1995-01-18 - Threats in real life - what are we worried about?

Header Data

From: Matt Blaze <mab@research.att.com>
To: cypherpunks@toad.com
Message Hash: cd8dc0927709b2e06dc27f7c7e36242573437b4b14bcde0e09ffdf224698b9b0
Message ID: <9501182129.AA18239@merckx.info.att.com>
Reply To: N/A
UTC Datetime: 1995-01-18 21:27:32 UTC
Raw Date: Wed, 18 Jan 95 13:27:32 PST

Raw message

From: Matt Blaze <mab@research.att.com>
Date: Wed, 18 Jan 95 13:27:32 PST
To: cypherpunks@toad.com
Subject: Threats in real life - what are we worried about?
Message-ID: <9501182129.AA18239@merckx.info.att.com>
MIME-Version: 1.0
Content-Type: text/plain


Tim May writes:
> TEMPEST has very little to do with Cypherpunks goals, actually. First,
> buying such a gadget, tweaking it, exploring capabilities, etc., would
> lead to what? The ability to park a van in front of someone's house
> and--maybe--monitor their screens? We already know this is possible.
> (You all knew that, didn't you?)

I disagree.  "TEMPEST" risks and countermeasures are but one entry on
a long list of subjects in which our ignorance (and that of the
civilian security community in general) may well come back to bite us.
Granted, this is the "cypherpunks" list, not the "securitypunks" list,
but it behooves anybody interested in developing strong mechanisms to
accomplish some security objective to be at least acquainted with how
those mechanisms fit in the larger picture.

One of the most dangerous aspects of cryptology (more dangerous,
perhaps, than fact that there are almost no solid theorems that tell us
how secure practical ciphers really are) is that you can measure it.
It's all too tempting to misuse an estimate for the cryptographic work
factor for some cipher as if it were some kind of overall security
metric for the systems in which it is deployed.  In real life, there
are lots of ways to violate system security, including cryptanalysis,
protocol attacks, Trojan horses, viruses, electromagnetic monitoring,
physical compromise, rubber hose cryptanalysis, OS bug exploitation,
application bug exploitation, hardware bug exploitation, user error
exploitation, physical monitoring, social engineering, court orders,
dumpster diving, and so on and so on.  Most of us on the list like to
think about cryptography and cryptographic protocols, and that's fine,
but it isn't the same as thinking about building secure systems that
are strong enough to withstand attackers who aren't willing to
restrict themselves to a strictly cryptographic threat model.

Unfortunately, the world outside the cypherpunks list isn't much
better off than we are in understanding these "informal", but all too
real, threats.  Thinking about some of them would, I think, go a long
way toward contributing to "Cypherpunk goals" as I understand them.
(Practical TEMPEST shielding is one such problem.  Another good one is
the almost completely ignored problem of storing secret keys on
networked computers.  Still another is the problem of using security
software remotely with limited local computation.  There are lots
more.)

That said, no one can force these discussions to happen, and no one,
much less me, has a right to complain that everyone else is talking
about the "wrong stuff".  So let me raise a question:
	
	Given existing crypto tools (PGP, etc), what are the top ten
	practical attacks against the privacy of stored data and
	electronic mail?  Who are the bad guys? What tools do we need
	to limit these threats?

I'll post my own thoughts later.

-matt





Thread