Content-Type: text/plain; charset=ISO-8859-1
On Fri, Aug 3, 2012 at 6:45 PM, Patrick Shirkey
[ .... ]
Patrick, you missed the key point that Fons made:
> > Image for a second that the USA government would know a method
Do you understand the scope of this risk? Do you understand how much
sensitive data is exchanged even just within the US government using
encryption based on factoring primes? Do you seriously believe that even
the US government would expose so much of its own communications, not to
mention that of corporations that prop the country up, just in order to be
able to decrypt *other* organizations' and people's communications?
and remember that governments actually don't have the largest incentive to
solve this particular math puzzle - they derive no income from the
existence or absence of encryption, only some leverage. criminal
organizations, on the other hand, have both the money and the incentive,
and if it was even imaginable that someone has solved prime factoring, then
i'd have to put money on it coming from such an organization rather than a
whether or not you want to be more or less paranoid about that possibility
i leave for you to decide.
this is paranoia beyond belief. the release of PGP by phil zimmerman
basically handed anyone around the world the ability to encrypt their
communication in a way that (at that time, without doubt) it could not be
decrypted. AFAIK, phil is still with us (despite certainly having had some,
ahem, interesting interactions with the US government after they classified
his work as a weapon). what zimmerman did is at least as problematic for
any government as the discovery of a prime factoring technique. the damage
to existing encryption systems would be total and instant once such a
technique was published. we already know that once it was published it
would never vanish from the net. killing the publisher/researcher would
accomplish precisely nothing.
Content-Type: text/html; charset=ISO-8859-1
On Fri, Aug 3, 2012 at 6:45 PM, Patrick =
Shirkey <firstname.lastname@example.org> wrote:
[ .... ]Patrick, you missed the key point that Fons made:=A0
The threat of death is quite a powerful motivator to keep things quie=
that front. =A0You gonna be the one who releases "that" algorithm=
?this is paranoia beyond belief. the release of P=
GP by phil zimmerman basically handed anyone around the world the ability t=
o encrypt their communication in a way that (at that time, without doubt) i=
t could not be decrypted. AFAIK, phil is still with us (despite certainly h=
aving had some, ahem, interesting interactions with the US government after=
they classified his work as a weapon). what zimmerman did is at least as p=
roblematic for any government as the discovery of a prime factoring techniq=
ue. the damage to existing encryption systems would be total and instant on=
ce such a technique was published. we already know that once it was publish=
ed it would never vanish from the net. killing the publisher/researcher wou=
ld accomplish precisely nothing.
> In either case the damage would be on scale that even good old
A CIA cutout created to allow the US to justify perpetual war?
> Keeping such a thing secret for any time would be the most stupid
Of coure not. The governments of this world are run by nice people wh=
only want whats best for all of us right?
> What would happen if someone finds such a method and has any
It's been known in some communities for a while. Nothing has chan=
far. Apparently the status quo is quite acceptable.
>> We are all exposed on the internet ;-)
My company hasn't done bad from Linux over the past 14 years. Now=
decided to step up the pace and generate some real income. You're welco=
to join me for the ride but I'll leave that decision up to you.
If you continue to feel threatened by the possibility then you're just<=
shooting yourself in the foot which is coincidentally one your your strong<=
points so I am not surprised by this statement or your desire to run me
out of town as you have done it before to other people who only wanted to
be useful too.
Boost Hardware Ltd
Linux-audio-user mailing list