On Aug 20, 2013, at 11:40 , Norbert Bollow <[email protected]> wrote:

> Just like no chain can be stronger than its weakest link, no assurance
> of a security property can possibly be stronger than the weakest among
> all the assertions on which it relies.

And I am saying that your weak link is the traffic you send and receive. 
Breaking into each computer (which is what the article claimed was possible -- 
the claimed 'back door' was from 1999) is incredibly time-consuming, and then 
they somehow have to get the data out without you noticing the traffic.  
Monitoring your traffic -- what sites you contact, your emails, and so on, all 
of which is typically in the clear -- is undetectable and way easier.

I know you don't like either DRM or being monitored, but they really are 
different problems and have at best a tenuous link.

David Singer
Multimedia and Software Standards, Apple Inc.


Reply via email to