On 12/06/2015 12:37 PM, Christian Huitema wrote:
On Saturday, December 5, 2015 10:52 PM, Ned Freed wrote:
SM <[email protected]> writes:

An attack on organization is a security issue; it isn't a privacy
issue.  The privacy issue is about mail-related metadata which can be
collected by state surveillance agencies.  Will the proposed working
group attempt to fix that?

As I pointed out on the perpass list when the Received: field draft was
first
posted, there are definitely privacy issues associated with Received:
fields,
but metadata collection by state actors really isn't one of them. Why
bother
with Received: fields when you can simply collect transaction logs from
ISPs/MSPs.

Ned, you are basically saying, "why bother plugging one leak when the same
data can leak somewhere else." Well, I think it is actually important to
plug all the privacy leaks, much like in security it is important to plug
all the holes.

This came out of a thread started on the supposition that this effort was only aimed at pervasive monitoring by state actors and that all other aspects were out of scope as per RFC7358, including whether it was a good idea or not.

1) You can't fight state actors with protocol tweaks. If a state is interested in these headers, they simply have to order providers to ignore anything we do. They already have.

2) State actors have a much easier time of doing this at the network level than email headers. The great firewall of china and the big red "disconnect" switch makes such measures as proposed irrelevant.

3) At best this effort becomes a game of whack a mole, where the mole gets to scurry around unmolested while "we" take 5 years or more to swing the bat each time.

4) I agree that making general improvements to privacy is generally a good thing. But it cannot be if we artificially limit the discussion to areas where anything we could do hardly matters in the first place. Secondly, the results can be catastrophic failures if we refuse to acknowledge the drawbacks in other areas (operational problems, suicide prevention, handling of threats of violence, harrassment, or anti-fraud, anti-privacy violation efforts).

This work cannot be done in isolation.

You are making the argument that authorities can commandeer data by imposing
on mail providers. They can, but in countries with decent rule of laws there
are limits, such as requesting probable cause and not going through fishing
expeditions. We have seen rogue agencies attempt to bypass these limits by
just taking the data whichever way they can, and we want to stop that.

Yet, the best/most famous example we have to date is that of a country with decent rules of law, it was explicitly made legal, and that suppression of the source "address" equivalent (eg: callerid) wouldn't have made the slightest bit of difference. Nor would it with the great firewall.

I contend that relying on, say, a handful of illicit wire connects, sporadic access to relay logs, and/or "informer" recipients, is by its very definition not "pervasive monitoring", and is thus also out-of-scope by the article that began this thread.

For our effort to be useful, the scoping has to be wider, as does the considerations of the downsides to doing it.

I shall relate a highly relevant real-world experience: As part of the privacy investigation I mentioned in another posting, we were tasked at trying to track down a rather prolific sexual harrassment caller who seemed to have a surprisingly high level of intimate and accurate health/medical detail about the victims.

Over the span of the investigation, we verified more than 1500 (yes, 1500!) of these calls by one guy, to as many separate individuals (well, subtract one, one woman was savvy enough to trick the guy into phoning again and taped the conversation). 1500 calls - one guy. The consequences of some of these calls were pretty damaging to the women and their families - some were quite traumatised.

[The calls usually started out with the perp identifing themselves as a doctor asked to follow up on some sort of gynecological "issue" revealed by a recent test/procedure, scaring the women into believing that something was seriously wrong, and then getting their jollies by asking intimate questions about sexual practises and progressing to worse things. Very very nasty.]

This was before callerid.

I was in the interview where we solidly identified who it was doing it (after brainstorming between me, other members of the commission, and the LE tasked with running/supervising the effort) and asking a small group of female workers in the "common factor" office to see if they could identify the voice on tape.

[I was and am still impressed by the sensitivity shown by the senior Detective Sergeant of the OPP who led that interview. The officer asked me to be there to act as a technical bridge between him and the office staff, and otherwise shut up and be a sympathetic listener.]

It turned out to be a rogue insurance company employee inside a secured processing area harvesting the "to be shredded and incinerated" bins. Nailed the SOB and the calls ended. Callerid would have made it so much easier.

I was never so glad as to see something as the wide-scale deployment of callerid a few years later. The same (occasionally strident and emotional) privacy arguments we hear now about MSA submission addresses were made then. Accommodations were made (facilities at threat, per-use suppression etc), and how many privacy advocates are tilting at callerid these days? Approximately zero. We already have the equivalent accommodations (tor, anon remailers, etc. etc. etc) that callerid developed!

Harrassment calls almost completely vanished country-wide despite the fact that you could opt-out of callerid. Unfortunately, I fully expect them to have been on the rise again with the wide-spread spoofing of callerid that VOIP et. al. makes possible. Certainly phone spammers are doing it already.

Be careful what you ask for, you might get it.

_______________________________________________
Shutup mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/shutup

Reply via email to