W3C home > Mailing lists > Public > ietf-http-wg@w3.org > October to December 2015

Re: SSL/TLS everywhere fail

From: Poul-Henning Kamp <phk@phk.freebsd.dk>
Date: Thu, 03 Dec 2015 21:27:08 +0000
To: Matthew Kerwin <matthew@kerwin.net.au>
cc: ietf-http-wg@w3.org, Willy Tarreau <w@1wt.eu>
Message-ID: <55936.1449178028@critter.freebsd.dk>
--------
In message <CACweHNALFPP9vRaWrpCJPXkD8Vf=ibBk5BcsdTwxLzrcG5D2DQ@mail.gmail.com>
, Matthew Kerwin writes:

>So... does Martin's encrypted content encoding fit into this predicted
>future? And if so, in a good, bad, or neutral way?

I think it fits in really well.

For one thing you can start communicating without a 3-way TLS handshake.

For another thing, you can use Pre Shared Keys of arbitrary strength,
and not have to pay the CA-mob protection money.

And most of all:  You can cache encrypted content, which will be incredibly
important for penetration of wireless technologies.

It will *also* allow governments to track who you talk to, but crucially
not reveal what is said.

That is what 99% of court-orders in civilized countries permit the
police to do, based on a showing of concrete suspicion of illegal
activities.

But is it perfect privacy ?

Of course not.

But ask normal people how they would expect police and courts to
redress wrongs, if everybody always have an inalienable right to
perfect privacy.


-- 
Poul-Henning Kamp       | UNIX since Zilog Zeus 3.20
phk@FreeBSD.ORG         | TCP/IP since RFC 956
FreeBSD committer       | BSD since 4.3-tahoe    
Never attribute to malice what can adequately be explained by incompetence.
Received on Thursday, 3 December 2015 21:27:36 UTC

This archive was generated by hypermail 2.3.1 : Tuesday, 1 March 2016 11:11:40 UTC