On 15/06/2014 14:37 pm, Stephen Farrell wrote:
> 
> I've no public opinion on Certicom's patent practices. And the
> behaviour of the signals intelligence agencies has been IMO
> deplorable. So I sympathise with some of what you are saying.
> However, building your case on bogus claims that are not facts
> as you are pearly doing is a really bad idea. In particular...
> 
> On 15/06/14 14:13, ianG wrote:
>> What is also curious is that Dan
>> Brown is highly active in the IETF working groups for crypto, 
> 
> That is not correct as far as I can see. In my local archives,
> I see one email from him to the TLS list in 2011 and none in
> 2012. For the security area list (saag), I see a smattering
> of mails in 2011 and 2012 and none in 2013. For the IRTF's
> CFRG, I see a few in 2010, none in 2011 and some in 2012 and
> 2013. I do see increased participation over the last year on
> the the DUAL-EC topic.
> 
> None of the above is anywhere near "highly active" which is
> therefore simply false.
> 
> And I don't believe you yourself are sufficiently active to
> judge whether or not someone else is "highly active" in the
> IETF to be honest. Nor do you seem to have gone through the
> mail list archives to check.


For my part, I had seen his name only with respect to IETF WGs.  However
I admit that I do not follow IETF security WGs closely, so am not
qualified to assert "highly active."  You are right, I am wrong.


> You are both of course welcome to become highly active if you
> do want to participate, same as anyone else.
> 
>> adding
>> weight to the claim that the IETF security area is corrupted.
> 
> And that supposed conclusion, based only on an incorrect claim,
> is utter nonsense. I would have expected better logic and closer
> adherence to the facts.
> 
> Yes, the IETF security area needs to do better, and quite a few
> folks are working on that. Yes, its almost certain the someone
> was paid by BULLRUN to muck up IETF work. Nonetheless unfounded
> misstatements such as the above don't help and are wrong. And
> the correct reaction is to do better work and not to fall for
> the same guily-by-association fallacy that the leads the spooks
> to think that pervasive monitoring is a good plan.


I had a long post addressing this issue, but as it takes us further from
the subject at hand, I'll pull my head from out of the rabbit hole.



iang
_______________________________________________
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography

Reply via email to