If this is what they are actually proposing, then the answers to my key generation and distribution questions seem to guarantee that there can never be any privacy and there certain to be massive unauthorized access (at least the possibility of it).
I've seen that one before. But it would seem that you just make enough parts, and make the threshold low enough that you can ensure that there are effectively quite a few sub groups of key joinings that would be sufficient to do decryption.
I haven't read Applied Cryptography since the 1990's. But I do remember, about page 100, (remember this is pre 9/11) the author talks about cryptography and how the government could severely curtail privacy if, say, there were a major terrorist attack, say on New York. Amazing foresight.
But once they mandate this new golden key mechanism, then all of the existing knowledge, books teaching existing algorithms, and existing source code to encryption software will all just magically no longer exist, somehow.
I want a front door. And I want the front door to have multiple locks. Big locks. Opened by keys that we can readily access any time we feel like it, with no controls or oversight, and without leaving a trace.
What kind of Ceremony is required to assemble a key?
Is it something like trying to launch a nuclear attack? Something that requires major effort and controls.
Or is it something like searching the pockets and all encrypted data of someone stopped for jaywalking? Something that will be done so widely and routinely that no effective controls actually exist.
Apparently there is a way to generate (at least) two completely working keys for some crypto algorithm. 1. A key for the person wanting privacy 2. A key (broken into parts) for the government
Can this cryptography algorithm generate keys 3 and 4? And 5 and 6? I'm sure this would have to be done at key generation time.
I'm just speculating about how this works, but it would seem that key generation time is a critical step. So where is the key generation done? Does the end user get to generate their own keys and then give the 'golden key pieces' to the government? (yeah, THAT seems secure) Or does the government generate the keys and give the end user their working key? That would mean that the government could just also keep the user's fully assembled key, along with numerous parties who intercept it in transit to the user who wants privacy.
Can anyone elaborate on how this type of multi key, multi key part cryptography actually works?
The NSA would go to extreme effort to ensure that the first time that key is fully assembled from its parts, that the NSA is able to capture a copy of the complete key.
There is another alternative even if the master key is never assembled.
The NSA would secretly make it a priority to go after each party holding a part of that key and to obtain their part of the key. Maybe the NSA would find a way to compromise the original key generation or distribution process. There is no limit to what they would do because the stakes are so high.
This is nothing less than a key to everything! The NSA must be salivating at the mouth! Effectively once the NSA gets this key, and they will, what we've just done is to remove all controls that the NSA presently has. Now there wouldn't even be a need to go to a court for a warrant. The NSA could simply unlock anything, any time.
To be found using a system that does not implement this magic key approach would be illegal. That fact should tell you everything you need to know about what they think of your privacy.
> Meh. 9 million isn't that important of a number. > Now when it gets to 10,000,000, that'll be a big deal!
Recall the Y2K problem.
Maybe the patent office computers will all go crazy* due to a similar P10M problem. That is, the counter for patent numbers only holds nine digits. Who would have ever dreamed there would even be one million patents. Do we really have that many remarkable innovations in the world around us?
* I didn't want to say 'explode' because that might be taken as a terrorist threat. You seriously cannot even make jokes these days.
It's too bad that the people who want and get those big budgets are defense contractors instead of contractors who would do something useful, or at the very least, interesting.
Such as curing cancer. Or building a moon base. Or a long list of other things.
Oh, I see. You meant for a different and publicly stated purpose. Okay, I agree. For those purposes the programs don't work.
Now think about the purposes, not publicly stated, for which those surveillance programs DO work, and are effective. Spying on the citizens has been used by numerous countries in the 20th century, and the spying did work for its intended purpose.
On the post: White House Floats Idea Of Crypto Backdoor... If The Key Is Broken Into Multiple Pieces
Re: Re: Re: The stupid, it burns
> key are indeed incorruptibly good and virtuous.
Even if today's keyholders are angles (and they are not), what about tomorrow's keyholders?
On the post: White House Floats Idea Of Crypto Backdoor... If The Key Is Broken Into Multiple Pieces
Re: Re: Question about Key Generation
On the post: White House Floats Idea Of Crypto Backdoor... If The Key Is Broken Into Multiple Pieces
Re: Re: Question about Key Generation
I haven't read Applied Cryptography since the 1990's. But I do remember, about page 100, (remember this is pre 9/11) the author talks about cryptography and how the government could severely curtail privacy if, say, there were a major terrorist attack, say on New York. Amazing foresight.
On the post: White House Floats Idea Of Crypto Backdoor... If The Key Is Broken Into Multiple Pieces
Re: It's the landlord with key issue
On the post: White House Floats Idea Of Crypto Backdoor... If The Key Is Broken Into Multiple Pieces
Re: front doors
On the post: White House Floats Idea Of Crypto Backdoor... If The Key Is Broken Into Multiple Pieces
What kind of Ceremony is required to assemble a key?
Or is it something like searching the pockets and all encrypted data of someone stopped for jaywalking? Something that will be done so widely and routinely that no effective controls actually exist.
On the post: White House Floats Idea Of Crypto Backdoor... If The Key Is Broken Into Multiple Pieces
Question about Key Generation
Apparently there is a way to generate (at least) two completely working keys for some crypto algorithm.
1. A key for the person wanting privacy
2. A key (broken into parts) for the government
Can this cryptography algorithm generate keys 3 and 4? And 5 and 6? I'm sure this would have to be done at key generation time.
I'm just speculating about how this works, but it would seem that key generation time is a critical step. So where is the key generation done? Does the end user get to generate their own keys and then give the 'golden key pieces' to the government? (yeah, THAT seems secure) Or does the government generate the keys and give the end user their working key? That would mean that the government could just also keep the user's fully assembled key, along with numerous parties who intercept it in transit to the user who wants privacy.
Can anyone elaborate on how this type of multi key, multi key part cryptography actually works?
On the post: White House Floats Idea Of Crypto Backdoor... If The Key Is Broken Into Multiple Pieces
Re: The stupid, it burns
The NSA would go to extreme effort to ensure that the first time that key is fully assembled from its parts, that the NSA is able to capture a copy of the complete key.
There is another alternative even if the master key is never assembled.
The NSA would secretly make it a priority to go after each party holding a part of that key and to obtain their part of the key. Maybe the NSA would find a way to compromise the original key generation or distribution process. There is no limit to what they would do because the stakes are so high.
This is nothing less than a key to everything! The NSA must be salivating at the mouth! Effectively once the NSA gets this key, and they will, what we've just done is to remove all controls that the NSA presently has. Now there wouldn't even be a need to go to a court for a warrant. The NSA could simply unlock anything, any time.
To be found using a system that does not implement this magic key approach would be illegal. That fact should tell you everything you need to know about what they think of your privacy.
On the post: US Patent Office Gamed The System To Make Sure Patent 9 Million Wasn't A Crazy Troll Patent
Re: Re:
On the post: US Patent Office Gamed The System To Make Sure Patent 9 Million Wasn't A Crazy Troll Patent
Re:
> Now when it gets to 10,000,000, that'll be a big deal!
Recall the Y2K problem.
Maybe the patent office computers will all go crazy* due to a similar P10M problem. That is, the counter for patent numbers only holds nine digits. Who would have ever dreamed there would even be one million patents. Do we really have that many remarkable innovations in the world around us?
* I didn't want to say 'explode' because that might be taken as a terrorist threat. You seriously cannot even make jokes these days.
On the post: Is It Acceptable For Academics To Pay For Privatized, Expedited Peer Review?
Re: Re: Re: Re: Re: Even worse than being for-profit
On the post: New Documents Show FBI Instructing Law Enforcement To Throw Out Cases Rather Than Give Up Info On Stingray Use
Re:
> people will eventually . . . .
Truth is like the sun. You can shut it out for a time, but it ain't goin' away.
Elvis Presley
On the post: New Documents Show FBI Instructing Law Enforcement To Throw Out Cases Rather Than Give Up Info On Stingray Use
Re:
It is a surveillance state. This is a step towards a police state. It is necessary to have intelligence to stop any organized opposition.
On the post: Why Don't Surveillance State Defenders Seem To Care That The Programs They Love Don't Work?
It's too bad
Such as curing cancer. Or building a moon base. Or a long list of other things.
On the post: Why Don't Surveillance State Defenders Seem To Care That The Programs They Love Don't Work?
Re:
Funneling large amounts of tax dollars to defense contractors, or oil or whoever is most well connected seems to be working.
Using terrorists as an excuse to spy on the citizens seems to be working. (most people believe it)
On the post: Why Don't Surveillance State Defenders Seem To Care That The Programs They Love Don't Work?
Re:
The spying on the citizens is not about terrorists. The terrorists are the justification, the rationalization, the excuse for spying on the citizens.
So, yes, it's all about the terrorists! (they can say it with a straight face)
On the post: Why Don't Surveillance State Defenders Seem To Care That The Programs They Love Don't Work?
What do you mean they Don't Work ?
Oh, I see. You meant for a different and publicly stated purpose. Okay, I agree. For those purposes the programs don't work.
Now think about the purposes, not publicly stated, for which those surveillance programs DO work, and are effective. Spying on the citizens has been used by numerous countries in the 20th century, and the spying did work for its intended purpose.
On the post: New Documents Show FBI Instructing Law Enforcement To Throw Out Cases Rather Than Give Up Info On Stingray Use
Re: What are they saying?
That suggests that there may be even more to Stingray than we suspect.
On the post: Is It Acceptable For Academics To Pay For Privatized, Expedited Peer Review?
Re: Paid peer reviews?
Politicians, lobbyists, and corporations definitely seem to think so.
> and paid reviews don't do that!
But it may lead the the kind of 'scrutiny' that the aforementioned groups of people want.
On the post: Is It Acceptable For Academics To Pay For Privatized, Expedited Peer Review?
Re: Re: Even worse than being for-profit
> cause this to go away
Yes, it will go away. It will.
But how much damage will have to be done first.
Next >>