On 05/17/2014 01:14 AM, Brian E Carpenter wrote: > On 17/05/2014 09:47, Melinda Shore wrote: >> On 5/16/14 1:41 PM, Ted Lemon wrote: >>> The thing I really hate about these metaphors is that they lead one >>> to the conclusion that it's pointless to use strong crypto, when >>> really the conclusion one should draw is that one should try to avoid >>> living in cardboard boxes, where possible. >> >> I don't see that, myself. Seems to me to be arguing for a systems >> view. > > I think that is Peter's point, from hearing his talk live a few months > ago. You need crypto, but you also need a very strong cardboard box > with no buffer overflows, and without the password being scrawled > on the outside. And do not trust passing strangers who offer > unexpected gifts. > > Of course, there is only so much we can do in IETF protocol > specifications.
Actually, from a systems perspective this is quite a bit one can do in an IETF or W3C specification. For example, data minimization by not leaking identifiers except when necessary. See "hiding metadata" in the STRINT workshop report [1]. The methods of system-thinking in security is still very young, but I'd say the arms race with the NSA is on :) [1] https://tools.ietf.org/html/draft-iab-strint-report-00#page-6 cheers, harry > > Brian > > _______________________________________________ > perpass mailing list > [email protected] > https://www.ietf.org/mailman/listinfo/perpass > _______________________________________________ perpass mailing list [email protected] https://www.ietf.org/mailman/listinfo/perpass
