Create 06-The-Need-For-Strong-Crypto.md
Chapter 06 unformatted
This commit is contained in:
parent
1b93b4cfb6
commit
9f1ddf6794
621
06-The-Need-For-Strong-Crypto/06-The-Need-For-Strong-Crypto.md
Normal file
621
06-The-Need-For-Strong-Crypto/06-The-Need-For-Strong-Crypto.md
Normal file
@ -0,0 +1,621 @@
|
||||
6. The Need For Strong Crypto
|
||||
|
||||
6.1. copyright
|
||||
THE CYPHERNOMICON: Cypherpunks FAQ and More, Version 0.666,
|
||||
1994-09-10, Copyright Timothy C. May. All rights reserved.
|
||||
See the detailed disclaimer. Use short sections under "fair
|
||||
use" provisions, with appropriate credit, but don't put your
|
||||
name on my words.
|
||||
|
||||
6.2. SUMMARY: The Need For Strong Crypto
|
||||
6.2.1. Main Points
|
||||
- Strong crypto reclaims the power to decide for one's self,
|
||||
to deny the "Censor" the power to choose what one reads,
|
||||
watches, or listens to.
|
||||
6.2.2. Connections to Other Sections
|
||||
6.2.3. Where to Find Additional Information
|
||||
6.2.4. Miscellaneous Comments
|
||||
- this section is short, but is less focussed than other
|
||||
sections; it is essentially a "transition" chapter.
|
||||
|
||||
6.3. General Uses of and Reasons for Crypto
|
||||
6.3.1. (see also the extensive listing of "Reasons for Anonymity,"
|
||||
which makes many points about the need and uses for strong
|
||||
crypto)
|
||||
6.3.2. "Where is public key crypto really needed?"
|
||||
- "It is the case that there is relatively little need for
|
||||
asymmetric key cryptography in small closed populations.
|
||||
For example, the banks get along quite well without. The
|
||||
advantage of public key is that it permits private
|
||||
communication in a large and open population and with a
|
||||
minimum of prearrangement." [WHMurray, sci.crypt, 1994-08-
|
||||
25]
|
||||
- That is, symmetric key systems (such as conventional
|
||||
ciphers, one time pads, etc.) work reasonably well by
|
||||
prearrangement between parties. And of course one time pads
|
||||
have the additional advantage of being information-
|
||||
theoretically secure. But asymmetric or public key methods
|
||||
are incredibly useful when: the parties have not met
|
||||
before, when key material has not been exchanged, and when
|
||||
concerns exist about storing the key material. The so-
|
||||
called "key management problem" when N people want to
|
||||
communicate pairwise with each other is well-founded.
|
||||
- And of course public key crypto makes possible all the
|
||||
other useful stuff like digital money, DC-Nets, zero
|
||||
knowledge proofs, secret sharing, etc.
|
||||
6.3.3. "What are the main reasons to use cryptography?"
|
||||
- people encrypt for the same reason they close and lock
|
||||
their doors
|
||||
+ Privacy in its most basic forms
|
||||
- text -- records, diaries, letters, e-mail
|
||||
- sound -- phone conversations
|
||||
- other --video
|
||||
+ phones, intercepts, cellular, wireless, car phones,
|
||||
scanners
|
||||
+ making listening illegal is useless (and wrong-headed)
|
||||
- and authorites are exempt from such laws
|
||||
- people need to protect, end to end
|
||||
+ "How should I protect my personal files, and my phone
|
||||
calls?"
|
||||
- Personally, I don't worry too much. But many people do.
|
||||
Encryption tools are widely available.
|
||||
- Cellular telephones are notoriously insecure, as are
|
||||
cordless phones (even less secure). There are laws
|
||||
about monitoring, small comfort as that may be. (And
|
||||
I'm largely opposed to such laws, for libertarian
|
||||
reasons and because it creates a false sense of
|
||||
security.)
|
||||
- Laptops are probably less vulnerable to Van Eck types
|
||||
of RF monitoring than are CRTs. The trend to lower
|
||||
power, LCDs, etc., all works toward decreasing
|
||||
vulnerability. (However, computer power for extracting
|
||||
weak signals out of noise is increasing faster than RF
|
||||
are decreasing....tradeoffs are unclear.)
|
||||
+ encrypting messages because mail delivery is so flaky
|
||||
- that is, mail is misdelivered,via hosts incorrectly
|
||||
processing the addresses
|
||||
- encryption obviously prevents misunderstandings (though
|
||||
it does little to get the mail delivered correctly)
|
||||
+ Encryption to Protect Information
|
||||
- the standard reason
|
||||
+ encryption of e-mail is increasing
|
||||
- the various court cases about employers reading
|
||||
ostensibly private e-mail will sharpen this debate (and
|
||||
raise the issue of employers forbidding encryption;
|
||||
resonances with the mostly-settled issue of reasonable
|
||||
use of company phones for private calls-more efficient
|
||||
to let some personal calls be made than to lose the
|
||||
time of employees going to public phones)
|
||||
+ encryption of faxes will increase, too, especially as
|
||||
technology advances and as the dangers of interception
|
||||
become more apparent
|
||||
- also, tighter links between sender and receive, as
|
||||
opposed to the current "dial the number and hope it's
|
||||
the right one" approach, will encourage the additional
|
||||
use of encryption
|
||||
- "electronic vaulting" of large amounts of information,
|
||||
sent over T1 and T3 data networks, e.g., backup material
|
||||
for banks and large corporations
|
||||
+ the miles and miles of network wiring within a
|
||||
corporation-LANs, WANs, Novell, Ethernet, TCP-IP, Banyan,
|
||||
and so on-cannot all be checked for taps...who would even
|
||||
have the records to know if some particular wire is going
|
||||
where it should? (so many undocumented hookups, lost
|
||||
records, ad hoc connections, etc.)
|
||||
- the solution is to have point-to-point encryption, even
|
||||
withing corporations (for important items, at least)
|
||||
- wireless LANs
|
||||
+ corporations are becoming increasingly concerned about
|
||||
interception of important information-or even seemingly
|
||||
minor information-and about hackers and other intruders
|
||||
- calls for network security enhancement
|
||||
- they are hiring "tiger teams" to beef up security
|
||||
+ cellular phones
|
||||
- interceptions are common (and this is becoming
|
||||
publicized)
|
||||
- modifications to commercial scanners are describe in
|
||||
newsletters
|
||||
- something like Lotus Notes may be a main substrate for
|
||||
the effective introduction of crypto methods (ditto for
|
||||
hypertext)
|
||||
- encryption provides "solidity" to cyberspace, in the
|
||||
sense of creating walls, doors, permanent structures
|
||||
- there may even be legal requirements for better security
|
||||
over documents, patient files, employee records, etc.
|
||||
+ Encryption of Video Signals and Encryption to Control
|
||||
Piracy
|
||||
- this is of course a whole technology and industry
|
||||
- Videocypher II has been cracked by many video hackers
|
||||
- a whole cottage industry in cracking such cyphers
|
||||
- note that outlawing encryption would open up many
|
||||
industries to destruction by piracy, which is yet
|
||||
another reason a wholesale ban on encryption is doomed
|
||||
to failure
|
||||
- Protecting home videos--several cases of home burglaries
|
||||
where private x-rated tapes of stars were taken, then
|
||||
sold (Leslile Visser, CBS Sports)
|
||||
- these general reasons will make encryption more common,
|
||||
more socially and legally acceptable, and will hence make
|
||||
eventual attempts to limit the use of crypto anarchy
|
||||
methods moot
|
||||
+ Digital Signatures and Authentication
|
||||
+ for electronic forms of contracts and digital
|
||||
timestamping
|
||||
- not yet tested in the courts, though this should come
|
||||
soon (perhaps by 1996)
|
||||
+ could be very useful for proving that transactions
|
||||
happened at a certain time (Tom Clancy has a situation
|
||||
in "Debt of Honor" in which all Wall Street central
|
||||
records of stock trades are wiped out in a software
|
||||
scheme: only the records of traders are useful, and
|
||||
they are worried about these being fudged to turn
|
||||
profits...timestamping would help immensely)
|
||||
- though certain spoofs, a la the brilliant penny scam,
|
||||
are still possible (register multiple trades, only
|
||||
reveal the profitable ones)
|
||||
- negotiations
|
||||
- AMIX, Xanadu, etc.
|
||||
+ is the real protection against viruses (since all other
|
||||
scanning methods will increasingly fail)
|
||||
- software authors and distributors "sign" their
|
||||
work...no virus writer can possibly forge the digital
|
||||
signature
|
||||
+ Proofs of identity, passwords, and operating system use
|
||||
- ZKIPS especially in networks, where the chances of seeing
|
||||
a password being transmitted are much greater (an obvious
|
||||
point that is not much discussed)
|
||||
+ operating systems and databases will need more secure
|
||||
procedures for access, for agents and the like to pay for
|
||||
services, etc.
|
||||
- unforgeable tokens
|
||||
+ Cyberspace will need better protection
|
||||
- to ensure spoofing and counterfeiting is reduced
|
||||
(recall Habitat's problems with people figuring out the
|
||||
loopholes)
|
||||
+ if OH is also working on "world- building" at Los
|
||||
Alamos, he may be using evolutionary systems and
|
||||
abstract math to help build better and more "coherent"
|
||||
worlds
|
||||
- agents, demons, structures, persistent objects
|
||||
- encryption to protect these structures
|
||||
+ the abstract math part of cyberspace: abstract
|
||||
measure spaces, topologies, distance metrics
|
||||
- may figure in to the balance between user
|
||||
malleabilty and rigidity of the space
|
||||
- Chaitin's AIT...he has obtained measures for these
|
||||
+ Digital Contracts
|
||||
- e-mail too easily forged, faked (and lost, misplaced)
|
||||
+ Anonymity
|
||||
- remailing
|
||||
- law avoidance
|
||||
- samizdats,
|
||||
- Smart cards, ATMs, etc.
|
||||
- Digital Money
|
||||
- Voting
|
||||
+ Information Markets
|
||||
- data havens, espionage
|
||||
+ Privacy of Purchases
|
||||
- for general principles, to prevent a surveillance society
|
||||
+ specialized mailing lists
|
||||
- vendors pay to get names (Crest labels)
|
||||
- Smalltalk job offers
|
||||
- in electronic age, will be much easier to "troll" for
|
||||
specialized names
|
||||
- people will want to "selectively disclose" their
|
||||
interests (actually, some will, some won't)
|
||||
6.3.4. "What may limit the use of crypto?"
|
||||
+ "It's too hard to use"
|
||||
- multiple protocols (just consider how hard it is to
|
||||
actually send encrypted messages between people today)
|
||||
- the need to remember a password or passphrase
|
||||
+ "It's too much trouble"
|
||||
- the argument being that people will not bother to use
|
||||
passwords
|
||||
- partly because they don't think anything will happen to
|
||||
them
|
||||
+ "What have you got to hide?"
|
||||
- e.g.,, imagine some comments I'd have gotten at Intel had
|
||||
I encrypted everything
|
||||
- and governments tend to view encryption as ipso facto
|
||||
proof that illegalities are being committed: drugs, money
|
||||
laundering, tax evasion
|
||||
- recall the "forfeiture" controversy
|
||||
+ Government is taking various steps to limit the use of
|
||||
encryption and secure communication
|
||||
- some attempts have failed (S.266), some have been
|
||||
shelved, and almost none have yet been tested in the
|
||||
courts
|
||||
- see the other sections...
|
||||
+ Courts Are Falling Behind, Are Overcrowded, and Can't Deal
|
||||
Adequately with New Issues-Such as Encryption and Cryonics
|
||||
- which raises the issue of the "Science Court" again
|
||||
- and migration to private adjudication (regulatory
|
||||
arbitrage)
|
||||
- BTW, anonymous systems are essentially the ultimate merit
|
||||
system (in the obvious sense) and so fly in the face of the
|
||||
"hiring by the numbers" de facto quota systems now
|
||||
creeeping in to so many areas of life....there may be rules
|
||||
requiring all business dealings to keep track of the sex,
|
||||
race, and "ability group" (I'm kidding, I hope) of their
|
||||
employees and their consultants
|
||||
6.3.5. "What are some likely future uses of crypto?"
|
||||
- Video conferencing: without crypto, or with government
|
||||
access, corporate meetings become public...as if a
|
||||
government agent was sitting in a meeting, taking notes.
|
||||
(There may be some who think this is a good idea, a check
|
||||
on corporate shenanigans. I don't. Much too high a price to
|
||||
pay for marginal or illusory improvements.)
|
||||
- presenting unpopular views
|
||||
+ getting and giving medical treatments
|
||||
- with or without licenses from the medical union (AMA)
|
||||
- unapproved treatments
|
||||
- bootleg medical treatments
|
||||
- information markets
|
||||
+ sanctuary movements, underground railroads
|
||||
- for battered wives
|
||||
- and for fathers taking back their children
|
||||
- (I'm not taking sides)
|
||||
- smuggling
|
||||
- tax evasion
|
||||
- data havens
|
||||
- bookies, betting, numbers games
|
||||
- remailers, anonymity
|
||||
- religious networks (digital confessionals)
|
||||
- digital cash, for privacy and for tax evasion
|
||||
- digital hits
|
||||
- newsgroup participation -- archiving of Netnews is
|
||||
commonplace, and increases in storage density make it
|
||||
likely that in future years one will be able to purchase
|
||||
disks with "Usenet, 1985-1995" and so forth (or access,
|
||||
search, etc. online sites)
|
||||
6.3.6. "Are there illegal uses of crypto?"
|
||||
- Currently, there are no blanket laws in the U.S. about
|
||||
encryption.
|
||||
+ There are specific situations in which encryption cannot be
|
||||
freely used (or the use is spelled out)
|
||||
- over the amateur radio airwave...keys must be provided
|
||||
+ Carl Elllison has noted many times that cryptography has
|
||||
been in use for many centuries; the notion that it is a
|
||||
"military" technology that civilians have some how gotten
|
||||
ahold of is just plain false.
|
||||
- and even public key crypto was developed in a university
|
||||
(Stanford, then MIT)
|
||||
|
||||
6.4. Protection of Corporate and Financial Privacy
|
||||
6.4.1. corporations are becoming increasingly concerned about
|
||||
interception of important information-or even seemingly minor
|
||||
information-and about hackers and other intruders
|
||||
- calls for network security enhancement
|
||||
- they are hiring "tiger teams" to beef up security
|
||||
+ cellular phones
|
||||
- interceptions are common (and this is becoming
|
||||
publicized)
|
||||
- modifications to commercial scanners are describe in
|
||||
newsletters
|
||||
- something like Lotus Notes may be a main substrate for the
|
||||
effective introduction of crypto methods (ditto for
|
||||
hypertext)
|
||||
6.4.2. Corporate Espionage (or "Business Research")
|
||||
+ Xeroxing of documents
|
||||
- recall the way Murrray Woods inspected files of Fred
|
||||
Buch, suspecting he had removed the staples and Xeroxed
|
||||
the documents for Zilog (circa late 1977)
|
||||
- a precedent: shapes of staples
|
||||
+ colors of the paper and ink...blues, for example
|
||||
- but these low-tech schemes are easy to circumvent
|
||||
+ Will corporations crack down on use of modems?
|
||||
+ after all, the specs of a chip or product could be mailed
|
||||
out of the company using the companies own networks!
|
||||
- applies to outgoing letters as well (and I've never
|
||||
heard of any company inspecting to this detail, though
|
||||
it may happen at defense contractors)
|
||||
+ and messages can still be hidden (covert channels)
|
||||
- albeit at much lower bandwidths and with more effort
|
||||
required (it'll stop the casual leakage of information)
|
||||
- the LSB method (though this still involves a digital
|
||||
storage means, e.g., a diskette, which might be
|
||||
restricted)
|
||||
- various other schemes: buried in word processing format
|
||||
(at low bandwidth)
|
||||
- subtleties such as covert channels are not even
|
||||
considered by corporations-too many leakage paths!
|
||||
+ it seems likely that government workers with security
|
||||
clearances will face restrictions on their access to AMIX-
|
||||
like systems, or even to "private" use of conventional
|
||||
databases
|
||||
- at least when they use UseNet, the argument will go,
|
||||
they can be overseen to some extent
|
||||
+ Offsite storage and access of stolen material
|
||||
+ instead of storing stolen blueprints and schematics on
|
||||
company premises, they may be stored at a remote location
|
||||
- possiby unknown to the company, via cryptoanarchy
|
||||
techniques
|
||||
+ "Business research" is the euphemism for corporate
|
||||
espionage
|
||||
- often hiring ex-DIA and CIA agents
|
||||
+ American companies may step up their economic espionage
|
||||
once it is revealed just how extensive the spying by
|
||||
European and Japanese companies has been
|
||||
- Chobetsu reports to MITI
|
||||
- Mossad aids Israeli companies, e.g., Elscint. Elbit
|
||||
+ Bidzos calls this "a digital Pearl Harbor" (attacks on
|
||||
network security)
|
||||
- would be ironic if weaknesses put into encryption gear
|
||||
came back to haunt us
|
||||
+ corporations will want an arms length relationship with
|
||||
corporate spies, to protect themselves against lawsuits,
|
||||
criminal charges, etc.
|
||||
- third party research agencies will be used
|
||||
6.4.3. Encryption to Protect Information
|
||||
- the standard reason
|
||||
+ encryption of e-mail is increasing
|
||||
- the various court cases about employers reading
|
||||
ostensibly private e-mail will sharpen this debate (and
|
||||
raise the issue of employers forbidding encryption;
|
||||
resonances with the mostly-settled issue of reasonable
|
||||
use of company phones for private calls-more efficient to
|
||||
let some personal calls be made than to lose the time of
|
||||
employees going to public phones)
|
||||
+ encryption of faxes will increase, too, especially as
|
||||
technology advances and as the dangers of interception
|
||||
become more apparent
|
||||
- also, tighter links between sender and receive, as
|
||||
opposed to the current "dial the number and hope it's the
|
||||
right one" approach, will encourage the additional use of
|
||||
encryption
|
||||
- "electronic vaulting" of large amounts of information, sent
|
||||
over T1 and T3 data networks, e.g., backup material for
|
||||
banks and large corporations
|
||||
+ the miles and miles of network wiring within a
|
||||
corporation-LANs, WANs, Novell, Ethernet, TCP-IP, Banyan,
|
||||
and so on-cannot all be checked for taps...who would even
|
||||
have the records to know if some particular wire is going
|
||||
where it should? (so many undocumented hookups, lost
|
||||
records, ad hoc connections, etc.)
|
||||
- the solution is to have point-to-point encryption, even
|
||||
withing corporations (for important items, at least)
|
||||
- wireless LANs
|
||||
- encryption provides "solidity" to cyberspace, in the sense
|
||||
of creating walls, doors, permanent structures
|
||||
- there may even be legal requirements for better security
|
||||
over documents, patient files, employee records, etc.
|
||||
6.4.4. U.S. willing to seize assets as they pass through U.S.
|
||||
(Haiti, Iraq)
|
||||
6.4.5. Privacy of research
|
||||
- attacks on tobacco companies, demanding their private
|
||||
research documents be turned over to the FDA (because
|
||||
tobacco is 'fair game" for all such attacks, ...)
|
||||
6.4.6. Using crypto-mediated business to bypass "deep pockets"
|
||||
liability suits, abuse of regulations, of the court system,
|
||||
etc.
|
||||
+ Abuses of Lawsuits: the trend of massive
|
||||
judgments...several million for a woman burned when she
|
||||
spilled hot coffee at a MacDonald's ($160K for damages, the
|
||||
rest for "punitive damages")
|
||||
- billions of dollars for various jury decisions
|
||||
- "deep pockets" lawsuits are a new form of populism, of de
|
||||
Tocqueville's pocket-picking
|
||||
+ For example, a shareware author might collect digital cash
|
||||
without being traceable by those who feel wronged
|
||||
- Is this "right"? Well , what does the contract say? If
|
||||
the customer bought or used the product knowing that the
|
||||
author/seller was untraceable, and that no additional
|
||||
warranties or guarantees were given, what fraud was
|
||||
committed?
|
||||
+ crypto can, with some costs, take interactions out of the
|
||||
reach of courts
|
||||
- replacing the courts with PPL-style private-produced
|
||||
justice
|
||||
6.4.7. on anonymous communication and corporations
|
||||
- Most corporations will avoid anonymous communications,
|
||||
fearing the repercussions, the illegality (vis-a-vis
|
||||
antitrust law), and the "unwholesomeness" of it
|
||||
+ Some may use it to access competitor intelligence, offshore
|
||||
data havens, etc.
|
||||
- Even here, probably through "arm's length" relationships
|
||||
with outside consultants, analogous to the cutouts used
|
||||
by the CIA and whatnot to insulate themselves from
|
||||
charges
|
||||
- Boldest of all will be the "crypto-zaibatsu" that use
|
||||
strong crypto of the crypto anarchy flavor to arrange
|
||||
collusive deals, to remove competitors via force, and to
|
||||
generally pursue the "darker side of the force," to coin a
|
||||
phrase.
|
||||
|
||||
6.5. Digital Signatures
|
||||
6.5.1. for electronic forms of contracts
|
||||
- not yet tested in the courts, though this should come soon
|
||||
(perhaps by 1996)
|
||||
6.5.2. negotiations
|
||||
6.5.3. AMIX, Xanadu, etc.
|
||||
6.5.4. is the real protection against viruses (since all other
|
||||
scanning methods will increasingly fail)
|
||||
- software authors and distributors "sign" their work...no
|
||||
virus writer can possibly forge the digital signature
|
||||
|
||||
6.6. Political Uses of Crypto
|
||||
6.6.1. Dissidents, Amnesty International
|
||||
- Most governments want to know what their subjects are
|
||||
saying...
|
||||
- Strong crypto (including steganography to hide the
|
||||
existence of the communications) is needed
|
||||
- Myanmar (Burma) dissidents are known to be using PGP
|
||||
6.6.2. reports that rebels in Chiapas (Mexico, Zapatistas) are on
|
||||
the Net, presumably using PGP
|
||||
- (if NSA can really crack PGP, this is probably a prime
|
||||
target for sharing with the Mexican government)
|
||||
6.6.3. Free speech has declined in America--crypto provides an
|
||||
antidote
|
||||
- people are sued for expressing opinions, books are banned
|
||||
("Loompanics Press" facing investigations, because some
|
||||
children ordered some books)
|
||||
+ SLAPP suits (Strategic Lawsuiits Against Public
|
||||
Participation), designed to scare off differing opinions by
|
||||
threatening legal ruination in the courts
|
||||
- some judges have found for the defendants and ordered the
|
||||
SLAPPers to pay damages themselves, but this is still a
|
||||
speech-chilling trend
|
||||
- crypto untraceability is good immunity to this trend, and
|
||||
is thus *real* free speech
|
||||
|
||||
6.7. Beyond Good and Evil, or, Why Crypto is Needed
|
||||
6.7.1. "Why is cryptography good? Why is anonymity good?"
|
||||
- These moral questions pop up on the List once in a while,
|
||||
often asked by someone preparing to write a paper for a
|
||||
class on ethics or whatnot. Most of us on the list probably
|
||||
think the answers are clearly "yes," but many in the public
|
||||
may not think so. The old dichotomy between "None of your
|
||||
damned business" and "What have you got to hide?"
|
||||
- "Is it good that people can write diaried unread by
|
||||
others?" "Is it good that people can talk to each other
|
||||
without law enforcement knowing what they're saying?" "Is
|
||||
it good that people can lock their doors and hide from
|
||||
outsiders?" These are all essentially equivalent to the
|
||||
questions above.
|
||||
- Anonymity may not be either good or not good, but the
|
||||
_outlawing_ of anonymity would require a police state to
|
||||
enforce, would impinge on basic ideas about private
|
||||
transactions, and would foreclose many options that some
|
||||
degree of anonymity makes possible.
|
||||
- "People should not be anonymous" is a normative statement
|
||||
that is impractical to enforce.
|
||||
6.7.2. Speaking of the isolation from physical threats and pressures
|
||||
that cyberspace provides, Eric Hughes writes: "One of the
|
||||
whole points of anonymity and pseudonymity is to create
|
||||
immunity from these threats, which are all based upon the
|
||||
human body and its physical surroundings. What is the point
|
||||
of a system of anonymity which can be pierced when something
|
||||
"bad" happens? These systems do not reject the regime of
|
||||
violence; rather, they merely mitigate it slightly further
|
||||
and make their morality a bit more explicit.....I desire
|
||||
systems which do not require violence for their existence and
|
||||
stability. I desire anonymity as an ally to break the hold
|
||||
of morality over culture." [Eric Hughes, 1994-08-31]
|
||||
6.7.3. Crypto anarchy means prosperity for those who can grab it,
|
||||
those competent enough to have something of value to offer
|
||||
for sale; the clueless 95% will suffer, but that is only
|
||||
just. With crypto anarchy we can painlessly, without
|
||||
initiation of aggression, dispose of the nonproductive, the
|
||||
halt and the lame. (Charity is always possible, but I suspect
|
||||
even the liberal do-gooders will throw up their hands at the
|
||||
prospect of a nation of mostly unskilled and essentially
|
||||
illiterate and innumerate workers being unable to get
|
||||
meaninful, well-paying jobs.)
|
||||
6.7.4. Crypto gets more important as communication increases and as
|
||||
computing gets distributed
|
||||
+ with bits and pieces of one's environment scattered around
|
||||
- have to worry about security
|
||||
- others have to also protect their own products, and yet
|
||||
still provide/sell access
|
||||
- private spaces needed in disparate
|
||||
locations...multinationals, teleconferencing, video
|
||||
|
||||
6.8. Crypo Needed for Operating Systems and Networks
|
||||
6.8.1. Restrictions on cryptography--difficult as they may be to
|
||||
enforce--may also impose severe hardships on secure operating
|
||||
system design, Norm Hardy has made this point several times.
|
||||
- Agents and objects inside computer systems will likely need
|
||||
security, credentials, robustness, and even digital money
|
||||
for transactions.
|
||||
6.8.2. Proofs of identity, passwords, and operating system use
|
||||
- ZKIPS especially in networks, where the chances of seeing a
|
||||
password being transmitted are much greater (an obvious
|
||||
point that is not much discussed)
|
||||
+ operating systems and databases will need more secure
|
||||
procedures for access, for agents and the like to pay for
|
||||
services, etc.
|
||||
- unforgeable tokens
|
||||
6.8.3. An often unmentioned reason why encyption is needed is for
|
||||
the creation of private, or virtual, networks
|
||||
- so that channels are independent of the "common carrier"
|
||||
+ to make this clear: prospects are dangerously high for a
|
||||
consolidation under government control of networks
|
||||
- in parallel with roads
|
||||
+ and like roads, may insist on equivalent of licenses
|
||||
- is-a-person
|
||||
- bans on encryption
|
||||
- The Nightmare Scenario: "We own the networks, we won't
|
||||
let anyone install new networks without our approval, and
|
||||
we will make the laws about what gets carried, what
|
||||
encryption can be used, and how taxes will be collected."
|
||||
- Fortunately, I doubt this is enforceable...too many ways
|
||||
to create virtual networks...satellites like Iridium,
|
||||
fiber optics, ways to hide crypto or bury it in other
|
||||
traffic
|
||||
+ cyberspace walls...
|
||||
+ more than just crypto: physical security is needed (and
|
||||
for much the same reason no "digital coin" exists)
|
||||
- processes running on controlled-accesss machines (as
|
||||
with remailers)
|
||||
- access by crypto
|
||||
+ a web of mutually suspicious machines may be sufficient
|
||||
- robust cyberspaces built with DC-Net ("dining
|
||||
cryptographers") methods?
|
||||
|
||||
6.9. Ominous Trends
|
||||
6.9.1. Ever-increasing numbers of laws, complexities of tax codes,
|
||||
etc.
|
||||
- individuals no longer can navigate
|
||||
6.9.2. National ID cards
|
||||
- work permits, immigration concerns, welfare fraud, stopping
|
||||
terrorists, collecting taxes
|
||||
- USPS and other proposals
|
||||
6.9.3. Key Escrow
|
||||
6.9.4. Extension of U.S. law around the world
|
||||
- Now that the U.S. has vanquished the U.S.S.R., a free field
|
||||
ahead of it for spreading the New World Order, led of
|
||||
course by the U.S.A. and its politicians.
|
||||
- treaties, international agreements
|
||||
- economic hegemony
|
||||
- U.N. mandates, forces, "blue helmets"
|
||||
6.9.5. AA BBS case means cyberspace is not what we though it was
|
||||
|
||||
6.10. Loose Ends
|
||||
6.10.1. "Why don't most people pay more attention to security
|
||||
issues?"
|
||||
- Fact is, most people never think about real security.
|
||||
- Safe manufacturers have said that improvements in safes
|
||||
(the metal kind) were driven by insurance rates. A direct
|
||||
incentive to spend more
|
||||
money to improve security (cost of better safe < cost of
|
||||
higher insurance rate).
|
||||
- Right now there is almost no economic incentive for people
|
||||
to worry
|
||||
about PIN security, about protecting their files, etc.
|
||||
(Banks eat the
|
||||
costs and pass them on...any bank which tried to save a few
|
||||
bucks in
|
||||
losses by requiring 10-digit PINs--which people would
|
||||
*write down*
|
||||
anyway!--would lose customers. Holograms and pictures on
|
||||
bank cards
|
||||
are happening because the costs have dropped enough.)
|
||||
- Crypto is economics. People will begin to really care when
|
||||
it costs them.
|
||||
|
||||
6.10.2. What motivates an attackers is not the intrinsic value of the
|
||||
data but his perception of the value of the data.
|
||||
6.10.3. Crypto allows more refinement of permissions...access to
|
||||
groups, lists
|
||||
- beyond such crude methods as banning domain names or "edu"
|
||||
sorts of accounts
|
||||
6.10.4. these general reasons will make encryption more common, more
|
||||
socially and legally acceptable, and will hence make eventual
|
||||
attempts to limit the use of crypto anarchy methods moot
|
||||
6.10.5. protecting reading habits..
|
||||
- (Imagine using your MicroSoftCashCard for library
|
||||
checkouts...)
|
||||
6.10.6. Downsides
|
||||
- loss of trust
|
||||
- markets in unsavory things
|
||||
- espionage
|
||||
+ expect to see new kinds of con jobs
|
||||
- confidence games
|
||||
- "Make Digital Money Fast"
|
||||
6.10.7. Encryption of Video Signals and Encryption to Control Piracy
|
||||
- this is of course a whole technology and industry
|
||||
- Videocypher II has been cracked by many video hackers
|
||||
- a whole cottage industry in cracking such cyphers
|
||||
- note that outlawing encryption would open up many
|
||||
industries to destruction by piracy, which is yet another
|
||||
reason a wholesale ban on encryption is doomed to failure
|
Loading…
x
Reference in New Issue
Block a user