// disclaimer: all my posts and diagrams copyright free...

a few ideas related to the context for crypto today.

there is certain irony in crypto that can be subverted and used to attack or surveil via stealth. reminds of the basic situation with most home electronics, blackboxed. such as IPcams that remain on 24/7/365 and have microphones accessible over the network, compromises built-in. thus to seek security is to extend the hidden security state and its illegal home invasion. solution: five dollar on/off switch, activate security device only when away, and upon return turn it off again, limiting the designed for boundlessness of political technology.

2-Port RJ45 Manual Network Switch
https://www.dropbox.com/s/lk7gg8zgf7wxjjj/RJ45switch.JPG

the diagrams here reference the following NSA document...

The Borders of Cryptology - NSA & Electronic Warfare*
http://cryptome.org/2013/09/nsa-cryptology-borders.pdf

diagrams created with the excellent software tool yEd...

yEd - Graph Editor - yWorks  (freeware)
http://www.yworks.com/en/products_yed_about.html

the question of crypto in a complex environment where it has both offensive and defensive functioning, relating to weak and strong crypto and security ratings

crypto   (protection & exploitation)
https://www.dropbox.com/s/d7jrpilz35dvk4k/graph1v1.gif

the paradoxical utility and purpose of compromised crypto that has both strong and weak, secure and insecure characteristics in a complex environment

dual-use multilevel crypto
https://www.dropbox.com/s/ndwlu9lqf4yvhy9/graph2v1.gif

the role of installation and usage errors as related to security and exploits, inherent in complicated or high-literacy approaches

crypto implementation flaw
https://www.dropbox.com/s/bjofccwrun7lok1/graph3v1.gif

this is the direct reference and extension of the NSA diagram above. cryptanalysis was included, Technical Surveillance Countermeasures (TSCM), though likely other domains are missing or perhaps in relational error.  improvements or corrections appreciated...

Electromagnetic Borders of Cryptology
https://www.dropbox.com/s/tp7dbqjbmpscv0h/diagram4v1.gif

this is my estimation of the situation today, based on the above technosocial structure. it does not include many aspects and is limited by my lack of awareness and understanding, though makes an attempt at an integrated view of the larger dynamics involved...

Context for computer Crypto today
https://www.dropbox.com/s/jn73d4d9b5ksz8u/context5v1.gif


additional diagrams will follow, surveying aspects of this same territory...

---
Grant Hart - You're the Reflection of the Moon On the Water
http://www.youtube.com/watch?v=NTH4Zu8gleA