Author Archives: Michael Froomkin

Somewhere Tim May Is Laughing His A** Off

Dilbert today is rather timely.

(About Tim May.)

Posted in Civil Liberties, Cryptography | Comments Off on Somewhere Tim May Is Laughing His A** Off

Remember the _NSAKEY ?

In light of the revelations that the NSA has collaborated with — or if you prefer subverted — major technology manufacturers in order to get them to introduce NSA-friendly backdoors into their products, is it time to revisit the controversy over the _NSAKEY?

The _NSAKEY, you may recall, was a public key accidentally left in a Microsoft release of an update to Windows NT. It was discovered by 1999 by Andrew Fernandes. At the time Microsoft denied that the key had anything to do with the NSA, but was just a name they gave it as the product had to comply with export control law. And, at the time, the better view seemed to be that it was all just an accident of nomenclature, as there were much better ways to subvert the product.

Still, you gotta wonder.

Posted in Cryptography | Comments Off on Remember the _NSAKEY ?

Encryption: The Sky *IS* Falliing

The latest revelations about the NSA’s ability to undermine most encryption used online dwarf anything we have learned previously. What is worse, the NSA has worked to insert weaknesses into products — backdoors.

the National Security Agency and its UK counterpart GCHQ have broadly compromised the guarantees that internet companies have given consumers to reassure them that their communications, online banking and medical records would be indecipherable to criminals or governments.

The agencies, the documents reveal, have adopted a battery of methods in their systematic and ongoing assault on what they see as one of the biggest threats to their ability to access huge swathes of internet traffic – “the use of ubiquitous encryption across the internet”.

Those methods include covert measures to ensure NSA control over setting of international encryption standards, the use of supercomputers to break encryption with “brute force”, and – the most closely guarded secret of all – collaboration with technology companies and internet service providers themselves.

Through these covert partnerships, the agencies have inserted secret vulnerabilities – known as backdoors or trapdoors – into commercial encryption software.

It’s everything, everything that Cypherpunks ever muttered about over their beer.

This is the secret that likely explains why the Obama and Cameron administrations were willing to do almost anything to try to get Snowden, the reporters he leaked to, and the anyone who touched their data.

This is the nuclear winter of data security.

What do we do?

I used to say, we don’t really care if the NSA is reading our traffic, because if they are, the secret is so valuable they won’t waste it on anything but the most important national security matters. The Snowden revelations suggest that wasn’t completely right — there was some information sharing with civilian domestic law enforcement, although it was obfuscated in ways that undermined the constitutional guarantee of the right to confront witnesses against you. More importantly, the fact of the Snowden revelations mean that the cat is out of the bag, so the disincentive to use the information will be greatly reduced.

Bruce Schneier has given this some thought — he had an advance look at the documents — and he says that the IETF and other engineers need to re-engineer the internet to make it safer from surveillance. Meanwhile, there are things we can do individually.

For now, however, it is not hyperbole to say, as Schneier does, that “[b]y subverting the internet at every level to make it a vast, multi-layered and robust surveillance platform, the NSA has undermined a fundamental social contract.” It’s going to be tough, hard work to rebuild the Internet, and even harder work afterwards to rebuild trust in systems not to mention both public and private institutions.

Are we up to either job?

Posted in Cryptography | 13 Comments

How to Respond to an Unreasonable Copyright Cease and Desist Letter

Vermont attorney Andrew B. Delaney teaches a master class in responding to a really excessive copyright cease and desist letter. (URL fixed)

(Via ATL of all places.)

Previously:

Posted in Law: Copyright and DMCA, Law: Practice | 2 Comments

Bots Love Me

No, this is isn’t a commercial for We Robot 2014 — that comes in a week or two when we issue the Call for Papers.

I was just looking at my Akismet Stats. Although blog readership is down (but Twitter followership — of a feed that is pretty much all auto-tweets from this blog — are way up), there is one category where numbers are booming: spam. The year isn’t over yet, and I’ve had twice as many as last year — more than 348,000 spam messages through the end of August.

Of those messages, just eleven got through my two-stage filters: Askimet plus the WordPress Hashcash Extended plugin.

Meanwhile there were an average of about a hundred real comments per month; I think a grand total of maybe one or two got wrongly held for one reason or another.

Posted in Discourse.net | Comments Off on Bots Love Me

QOTD

Found on one of UMiami Law’s very civilized web pages:

“Perhaps the two most valuable and satisfactory products of American civilization are the librarian on the one hand and the cocktail in the other.”

– Louis Stanley Jast, Librarian

(I hope no one on the Board of Trustees reads my blog. They have enacted all sorts of rules about when University funds cannot be spent on Intoxicating Liquors and the like. Perhaps books are next?)

Posted in U.Miami | Comments Off on QOTD