On 10/7/19 5:00 AM, Konrad Rosenbaum wrote:
Hi,

On 10/5/19 2:17 AM, Roland Hughes wrote:
_ALL_  electronic encryption is security by obscurity.

Take a moment and let that sink in because it is fact.
Okay, out with it! What secret service are you working for and why are
you trying to sell everybody on bullshit that weakens our collective
security?


SCNR, Konrad

LOL,

Konrad,

I haven't had any active clearance in a very long time, assuming nobody was lying during those projects early in my career.

This is a world of big data. Infobright, OrientDB, Riak, etc. OpenSource and massive, some with data compression up to 40:1. That's assuming you don't scope your attacks to the 32TB single table limit of PostgreSQL. We have botnets available to evil doers with sizes in the millions.

Screaming about the size of the forest one will hide there tree in doesn't change the security by obscurity aspect of it. Thumping the desk and claiming a forest which is 2^128 * 2^key-bit-width doesn't mean you aren't relying on obscurity, especially when they know what tree they are looking for.

Removing the tree is how one has to proceed.

Let us not forget we are at the end of the x86 era when it comes to what evil-doers will use to generate a fingerprint database, or brute force crack.

https://www.technologyreview.com/s/613596/how-a-quantum-computer-could-break-2048-bit-rsa-encryption-in-8-hours/

[Now Gidney and Ekerå have shown how a quantum computer could do the calculation with just 20 million qubits. Indeed, they show that such a device would take just eight hours to complete the calculation.  “[As a result], the worst case estimate of how many qubits will be needed to factor 2048 bit RSA integers has dropped nearly two orders of magnitude,” they say.]

While there are those here claiming 128-bit and 256-bit are "uncrackable" people with money long since moved to 2048-bit because 128 and 256 are the new 64-bit encryption levels. They know that an entity wanting to decrypt their sniffed packets doesn't need the complete database, just a few fingerprints which work relatively reliably. They won't get everything, but they might get the critical stuff.

Haven't you noticed a pattern over the decades?

X-bit encryption would take a "super computer" (never actually identifying which one) N-years running flat out to crack.

A few years later

Y-bit encryption would take a "super computer" (never actually identifying which one) N-years running flat out to crack (without any mention of why they were/are wrong about X-bit).

Oh! You wanted "Why?" Sorry.

I get this list in digest form. Most of the time I don't read it. Only a tiny fraction of my life revolves around Qt and small systems. This whole security thing came up in another part of my world, then I actually read something here.

*nix did it wrong. No application should be allowed to open its own TCP/IP or network connection. No application should have any knowledge of transport layer security, certificates or anything else. Unisys and a few other "big systems" platforms are baking into their OS a Network Software Appliance. This allows system managers to dynamically change transport layer communications protocols on a whim. Not just transport layer security, but what network is in use, even non-TCP based things like Token Ring, DECNet, left-handed-monkey-wrench, etc.

All of that is well and good. It's how things should have been done to start with.

The fly in the ointment is developers using "human interpretable" data formats for transmission. Moving to a non-IP based network (meaning not running a different protocol on top of IP but running a completely different network protocol on machines which don't even have the IP stack software installed) can buy you a lot, but if you are a high value target and that network runs between data centers someone will eventually find a way to tap into it.

Even if that is not your point of penetration some people/developers store this human readable stuff on disk. My God, CouchDB actually stores JSON! Yeah, that's how you want to see someone storing a mass quantity of CC information along with answers to security questions and mother's maiden name.

My having to ponder all of this is how we got here.


--
Roland Hughes, President
Logikal Solutions
(630)-205-1593

http://www.theminimumyouneedtoknow.com
http://www.infiniteexposure.net
http://www.johnsmith-book.com
http://www.logikalblog.com
http://www.interestingauthors.com/blog

_______________________________________________
Interest mailing list
Interest@qt-project.org
https://lists.qt-project.org/listinfo/interest

Reply via email to