RFC 7258
RFC 7258
Posted May 13, 2014 22:21 UTC (Tue) by raven667 (subscriber, #5198)Parent article: RFC 7258
Of course there will always be some small amount of monitoring which goes on, lawful or not, but the highly-resourced, pervasive monitoring should be stopped in preference to working around it.
Posted May 13, 2014 23:20 UTC (Tue)
by rgmoore (✭ supporter ✭, #75)
[Link] (8 responses)
As long as there are organizations that can benefit from pervasive monitoring, there will be an incentive to create it. We're most worried about governments doing it now, but there is plenty of incentive for businesses and criminal enterprises to get in on it. I'd rather engineer around it now than discover in a few years that my ISP has been monitoring everything I do and selling my personal information to the highest bidder.
Posted May 14, 2014 3:34 UTC (Wed)
by raven667 (subscriber, #5198)
[Link] (7 responses)
Posted May 14, 2014 8:41 UTC (Wed)
by nim-nim (subscriber, #34454)
[Link]
Posted May 14, 2014 9:17 UTC (Wed)
by Seegras (guest, #20463)
[Link] (1 responses)
"The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized."
which explicitly forbids wholesale surveillance of all _people_ (note that this does not say "citizens", this really means all people); we can only conclude that these laws and regulations are useless, and those criminal organizations and governments will go on with their pervasive monitoring.
Posted May 14, 2014 14:04 UTC (Wed)
by raven667 (subscriber, #5198)
[Link]
Posted May 14, 2014 13:45 UTC (Wed)
by rgmoore (✭ supporter ✭, #75)
[Link] (1 responses)
It is illegal to break into people's houses and steal their stuff, and we have police departments to enforce those laws. Wise people still invest in locks and security systems. It's one of the things we do to drive up the cost of theft.
Posted May 14, 2014 14:12 UTC (Wed)
by raven667 (subscriber, #5198)
[Link]
Posted May 16, 2014 11:54 UTC (Fri)
by ortalo (guest, #4654)
[Link] (1 responses)
(BTW, personnally, I was extremely happy to rediscover that the IETF could be such a trustable organization. A huge thank you for any of those belonging to it: past and present!)
Posted May 16, 2014 18:20 UTC (Fri)
by raven667 (subscriber, #5198)
[Link]
Real security is a platonic ideal, like a frictionless surface, which doesn't exist in the real world.
> Many laws, audit and standards already exist. But laws, audit and standards cannot do everything. It seems to me the current state of affair demonstrate it pretty blatantly.
There are many laws and audit steps which could exist but do not, such as data retention requirements which forbid service providers from keeping profiling information, and there are many laws which do exist but for which there is no credible threat of enforcement, like the 4th Amendment in the US.
Posted May 14, 2014 0:48 UTC (Wed)
by josh (subscriber, #17465)
[Link]
Even if we thought we'd stopped pervasive monitoring by policy, we should still have protocols that prevent it.
Posted May 14, 2014 6:42 UTC (Wed)
by Lennie (subscriber, #49641)
[Link] (2 responses)
For example you might be in the west and the monitoring is done by the Chinese.
Posted May 14, 2014 12:27 UTC (Wed)
by niner (subscriber, #26151)
[Link]
Posted May 14, 2014 13:58 UTC (Wed)
by raven667 (subscriber, #5198)
[Link]
RFC 7258
RFC 7258
RFC 7258
RFC 7258
RFC 7258
RFC 7258
RFC 7258
RFC 7258
Many laws, audit and standards already exist. But laws, audit and standards cannot do everything. It seems to me the current state of affair demonstrate it pretty blatantly.
Some things need to be made impossible, not only forbidden. Revolutions occur specifically in order to bring the system in such a satisfying state, generally by eliminating those who manipulate the rules to change the definition of "forbidden" to match their interests. However, even with such a momentum (which generally does not last long), now in the digital world we do not even state clearly which mechanisms are really expected to bring satisfying security properties for the society we desire (here).
There is at least some enlighting hope in the IETF reaction: we knew and they state that publicly available cryptographic mechanisms are part of the solution, and we also know now that the IETF is an acceptable body to work on the technical part of the problem.
RFC 7258
> Some things need to be made impossible, not only forbidden.
RFC 7258
RFC 7258
RFC 7258
* to be Chinese
* to be monitored by the West
* that all of the above is true
RFC 7258