Hi John,

thanks for your reply!

John Denker wrote:

The object of phishing is to perpetrate so-called "identity
theft", so I must begin by objecting to that concept on two
different grounds.

1) For starters, "identity theft" is a misnomer.  My identity
is my identity, and cannot be stolen.

I think I'd echo Lynn's comments - it's the label in use, so we might as well get used to it. In fact, the more I think of it, the more I realise that a desire to get the right terms in place might be part of the answer to the original question!

You are right that it's important to separate out
the two cases: the theft of the immediate account
(and money therein) which is more what phishing is,
from the acquisition of identity data in order to
open new places to steal from (credit ... see my
rant&comments on why this is an American issue and
hence may have escaped the rest of the world's attention:

http://www.financialcryptography.com/mt/archives/000146.html

2) Even more importantly, the whole focus on _identity_ is
pernicious.  For the vast majority of cases in which people
claim to want ID, the purpose would be better served by
something else, such as _authorization_.  For example,
when I walk into a seedy bar in a foreign country, they can
reasonably ask for proof that I am authorized to do so,
which in most cases boils down to proof of age.  They do
*not* need proof of my car-driving privileges, they do not
need my real name, they do not need my home address, and
they really, really, don't need some "ID" number that some
foolish bank might mistake for sufficient authorization to
withdraw large sums of money from my account.  They really,
really, reeeally don't need other information such as what
SCI clearances I hold, what third-country visas I hold, my
medical history, et cetera.  I could cite many additional
colorful examples, but you get the idea:  The more info is
linked to my "ID" (either by writing it on the "ID" card or
by linking databases via "ID" number) the _less_ secure
everything becomes.  Power-hungry governments and power-
hungry corporations desire such linkage, because it makes
me easier to exploit ... but any claim that such linkable
"ID" is needed for _security_ is diametrically untrue.

Again, I see here an answer to why it is the security industry is being ignored - all that above is well and good in theory, but it doesn't translate as easily to practice. I mean, as a hypothetical test - just how do you deliver some form of privileges system that allows one person to know my age, and another to know my sex, and another to know my drinking problems?

That's not really a solved *cheap* problem, is it?

So the reality of it is, the predeliction with
identity being the root key to all power is the
way society is heading.  I don't like it, but
I'm not in a position to stop the world turning.

===

Returning to:

 > .... For the first
 > time we are facing a real, difficult security
 > problem.  And the security experts have shot
 > their wad.

I think a better description is that banks long ago
deployed a system that was laughably insecure.  (They got
away with it for years ... but that's irrelevant.)  Now
that there is widespread breakage, they act surprised, but
none of this should have come as a surprise to anybody,
expert or otherwise.

I think the security industry must at least acknowledge their part in this. For a decade now we as a field have been telling everyone that secure browsing with SSL and CA-signed certs and all that stuff is ... secure.

What was that quote?  "The Netscape and Microsoft
Secure E-Commerce System" ??

In fact, we're still saying it, and mentally,
about half the field refuses to believe that
the "secure browsing" security model has been
breached.  The issue runs very deep, and a
lot of sacred cows have to be slaughtered
before this one will be resolved.

I mean, we could just go on ignoring it, but
that might explain why we are being ignored?

Now banks and their customers are paying the price.  As
soon as the price to the banks gets a little higher, they
will deploy a more-secure payment authorization scheme,
and the problem will go away.

Well, it is true, in a sense, that as the problem gets more expensive, there is more incentive to fix it. So far the banks have fiddled at the edges with server based stuff. But that can't help them much. About the only thing that can help them directly is if they lock out other IP numbers but that's a difficult one.

The issue is one for the client side to solve.
The user is the one who is being enticed with
the dodgy link.  So it's one of these three
agents:  user, mailer, browser.

(Note that I didn't say "ID" scheme.  I don't care who
knows my SSN and other "ID" numbers ... so long as they
cannot use them to steal stuff.  And as soon as there
is no value in knowing "ID" numbers, people will stop
phishing for them.)

I think if we re-characterise phishing as the part of identity theft where accounts are stolen directly, we might have more of an acceptable compromise on the lingo.

iang

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]

Reply via email to