Re: [perpass] Commnets on draft-farrell-perpass-attack-00 was RE: perens-perpass-appropriate-response-01

Bruce Perens <> Thu, 05 December 2013 05:19 UTC

Return-Path: <>
Received: from localhost ( []) by (Postfix) with ESMTP id 4EA951AE351 for <>; Wed, 4 Dec 2013 21:19:01 -0800 (PST)
X-Virus-Scanned: amavisd-new at
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-0.001] autolearn=ham
Received: from ([]) by localhost ( []) (amavisd-new, port 10024) with ESMTP id jP3NcNtns279 for <>; Wed, 4 Dec 2013 21:19:00 -0800 (PST)
Received: from ( []) by (Postfix) with ESMTP id 09D561AE344 for <>; Wed, 4 Dec 2013 21:18:59 -0800 (PST)
Received: from ( []) by (Postfix) with ESMTPSA id 614B050008A; Wed, 4 Dec 2013 21:18:56 -0800 (PST)
User-Agent: K-9 Mail for Android
In-Reply-To: <>
References: <> <> <> <> <> <>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
From: Bruce Perens <>
Date: Wed, 04 Dec 2013 21:18:52 -0800
To: Phillip Hallam-Baker <>
Message-ID: <>
Cc: perpass <>
Subject: Re: [perpass] Commnets on draft-farrell-perpass-attack-00 was RE: perens-perpass-appropriate-response-01
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <>
List-Unsubscribe: <>, <>
List-Archive: <>
List-Post: <>
List-Help: <>
List-Subscribe: <>, <>
X-List-Received-Date: Thu, 05 Dec 2013 05:19:01 -0000

Phillip Hallam-Baker <> wrote:
>It seemed like more of a threat to me.

I can't imagine what I have to threaten with. No, it was not a threat.

>The NSA is very aware of the work that I am doing and its purpose.

And your description doesn't make it sound as if it's intended to be a hinder to NSA.

We were discussing the proposal to make the task of mass surveillance more difficult for one or more nation's intelligence services.  That is where I feel the risk (not threat) is.

>We don't know what NSA 3.0 is going to be doing but it isn't going to have anything like the intercept capabilities of the past

Since you can now get an ASIC bitcoin miner that does 10 giga hashes per second for around $240, we might have to adjust our capabilities assessment on the assumption that espionage agencies have custom silicon that we've never heard of, and lots of it. I don't think we can say for sure that TLS is any hurdle to NSA's mass surveillance program at all.



Sent from my Android phone with K-9 Mail. Please excuse my brevity.