[145396] in cryptography@c2.net mail archive
Re: A mighty fortress is our PKI
daemon@ATHENA.MIT.EDU (Sampo Syreeni)
Tue Jul 27 09:14:23 2010
Date: Tue, 27 Jul 2010 06:53:44 +0300 (EEST)
From: Sampo Syreeni <decoy@iki.fi>
To: "Perry E. Metzger" <perry@piermont.com>
cc: cryptography@metzdowd.com
In-Reply-To: <20100726225552.4a806d58@jabberwock.cb.piermont.com>
X-SA-Exim-Mail-From: decoy@iki.fi
On 2010-07-26, Perry E. Metzger wrote:
>> I agree. But do we then have any quantitative research on how bad
>> this sort of sharing really is, in excess of the basic cryptographic
>> vulnerability?
>
> I am not sure what quantitative measurement of vulnerability would
> even mean. What units would said quantity be measured in?
I'm not sure either. This is just a gut feeling. But *certainly* sharing
as such can be quantified somehow, and numbers could be derived about
the social network where sharing takes place. Then *certainly* the
results can be correlated with their effect upon, say, average numbers
of breaks/leaks/bad-stuff, over whatever statistical horizon we might
have with those.
Quite a lot of stuff can be quantified, even if the relevant
distributions prove rather spread out.
--
Sampo Syreeni, aka decoy - decoy@iki.fi, http://decoy.iki.fi/front
+358-50-5756111, 025E D175 ABE5 027C 9494 EEB0 E090 8BA9 0509 85C2
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com