this is analogeous to one of my first lessons that I learned on freenet -
you're not anonymous if someone can work out who you are by reading your
freesite, and that's not as difficult to work out as you think ;)

(hey, how was I to know she'd get a freenet node setup? :-p)

        - fish

On Tue, 19 Nov 2002, Ian Clarke wrote:

> On Tue, Nov 19, 2002 at 06:31:13AM -0600, Mark J Roberts wrote:
> > fish:
> > > we all know why anonymity and a distributed network is needed for that,
> > > right? :)
> > 
> > Constantly inserting predictable keys is a great way to throw away what
> > little anonymity you have.
> 
> It is really tiresome to hear this kind of commentary.
> 
> It is analagous to me saying:
> 
> "Given sufficient resources, I can break RSA encryption".
> 
> This statement is perfectly true, and like MJR's comment, perfectly
> useless. What would be useful is to give an indication of what resources
> it might take for me to break RSA encryption.  
> 
> By the same token, MJR - if you would like to make yourself useful, why
> not figure out what it would take for someone to compromize someone's
> anonymity, and that would actually give us a better idea of how they
> might take advantage of repeated insertions - and then perhaps help us
> to make it more difficult for them.  This is called "Constructive
> Criticism".
> 
> And while I am ranting, it isn't uncommon to hear comments analogous to:
> 
> "Hey, [Security architecture X] is so powerful that even if someone had 
> the ability to torture and extract information from anyone in the world, 
> they wouldn't be able to decrypt your message".
> 
> This is an extreme example, but it highlights the point.  Clearly, if 
> someone had the ability to extract information from anyone, they 
> *wouldn't need* to decrypt my message, they could simply rubber-hose the 
> information out of me.  
> 
> Security is like a chain, in that it is only as strong as its weakest
> link, and that weakest link is often not where most people focus their
> attention.  Typically they put all of their energy into strengthening
> one link in the chain, which of-course becomes energy wasted (and false
> sense of security created) as soon as that is no-longer the weakest
> link.  
> 
> Yet another good example of this would be people who go through
> extraordinary lengths to encrypt their emails, where it would be
> relatively cheap for someone to break into their home, and tap their
> keyboard.
> 
> The last, and definitely the one that offers the best snide response, is
> the biometrics sales rep who gleefully proclaims that "someone would
> need to cut your finger off to circumvent this security system!".  The
> obvious response being "Why the hell would I want to give someone an
> incentive to cut off my finger?!".
> 
> Ok, rant over.
> 
> Ian.
> 
> -- 
> Ian Clarke                ian@[freenetproject.org|locut.us|cematics.com]
> Latest Project                                 http://cematics.com/kanzi
> Personal Homepage                                     http://locut.us/
> 


_______________________________________________
devl mailing list
devl at freenetproject.org
http://hawk.freenetproject.org/cgi-bin/mailman/listinfo/devl

Reply via email to