I find it likely that the Google engineer quoted had things like the NSA taps on routers and in telecom facilities in mind, rather than whether users of various services can expect that their providers will hand over to the government. In other words, encrypting data in motion rather than at rest. That's not to say that the latter isn't important, only that it's a problem TLS and similar technologies cannot solve or even really address.
On Sun, Aug 25, 2013 at 7:49 PM, Lodewijk andré de la porte <l...@odewijk.nl> wrote: > Assume all mayor cryptotools are exploited. Sad but true. Any other reason > people complain OpenSSL is written in tongues (so to speak)? Hiding exploits > is easier in a mess. > > That said the people in the IETS might be ignorant to the fact that TLS is > likely backdoor'ed. The thing with this problem is that there's many layers. > Mike Belshe is probably not dual-role, just doing the best he can is enough. > > False security is a danger unlike many others. None of us should forget > that. > > _______________________________________________ > cryptography mailing list > cryptography@randombit.net > http://lists.randombit.net/mailman/listinfo/cryptography > -- @kylemaxwell _______________________________________________ cryptography mailing list cryptography@randombit.net http://lists.randombit.net/mailman/listinfo/cryptography