Re: [Fwd: I-D Action: draft-carpenter-prismatic-reflections-00.txt]

Jari Arkko <jari.arkko@piuha.net> Fri, 20 September 2013 12:15 UTC

Return-Path: <jari.arkko@piuha.net>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 181B021F95D0 for <ietf@ietfa.amsl.com>; Fri, 20 Sep 2013 05:15:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.6
X-Spam-Level:
X-Spam-Status: No, score=-102.6 tagged_above=-999 required=5 tests=[AWL=-0.001, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6WnA0MM4xa9H for <ietf@ietfa.amsl.com>; Fri, 20 Sep 2013 05:15:08 -0700 (PDT)
Received: from p130.piuha.net (p130.piuha.net [193.234.218.130]) by ietfa.amsl.com (Postfix) with ESMTP id B332F21F9611 for <ietf@ietf.org>; Fri, 20 Sep 2013 05:15:07 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by p130.piuha.net (Postfix) with ESMTP id BB9FE2CC64; Fri, 20 Sep 2013 15:15:05 +0300 (EEST)
X-Virus-Scanned: amavisd-new at piuha.net
Received: from p130.piuha.net ([127.0.0.1]) by localhost (p130.piuha.net [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id D0MlECWpD5Za; Fri, 20 Sep 2013 15:15:05 +0300 (EEST)
Received: from [127.0.0.1] (p130.piuha.net [IPv6:2a00:1d50:2::130]) by p130.piuha.net (Postfix) with ESMTP id F37122CC60; Fri, 20 Sep 2013 15:15:04 +0300 (EEST)
Content-Type: text/plain; charset="iso-8859-1"
Mime-Version: 1.0 (Mac OS X Mail 6.5 \(1508\))
Subject: Re: [Fwd: I-D Action: draft-carpenter-prismatic-reflections-00.txt]
From: Jari Arkko <jari.arkko@piuha.net>
In-Reply-To: <523C315F.9020407@cs.tcd.ie>
Date: Fri, 20 Sep 2013 15:15:04 +0300
Content-Transfer-Encoding: quoted-printable
Message-Id: <96B39B2A-BBCC-4DF5-9189-78DEACC71512@piuha.net>
References: <CE61D529.11007%Josh.Howlett@Ja.net> <523C315F.9020407@cs.tcd.ie>
To: Stephen Farrell <stephen.farrell@cs.tcd.ie>, Josh Howlett <Josh.Howlett@ja.net>
X-Mailer: Apple Mail (2.1508)
Cc: IETF list <ietf@ietf.org>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ietf>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 20 Sep 2013 12:15:13 -0000

Josh, Stephen,

It is important to understand the limitations of technology in this discussion. We can improve communications security, and in some cases reduce the amount information communicated. But we cannot help a situation where you are communicating with a party that you cannot entirely trust with technology alone. That does not mean we should not do anything. 

I would also like to focus this topic on the general implications for Internet technology, rather than any specific alleged activities. The discussion has heightened our need to consider the large-scale monitoring threat. It is important to understand that the overall situation is probably bigger and more complex than we see today, and it will also evolve as time goes by. Hence: if we build something, lets build for the general case, reducing ability of outsiders to get into communications, reduce amount of sensitive information transported, make privacy attacks more costly, etc.

Jari