Fitting that it was published on September 11th, 2013.<p>A dozen years after the attacks on the World Trade Centers, it's clear that the terrorists won. The USA cannot be called the "land of the free, home of the brave" anymore. Terrorists know that their tactics work very well, and has made the US vulnerable to even more attacks because of cowardice.<p>Imagine if the US government had decided _not_ to be terrorized, like the Norwegians did for the 2011 Oslo attacks:<p>---<p><pre><code> And at the political level, the Prime Minister Jens Stoltenberg pledged
to do everything to ensure the country's core values were not undermined.
"The Norwegian response to violence is more democracy, more openness and
greater political participation," he said.
A year later it seems the prime minister has kept his word.
There have been no changes to the law to increase the powers of the police
and security services, terrorism legislation remains the same and there
have been no special provisions made for the trial of suspected terrorists.
On the streets of Oslo, CCTV cameras are still a comparatively
rare sight and the police can only carry weapons after getting special
permission.
Even the gate leading to the parliament building in the heart of Oslo
remains open and unguarded.
"It is still easy to get access to parliament and we hope it will stay
that way, " said Lise Christoffersen, a Labour party MP.
She is convinced people do not want laws passed which would curtail
their basic rights and impinge on their privacy despite the relative
ease with which Breivik was able to plan and carry out his attacks.
</code></pre>
---<p>There is a way back to the way the US used to be, but the answer is not something most people will even consider or listen to.
I don't understand what point of this I-D is. It's a sort of white paper survey of random Internet surveillance concepts by the CTO of a SSL CA. It doesn't make internal sense; in one instance, "kleptography" means using as many as 1000 of the bits of an RSA modulus to sneak hidden messages out, and in another it means constructing weak ECC curves. Amusingly, the two sentences in the whole draft about CAs <i>downplay</i> the notion of CA complicity in surveillance. CA's are, of course, one of the biggest Internet privacy weak points.
> Phillip Hallam-Baker, Comodo Group Inc.<p>That would be this Comodo Group: <a href="http://en.wikipedia.org/wiki/Comodo_Group#2011_breach_incident" rel="nofollow">http://en.wikipedia.org/wiki/Comodo_Group#2011_breach_incide...</a>
Some comments from: <a href="http://www.theregister.co.uk/2013/09/12/ietf_floats_prismproof_plan_for_harder_internet/" rel="nofollow">http://www.theregister.co.uk/2013/09/12/ietf_floats_prismpro...</a><p>'The proposal has just one author - Phillip Hallam-Baker of the Comodo Group – which makes it a little unusual as most IETF proposals are the work of several folks in pursuit of a common goal.'<p>'Sadly the paper is a little light on for actual ideas about how the internet can be PRISM-proofed, offering “a security policy infrastructure and the audit and transparency capabilities to support it” as one item that should be on any hardening effort's to-do list. More use of cryptography is also proposed, so that “two layers of public key exchange using the credentials of the parties to negotiate a temporary key which is in turn used to derive the symmetric session key used for communications”. That regime should, Hallam-Baker suggests, make it harder to snoop on everyday traffic.'<p>Heavily emphasis on the <i>should</i> on that last sentence.
Anyone notice "Writing I-Ds using HTML" was in the header of each page? I assume the author reused something from his other RFC by that name [1] and forgot to update the page header.<p>[1]: <a href="http://tools.ietf.org/html/draft-hallambaker-rfctool-01" rel="nofollow">http://tools.ietf.org/html/draft-hallambaker-rfctool-01</a>
> Passive attacks are however limited in the information they can reveal<p>Of course they are limited in the information they can reveal. They can only reveal as much information as is there to reveal. That in itself is a limit. That is a non-informational, misleading statement.<p>> ... and easily defeated with relatively simple cryptographic techniques.<p>While some cryptographic techniques are "relatively simple" to use, those same techniques can be undermined. In the current case, the attacker was involved in developing that technique and/or has the overwhelming power to make the technique worthless (acres of server farms, able to churn on any of it).<p>The only tecnique to guard data against passive attacks is to destroy the data, all its copies, and all who ever saw the data.
Not to be pedantic but "PRISM" is a code name for a specific program, and it's not the one that does in-transit interception. That would be XKeyscore.