[145396] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: A mighty fortress is our PKI

daemon@ATHENA.MIT.EDU (Sampo Syreeni)
Tue Jul 27 09:14:23 2010

Date: Tue, 27 Jul 2010 06:53:44 +0300 (EEST)
From: Sampo Syreeni <decoy@iki.fi>
To: "Perry E. Metzger" <perry@piermont.com>
cc: cryptography@metzdowd.com
In-Reply-To: <20100726225552.4a806d58@jabberwock.cb.piermont.com>
X-SA-Exim-Mail-From: decoy@iki.fi

On 2010-07-26, Perry E. Metzger wrote:

>> I agree. But do we then have any quantitative research on how bad 
>> this sort of sharing really is, in excess of the basic cryptographic 
>> vulnerability?
>
> I am not sure what quantitative measurement of vulnerability would 
> even mean. What units would said quantity be measured in?

I'm not sure either. This is just a gut feeling. But *certainly* sharing 
as such can be quantified somehow, and numbers could be derived about 
the social network where sharing takes place. Then *certainly* the 
results can be correlated with their effect upon, say, average numbers 
of breaks/leaks/bad-stuff, over whatever statistical horizon we might 
have with those.

Quite a lot of stuff can be quantified, even if the relevant 
distributions prove rather spread out.
-- 
Sampo Syreeni, aka decoy - decoy@iki.fi, http://decoy.iki.fi/front
+358-50-5756111, 025E D175 ABE5 027C 9494 EEB0 E090 8BA9 0509 85C2

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post