Re: [perpass] Bruce Schneier - A different approach?

2013-09-10 Thread Paul Kyzivat
On 9/10/13 4:01 PM, Hannes Tschofenig wrote: On 10.09.2013 22:37, Phillip Hallam-Baker wrote: On Tue, Sep 10, 2013 at 3:30 PM, Hannes Tschofenig mailto:hannes.tschofe...@gmx.net>> wrote: Open source is certainly only one market, although important in the security context when I think

Re: [perpass] A proposal for developing PRISM-Proof email

2013-09-23 Thread Paul Kyzivat
On 9/23/13 10:11 AM, Leif Johansson wrote: On 09/23/2013 03:17 PM, Scott Brim wrote: On Sep 23, 2013 2:30 AM, "Leif Johansson" mailto:le...@mnt.se>> wrote: > Instead of tilting at that windmill, would it be possible to build a > mechanism for making detection of 3rd party intercept tools and >

Re: [perpass] https.CIO.gov

2015-03-28 Thread Paul Kyzivat
On 3/28/15 12:22 AM, Christian Huitema wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Friday, March 27, 2015 at 10:09 PM, Eliot Lear wrote: Let me see if I understand this statement correctly: this group is working toward a world in which we encrypt our communications, and when someo

Re: [perpass] Cops hate encryption but the NSA loves it when you use PGP

2016-01-31 Thread Paul Kyzivat
On 1/30/16 11:51 AM, Dave Crocker wrote: Given that the NSA has taps on almost all of the internet's major trunk routes, the PGP records can be incredibly useful. It's a simple matter to build a script that can identify one PGP user and then track all their contacts to build a journal of their a

Re: [perpass] privacy implications of UUIDs for IoT devices

2016-10-14 Thread Paul Kyzivat
On 10/14/16 12:23 AM, Fernando Gont wrote: The issue with MAC addresses is that they are constant across networks when, if anything, they just need to be stable within the same subnet. Besides, they have semantics (vendor ID) when in fact they need not. While I understand the concern, this is

Re: [perpass] privacy implications of UUIDs for IoT devices

2016-10-14 Thread Paul Kyzivat
ope this is of use, Robin Robin Wilton Technical Outreach Director - Identity and Privacy On 14 Oct 2016, at 17:07, "Stephen Farrell" wrote: On 14/10/16 15:55, Paul Kyzivat wrote: When looking at devices seen on WiFi the vendor ID is often displayed and used to figure out whic