GET OFF THE DIME: PGP 5.5: Attitude

Attila T. Hun attila at hun.org
Sun Oct 12 21:08:52 PDT 1997



-----BEGIN PGP SIGNED MESSAGE-----

    There is one all important consideration in this debate:
 
        would you rather have PGP, Inc. with its preeminent 
        stature in the defense of freedom, freeware, and
        privacy as well as an established, TRUSTED product 
        defining THE system which meets the need of the 
        free world business, but is not selling out to 
        GAK or CAK? 

        or, would you rather see IBM, HP, TIS and others with 
        their GAK products and potentially even backdoors?
        are any of these vendors even planning to give us 
        source code so we might have a warm and fuzzy feeling
        until someone blows a hole in it 10 years from now?

        or, how about Bigfoot from the jungles of Redmond? 

        PGP is the *only* small business with a name for
        the corporate MIS types.

        the answer is simple; stop arguing, squat, and move.

    When I initially composed this message it read:

        now, if the idealists, and the opinionated pragmatists
        would actually reflect on exactly what Jon Callas said,
        starting with Locke, instead of what they "think" he
        said, they might understand the philosophy for data
        storage and recovery which PGP is proposing versus GAK
        or CAK which PGP is not proposing.

        the more vituperative among us can be dismissed out
        of hand as the issue is less of personal privacy than
        it is one of reasonable property protection, 
        documentation, and defensible security provisions.

    Jon Callas generally stated the problems adequately, and the 
    solutions or conventions, in the running duels; unfortunately
    Jon is on the wrong side in an anarchic forum: as the bear;
    Jon's protagonists are the dogs, and we all know the results of
    the bear pit. truth was not a problem per se, just reason.

    as I think I made clear in my original FOCUS presentation, GAK 
    (or CAK) must be dismissed out of hand. The issue reduces to: by
    what means is general responsibility accomplished? most ignored
    my premise, the few attacked for the same reason they always
    attack: crypto-anarchy, take-no-prisoners, or the only good
    JAKer [sic -freudian] is a dead one.

    historically, all of the elements of multi-key encryption
    with separate keys for signing, transmitting, and archiving
    have been available options with scripts or program wrappers 
    since PGP burst on the freeware zone in its present incarnation.

    Meanwhile, the battles raged on with the defiant pragmatism
    of Adam Back balanced by Bill Gieger's careful affirmation of
    my premises in my prior FOCUS message response to Jon Callas: 
    there is nothing in PGP 5.5 which can not be done with scripts
    and PGP 2.6. In fact, I stated my policy: session key and
    storage key. I had not implemented a separate signature key,
    but will be limiting my current public key to a signature key;
    and, creating a new encryption key. a good point, and well 
    taken.

    other than possibly Bill Gieger, not one of the cypherpunk
    idealists, nor rationalists, in this thread has ever been 
    required to face the realities of an employer.  if they had been
    or are employers, they would understand all the perqs they
    presume are freebies or rights, are mere privileges --including
    personal freedoms not in the interest of the employer during
    company work periods, on company premises, or representing the
    company outside the facilities.

    I empathize with Jon Callas' complaint about the blues, and his 
    plaintive "wanna trade" comment to Adam, but the blues come
    with the turf; likewise, the position of the buck stops here 
    gives the idealists another nail for the coffin they have
    conjured for Jon and PGP "selling out to the enemy".

    the occupation of employer can be one of the least satisfying 
    ways of living; department heads are not far behind --it's all
    about personal (not personnel) relations and diaper changing.
    as a scientist and developer, I never really enjoyed the 
    boss tasks; more than once, I closed out when my function
    deteriorated to leader of the nursery.

    If PGP, hopefully with support, cooperation, and assistance from
    Cypherpunks, can offer workable and tenable solutions, which can
    satisfy the real needs of business for defensible audit trails,
    and which offer basically the same protection as current paper
    storage trails, PGP may be able to deploy their system as the 
    *de facto standard* before any of the other systems take root.

    If PGP does not provide workable solutions for business, from
    simple PGP 2.6 to the SNMP managed "enforcer" and a simplified
    "frying the egg" means of establishing filing systems which meet 
    both the overall needs of the business and the compartmentalized
    needs of restricted area and secure operations, some one else 
    will --and corporate {a,im}morality applies their myopic vision
    only to the bottom line --GAK.

    for instance, if PGP can deliver *encryption management systems*
    which can provide control of the entire spectrum of corporate
    needs, perceived or real, such as:

      * no key escrow or management key (preferred, obviously)
      * session key with storage key (incl. some multi-key)
            group, department, corporate, etc.
      * multiple public key encryption (foolish for external)
      * limited CAK (certainly not desirable)
      * general CAK (an unreasonable sin)
      * GAK (the unpardonable sin)

    they have given business the *choice* of system management. It 
    is important to keep in mind that the basic PGP product will
    do any of these formats as it currently stands with external
    controls. different business models have different levels of
    security requirements. hard core cases will buy in because they 
    understand GAK and their foolish corporate mentality has no
    concern for the individual --get it installed, and the troops
    will push to bring it back to the preferred model using company
    security, not employee privacy, as the argument.  

    better GAK with PGP than asking PGP to refuse to permit the use 
    of their product in a GAK/CAK environment. GAK and CAK have no 
    relationship to PGP --they are a corporate mindset and there is
    absolutely nothing PGP or cypherpunks can do about it --except
    educate the customers that there are far more secure methods of
    date recovery than hanging their shorts out in public for big
    brother to cut the clothesline.

    In other words, why should any cypherpunk, except our resident
    nihilistic anarchist, object if PGP's SNMP system provides
    industry with tools which can deploy the **less** objectionable
    control systems?  or even the objectionable ones?

    if PGP does not or is not willing to provide the systems, and in
    the absence of these tools from an alternative *trusted* source,
    we will see GAK, just plain unabridged GAK, the simplest means to
    control for the Corporate Operations Officer (COO), or some
    other equivalent abomination spreading across the land like the
    ominous black cloud roiling across the land from an oil refinery 
    fire.

    major corporations, most of them victims of many years of
    litigation, subpoenas, and judgements with their peers and 
    with the government will just cave in to GAK --it covers all the
    bases, albeit very insecurely, but that is the fire next year: 
    worry about tomorrow tomorrow.

    despite the general hue and cry of selling out to the enemy 
    which arose in cypherpunks with the PGP defense department 
    contract, as long as PGP 5.5 and its SNMP enforcer are
    implemented as Jon Callas claims, that contract may be the best
    government friend this community has today. PGP will be placing 
    a product which covers the full spectrum of "privacy invasion"
    within the forces of evil.

    there are two ways to define a product in a market of this 
    magnitude, a market which matches David and Goliath. PGP, by
    virtue of its freeware status is the standard the world over;
    by selling to the enemy, PGP will have proven it can be all
    things to all people --use what you need from it.

    Bubba/Goliath has been rumbling and jousting, but his own parts
    are buying the product that works.  a very critical point.

    secondly, by market penetration, F{reeh,uck} is left standing in
    the middle of street, pulling his short arm.

    but if David fails to hurl that stone, Bubba will hand us GAK.

    the real issue in privacy is where does privacy begin, and 
    where do corporate rights and responsibilities start, and do 
    private rights end?

    defined classically: on company premises there is little if any 
    legally enforceable individual privacy regarding communications. 

    in NY brokerages, it is well known that brokers have their usual
    company computers, and a laptop with a modem, often wireless.
    if they are overly concerned there is always ssh --not ppp.
    even then, they are on company premises with company power and
    lights....

    however, this discussion is intended to focus on business 
    communications, not their ethics, or lack thereof and not 
    personal communications which should be inviolate, and performed
    away from work.

    the corporate paper trace works two ways --proving you did what
    you said you would, or would not do --or as I put it to 
    subordinates in a hatchetman cleanup: CYA on the sins of
    commission and omission. 

    proper maintenance of paperwork, in an auditable form, is not 
    just a sieve to collect fodder for big brother; you can, and
    should protect (or hang, of course) yourself with paperwork.
    Obviously, if you are engaged in questionable, unethical, or 
    illegal practices, saved paper is dangerous; I can not imagine
    Bill Gate$ archiving notes or email <g?>.

    the real goal is "safe" record keeping, just like paper copies; 
    
    no-one likes employer snooping (or employee snooping). 
    unfortunately, the long running trust and honesty of years
    ago is not justifiable today, so there are rules.

    as for government snooping, give 'em a freeway salute.

    whether it is storage keys for Adam, or session keys, whatever,
    the issue is the same: anything you do to abridge the simplicity
    of the key pair is a potential privacy problem --as well as an 
    additional opportunity for breach of security. 

    the paper equivalent of one encryption key which can be lost is
    placing the paper copy in an access proof, unpickable safe and
    losing the key --and the safe self-destructs when tampered.
    would these same people place their only paper copy in this
    safe? (probably, since "losing" your key is generally 
    described only as your bad karma).
    
    master keys are foolish and I dismiss GAK or CAK out of hand.
    encryption and filing policies which include a session key, a
    department key, or something which gives some sense of
    information security is preferable to the master key.  the more
    diversity, the more security.

    I also believe it is preferable to encode the message twice: 
    once to the recipient(s), the second with the company provided
    session key, whatever level. the logic is that using a separate
    encoding pass (which obviously must be essentially simultaneous)
    is less risky and a little less tacky than sending a message
    with dual keys --small point, but a consideration. it would 
    not be difficult to rework a public key pair engine to dump to
    company records at the same time the communication record is
    released.

    as a comparison to the abuses which inherently will evolve with 
    GAK:  prisoners, convicted felons:  murderers, rapists,
    pedophiles, etc. have more rights than "free" men (even though
    felons' civil rights are stripped for life at the time of
    conviction).

    censors for the incarcerated are only allowed to check incoming
    mail for money, drugs, weapons, eg: contraband; they are not
    permitted to slit the outgoing envelope. in addition to the 
    regulations, the intelligence level of a hack would not
    understand the shading of allusions in plain text! even Dapper
    Joe Gotti, the Teflon Don, is entitled to the privacy of his
    personal correspondence unless there is a show cause order.

    to be both honest and pragmatic, certainly the privacy rights of
    some of some problem prisoners are violated.

    theoretically, GAK and CAK would be acceptable in a perfect 
    world, and if the federal government and the rest of the
    information snoops would unfailingly adhere to Constitutional
    "commandments." human nature has proven more than once, and it 
    will prove it again, it is not likely everyone will be
    incorruptible. in fact, I will go so far as to say that 
    *everyone* has a price --even Tim May <g>.

    however, anybody who has eyes or ears knows, comprehends, and 
    accepts that all governments rule by power --even the United
    States; and, that the control of information is the power to
    control. today, it is even more accepted that governments are,
    at best, a necessary evil --and corrupt, paranoid, and nosy
    governments at that; one which will violate your rights if it
    is, or they think it might be, in their interests to do so.
    
    few do not know that our governments are rotten to the core on
    privacy issues; the US, even more than the other members of 
    Western society, has been abrogating, and will continue to
    perniciously abrogate, our rights.

    unfortunately, each centralization of the filing system permits
    the government, or lawyers litigating, a clearer path of access. 
    
    in reality, encrypted electronic records are significantly safer
    filing cabinets than those filled with paper, but they are still
    records maintained. paper filing cabinets are fast disappearing;
    records are either microfilmed, or converted to bits, or both. 
    Xerox, for instance, has a combination system which maintains an
    optical image and a scanned text digital image which can be
    processed with pattern recognition, etc.

    people say the damnedest things in email without thinking. 
    given the ubiquity of computers, data recovery advances, and
    governmental intentions, everyone, whether or not it is personal
    or business, needs to learn the virtue of compartmentalization;
    files need to be organized: separate the necessary documentation
    from the routine and sublime --purge the latter regularly from
    visible system. following this procedure is not illegal if it is
    a regular practice, and, even more importantly, it is not
    performed to obfuscate or impede an investigation, civil or
    criminal.

    fundamentally, the worst thing we can do is permit the government 
    to think they gained something by necessary business practice on 
    the way to their perverted goal of transparent crypto. there is 
    no question they will use their standard ploy that we have 
    already agreed to backup procedures for data storage safety 
    --so what is the difference if you permit us to maintain a key;
    remember, we're from the government, and we're here to help you.
    trust me-- yeah, right! 

    on the other hand, we should be encouraged by the decision of 
    the European commission to totally stiff the U.S. request for 
    them to comply with the F{reeh,uck} mandate; likewise, they 
    chastised the French. The difference in France v. the US is that
    if you do not ask the French government, they do not tell you: 
    "no". 

    If the European commission does follow through with their
    intentions, and I have no doubt they will as European
    politicians recognize both security and discreetness, they will
    be submitting EC legislation before the end of the year
    encouraging strong encryption both to facilitate commerce and to
    protect against the criminal elements; they fully realized the
    folly of expecting criminals not to use strong encryption even
    if it is illegal. firearms in the hands of criminals are also
    illegal. 

    either F{reeh,uck} and Bubba can get off their horses and sell
    the EC hardware and software, or they can lose it all.
    Interestingly. the software will probably be PGP --except the
    revenue will not come home to PRZ, let alone America. Great 
    trade policy, Bubba. where did you say you're from? Arkansas?

    the actions of the more pragmatic, and obviously privacy
    conscience, European leaders only paints a sharper contrast with
    the intentions of the U.S. government. 

    have no doubt, the U.S. government is no different than Lucifer
    who intended to remove from mankind any choice. the actions of
    the U.S. government since the Civil War have been an insidious
    assumption of centralized power, including unaccountable police,
    and a systematic plan of supposed emergencies to expand the
    control of the few at the expense of the many.

    when the smoke of the battle clears, if PGP is not its original
    pristine, highway salute to the powers that be "old self," any
    "concessions" in behalf of corporate responsibility will be
    judged on their appearance, not the effectiveness of the
    solution. Then the flaming idealists will sing and dance for
    blood, claiming PGP released the dogs of war, beginning the 
    inexorable dance to our doom.

    the disruptive class must be put aside (to argue among 
    themselves) and the rest of need to get down to work:

    we must educate the users, washed and unwashed alike, that 
    "doing business" is not necessarily cozying up to the devil;
    while simultaneously affirming that we can not and will not
    tolerate arrangements with any similarity to GAK, CAK and the
    four horsemen.

    on the other hand, if the government does not disassemble and 
    chastise Bill Gate$, I fear Bill's intentions far more than I do
    the federal government, starting with crash prone mediocrity and
    including Gate$' standard no source code policies-- "trust me".

    sure, Bill, I trust you; just come a little closer....

 --
 "When I die, please cast my ashes upon Bill Gates. 
     For once, let him clean up after me! " 
 ______________________________________________________________________
 "attila" 1024/C20B6905/23 D0 FA 7F 6A 8F 60 66 BC AF AE 56 98 C0 D7 B0 

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: latin1
Comment: No safety this side of the grave. Never was; never will be

iQCVAwUBNEGcK704kQrCC2kFAQGkvgP9GdIrtrxBBA/48TZ+VKFStV4pl687EfxH
fKinV1RNgTI33MoTXcxsy7nKRkX6b8PRk6/k33vTiWLwrUPrhFQPL0i49EIBZsfJ
FOTEdGEQE16DosImiFFCGp5TUlG8dx1C9OJeutaWV9D9lBf8zNBilpPUFpbnQdYn
b1Rd7f7ShIk=
=lMeS
-----END PGP SIGNATURE-----







More information about the cypherpunks-legacy mailing list