On 09/22/2013 02:46 PM, Bjoern Hoehrmann wrote:
>>
>> one scenario I would think about two people with tablet computers that
>> run the Acme tablet operating system and they are both using the Acme
>> Web Mail system through the Acme browser and they are connected to the
>> Internet over Acme Fibre. Now the United States want to read their mails
>> to determine whether they or their associates need to be brought free-
>> dom and democracy, and they tell Acme to make that happen using the law
>> above. Is the system supposed to help the two exchange mails securely?
>>
I think your analysis is correct: legal intercept will often be a right
that sovereign states assign to themselves.
Instead of tilting at that windmill, would it be possible to build a
mechanism for making detection of 3rd party intercept tools and
other malware in software easy?
Maybe we should be talking about transparency (in the sense of
certificate transparency) for software. Maybe it should be *hard*
for a vendor to hide capabilities in software targeted at specific
customers by making it *easy* to audit datasets (like software
binary packages).
Cheers Leif
_______________________________________________
perpass mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/perpass