On 11/04/2014 19:36 pm, Arshad Noor wrote:
> On 04/11/2014 03:51 PM, ianG wrote:
>> On 11/04/2014 17:50 pm, Jeffrey Walton wrote:
>>> http://www.bloomberg.com/news/2014-04-11/nsa-said-to-have-used-heartbleed-bug-exposing-consumers.html
>>>
>>>
>>> The U.S. National Security Agency knew for at least two years about a
>>> flaw in the way that many websites send sensitive information, now
>>> dubbed the Heartbleed bug, and regularly used it to gather critical
>>> intelligence, two people familiar with the matter said.
>>
>> 1.  score 1 up for closed source.  Although this bug would as equally
>> exist in closed source, the likelihood of discovery, publication and
>> exploitation is much lower.
> 
> Isn't that a naive assumption?  Every US-based company that has anything
> to do with crypto has to send in their source-code to a special address
> before you can be granted a License Exception (US BIS rules) to export
> to foreign customers.  (The only exception is open-source - whose
> creators must still notify a special e-mail address about the new FOSS).
> In either case, NSA knows about it.


Well, 1. the whole world isn't the USA.  2. we have to differentiate
between NSA-as-existential-threat and the other one which is
hackers-as-people-who-steal-money.

> Is it any less worse that only the NSA might have exploited unknown
> loopholes than random attackers after your money?  They're undermining
> trust in the internet - which is now a multi-billion - perhaps even a
> trillion - dollar industry involving millions of jobs.  Given that the
> US is probably the largest creator of technology products, the end
> result is likely to be a boon for technology companies around the world
> as US jobs are lost due to lost exports.


Right.  Can you put a number on that?  And can you put a number on the
things that the other crooks do?  The latter is certainly true, there is
a big body of evidence that shows that money is being raided from the
Internet in a big way.  Nobody's ever put a number of any credibility on
the NSA damage.

Heartbleed is a big issue because it opens the door for massive robbery,
not because it gives the NSA 1 more trick to add to their other 100.  If
it was *just the NSA* then I'd recommend not re-rolling keys, because
only a tiny proportion of the public are targets, and they should know
who they are.

Open source makes this *everyone at risk*.

> As I see it, only open-source software has a chance to be trusted since
> users can see what they're deploying; of course, it has to be verified,
> but that was always true.


That's why I said "score 1" and not "this is the end of the debate."
It's complicated, there are many factors involved.



iang
_______________________________________________
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography

Reply via email to