"Employers in the US and europe are already somewhat widely asking for facebook passwords,"
I've heard this one, and it stinks to high heaven of an urban legend. Why on earth would anyone ask you for your passwords? I've heard the (slightly) more plausible version where athletes at high schools are required to "friend" their coach or some vice principle or something so they can monitor their private activity. That one also sounds a little bogus to me, but I could buy some Podunk college administration thinking it was a good idea. An employer requiring your password? What on earth for? So has anyone got an instance of this that doesn't come from "a friend of a friend"? On Fri, Jul 5, 2013 at 11:10 AM, Reinier Zwitserloot <[email protected]>wrote: > > > On Friday, July 5, 2013 4:49:33 PM UTC+2, Josh Berry wrote: > >> >> >> >> On Fri, Jul 5, 2013 at 10:26 AM, Reinier Zwitserloot >> <[email protected]>wrote: >> >>> In short: >>> >>> * You do need to trust google, but not very much. I would trust them >>> enough for this specific case. >>> >> >> It is more than just Google that you have to trust. One of the tough >> points to get across to those that are worried about security is that you >> have to have a ridiculously large chain of trust when working on the >> internet. Just take a peek at the certificate authorities that are in your >> browser for a good indication. (And... I realize that is far from >> complete.) >> > > Even if this government has managed to convince a cert authority to give > up the goods (where, again, their 'upside' is tiny and the potential PR > nightmare is gigantinormous, so if I was a shareholder of a cert authority > and they pulled that stunt, I'd consider a legal battle for gross > mismanagement), it takes some serious tech skill to translate this into the > ability to read the email. What would be scary is tools, presumably built > by western companies, that automate the process. These may or may not > exist. Let's hope they don't. There are ways to protect yourself against > this though (such as verifying the signature of gmail's TLS certificate), > and there are ways in which you can't stop this in any way or form > whatsoever (if the government has compromised the very machine you're > working on, there is nothing you can do, at all, assuming they have enough > technical skill). > > >> >> >> >>> * PGP is not a solution whatsoever. There are still ways to use crypto >>> here (steganographics), but it's very very tricky to use, and the tools >>> aren't mature. >>> >>> >> Do you think PGP could be good enough if a critical mass was using it? >> > > > Pragmatically speaking, no. Employers in the US and europe are already > somewhat widely asking for facebook passwords, so imagine how well personal > endemic encryption would go over in paranoid government situations. They'll > just demand your keys and passwords, and if you fail to comply you will be > jailed. > > Now, if at least large parts of the world's communities (especially > trendsetting nations) routinely encrypt almost all traffic, it becomes more > of a public outrage if a government does this to its people. This is > perhaps the greatest loss of PRISM etc: It sets entirely the wrong tone. > Western nations should always take the highroad. > > >> Steganography is a neat idea and all, but the point of that is that you >> are using what is essentially a known compromised medium to attempt secure >> communication, right? That is, you know they can see the main carrier, but >> you take steps such that they should not notice the message. Seems >> standard crypto is a much better mechanism, in general. >> > > standard crypto is certainly a lot less tricky from a technical > perspective, but it is simply not a solution in the face of physical > violence. Steganography is specifically the study of how to hide the fact > that you're communicating at all, and that is _EXACTLY_ what you need to > truly solve this issue. Yes, it is tricky. You send each other innocuous > pictures of cats or something but if you take the lowest order bits of each > pixel's RGB info (which will hardly affect the image much), line them up, > and then use decryption on that, you get your message. One of the nice > aspects of almost all encryption algorithms is that you can't tell the > difference between encrypted data and random data. > > The main issue with steganography is that you need to be extremely > tech-savvy to use it properly. If you aren't extremely familiar with how it > all works it is very easy to leave something behind that indicates presence > of steganographic data. For starters, you need a self-destruct mechanism or > hide the software used to obtain and decrypt the data from the > steganographic carrier (the images of kittens). If the malicious authority > finds the software, the jig is up. One solution to this is multiple layers > (where the first layer is not all that compromising, just barely enough > that you can believably claim that you went through the effort of sending > this data securely, but that data itself has MORE steganography in it, > which the same tool could also unpack, provided you give the second > password. This loop is endless, so if you are being interrogated, the > interrogator doesn't know when you're 'done'. This is extremely difficult > to do right, and generally requires huge data overhead). > > > > >> >> >> -- > You received this message because you are subscribed to the Google Groups > "Java Posse" group. > To unsubscribe from this group and stop receiving emails from it, send an > email to [email protected]. > To post to this group, send email to [email protected]. > Visit this group at http://groups.google.com/group/javaposse. > For more options, visit https://groups.google.com/groups/opt_out. > > > -- You received this message because you are subscribed to the Google Groups "Java Posse" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. To post to this group, send email to [email protected]. Visit this group at http://groups.google.com/group/javaposse. For more options, visit https://groups.google.com/groups/opt_out.
