Donate for the Cryptome archive of files from June 1996 to the present


25 May 2015.

Part 3: http://cryptome.org/2015/05/what-should-gchq-do-3.htm

25 May 2015

What should GCHQ do? Part 2

Part 1: http://cryptome.org/2015/05/what-should-gchq-do.htm


From: "t byfield" <tbyfield[at]panix.com>
To: nettime-l[at]kein.org
Date: Sun, 24 May 2015 22:09:00 -0400
Subject: Re: <nettime> What should GCHQ do?

On 24 May 2015, at 7:09, William Waites wrote:

And so we have arrived at the economic problem. The business model of advertising has the same basic requirements as mass surveillance. Thwarting one by decentralisation and ensuring confidentiality of communications means thwarting the other. Improving safety and security by encouraging pervasive encryption means finding a new economic model for the Internet that does not depend on surveillance, that transcends the Web2.0 model of capturing users in silos. Surely this too can be a fruitful direction for research.

The ethos of our time is something like *I can therefore I will.* If something technically possible, it becomes imperative to do it. It's not an individual, philosophical imperative, something that you or I 'must' do -- that wouldn't really matter. It's a systemic, probabilistic imperative, something that someone else will end up doing sooner or later -- which matters very much. If something is possible, it seems inevitable. 'Technology' is the field where this dialectic plays out: whatever gets drawn into those dialectics becomes 'technology.' I think this helps to explain why our time is dominated by engineering and law (note: not 'business' or 'finance'), two disparate professions that are united by one strange feature: both are organized around limit cases. They operate through ultraist logic, extrapolating everything to its logical extreme and proceeding on that basis.

Normally I don't go in for oracular bluster like that, but when it comes to cryptography I've learned to make an exception. The alternative is to trust the mathematicians. That's no exaggeration: one of the rallying cries of the crypto crowd is 'trust the math.' I don't, because math doesn't exist in the abstract. Its relationship to engineering is obvious: engineers implement math, they make it real, make it happen. Its relationship to law is less obvious. I don't mean ITAR, Wassenaar, or any other mechanism by which states would standardize or regulate cryptography. Instead, I mean the kinds of individual and collective sovereignty that cryptography enables through various implementations. The Cypherpunks understood this potential in their own way ('crypto anarchy'), and the Bitcoin/altcoin advocates understand it in other ways -- hence all the experimentation and excitement about things like side chains.

Hard crypto everywhere all the time has become one of those internet pietisms that's hard to challenge. First of all, anyone who does so ends up with some really troubling bedfellows (e.g., the NSA). But even if we ignore that kind of implication (i.e., ultraist extrapolation), we quickly come to basic, practical questions: If you want anything less than absolute crypto, where and how would you draw the lines? For example, the lines between what's permitted and what's forbidden, or what's practically possible or impossible, or for how long (e.g., key length vs 'Moore's Law' and misc innovations).

I'm skeptical about crypto absolutism because one of its first effects would be, in effect, to *privatize* everything. 'Public' would be reduced to whatever was cracked or leaked, as if Wikileaks and Snowden were the norm rather than the harrowing exception. And that would apply not just to social or communicative records but also -- as anyone who's lost a key or a password knows -- to one's own records. And isolated cases, which now seem almost like thought experiments -- questions about whether the US's Fifth Amendment, against being compelled to provide witness against oneself includes passwords, for example -- would become near-daily considerations.

Discussions of cryptography *should* involved questions like this, but they don't because no one has an incentive to discuss them. Opponents of crypto are happy mongering the ~four horsemen (terrorists, organized criminals, money launderers, and c-pornographers, more or less), and too many crypto advocates are absorbed in exotic last-mile opsec projects. Recently, I read a casual remark that Baudrillard is cited more often in 'critical accounting' than he was in the humanities. I doubt that's true, and the field of critical accounting is completely new to me, but it sounds like it could be promising -- as a part of a broader challenge to the naive positivism of [text missing]

I don't know the solution to this all, and I don't know where bright lines should be drawn. But I do think that the growing 'moral' push toward secure communications is troubling, and that preserving 'insecure' communications channels as a legitimate choice is vital.

Cheers,

T


Date: Sun, 24 May 2015 19:39:49 -0700
From: morlockelloi[at]yahoo.com
To: nettime-l[at]kein.org
Subject: Re: <nettime> What should GCHQ do?

There is a fine point here which is almost always missed, but from which most of these conclusions come from.

It is about the concept that 'crypto' is created by some small set of Illuminati, it needs to be standardized, and the rest of the world must trust them. These 'crypto wars' are then waged between the mentioned Illuminati and various evil agencies that would like take away the tools, bestowed by Illuminati upon the unwashed.

The concept works great both for the Illuminati and evil agencies - both do everything they can to maintain it.

Illuminati get livelihood: denigrating terms like "home brew crypto" are deeply entrenched and help maintain the guild exclusivity.

Evil agencies get their job made easy - it is trivial to subvert several standards or rubberhose few dozen experts into submission. Mass surveillance is only possible when there is a small number of crypto technologies.

This is all total bs.

While crypto is not the simplest technology in the world, it is far from being rocket science in practical terms. If everyone that did some scripting in any language would construct their own custom terribly weak cipher (ROT-14, ROT-15, etc), and use it only between themselves and their personal correspondents, totally incompatible with ways that "standard" web sites and VPNs do crypto, it would become too expensive, for any evil entity, to break millions of terribly weak ciphers. There is nothing "standard" about your circle of correspondents. There is no need that everyone in the world can participate in your crypto technology.

Back to the point: you don't need absolute crypto. You don't need to trust anyone. Scramble your communications in some custom way that will take evil agency's analyst 10 minutes to break: they can't afford it. And if they target you, you are f*cked anyway, no matter what you use.