On 2012.08.06 17.51, Jacob Appelbaum wrote: > Jillian C. York: >> It's difficult. I'm not a technologist, but I understand the issues and >> the user needs well. My "type," I'd surmise, is few and far between. >> >> Security experts have obvious reasons for being conservative, and I get >> that. Nevertheless, there are a lot of users who would benefit from *a >> little bit* of added security. The question, then, as I see it, is: >> >> *How do we provide that little bit while still making users aware of risks?* > > The problem is that the little bit is effectively zero. > > What's the difference between Facebook chat over SSL and Cryptocat over SSL? > > Without a browser extension/plugin - there is little to no difference. > > You have to trust the server and the server operator to not be a bad > actor in both cases.
It is true that you have to trust the server operator in both cases. However, having a server configuration which does not completely compromise user privacy (vs. the operator) by default, like Facebook does, is still a significant improvement in many use cases, as is the ability to have a diversity of server operators. If you insist on only permitting tools which offer a mythical "perfect" standard of security, you ensure that many at risk users will use plaintext tools that offer no security at all. Yes, it is likely that cryptocat will be broken in a non-plugin version, and that people will die because of it. However, it is also likely that cryptocat will save lives, vs. plaintext alternatives, and that a plugin version of cryptocat will also be broken at some point, and that people will die because of that. We need an ecosystem of tools, not a magic bullet. The Security Community as such has done much good over the years. However, security professionals who are unwilling to acknowledge that different users have different needs, that online security exists within a larger constellation of risk analysis, and that usability can and often does trump pure security even when viewed purely through risk analysis and outcomes are doing a grave disservice to both their field and their users. It has been 21 years since PGP was released. To this day, it remains a niche product at best. Users with real world security concerns rarely if ever use encrypted email. It is exactly this attitude which is to blame. If you want to continue being irrelevant, go right ahead. The rest of us have real world problems to solve. E. -- Ideas are my favorite toys.
_______________________________________________ liberationtech mailing list liberationtech@lists.stanford.edu Should you need to change your subscription options, please go to: https://mailman.stanford.edu/mailman/listinfo/liberationtech If you would like to receive a daily digest, click "yes" (once you click above) next to "would you like to receive list mail batched in a daily digest?" You will need the user name and password you receive from the list moderator in monthly reminders. You may ask for a reminder here: https://mailman.stanford.edu/mailman/listinfo/liberationtech Should you need immediate assistance, please contact the list moderator. Please don't forget to follow us on http://twitter.com/#!/Liberationtech