comp.lang.ada
 help / color / mirror / Atom feed
From: "Randy Brukardt" <randy@rrsoftware.com>
Subject: Re: library/binding for sftp?
Date: Mon, 19 Aug 2013 18:15:23 -0500
Date: 2013-08-19T18:15:23-05:00	[thread overview]
Message-ID: <kuu8uc$n86$1@loke.gir.dk> (raw)
In-Reply-To: alpine.DEB.2.10.1308191900320.24091@debian

<Stefan.Lucks@uni-weimar.de> wrote in message 
news:alpine.DEB.2.10.1308191900320.24091@debian...
On Fri, 9 Aug 2013, Randy Brukardt wrote:

>>>>>> Firstly, there is no protection against targeted attack. Secondly,
>>>>>> regarding spies, they aren't any good in programming. Obscuring is
>>>>>> the best method against unfocused surveillance which works only
>>>>>> with known protocols.
>>>>>
>>>>> Four false statements in a row.
>>>>
>>>> There are only three here,
>>>
>>> Three sentences, but I see two statements in the third sentence.
>>
>> There is only one in the third sentence that I see. "best method". The 
>> rest
>> is a definition.
>
>Randy, I see two statements in the third sentence, and no definition:
>
>1. obscuring is the best method against unfocused surveillance
>2. unfocused surveillance works only with known protocols.
>
>I question the first statement.

Right.

>The second one is dangerously wrong, and there are plenty of
>counterexamples.

I view it as a definition. You're forgetting that packet inspection and the 
like (the basis of "unfocused surveillance") depend completely on "known 
protocols", since TCP/IP and the various routing protocols are surely "known 
protocols". It's impossible to send anything over the Internet (public or 
local) without using many known protocols.

If you truly are using only "unknown protocols", then you're by definition 
using a private wired connection, and clearly only a determined attacker 
would have access to that. And there is no defense against such attackers; 
the most you can do is annoy them enough that hopefully they'll look for an 
easier target.

>One common error frequently found in homegrown protocols is encrypting
>some stuff while leaving other sensitive information in the clear. E.g.,
>older versions of WinZip did support the encryption of files, while
>including plain filenames in the archives. (I am not sure about recent
>versions of WinZip.) Any protocol based on sending "encrypted" archives
>would trivially leave the filenames open even for unfocused surveillance
>operations -- if that was fishing for filenames.

This is where I always lose it. Filenames being sensitive information? Only 
if the programmers in question are complete idiots. (And I realize there are 
plenty of them out there.) I can't imagine any value being associated with 
knowing that there is a file name "J2Typ_De.Ads" that makes up part of the 
Janus/Ada compiler. Sure, perhaps a dedicated attacker might find out some 
program that you're using in that way, but there are thousands of ways for 
such attackers to get in. Plugging one has no effect whatsoever.

Besides, anyone who puts anything sensitive in the cloud for long-term 
storage is going to be a victim sooner or later. ("Sensitive" here meaning 
with long-lived value, like credit card numbers.) Sooner or later, any of 
these things will be broken (and that's assuming that the NSA doesn't 
already require backdoors, which seems likely).

It's now known that the NSA tracks pretty much every internet connection. 
Sending anything over the Internet is guarenteed to leave a trace, so if 
that is "sensitive information" to you, simply don't do it. And if you have 
*truly* sensitive information, don't put it on the Internet (ever!), and try 
not to put it on a computer, either.

I've been talking about information that you'd rather not have people see 
(which for me, is almost anything I do) but doesn't need NSA-grade 
protection. I don't care if the NSA sees that I'm corresponding with you 
here, but if I wanted to keep them (and everyone else) from simple content 
scans, I'd use a custom protocol. (I think it's likely that they can read 
SSH transactions, but I don't think they can do that in real-time.)

If you need public connections, then surely use SSH. But you can surely do 
better.

In truth, though, it's probably all pointless. The government (anybodies 
government) will soon ban computers that they can't control. It seems likely 
that Windows 8 in particular is full of backdoors (indeed, it seems to have 
a frontdoor in terms of the "Microsoft account" which clearly allows 
Microsoft and thus the NSA to track logons and location for almost every new 
Windows computer). I would expect that will be done by essentially 
preventing anyone that has an unapproved computer from connecting in any way 
to the Internet. And then the enslavement of the masses will be complete. 
("1984" was far too kind as to our future.)

                                                Randy.




  parent reply	other threads:[~2013-08-19 23:15 UTC|newest]

Thread overview: 39+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2013-08-05 12:41 library/binding for sftp? Stephen Leake
2013-08-05 15:18 ` Dmitry A. Kazakov
2013-08-06  6:24   ` Stephen Leake
2013-08-06  6:54     ` Dmitry A. Kazakov
2013-08-07 10:06       ` Stephen Leake
2013-08-07 13:04         ` Dmitry A. Kazakov
2013-08-07 17:15           ` Simon Clubley
2013-08-07 19:57             ` Dmitry A. Kazakov
2013-08-07 20:09               ` Alan Jump
2013-08-07 20:26                 ` Dmitry A. Kazakov
2013-08-07 20:32                   ` Alan Jump
2013-08-08  9:14                     ` Björn Persson
2013-08-08  9:49                       ` Dmitry A. Kazakov
2013-08-08 11:37                         ` Björn Persson
2013-08-08 19:18                           ` Randy Brukardt
2013-08-08 20:03                             ` Alan Jump
2013-08-09  9:19                               ` Björn Persson
2013-08-09 20:21                               ` Randy Brukardt
2013-08-09  8:49                             ` Björn Persson
2013-08-09 20:12                               ` Randy Brukardt
2013-08-19 17:26                                 ` Stefan.Lucks
2013-08-19 18:15                                   ` AdaMagica
2013-08-19 22:45                                   ` Randy Brukardt
2013-08-19 23:15                                   ` Randy Brukardt [this message]
2013-08-20  6:43                                     ` Georg Bauhaus
2013-09-13  9:58                                       ` Oliver Kleinke
2013-09-13 21:12                                         ` Georg Bauhaus
2013-08-20  8:14                                     ` Stefan.Lucks
2013-08-20 20:59                                       ` Randy Brukardt
2013-08-21  7:27                                         ` Stefan.Lucks
2013-08-21 16:46                                           ` Alan Jump
2013-08-22  5:53                                             ` Per Sandberg
2013-08-26 21:21                                           ` Randy Brukardt
2013-08-24  8:06                                       ` David Thompson
2013-08-24 11:26                                         ` Stefan.Lucks
2013-08-07 21:46               ` Dennis Lee Bieber
2013-08-07 17:44           ` Björn Persson
2013-08-05 18:40 ` Jeffrey Carter
2013-08-06  6:26   ` Stephen Leake
replies disabled

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox