On 05/17/2014 01:14 AM, Brian E Carpenter wrote:
> On 17/05/2014 09:47, Melinda Shore wrote:
>> On 5/16/14 1:41 PM, Ted Lemon wrote:
>>> The thing I really hate about these metaphors is that they lead one
>>> to the conclusion that it's pointless to use strong crypto, when
>>> really the conclusion one should draw is that one should try to avoid
>>> living in cardboard boxes, where possible.
>>
>> I don't see that, myself.  Seems to me to be arguing for a systems
>> view.
> 
> I think that is Peter's point, from hearing his talk live a few months
> ago. You need crypto, but you also need a very strong cardboard box
> with no buffer overflows, and without the password being scrawled
> on the outside. And do not trust passing strangers who offer
> unexpected gifts.
> 
> Of course, there is only so much we can do in IETF protocol
> specifications.

Actually, from a systems perspective this is quite a bit one can do in
an IETF or W3C specification. For example, data minimization by not
leaking identifiers except when necessary. See "hiding metadata" in the
STRINT workshop report [1]. The methods of system-thinking in security
is still very young, but I'd say the arms race with the NSA is on :)

[1] https://tools.ietf.org/html/draft-iab-strint-report-00#page-6

   cheers,
       harry



> 
>     Brian
> 
> _______________________________________________
> perpass mailing list
> [email protected]
> https://www.ietf.org/mailman/listinfo/perpass
> 

_______________________________________________
perpass mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/perpass

Reply via email to