Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

How about the argument that although browser crypto won't render your communications reliably secure, widespread adoption could make it significantly harder to transparently implement mass surveillance?

I'm not sure if this argument is actually flawed, or just anathema to grown up cryptographers who prefer hard maths to wishy washy politics/economics?



Please, cite any gain that gives over TSL.

And if you plan to implement it over unencrypted connections, no, nobody will notice if the NSA does mass interception of those. There is no way to notice it.


> Please, cite any gain that gives over TSL.

Over TLS? The gain would be that the server doesn't have to see the plaintext. Or at least in order to see a lot of people's plaintext, it will have to get away with sending bad crypto code to a lot of people, some of whom are likely to notice.

> if you plan to implement it over unencrypted connections

I'm not particularly planning to do anything, but if I was I imagine I would be doing it over TLS.


> ... in order to see a lot of people's plaintext, it will have to get away with sending bad crypto code to a lot of people, some of whom are likely to notice.

I would say that the overlap between the people that are likely to notice (or, for the matter, that are likely to read the reports from those who notice) and the people that benefit the most from transparent, client-side crypto is close to negligible.


The NSA is routinely MITMing connections. How will browser side crypto help if they get to decide what code your browser runs?


The NSA is routinely intruding on desktop installs. How will client side crypto help if they get to patch binaries on target computers?


It's harder to intrude on desktop installs. Any anti-NSA strategy should be predicated on a cost basis.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: