||||
bring on the Crypto Millenium.)
|
||||
+ Education
|
||||
- educating the masses about crypto
|
||||
- public forums
|
||||
- this was picked by the Cambridge/MIT group as their
|
||||
special interest
|
||||
+ Lobbying
|
||||
- talking to Congressional aides and committee staffers,
|
||||
attending hearings, submitting briefs on proposed
|
||||
legislation
|
||||
- coordinating with EFF, CPSR, ACLU, etc.
|
||||
- this was picked by the Washington group as their special
|
||||
interest, which is compellingly appropriate (Calif. group
|
||||
is simply too far away)
|
||||
- Legal Challenges
|
||||
+ mixture of legal and illegal
|
||||
- use legal tools, and illegal tools
|
||||
- fallback positions
|
||||
- enlist illegal users as customers...help it spread in
|
||||
these channels (shown to be almost uncontrollable)
|
||||
17.4.8. Goals (as I see them)
|
||||
+ Get strong crypto deployed in such a way as to be
|
||||
unstoppable, unrecallable
|
||||
- "fire and forget" crypto
|
||||
- genie out of the bottle
|
||||
- Note that this does _not_ necessarily that crypto be
|
||||
_widely_ deployed, though that's generally a good idea.
|
||||
It may mean seeding key sites outside the U.S. with
|
||||
strong crypto tools, with remailers, and with the other
|
||||
acouterments.
|
||||
+ Monkeywrench threats to crypto freedom.
|
||||
- economic sabotage of those who use statist contracts to
|
||||
thwart freedom (e.g., parts of AT&T)
|
||||
+ direct sabotage
|
||||
- someday, viruses, HERF, etc.
|
||||
17.4.9. A Vision of the Future
|
||||
- encrypted, secure, untraceable communications
|
||||
- hundreds of remailers, in many countries
|
||||
- interwoven with ordinary traffic, ensuring that any attempt
|
||||
to quash crypto would also have a dramatic effect on
|
||||
business
|
||||
- data havens, credit, renters, etc.
|
||||
- information markets
|
||||
- ability to fight wars is hindered
|
||||
- U.S. is frantic, as its grip on the world loosens...Pax
|
||||
Americana dies
|
||||
17.4.10. Key concepts are the way to handle the complexity of crypto
|
||||
- The morass of protocols, systems, and results is best
|
||||
analyzed, I think, by not losing sight of the basic
|
||||
"primitives," the things about identity, security,
|
||||
authentication, etc. that make crypto systems work the way
|
||||
they do.
|
||||
+ Axiom systems, with theorems and lemmas derivable from the
|
||||
axioms
|
||||
- with alternate axioms giving the equivalent of "non-
|
||||
Euclidean geometries" (in a sense, removing the physical
|
||||
identity postulate and replacing it with the "the key is
|
||||
the identity" postulate gives a new landscape of
|
||||
interactions, implications, and structures).
|
||||
- (Markets, local references, voluntary transactions, etc.)
|
||||
- (ecologies, predators, defenders, etc.)
|
||||
- (game theory, economics, etc..)
|
||||
|
||||
17.5. Net of the Future
|
||||
17.5.1. "What role, if any, will MUDs, MOOs, and Virtual Realities
|
||||
play?"
|
||||
- "True Names," "Snow Crash," "Shockwave Rider"
|
||||
- Habitat, online services
|
||||
+ the interaction is far beyond just the canonical "text
|
||||
messages" that systems like Digital Telephony are designed
|
||||
to cope with
|
||||
- where is the nexus of the message?
|
||||
- what about conferences scattered around the world, in
|
||||
multiple jurisdictions?
|
||||
- crypto = glue, mortar, building blocks
|
||||
- "rooms" = private places; issues of access control
|
||||
- Unless cops are put into these various "rooms," via a
|
||||
technology we can barely imagine today (agents?), it will
|
||||
be essentially impossible to control what happens in these
|
||||
rooms and places. Too many degrees of freedom, too many
|
||||
avenues for exchange.
|
||||
- cyberspaces, MUDs, virtual communities, private law,
|
||||
untouchable by physical governments
|
||||
17.5.2. keyword-based
|
||||
- can be spoofed by including dictionaries
|
||||
17.5.3. dig sig based (reputation-based)
|
||||
17.5.4. pools and anonymous areas may be explicitly supported
|
||||
17.5.5. better newsreaders, screens, filters
|
||||
17.5.6. Switches
|
||||
- "switching fabrics"
|
||||
- ATM
|
||||
- Intel's flexible mesh interconnects, iWARP, etc.
|
||||
- all of these will make for an exponential increase in
|
||||
degrees of freedom for remailer networks (labyrinths). On-
|
||||
chip remailing is esentially what is needed for Chaum's
|
||||
mixes. ATM quanta (packets) are the next likely target for
|
||||
remailers.
|
||||
17.5.7. "What limits on the Net are being proposed?"
|
||||
- NII
|
||||
+ Holding carriers liable for content
|
||||
- e.g., suing Compuserve or Netcom
|
||||
- often done with bulletin boards
|
||||
- "We have to do something!"
|
||||
+ Newspapers are complaining about the Four Horsemen of the
|
||||
Infocalypse:
|
||||
- terrorists, pedophiles, drug dealers, and money
|
||||
launderers
|
||||
+ The "L.A. Times" opines:
|
||||
- "Designers of the new Information Age were inspired by
|
||||
noble dreams of free-flowing data as a global
|
||||
liberating force, a true democratizing agent. Sadly,
|
||||
the crooks and creeps have also climbed aboard. The
|
||||
time has come for much tighter computer security.
|
||||
After all, banks learned to put locks on their vaults."
|
||||
["L.A. Times," editorial, 1994-07-13]
|
||||
|
||||
17.6. The Effects of Strong Crypto on Society
|
||||
17.6.1. "What will be the effects of strong crypto, ultimately, on
|
||||
the social fabric?"
|
||||
- It's hard to know for sure.
|
||||
+ These effects seem likely:
|
||||
- Starvation of government tax revenues, with concommitant
|
||||
effects on welfare, spending, etc.
|
||||
- increases in espioage
|
||||
- trust issues
|
||||
17.6.2. The revelations of surveillance and monitoring of citizens
|
||||
and corporations will serve to increase the use of
|
||||
encryption, at first by people with something to hide, and
|
||||
then by others. Cypherpunks are already helping by spreading
|
||||
the word of these situations.
|
||||
- a snowballing effect
|
||||
- and various government agencies will themselves use
|
||||
encryption to protect their files and their privacy
|
||||
17.6.3. People making individual moral choices
|
||||
- people will make their own choices as to what to reveal,
|
||||
what they think will help world peace, or the future, or
|
||||
the dolphins, or whatever
|
||||
- and this will be a liquid market, not just souls shouting
|
||||
in the desert
|
||||
- of course, not everything will be revealed, but the "mosaic
|
||||
effect" ensures that mostly the truth will emerge
|
||||
- every government's worst fear, that it's subjects will
|
||||
decide for themselves what is secret, what is not, what can
|
||||
be told to foreigners, etc.
|
||||
|
||||
17.7. New Software Tools and Programming Frameworks
|
||||
17.7.1. Needed software
|
||||
- Drop-in crypto modules are a needed development. As V.
|
||||
Bontchev says, "it would be nice if disk encryption
|
||||
software allowed the user to plug in their own modules.
|
||||
This way everybody could use whatever they trust - MDC/SHA,
|
||||
MDC/MD5, DES, IDEA, whatever." [V.B., sci.crypt, 1994-07-
|
||||
01]
|
||||
+ Robustness
|
||||
- Security and robustness are often at odds
|
||||
- Files that are wiped at the first hint of intrusion
|
||||
(digital flash paper), remailer sites that go down at the
|
||||
first signs of trouble, and file transmission systems
|
||||
that split files into multiple pieces--any one of which
|
||||
can be lost, thus destroying the whole transmission--are
|
||||
not exactly models of robustness.
|
||||
- Error correction usually works by decreasing entropy
|
||||
through redundancy, which is bad for crypto.
|
||||
- The military uses elaborate (and expensive) systems to
|
||||
ensure that systems do not go down, keys are not lost,
|
||||
etc. Most casual users of crypto are unwilling to take
|
||||
these steps.
|
||||
- And so keys are lost, passphrases are forgotten (or are
|
||||
written down on Post-It Notes and taped to terminals),
|
||||
and remailers are taken down when operators go on
|
||||
vacation. All very flaky and non-robust.
|
||||
- Look at how flaky mail delivery is!
|
||||
+ A challenge is to create systems which are:
|
||||
- robust
|
||||
- not too complicated and labor-intensive to use
|
||||
- where redundancy does not compromise security
|
||||
+ Crypto workbench
|
||||
- An overused term, perhaps, but one that captures the
|
||||
metaphor of a large set of tools, templates, programming
|
||||
aids, etc.
|
||||
+ QKS and "Agents Construction Kit" (under development)
|
||||
- along with Dylan, DylanAgents, Telescript, and probably
|
||||
several other attempts to develop agent toolkits
|
||||
- Henry Strickland is using "tcl" (sort of a scripting
|
||||
language, like "perl") as a basis.
|
||||
+ Software crisis
|
||||
- tools, languages, frameworks, environments, objects,
|
||||
class libraries, methods, agents, correctness,
|
||||
robustness, evolution, prototyping
|
||||
+ Connections between the software crisis and cryptography
|
||||
- complex systems, complicated protocols
|
||||
- price of being "wrong" can be very high, whether it's
|
||||
an airport that can't open on time (Denver) or a
|
||||
digital bank that has its assets drained in seconds
|
||||
- agents, objects are hoped to be the "silver bullets"
|
||||
+ The need for better software methodologies
|
||||
- "silver bullets"
|
||||
- failures, errors, flaws, methods
|
||||
- provably correct designs? (a la Viper)
|
||||
- It is often said that much better methodologies are
|
||||
needed for _real time programming_, due to the time-
|
||||
criticality and (probably) the difficulty of doing
|
||||
realistic testing. But surely the same should be said
|
||||
of _financial programming_, a la the banking and
|
||||
digicash schemes that interest us so much.
|
||||
- "the one aspect of software that most makes it the
|
||||
flaky industry it is is that it is unusual for
|
||||
practitioners to study the work of others. Programmers
|
||||
don't read great programs. Designers don't study
|
||||
outstanding designs. The consequences ... no, just look
|
||||
for yourself. [Cameron Laird, comp.software-eng, 1994-
|
||||
08-30]
|
||||
+ Large Software Constructs
|
||||
- The software crisis becomes particularly acute when
|
||||
large systems are built, such as--to apply this to
|
||||
Cypherpunks issues--when digital money systems and
|
||||
economies are built.
|
||||
17.7.2. Object-oriented tools
|
||||
+ While tres trendy, some very real gains are being reported;
|
||||
more than just a buzzword, especially when combined with
|
||||
other tools:
|
||||
- frameworks, toolkits
|
||||
+ dynamic languages
|
||||
- greater flexibility than with static, strongly-typed
|
||||
langueages (but also less safety, usually)
|
||||
- OpenStep, Visual Age, Visual Basic, Dylan, Telescript (more
|
||||
agent-oriented), Lisp, Smalltalk, etc
|
||||
17.7.3. Protocol Ecologies
|
||||
- Behavioral simulations of agents, digital money, spoofing,
|
||||
etc.
|
||||
- the world in which Alice and Bob and their crypto friends
|
||||
live
|
||||
- defense, attack, spoofing, impersonation, theft
|
||||
- elements that are cryptographically strong (like D-H key
|
||||
exchanges), but combined in complex ways that almost have
|
||||
to be simulated to find weaknesses
|
||||
- "middle-out" instead of "top-down" (conventional, formal)
|
||||
or "bottom-up" (emergent, A-LIFE)
|
||||
- like Eurisko (Lenat), except oriented toward the domain of
|
||||
financial agents
|
||||
17.7.4. Use of autonomous agents (slaves?)
|
||||
- "An advanced telecommunications environment offers a number
|
||||
of ways to protect yourself against the problems involved
|
||||
in dealing with anonymous entities in a situation in which
|
||||
there is no monopoly Government.....When one's PBX finds
|
||||
that one's call is not going through via a particular long
|
||||
distance carrier, it automatically switches to another one.
|
||||
It is easy to imagine one's intelligent agents testing
|
||||
various sorts of transaction completions and switching
|
||||
vendors when one fails. Professional checkers can supply
|
||||
information on vendor status for a fee. After all, we don't
|
||||
care if a company we are dealing with changes if its
|
||||
service is unaffected." [Duncan Frissell, 1994-08-30]
|
||||
17.7.5. Tools
|
||||
+ "Languages within languages" is a standard way to go to
|
||||
implement abstractions
|
||||
- "Intermediate Design Languages" (IDLs)
|
||||
- abstract concepts: such as "engines" and "futures"
|
||||
- Lisp and Scheme have been favored languages for this
|
||||
- other languages as well: Smalltalk, Dylan
|
||||
+ For crypto, this seems to be the case: abstractions
|
||||
represented as classes or objects
|
||||
- with programming then the selective subclassing
|
||||
- and sometimes gener
|
||||
+ "type checking" of crypto objects is needed
|
||||
- to ensure compliance with protocols, with forms expected,
|
||||
etc.
|
||||
- check messages for form, removal of sigs, etc. (analogous
|
||||
to checking a letter before mailing for proper
|
||||
addressing, for stamp, sealing, etc.)
|
||||
- much of the nonrobustness of mail and crypto comes from
|
||||
the problems with exception handling--things that a human
|
||||
involved might be able to resolve, in conventional mail
|
||||
systems
|
||||
- "dead letter department"?
|
||||
- Note: In the "Crypto Anarchy Game" we played in
|
||||
September, 1992, many sealed messages were discarded for
|
||||
being in the wrong form, lacking the remailer fee that
|
||||
the remailer required, etc. Granted, human beings make
|
||||
fairly poor maintainers of complex constraints....a lot
|
||||
of people just kept forgetting to do what was needed. A
|
||||
great time was had by all.
|
||||
17.7.6. "What programming framework features are needed?"
|
||||
- What follows are definitely my opnions, even more my own
|
||||
opinions than most of what I've written. Many people will
|
||||
disagree.
|
||||
+ Needed:
|
||||
- Flexibility over speed
|
||||
- Rapid prototyping, to add new features
|
||||
- Evolutionary approaches
|
||||
- Robustness (provably correct would be nice, but...)
|
||||
17.7.7. Frameworks, Tools, Capabilities
|
||||
- Nearly all the cutting-edge work in operating systems, from
|
||||
"mutually suspicious cooperating processes" to "deadlock"
|
||||
to "persistence," show up in the crypto areas we are
|
||||
considering.
|
||||
+ Software of the Net vs. Software to Access the Net
|
||||
- The Net--is current form adequate?
|
||||
- Software for Accessing the Net
|
||||
+ OpenDoc and OLE
|
||||
- components working together, on top of various operating
|
||||
systems, on top of various hardware platforms
|
||||
+ Persistent Object Stores
|
||||
- likely to be needed for the systems we envision
|
||||
- robust, so that one's "money" doesn't evaporate when a
|
||||
system is rebooted!
|
||||
- interesting issues here...
|
||||
- CORBA. OpenDoc, OLE II, SOM, DOE, Gemstone, etc.
|
||||
+ Programming Frameworks
|
||||
- Dynamic languages may be very useful when details are
|
||||
fuzzy, when the ideas need exploration (this is not a
|
||||
call for nondeterminism, for random futzing around, but a
|
||||
recognition that the precise, strongly-typed approach of
|
||||
some languages may be less useful than a rich,
|
||||
exploratory environment. This fits with the "ecology"
|
||||
point of view.
|
||||
-
|
||||
+ Connectivity
|
||||
- needs to be more robust, not flaky the way current e-mail
|
||||
is
|
||||
- handshakes, agents, robust connections
|
||||
- ATM, SONET, agents, etc....the "Net of the Future"
|
||||
|
||||
17.8. Complexity
|
||||
17.8.1. The shifting sands of modern, complex systems
|
||||
- lots of cruft, detail...changing..related to the "software
|
||||
crisis"...the very flexibilty of modern software systems
|
||||
promotes the frequent changing of features and behaviors,
|
||||
thus playing hob with attempts of others to understand the
|
||||
structure...evolution in action
|
||||
- humans who use these systems forget how the commands work,
|
||||
where things are stored, how to unsubscribe from lists,
|
||||
etc. (This is just one reason the various sub-lists of our
|
||||
list have seldom gotten much traffic: people use what they
|
||||
are most used to using, and forget the rest.)
|
||||
- computer agents (scripts, programs) which use these systems
|
||||
often "break" when the underlying system changes. A good
|
||||
example of this are the remailer sites, and scripts to use
|
||||
them. As remailer sites go up and down, as keys change, as
|
||||
other things change, the scripts must change to keep pace.
|
||||
- This very document is another example. Scattered throughout
|
||||
are references to sites, programs, sources, etc. As time
|
||||
goes by, more and more of them will (inevitably) become
|
||||
obsolete. (My hope is that enough of the pointers will
|
||||
point to still-extant things so as to make the pointers
|
||||
remain useful. And I'll try to update/correct the bad
|
||||
pointers.)
|
||||
17.8.2. "Out of Control"
|
||||
- Kevin Kelly's book
|
||||
- inability to have precise control, and how this is
|
||||
consistent with evolution, emergent properties, limits of
|
||||
formal models
|
||||
- crypto, degrees of freedom
|
||||
+ imagine nets of the near future
|
||||
- ten-fold increase in sites, users, domains
|
||||
- ATM switching fabrics..granularity of transactions
|
||||
changes...convergence of computing and communications...
|
||||
+ distributed computation ( which, by the way, surely needs
|
||||
crypto security!)
|
||||
- Joule, Digital Silk Road
|
||||
- agents, etc.
|
||||
+ can't control the distribution of information
|
||||
+ As with the Amateur Action BBS case, access can't be
|
||||
controlled.
|
||||
- "The existance of gateways and proxy servers means that
|
||||
there is no effective way to determine where any
|
||||
information you make accessible will eventually end up.
|
||||
Somebody in, say, Tennessee can easily get at an FTP
|
||||
site in California through a proxy in Switzerland.
|
||||
Even detailed information about what kind of
|
||||
information is considered contraband in every
|
||||
jurisdiction in the world won't help, unless every
|
||||
*gateway* in the world has it and uses it as well."
|
||||
[Stephen R. Savitzky, comp.org.eff.talk, 1994-08-08]
|
||||
17.8.3. A fertile union of cryptology, game theory, economics, and
|
||||
ecology
|
||||
+ crypto has long ignored economics, except peripherally, as
|
||||
an engineering issue (how long encryption takes, etc.)
|
||||
- in particular, areas of reputation, risk, etc. have not
|
||||
been treated as central idea...perhaps proper for
|
||||
mathematical algorithm work
|
||||
- but economics is clearly central to the systems being
|
||||
planned...digital cash, data havens, remailers, etc.
|
||||
+ why cash works so well...locality of reference, immediate
|
||||
clearing of transactions, forces computations down to
|
||||
relevant units
|
||||
- reduces complaints, "he made me do it" arguments...that
|
||||
is, increases self-responsibility...caveat emptor
|
||||
+ game theory
|
||||
+ ripe for treatment of "Alice and Bob" sorts of
|
||||
situations, in which agents with different agendas are
|
||||
interacting and competing
|
||||
- "defecting" as in Prisoner's Dilemma
|
||||
- payoff matrices for various behaviors
|
||||
- evolutionary game theory
|
||||
- evolutionary learning, genetic algorithms/programmming
|
||||
- protocol ecologies
|
||||
|
||||
17.9. Crypto Standards
|
||||
17.9.1. The importance of standards
|
||||
- a critical role
|
||||
+ Part of standards is validation, test suites, etc.
|
||||
- validating the features and security of a remailer,
|
||||
through pings, tests, performance tests, reliability,
|
||||
etc.
|
||||
- thus imposing a negative hit on those who fail
|
||||
+ There are many ways to do this standards testing
|
||||
- market reports (as with commercial chips, software)
|
||||
- "seals of approval" (especially convenient with digital
|
||||
sigs)
|
||||
|
||||
17.10. Crypto Research
|
||||
17.10.1. Academic research continues to increase
|
||||
17.10.2. "What's the future of crypto?"
|
||||
- Predicting the future is notoriously difficult. IBM didn't
|
||||
think many computers would ever be sold, Western Union
|
||||
passed on the chance to buy Bell's telephone patents. And
|
||||
so on. The future is always cloudy, the past is always
|
||||
clear and obvious.
|
||||
- We'll know in 30 years which of our cypherpunkish and
|
||||
cryptoanarchist predictions came to pass--and which didn't.
|
||||
17.10.3. Ciphers are somewhat like knots...the right sequence of moves
|
||||
unties them, the wrong sequence only makes them more tangled.
|
||||
("Knot theory" is becoming a hot topic in math and physics
|
||||
(work of Vaughn Jones, string theory, etc.) and I suspect
|
||||
there are some links between knot theory and crypto.)
|
||||
17.10.4. Game theory, reputations, crypto -- a lot to be done here
|
||||
- a missing link, an area not covered in academic cryptology
|
||||
research
|
||||
- distributed trust models, collusion, cooperation,
|
||||
evolutionary game theory, ecologies, systems
|
||||
17.10.5. More advanced areas, newer approaches
|
||||
+ some have suggested quasigroups, Latin squares, finite
|
||||
automata, etc. Quasigroups are important in the IDEA
|
||||
cipher, and in some DES work. (I won't speculate furher
|
||||
about an area I no almost nothing about....I'd heard of
|
||||
semigroups, but not quasigroups.)
|
||||
- "The "Block Mixing Transform" technology which I have
|
||||
been promoting on sci.crypt for much of this spring and
|
||||
summer is a Latin square technology. (This was part of
|
||||
my "Large Block DES" project, which eventually produced
|
||||
the "Fenced DES" cipher as a possible DES
|
||||
upgrade.)....Each of the equations in a Block Mixing
|
||||
Transform is the equation for a Latin square. The
|
||||
multiple equations in such a transform together represent
|
||||
orthogonal Latin squares. [Terry Ritter, sci.crypt, 1994-
|
||||
08-15]
|
||||
+ But what about for public key uses? Here's something Perry
|
||||
Metzger ran across:
|
||||
- ""Finte Automata, Latin arrays, and Cryptography" by Tao
|
||||
Renji, Institute of Software, Academia Sinica, Beijing.
|
||||
This (as yet unpublished) paper covers several
|
||||
fascinating topics, including some very fast public key
|
||||
methods -- unfortunately in too little detail. Hopefully
|
||||
a published version will appear soon..." [P.M.,
|
||||
sci.crypt, 1994-08-14]
|
||||
17.10.6. Comments on crypto state of the art today vs. what is likely
|
||||
to be coming
|
||||
- Perry Metzger comments on today's practical difficulties:
|
||||
"...can the difference between "crypto can be transforming
|
||||
when the technology matures" and "crypto is mature now" be
|
||||
that unobvious?....One of the reasons I'm involved with the
|
||||
IETF IPSP effort is because the crypto stuff has to be
|
||||
transparent and ubiquitous before it is going to be truly
|
||||
useful -- in its current form its just junk. Hopefully,
|
||||
later versions of PGP will also interface well with the new
|
||||
standards being developed for an integrated secure message
|
||||
body type in MIME. (PGP also requires some sort of scalable
|
||||
and reverse mapable keyid system -- the current keyids are
|
||||
not going to allow key servers to scale in a distributed
|
||||
manner.) Yes, I've seen the shell scripts and the rest, and
|
||||
they really require too much effort for most people -- and
|
||||
at best, once you have things set up, you can now securely
|
||||
read some email at some sites. I know that for myself,
|
||||
given that I read a large fraction of my mail while working
|
||||
at clients, where I emphatically do not trust the hardware,
|
||||
every encrypted message means great inconvenience,
|
||||
regardless." [Perry Metzger, 1994-08-25]
|
||||
|
||||
17.11. Crypto Armageddon? Cryptageddon?
|
||||
17.11.1. "Will there be a "Waco in cyberspace"?"
|
||||
- while some of us are very vocal here, and are probably
|
||||
known to the authorities, this is not generally the case.
|
||||
Many of the users of strong crypto will be discreet and
|
||||
will not give outward appearances of being code-using
|
||||
crypto anarchist cultists.
|
||||
17.11.2. Attacks to come
|
||||
- "You'll see these folks attacking anonymous remailers,
|
||||
cryptography, psuedonymous accounts, and other tools of
|
||||
coercion-free expression and information interchange on
|
||||
the net, ironically often in the name of promoting
|
||||
"commerce". You'll hear them rant and rave about
|
||||
"criminals" and "terrorists", as if they even had a good
|
||||
clue about the laws of the thousands of jurisdictions
|
||||
criss-crossed by the Internet, and as if their own attempts
|
||||
to enable coercion bear no resemblance to the practice of
|
||||
terrorism. The scary thing is, they really think they
|
||||
have a good idea about what all those laws should be, and
|
||||
they're perfectly willing to shove it down our throats,
|
||||
regardless of the vast diversity of culture, intellectual,
|
||||
political, and legal opinion on the planet."
|
||||
[<an50@desert.hacktic.nl> (Nobody), libtech-l@netcom.com,
|
||||
1994-06-08]
|
||||
+ why I'm not sanguine about Feds
|
||||
- killing Randy Weaver's wife and son from a distance,
|
||||
after trumped-up weapons charges
|
||||
- burning alive the Koresh compound, on trumped-up charges
|
||||
of Satanism, child abuse, and wife-insulting
|
||||
- seizures of boats, cars, etc., on "suspicion" of
|
||||
involvement with drugs
|
||||
|
||||
17.12. "The Future's So Bright, I Gotta Wear Shades"
|
||||
17.12.1. Despite the occasionally gloomy predictions, things look
|
||||
pretty good.No guarantees, of course, but trends that are
|
||||
favorable. No reason for us to rest, though.
|
||||
17.12.2. Duncan Frissell puts it this way:
|
||||
- "Trade is way up. Wealth is way up. International travel
|
||||
is way up. Migration is way up. Resource prices are the
|
||||
lowest in human history. Communications costs are way
|
||||
down. Electronics costs are way down. We are in a zero or
|
||||
negative inflation environment. The quantity and quality
|
||||
of goods and services offered on the markets is at an all-
|
||||
time high. The percentage of the world's countries headed
|
||||
by dictators is the lowest it's ever been.
|
||||
|
||||
"What all this means is that political philosophies that
|
||||
depend on force of arms to push people into line, will
|
||||
increasingly fail to work. Rich people with choices will,
|
||||
when coerced, tend to change their investments and
|
||||
business affairs into a friendlier form or to move to a
|
||||
friendlier environment. Choice is real. If choices
|
||||
exist, they will be made. An ever higher proportion of the
|
||||
world's people will be "rich" in wealth and choice as the
|
||||
years go on.
|
||||
|
||||
"Only a political philosophy that depends on the uncoerced
|
||||
cooperation of very different people has a chance of
|
||||
functioning in the future." [Duncan Frissell, 1994-09-09]
|
||||
|
||||
17.13. "Will cryptography really bring on the Millenium?"
|
||||
17.13.1. Yes. And cats will move in with dogs, Snapple will rain from
|
||||
the sky, and P will be shown unequal to NP.
|
||||
17.13.2. Seriously, the implications of strong privacy, of
|
||||
cyberspatial economies, and of borders becoming transparent
|
||||
are enormous. The way governments do business is already
|
||||
changing, and this will change things even more dramatically.
|
||||
The precise form may be unpredictable, but certain end states
|
||||
are fairly easy to predict in broad brush strokes.
|
||||
17.13.3. "How do we know the implications of crypto are what I've
|
||||
claimed?"
|
||||
- We can't know the future.
|
||||
- Printing, railroads, electrification
|
||||
17.13.4. "When will it all happen? When will strong crypto really
|
||||
begin to have a major effect on the economy?"
|
||||
+ Stages:
|
||||
- The Prehistoric Era. Prior to 1975. NSA and other
|
||||
intelligence agencies controlled most crypto work.
|
||||
Cryptography seen as a hobby. DES just starting to be
|
||||
deployed by banks and financial institutions.
|
||||
- The Research Era. 1975-1992. Intense interest in public
|
||||
key discovery, in various protocols. Start of several
|
||||
"Crypto" conferences. Work on digital money, DC-Nets,
|
||||
timestamping, etc.
|
||||
- The Activism Era. 1992--?? (probably 1998). PGP 2.0
|
||||
released. Cypherpunks formed. Clipper announced--meets
|
||||
firestorm of protest. EFF, CPSR, EPIC, other groups.
|
||||
"Wired" starts publication. Digital Telelphony, other
|
||||
bills. Several attempts to start crypto businesses are
|
||||
made...most founder.
|
||||
- The Transition Era. After about 1999. Businesses start.
|
||||
Digital cash needed for Net transactions. Networks and
|
||||
computers fast enough to allow more robust protocols. Tax
|
||||
havens flourish. "New Underworld Order" (credit to Claire
|
||||
Sterling) flourishes.
|
||||
- It is premature to expect that the current environment--
|
||||
technological and regulatory--will be beneficial to the
|
||||
type of strong crypto we favor. Too many pieces are
|
||||
missing. Several more advances are needed. A few more
|
||||
failures are also needed (gulp!) to show better how not to
|
||||
proceed.
|
||||
17.13.5. "But will crypto anarchy actually happen?"
|
||||
- To a growing extent, it already is happening. Look at the
|
||||
so-called illegal markets, the flows of drug money around
|
||||
the world, the transfer of billions of dollars a day on
|
||||
mere "chop marks," and the thriving trade in banned items.
|
||||
- "Grey and black capitalism is already a major component of
|
||||
international cash flows....Once adequate user friendly
|
||||
software is available, the internet will accellerate this
|
||||
already existing trend....Crypto anarchy is merely the
|
||||
application of modern tools to assist covert capitalism."
|
||||
[James Donald, 1994-08-29]
|
||||
- There are arguments that a Great Crackdown is coming, that
|
||||
governments will shut down illegal markets, will stop
|
||||
strong crypto, will force underground economies
|
||||
aboveground. This is doubtful--it's been tried for the past
|
||||
several decades (or more). Prohibition merely made crime
|
||||
more organized; ditto for the War on (Some) Drugs.
|
||||
17.13.6. "Has the point of no return been passed on strong crypto?"
|
||||
- Actually, I think that in the U.S. at least, the point was
|
||||
passed decades ago, possibly a century or more ago, and
|
||||
that any hope of controlling strong crypto and private
|
||||
communication evaporated long ago. Abuses by the FBI in
|
||||
wiretapping Americans, and reports of NSA monitoring of
|
||||
domestic communications notwithstanding, it is
|
||||
essentially.....
|
||||
|
||||
17.14. Loose Ends
|
||||
17.14.1. firewalls, virtual perimeters, swIPe-type encrypted tunnels,
|
||||
an end to break-ins,
|
||||
17.14.2. "What kind of encryption will be used with ATM?"
|
||||
- (ATM = Asynchronous Transfer Mode, not Automated Teller
|
||||
Machine)
|
||||
- some reports that NSA is developing standards for ATM
|
||||
17.14.3. Shapes of things to come, maybe....(laws of other countries)
|
||||
+ India has a fee schedule for BBS operators, e.g., they have
|
||||
to pay $50,000 a year to operate a bulletin board! (This
|
||||
sounds like the urban legend about the FCC planning a modem
|
||||
tax, but maybe it's true.)
|
||||
- "The Forum for Rights to Electronic Expression (FREE) has
|
||||
been formed in India as a body dedicated to extending
|
||||
fundamental rights to the electronic domain....FREE owes
|
||||
its creation to an attack on Indian datacom by the Indian
|
||||
government, in the form of exorbitant licence fees (a
|
||||
minimum Rs. 1.5 million = US$50,000 each year for a BBS,
|
||||
much higher for e-mail)." [amehta@doe.ernet.in (Dr. Arun
|
||||
Mehta), forwarded by Phil Agre, comp.org.cpsr.talk, 1994-
|
||||
08-31]
|
||||
- for more info: ftp.eff.org
|
||||
/pub/EFF/Policy/World/India/FREE
|
||||
17.14.4. Cyberspace will need better protection
|
||||
- to ensure spoofing and counterfeiting is reduced (recall
|
||||
Habitat's problems with people figuring out the loopholes)
|
Loading…
Reference in New Issue
Block a user