Re: [cryptography] [Cryptography] basing conclusions on facts

2014-06-16 Thread David Adamson
On 6/16/14, ianG i...@iang.org wrote:

 The revelation that a crypto company was patenting a backdoor in an
 international standard is indeed faith-shattering.  Details aside...

 Tanja Lange points out that the original filing by Certicom covered both
 escrow and anti-escrow.  Oh, my, how comprehensive they were in their
 wisdom.  They win if they spy, they win if they defend.


Yeah - short but excellent summary: They win if they spy, they win if
they defend.
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] [Cryptography] basing conclusions on facts

2014-06-15 Thread ianG
On 15/06/2014 14:37 pm, Stephen Farrell wrote:
 
 I've no public opinion on Certicom's patent practices. And the
 behaviour of the signals intelligence agencies has been IMO
 deplorable. So I sympathise with some of what you are saying.
 However, building your case on bogus claims that are not facts
 as you are pearly doing is a really bad idea. In particular...
 
 On 15/06/14 14:13, ianG wrote:
 What is also curious is that Dan
 Brown is highly active in the IETF working groups for crypto, 
 
 That is not correct as far as I can see. In my local archives,
 I see one email from him to the TLS list in 2011 and none in
 2012. For the security area list (saag), I see a smattering
 of mails in 2011 and 2012 and none in 2013. For the IRTF's
 CFRG, I see a few in 2010, none in 2011 and some in 2012 and
 2013. I do see increased participation over the last year on
 the the DUAL-EC topic.
 
 None of the above is anywhere near highly active which is
 therefore simply false.
 
 And I don't believe you yourself are sufficiently active to
 judge whether or not someone else is highly active in the
 IETF to be honest. Nor do you seem to have gone through the
 mail list archives to check.


For my part, I had seen his name only with respect to IETF WGs.  However
I admit that I do not follow IETF security WGs closely, so am not
qualified to assert highly active.  You are right, I am wrong.


 You are both of course welcome to become highly active if you
 do want to participate, same as anyone else.
 
 adding
 weight to the claim that the IETF security area is corrupted.
 
 And that supposed conclusion, based only on an incorrect claim,
 is utter nonsense. I would have expected better logic and closer
 adherence to the facts.
 
 Yes, the IETF security area needs to do better, and quite a few
 folks are working on that. Yes, its almost certain the someone
 was paid by BULLRUN to muck up IETF work. Nonetheless unfounded
 misstatements such as the above don't help and are wrong. And
 the correct reaction is to do better work and not to fall for
 the same guily-by-association fallacy that the leads the spooks
 to think that pervasive monitoring is a good plan.


I had a long post addressing this issue, but as it takes us further from
the subject at hand, I'll pull my head from out of the rabbit hole.



iang
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] [Cryptography] basing conclusions on facts

2014-06-15 Thread Stephen Farrell


On 15/06/14 19:16, ianG wrote:
 For my part, I had seen his name only with respect to IETF WGs.  However
 I admit that I do not follow IETF security WGs closely, so am not
 qualified to assert highly active.  You are right, I am wrong.

Thanks for that refreshing approach!

I appreciate it,
Cheers,
S.
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] [Cryptography] basing conclusions on facts

2014-06-15 Thread John Young

At 02:29 PM 6/15/2014, two wrote:


On 15/06/14 19:16, ianG wrote:
You are right, I am wrong.
Stephen Farrell wrote:
Thanks for that refreshing approach!


This is faith shattering. Somebody is lying, maybe everbody. Ah,
Worldwide Elder Abuse Avoidance Day by Obama proclamation:

America must lead by example, and my Administration remains
dedicated to ending elder abuse, supporting victims, and holding
abusers accountable. Under the Affordable Care Act, we enacted
the Elder Justice Act. Through this law, the Federal Government
has invested in identifying, responding to, and preventing elder
abuse, neglect, and exploitation. Because eliminating this
pervasive crime requires coordinated action, we are bringing
together Federal agencies; non-profit and private sector partners;
and State, local, and tribal governments. Together, we can build
a more responsive criminal justice system, give seniors the tools
to avoid financial scams, and determine the best ways to prevent
elder abuse before it starts. Seniors have provided for their
families, risen to the challenges of their times, and built ladders
of opportunity for future generations. Many have served our
Nation with honor. After decades of hard work, they have earned
the right to enjoy their retirement years with a basic sense of
security. Today, let us join with partners around the globe in
declaring that we will not fail the men and women who raised
us, sacrificed for us, and shaped our world. 



___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography