On Mar 21, 2014, at 10:53 AM, Richard Barnes <[email protected]> wrote: > Which would you rather do, dig up a sub-sea cable, or tap a server admin on > the shoulder?
Actually, they just put taps in Googles and Facebook's data centers. No need to tap an undersea cable. They even did it on the far side of SSL concentrators, where the traffic was flying unencrypted. So encrypting traffic as Google is now doing certainly does address a meaningful threat model. There are a lot of things you'd like your mail to do that can't be done if you don't trust the machine where the mail is stored. If you want both security and features, you probably need to run your own server, or else you need some trust relationship with the service provider that likely isn't practical in a lot of cases, and isn't even _possible_ if your threat model is something on the level of not being victimized by NSLs. _______________________________________________ perpass mailing list [email protected] https://www.ietf.org/mailman/listinfo/perpass
