Re: solving the wrong problem

2005-08-10 Thread astiglic
'chindogu' seems almost appropriate but maybe not exact

http://www.designboom.com/history/useless.html

http://www.pitt.edu/~ctnst3/chindogu.html

--Anton




-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: solving the wrong problem

2005-08-09 Thread Daniel Carosone
On Tue, Aug 09, 2005 at 01:04:10AM +1200, Peter Gutmann wrote:
 That sounds a bit like unicorn insurance
 [..]
 However, this is slightly different from what Perry was suggesting.
 There seem to be at least four subclasses of problem here:
 
 1. ??? : A solution based on a misunderstanding of what the real problem is.
 
 2. Unicorn insurance: A solution to a nonexistent problem.
 
 3. ???: A solution to a problem created artificially in order to justify its
solution (or at least to justify publication of an academic paper
containing a solution).
 
 4. PKI: A solution in search of a problem.

Nice list, and terms for the remaining ??? cases would be nice, but
I'm not sure that any of these captures one essential aspect of the
problem Perry mentioned, at least as I see it.

One of the nice aspects of the snake oil description is the
implications it has about the dodgy seller, rather than the product.
To my view, much of the Quantum Cryptography (et al) discussion has
this aspect: potentially very cool and useful technology in other
circumstances, but being sold into a market not because they
particularly need it, but just because that's where the money is.
Certainly, that's the aspect I find most objectionable, and thus
deserving of a derogatory term, rather than just general frustration
at naive user stupidity.

None of the terms proposed so far capture this aspect.  The specific
example given doesn't quite fit anywhere on your list.  It's somewhere
between #3 and #4; perhaps it's a #4 with a dodgy salesman trying to
push it as a #3 until a better problem is found for it to solve?

I was going to suggest porpoise oil (from not fit-for-purpose),
but how about unicorn oil - something that may well have some
uncertain magical properties, but still sold under false pretenses,
and not really going to cure your ills?

--
Dan.



pgp6yaUOzDOti.pgp
Description: PGP signature


Re: solving the wrong problem

2005-08-09 Thread Russell Nelson
Perry E. Metzger writes:
  Anyone have a good phrase in mind that has the right sort of flavor
  for describing this sort of thing?

Well, I've always said that crypto without a threat model is like
cookies without the milk.

-- 
--My blog is at blog.russnelson.com | In a democracy the rulers
Crynwr sells support for free software  | PGPok | are older versions of the
521 Pleasant Valley Rd. | +1 315-323-1241   | popular kids from high
Potsdam, NY 13676-3213  |   | school.  --Bryan Caplan

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: solving the wrong problem

2005-08-09 Thread Peter Gutmann
Peter Fairbrother [EMAIL PROTECTED] writes:
Peter Gutmann wrote:
 Peter Fairbrother [EMAIL PROTECTED] writes:
 Didn't the people who did US/USSR nuclear arms verification do something
 very similar, except the characterised surface was sparkles in plastic
 painted on the missile rather than paper?

 Yes.  The intent was that forging the fingerprint on a warhead should cost as
 much or more than the warhead itself.

Talking of solving the wrong problem, that's a pretty bad metric - forging
should cost the damage an extra warhead would do, rather than the cost of an
extra warhead. That's got to be in the trillions, rather than a few hundred
thousand for another warhead.

The cost was US$12M per warhead.  I think that's sufficient.

Peter.

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: solving the wrong problem

2005-08-09 Thread Anne Lynn Wheeler
John Denker wrote:
 That's an interesting topic for discussion, but I don't think
 it answers Perry's original question, because there are plenty
 of situations where the semblence of protection is actually a
 cost-effective form of security.  It's an example of statistical
 deterrence.

i've frequently used a metaphor about a bank vault door installed in the
middle of an open field.
http://www.garlic.com/~lynn/aadsm15.htm#9 Is cryptography where security
took the wrong branch?
http://www.garlic.com/~lynn/2002l.html#12 IEEE article on intelligence
and security
http://www.garlic.com/~lynn/2003h.html#26 HELP, Vulnerability in Debit
PIN Encryption security, possibly
http://www.garlic.com/~lynn/2003n.html#10 Cracking SSL

the other metaphor is the one about if all you have is a hammer, then
all problems become nails.

and for some of the PKI related ... frequently they start out claiming
the answer is PKI ... before asking what the problem is.

one of the current issues is that some financial operations are using a
value for a userid-like capability and at the same time using the same
value as a password-like capability. userid requires fairly high
security integrity ... aka from PAIN

* privacy
* authentication
* integrity
* non-repudiation

and the userid capability also requires fairly general availability in
order to establish permissions and as the basis for other business
operations.

however, the password capability requires very high privacy and
confidentiality. the result is relatively high diametrically opposing
use critiaria ... high integrity and generally available ... vis-a-vis
high confidentiality.

pure encryption might claim that they could meet the high
confidentialilty requirements ... but that then tends to break all the
generally available requirements for its userid function (and/or
esposing it in the clear for all its business use operations creates
enormous number of points for the value to leak out)

the fundamental threat model then turns out not to be there isn't enuf
encryption ... the fundamental threat model is a dual-use compromise ...
where the same information is being used to select permissions (aka
userid) and needs to be generally available ... while at the same time
serving as a password (for authentication).

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: solving the wrong problem

2005-08-09 Thread Ilya Levin
Dave Howe wrote:
  Nonsense fence maybe less metaphoric but more clear.
 I disagree - one picket fence gives a clear impression of a protective 
 device
 that is hardened at but one point - leaving the rest insecure. nonsense 
 fence
 doesn't give any real image.

Perhaps, but sometimes rubbish just better be named rubbish without
any metaphorical allusions. For everyone's good.

-- 
Ilya Levin
http://www.literatecode.com

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: solving the wrong problem

2005-08-08 Thread Peter Gutmann
Adam Shostack [EMAIL PROTECTED] writes:

Let me propose another answer to Perry's question:
   Wearing a millstone around your neck to ward off vampires.

This expresses both ends of a lose/lose proposition:
   -- a burdensome solution
   -- to a fantastically unimportant problem.

That sounds a bit like unicorn insurance (We've taken out insurance against
unicorns, and we know that it's effective because we haven't been attacked by
any unicorns yet), which is used for silly threat models.  However, this is
slightly different from what Perry was suggesting.  There seem to be at least
four subclasses of problem here:

1. ??? : A solution based on a misunderstanding of what the real problem is.

2. Unicorn insurance: A solution to a nonexistent problem.

3. ???: A solution to a problem created artificially in order to justify its
   solution (or at least to justify publication of an academic paper
   containing a solution).

4. PKI: A solution in search of a problem.

Peter.

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


locking door when window is open? (Re: solving the wrong problem)

2005-08-08 Thread Adam Back
Single picket fence -- doesn't work without a lot of explaining.

The one I usually have usually heard is the obvious and intuitive
locking the door when the window is open.

(ie fixating on quality of dead-bolt, etc on the front door when the
window beside it is _open_!)

Adam

On Sat, Aug 06, 2005 at 04:27:51PM -0400, John Denker wrote:
 Perry E. Metzger wrote:
 
 We need a term for this sort of thing -- the steel tamper
 resistant lock added to the tissue paper door on the wrong vault
 entirely, at great expense, by a brilliant mind that does not
 understand the underlying threat model at all.
 
 Anyone have a good phrase in mind that has the right sort of flavor
 for describing this sort of thing?
 
 In a similar context, Whit Diffie once put up a nice
 graphic:  A cozy little home protected by a picket fence.
 he fence consisted of a single picket that was a mile
 high ... while the rest of the perimeter went totally
 unprotected.
 
 So, unless/until somebody comes up with a better metaphor,
 I'd vote for one-picket fence.

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: solving the wrong problem

2005-08-08 Thread Peter Fairbrother
Peter Gutmann wrote:

 Peter Fairbrother [EMAIL PROTECTED] writes:
 Perry E. Metzger wrote:
 Frequently, scientists who know nothing about security come up with
 ingenious ways to solve non-existent problems. Take this, for example:
 
 http://www.sciam.com/article.cfm?chanID=sa003articleID=00049DB6-ED96-12E7-A
 D9
 683414B7F
 
 Basically, some clever folks have found a way to fingerprint the
 fiber pattern in a particular piece of paper so that they know they
 have a particular piece of paper on hand.
 
 Didn't the people who did US/USSR nuclear arms verification do something
 very similar, except the characterised surface was sparkles in plastic
 painted on the missile rather than paper?
 
 Yes.  The intent was that forging the fingerprint on a warhead should cost as
 much or more than the warhead itself.

Talking of solving the wrong problem, that's a pretty bad metric - forging
should cost the damage an extra warhead would do, rather than the cost of an
extra warhead. That's got to be in the trillions, rather than a few hundred
thousand for another warhead.


-- 
Peter Fairbrother


-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: solving the wrong problem

2005-08-07 Thread Ilya Levin
John Denker [EMAIL PROTECTED] wrote:
 So, unless/until somebody comes up with a better metaphor,
 I'd vote for one-picket fence.

Nonsense fence maybe less metaphoric but more clear.

-- -
Ilya O Levin
http://www.literatecode.com

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: solving the wrong problem

2005-08-07 Thread Dave Howe

Ilya Levin wrote:

John Denker [EMAIL PROTECTED] wrote:


So, unless/until somebody comes up with a better metaphor,
I'd vote for one-picket fence.



Nonsense fence maybe less metaphoric but more clear.
I disagree - one picket fence gives a clear impression of a protective device 
that is hardened at but one point - leaving the rest insecure. nonsense fence 
doesn't give any real image.


-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: solving the wrong problem

2005-08-07 Thread Adam Shostack
Here's a thought:

Putting up a beware of dog sign, instead of getting a dog.


On Sun, Aug 07, 2005 at 09:10:51PM +0100, Dave Howe wrote:
| Ilya Levin wrote:
| John Denker [EMAIL PROTECTED] wrote:
| 
| So, unless/until somebody comes up with a better metaphor,
| I'd vote for one-picket fence.
| 
| 
| Nonsense fence maybe less metaphoric but more clear.
| I disagree - one picket fence gives a clear impression of a protective 
| device that is hardened at but one point - leaving the rest insecure. 
| nonsense fence doesn't give any real image.
| 
| -
| The Cryptography Mailing List
| Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: solving the wrong problem

2005-08-07 Thread Peter Fairbrother
Perry E. Metzger wrote:

 
 Frequently, scientists who know nothing about security come up with
 ingenious ways to solve non-existent problems. Take this, for example:
 
 http://www.sciam.com/article.cfm?chanID=sa003articleID=00049DB6-ED96-12E7-AD9
 683414B7F
 
 Basically, some clever folks have found a way to fingerprint the
 fiber pattern in a particular piece of paper so that they know they
 have a particular piece of paper on hand.


Didn't the people who did US/USSR nuclear arms verification do something
very similar, except the characterised surface was sparkles in plastic
painted on the missile rather than paper?



-- 
Peter Fairbrother


-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: solving the wrong problem

2005-08-07 Thread John Denker

Adam Shostack wrote:

Here's a thought:

Putting up a beware of dog sign, instead of getting a dog.


That's an interesting topic for discussion, but I don't think
it answers Perry's original question, because there are plenty
of situations where the semblence of protection is actually a
cost-effective form of security.  It's an example of statistical
deterrence.

Look at it from the attacker's point of view:  If a fraction X
of the beware-of-dog signs really are associated with fierce dogs,
while (1-X) are not, *and* the attacker cannot tell which are which,
and there are plenty of softer targets available, the attacker
won't risk messing with places that have signs, because the
downside is just too large.  The fraction X doesn't need to be
100%;  even a smallish percentage may be a sufficient deterrent.
OTOH of course if the sign-trick catches on to the point where
everybody has a sign, the sign loses all value.

We can agree that the dog-sign is not a particularly good
application of the idea of statistical enforcement, because
there are too many ways for the attacker to detect the
absence of a real dog.

A better example of statistical deterrence is traffic law
enforcement.  The cops don't need to catch every speeder every
day;  they just need to catch enough speeders often enough,
and impose sufficiently unpleasant penalties.  The enforcement
needs to be random enough that would-be violators cannot
reliably identify times and places where there will be no
enforcement.

Statistical enforcement (if done right) is *not* the same as
security by obscurity.

This is relevant to cryptography in the following sense:  I doubt
cryptological techniques alone will ever fully solve the phishing
problem.  A more well-rounded approach IMHO would include sting
operations against the phishers.  Even a smallish percentage
chance that using phished information would lead to being arrested
would reduce the prevalence of the problem by orders of magnitude.

=

Let me propose another answer to Perry's question:
  Wearing a millstone around your neck to ward off vampires.

This expresses both ends of a lose/lose proposition:
  -- a burdensome solution
  -- to a fantastically unimportant problem.

This is related to the anklets on the White Knight's horse,
to guard against the bites of sharks ... with added emphasis
on the burdensomeness of the solution.


-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


solving the wrong problem

2005-08-06 Thread Perry E. Metzger

Frequently, scientists who know nothing about security come up with
ingenious ways to solve non-existent problems. Take this, for example:

http://www.sciam.com/article.cfm?chanID=sa003articleID=00049DB6-ED96-12E7-AD9683414B7F

Basically, some clever folks have found a way to fingerprint the
fiber pattern in a particular piece of paper so that they know they
have a particular piece of paper on hand. It is claimed that this
could help stop forged passports.

Unfortunately, the invention is wholely useless for the stated purpose.

If the information is put onto the passport itself, nothing would stop
someone from taking a new, forged passport and adding the fingerprint
information onto the passport. If the information was protected by a
public key, that could prevent such forgeries, except that if you
already have a public key, you can protect the information printed on
the passport with said public key already, bypassing any care about
whether the paper in the passport is original. You could, of course,
put the fingerprint information on-line, but if you have an online
database good enough to verify that the passport is real, why have a
passport? Why not just store identifying information about the person
far away from the ability to tamper with it?

Anyway, I have a larger point.

I read about such stuff every day -- wacky new ways of building
tamper proof tokens, quantum cryptography, and other mechanisms
invented by smart people who don't understand threat models at all.

We already have the term snake oil for a very different type of bad
security idea, and the term has proven valuable for quashing such
things. We need a term for this sort of thing -- the steel tamper
resistant lock added to the tissue paper door on the wrong vault
entirely, at great expense, by a brilliant mind that does not
understand the underlying threat model at all.

Anyone have a good phrase in mind that has the right sort of flavor
for describing this sort of thing?

Perry

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: solving the wrong problem

2005-08-06 Thread John Denker

Perry E. Metzger wrote:


We need a term for this sort of thing -- the steel tamper
resistant lock added to the tissue paper door on the wrong vault
entirely, at great expense, by a brilliant mind that does not
understand the underlying threat model at all.

Anyone have a good phrase in mind that has the right sort of flavor
for describing this sort of thing?


In a similar context, Whit Diffie once put up a nice
graphic:  A cozy little home protected by a picket fence.
he fence consisted of a single picket that was a mile
high ... while the rest of the perimeter went totally
unprotected.

So, unless/until somebody comes up with a better metaphor,
I'd vote for one-picket fence.

I recognize that this metaphor is not sufficiently
pejorative, because a single picket is at least
arguably a step in the right direction, potentially
a small part of a real solution.


-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: solving the wrong problem

2005-08-06 Thread John Kelsey
From: Perry E. Metzger [EMAIL PROTECTED]
Sent: Aug 6, 2005 2:28 PM
To: cryptography@metzdowd.com
Subject: solving the wrong problem

Frequently, scientists who know nothing about security come
up with ingenious ways to solve non-existent problems. Take
this, for example:

http://www.sciam.com/article.cfm?chanID=sa003articleID=00049DB6-ED96-12E7-AD9683414B7F

Basically, some clever folks have found a way to fingerprint the
fiber pattern in a particular piece of paper so that they know they
have a particular piece of paper on hand. It is claimed that this
could help stop forged passports.

Unfortunately, the invention is wholely useless for the
 stated purpose.

A couple of these guys gave a talk at NIST recently.  The
thing is, I can think of a bunch of uses for the thing
they're doing.  This looks genuinely useful as a tool.
Whether they've worked out how to use the tool to best
effect is a different question.

The passport idea doesn't add much, as you pointed out.  The
reason is that the thing you care about there is that the
information on the passport hasn't been tampered with and
originated from the right source.  An identical copy of my
passport is no worse than the original.  

On the other hand, think about the uses of this technology
for paper bearer instruments.  Design travelers' checks that
include a 2D barcode with a BLS signature, bound to the
piece of paper, and you can print the damned thing on
regular paper if the readers are cheap enough.  Similar
things apply to stamps, tickets, etc.  If you can get
readers into peoples' homes, you can even allow home
printing of tickets, travelers' checks, etc., each bound to
a specific piece of paper.  Add a reader to your favorite
DVD player platform (I think it's the same basic hardware as
is used in a DVD player), and you can uniquely sign content
on a disc, and use the player's hardware to enforce only
playing content when the disc's biometric matches the signed
content.  You could use the technique to scan small bits of
flat surfaces of all your stuff (the basic technique works
on paper, plastic, and metal, at least; I'm not sure if it
works on wood or glass), record the biometrics and locations
of the scans, and provide this to the police when your house
gets burgled.  There are some wonderful potential uses for
this technology in making paper-based voting systems *much*
more secure.  And on and on.  If I were in the business of
producing tamper-resistant paper, I'd be scared to death.

...
Anyway, I have a larger point.

I read about such stuff every day -- wacky new ways of
building tamper proof tokens, quantum cryptography, and
other mechanisms invented by smart people who don't
understand threat models at all.

Yes.  As I said, sometimes this stuff looks almost useless
(like quantum cryptography), other times it looks like it
may provide powerful tools, despite the fact that its
designers don't know much about how to use those tools yet.
The same is often true in cryptography, where we have some
very theoretical work which sometimes ends up having
enormous practical consequences.  

We already have the term snake oil for a very different
type of bad security idea, and the term has proven valuable
for quashing such things. We need a term for this sort of
thing -- the steel tamper resistant lock added to the
tissue paper door on the wrong vault entirely, at great
expense, by a brilliant mind that does not understand the
underlying threat model at all.

In my consulting days, I used to use the term padlocking
the screen door for the related phenomenon of piling
security on one part of the system while ignoring the bigger
vulnerabilities.  But this is a bit different

Perry

--John Kelsey

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: solving the wrong problem

2005-08-06 Thread Perry E. Metzger

Steven M. Bellovin [EMAIL PROTECTED] writes:
 Tickets are an excellent use for this, because it binds the printing to 
 a specific physical object.  The concert industry has had a problem 
 with trying to use print-at-home tickets -- the fraudsters buy a single 
 ticket, then print it multiple times and sell the resulting tickets to 
 others.  One group is resorting to requiring ID at the door -- buyers 
 will never have a physical ticket until after they're escorted inside, 
 to eliminate the opportunity for such fraud.  (See
 http://www.nytimes.com/2005/08/06/arts/music/06scal.html for more 
 details.)

The threat model is slightly more complex than that. The industry
doesn't want people reselling real tickets, either, which is one
reason that physical objects aren't enough. In fact, the NY Times
article you cite mentions people being physically escorted in to
prevent resale as well as duplication.

 Yes, you could do everything via an online system based on identity 
 documents.  Apart from the privacy implications, and the problem of 
 coping with network failures just prior to the start of a concert or 
 game, dealing with the multiple forms of ID people carry isn't easy; it 
 requires a fair amount of preparation and infrastructure.  As I said, 
 people may be moving in that direction, but the article itself called 
 the scheme laborious; the band's manager called it unbelievably 
 cumbersome.

A variant on the moviefone.com model might work better for these folks
-- have the person buy the tickets with a credit card, and use a
machine to check that they are in physical possession of said card
when they enter the theater. Most people will not loan their cards to
strangers, so the model works reasonably well without excess amounts
of supervision by humans.

 I don't disagree with Perry's basic statement -- that a lot of people 
 try to solve the wrong problem.  Here, though, we have a tool.  It 
 remainds to be determined if it's a hammer, screwdriver, or wrench, and 
 hence what problems to apply it to.

Oh, sure, I think it may be a fine tool, but it is a very narrow tool,
and possibly a hard one to use. It might make sense for offline
authentication of printed bearer financial instruments (like currency)
based on a digital signature on the fingerprint information and
similar stuff. My problem is with the claimed use in identity
documents, which seems entirely wrongheaded...

Perry

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: solving the wrong problem

2005-08-06 Thread Sherri Davidoff

Reminds me of the White Knight from Alice in Wonderland, who doesn't
understand his threat model, and doesn't know how to effectively use
his tools:

`I see you're admiring my little box,' the Knight said in a friendly
tone. `It's my own invention -- to keep clothes and sandwiches in. You
see I carry it upside-down, so that the rain ca'n't get in.'

`But the things can get out,' Alice gently remarked. `Do you know the
lid's open?

`I didn't know it,' the Knight said, a shade of vexation passing over
his face. `Then all the things must have fallen out! And the box is no
use without them.''  
...

`You see,' he went on after a pause, `it's as well to be provided for
every-thing. That's the reason the horse has all those anklets round
his feet.'

`But what are they for?' Alice asked in a tone of great curiosity.

`To guard against the bites of sharks,' the Knight replied. `It's an
invention of my own.'

Full text from the chapter:
http://www.sabian.org/Alice/lgchap08.htm

alien


Perry E. Metzger writes:
We already have the term snake oil for a very different type of bad
security idea, and the term has proven valuable for quashing such
things. We need a term for this sort of thing -- the steel tamper
resistant lock added to the tissue paper door on the wrong vault
entirely, at great expense, by a brilliant mind that does not
understand the underlying threat model at all.

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: solving the wrong problem

2005-08-06 Thread Anne Lynn Wheeler
Perry E. Metzger wrote:
 A variant on the moviefone.com model might work better for these folks
 -- have the person buy the tickets with a credit card, and use a
 machine to check that they are in physical possession of said card
 when they enter the theater. Most people will not loan their cards to
 strangers, so the model works reasonably well without excess amounts
 of supervision by humans.

some of the work 5-6 years ago on self-serve boarding pass machines were
along the same lines ... it would have to be the same card as used to
purchase the ticket. now it is any card that can be related to you and
your name ... since there is still somebody at the head of the line that
checks that the name on the boarding pass (that was just printed) is the
same name on some gov. issued picture card.

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: solving the wrong problem

2005-08-06 Thread J.A. Terranson

On Sat, 6 Aug 2005, Perry E. Metzger wrote:

 We already have the term snake oil for a very different type of bad
 security idea, and the term has proven valuable for quashing such
 things. We need a term for this sort of thing -- the steel tamper
 resistant lock added to the tissue paper door on the wrong vault
 entirely, at great expense, by a brilliant mind that does not
 understand the underlying threat model at all.

 Anyone have a good phrase in mind that has the right sort of flavor
 for describing this sort of thing?

Chief Security Officer comes to mind...

 Perry

-- 
Yours,

J.A. Terranson
[EMAIL PROTECTED]
0xBD4A95BF


I like the idea of belief in drug-prohibition as a religion in that it is
a strongly held belief based on grossly insufficient evidence and
bolstered by faith born of intuitions flowing from the very beliefs they
are intended to support.

don zweig, M.D.


-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]