[163478] in North American Network Operators' Group
Re: PRISM: NSA/FBI Internet data mining project
daemon@ATHENA.MIT.EDU (Tom Taylor)
Sun Jun 9 12:57:32 2013
Date: Sun, 09 Jun 2013 12:57:04 -0400
From: Tom Taylor <tom.taylor.stds@gmail.com>
To: Matthew Petach <mpetach@netflight.com>
In-Reply-To: <CAEmG1=oqQjhVchwk1epsVUdsW6vvndz_U0VB5DGh_2+p_9A_jQ@mail.gmail.com>
Cc: NANOG <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org
On 08/06/2013 8:05 AM, Matthew Petach wrote:
> On Sat, Jun 8, 2013 at 4:12 AM, Jimmy Hess <mysidia@gmail.com> wrote:
>
>> On 6/7/13, Måns Nilsson <mansaxel@besserwisser.org> wrote:
>>> Subject: Re: PRISM: NSA/FBI Internet data mining project Date: Fri, Jun
>> 07,
>>> 2013 at 12:25:35AM -0500 Quoting jamie rishaw (j@arpa.com):
>>>> <tinfoilhat>
>>>> Just wait until we find out dark and lit private fiber is getting
>>>> vampired.
>>>> </tinfoilhat>
>>> I'm not even assuming it, I'm convinced. In Sweden, we have a law,
>>> that makes what NSA/FBI did illegal while at the same time legalising,
>>
>> Perhaps strong crypto should be implemented on transceivers at each
>> end of every link, so users could be protected from that without
>> having to implement the crypto themselves at the application layer? :)
>>
>
> Would you really trust "crypto" applied by someone else on your behalf?
>
> "sure, your data's safe--I triple rot-13'd it myself!" ;P
>
> Matt
> .
>
At least that was an odd number of rotations :)