TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

PRISM-Proof Security Considerations

75 pointsby onosendaiover 11 years ago

9 comments

milesfover 11 years ago
Fitting that it was published on September 11th, 2013.<p>A dozen years after the attacks on the World Trade Centers, it&#x27;s clear that the terrorists won. The USA cannot be called the &quot;land of the free, home of the brave&quot; anymore. Terrorists know that their tactics work very well, and has made the US vulnerable to even more attacks because of cowardice.<p>Imagine if the US government had decided _not_ to be terrorized, like the Norwegians did for the 2011 Oslo attacks:<p>---<p><pre><code> And at the political level, the Prime Minister Jens Stoltenberg pledged to do everything to ensure the country&#x27;s core values were not undermined. &quot;The Norwegian response to violence is more democracy, more openness and greater political participation,&quot; he said. A year later it seems the prime minister has kept his word. There have been no changes to the law to increase the powers of the police and security services, terrorism legislation remains the same and there have been no special provisions made for the trial of suspected terrorists. On the streets of Oslo, CCTV cameras are still a comparatively rare sight and the police can only carry weapons after getting special permission. Even the gate leading to the parliament building in the heart of Oslo remains open and unguarded. &quot;It is still easy to get access to parliament and we hope it will stay that way, &quot; said Lise Christoffersen, a Labour party MP. She is convinced people do not want laws passed which would curtail their basic rights and impinge on their privacy despite the relative ease with which Breivik was able to plan and carry out his attacks. </code></pre> ---<p>There is a way back to the way the US used to be, but the answer is not something most people will even consider or listen to.
评论 #6386962 未加载
tptacekover 11 years ago
I don&#x27;t understand what point of this I-D is. It&#x27;s a sort of white paper survey of random Internet surveillance concepts by the CTO of a SSL CA. It doesn&#x27;t make internal sense; in one instance, &quot;kleptography&quot; means using as many as 1000 of the bits of an RSA modulus to sneak hidden messages out, and in another it means constructing weak ECC curves. Amusingly, the two sentences in the whole draft about CAs <i>downplay</i> the notion of CA complicity in surveillance. CA&#x27;s are, of course, one of the biggest Internet privacy weak points.
评论 #6386312 未加载
评论 #6386344 未加载
sdfjklover 11 years ago
&gt; Phillip Hallam-Baker, Comodo Group Inc.<p>That would be this Comodo Group: <a href="http://en.wikipedia.org/wiki/Comodo_Group#2011_breach_incident" rel="nofollow">http:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Comodo_Group#2011_breach_incide...</a>
educatingover 11 years ago
Some comments from: <a href="http://www.theregister.co.uk/2013/09/12/ietf_floats_prismproof_plan_for_harder_internet/" rel="nofollow">http:&#x2F;&#x2F;www.theregister.co.uk&#x2F;2013&#x2F;09&#x2F;12&#x2F;ietf_floats_prismpro...</a><p>&#x27;The proposal has just one author - Phillip Hallam-Baker of the Comodo Group – which makes it a little unusual as most IETF proposals are the work of several folks in pursuit of a common goal.&#x27;<p>&#x27;Sadly the paper is a little light on for actual ideas about how the internet can be PRISM-proofed, offering “a security policy infrastructure and the audit and transparency capabilities to support it” as one item that should be on any hardening effort&#x27;s to-do list. More use of cryptography is also proposed, so that “two layers of public key exchange using the credentials of the parties to negotiate a temporary key which is in turn used to derive the symmetric session key used for communications”. That regime should, Hallam-Baker suggests, make it harder to snoop on everyday traffic.&#x27;<p>Heavily emphasis on the <i>should</i> on that last sentence.
csearsover 11 years ago
Anyone notice &quot;Writing I-Ds using HTML&quot; was in the header of each page? I assume the author reused something from his other RFC by that name [1] and forgot to update the page header.<p>[1]: <a href="http://tools.ietf.org/html/draft-hallambaker-rfctool-01" rel="nofollow">http:&#x2F;&#x2F;tools.ietf.org&#x2F;html&#x2F;draft-hallambaker-rfctool-01</a>
educatingover 11 years ago
&gt; Passive attacks are however limited in the information they can reveal<p>Of course they are limited in the information they can reveal. They can only reveal as much information as is there to reveal. That in itself is a limit. That is a non-informational, misleading statement.<p>&gt; ... and easily defeated with relatively simple cryptographic techniques.<p>While some cryptographic techniques are &quot;relatively simple&quot; to use, those same techniques can be undermined. In the current case, the attacker was involved in developing that technique and&#x2F;or has the overwhelming power to make the technique worthless (acres of server farms, able to churn on any of it).<p>The only tecnique to guard data against passive attacks is to destroy the data, all its copies, and all who ever saw the data.
UVB-76over 11 years ago
&gt; PRISM is reputed to be a classified US government that involves [...] This document describe the security concerns [...]<p>&#x2F;facepalm
评论 #6385478 未加载
rtpgover 11 years ago
I feel like there&#x27;s some irony in serving up these recommendations on a non-encrypted connection
anxiousestover 11 years ago
Not to be pedantic but &quot;PRISM&quot; is a code name for a specific program, and it&#x27;s not the one that does in-transit interception. That would be XKeyscore.
评论 #6385251 未加载