Re: [Fwd: I-D Action: draft-carpenter-prismatic-reflections-00.txt]

Scott Brim <scott.brim@gmail.com> Fri, 20 September 2013 13:37 UTC

Return-Path: <scott.brim@gmail.com>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C23D321F89EB for <ietf@ietfa.amsl.com>; Fri, 20 Sep 2013 06:37:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.506
X-Spam-Level:
X-Spam-Status: No, score=-102.506 tagged_above=-999 required=5 tests=[AWL=0.094, BAYES_00=-2.599, NO_RELAYS=-0.001, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MqrmweMcJ0vL for <ietf@ietfa.amsl.com>; Fri, 20 Sep 2013 06:37:21 -0700 (PDT)
Received: from mail-ob0-x22d.google.com (mail-ob0-x22d.google.com [IPv6:2607:f8b0:4003:c01::22d]) by ietfa.amsl.com (Postfix) with ESMTP id 606A921F98EE for <ietf@ietf.org>; Fri, 20 Sep 2013 06:37:17 -0700 (PDT)
Received: by mail-ob0-f173.google.com with SMTP id vb8so543541obc.32 for <ietf@ietf.org>; Fri, 20 Sep 2013 06:37:12 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc:content-type:content-transfer-encoding; bh=SKSlaGqEvetrrTNFVnZGjNTcoOOuRybFsRLumk++PcU=; b=QR4YgtO3GKZ57AFac6Y9TWuAopL8XeyCz+MnOx6mQsgr1eeVa5RRd9X5kqxUnHje7b Iu6qFi74RNl7QAOhdWpzcqEIRvEVjb8aDbLHT6Hlb8YsilqGMzhFx5EtEMER/bfwfKx9 iAkxq/FG7miUDFsqykHy3IGKaUDPR+IMe+n1e5IJP3Pc6Lt3naOo4aBLfPLjzXWamD/d 8F0xZSZt6iDVuBVqOuLKqnGIxlGTTIuM4vVAfHeUvSKeQeDaubA+Ote6G1AhV9X7qgZ8 bvqdPDb9bOvPMdHfsN3kM4/LdBeCG5rFHLVEn3onV+WPh3SUD5I0vkUTiZ4qEWpdSSS+ nWFg==
X-Received: by 10.182.230.135 with SMTP id sy7mr6016269obc.24.1379684232590; Fri, 20 Sep 2013 06:37:12 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.182.2.134 with HTTP; Fri, 20 Sep 2013 06:36:52 -0700 (PDT)
In-Reply-To: <96B39B2A-BBCC-4DF5-9189-78DEACC71512@piuha.net>
References: <CE61D529.11007%Josh.Howlett@Ja.net> <523C315F.9020407@cs.tcd.ie> <96B39B2A-BBCC-4DF5-9189-78DEACC71512@piuha.net>
From: Scott Brim <scott.brim@gmail.com>
Date: Fri, 20 Sep 2013 09:36:52 -0400
Message-ID: <CAPv4CP-gwdOeXJuVm9FEe0wVk2Fcg49KbRJcuX+VR=cqFEpt-w@mail.gmail.com>
Subject: Re: [Fwd: I-D Action: draft-carpenter-prismatic-reflections-00.txt]
To: Jari Arkko <jari.arkko@piuha.net>
Content-Type: text/plain; charset="ISO-8859-1"
Content-Transfer-Encoding: quoted-printable
Cc: IETF list <ietf@ietf.org>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ietf>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 20 Sep 2013 13:37:21 -0000

On Fri, Sep 20, 2013 at 8:15 AM, Jari Arkko <jari.arkko@piuha.net> wrote:
> It is important to understand the limitations of technology in this discussion. We can improve communications security, and in some cases reduce the amount information communicated. But we cannot help a situation where you are communicating with a party that you cannot entirely trust with technology alone. That does not mean we should not do anything.
>
> I would also like to focus this topic on the general implications for Internet technology, rather than any specific alleged activities. The discussion has heightened our need to consider the large-scale monitoring threat. It is important to understand that the overall situation is probably bigger and more complex than we see today, and it will also evolve as time goes by. Hence: if we build something, lets build for the general case, reducing ability of outsiders to get into communications, reduce amount of sensitive information transported, make privacy attacks more costly, etc.

Yes.  I'm really pleased that privacy in communications has come to
the fore and that we're trying to design it in, but there is much more
to it than the issue of general surveillance.

Scott