Unsubscribe me please

lynda.harlos at sympatico.ca lynda.harlos at sympatico.ca
Wed Aug 24 18:44:06 CEST 2016


I have contacted you several times to unsubscribe me please.  

 
 
   
Lynda Harlos 
Home based travel agent
Orion Travelinx 
Home office: 905-433-4267 
Text: 905-723-9210
www.facebook.com/TravelAgent.LyndaHarlos 
 
Referrals are the best compliment! 
Any price/s quoted not guaranteed until payment is made 
To unsubscribe please reply with unsubscribe in subject line
-------Original Message-------
 
From: martin
Date: 8/24/2016 12:32:12 PM
To: gnupg-users at gnupg.org
Subject: Re: Attacks on encrypted communicxatiopn rising in Europe
 
On 24/08/16 15:37, Robert J. Hansen wrote:
> I find the current state of detente to be pretty good, actually.  We're
> allowed to design the best systems we can, and governments are allowed
> to discover where we're not as clever as we think we are.  If there's a
> flaw in Tor and the FBI uses it to pierce anonymity and go after a bad
> guy, I can get behind that.  Way to go, FBI, you did it right, now
> please hold on while we figure out how you did this and write a patch to
> keep you from doing it again.
>
> I guess you could say my preferred solution to the crypto wars is to
> encourage an ongoing escalating crypto arms race.  It's crazy, but it
> seems to work.
 
For my €0.02 I think the above is mostly valid bar 2 small details:
 
1. Seldom we do find the FBI breaking security of anonymity tools. Only
if a high profile case shows up or someone leaks it. I think it is even
more rare for the FBI to outright disclose the vulnerability they used
so it can be patched. I don't even know if the other 3 letter agencies
do it.
 
2. Crypto arms race also implies stock piling vulnerabilities -
something Bruce Schneier is very vocal about [1][2]. I think the answer
here is to find a balance of some sort - i.e. keep vulnerabilities in
rare cases for short periods of time and then disclose and patch them.
However for that to work we need to trust the govt. to do the right
thing. Which I think is pretty much the core issue that started this
discussion.
 
Regards,
Martin
 
[1] Hacking Team, Computer Vulnerabilities, and the NSA -
https://www.schneier.com/blog/archives/2015/09/hacking_team_co.html
[2] Disclosing vs. Hoarding Vulnerabilities -
https://www.schneier.com/blog/archives/2014/05/disclosing_vs_h.html
 
 
____________________________________________________________
 
_______________________________________________
Gnupg-users mailing list
Gnupg-users at gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
 
 
-------------- next part --------------
An HTML attachment was scrubbed...
URL: </pipermail/attachments/20160824/b5b38313/attachment.html>


More information about the Gnupg-users mailing list