Obama: cryptographers who don't believe in magic ponies are "fetishists," "absolutists"

And (c) the yawning gulf between a) and b)

13 Likes

There is this thing where ā€œthe governmentā€ is the opposite of ā€œprivateā€ in this sense.

there is not government held private key. Thatā€™s like a private tax.

Itā€™s like socialism starting from the wrong way around and skipping the parts involving the people.

6 Likes

Snowden & Manning, among others who have leaked programatic info for ethical purposes. Luckily these people exist to show us poor citizens the light of how the govt has been abusing trust we granted them in the past.

There needs to be two factors applied when considering government access to private data.

a. A means for technology to let the govt be the only entity that can read your data.
b. Trust in the institutions to use that data responsibly.

I donā€™t believe in ā€œAā€. Its a never ending arms race and the consumer base should choose a product that best protects them.

I believe the President has not considered B at all. A lot of his statements made are done in a tone he used when campaigning for his position, i.e. trying to just imply ā€œtrust meā€. Yet here we are with hundreds of examples where multiple levels of federal departments are misusing the data they obtain, not only domestically but internationally as well.

Please give me a means to trust these departments MORE (Iā€™m not looking for absolutes here) and Iā€™d consider playing the game. Until then, Iā€™ll encrypt and protect myself from them.

10 Likes

Slightly OT but one of my supervisors at U once gave a series of lectures on the radio, as a result of which he got so much response he filled a filing cabinet drawer with it, for future research purposes. It was indexed as ā€œgreen inkā€ (conspiracy theorists), ā€œnuttersā€ (completely mad) and, if I remember rightly, a section which might one day deserve psychiatric research. Howeverā€¦
It was noticeable with some of the letters he got that they began quite sensibly and made observations that were less odd than you might hear in a saloon bar (think older white males in business), but would then suddenly veer off in a complete tangent to something which was obviously a fixed idea that was totally out of touch with reality. It was as if they thought they were being clever by getting the interest of the reader by apparently paying attention to what he had been saying, and then when they thought he was hooked, apply the sucker punch to get their obsession over.

Not that I am saying @Kenneth_Mitchell is one of these people, just that his post for some reason took me back over the years and reminded me of our discussion on the subject.

12 Likes

No - what is to prevent law enforcementā€™s key from being stolen, leaked, shared, or mishandled.

5 Likes

Unless you can come up with math that keeps the second key private, then I think you are denying the math.

8 Likes

I agree that we shouldnā€™t be very optimistic such a thing would go well in reality, but in theory if the government took concerns like this really really seriously, couldnā€™t they develop a protocol that ensured the risk of foreign powers (or hackers) obtaining the secret key would be just as low as the risk of foreign powers obtaining our nuclear codes? Presumably there are rules in place which ensure the nuclear codes arenā€™t in some database that is remotely accessible by a large number of government employees.

If the carrot doesnā€™t work, there are people who would use the stick. ā€œMr. NSA person with access to the key, it would be a shame if something were to happen to your son or daughter while theyā€™re in their Spanish class third period with Mr. Smith at X Middle School. There are too many school shootings these days, arenā€™t there? We could provide some guards to ensure nothing happens there if you do us a favor ā€¦ā€

3 Likes

What prevents law enforcementā€™s key from being compromised is the same thing that prevents the US governmentā€™s diplomatic cables from being leaked.

7 Likes

Iā€™m not much for vanishingly implausible hypotheticals. Iā€™m going to say that this would almost certainly be treated more like the documents with extensive interviews and personal information on every single person with a security clearance which were recently hacked by the Chinese.

As a base rule of thumb, Iā€™m would suggest that anyone who seriously suggests this as an option until the government has gone ~10 years without a major data breach is a fool or is being disingenuous.

6 Likes

Thatā€™s a redundant tautology.

Ah, I see we have a Ted Cruz fan in the house.

4 Likes

Thatā€™s nonsensical because law enforcement is not private. Itā€™s part of the government which is the public sector. So it wouldnā€™t be secure at all.

The real issue that isnā€™t being discussed much is the concept that almost everyone is or should be using the exact same crypto algorithm (or one of a few). This is a serious problem in the same way that everyone using Windows made it such a high-value target for malware and everyone having Flash installed in their browsers made it into little more than a repository of zero-day exploits and vulnerabilities that could sometimes play videos as a side-effect (if your computer wasnā€™t too crippled by all the malware).

What we really need are thousands of variant crypto algorithms, combined with steganography and codes. We need enough permutations and combinations such that breaching any one of them (via master key or otherwise) would give little return for the effort. If we all standardize on one single system, no matter how good it is, then the return on effort will be so immense that it is guaranteed to be worth the cost to someone to breach it. Therefore, even if it is the most secure system possible, it is guaranteed to be insecure.

6 Likes

Um. No. Really, no. Weā€™ve been this standardized for a while, and nobody has broken public key encryption. Thereā€™s a reason for that. The reason is math. While itā€™s not inconceivable that someone could find a way to factor large primes in polynomial time without a quantum computer, that kind of advancement is not the kind of thing you can force by just having a lot of people wanting it badly enough.

5 Likes

AFAIK the ā€œnuclear codesā€ donā€™t work like that. There isnā€™t a server somewhere with the password ā€œpasswordā€ and when you log in, you get a menu of possible target/warhead combinations. ā€œDo you want to turn on one-click nuclear destruction? Sign up now for Prime nuclear delivery and for just $1 billion per month you can have your target destroyed within 20 minutes of clicking the ā€œAttackā€ button.ā€

There is a chain of command with relatively few hardened endpoints, rather than an open Internet with billions of them.

5 Likes

Which is exactly why imagining a system that treats the ā€œsecret keyā€ like nuclear codes doesnā€™t work. Nuclear codes arenā€™t available for law enforcement agencies across the nation to use whenever a judge signs off on a warrant, which is what they want from the magical pony encryption system.

4 Likes

The ā€œNexusā€ books more or less explored such a concept, and who should have access, etc

4 Likes

I think it may be a timely and fascistic definition of governement that user used there, one which would be indistinguishable from the public sector - at least in the profitable bits. That lines up with one of the tenets of Mussoliniā€™s fascism - military citizenship. No line between public and private.

Weā€™re all at war with terrorists, right? Thatā€™s what this is about, riiiiiight?:wink:

1 Like

10 Likes

ā€¦past my door and past my gate
but sure wonā€™t pass my .38

(just kidding- Iā€™m opposed to any wasting of our limited heavy metal resources on politicians.)

1 Like