Re: Web of Trust itself is the problem
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 January 12th 2010 in gnupg-users@gnupg.org thread "Web of Trust itself is the problem" Actually I was quoting Robert Holtzman, not Robert J. Hansen, sorry for not including the full name. I have no time now to read those texts because my holidays ended alredy :(. -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.9 (GNU/Linux) iEYEAREIAAYFAktM48YACgkQZ4DA0TLic4j5CQCeOKzabnsWhEDJV9P6d4CoA8uW t3MAn26T7s6uB3GqQqThCj7oZw8F4XGG =6Jk1 -END PGP SIGNATURE- ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Web of Trust itself is the problem
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Mark H. Wood wrote: | | Still, it's another technology-intractable problem. If people cared, | they would train themselves to look for trouble indicators, like | scanning the dashboard from time to time for problems with speed, | fuel, temperature, etc. We're trained to operate motor vehicles, but | not to operate browsers or MUAs. ("It's intuitive!" Not.) I know drivers who have no clue about all those trouble indicators. I was a passenger with a friend and I noticed the engine temperature gauge was too high. I urged her to stop the car until it could cool down and we could see what the trouble was. She said she would do that after lunch, but she did not have time then. I told her to turn the heater on full, and since this was summer, she objected, but did it. When we got to the restaurant, she turned the motor off. After lunch it had cooled down some, so I looked into the radiator where there was no noticeable water. We got some from the restaurant. I forgot what the trouble was (defective radiator hose, loose clamp, etc.), but at least she did not need to get a new engine. People often drive for months with the "Check Engine" light on. When I ask about this, they say it is nothing: it is always on. They have seen it so long they have gotten used to it. They just do not care. I knew a guy who had a Pontiac station wagon he bought new. He never had it serviced or even checked the oil or the oil pressure light. Well one of those will go about 25,000 miles before seizing up. - -- ~ .~. Jean-David Beyer Registered Linux User 85642. ~ /V\ PGP-Key: 9A2FC99A Registered Machine 241939. ~ /( )\ Shrewsbury, New Jerseyhttp://counter.li.org ~ ^^-^^ 10:05:01 up 4 days, 12:00, 3 users, load average: 4.56, 4.59, 4.68 -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.5 (GNU/Linux) Comment: Using GnuPG with CentOS - http://enigmail.mozdev.org/ iD8DBQFLTJGhPtu2XpovyZoRAoziAKCwQV3ZfYoLK3u/K5UUKMntfo4lpwCeNYcv 2OElW0+lwjTgll0fSK4a/8M= =4tgG -END PGP SIGNATURE- ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Web of Trust itself is the problem
On Sun, Jan 10, 2010 at 11:37:12PM -0500, Robert J. Hansen wrote: > A few years ago a fellow grad student of mine, Peter Likarish, developed > a really cool anti-phishing technology. [but test subjects didn't react to the warning] > Peter's hypothesis was that Flash ads are to blame. Users have become > conditioned to having Flash ads appear on the screen, take over real > estate, and so on. Therefore, users were subconsciously filtering out > this big red alert bar and it was never percolating up to the conscious > level where users could make an informed decision about the risks. Yes indeedy. Those ad.s appear at the top of the page (and elsewhere, but there's *always* one at the top). We're rigorously trained every day to ignore stuff at the top of the page that doesn't look like what we expected. Maybe he should try a bar across the *middle* of the window, or a diagonal, or alpha-blend a red overcast onto the entire page Still, it's another technology-intractable problem. If people cared, they would train themselves to look for trouble indicators, like scanning the dashboard from time to time for problems with speed, fuel, temperature, etc. We're trained to operate motor vehicles, but not to operate browsers or MUAs. ("It's intuitive!" Not.) And meanwhile the world is training us that it is vitally important to our sanity and the defense of our time to learn to detect and ignore things that we don't care about. I think that technology can't help this as much as would knowing why we want some technology. People who feel a need will look for tools to deal with it; people who feel no need will ignore the finest tools. -- Mark H. Wood, Lead System Programmer mw...@iupui.edu Friends don't let friends publish revisable-form documents. pgpczMlSHupRn.pgp Description: PGP signature ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Web of Trust itself is the problem
While the ontopicness of my comment is a bit questionable I don't think I've gotten an encrypted email in the last 12 months, but I still use gpg every day. All Debian and (I imagine, or at least hope) Debian derivatives such as Ubuntu incorporate digital signing of software. I think signing of software to be a pretty important thing, and represents a relatively large userbase that's not to be overlooked. Though, admittedly, some proportion of them are indifferent towards it. -- Roscoe ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Web of Trust itself is the problem
Am Montag, den 11.01.2010, 01:26 -0500 schrieb Robert J. Hansen: > On 01/10/2010 10:57 PM, Faramir wrote: > ...I just about had a heart attack. The > voting authorities thought this was just fine... > > _ You are obviously not loved by the voting authorities :-) Greetings from the Black Forest! Bernhard > __ > Gnupg-users mailing list > Gnupg-users@gnupg.org > http://lists.gnupg.org/mailman/listinfo/gnupg-users signature.asc Description: Dies ist ein digital signierter Nachrichtenteil ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Web of Trust itself is the problem
David Shaw writes, in part: -+- | It's not that they gave it a bit of thought and decided | against it for whatever reason - they never gave it even a | moment of thought. The only crypto they use is the crypto | that is invisible to them (usually https, which is pretty | invisible). I used to work at Verdasys. One of the strong selling points with its customers is as you say, for crypto to be in place but with no user the wiser nor need that they be. A piece of marketing material: http://www.verdasys.com/images/uploads/Encryption_DataSheet.pdf There are quite a few installations of the above at the >100,000 seats level (enterprise deployment). --dan ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Web of Trust itself is the problem
On 1/11/2010 1:26 AM, Robert J. Hansen wrote: > I've seen computerized votes authenticated by MD5 hash... sent over > email... in the same message as the official vote record. As in, "the > attachment has MD5 hash XXX, if your version hashes out to XXX then the > vote record is authenticated." I just about had a heart attack. The > voting authorities thought this was just fine, and a perfectly correct > use of hashes. E... unbelievable! -- Jim ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Web of Trust itself is the problem
On 01/10/2010 10:57 PM, Faramir wrote: >> * How hashes are misused and shouldn't be used > Ehh... I've never thought about it. How they should not be used? I've seen computerized votes authenticated by MD5 hash... sent over email... in the same message as the official vote record. As in, "the attachment has MD5 hash XXX, if your version hashes out to XXX then the vote record is authenticated." I just about had a heart attack. The voting authorities thought this was just fine, and a perfectly correct use of hashes. >> * Type I versus Type II error > I don't have any idea about this, can you please clarify it? False positive versus false negative. If there's a transmission error in the sigblock *but not in the source text*, you can have a bad signature with a completely intact message. Therefore, the fact a signature is bad doesn't automatically tell you the message was tampered with. If the message was altered somehow, the signature will be bad. However, if the signature is bad, that doesn't necessarily mean the message was altered somehow. A lot of people miss this point. It's kind of important. > I get your point. However, people should be considered innocent until > proven guilty. What should be true is a question for religion, philosophy and ethics. Engineering is about asking what *is* true. ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Web of Trust itself is the problem
On 1/10/2010 11:37 PM, Robert J. Hansen wrote: >> >> What is your point Robert? > > I didn't write this; you're misquoting someone else's words and > attributing them to me. > I think he meant the other Robert in the discussion. -- Jim ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Web of Trust itself is the problem
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Robert J. Hansen escribió: ... > Crypto is not like this. Sure, you don't need to understand Feistel > networks or large number theory in order to use crypto, but look at what > you *do* need to understand: > > * Identity verification I think I understand it. > * Document verification I hope I understand it. > * What a hash is I understand it. > * How hashes are used I think I understand it. > * How hashes are misused and shouldn't be used Ehh... I've never thought about it. How they should not be used? > * Out-of-band verification I think I understand it... > * Type I versus Type II error I don't have any idea about this, can you please clarify it? ... > As an example, a fairly tech-savvy friend of mine made a habit of > signing all her emails. Her reasoning was, "if people ever see a > message that's not signed, they'll know it's not from me." This > reasoning sounds good, and many people on this list would probably agree > with it. The problem is that it's incorrect. > > If someone using her name were to post a racist, hate-filled screed on > the internet, would she really be able to persuade people she didn't > write it just by saying "look, I didn't sign it"? Or would her critics > say, "of course you didn't sign it, you wanted to be able to deny > writing it!"? I get your point. However, people should be considered innocent until proven guilty. Of course if we talk about racism, paedophilia or drugs traffic, people is guilty even if they have been dead for years before the incident. Best Regards -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.10 (MingW32) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ iQEcBAEBCAAGBQJLSqGwAAoJEMV4f6PvczxAfckIAJqXGBlfoTd5Gq92/nFv63oZ qcD/3oHHTxxc7OfRHkiU+wOc0vscOcxnraIe+KPsdqexpiEou7Z0gI9QxwqMMJaF dXR13zqO6kKd687UINfiXurr2rEoT8u9EXpyW1me44yaIsXuyST/Apr2VhLBeomq sQg4nOUm4d8/zPl3HXq2siMAHLgjGM7RnaqoMOHfcDD6Yl/0UNesQ67RHMlktBGm DKfXDTztAyMec1GDnrkLTovER7wBwMRFPQPDZk+rzoy7zZXRvuUZSQ18WMDcDQEo DA7oSGED5PmKGl+70hUHcprYcszp6ditvnxe0cWEyZvnKgAJfCPSncNDTes+pPY= =zY0v -END PGP SIGNATURE- ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Web of Trust itself is the problem
On 01/10/2010 11:01 PM, Mario Castelán Castro wrote: >> Crypto is not like this. Sure, you don't need to understand Feistel >> networks or large number theory in order to use crypto, but look at >> what you *do* need to understand: [...] > > Is good if you know that, you will use the crypto better but is not > nessesary IMO. Can you explain why that things are *nessesary* in > order to use crypto?, we have "user friendly" crypto programs like > seahorse, I can't figure out someone is unable to use it with the > available "user friendly" software like seahorse. Read this paper: Garfinkel, S. L., Margrave, D., Schiller, J. I., Nordlander, E., and Miller, R. C. 2005. How to make secure email easier to use. In _Proceedings of the SIGCHI Conference on Human Factors in Computing Systems_ (Portland, Oregon, USA, April 02 - 07, 2005). CHI '05. ACM, New York, NY, 701-710. DOI= http://doi.acm.org/10.1145/1054972.1055069 Also read this paper: Gaw, S., Felten, E. W., and Fernandez-Kelly, P. 2006. Secrecy, flagging, and paranoia: adoption criteria in encrypted email. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (Montreal, Quebec, Canada, April 22 - 27, 2006). R. Grinter, T. Rodden, P. Aoki, E. Cutrell, R. Jeffries, and G. Olson, Eds. CHI '06. ACM, New York, NY, 591-600. DOI= http://doi.acm.org/10.1145/1124772.1124862 Once you've read them, then let's have this conversation again. The obstacles we face in crypto adoption are not related to user interfaces. They're related to users. There's a lot of good papers in the literature covering this problem. Those two papers will helpfully point you in the right direction. >> Try telling this to a noob who is: >> a) convinced that only a nefarious low life has a use for encryption >> b) afraid of and distrusts computers >> c) convinced he/she is right and logic won't sway him/her.. > > What is your point Robert? I didn't write this; you're misquoting someone else's words and attributing them to me. >> The only crypto they use is the crypto that is invisible to them >> (usually https, which is pretty invisible). > > HTTPS is not invisible, is transparent with most browers. Likewise; David Shaw wrote this. That said, I agree with him, and HTTPS is /very/ invisible to most users. A few years ago a fellow grad student of mine, Peter Likarish, developed a really cool anti-phishing technology. (I don't know if it's been cleared for publication, or if he's still wrestling with it privately, so I can't talk about how it works.) It was a phenomenally effective phishing-detection engine. For testing purposes, he packaged it up into a Firefox plugin. When a user visited a phishing site, a small red bar would appear across the top of the screen. "Warning: this site appears to be impersonating another site," it would say. He figured users would see it. He recruited a number of normal, everyday users to test the plugin. He gave them a computer preinstalled with Firefox and the anti-phishing plugin. *Not one of them* saw the red bar across the top. They all considered it to be visual noise and filtered it out. Peter decided the solution was to make the bar grow steadily bigger over time. The user could click on the bar at any time to make it vanish; but if the user ignored the bar, the bar would grow and grow until it took over a third of the screen. He repeated the test, and this time videotaped people as they were interacting with the system. *Not one* saw the bar. According to Peter, when watching the videotape you could watch users' eyes scroll down the screen as the bar grew. There was no question that on some level they were seeing the bar, processing it. Peter's hypothesis was that Flash ads are to blame. Users have become conditioned to having Flash ads appear on the screen, take over real estate, and so on. Therefore, users were subconsciously filtering out this big red alert bar and it was never percolating up to the conscious level where users could make an informed decision about the risks. So. Yes. HTTPS is invisible. Users typically do not have anywhere near the visual recognition of web interface that people like to think they do. ObDisclaimer: Peter told me this about two years ago now. My memory is not perfect; I may be off on details. However, I am confident the salient parts of the story are correct. ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Web of Trust itself is the problem
On Jan 10, 2010, at 11:01 PM, Mario Castelán Castro wrote: The only crypto they use is the crypto that is invisible to them (usually https, which is pretty invisible). HTTPS is not invisible, is transparent with most browers. Invisible is as example, the logs that your ISP, mine or google (likley) have of all our mail, because you don't see it, you even don't know if they really have such logs. We can argue the definition of "invisible" vs "transparent" for days and waste everyone's time. I use the term to mean "They don't see https. They don't really care about it, as evidenced by most just hitting the "continue" button when are told about a bad certificate, and have only the vaguest notion (if even that) that they might want it." David ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Web of Trust itself is the problem
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 January 10th 2010 in gnupg-users@gnupg.org thread "Web of Trust itself is the problem" >Crypto is not like this. Sure, you don't need to understand Feistel >networks or large number theory in order to use crypto, but look at >what you *do* need to understand: [...] Is good if you know that, you will use the crypto better but is not nessesary IMO. Can you explain why that things are *nessesary* in order to use crypto?, we have "user friendly" crypto programs like seahorse, I can't figure out someone is unable to use it with the available "user friendly" software like seahorse. >Try telling this to a noob who is: >a) convinced that only a nefarious low life has a use for encryption >b) afraid of and distrusts computers >c) convinced he/she is right and logic won't sway him/her.. What is your point Robert?. The same apply to planes, some people don't trust planes, some don't trust computers or cryptography or , but that don't mean the public in general is unable to fly in planes or to use cryptography ;). >The only crypto they use is the crypto that is invisible to them >(usually https, which is pretty invisible). HTTPS is not invisible, is transparent with most browers. Invisible is as example, the logs that your ISP, mine or google (likley) have of all our mail, because you don't see it, you even don't know if they really have such logs. Transparent is one thing that you can see if you want in the same manner you can ignore it, like the thoustands of instructions in machine code to run a software or the encryption in HTTPS. You can do "hexdump /usr/local/gpg", or click a button in FF that tellsyou the encryption information. -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.9 (GNU/Linux) iEYEAREIAAYFAktKopsACgkQZ4DA0TLic4heGACfUf4UQOCoddJTgivgXXV/sBk0 q3wAn2wHgEuLEamep3xbx8XJb+7iezxo =kWGz -END PGP SIGNATURE- ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Web of Trust itself is the problem
On Jan 10, 2010, at 10:24 PM, RobertHoltzman wrote: On Sun, Jan 10, 2010 at 02:24:22PM -0600, Mario Castel�n Castro wrote: Is not neseesary to comprehend cryptography to use it. In fact, the pknowledge of the use of one thing and the knowledge to use it are independient. I.e: don't know how to ride a bicicle, but I know how they work Try telling this to a noob who is: a) convinced that only a nefarious low life has a use for encryption b) afraid of and distrusts computers c) convinced he/she is right and logic won't sway him/her. While I do believe that there are a number of people in each of those categories (or combinations thereof), I strongly suspect that the largest category is: d) those people who are completely unaware of crypo: unaware that they might actually want it on occasion, and unaware that they don't have it. It's not that they gave it a bit of thought and decided against it for whatever reason - they never gave it even a moment of thought. The only crypto they use is the crypto that is invisible to them (usually https, which is pretty invisible). David ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Web of Trust itself is the problem
On Sun, Jan 10, 2010 at 02:24:22PM -0600, Mario Castel�n Castro wrote: > > Is not neseesary to comprehend cryptography to use it. In fact, the > pknowledge of the use of one thing and the knowledge to use it are > independient. I.e: don't know how to ride a bicicle, but I know how > they work Try telling this to a noob who is: a) convinced that only a nefarious low life has a use for encryption b) afraid of and distrusts computers c) convinced he/she is right and logic won't sway him/her. -- Bob Holtzman GPG key ID = 8D549279 If you think you're getting free lunch check the price of the beer. signature.asc Description: Digital signature ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Web of Trust itself is the problem
On 01/10/2010 03:24 PM, Mario Castelán Castro wrote: > Is not neseesary to comprehend cryptography to use it. In fact, the > pknowledge of the use of one thing and the knowledge to use it are > independient. I.e: don't know how to ride a bicicle, but I know how > they work Crypto is not like this. Sure, you don't need to understand Feistel networks or large number theory in order to use crypto, but look at what you *do* need to understand: * Identity verification * Document verification * What a hash is * How hashes are used * How hashes are misused and shouldn't be used * Out-of-band verification * Type I versus Type II error ... and so on, and so on, and so on. I stopped at seven; I could easily go on for another seven, or more. These are all things that are necessary to use GnuPG successfully. As an example, a fairly tech-savvy friend of mine made a habit of signing all her emails. Her reasoning was, "if people ever see a message that's not signed, they'll know it's not from me." This reasoning sounds good, and many people on this list would probably agree with it. The problem is that it's incorrect. If someone using her name were to post a racist, hate-filled screed on the internet, would she really be able to persuade people she didn't write it just by saying "look, I didn't sign it"? Or would her critics say, "of course you didn't sign it, you wanted to be able to deny writing it!"? Likewise: people tend to be interested in who has signed a given key... but why? Anyone can sign anything, regardless of whether the key owner consents. There are all kinds of credibility attacks you could do on someone by putting a fake "StormFront Identity Verification " signature on a key -- and thus, have people infer from that signature that the key owner is a member of a racist hate organization. Crypto is a /highly/ demanding field. The skills required to use it effectively, and avoid incorrect and/or dangerously false reasoning about documents, are far, far beyond the realm of most users. OpenPGP is in many ways a failed standard. It's big, it's complex, it has a lot of subtle edge cases, and so on. However, for all its faults, I think it is by far the best email encryption standard we have. ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Web of Trust itself is the problem
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 January 10th 2010 in gnupg-users@gnupg.org thread "Web of Trust itself is the problem" >I get the impression that it's mostly a matter of their fear of not >being able to comprehend it. After all, it is a "computer thing". Is not neseesary to comprehend cryptography to use it. In fact, the pknowledge of the use of one thing and the knowledge to use it are independient. I.e: don't know how to ride a bicicle, but I know how they work -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.9 (GNU/Linux) iEYEAREIAAYFAktKN3cACgkQZ4DA0TLic4jjwwCgkFpwUb1NZ9j3DgExGIENCmhy ZwIAnA+vUYjGHtYkjhiwsj3UI5UMjU9L =hc9K -END PGP SIGNATURE- ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Web of Trust itself is the problem
On Sun, Jan 10, 2010 at 09:27:14AM -0600, John B wrote: > On 09 January 10, Heinz Diehl wrote: > > > What I've encountered is that lots of people answering that way do not > > actually mean what these words say, but use them as a way to avoid saying > > the truth: "I'm not able to install such software, I can not understand > > how this works at all, it seems way too complicated to me, > > and I do not want you to know that I do not even understand the slightest > > bit at all of what you're talking about" :-) > > Then they need to learn it. It's not necessary to learn *how* it works > completely, or know as much as someone who designs it - just enough to know > how to use it correctly. It's not hard, it's simply laziness for the most > part. I disagree. I get the impression that it's mostly a matter of their fear of not being able to comprehend it. After all, it is a "computer thing". -- Bob Holtzman GPG key ID = 8D549279 If you think you're getting free lunch check the price of the beer. signature.asc Description: Digital signature ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Web of Trust itself is the problem
On 09 January 10, Heinz Diehl wrote: > On 09.01.2010, RobertHoltzman wrote: > > > Personally I think a lot of people care about privacy, but are just not > > > able and/or frightened to install something complex on their machines. > > > > Then you get the contingent that sats "I have nothing to hide". > > What I've encountered is that lots of people answering that way do not > actually mean what these words say, but use them as a way to avoid saying > the truth: "I'm not able to install such software, I can not understand > how this works at all, it seems way too complicated to me, > and I do not want you to know that I do not even understand the slightest > bit at all of what you're talking about" :-) Then they need to learn it. It's not necessary to learn *how* it works completely, or know as much as someone who designs it - just enough to know how to use it correctly. It's not hard, it's simply laziness for the most part. -- Fight organized crime: Re-elect no one. ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Web of Trust itself is the problem
On Sat, Jan 09, 2010 at 02:49:13PM +0100, Heinz Diehl wrote: > On 09.01.2010, RobertHoltzman wrote: > > > > Personally I think a lot of people care about privacy, but are just not > > > able and/or frightened to install something complex on their machines. > > > Then you get the contingent that sats "I have nothing to hide". > > What I've encountered is that lots of people answering that way do not > actually mean what these words say, but use them as a way to avoid saying > the truth: "I'm not able to install such software, I can not understand > how this works at all, it seems way too complicated to me, > and I do not want you to know that I do not even understand the slightest > bit at all of what you're talking about" :-) > > http://papers.ssrn.com/sol3/papers.cfm?abstract_id=998565 That is a great paper. I am keeping it for the next time I run into one of "them". -- Bob Holtzman GPG key ID = 8D549279 If you think you're getting free lunch check the price of the beer. signature.asc Description: Digital signature ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Web of Trust itself is the problem
On 09.01.2010, RobertHoltzman wrote: > > Personally I think a lot of people care about privacy, but are just not > > able and/or frightened to install something complex on their machines. > Then you get the contingent that sats "I have nothing to hide". What I've encountered is that lots of people answering that way do not actually mean what these words say, but use them as a way to avoid saying the truth: "I'm not able to install such software, I can not understand how this works at all, it seems way too complicated to me, and I do not want you to know that I do not even understand the slightest bit at all of what you're talking about" :-) http://papers.ssrn.com/sol3/papers.cfm?abstract_id=998565 ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Web of Trust itself is the problem
On Fri, Jan 08, 2010 at 07:46:28PM +0100, Heinz Diehl wrote: > > Personally I think a lot of people care about privacy, but are just not > able and/or frightened to install something complex on their machines. Then you get the contingent that sats "I have nothing to hide". -- Bob Holtzman GPG key ID = 8D549279 If you think you're getting free lunch check the price of the beer. signature.asc Description: Digital signature ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Web of Trust itself is the problem
On 07.01.2010, Mario Castelán Castro wrote: > I think the WoT and in general the cryptography is not widely used > because few people really care about their privacity. I think the overall stats for people using cryptography is that low because it is or seems too complicated for them. A lot of people in the world do not even know how to install Windows, and a whole lot of people even can't install programs on their computers properly. This is not meant in a discriminating way at all, this is the real life. Personally I think a lot of people care about privacy, but are just not able and/or frightened to install something complex on their machines. ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Web of Trust itself is the problem
On Fri, Jan 08, 2010 at 10:21:51AM -0600, Mario Castel�n Castro wrote: > > Did you count the citys in the list, they are just 11 of thoustands > and thoustands around the world; it helps of course, but very little. You obviously didn't try to use the search box to find more cities. -- Bob Holtzman Key ID: 8D549279 "If you think you're getting free lunch, check the price of the beer" signature.asc Description: Digital signature ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Web of Trust itself is the problem
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Januery 8th 2010 in gnupg-users@gnupg.org thread "Web of Trust itself is the problem" >However, most people lack the skills necessary to do anything about >their privacy, and lack the inclination (time, energy, or even >self-confidence) to do anything about their lack of skills. Of course, no one borns knowing how to use GNU PG but the one with true interest in privacity will learn, that is my point. >>I think the WoT and in general the cryptography is not widely used >>because few people really care about their privacity. >IMHO, there's another problem, an entry barrier to the WoT. The >practice of key exchange is widespread in very close circles of >geeks, Linux developers and, to a certain degree, scientists. For >someone who does not belong to these categories and does not attend >any conferences, the web of trust is hardly reachable. Unfortunately, >I know no solutions besides commercial CAs. Well, you really don't *need* to be within WoT to use crypto, the confidence level will be less but for most people it is enougth. >Sites such as http://biglumber.com/x/web can help with this. My >perception of it is that it does not exclude non-geeky people. Did you count the citys in the list, they are just 11 of thoustands and thoustands around the world; it helps of course, but very little. -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.9 (GNU/Linux) iEYEAREIAAYFAktHW5IACgkQZ4DA0TLic4h4QwCdEtH6FPmP3EkzcaMqCobMN+WE VaIAn1pS4xFUODB3jNe4gjyz7X2gFIQN =3mrx -END PGP SIGNATURE- ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Web of Trust itself is the problem
On Fri, Jan 8, 2010 at 8:21 PM, Mario Castelán Castro wrote: >>IMHO, there's another problem, an entry barrier to the WoT. The >>practice of key exchange is widespread in very close circles of >>geeks, Linux developers and, to a certain degree, scientists. For >>someone who does not belong to these categories and does not attend >>any conferences, the web of trust is hardly reachable. Unfortunately, >>I know no solutions besides commercial CAs. > > Well, you really don't *need* to be within WoT to use crypto, the > confidence level will be less but for most people it is enougth. Actually, you don't really *need* to use crypto in email, the confidence level will be less, but to most people it is enough :) -- With best regards, Dmitri Minaev Russian history blog: http://minaev.blogspot.com ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Web of Trust itself is the problem
Dmitri Minaev writes: > On Thu, Jan 7, 2010 at 9:08 PM, Mario Castelán Castro > wrote: > >> I think the WoT and in general the cryptography is not widely used >> because few people really care about their privacity. > > IMHO, there's another problem, an entry barrier to the WoT. The > practice of key exchange is widespread in very close circles of geeks, > Linux developers and, to a certain degree, scientists. For someone who > does not belong to these categories and does not attend any > conferences, the web of trust is hardly reachable. Unfortunately, I > know no solutions besides commercial CAs. Sites such as http://biglumber.com/x/web can help with this. My perception of it is that it does not exclude non-geeky people. /Simon ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Web of Trust itself is the problem
On Thu, Jan 7, 2010 at 9:08 PM, Mario Castelán Castro wrote: > I think the WoT and in general the cryptography is not widely used > because few people really care about their privacity. IMHO, there's another problem, an entry barrier to the WoT. The practice of key exchange is widespread in very close circles of geeks, Linux developers and, to a certain degree, scientists. For someone who does not belong to these categories and does not attend any conferences, the web of trust is hardly reachable. Unfortunately, I know no solutions besides commercial CAs. -- With best regards, Dmitri Minaev Russian history blog: http://minaev.blogspot.com ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Web of Trust itself is the problem
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Mario Castelán Castro escribió: ... > I think the WoT and in general the cryptography is not widely used > because few people really care about their privacity. I agree... one of my friends seem to think cryptography is useful for mafia and pedophiles. Other friends just say "interesting" and try to change the subject. Best Regards -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.10 (MingW32) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ iQEcBAEBCAAGBQJLRsKgAAoJEMV4f6PvczxAaXMIAKFoxaTBnHJgCWO+G7CiziW1 h+DIrO7oRn5n47xUmnDh/HorSov3QyWTFDQ5ejSwpsMPYkJslMdWIDBova/Ezkwk g3dFfHf0/EHEBnhUNbAeLuuxMWoBRDXJgyc590vka3bZ/OZw0d/94rF4nVdQbcmW AeWZ1/jCLecoDPdkWD/LArCbmbQWbSXL9cEHPSYv4NXK//np9bHfFSMm0A5CM2vs F349iqY8M/cVDcdUY2dqDnLg+ftZUOYM1pTN33Vxm4RelteMsv8Q8hmt+RB0F24K d7WNx7s/q6tZv5PlVz06wUarB/4Fkh46Z4MbNGeFZmjvhyu6vez6y9nbTh1LPUg= =rE+O -END PGP SIGNATURE- ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Web of Trust itself is the problem
On Thu, Jan 07, 2010 at 12:23:55PM -0500, Robert J. Hansen wrote: > On 1/7/10 12:08 PM, Mario Castelán Castro wrote: > > very few really care about their privacity. > > The fact that "free credit reporting services" are making a ton of > money, as are services like LifeLock and whatnot, plus the huge media > impact of identity theft, etc., all points to people knowing their > privacy is at risk and feeling stressed out about it. > > However, most people lack the skills necessary to do anything about > their privacy, and lack the inclination (time, energy, or even > self-confidence) to do anything about their lack of skills. I think this hits way below the level of technology. We haven't been taught useful ways of thinking about our security and identity w.r.t. the world we now live in. When concepts like "authentication" and "trust" are seriously discussed in grade school (perhaps in smaller words :-) then we'll begin to build a society (as opposed to a few experts and enthusiasts) which is prepared to use these tools effectively. As it is, few know *how* to care about their privacy. -- Mark H. Wood, Lead System Programmer, enthusiast mw...@iupui.edu Friends don't let friends publish revisable-form documents. pgp0rtNspYLtw.pgp Description: PGP signature ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Web of Trust itself is the problem
On Thu, 07 Jan 2010 10:50:35 -0600, Alex Mauer wrote: > They’re only unknown the first time you contact them. It is useful to > know that the second time you contact f...@example.com it’s the same > party you contacted the first time. Or that the phishing email you MUA authors should really add a feature supporting this. In particular storing the fingerprint of a key in the address book. We are talking about this for years but to my knowledge it has never been implemented. Salam-Shalom, Werner -- Die Gedanken sind frei. Ausnahmen regelt ein Bundesgesetz. ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Web of Trust itself is the problem
On 1/7/10 12:08 PM, Mario Castelán Castro wrote: > very few really care about their privacity. The fact that "free credit reporting services" are making a ton of money, as are services like LifeLock and whatnot, plus the huge media impact of identity theft, etc., all points to people knowing their privacy is at risk and feeling stressed out about it. However, most people lack the skills necessary to do anything about their privacy, and lack the inclination (time, energy, or even self-confidence) to do anything about their lack of skills. ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Web of Trust itself is the problem
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Januery 7th 2010 in gnupg-users@gnupg.org thread "Web of Trust itself is the problem" I think the WoT and in general the cryptography is not widely used because few people really care about their privacity. Is about the same issue as free software, there is possible to use only free software but most people don't aim at a fully free enviroment because they are really careless about freedom, same with cryprography, very few really care about their privacity. -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.9 (GNU/Linux) iEYEAREIAAYFAktGFP0ACgkQZ4DA0TLic4gCXQCcC9FG2pHxXhaR6s3d7FDdMei7 QAYAniu/3K//BJrSzrBw/FZHxZwy8uhL =oU8P -END PGP SIGNATURE- ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Web of Trust itself is the problem
On 01/07/2010 11:50 AM, Alex Mauer wrote: > Many people have correspondence with people they never have and never > will meet in person, and knowing that it’s always the same person is > still helpful. agreed, key continuity checking is itself a useful tool, and maybe more OpenPGP implementations should provide ways to facilitate that for keys that *aren't* well-bound to the Web of Trust by the user's current trust database. Key continuity checking doesn't solve the problem of initial contact, though. And it doesn't cope well with re-keying in the event of a compromise. So having functional, cryptographically-valid infrastructure available to handle those important cases is a good thing. --dkg signature.asc Description: OpenPGP digital signature ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Web of Trust itself is the problem
On 01/07/2010 09:45 AM, Daniel Kahn Gillmor wrote: > Why is this all relevant? There are good reasons why you might be > interested in knowing that someone specific signed something public , of > course (e.g. software signatures, advice on mailing lists or other fora, > etc). But for non-public communications: you *must* know who the remote > endpoint is in order to have truly secret communications. Without that > knowledge, you are communicating with an unknown party, so who are you > keeping things secret from? > > "secret" communications with an unknown remote party over a > trivially-compromised communications medium are anything but secret. They’re only unknown the first time you contact them. It is useful to know that the second time you contact f...@example.com it’s the same party you contacted the first time. Or that the phishing email you received from b...@example.com didn’t actually come from the same party you corresponded with last week. Many people have correspondence with people they never have and never will meet in person, and knowing that it’s always the same person is still helpful. -Alex Mauer “hawke” signature.asc Description: OpenPGP digital signature ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Web of Trust itself is the problem
On 01/07/2010 04:36 AM, makrober wrote: > *Most individuals will rarely, if ever, be motivated to communicate > in secrecy with someone they don't already have a trusted > relationship with*. I beg to differ. anyone who has ever conducted online business has a strong incentive for communications secrecy with a remote party with whom they do not yet have a trusted relationship. At the very least, the transfer of payment credential information is something most people would prefer was only seen by the other party in the transaction. The fact that most online transactions like this happen through the world wide web these days, and not e-mail, is perhaps a reason that the WoT does not have wider adoption, since the WoT is not used for the www (yet -- some of us are working on that). Online transactions are only one of many examples, but probably the one that people are most familiar with. The WoT also provides a method to handle situations like key loss or revocation, and subsequent new keys without forcing the keyholder to meet up in-person (or otherwise secured out-of-band) with every one of their contacts. Why is this all relevant? There are good reasons why you might be interested in knowing that someone specific signed something public , of course (e.g. software signatures, advice on mailing lists or other fora, etc). But for non-public communications: you *must* know who the remote endpoint is in order to have truly secret communications. Without that knowledge, you are communicating with an unknown party, so who are you keeping things secret from? "secret" communications with an unknown remote party over a trivially-compromised communications medium are anything but secret. --dkg signature.asc Description: OpenPGP digital signature ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Web of Trust itself is the problem
Greg Sabino Mullane wrote: But the rest of the "Why isn't [it] used" is plain wrong. G/PGP isn't widely used because it does not address adequately the real-life operational circumstances of the potential user, and Web of Trust is the main culprit. It brings an enormous burden... You're disregarding the other major use of the WoT, which is authentication. A public key communication system such as gnupg can have three, somewhat related but to the user very distinct purposes: 1) secrecy of communication 2) authentication of the public key of message recipient. 3) non-repudiation of the content by it's sender. To a cryptographer, all three may seem equally important. In practice, they are not: the first one is of extreme importance and can not be substituted by any means outside of the system. The second not only can be achieved by methods that operate in addition to or outside of the system, but it is, for varios reasons I outlined before, sometimes (or perhaps even often?) desirable to do so. Finally, the third (I believe this is what you refer to above?) is, in practical terms, an extremely rare requirement when compared to the first one. If the above is the case, making a system very hard to use because of secondary objectives which are either hardly ever of real use (non-repudiation) or likely/preferably achieved by other means better, can't be conducive to the wide adoption of such system. MacRober ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Web of Trust itself is the problem
-BEGIN PGP SIGNED MESSAGE- Hash: RIPEMD160 > But the rest of the "Why isn't [it] used" is plain wrong. > > G/PGP isn't widely used because it does not address adequately the > real-life operational circumstances of the potential user, and > Web of Trust is the main culprit. It brings an enormous burden to > the development and - consequently - to the daily use of the system. > This burden is of such magnitude that it prevents all but technically > very competent computer users from adopting the system. > Yet it addresses the need that is present, I propose, only for a very minor > segment of users: those that would like to communicate in secrecy > but have not had a previous trusted relationship. You're disregarding the other major use of the WoT, which is authentication. - -- Greg Sabino Mullane g...@turnstep.com PGP Key: 0x14964AC8 201001070642 http://biglumber.com/x/web?pk=2529DF6AB8F79407E94445B4BC9B906714964AC8 -BEGIN PGP SIGNATURE- iEYEAREDAAYFAktFyLsACgkQvJuQZxSWSsi0GwCgqVZUBcfl0EcLiJ/JHm1GuYWL xZsAnRNRWjQDCN+KMLl4C/W0ei+0A/Ad =yPv+ -END PGP SIGNATURE- ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Web of Trust itself is the problem
Thanks for your comments Werner; Werner Koch wrote: On Thu, 07 Jan 2010 09:36:26 +, makrober wrote: G/PGP isn't widely used because it does not address adequately the real-life operational circumstances of the potential user, and I still believe that OpenPGP along with PGP 2.1 is the most used data protection scheme for plain data and email. Correct, but still there is no doubt that only a very small fraction of what I would call "qualified e-mail" is encrypted. (In this context, let's agree that "qualified" is mail between two parties that have a trust relationship and a real need for secrecy (from whatever adversary!) as opposed to those that would just encrypt the mail out of style or principle. We probably agree at least that that the adoption of encryption in computer communication, both "general" and "qualified" communication is surprisingly low, and that it is worth examining why is this the case and what should or could be done to change that. I offered one view of the reasons, but in the following I would also suggest what would be worth undertaking: Using the excellent crypto-code base of GnuPG, a derivative public key encryption/decryption product with the following characteristics should be created: 1) it should be communication channel and protocol agnostic. 2) its operational components should be self-contained; i.e., it should assume it is running on a stand-alone computer. It should require no tight integration with the operating system of the computer it is running on. 4) until successfully decrypted, none of the data it operates on should be distinguishable from a random stream. 5) it assumes that someone or something outside of the system guarantees the authenticity of fingerprint of the public key of the corresponding party. 6) it can be both shell-driven and provide an API for the inclusion into a variety of software products that manage the variety of constantly evolving communication channels and protocols. MacRober ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Web of Trust itself is the problem
On Thu, 07 Jan 2010 09:36:26 +, makrober wrote: > G/PGP isn't widely used because it does not address adequately the > real-life operational circumstances of the potential user, and I still believe that OpenPGP along with PGP 2.1 is the most used data protection scheme for plain data and email. We don't have any hard facts except for problem reports we have seen over more than a decade. There must be a reason why OpenPGP application are even sold for mainframes; they need to exchange data with Unix and PC users. > On the other hand, WoT brings with it an immense problem for a > large number of those that need to communicate in secrecy: it is > providing an adversary with a traffic analysis tool that he can > only wish for. To state - as those who promote the system in its That is simply not true. The only fact you can read from the WoT is that two person have met around some date. That is in most circumstances not a secret fact; you merely have to look at the list of attendees of conferences. The WoT can give you only a clue if you have only a few signatures on your key. You can get a better set of data for traffic analysis by monitoring the keyservers. However this has nothing to do with the WoT. > Or - Web of Trust isn't the solution, Web of Trust is the problem. > Consequently, a WoT "improvement mechanism" such as outlined in > the presentation is, unfortunately, extremely unlikely to advance > the adoption of g/pgp. Until recently almost every mail client simply ignored the key validity and encrypted anyway. Yes, that is not as one should do it but it shows that the WoT is not really used. The majority of people don't care. For example. my key is around for many years now and for quite some time it has been one of the top connected keys. Despite that I only recently could find a trust path to the keys used to sign the linux kernel. They Linux hackers obviously didn't care about getting involved into the WoT. (I am not sure whether this is pro or contra to your statement ;-) Shalom-Salam, Werner -- Die Gedanken sind frei. Ausnahmen regelt ein Bundesgesetz. ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Web of Trust itself is the problem
Andre Amorim wrote: What are your thoughts about that ? http://www.cs.rice.edu/~mtd3/comp527/comp527presentation.pdf Well, here are some thoughts: The presentations starts with: "Why isn’t PGP widely used?" The first point ("Designed around the E-mail") is absolutely correct. E-mail is not the only communication channel that needs protection now, and I strongly suggest that it will be less and less prominent in the future. There is an awful lot of crud in g/pgp that complicates the use in contexts other than e-mail. But the rest of the "Why isn't [it] used" is plain wrong. G/PGP isn't widely used because it does not address adequately the real-life operational circumstances of the potential user, and Web of Trust is the main culprit. It brings an enormous burden to the development and - consequently - to the daily use of the system. This burden is of such magnitude that it prevents all but technically very competent computer users from adopting the system. Yet it addresses the need that is present, I propose, only for a very minor segment of users: those that would like to communicate in secrecy but have not had a previous trusted relationship. *Most individuals will rarely, if ever, be motivated to communicate in secrecy with someone they don't already have a trusted relationship with*. This simple fact seems to me to be an issue that goes to the core of the design synopsis of a system such as g/pgp. On the other hand, the inverse of it has been built so deep into the system that somehow it appears impossible to discuss it "sine ira et studio". On the other hand, WoT brings with it an immense problem for a large number of those that need to communicate in secrecy: it is providing an adversary with a traffic analysis tool that he can only wish for. To state - as those who promote the system in its present shape do - that they should not worry about this fact is naive. The current change of legal landscape is undeniable: not only can various magistrates force the user to reveal his cryptographic key, but it has become common that such keys must be produced, often years after the fact, in civil litigations. In this combination of technical characteristics of the product and wider environment in which it is used, we simply must ask ourselves: Just who is left to use the system and why would he or she want to do it? Or - Web of Trust isn't the solution, Web of Trust is the problem. Consequently, a WoT "improvement mechanism" such as outlined in the presentation is, unfortunately, extremely unlikely to advance the adoption of g/pgp. MacRober ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users