Re: [saag] [perpass] fyi: Dan Geer: Tradeoffs in Cyber Security [9 October 13, UNCC[

Scott Brim <scott.brim@gmail.com> Wed, 23 October 2013 17:08 UTC

Return-Path: <scott.brim@gmail.com>
X-Original-To: saag@ietfa.amsl.com
Delivered-To: saag@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2AA1A11E8170; Wed, 23 Oct 2013 10:08:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.589
X-Spam-Level:
X-Spam-Status: No, score=-102.589 tagged_above=-999 required=5 tests=[AWL=0.010, BAYES_00=-2.599, HTML_MESSAGE=0.001, NO_RELAYS=-0.001, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PO2zFVj98yqh; Wed, 23 Oct 2013 10:08:53 -0700 (PDT)
Received: from mail-ob0-x22d.google.com (mail-ob0-x22d.google.com [IPv6:2607:f8b0:4003:c01::22d]) by ietfa.amsl.com (Postfix) with ESMTP id 5EC9911E81DC; Wed, 23 Oct 2013 10:08:49 -0700 (PDT)
Received: by mail-ob0-f173.google.com with SMTP id gq1so1099511obb.18 for <multiple recipients>; Wed, 23 Oct 2013 10:08:47 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc:content-type; bh=3XAFIOIhAyuWyFdodRlBIGMa0eEmeybO1rxeot9rgXE=; b=dnaoNmPG52xPZBlg3Qnai+qwKh5hNNOpAy0ePL5DkhJbhHzxp3WOrF2Y22P4cdHcS7 Y2vL4fIkDNTmbfbBFMMDNwMbP2NS6dL8XtCio7VooFGH4yEOqm6cYODo3+Ru1v4eT3IS 90Cjeynpxc3YgkAPPuSkNkWA+J/zpvbSOQm7GqylGugqPxx87L4x90fU75OoaMUXf9De ThHKzRJh6QYBzw26mB+kRy1kHN+9TFviUTHCkMwks89HjaKLDnyBvOzyXiDLffujCOf3 dlNrKycDYvENkQFBdpaLUJvsY2rrsC9pPN6HF9GXJHMAhoW9mnIrOh+aC31Rk2EJmMsD FwAA==
X-Received: by 10.60.42.203 with SMTP id q11mr2704061oel.54.1382548127677; Wed, 23 Oct 2013 10:08:47 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.182.2.134 with HTTP; Wed, 23 Oct 2013 10:08:27 -0700 (PDT)
In-Reply-To: <5267EAF2.2000608@KingsMountain.com>
References: <5267EAF2.2000608@KingsMountain.com>
From: Scott Brim <scott.brim@gmail.com>
Date: Wed, 23 Oct 2013 13:08:27 -0400
Message-ID: <CAPv4CP-mxR5whK+yW6Gjrs20nJ+3zZ7Wwyn3_ZRdUw-bS0y2Mg@mail.gmail.com>
To: =JeffH <Jeff.Hodges@kingsmountain.com>
Content-Type: multipart/alternative; boundary="001a11c207f009049404e96b9276"
X-Mailman-Approved-At: Fri, 25 Oct 2013 08:02:08 -0700
Cc: perpass <perpass@ietf.org>, IETF Security Area Advisory Group <saag@ietf.org>
Subject: Re: [saag] [perpass] fyi: Dan Geer: Tradeoffs in Cyber Security [9 October 13, UNCC[
X-BeenThere: saag@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Security Area Advisory Group <saag.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/saag>, <mailto:saag-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/saag>
List-Post: <mailto:saag@ietf.org>
List-Help: <mailto:saag-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/saag>, <mailto:saag-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 23 Oct 2013 17:08:55 -0000

This is fantastic.  Thanks.

It illumines something: Surveillance by governments is not the biggest of
our problems. Privacy in the ordinary operation of a technology-based
society is significantly bigger. Criminals, big business ... but also
businesses and casual individuals have access to data you wish they didn't.
Yes the IETF needs to do better with crypto and authentication, but the
fundamental designs of the protocols they are being added to need to
support them.  From the bottom up, we need to proactively (not reactively)
make sure that IETF protocol designs take privacy into consideration.

Scott