Re: Larry Lessig on ending anonymity through "identity escrow"

2003-12-07 Thread Bill Stewart
I think Declan's got the title wrong -
Lessig's discussions that he references aren't about
ending anonymity through escrowed pseudonymity -
they're about replacing some True-Name-based or linkable
applications with pseudonymous ones.  For instance,
one-use credit card numbers instead of regular numbers,
which not only makes it harder for the merchant to do
credit card fraud, but also makes it harder for
marketers to trace your activities,
even though they can go back to the credit card company
and get that information.
A similar application, which we'll unfortunately probably never see,
is to replace the SSN with a pile of one-use tax ID numbers.
That way, instead of giving everybody who needs to
collect taxes on your account the same SSN,
which they can then use to link lots of records together,
you'd be giving each one a single number that only
you and the IRS can coordinate.
An application that people use all the time
is disposable email addresses.  Sure, you can use [EMAIL PROTECTED]
every time you give some web site your address or send email to
somebody you haven't talked to before, but eventually spammers get that
and it's too annoying; an alternative is to use free email accounts
when you think you might get spammed.  Hotmail was the canonical source,
though yahoo's easier to use these days.  One of Declan's
fellow columnists, Annalee Newitz, uses a different username at her domain
on each of her newspaper columns; presumably some of them become
spam targets and get trashed eventually.


Re: Larry Lessig on ending anonymity through "identity escrow"

2003-12-05 Thread Tim May
On Dec 5, 2003, at 3:53 PM, Tim May wrote:
Back to the cost issue. Prof. Lessig argues that voluntary identity 
escrow systems should be "encouraged." How/ Through nattering to 
people about how they ought to use a more expensive, less flexible 
system which exposes them to possible danger and which costs them more 
to use than the stronger alternative?

Ha!

Or "encouraged" in the sense of using state power to make stronger 
systems illegal or artificially taxed at higher rates?

Why doesn't the U.S.G. just set up a "Big Brother Remailer" with the 
kind of identity escrow proposed?

Let's then see how many freedom fighters working for the overthrow of 
the U.S. government use it. Let's see how many critics of the Church 
of Scientology, threatened with lawsuits and "legal warrants," use it. 
Let's see how much child porn gets traded on it.



And there are so many other points, long discussed here (1992-present), 
which Lessig's proposal would run into:

* what if someone, like me, forwards items sent untraceably to me? (The 
Lessig Escrow remailer does not even know it is from me, or forwarded 
by me, unless and until he gets a "legal warrant" to open the 
contents...too late, then.)

(If passing on a comment from another is illegal, on what basis? A 
remailer is just as easily seen as an "editor" or "re-commenter.")

* if government controls remailers, what of those plotting against 
government? Is Jefferson supposed to use the King's remailers?

* if the systems Lessig thinks should be "encouraged" are in fact set 
up--and no doubt some such systems already exist--how can they know 
that they are not themselves being used as part of a chain which 
includes traditionally-untraceable (CP, Mix remailers) upstream? 
Without looking, using their ostensible "legal warrants," a Big Brother 
Remailer has no way of knowing that the messages sent through from 
"Tim" were not just the messages of others.

BTW, an argument I heard years ago from a proponent of an identity 
escrow system, long before Lessig, was that this approach would be 
blocked by making "Tim" responsible for all words or messages flowing 
into an IE remailer, even those he could not read (because they had 
been encrypted). The idea is to stop this chaining attack by making 
each user responsible for checking all the way back. In other words, 
for an IE system to work, competitors must be banned. Which is the same 
conclusion reached via other paths.

(And, though IANAL, even I know that making "Tim" legally responsible 
even for messages he has no way of knowing fails the "scienter" test. 
Absent a ban on encryption, what "Tim " has done in passing along to 
"Larry's Remailer" a message which actually arrived from a non-IE 
remailer is nothing more than passing along something he was given. He 
has no knowledge of the contents (scienter requirement) and is not 
breaking any laws, absent a ban on competitors to IE remailers.)

Anyway, this was hashed out many times in the early 90s and shortly 
after the very similar proposal for Clipper and other similar forms of 
key escrow.

I have nothing against Lessig, but it bugs me that he's considered by 
some to be one of the Great Cyberspace Thinkers when his ideas are so 
easily dismissed...and were argued on both sides so many years ago.

Larry Lessig ought to read, and think deeply about, the first ten years 
of traffic on the Cypherpunks list. Especially the first five years.

--Tim May



Re: Larry Lessig on ending anonymity through "identity escrow"

2003-12-05 Thread Tim May
DO NOT FORWARD THIS MESSAGE TO ANY OTHER LISTS. I AM GETTING TIRED OF 
SEEING CYPHERPUNKS JUST BE THE DUMPING GROUND FOR STUFF FROM OTHER 
LISTS.

In almost all foreseeable cases, a system which allows identity escrow 
_cost more_ than a system which does not. This is analogous to the 
increased costs of a identity-based money system over an 
immediate-clearing, non-identity-based system.

As an example, consider the network of CP or Mixmaster sorts of 
remailers. To package a payload through N remailers is a relatively 
easy thing for a a sender to do. But to arrange for propagation of 
"escrowed identity" at each (or most) of these N remailer nodes is 
costly.

Any  of these N remailers, in K different countries/jurisdictions, may 
use the "legal warrant" access method to open the identity escrow. For 
example, Finland in the Scientology/NOTS case...Finland surely would 
have used their "legal warrant" method had such an option existed.

This is part of a larger issue, a philosophical one, about who controls 
"legal warrants." The Jew can be killed by using legal warrants, in 
Third Reich Germany. The libertarian in Soviet Russia. The pornographer 
in Canada. And nearly anyone who deviates from the official line in 
these beknighted states of america: smut peddlers, drug legalization 
advocates, supporters of Russia vs. Chechnya prior to 9/11, supporters 
of Chechnya vs. Russia after 9/11, liberators of Diebold documents 
showing the weakness of their voting machines, and so on and on. See my 
1995-6 list of our enemies (Catholics, Whigs, Mormons, Communists...) 
for a very long list of those for whom "identity escrow" would have 
meant death or imprisonment in these beknighted states.

Back to the cost issue. Prof. Lessig argues that voluntary identity 
escrow systems should be "encouraged." How/ Through nattering to people 
about how they ought to use a more expensive, less flexible system 
which exposes them to possible danger and which costs them more to use 
than the stronger alternative?

Ha!

Or "encouraged" in the sense of using state power to make stronger 
systems illegal or artificially taxed at higher rates?

Why doesn't the U.S.G. just set up a "Big Brother Remailer" with the 
kind of identity escrow proposed?

Let's then see how many freedom fighters working for the overthrow of 
the U.S. government use it. Let's see how many critics of the Church of 
Scientology, threatened with lawsuits and "legal warrants," use it. 
Let's see how much child porn gets traded on it.

--Tim May



Larry Lessig on ending anonymity through "identity escrow"

2003-12-05 Thread Declan McCullagh
See also:
http://politechbot.com/pipermail/politech/2003-December/000268.html
---

Date: Fri, 05 Dec 2003 09:12:16 -0500
To: [EMAIL PROTECTED]
From: Declan McCullagh <[EMAIL PROTECTED]>
Subject: Larry Lessig replies to Politech over limiting anonymity [fs][priv]
---

[Why do I get the feeling that Larry Lessig doesn't like "absolute" 
anonymity much at all? Systems for building and defending "absolute" 
anonymity already exist in the form of anonymous remailers and Freenet, 
among others. It would be foolish to follow Larry's advice and concede too 
quickly that such technologies have so few legitimate uses that they 
cannot be reasonably defended. Even the oft-benighted Eurocrats have 
recognized this: a 1997 EC directive encourages anonymity, as does a 
German federal law (http://www.iid.de/rahmen/iukdgebt.html). In the U.S., 
since the Federalist Papers were published with effectively "absolute" 
pseudonymity, surely the framers of the U.S. Constitution had them in mind 
when crafting the Bill of Rights. Justice Thomas lists more 
contemporaneous examples in his McIntyre concurrence 
(http://supct.law.cornell.edu/supct/html/93-986.ZC1.html). Saying 
anonymous technologies are indefensible concedes a crucial point: that the 
government's power is so sweeping that police have the right to learn our 
identity in all cases. So much for whistleblowing and anonymous reports of 
public brutality.

Perhaps more to the point, the twin privacy-encroaching technologies of 
automated electronic surveillance and efficient large-scale databases did 
not exist decades or centuries ago. "Absolute" anonymity lets us reclaim 
some of that lost zone of privacy. Lastly, trying to remove "absolute" 
anonymity from the Internet (banning strong encryption and computers that 
can be programmed not to keep logs) would be far more disruptive, 
destructive, and harmful than proposals like Hollings' CBDTPA that Larry 
has rightly opposed. --Declan]

---

From: Lawrence Lessig <[EMAIL PROTECTED]>
Cc: Declan McCullagh <[EMAIL PROTECTED]>
Subject: Re: [Politech] Economist, Lessig want to preserve freedom by 
ending anonymity [fs][priv]
Date: Fri, 5 Dec 2003 10:16:31 +0900
To: Aaron Swartz <[EMAIL PROTECTED]>

It's not an inaccurate quote, but it is taken out of context.

What I said was that the trend in our laws was to destroy any privacy at 
all -- that the idiocy of Patriot Acts, etc., was effectively eliminating 
any form of privacy. There are two kinds of responses to this -- one to 
try to defend and build a system protecting absolute anonymity; the second 
is to build effective protections for pseudonymous life, which is 
shorthand for traceable transactions, but where the permission to trace is 
protected by something like a warrant requirement. I'm not saying the 
government should build these systems, but that they should be permitted 
and indeed encouraged.

In my view, we will make no progress following path one, but that we would 
strongly advance privacy if we could advance path two. A strong ethic and 
architecture of pseudonymous identity, properly protected, would give us 
more privacy than we have today.

Of course, it is possible (and probably likely) that such an architecture 
would not properly protect the link between a transaction and the privacy 
of a person. Government officials, for example, upon mere suspicion would 
be able to break the link, etc. That of course is not what I am promoting. 
I would promote a regime where the gov't required a very strong 
warrant-like reason before it could break the code that makes the link. 
But I will not that the baseline from which we're starting is a world 
where no real showing is necessary for this sort of surveillance.

On Dec 4, 2003, at 9:26 AM, Aaron Swartz wrote:

To preserve freedom further, suggests Mr Lessig, anonymity could be 
replaced by [warrant-traceable] pseudonymity.
Can you explain this? The Economist article seemed to be total nonsense, 
but I'm surprised they paraphrase you as saying something like this. In 
general, for eliminating anonymity to make sense you need to answer three 
questions:

1. Is anonymity the problem? Between DMCA subpoenas and national security 
letters, it seems that very few people on the Internet have even limited 
anonymity.

2. Will the people who are anonymous evade things? The people who _are_ 
anonymous, of course, are people like crackers. If you outlaw anonymity, 
crackers will likely find security holes that let them hide their 
identity and pass their actions off as those of others (e.g. using the 
WiFi network of some squeaky-clean grandma to launch the attacks).

3. Is it worth the cost? Even if you can answer the above questions, 
it'll be difficult to do without knocking large groups of people off the 
Internet. (If the digital divide is bad now, imagine what it'll be like 
when you need a credit card to get on the Net.)

Were you misquoted? If not, can you answer these questions? Or is this 
more blind optimis