2013 FALLOUT

Chat about just about anything else
Forum rules
Do not post support questions here. Before you post read the forum rules. Topics in this forum are automatically closed 30 days after creation.
Locked
mike acker
Level 7
Level 7
Posts: 1517
Joined: Wed Jul 31, 2013 6:29 pm
Location: Kalamazoo, MI

2013 FALLOUT

Post by mike acker »

following the Snowden leaks and followed by the Target scandal there may be a bit more interest in how we use data.

I was fascinated by the article on Whitfield Diffie's expert testimony for New Egg in their trial v TQP

http://arstechnica.com/tech-policy/2013 ... ut-patent/

below the Heading A brief history of public-key crypto Whitfield says, in part

Code: Select all

The problem was vast, Diffie explained—nothing less than how to keep things private in a networked world. He recalled a conversation with his wife in 1973, sitting on a New Jersey park bench. "I told her that we were headed into a world where people would have important, intimate, long-term relationships with people they had never met face to face," he said. "I was worried about privacy in that world, and that's why I was working on cryptography."
i.e. he knew that pen&ink base procedures were not adequate in a network environment. I'm hoping more people will come to realize this but we need to get more people understanding that PGP is not just encryption -- it provides also authentication and integrity:

authentication allows a user to be quite sure that a message he has received is in fact from the person who says they sent it -- where regular e/mail is easily spoofed in this matter

integrity allows a user to be quite sure that a message has not been altered intransit e.g. by some kind of man in the middle scam

and of course encryption provides security allowing a user to be quite sure that a message has not be read by un-authorized person(s).

I'm "preaching to the choir" here of course but I think these are things that we need to move from the esoteric area to the best practice area.

endpoint computer security will be another hot topic. there being two keys to it: (1) make sure that un-authorized software updates are not allowed - either to the O/S or to an application; and (2) restrict what any given application program is allowed to do, e.g. via apparmor or equ.

the subject of supply stream malware is another matter; this will require a zero-defects approach with liabilities for failing to exert due diligence.
Last edited by LockBot on Wed Dec 07, 2022 4:01 am, edited 1 time in total.
Reason: Topic automatically closed 30 days after creation. New replies are no longer allowed.
¡Viva la Resistencia!
mike acker
Level 7
Level 7
Posts: 1517
Joined: Wed Jul 31, 2013 6:29 pm
Location: Kalamazoo, MI

Sales of PII: Business Model

Post by mike acker »

Data Mining and the Sale of PII: Business Model

Suggested reading:

http://www.theregister.co.uk/2013/12/31 ... _about_it/
¡Viva la Resistencia!
Habitual

Re: 2013 FALLOUT

Post by Habitual »

If you're connected to their internet in any way, Privacy is Gone.
mike acker
Level 7
Level 7
Posts: 1517
Joined: Wed Jul 31, 2013 6:29 pm
Location: Kalamazoo, MI

Re: 2013 FALLOUT

Post by mike acker »

Habitual wrote:If you're connected to their internet in any way, Privacy is Gone.
+ you will never be able to prevent traffic analysis. TOR attempts to do this but with limited success.

+ traffic analysis obtains "meta data" -- who you connected to, when, and how long. content is another issue.

+ content can be protected by proper use of PGP. this is attempted in SSL and TLS and various "secure mail" systems. again, with limited success. x.509 certificates used in SSL and TLS systems are served up en masse by browser vendors and the process has turned out to be vulnerable: attack surface is too large.

+ to properly use PGP (GnuPG) you need to generate your own key-pair and then sign the certificates you need to validate -- and nothing more. (work needed*).

+ the ENIGMAIL interface to GnuPG is available for everyone here via the default mail client THUNDERBIRD. I'd like to see a thunderbird/enigmail discussion section here on MINT. There are e/mail discussion lists for ENIGMAIL and GnuPG. Thunderbird/ENIGMAIL is an excellent vehicle for learning about GnuPG -- and -- particularly PGP Trust Models -- which are the essential element of public key encryption that is glossed over by the SSL/TLS crowd.

~~
* when a Certificate Authority gives you an x.509 certificate you need to assign marginal trust only to that certificate. untill you have vetted the cert yourself you are not going to sign it. this isn't the monsted problem pundits cry ab out: you don't need complete trust on more than a small handfull of certificates,..... credit union, amazon ...
¡Viva la Resistencia!
Locked

Return to “Open Chat”