On 28/03/15 02:36, [email protected] wrote:
> In a world where the deployment curve of the IoT
> has a 17-month doubling time, who or what is going to do
> the key management that you would actually believe in?

I'm sorry but the article *you* quoted made just the opposite
assumption (that doing "perfect" e2e crypto is possible) and
now you want to argue the opposite side? (That it is not.)
That's not IMO constructive.

As to what we should be doing - we (participating in the IETF)
should be (and I think are) doing the engineering to figure out
if and how we can make the Internet more secure and privacy
friendly without breaking it. Yes, there are unsolved problems
there related to key management at scale and there are perhaps
even more fundamental issues with privacy generally (in that
we don't understand it nearly as well as other security things)
but we ought not be trying to use both sides of arguments for
what look to me like purely rhetorical purposes.

Higher quality input is of course welcome.

S.

_______________________________________________
perpass mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/perpass

Reply via email to