On 20/05/13 20:08 PM, Mark Seiden wrote:
(i know that at least jake and ian understand all the nuances here, probably 
better than me.)

bus still, i would like you to consider, for a moment, this question:

suppose there were a service that intentionally wanted to protect recipients of 
communications
from malicious traffic?   when i was at $big_provider, i spent an awful lot of 
time and energy
communicating with colleagues and sharing threat intelligence about bad guys.

i.e. accumulating reputation information about the counterparties.

any mechanism to do this (that i could think of, anyway) presents a possible 
risk to
those communicants who want no attributable state saved about their 
communication.
either these are privacy freaks (not intended pejoratively:  for whatever 
reason, they're
entitled to be…) …  or criminals.


Right. I definitely agree and I'm in that business myself -- designing a system that is oriented towards protecting our customers as much from themselves as from their enemies. And, I haven't even got e2e-in-chat as yet so some claim of hypocrisy might stick.

To be fair to skype, if and when they decided to rollback their e2e, how would they have broached this to users? I have an answer for my world, but it isn't a trivial plugin that skype or a similar company could download&rollout; I don't know how your regular business would attack this situation.

Has there been any successful case study of a security vendor rolling back a security feature? Or is the ostrich strategy the only known way?


it's really hard to engineer systems that will satisfy the needs of privacy 
freaks while still
protecting the naive, and not at the same time equip criminal enterprises.  
most of us
seem to be willing to engineer to trust ourselves (the operators of the 
facility) to have
good taste in protecting all but the criminals.  only a few of us  are willing 
to go as far as
"you can trust us because you don't have to".

Yeah. One of the bigger issues that we have to deal with here is that classical CIA is not really appropriate. For historical reasons, we picked up the standard practices from the military a long time ago, and the history of the 1990s and 2000s has shown us that more is needed than some form of cryptographic self-entertainment.

i still believe microsoft is trying to do the right thing here for 99*% of 
their users,
but they can't help but get slammed because they haven't been crystal clear 
about
it, hiding the activity with weasel words and legalese in their TOS.  i also 
agree that
relying on an old and inapplicable security review would be a deceptive 
practice.

i agree with ian that telling people what your system does so they can manage 
their own
risks (transparency) is a good middle ground.  (but it also enables criminals 
to know how
to avoid detection, not a society good).


That latter point -- that criminals would understand our system if we told them -- I think I disagree with. IMHO criminals are actually far better at this job than we are. They are far more discerning, far more economic, and they have better incentives. A better track record, and better pay.


(so now we all know, skype is not suitable for privacy freaks or criminals!  
woo hoo.)


The question is, is it useful for anyone in a privacy sense? Let's do some quick analysis. Which is the most likely scenario to attack the ordinary person: NSA snooping, court subpoena, private litigation with business partner or family member snooping?

I'd posit it is in reverse order. Protecting your node against the person you're talking to is far more important. To some extent this means setting the caching on your skype IM settings to low, and cleaning it out; but it also means that if you are in business or any court situation (divorce? abuse? insider trading?) you now have to consider that the other party can now subpoena against skype.


(btw, keep in mind that any hosting provider can inspect hosted web content on 
their backends,
which would show nothing in web access logs.  their TOS doubtless permits that. 
 there
is nothing that i know of that requires your hosted content or your site 
activity to not be looked at
by your provider, unless stored communication is involved, and even then there 
are provider
exceptions such as for malware and AV scanning.)


You are right, and I expect Skype to invoke the TOS defence.

But this also tells us we're already in trouble. For several reasons. If TOS need to be drawn on to be able to do things that are a surprise to the user, then the explanation hasn't been very good. Also, TOS as a defence is a strong signal that USA-lawyer-itis has struck deep into the security department, and we now have a foil or facade to hide the real security model. Further, TOS is a burden on all users, who don't understand them, and typically won't read them because they don't explain what the users need to know.

The standard of mud in TOS is the CA/Browser business. E.g., they provide nothing, they charge a lot, they engage in cartels to keep their franchise alive, and they blithely avoid the real, documented and expensive attacks on users. Pop quiz -- can anyone identify the value to users in TOS or practices documents?

http://en.wikipedia.org/wiki/Extended_Validation_Certificate#PKI-Me-Harder

Is the CA-anti-standard one to which Microsoft/Skype aspires? I had actually thought that Microsoft had understood the lesson of the 2000s by now and realised that security was not just a media wash or a TOS deception, and that in part their loss of market to Apple was because Apple took security more seriously (look Mum, still no viruses...).

The Skype revelation has me a bit surprised.



iang

_______________________________________________
cryptography mailing list
[email protected]
http://lists.randombit.net/mailman/listinfo/cryptography

Reply via email to