On Mar 21, 2014, at 10:53 AM, Richard Barnes <[email protected]> wrote:
> Which would you rather do, dig up a sub-sea cable, or tap a server admin on 
> the shoulder?

Actually, they just put taps in Googles and Facebook's data centers.   No need 
to tap an undersea cable.   They even did it on the far side of SSL 
concentrators, where the traffic was flying unencrypted.   So encrypting 
traffic as Google is now doing certainly does address a meaningful threat model.

There are a lot of things you'd like your mail to do that can't be done if you 
don't trust the machine where the mail is stored.   If you want both security 
and features, you probably need to run your own server, or else you need some 
trust relationship with the service provider that likely isn't practical in a 
lot of cases, and isn't even _possible_ if your threat model is something on 
the level of not being victimized by NSLs.


_______________________________________________
perpass mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/perpass

Reply via email to