[107401] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Hushmail in U.S. v. Tyler Stumbo

daemon@ATHENA.MIT.EDU (Allen)
Tue Nov 6 18:12:57 2007

Date: Tue, 06 Nov 2007 12:09:53 -0800
From: Allen <netsecurity@sound-by-design.com>
To:  cryptography@metzdowd.com
CC: Arshad Noor <arshad.noor@strongauth.com>
In-Reply-To: <20071102051724.39DAC63B0E@panta-rhei.eu.org>



StealthMonger wrote:
[snip]

> The larger truth is that a consequence of using Hushmail is that
> record of when, with whom, and the size of each communication is
> available to Hush, even though the content is concealed.

So the obvious point is that Hushmail, and systems like it, 
become "concentrators" and possible single points of failure.

If, on the other hand, you handled your own PKI to send 
symmetrical keys to your correspondents and managed the keys with 
something like StrongKey, then one could use a vast number of 
ISPs/SMTP points so that they may never get a clear path of send 
and reply through a single ISP.

As Jon Callas said, "If the system is strong, it all comes down 
to your operational security."

Security is not a thing, it is a process that uses tools and 
procedures to accomplish the goal. As I like to say, "Security is 
lot like democracy - everyone's for it but few understand that 
you have to work at it constantly."

Best,

Allen


---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post