





Safeguarding Data From Big Brother Sven? 345
An anonymous reader writes "Now that the Swedish government (in its infinite wisdom) has passed a law allowing them to monitor email traffic, a question that I think a lot of people are asking (or at least should be asking) is: 'What can I do to improve my privacy?' The answer is not obvious.
So, what are the best solutions for seamless email encryption, search privacy, etc? What are your experiences with PGP vs GPG vs ...? In this day and age, why is the use of this type of privacy technologies still so limited? Why isn't there a larger movement promoting the use of privacy tools? Also, what is in your opinion the largest privacy concern? Search tracking? Email transfer?
I believe this is an interesting question not only for Swedes, but for everyone. Lots of traffic is passing through Sweden, but more importantly, the Swedish government is not alone in using this type of surveillance."
Reader j1976 writes with a related question: "For most users with email addresses within large organizations, implementing their own email encryption scheme is not feasible, partly because of the technological aspects, but also since users in organizations often do not have administrative access to their workstations. What can an organization do, centrally, to lift the burden of encryption from the users? Are there any transparent schemes for email encryption which could be installed for the organization as a whole?"
Secure tunnels (Score:5, Interesting)
Re: (Score:3, Informative)
Re: (Score:3, Informative)
1.Install gpg4win
2. Thunderbird (or equivilent free email client)
3.) Extensions for email ( case Thunderbird)
4.) make keys
5.) configure programs, get other users pub key etc etc.
This is to much for normal Joe by step 3 or 4 the normal Joe has given up.
If this would be auto
Re: (Score:3, Informative)
There, spelled like here (ere), indicates location.
Their, Possessive.
The're, contraction of they are.
GET IT RIGHT!
The're, not a word.
GET IT RIGHT!
SMTP over SSL (Score:5, Interesting)
One of the things we need to add is SMTP over SSL. It won't prevent all snooping, but at least between 2 people that trust each other, no snooping happens on the path between.
Re:SMTP over SSL (Score:5, Informative)
I have already implemented SMTPS, IMAPS and POP3S a few years ago. And it's actually not really necessary to buy a certificate if you are doing this for a closed group. Just use OpenSSL and generate your own certificate.
To send emails to others both ends have to buy an email certificate, like from Verisign.
And then some of those who voted for this law thought that encryption is very easy to crack - so easy that it doesn't matter if an email is encrypted or not. The problem with cracking encryption is that you first have to figure out which one it is - and the history is full of encryption techniques.
So in the end - this law will be a good promotor for encryption more than anything else and the monitors can continue to search with Google and not get a bit of useful information from the real criminals and terrorists.
Re:SMTP over SSL (Score:4, Informative)
We have used a self signed certificate for years and hundreds of other MTAs connect to us and happily set up a encrypted session to transfer mail.
Of course this has issues, by making it harder for the other end to be sure we are who we say we are, but given the alternative is simply to failover and send unencrypted that's not really a major concern.
This is with Postfix. Do any of the other big MTAs actually look to check the certificate is trusted before sending an encrypted message with default TLS settings?
On NPR... (Score:5, Insightful)
Re: (Score:3, Informative)
Re:On NPR... (Score:5, Interesting)
Of course, I used to be one of those people, too. I started out listening to NPR because I liked classical and jazz music... eventually the news wore on me and I realized that I had been sort of a dick prior. Now I really like NPR news.
Re: (Score:2)
Of course, I used to be one of those people, too. I started out listening to NPR because I liked classical and jazz music... eventually the news wore on me and I realized that I had been sort of a dick prior. Now I really like NPR news.
That's kind of why I avoid political discussions at family gatherings. Most of them get all their news and opinions from Rush Limbaugh and Fox News. They see every issue as black and white and are absolutely convinced that anyone that doesn't agree with them is either stupid or (to be generous) horribly uninformed or mislead. There's no such thing as a discussion with those people. They make it a lecture about how everything wrong with the world is cause by liberals.
Re: (Score:3, Insightful)
Irrational Conservatives think that everyone night like them is going to go to hell and think GOP stands for God's Own Party.
I think that about 80% of people on either side are irrational, and frankly I would rather talk to/be represented by someone I disa
Re: (Score:3, Funny)
ban the rich and tax guns? I'm not sure how that would help....
Re: (Score:2)
Also, on a personal level it evokes an unpleasant "paranoid" feeling that is only slightly more off-putting than feeling like somebody could be reading my email. Maybe I just don't like the thought of Big Brother so I avoid thinking about it, who knows.
So in other words somebody might be reading my email but so what. Of the billions of emails floating around the 'net mine ar
Re: (Score:2)
Re:On NPR... (Score:5, Interesting)
The 4th Amendment was written in response to the Stamp Act. Under the Stamp Act of 1765, all documents in your possession required the kings stamp on them to be legal. You had to by the stamps so this was in effect a tax.. the really ugly part of this law that people do not seem to know is that under the Stamp Act, British soldiers could come into your house any time they wanted to check your documents with what was known as a "writ of assistance". This is in effect a search warrant that British soldiers could write themselves. (It is akin to the NSA's National Security Letter as well..). Upon rummaging through your home, if you could not also prove that you paid taxes on other items such as your furniture or even your tea and your rum, they could arrest you.
Privacy is a property right, you are in your right not to show your property to anyone. This becomes all the more dangerous in a society of data mining and government provided "universal health care" because the government may decide you do not work out enough or your diet is not proper.
Don't think it can't happen.. In Japan the legal wast size is 33.5 inches. http://www.nytimes.com/2008/06/13/world/asia/13fat.html?_r=1&em&ex=1213588800&en=b5472f5ba2e31e50&ei=5087%0A&oref=slogin [nytimes.com] Anything over that and you may be sent to "re-education". If you deny "re-education" you may even be arrested for being fat.
Zimmermann, maybe? (Score:2)
Only terrorists have anything to fear from this! Are you a terrorist?
Yeah, it's turning into an old joke now, but, sadly (and in the words of Homer J.) it's funny 'cause it's true. Sort of (the perception, not the reality).
As for the "why are privacy technologies so limited?" question I think that probably, though not certainly, has something to d
Re: (Score:2)
Woodie Guthrie's [wikipedia.org] guitar read "This machine kills fascists". So yes, as I own two guitars and a bass, I am in fact a a terrorist.
Sweden's just being honest about it (Score:5, Interesting)
As the submitter points out, you cannot be sure where your data is being sent on the route between you and your recipient. For all you know your "Dear Mom" email might go through Sweden, the US, the UK, Denmark, Russia and China even though you live within 50 km of eachother.
And your Skype call? Well, that's likely to do the same thing with its routing feature.
Your SSL connection isn't any safer from snooping - not sure about MitM attacks, but if you're just listening in, do you really need to be a MitM?
Re: (Score:3, Informative)
Re:Sweden's just being honest about it (Score:4, Informative)
Re: (Score:3, Informative)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Because the only way you can avoid a MITM attack is to know that the other side's certificate is genuine. The entire point of the certificate is to prevent a MITM attack. How's it work? Simplified, you have the cert of the party you are trying to communicate with, and they in turn have yours. You generate a piece of random data and sign it with your private key, then send this to the other side. They decrypt with your public key and verify that you are who you say you are. Then they re-encrypt the data with
Re: (Score:3, Insightful)
You're confused because you think that it is still secrecy that protects the cert. The reason you can trust the CA's root certificate is because the CA's public key is PUBLIC. Anyone can read the cert using the CA's public key, which will decrypt the cert and then you're left with the DoD's public key and their identity (which was supposed to be verified by the C
Re: (Score:3, Funny)
Re: (Score:2)
Copying it doesn't really require you to be the man in the middle, and it's not like a "please don't copy"-flag would be respected anyway.
Re: (Score:3, Interesting)
Re: (Score:2)
Re:Sweden's just being honest about it (Score:4, Informative)
I'd be more worried about a super hardware AES cracker that the NSA isn't telling us about.
Re:Sweden's just being honest about it (Score:4, Insightful)
Maybe they can. Or they could just start their own Certificate Authority and get themselves onto the list of trusted authorities that comes installed with browsers or mail software.
But either way they might be reluctant to do the MITM like that because the bogus certificate with the genuine signature could be recorded by the targets and released to the public, causing great embarrassment to the certificate authority and much degradation to the trust of the certificate system.
Why can't it be simple. (Score:5, Interesting)
Some time ago I suggested someone write a thunderbird extension that was a "one click" encryption setup. On clicking "encrypt" it would create a gpg key > send the pub key to a key server > and if it does not have someone elses key it can suggest thunderbird and itself to that person.
I know this is not a good way to do this, but I can't see people using pgp/gpg it any other way.
Re: (Score:2)
on top of pgp, how about an email track me not - you can program thunderbird or firefox, to work with your friends family etc, to create dozens of fake temporary email accounts and just send out stuff all day long..
Re: (Score:2, Insightful)
Re: (Score:3, Insightful)
I'm still waiting on the Patriot act.. it breaks what the 1st, 4th, 5th, 6th, and 8th amendments to the constitution and its law.
Re: (Score:3, Insightful)
but I believe this is too much of a hassle for people who can't even figure out Yahoo Mail or tell the difference between Internet Explorer and Firefox.
Its not only to much hassle, it also doesn't really provide half as much security as one would expect. The header gets send completly unencrypted, so To, From, CC and stuff are easy to read, Subject sometimes to. And for a government it can often be enough to know your peers, the exact content isn't that important and if it is it can be retrieved by more drastic measures (keylocker, etc.). There is of course another issue in that when you sign your emails you lose deniability, so one should better not do t
Re: (Score:2)
My question has always been what is to stop the government (or anyone else for that matter) from going to the public key server and getting your key to decrypt your email?
Because the public key can only encrypt e-mail.
I suggest a Google of "private public key encryption" because my knowledge is fuzzy at best. But, reverse-engineering the private key (the one that can decrypt) from the public one requires factoring big numbers. On a typical machine, this takes until the sun burns out. On an atypical
Re:Why can't it be simple. (Score:5, Informative)
Re:Why can't it be simple. (Score:5, Informative)
The "public" in "public key server" means BOTH that the key server is public AND that it is a server for public keys. The most anal-retentive name for it would be a "public public key server".
See http://en.wikipedia.org/wiki/Public-key_cryptography [wikipedia.org] for all the details.
Re: (Score:2)
Re: (Score:3, Informative)
When your dealing with an entity like government
It is our duty to stop them from doing that.. You have a right to privacy, you have a right to not show someone the inside of your house, the inside of your gym locker, the inside of your bank account, o
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
My question has always been what is to stop the government (or anyone else for that matter) from going to the public key server and getting your key to decrypt your email?
Two reasons:
For a brief explanation of why, read this [wikipedia.org].
Re: (Score:2)
Ex.:
Person A has a public key (PubKA), and a private key (PrivKA) and wants to send an email to Person B, who has PubKB and PrivKB. Public keys are public, so person A and person B
Re: (Score:2)
No need to keep your public key secure it it takes a few milenia to decrypt with it.
Re: (Score:2)
Org-wide encryption (Score:2)
Are there any transparent schemes for email encryption which could be installed for the organization as a whole?
Entrust [entrust.com] works pretty well. I know of a couple of medium sized organizations (~14,000 employees) that use it. One ties it in to Eudora and the other, I believe, ties it into Outlook. Of course, if you want to exchange e-mail with customers, you'll have to make sure they have compatible software and keys (as with any encryption scheme.)
Re: (Score:2)
Of course, if you want to exchange e-mail with customers, you'll have to make sure they have compatible software and keys (as with any encryption scheme.)
Entrust also has a product called Entelligence Messaging Server [entrust.com] which can act as an encryption gateway between your company and your customers. It allows your company's employees to communicate securely with people outside the company, without having to deal with key exchanges and all that mess.
Too complex (Score:5, Insightful)
If MS would simplify it and make all of this just happen. I bet that there would be a big gaping hole for the gov't to make use of. Not to mention the security holes that would go along with it as well.
Re: (Score:2)
No. They don't have an urgent need. They'd do it if there was an urgent reason for it.
sending my and all of their friends their public key
That's what a key server is for. http://packages.debian.org/etch/onak [debian.org]
If MS would simplify it...
Show me the business case for a company the size of MS to get involved in this. There isn't one. RSA was as big as they got and they weren't strong enough to stay out on their own.
Nevermind the fact that it is simple!!! Compared to all of the time a
Why not make the government's job easier (Score:5, Funny)
Seamless, no. Pretty darn close, yes. (Score:5, Informative)
However, there are plenty of options if you're willing to do just a little work.
Install GPG or PGP. I use GPG because I can give it away legally to my friends who are less technically saavy and it works on Linux, OS X, and Windows.
Enigmail will integrate nicely into Mozilla's emailer and automate nearly everything once you have the person's public key. It will even notice who your recipient is and automatically pick the correct key.
There is something similar for the OS X Mail application (and I have it installed) but I don't remember the name of the application. It's not as bright as Enigmail and won't figure out who the recepient is automatically and pick the correct key.
FireGPG is a plug-in for FireFox (and it works for "Mozilla" because the web browser _is_ FireFox) that will allow you to use GPG with GMail.
I have an email account in which _all_ of the traffic is encrypted because I use these tools. I never send anything unencrypted on that account.
It's not seamless, but it's not that hard and it is not very intrusive.
I do not know if I should pity you because of your government reading your emails or if I should at least feel happy for you that they are honest enough to admit it (supposedly) before starting. Either way, I doubt things are any better here in the USA.
I find it amusing that the CAPTCHA is "incided", as in this new law inciting a riot.
Re: (Score:3, Informative)
About FireGPG, you should be careful when using it with gmail. Unless you are using the HTML-only version, when using their javascript-enabled message composition window a draft of the message gets saved to the gmail server. So now you have your plaintext being sent to gmail. It is only after you write your plaintext that the message is then encrypted for transmission.
-molo
Well as Phil Z. has said.. (Score:4, Insightful)
The second reason and it's to a lesser extent but still a strong motivator IMO for the lack of secure options for communication are that corporations and governments don't WANT secure applications being adopted. How else can the government spy on you or corporations steal secrets from each other if things are encrypted. This isn't paranoid fantasy land I live in. I don't think any intelligent person today doesn't know especially over the last 8 years that the governments are doing everything they can to spy on you, record you, monitor you and track you. Wether its the TSA, DHS, warrant-less wiretapping whatever we are living in a 1984'esqe society. Seamless and mass adoption of strong encryption and anonymity by the masses would *seriously* curtail their ability to spy on you and find dissidents and evil doers who read catcher in the rye. So IMO these are the two strongest compelling reasons we don't have encryption for the masses yet. Phil's ZFone project is a good step in the right direction though.
Re: (Score:2)
The reason PGP, and GPG as well, fail is because PKI is just too difficult to setup and maintain.
That's why no one uses SSL. [wikipedia.org]
it's too difficult to do in most corporations
Most corporations aren't smart enough to use S/MIME.
If you truly want secure email for the masses it has to be transparent.
If it was transparent, it wouldn't be truly secure.
Still, I'd argue that we should go for PGP/GPG. It's a lot simpler than a lot of other things people do on a daily basis -- driving a car, for instance. Certainly much simpler than a lot of things which are taught in school.
corporations and governments don't WANT secure applications being adopted.
Hope that tinfoil hat is comfortable... (And you accuse me of living in my mom's basement?)
How else can the government spy on you or corporations steal secrets from each other if things are encrypted.
The government, I can see, but it's not as though they can re
Re: (Score:2)
SSL/X.509 is just a degenerate form of the same scheme PGP uses. If people can handle SSL, they can handle PGP. A PGP-based scheme can be made to look the same to the users.
Unfortunately, if it's really transparent (whether we're talking about X.509 or PGP), then it probably has at least a slight weakness (i.e. it never really gets authenticated).
PGP/GPG (Score:3, Insightful)
More people need to use these. Operating without a centralized Certificate Authority, GPG really depends on there being sufficient users to establish a web of trust.
I think people (in the US at least) either don't understand the simplicity of sniffing cleartext, or don't think they care. The aggravating part is that GPG can be really easy to use. Apps like Seahorse [gnome.org] make key and keyring management trivial. There's a great Thunderbird plugin [mozdev.org] that makes signing and/or encrypting your mail no harder than it was before. (Yes, I know not everyone uses Linux and Thunderbird, but I trust GPG tools exist for other OSs/email clients)
Given a safe and ubiquitous encryption scheme, I can't think any reasons for sending text/data in the clear. Now all we need is a ubiquitous encryption scheme.
Re: (Score:2)
Why is use limited? (Score:2)
And the few that do, dont understand how to mitigate it.
That 2nd is a problem for us techies too, as one way encryption is pretty worthless for communication.
Re: (Score:2)
> not doing anything wrong' mentality.
I don't approve of government snooping (I don't approve of government at all) but the fact is, they are right. The fact is that for most people (including most of us) there is nothing in any of their email such that having it read by any agency of any government would affect their lives in any way.
A real danger, though, is that the governments will get sucked in to some sort o
My largest privacy concern? (Score:3, Insightful)
SSL Proxy (Score:2, Informative)
Tumbleweed (Score:2)
What can an organization do, centrally, to lift the burden of encryption from the users? Are there any transparent schemes for email encryption which could be installed for the organization as a whole?
I work for a large healthcare organization and we use a product called Tumbleweed. It's not especially magical. If an outgoing e-mail is marked as encrypted (or keywords appear in the e-mail), the recipient gets a link to a secure web portal where they can log in and get that e-mail. It works fairly well, satisfying HIPPA requirements that otherwise prevented us from sending confidential e-mails to outside physician groups.
these kinds of stories are philosphically naive (Score:2, Interesting)
if you take a large, open, sprawling network, there is no law or safeguard that can protect you from eavesdropping. forget the governme
Re: (Score:2, Informative)
say a govt identifies someone of interest (Score:2)
in other words, even if your communication was immune from being cracked by the world's finest supercomputers, you essentially have no protection from their eyes on an open network. you simply ha
right (Score:2)
which is my whole point
(rolls eyes)
Okay (Score:2)
encryption is irrelevant (Score:5, Insightful)
I really hope I'm wrong. but the trend is there if you just look.
we already have people saying 'if you are not a terrorist, you should have nothing to hide'. this is just a half step away from saying 'if you DO use encryption, you MUST be hiding something that we should see'.
mark my words.
you may think that you are out-smarting the governments but they have the money, the guns and all the power. and they're NOT about to give this bit of power (over the people) up.
if you encrypt a laptop and pass thru customs, you are FORCED to reveal your password or at the least, 'open' the disk for them to view the contents of. so tell me, how did encryption help here?
don't give me that crap about truecrypt, either. how long will it take before their border people know how to detect this?
Re:encryption is irrelevant (Score:5, Interesting)
on the "public" portion, have semi-private personal pics, ie. your gf about naked, some sex stories from web and change them like they would be your experiences, love letters same thing, and other personalish data like that.
That "GF" doesn't be even YOUR gf, just grab some package of amateur pics of some website X)
Social engineering!
2nd solution: Public torrent based encrypted "backup" service, goes through the borders easily. Could be somekind of torrent & truecrypt mashup.
Could work if say you want to "backup" 5 gigs, you got to host atleast 10gigs. Gigantic waste of HDD space, Gigantic waste of bandwidth, no live usage, but have good key, and you are golden
In theory could work, anyone attempting something like this?
Re: (Score:2)
if anything, I'd put BORING text docs on my public volume. certainly NOTHING to trigger the urge to want to look further! staying below the radar is the way to go, I think.
but my point is that even if right NOW, customs doesn't know about TC, they soon will. they're dumb but their bosses aren't
now, suppose they get smart and detect (again, later on via some toolkit that they simply r
Re: (Score:2)
I realise this is a very crude way of combating somet
Re: (Score:2)
Not Obvious? (Score:2)
Sadly, not enough people care about the loss of privacy rights to change this. Look at all the people that say "I don't care, I have nothing to hide."
The fact is the Facebook generation doesn't care (Score:2)
Some even think it a virtue to live an 'open life' and not do anything they would not mind seeing in public.
Since they are the future, it is no wonder that software vendors have little incentive to invest money
Re:The fact is the Facebook generation doesn't car (Score:3, Insightful)
Patients have clearly demonstrated by their actions that they don't care at all about their privacy. After all they keep getting sick all the time, and visiting hospitals containing busy emergency rooms full of all kinds of undesirables - and that's just the staff!....
I think the key word, as always, is CHOICE. Do you really propose that socie
Sue the buggers! (Score:3, Informative)
If this is anything like the other PirateBay cases i can't wait to see the legal corrispondance [thepiratebay.org].
Off the record messaging (Score:3, Interesting)
There are plug-ins available for it. OTR has some nice properties including the fact that messages are encrypted, but still deniable. What this means is an eavesdropper cannot read what you write, but at some later time an attacker with an unencrypted copy of the conversation cannot prove that you wrote it.
The goal of the project is to provide a level of security similar to meeting in a private place an d talking. Privacy without a paper trail.
http://www.cypherpunks.ca/otr/ [cypherpunks.ca]
Webmail (Score:4, Insightful)
Aside from the usual reason of apathy, we have a (relatively) new, technical problem with securing email: a lot of people are using webmail.
That development was a technological step backwards: moving from specialized client software (mail reader) that understands what it is working on, to a generic tool (web browser). It's hard for a web browser to be able to understand that this piece of an web page is a PGP block, and this part is just UI, and that's assuming that it even has the whole message to work with (i.e. the web server actually sends all the PGP/MIME attachments, instead of presenting a nice webby interface that presents the message parts separately).
I have heard of a Firefox extension (damn, I can't remember the name) that can encrypt and decrypt pieces of web pages or textareas, but that sort of thing is always going to be hacky and cumbersome compared to a real mailreader, so I think that puts us at a disadvantage, compared to the situation ten years ago.
Discourage webmail. Webmail is creating a network effect that is a barrier to securing email.
Part 1 easy (Score:3, Interesting)
Easy thing to do, really no companies however offer this service
Does encryption really help? (Score:2)
When
This Stuff Has Been Around For Years (Score:2)
I've used PGP encrypted attachments for years. Works great.
SMTP over TLS is a good start. TLS is supposed to replace ssl, but who knows when that will happen. If you want to get mad-tricky, there's stunnel.
VOIP over TLS is another good start. It's not widely implemented, but widely available.
Chat can also be handled over TLS. Either through a VOIP softphone which is widely available or possibly XMPP.
If I offered TLS services f
Proxied search (Score:2)
Why does Google not want to provide an SSL search page? It could only be a benefit to their users.
I also have no idea why more people don't use GPG/PGP. Ease of use has come a long way, at least in Thunderbird. I find the Outlook and Mail.app plugins that
Because... (Score:4, Informative)
why is the use of this type of privacy technologies still so limited?
Several reasons:
Education. Most people that use email don't know what RSA, GPG or PGP is. Let alone the dozens of possible other ciphers available. These people also blissfully wandering around thinking their government is an effective, benevolent provider that keeps them safe so they don't even need encryption or privacy laws. (see: Nanny State). (Instead of the wasteful, corrupt, abusive, ignorant farce that it is.) Polls show that less than 1/4 of Americans know that there is no right to privacy (constitutionaly. The fourth amendment does not provide a right TO privacy; it only provides a right FROM search and seizure under certain conditions.) The rest of them think they have some such right and the government is upholding it, they don't need to encrypt their stuff. Besides [encryption is only for people breaking the law; if you aren't then you have nothing to hide.] lemma: People will not use something if they don't know they have a need for it or if it exists.
Ease of use. Have you ever tried to figured out how to be your own SSL Certificate Authority? or what that even means? I mean Christ, the openssl tool couldn't be any more complicated. Very few people can figure out and feel comfortable with creating, signing and maintaining keys and certificates correctly. Lemma: People will not use something that is confusing.
Guidance. Ever have a certificate/key fail to authenticate? Was the error/info helpful to somebody who doesn't understand the implementation details? No. When your VPN fails to connect or your message fails to decrypt is when I've seen some of the worst feedback presented to a user ever. We need to start practicing an intelligent feedback, one that diagnosis the problem and tells the user specifically what must be changed to solve the problem, not what the problem was. Tell people solutions, they already know a problem exists. Lemma: People will not use something that they cannot correct malfunctions with.
Standardization. PGP is not GPG. Not all mail agents support the same set of encryption capabilities. When sending a message you cannot be sure the recipient can read it no matter what you choose. As the receiver you are going to receive items that are incompatible with you. The result is pressure on ALL users not to use any encryption so that everybody is known to be using the same standard. Lemma: People will not use something [that interacts with all others] unless everybody else is using it.
Transparency. Install this, configure that, click this button, enter your password... People do not want to put this much effort into reading a piece of mail. I'm a security nut and I still hate typing my passwords the fifty times a day that I do. We need to make systems that are as transparent as possible. The user either has to never know they're using it, or they have to be expected to configure it only once and then never have to worry about it. Lemma: People will not use something that annoys them, especially repeatedly.
Too many choices. Which cipher do you want? Do you know why? Would you like RSA or DSA? How many bits? Would you like that in binary or ASCII armor? This detracts from a user's ability to be comfortable with a choice and as such they won't make one. Lemma: People will not use something if they aren't comfortable picking it.
Distribution. For PGP/GPG you need to distribute keys effectively (and transparently). This has not been solved adequately. Lemma: People will not use something that isn't available.
Economy. People do not want to pay for keys and certificates. While Verisign and others provide trusted stores where keys could be distributed the finance changes they enact are prohibitive for normal people. Yes, I know there exists free ones. But they aren't included in the root certificate databases of applications. You can add them but as I said earlier: you just crossed the line of ease of use that a user isn't going to cross
From a Terrorist perspective. (Score:4, Insightful)
Look at how "low-tech" the 9/11 attack was. Fake IDs and boxcutters.
Does anyone really believe that Terrorists are still using email and cellphones(other then bomb triggers)?
My guess is they have gone back to face-to-face MeatMeetings and good old SnailMail(with re-posting networks) in conjunction with simple codewords.
That being said, I seriously doubt all this Security "Theater" is aimed at Terrorists, if, indeed, it is more then theater. My guess is that it is all to head off the "revolution" by average citizens when they snap out of complacency.
Re:Someone please remind me... (Score:4, Insightful)
Re:Someone please remind me... (Score:5, Interesting)
Although I agree with your comment, just putting in an email, slashdot comment, or even one of my journals can't get the FBI and DEA and whatever anti-prostitution agency to break down my door. Otherwise it seems they already would have, as although I'm no gambler, my slashdot journals often feature potsmoking and hookers. Maybe I should add some blackjack.
However, adultery is NOT against the law. Do you want your wife to find the email you sent to your girlfriend because Sweden seems to be as anti-freedom as America?
(OT but related; why is it legal for me to fuck my congressman's wife, but illegal for me to pay her for it?)
Re:Someone please remind me... (Score:5, Insightful)
Re: (Score:2, Funny)
Re: (Score:2)
It is? [dsokids.com] Wow, learn something new every day. Am I cultured now, or do I need more yeast?
Re:Someone please remind me... (Score:4, Informative)
Linus is from Finland,/a>. [wikipedia.org]
Re:Someone please remind me... (Score:4, Informative)
True, but from the Swedish speaking minority of Finns.
Re: (Score:2)
Only on slashdot would a positive reference to Linus Torvalds be moderated tr- um, no, wait a minute... um, wait, where am I?
Re:Terrorists use encryption! (Score:4, Insightful)
As with any invasive authoritarian law, the government can always present anecdotal examples of it 'working', and so 'justify' the law, despite the fact that it's fundamentally a bad law, and probably not necessary.
Mod parent up. You are SO right. (Score:2)
I am quite confident that this _will_ be abused. There is an established history of laws like this being abused, such as that anti-terrorist law that was used
Re:Here is what you do (Score:4, Interesting)
Re:Here is what you do (Score:4, Interesting)
Re: (Score:3, Informative)
"RELAKKS Safe Surf enjoys the strongest legal protection possible under Swedish Law because of the service type (pre-paid flat-rate service). This means that RELAKKS do not have to keep an ordinary customer database (to be able handle transactions etc.). This is of importance if forced to hand over information.
If Swedish authorities can prove beyond reasonable doubt that they have a case for demanding subscription information from RELAKKS (they