Online Security Isn't Over; It's Just Beginning
from the time-to-move-on dept
One of the more annoying responses to the latest revelations about the NSA's spying and surveillance is people brushing it off, saying, "well, of course the NSA was doing this." That simplistic, short-sighted response doesn't really take into account the importance of the details and, worse, seems to suggest that this kind of status quo is acceptable. It's not. Worse, it's leading some to take the fatalistic approach that there's nothing to be done, so why even bother? That's the the exact wrong approach. As Micah Lee points out:Giving up and deciding that privacy is dead is counterproductive. We need to stop using commercial crypto. We need to make sure that free software crypto gets serious security and usability audits.Bruce Schneier has been thinking along similar lines, beyond just his call to rebuild internet infrastructure with security and openness in mind to make life more difficult for the NSA, he's also discussing things people can do right now to remain a hell of a lot more secure in the face of the NSA's activities.
If we do this right we can still have privacy in the 21st century. If we give up on security because of this we will definitely lose.
If the internet is going to be as powerful and as useful as it should be, it needs to be a lot more secure. Throwing in the towel because of some backdoors is the exact wrong approach and is exactly what's not needed right now. The security needs to be better and it needs to be easier to implement and to use. That won't happen overnight, but it will happen. It needs to happen.
Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community.
Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis.
While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you.
–The Techdirt Team
Filed Under: cryptology, cybersecurity, encryption, online security, privacy, security
Reader Comments
Subscribe: RSS
View by: Time | Thread
WRONG! Don't try to hide from your errant servants!
That's rock-bottom AMERICANISM: when The Rich use gov't for tyranny, it's time to rise up and pull down the tyrants, NOT HIDE LIKE MICE.
[ link to this | view in chronology ]
Re: WRONG! Don't try to hide from your errant servants!
[ link to this | view in chronology ]
Re: Re: WRONG! Don't try to hide from your errant servants!
[ link to this | view in chronology ]
Re: WRONG! Don't try to hide from your errant servants!
We need a 2 step program here.
1. Make the government start working for us, the way we want it to.
2. Use that reformed government to stop excesses and abuse from the corporate world.
[ link to this | view in chronology ]
Re: Re: WRONG! Don't try to hide from your errant servants!
[ link to this | view in chronology ]
Re: Re: Re: WRONG! Don't try to hide from your errant servants!
Getting the government back under control with a mandate to serve We The People is the way to go. It begins with using our right to vote responsibly and NOT voting the same old grifters and corporate suck-ups back into office every damn time.
[ link to this | view in chronology ]
Re: WRONG! Don't try to hide from your errant servants!
[ link to this | view in chronology ]
XKCD
[ link to this | view in chronology ]
Re: XKCD
[ link to this | view in chronology ]
Trust
That may just be the beginning and end of the whole problem
[ link to this | view in chronology ]
Re: Trust
You want privacy? Go somewhere by yourself or go talk to somebody face-to-face.
[ link to this | view in chronology ]
Re: Re: Trust
Even talking face-to-face in a secluded location is not secure. It is, however, possible to communicate over the internet in a manner that is approximately as secure as that.
[ link to this | view in chronology ]
Re: Re: Re: Trust
Uh, no.
What is the point of posting such bunk?
[ link to this | view in chronology ]
Security is not binary
[ link to this | view in chronology ]
Re: Re: Re: Re: Trust
[ link to this | view in chronology ]
[ link to this | view in chronology ]
Some steps are missing
We've been down this road a couple of times before in US history. This is a familiar landscape.
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
Top down?
2. NSA (or some new, secret-funded group) pressures them for potential weak points.
3. Crypto is broken, again, silently.
4. Right back where we started.
None of the technical stuff matters anymore if it's got the spooks with its fingers in it anyway.
[ link to this | view in chronology ]
Re: Top down?
[ link to this | view in chronology ]
hide in the open
The thing is, they SAVE EVERYTHING and even with better encryption its just a matter of time until they will be able to crack that as well. Seems the only truly secure way to regain our lost privacy is to take away the power which allows their actions. Until then I avoid using the net for important communication and hope to hide in the ever growing haystack.
[ link to this | view in chronology ]
Browsers should use the new protocol by default, and give an "Are you sure you want to navigate to this site? It has weak encryption." warning message for sites using TLS 1.2 and older protocols.
Almost all sites use TLS 1.0/SSL 3.0, both of which are quite vulnerable. Maybe a large crowd of users complaining about sites' weak encryption could finally get them to upgrade and thwart the NSA.
[ link to this | view in chronology ]
Re:
TLS 1.2 without compression has exactly what you want. Stronger encryption (AES-GCM, SHA-256), no known weaknesses. You can easily disable RC4 when using it it (not offering it as a client, not taking it as a server).
That is a bit of an inversion, since plain non-encrypted HTTP (which has even weaker encryption - the equivalent of 0-bit crypto) would not get a warning. First add warning to non-encrypted connections, then start killing the older protocols one by one as people upgrade.
[ link to this | view in chronology ]
DNS Sec + Signing
[ link to this | view in chronology ]
A sign of giving up
You've got a shiny new thing to keep all your secrets? that's good, keep working on the next new thing to keep it secret... soon the NSA will figure out how to get in to that new thing so you better have the next ready.
[ link to this | view in chronology ]
[ link to this | view in chronology ]
Onlne security & internet redesign
[ link to this | view in chronology ]