On 28/03/15 02:36, [email protected] wrote: > In a world where the deployment curve of the IoT > has a 17-month doubling time, who or what is going to do > the key management that you would actually believe in?
I'm sorry but the article *you* quoted made just the opposite assumption (that doing "perfect" e2e crypto is possible) and now you want to argue the opposite side? (That it is not.) That's not IMO constructive. As to what we should be doing - we (participating in the IETF) should be (and I think are) doing the engineering to figure out if and how we can make the Internet more secure and privacy friendly without breaking it. Yes, there are unsolved problems there related to key management at scale and there are perhaps even more fundamental issues with privacy generally (in that we don't understand it nearly as well as other security things) but we ought not be trying to use both sides of arguments for what look to me like purely rhetorical purposes. Higher quality input is of course welcome. S. _______________________________________________ perpass mailing list [email protected] https://www.ietf.org/mailman/listinfo/perpass
