rfc9446.original | rfc9446.txt | |||
---|---|---|---|---|
Network Working Group S. Farrell | Independent Submission S. Farrell | |||
Internet-Draft Trinity College, Dublin | Request for Comments: 9446 Trinity College, Dublin | |||
Intended status: Informational F. Badii | Category: Informational F. Badii | |||
Expires: 22 December 2023 Digital Medusa | ISSN: 2070-1721 Digital Medusa | |||
B. Schneier | B. Schneier | |||
Harvard University | Harvard University | |||
S. M. Bellovin | S. M. Bellovin | |||
Columbia University | Columbia University | |||
20 June 2023 | July 2023 | |||
Reflections on Ten Years Past The Snowden Revelations | Reflections on Ten Years Past the Snowden Revelations | |||
draft-farrell-tenyearsafter-05 | ||||
Abstract | Abstract | |||
This memo contains the thoughts and recountings of events that | This memo contains the thoughts and recountings of events that | |||
transpired during and after the release of information about the NSA | transpired during and after the release of information about the | |||
by Edward Snowden in 2013. There are four perspectives: that of | United States National Security Agency (NSA) by Edward Snowden in | |||
someone who was involved with sifting through the information to | 2013. There are four perspectives: that of someone who was involved | |||
responsibly inform the public, that of a security area director of | with sifting through the information to responsibly inform the | |||
the IETF, that of a human rights expert, and that of a computer | public, that of a security area director of the IETF, that of a human | |||
science and law professor. The purpose of this memo is to provide | rights expert, and that of a computer science and affiliate law | |||
some historical perspective, while at the same time offering a view | professor. The purpose of this memo is to provide some historical | |||
as to what security and privacy challenges the technical community | perspective, while at the same time offering a view as to what | |||
should consider. | security and privacy challenges the technical community should | |||
consider. These essays do not represent a consensus view, but that | ||||
of the individual authors. | ||||
Status of This Memo | Status of This Memo | |||
This Internet-Draft is submitted in full conformance with the | This document is not an Internet Standards Track specification; it is | |||
provisions of BCP 78 and BCP 79. | published for informational purposes. | |||
Internet-Drafts are working documents of the Internet Engineering | ||||
Task Force (IETF). Note that other groups may also distribute | ||||
working documents as Internet-Drafts. The list of current Internet- | ||||
Drafts is at https://datatracker.ietf.org/drafts/current/. | ||||
Internet-Drafts are draft documents valid for a maximum of six months | This is a contribution to the RFC Series, independently of any other | |||
and may be updated, replaced, or obsoleted by other documents at any | RFC stream. The RFC Editor has chosen to publish this document at | |||
time. It is inappropriate to use Internet-Drafts as reference | its discretion and makes no statement about its value for | |||
material or to cite them other than as "work in progress." | implementation or deployment. Documents approved for publication by | |||
the RFC Editor are not candidates for any level of Internet Standard; | ||||
see Section 2 of RFC 7841. | ||||
This Internet-Draft will expire on 22 December 2023. | Information about the current status of this document, any errata, | |||
and how to provide feedback on it may be obtained at | ||||
https://www.rfc-editor.org/info/rfc9446. | ||||
Copyright Notice | Copyright Notice | |||
Copyright (c) 2023 IETF Trust and the persons identified as the | Copyright (c) 2023 IETF Trust and the persons identified as the | |||
document authors. All rights reserved. | document authors. All rights reserved. | |||
This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
Provisions Relating to IETF Documents (https://trustee.ietf.org/ | Provisions Relating to IETF Documents | |||
license-info) in effect on the date of publication of this document. | (https://trustee.ietf.org/license-info) in effect on the date of | |||
Please review these documents carefully, as they describe your rights | publication of this document. Please review these documents | |||
and restrictions with respect to this document. | carefully, as they describe your rights and restrictions with respect | |||
to this document. | ||||
Table of Contents | Table of Contents | |||
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 | 1. Introduction | |||
2. Bruce Schneier: Snowden Ten Years Later . . . . . . . . . . . 3 | 2. Bruce Schneier: Snowden Ten Years Later | |||
3. Stephen Farrell: IETF and Internet Technical community | 3. Stephen Farrell: IETF and Internet Technical Community Reaction | |||
reaction . . . . . . . . . . . . . . . . . . . . . . . . 10 | 4. Farzaneh Badii: Did Snowden's Revelations Help with Protecting | |||
4. Farzaneh Badii: Did Snowden's revelations help with protecting | Human Rights on the Internet? | |||
human rights on the Internet? . . . . . . . . . . . . . . 15 | ||||
5. Steven M. Bellovin: Governments and Cryptography: The Crypto | 5. Steven M. Bellovin: Governments and Cryptography: The Crypto | |||
Wars . . . . . . . . . . . . . . . . . . . . . . . . . . 19 | Wars | |||
5.1. Historical Background . . . . . . . . . . . . . . . . . . 19 | 5.1. Historical Background | |||
5.2. The Crypto Wars Begin . . . . . . . . . . . . . . . . . . 21 | 5.2. The Crypto Wars Begin | |||
5.3. The Battle is Joined . . . . . . . . . . . . . . . . . . 23 | 5.3. The Battle Is Joined | |||
5.4. The Hidden Battle . . . . . . . . . . . . . . . . . . . . 24 | 5.4. The Hidden Battle | |||
5.5. Whither the IETF? . . . . . . . . . . . . . . . . . . . . 26 | 5.5. Whither the IETF? | |||
6. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 27 | 6. Security Considerations | |||
7. Security Considerations . . . . . . . . . . . . . . . . . . . 28 | 7. IANA Considerations | |||
8. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 28 | 8. Informative References | |||
9. Informative References . . . . . . . . . . . . . . . . . . . 28 | Acknowledgments | |||
Appendix A. Changes from Earlier Versions . . . . . . . . . . . 35 | Authors' Addresses | |||
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 36 | ||||
1. Introduction | 1. Introduction | |||
On June 6th, 2013, an article appeared in _The Guardian_ [guard2013] | On June 6th, 2013, an article appeared in _The Guardian_ [Guard2013] | |||
that was the beginning of a series of what have come to be known as | that was the beginning of a series of what have come to be known as | |||
the Snowden Revelations, describing certain activities of the United | the Snowden revelations, describing certain activities of the United | |||
States National Security Agency (NSA). These activities included, | States National Security Agency (NSA). These activities included, | |||
amongst others; secret court orders; secret agreements for the | amongst others: secret court orders; secret agreements for the | |||
receipt of so-called "meta-information" that includes source, | receipt of so-called "meta-information" that includes source, | |||
destination, and timing of communications; and tapping of | destination, and timing of communications; and tapping of | |||
communications lines. The breathtaking scope of the operations | communications lines. The breathtaking scope of the operations | |||
shocked the Internet technical community that was reflected in a sea | shocked the Internet technical community and resulted in a sea change | |||
change within the IETF, IAB, and other standards organizations. | within the IETF, IAB, and other standards organizations. | |||
Now that some years have passed, it seems appropriate to reflect on | Now that some years have passed, it seems appropriate to reflect on | |||
that period of time, to consider what effect the community's actions | that period of time and to consider what effect the community's | |||
had, where security has improved, how the threat surface has evolved, | actions had, where security has improved, how the threat surface has | |||
what areas haven't improved, and where the community might invest | evolved, what areas haven't improved, and where the community might | |||
future efforts. | invest future efforts. | |||
Bruce Schneier begins this compendium of individual essays by | Bruce Schneier begins this compendium of individual essays by | |||
bringing us back to 2013, recalling how it was for him and others to | bringing us back to 2013, recalling how it was for him and others to | |||
report what was happening, and the mindset of those involved. Next, | report what was happening, and the mindset of those involved. Next, | |||
Stephen Farrell reviews the technical community's reactions and in | Stephen Farrell reviews the technical community's reactions and in | |||
particular the reactions of the IETF community, technical advances, | particular the reactions of the IETF community, technical advances, | |||
and where threats remain. Then Farzaneh Badii discusses the impact | and where threats remain. Then Farzaneh Badii discusses the impact | |||
of those advances – or lack thereof – on human rights. Finally | of those advances -- or lack thereof -- on human rights. Finally | |||
Steven M. Bellovin puts the Snowden revelations into an ever- | Steven M. Bellovin puts the Snowden revelations into an ever- | |||
evolving historical context of secrets and secret stealing that spans | evolving historical context of secrets and secret stealing that spans | |||
centuries, closing with some suggestions for IETF. | centuries, closing with some suggestions for IETF. | |||
Readers are invited to consider what impact we as a community have | Readers are invited to consider what impact we as a community have | |||
had, what challenges remain, and what positive contribution the | had, what challenges remain, and what positive contribution the | |||
technical community can and should make to address security and | technical community can and should make to address security and | |||
privacy of citizens of the world. | privacy of citizens of the world. | |||
-- Eliot Lear, Independent Submissions Editor for the RFC Series | -- Eliot Lear, Independent Submissions Editor for the RFC Series | |||
2. Bruce Schneier: Snowden Ten Years Later | 2. Bruce Schneier: Snowden Ten Years Later | |||
In 2013 and 2014, I wrote extensively about new revelations regarding | In 2013 and 2014, I wrote extensively about new revelations regarding | |||
NSA surveillance based on the documents provided by Edward Snowden. | NSA surveillance based on the documents provided by Edward Snowden. | |||
But I had a more personal involvement as well. | But I had a more personal involvement as well. | |||
I wrote the essay below in September 2013. The _New Yorker_ agreed | I wrote the essay below in September 2013. _The New Yorker_ agreed to | |||
to publish it, but the _Guardian_ asked me not to. It was scared of | publish it, but _The Guardian_ asked me not to. It was scared of UK | |||
UK law enforcement, and worried that this essay would reflect badly | law enforcement and worried that this essay would reflect badly on | |||
on it. And given that the UK police would raid its offices in July | it. And given that the UK police would raid its offices in July | |||
2014, it had legitimate cause to be worried. | 2014, it had legitimate cause to be worried. | |||
Now, ten years later, I offer this as a time capsule of what those | Now, ten years later, I offer this as a time capsule of what those | |||
early months of Snowden were like. | early months of Snowden were like. | |||
********** | | It's a surreal experience, paging through hundreds of top-secret | |||
| NSA documents. You're peering into a forbidden world: strange, | ||||
It’s a surreal experience, paging through hundreds of top-secret NSA | | confusing, and fascinating all at the same time. | |||
documents. You’re peering into a forbidden world: strange, | | | |||
confusing, and fascinating all at the same time. | | I had flown down to Rio de Janeiro in late August at the request | |||
| of Glenn Greenwald. He had been working on the Edward Snowden | ||||
I had flown down to Rio de Janeiro in late August at the request of | | archive for a couple of months, and had a pile of more technical | |||
Glenn Greenwald. He had been working on the Edward Snowden archive | | documents that he wanted help interpreting. According to | |||
for a couple of months, and had a pile of more technical documents | | Greenwald, Snowden also thought that bringing me down was a good | |||
that he wanted help interpreting. According to Greenwald, Snowden | | idea. | |||
also thought that bringing me down was a good idea. | | | |||
| It made sense. I didn't know either of them, but I have been | ||||
It made sense. I didn't know either of them, but I have been writing | | writing about cryptography, security, and privacy for decades. I | |||
about cryptography, security, and privacy for decades. I could | | could decipher some of the technical language that Greenwald had | |||
decipher some of the technical language that Greenwald had difficulty | | difficulty with, and understand the context and importance of | |||
with, and understand the context and importance of various document. | | various document. And I have long been publicly critical of the | |||
And I have long been publicly critical of the NSA’s eavesdropping | | NSA's eavesdropping capabilities. My knowledge and expertise | |||
capabilities. My knowledge and expertise could help figure out which | | could help figure out which stories needed to be reported. | |||
stories needed to be reported. | | | |||
| I thought about it a lot before agreeing. This was before David | ||||
I thought about it a lot before agreeing. This was before David | | Miranda, Greenwald's partner, was detained at Heathrow airport by | |||
Miranda, Greenwald’s partner, was detained at Heathrow airport by the | | the UK authorities; but even without that, I knew there was a | |||
UK authorities; but even without that, I knew there was a risk. I | | risk. I fly a lot -- a quarter of a million miles per year -- and | |||
fly a lot—a quarter of a million miles per year—and being put on a | | being put on a TSA list, or being detained at the US border and | |||
TSA list, or being detained at the US border and having my | | having my electronics confiscated, would be a major problem. So | |||
electronics confiscated, would be a major problem. So would the FBI | | would the FBI breaking into my home and seizing my personal | |||
breaking into my home and seizing my personal electronics. But in | | electronics. But in the end, that made me more determined to do | |||
the end, that made me more determined to do it. | | it. | |||
| | ||||
I did spend some time on the phone with the attorneys recommended to | | I did spend some time on the phone with the attorneys recommended | |||
me by the ACLU and the EFF. And I talked about it with my partner, | | to me by the ACLU and the EFF. And I talked about it with my | |||
especially when Miranda was detained three days before my departure. | | partner, especially when Miranda was detained three days before my | |||
Both Greenwald and his employer, the _Guardian_, are careful about | | departure. Both Greenwald and his employer, _The Guardian_, are | |||
whom they show the documents to. They publish only those portions | | careful about whom they show the documents to. They publish only | |||
essential to getting the story out. It was important to them that I | | those portions essential to getting the story out. It was | |||
be a co-author, not a source. I didn’t follow the legal reasoning, | | important to them that I be a co-author, not a source. I didn't | |||
but the point is that the _Guardian_ doesn’t want to leak the | | follow the legal reasoning, but the point is that _The Guardian_ | |||
documents to random people. It will, however, write stories in the | | doesn't want to leak the documents to random people. It will, | |||
public interest, and I would be allowed to review the documents as | | however, write stories in the public interest, and I would be | |||
part of that process. So after a Skype conversation with someone at | | allowed to review the documents as part of that process. So after | |||
the _Guardian_, I signed a letter of engagement. | | a Skype conversation with someone at _The Guardian_, I signed a | |||
| letter of engagement. | ||||
And then I flew to Brazil. | | | |||
| And then I flew to Brazil. | ||||
I saw only a tiny slice of the documents, and most of what I saw was | | | |||
surprisingly banal. The concerns of the top-secret world are largely | | I saw only a tiny slice of the documents, and most of what I saw | |||
tactical: system upgrades, operational problems owing to weather, | | was surprisingly banal. The concerns of the top-secret world are | |||
delays because of work backlogs, and so on. I paged through weekly | | largely tactical: system upgrades, operational problems owing to | |||
reports, presentation slides from status meetings, and general | | weather, delays because of work backlogs, and so on. I paged | |||
briefings to educate visitors. Management is management, even inside | | through weekly reports, presentation slides from status meetings, | |||
the NSA Reading the documents, I felt as though I were sitting | | and general briefings to educate visitors. Management is | |||
through some of those endless meetings. | | management, even inside the NSA. Reading the documents, I felt as | |||
| though I were sitting through some of those endless meetings. | ||||
The meeting presenters try to spice things up. Presentations | | | |||
regularly include intelligence success stories. There were | | The meeting presenters try to spice things up. Presentations | |||
details—what had been found, and how, and where it helped—and | | regularly include intelligence success stories. There were | |||
sometimes there were attaboys from “customers” who used the | | details -- what had been found, and how, and where it helped -- | |||
intelligence. I’m sure these are intended to remind NSA employees | | and sometimes there were attaboys from "customers" who used the | |||
that they’re doing good. It definitely had an effect on me. Those | | intelligence. I'm sure these are intended to remind NSA employees | |||
were all things I want the NSA to be doing. | | that they're doing good. It definitely had an effect on me. | |||
| Those were all things I want the NSA to be doing. | ||||
There were so many code names. Everything has one: every program, | | | |||
every piece of equipment, every piece of software. Sometimes code | | There were so many code names. Everything has one: every program, | |||
names had their own code names. The biggest secrets seem to be the | | every piece of equipment, every piece of software. Sometimes code | |||
underlying real-world information: which particular company | | names had their own code names. The biggest secrets seem to be | |||
MONEYROCKET is; what software vulnerability | | the underlying real-world information: which particular company | |||
EGOTISTICALGIRAFFE—really, I am not making that one up—is; how | | MONEYROCKET is; what software vulnerability EGOTISTICALGIRAFFE -- | |||
TURBINE works. Those secrets collectively have a code name—ECI, for | | really, I am not making that one up -- is; how TURBINE works. | |||
exceptionally compartmented information—and almost never appear in | | Those secrets collectively have a code name -- ECI, for | |||
the documents. Chatting with Snowden on an encrypted IM connection, | | exceptionally compartmented information -- and almost never appear | |||
I joked that the NSA cafeteria menu probably has code names for menu | | in the documents. Chatting with Snowden on an encrypted IM | |||
items. His response: “Trust me when I say you have no idea.” | | connection, I joked that the NSA cafeteria menu probably has code | |||
| names for menu items. His response: "Trust me when I say you have | ||||
Those code names all come with logos, most of them amateurish and a | | no idea." | |||
lot of them dumb. Note to the NSA: take some of that more than ten- | | | |||
billion-dollar annual budget and hire yourself a design firm. | | Those code names all come with logos, most of them amateurish and | |||
Really; it’ll pay off in morale. | | a lot of them dumb. Note to the NSA: take some of that more than | |||
| ten-billion-dollar annual budget and hire yourself a design firm. | ||||
Once in a while, though, I would see something that made me stop, | | Really; it'll pay off in morale. | |||
stand up, and pace around in circles. It wasn’t that what I read was | | | |||
particularly exciting, or important. It was just that it was | | Once in a while, though, I would see something that made me stop, | |||
startling. It changed—ever so slightly—how I thought about the | | stand up, and pace around in circles. It wasn't that what I read | |||
world. | | was particularly exciting, or important. It was just that it was | |||
| startling. It changed -- ever so slightly -- how I thought about | ||||
Greenwald said that that reaction was normal when people started | | the world. | |||
reading through the documents. | | | |||
| Greenwald said that that reaction was normal when people started | ||||
Intelligence professionals talk about how disorienting it is living | | reading through the documents. | |||
on the inside. You read so much classified information about the | | | |||
world’s geopolitical events that you start seeing the world | | Intelligence professionals talk about how disorienting it is | |||
differently. You become convinced that only the insiders know what’s | | living on the inside. You read so much classified information | |||
really going on, because the news media is so often wrong. Your | | about the world's geopolitical events that you start seeing the | |||
family is ignorant. Your friends are ignorant. The world is | | world differently. You become convinced that only the insiders | |||
ignorant. The only thing keeping you from ignorance is that constant | | know what's really going on, because the news media is so often | |||
stream of classified knowledge. It’s hard not to feel superior, not | | wrong. Your family is ignorant. Your friends are ignorant. The | |||
to say things like “If you only knew what we know” all the time. I | | world is ignorant. The only thing keeping you from ignorance is | |||
can understand how General Keith Alexander, the director of the NSA, | | that constant stream of classified knowledge. It's hard not to | |||
comes across as so supercilious; I only saw a minute fraction of that | | feel superior, not to say things like "If you only knew what we | |||
secret world, and I started feeling it. | | know" all the time. I can understand how General Keith Alexander, | |||
| the director of the NSA, comes across as so supercilious; I only | ||||
It turned out to be a terrible week to visit Greenwald, as he was | | saw a minute fraction of that secret world, and I started feeling | |||
still dealing with the fallout from Miranda’s detention. Two other | | it. | |||
journalists, one from the Nation and the other from the _Hindu_, were | | | |||
also in town working with him. A lot of my week involved Greenwald | | It turned out to be a terrible week to visit Greenwald, as he was | |||
rushing into my hotel room, giving me a thumb drive of new stuff to | | still dealing with the fallout from Miranda's detention. Two | |||
look through, and rushing out again. | | other journalists, one from _The Nation_ and the other from _The | |||
| Hindu_, were also in town working with him. A lot of my week | ||||
A technician from the _Guardian_ got a search capability working | | involved Greenwald rushing into my hotel room, giving me a thumb | |||
while I was there, and I spent some time with it. Question: when | | drive of new stuff to look through, and rushing out again. | |||
you’re given the capability to search through a database of NSA | | | |||
secrets, what’s the first thing you look for? Answer: your name. | | A technician from _The Guardian_ got a search capability working | |||
| while I was there, and I spent some time with it. Question: when | ||||
It wasn’t there. Neither were any of the algorithm names I knew, not | | you're given the capability to search through a database of NSA | |||
even algorithms I knew that the US government used. | | secrets, what's the first thing you look for? Answer: your name. | |||
| | ||||
I tried to talk to Greenwald about his own operational security. It | | It wasn't there. Neither were any of the algorithm names I knew, | |||
had been incredibly stupid for Miranda to be traveling with NSA | | not even algorithms I knew that the US government used. | |||
documents on the thumb drive. Transferring files electronically is | | | |||
what encryption is for. I told Greenwald that he and Laura Poitras | | I tried to talk to Greenwald about his own operational security. | |||
should be sending large encrypted files of dummy documents back and | | It had been incredibly stupid for Miranda to be traveling with NSA | |||
forth every day. | | documents on the thumb drive. Transferring files electronically | |||
| is what encryption is for. I told Greenwald that he and Laura | ||||
Once, at Greenwald’s home, I walked into the backyard and looked for | | Poitras should be sending large encrypted files of dummy documents | |||
TEMPEST receivers hiding in the trees. I didn’t find any, but that | | back and forth every day. | |||
doesn’t mean they weren’t there. Greenwald has a lot of dogs, but I | | | |||
don’t think that would hinder professionals. I’m sure that a bunch | | Once, at Greenwald's home, I walked into the backyard and looked | |||
of major governments have a complete copy of everything Greenwald | | for TEMPEST receivers hiding in the trees. I didn't find any, but | |||
has. Maybe the black bag teams bumped into each other in those early | | that doesn't mean they weren't there. Greenwald has a lot of | |||
weeks. | | dogs, but I don't think that would hinder professionals. I'm sure | |||
| that a bunch of major governments have a complete copy of | ||||
I started doubting my own security procedures. Reading about the | | everything Greenwald has. Maybe the black bag teams bumped into | |||
NSA’s hacking abilities will do that to you. Can it break the | | each other in those early weeks. | |||
encryption on my hard drive? Probably not. Has the company that | | | |||
makes my encryption software deliberately weakened the implementation | | I started doubting my own security procedures. Reading about the | |||
for it? Probably. Are NSA agents listening in on my calls back to | | NSA's hacking abilities will do that to you. Can it break the | |||
the US? Very probably. Could agents take control of my computer | | encryption on my hard drive? Probably not. Has the company that | |||
over the Internet if they wanted to? Definitely. In the end, I | | makes my encryption software deliberately weakened the | |||
decided to do my best and stop worrying about it. It was the | | implementation for it? Probably. Are NSA agents listening in on | |||
agency’s documents, after all. And what I was working on would | | my calls back to the US? Very probably. Could agents take | |||
become public in a few weeks. | | control of my computer over the Internet if they wanted to? | |||
| Definitely. In the end, I decided to do my best and stop worrying | ||||
I wasn't sleeping well, either. A lot of it was the sheer magnitude | | about it. It was the agency's documents, after all. And what I | |||
of what I saw. It's not that any of it was a real surprise. Those | | was working on would become public in a few weeks. | |||
of us in the information security community had long assumed that the | | | |||
NSA was doing things like this. But we never really sat down and | | I wasn't sleeping well, either. A lot of it was the sheer | |||
figured out the details, and to have the details confirmed made a big | | magnitude of what I saw. It's not that any of it was a real | |||
difference. Maybe I can make it clearer with an analogy. Everyone | | surprise. Those of us in the information security community had | |||
knows that death is inevitable; there's absolutely no surprise about | | long assumed that the NSA was doing things like this. But we | |||
that. Yet it arrives as a surprise, because we spend most of our | | never really sat down and figured out the details, and to have the | |||
lives refusing to think about it. The NSA documents were a bit like | | details confirmed made a big difference. Maybe I can make it | |||
that. Knowing that it is surely true that the NSA is eavesdropping | | clearer with an analogy. Everyone knows that death is inevitable; | |||
on the world, and doing it in such a methodical and robust manner, is | | there's absolutely no surprise about that. Yet it arrives as a | |||
very different from coming face-to-face with the reality that it is | | surprise, because we spend most of our lives refusing to think | |||
and the details of how it is doing it. | | about it. The NSA documents were a bit like that. Knowing that | |||
| it is surely true that the NSA is eavesdropping on the world, and | ||||
I also found it incredibly difficult to keep the secrets. The | | doing it in such a methodical and robust manner, is very different | |||
_Guardian_’s process is slow and methodical. I move much faster. I | | from coming face-to-face with the reality that it is and the | |||
drafted stories based on what I found. Then I wrote essays about | | details of how it is doing it. | |||
those stories, and essays about the essays. Writing was therapy; I | | | |||
would wake up in the wee hours of the morning, and write an essay. | | I also found it incredibly difficult to keep the secrets. _The | |||
But that put me at least three levels beyond what was published. | | Guardian_'s process is slow and methodical. I move much faster. | |||
| I drafted stories based on what I found. Then I wrote essays | ||||
Now that my involvement is out, and my first essays are out, I feel a | | about those stories, and essays about the essays. Writing was | |||
lot better. I'm sure it will get worse again when I find another | | therapy; I would wake up in the wee hours of the morning, and | |||
monumental revelation; there are still more documents to go through. | | write an essay. But that put me at least three levels beyond what | |||
| was published. | ||||
I’ve heard it said that Snowden wants to damage America. I can say | | | |||
with certainty that he does not. So far, everyone involved in this | | Now that my involvement is out, and my first essays are out, I | |||
incident has been incredibly careful about what is released to the | | feel a lot better. I'm sure it will get worse again when I find | |||
public. There are many documents that could be immensely harmful to | | another monumental revelation; there are still more documents to | |||
the US, and no one has any intention of releasing them. The | | go through. | |||
documents the reporters release are carefully redacted. Greenwald | | | |||
and I repeatedly debated with _Guardian_ editors the newsworthiness | | I've heard it said that Snowden wants to damage America. I can | |||
of story ideas, stressing that we would not expose government secrets | | say with certainty that he does not. So far, everyone involved in | |||
simply because they’re interesting. | | this incident has been incredibly careful about what is released | |||
| to the public. There are many documents that could be immensely | ||||
The NSA got incredibly lucky; this could have ended with a massive | | harmful to the US, and no one has any intention of releasing them. | |||
public dump like Chelsea Manning’s State Department cables. I | | The documents the reporters release are carefully redacted. | |||
suppose it still could. Despite that, I can imagine how this feels | | Greenwald and I repeatedly debated with _The Guardian_ editors the | |||
to the NSA. It’s used to keeping this stuff behind multiple levels | | newsworthiness of story ideas, stressing that we would not expose | |||
of security: gates with alarms, armed guards, safe doors, and | | government secrets simply because they're interesting. | |||
military-grade cryptography. It’s not supposed to be on a bunch of | | | |||
thumb drives in Brazil, Germany, the UK, the US, and who knows where | | The NSA got incredibly lucky; this could have ended with a massive | |||
else, protected largely by some random people’s opinions about what | | public dump like Chelsea Manning's State Department cables. I | |||
should or should not remain secret. This is easily the greatest | | suppose it still could. Despite that, I can imagine how this | |||
intelligence failure in the history of ever. It’s amazing that one | | feels to the NSA. It's used to keeping this stuff behind multiple | |||
person could have had so much access with so little accountability, | | levels of security: gates with alarms, armed guards, safe doors, | |||
and could sneak all of this data out without raising any alarms. The | | and military-grade cryptography. It's not supposed to be on a | |||
odds are close to zero that Snowden is the first person to do this; | | bunch of thumb drives in Brazil, Germany, the UK, the US, and who | |||
he’s just the first person to make public that he did. It’s a | | knows where else, protected largely by some random people's | |||
testament to General Alexander’s power that he hasn’t been forced to | | opinions about what should or should not remain secret. This is | |||
resign. | | easily the greatest intelligence failure in the history of ever. | |||
| It's amazing that one person could have had so much access with so | ||||
It’s not that we weren’t being careful about security, it’s that our | | little accountability, and could sneak all of this data out | |||
standards of care are so different. From the NSA’s point of view, | | without raising any alarms. The odds are close to zero that | |||
we’re all major security risks, myself included. I was taking notes | | Snowden is the first person to do this; he's just the first person | |||
about classified material, crumpling them up, and throwing them into | | to make public that he did. It's a testament to General | |||
the wastebasket. I was printing documents marked “TOP SECRET/COMINT/ | | Alexander's power that he hasn't been forced to resign. | |||
NOFORN” in a hotel lobby. And once, I took the wrong thumb drive | | | |||
with me to dinner, accidentally leaving the unencrypted one filled | | It's not that we weren't being careful about security, it's that | |||
with top-secret documents in my hotel room. It was an honest | | our standards of care are so different. From the NSA's point of | |||
mistake; they were both blue. | | view, we're all major security risks, myself included. I was | |||
| taking notes about classified material, crumpling them up, and | ||||
If I were an NSA employee, the policy would be to fire me for that | | throwing them into the wastebasket. I was printing documents | |||
alone. | | marked "TOP SECRET/COMINT/NOFORN" in a hotel lobby. And once, I | |||
| took the wrong thumb drive with me to dinner, accidentally leaving | ||||
Many have written about how being under constant surveillance changes | | the unencrypted one filled with top-secret documents in my hotel | |||
a person. When you know you’re being watched, you censor yourself. | | room. It was an honest mistake; they were both blue. | |||
You become less open, less spontaneous. You look at what you write | | | |||
on your computer and dwell on what you’ve said on the telephone, | | If I were an NSA employee, the policy would be to fire me for that | |||
wonder how it would sound taken out of context, from the perspective | | alone. | |||
of a hypothetical observer. You’re more likely to conform. You | | | |||
suppress your individuality. Even though I have worked in privacy | | Many have written about how being under constant surveillance | |||
for decades, and already knew a lot about the NSA and what it does, | | changes a person. When you know you're being watched, you censor | |||
the change was palpable. That feeling hasn’t faded. I am now more | | yourself. You become less open, less spontaneous. You look at | |||
careful about what I say and write. I am less trusting of | | what you write on your computer and dwell on what you've said on | |||
communications technology. I am less trusting of the computer | | the telephone, wonder how it would sound taken out of context, | |||
industry. | | from the perspective of a hypothetical observer. You're more | |||
| likely to conform. You suppress your individuality. Even though | ||||
After much discussion, Greenwald and I agreed to write three stories | | I have worked in privacy for decades, and already knew a lot about | |||
together to start. All of those are still in progress. In addition, | | the NSA and what it does, the change was palpable. That feeling | |||
I wrote two commentaries on the Snowden documents that were recently | | hasn't faded. I am now more careful about what I say and write. | |||
made public. There’s a lot more to come; even Greenwald hasn’t | | I am less trusting of communications technology. I am less | |||
looked through everything. | | trusting of the computer industry. | |||
| | ||||
Since my trip to Brazil [one month before], I’ve flown back to the US | | After much discussion, Greenwald and I agreed to write three | |||
once and domestically seven times—all without incident. I’m not on | | stories together to start. All of those are still in progress. | |||
any list yet. At least, none that I know about. | | In addition, I wrote two commentaries on the Snowden documents | |||
| that were recently made public. There's a lot more to come; even | ||||
********** | | Greenwald hasn't looked through everything. | |||
| | ||||
| Since my trip to Brazil (one month before), I've flown back to the | ||||
| US once and domestically seven times -- all without incident. I'm | ||||
| not on any list yet. At least, none that I know about. | ||||
As it happened, I didn’t write much more with Greenwald or the | As it happened, I didn't write much more with Greenwald or _The | |||
_Guardian_. Those two had a falling out, and by the time everything | Guardian_. Those two had a falling out, and by the time everything | |||
settled and both began writing about the documents | settled and both began writing about the documents independently -- | |||
independently—Greenwald at the newly formed website the _Intercept_—I | Greenwald at the newly formed website _The Intercept_ -- I got cut | |||
got cut out of the process somehow. I remember hearing that | out of the process somehow. I remember hearing that Greenwald was | |||
Greenwald was annoyed with me, but I never learned the reason. We | annoyed with me, but I never learned the reason. We haven't spoken | |||
haven’t spoken since. | since. | |||
Still, I was happy with the one story I was part of: how the NSA | Still, I was happy with the one story I was part of: how the NSA | |||
hacks Tor. I consider it a personal success that I pushed the | hacks Tor. I consider it a personal success that I pushed _The | |||
_Guardian_ to publish NSA documents detailing QUANTUM. I don’t think | Guardian_ to publish NSA documents detailing QUANTUM. I don't think | |||
that would have gotten out any other way. And I still use those | that would have gotten out any other way. And I still use those | |||
pages today when I teach cybersecurity to policymakers at the Harvard | pages today when I teach cybersecurity to policymakers at the Harvard | |||
Kennedy School. | Kennedy School. | |||
Other people wrote about the Snowden files, and wrote a lot. It was | Other people wrote about the Snowden files, and wrote a lot. It was | |||
a slow trickle at first, and then a more consistent flow. Between | a slow trickle at first, and then a more consistent flow. Between | |||
Greenwald, Bart Gellman, and the _Guardian_ reporters, there ended up | Greenwald, Bart Gellman, and _The Guardian_ reporters, there ended up | |||
being steady stream of news. (Bart brought in Ashkan Soltani to help | being steady stream of news. (Bart brought in Ashkan Soltani to help | |||
him with the technical aspects, which was a great move on his part, | him with the technical aspects, which was a great move on his part, | |||
even if it cost Ashkan a government job later.) More stories were | even if it cost Ashkan a government job later.) More stories were | |||
covered by other publications. | covered by other publications. | |||
It started getting weird. Both Greenwald and Gellman held documents | It started getting weird. Both Greenwald and Gellman held documents | |||
back so they could publish them in their books. Jake Appelbaum, who | back so they could publish them in their books. Jake Appelbaum, who | |||
had not yet been accused of sexual assault by multiple women, was | had not yet been accused of sexual assault by multiple women, was | |||
working with Poitras. He partnered with Spiegel to release an | working with Poitras. He partnered with _Der Spiegel_ to release an | |||
implant catalog from the NSA’s Tailored Access Operations group. To | implant catalog from the NSA's Tailored Access Operations group. To | |||
this day, I am convinced that that document was not in the Snowden | this day, I am convinced that the document was not in the Snowden | |||
archives: that Jake got it somehow, and it was released with the | archives: that Jake got it somehow, and it was released with the | |||
implication that it was from Edward Snowden. I thought it was | implication that it was from Edward Snowden. I thought it was | |||
important enough that I started writing about each item in that | important enough that I started writing about each item in that | |||
document in my blog: ”NSA Exploit of the Week.” That got my website | document in my blog: "NSA Exploit of the Week." That got my website | |||
blocked by the DoD: I keep a framed print of the censor’s message on | blocked by the DoD: I keep a framed print of the censor's message on | |||
my wall. | my wall. | |||
Perhaps the most surreal document disclosures were when artists | Perhaps the most surreal document disclosures were when artists | |||
started writing fiction based on the documents. This was in 2016, | started writing fiction based on the documents. This was in 2016, | |||
when Laura Poitras built a secure room in New York to house the | when Laura Poitras built a secure room in New York to house the | |||
documents. By then, the documents were years out of date. And now | documents. By then, the documents were years out of date. And now | |||
they’re over a decade out of date. (They were leaked in 2013, but | they're over a decade out of date. (They were leaked in 2013, but | |||
most of them were from 2012 or before.) | most of them were from 2012 or before.) | |||
I ended up being something of a public ambassador for the documents. | I ended up being something of a public ambassador for the documents. | |||
When I got back from Rio, I gave talks at a private conference in | When I got back from Rio, I gave talks at a private conference in | |||
Woods Hole, the Berkman Center at Harvard, something called the | Woods Hole, the Berkman Center at Harvard, something called the | |||
Congress and Privacy and Surveillance in Geneva, events at both CATO | Congress on Privacy and Surveillance in Geneva, events at both CATO | |||
and New America in DC, an event at the University of Pennsylvania, an | and New America in DC, an event at the University of Pennsylvania, an | |||
event at EPIC and a “Stop Watching Us” rally in DC, the RISCS | event at EPIC, a "Stop Watching Us" rally in DC, the RISCS conference | |||
conference in London, the ISF in Paris, and...then...at the IETF | in London, the ISF in Paris, and...then...at the IETF meeting in | |||
meeting in Vancouver in November 2013. (I remember little of this; I | Vancouver in November 2013. (I remember little of this; I am | |||
am reconstructing it all from my calendar.) | reconstructing it all from my calendar.) | |||
What struck me at the IETF was the indignation in the room, and the | What struck me at the IETF was the indignation in the room, and the | |||
calls to action. And there was action, across many fronts. We | calls to action. And there was action, across many fronts. We | |||
technologists did a lot to help secure the Internet, for example. | technologists did a lot to help secure the Internet, for example. | |||
The government didn’t do its part, though. Despite the public | The government didn't do its part, though. Despite the public | |||
outcry, investigations by Congress, pronouncements by President | outcry, investigations by Congress, pronouncements by President | |||
Obama, and federal court rulings, I don’t think much has changed. | Obama, and federal court rulings, I don't think much has changed. | |||
The NSA canceled a program here and a program there, and it is now | The NSA canceled a program here and a program there, and it is now | |||
more public about defense. But I don’t think it is any less | more public about defense. But I don't think it is any less | |||
aggressive about either bulk or targeted surveillance. Certainly its | aggressive about either bulk or targeted surveillance. Certainly its | |||
government authorities haven’t been restricted in any way. And | government authorities haven't been restricted in any way. And | |||
surveillance capitalism is still the business model of the Internet. | surveillance capitalism is still the business model of the Internet. | |||
And Edward Snowden? We were in contact for a while on Signal. I | And Edward Snowden? We were in contact for a while on Signal. I | |||
visited him once in Moscow, in 2016. And I had him do an guest | visited him once in Moscow, in 2016. And I had him do a guest | |||
lecture to my class at Harvard for a few years, remotely by Jitsi. | lecture to my class at Harvard for a few years, remotely by Jitsi. | |||
Afterwards, I would hold a session where I promised to answer every | Afterwards, I would hold a session where I promised to answer every | |||
question he would evade or not answer, explain every response he did | question he would evade or not answer, explain every response he did | |||
give, and be candid in a way that someone with an outstanding arrest | give, and be candid in a way that someone with an outstanding arrest | |||
warrant simply cannot. Sometimes I thought I could channel Snowden | warrant simply cannot. Sometimes I thought I could channel Snowden | |||
better than he could. | better than he could. | |||
But now it’s been a decade. Everything he knows is old and out of | But now it's been a decade. Everything he knows is old and out of | |||
date. Everything we know is old and out of date. The NSA suffered | date. Everything we know is old and out of date. The NSA suffered | |||
an even worse leak of its secrets by the Russians, under the guise of | an even worse leak of its secrets by the Russians, under the guise of | |||
the Shadow Brokers, in 2016 and 2017. The NSA has rebuilt. It again | the Shadow Brokers, in 2016 and 2017. The NSA has rebuilt. It again | |||
has capabilities we can only surmise. | has capabilities we can only surmise. | |||
3. Stephen Farrell: IETF and Internet Technical community reaction | 3. Stephen Farrell: IETF and Internet Technical Community Reaction | |||
In 2013, the IETF and, more broadly, the Internet technical, security | In 2013, the IETF and, more broadly, the Internet technical, | |||
and privacy research communities, were surprised by the surveillance | security, and privacy research communities, were surprised by the | |||
and attack efforts exposed by the Snowden revelations. [timeline] | surveillance and attack efforts exposed by the Snowden revelations | |||
While the potential for such was known, it was the scale and | [Timeline]. While the potential for such was known, it was the scale | |||
pervasiveness of the activities disclosed that was alarming and, I | and pervasiveness of the activities disclosed that was alarming and, | |||
think it fair to say, quite annoying, for very many Internet | I think it fair to say, quite annoying, for very many Internet | |||
engineers. | engineers. | |||
As for the IETF's reaction, informal meetings during the July 2013 | As for the IETF's reaction, informal meetings during the July 2013 | |||
IETF meeting in Berlin indicated that IETF participants considered | IETF meeting in Berlin indicated that IETF participants considered | |||
that these revelations showed that we needed to do more to improve | that these revelations showed that we needed to do more to improve | |||
the security and privacy properties of IETF protocols, and to help | the security and privacy properties of IETF protocols, and to help | |||
ensure deployments made better use of the security and privacy | ensure deployments made better use of the security and privacy | |||
mechanisms that already existed. In August, the IETF set up a new | mechanisms that already existed. In August, the IETF set up a new | |||
mailing list [perpass] that ended up being a useful venue for | mailing list [Perpass], which became a useful venue for triaging | |||
triaging proposals for work on these topics. At the November 2013 | proposals for work on these topics. At the November 2013 IETF | |||
IETF meeting, there was a lively and very well attended plenary | meeting, there was a lively and very well attended plenary session | |||
session [plenary-video] on "hardening the Internet" against such | [Plenary-video] on "hardening the Internet" against such attacks, | |||
attacks, followed by a "birds of a feather" [Perpass-BoF] devoted to | followed by a "birds of a feather" session [Perpass-BoF] devoted to | |||
more detailed discussion of possible actions in terms of new working | more detailed discussion of possible actions in terms of new working | |||
groups, protocols and best-current-practice (BCP) documents that | groups, protocols, and Best Current Practice (BCP) documents that | |||
could help improve matters. This was followed in February/March 2014 | could help improve matters. This was followed in February/March 2014 | |||
by a joint IAB/W3C workshop on "strengthening the Internet against | by a joint IAB/W3C workshop on "strengthening the Internet against | |||
pervasive monitoring" [STRINT] held in London and attended by 150 | pervasive monitoring" [STRINT] held in London and attended by 150 | |||
engineers (still the only IAB workshop in my experience where we | engineers (still the only IAB workshop in my experience where we | |||
needed a wait-list for people after capacity for the venue was | needed a waiting list for people after capacity for the venue was | |||
reached!). The STRINT workshop report was eventually published as | reached!). The STRINT workshop report was eventually published as | |||
[RFC7687] in 2015, but in the meantime work proceeded on a Best | [RFC7687] in 2015, but in the meantime, work proceeded on a BCP | |||
Current Practice (BCP) document codifying that the IETF community | document codifying that the IETF community considered that "pervasive | |||
considered that "pervasive monitoring is an attack" [RFC7258] (aka | monitoring is an attack" [RFC7258] (aka BCP 188). The IETF Last Call | |||
BCP188). The IETF last-call discussion for that short document | discussion for that short document included more than 1000 emails -- | |||
included more than 1000 emails - while there was broad agreement on | while there was broad agreement on the overall message, a number of | |||
the overall message, a number of IETF participants considered | IETF participants considered enshrining that message in the RFC | |||
enshrining that message in the RFC series and IETF processes was | Series and IETF processes controversial. In any case, the BCP was | |||
controversial. In any case the BCP was published in May 2014. The | published in May 2014. The key statement on which rough consensus | |||
key statement on which rough consensus was reached is in the abstract | was reached is in the abstract of RFC 7258 and says "Pervasive | |||
of RFC7258 and says "Pervasive monitoring is a technical attack that | monitoring is a technical attack that should be mitigated in the | |||
should be mitigated in the design of IETF protocols, where possible." | design of IETF protocols, where possible." That document has since | |||
That document has since been referenced [refs-to-7258] by many IETF | been referenced [Refs-to-7258] by many IETF working groups and RFCs | |||
working groups and RFCs as justifying additional work on security and | as justifying additional work on security and privacy. Throughout | |||
privacy. Throughout that period and beyond, the repercussions of the | that period and beyond, the repercussions of the Snowden revelations | |||
Snowden revelations remained a major and ongoing agenda item for both | remained a major and ongoing agenda item for both of the IETF's main | |||
of the IETF's main technical management bodies - the IAB and the IESG | technical management bodies, the IAB and the IESG (on which I served | |||
(on which I served at the time). | at the time). | |||
So far, I've really only described the processes with which the IETF | So far, I've only described the processes with which the IETF dealt | |||
dealt with the attacks, but there was of course also much technical | with the attacks, but there was, of course, also much technical work | |||
work started by IETF participants that was at least partly motivated | started by IETF participants that was at least partly motivated by | |||
by the Snowden revelations. | the Snowden revelations. | |||
In November 2013 a working group was established to document better | In November 2013, a working group was established to document better | |||
practices for using TLS in applications [UTA] so that deployments | practices for using TLS in applications [UTA] so that deployments | |||
would be less at risk in the face of some of the attacks related to | would be less at risk in the face of some of the attacks related to | |||
stripping TLS or having applications mis-use TLS APIs or parameters. | stripping TLS or having applications misuse TLS APIs or parameters. | |||
Similar work was done to update recommendations for use of | Similar work was done later to update recommendations for use of | |||
cryptography in other protocols in the [CURDLE] working group later. | cryptography in other protocols in the CURDLE Working Group [CURDLE]. | |||
The CURDLE working group was to an extent created to enable use of a | The CURDLE Working Group was, to an extent, created to enable use of | |||
set of new elliptic curves that had been documented by the IRTF | a set of new elliptic curves that had been documented by the IRTF | |||
crypto forum research group. [CFRG] That work in turn had been | Crypto Forum Research Group [CFRG]. That work in turn had been | |||
partly motivated by (perhaps ultimately unfounded) concerns about | partly motivated by (perhaps ultimately unfounded) concerns about | |||
elliptic curves defined in NIST standards, following the DUAL_EC_DRBG | elliptic curves defined in NIST standards, following the DUAL_EC_DRBG | |||
debacle [dual-ec] (described further below) where a NIST random | debacle [Dual-EC] (described further below) where a NIST random | |||
number generator had been deliberately engineered to produce output | number generator had been deliberately engineered to produce output | |||
that could be vulnerable to NSA attack. | that could be vulnerable to NSA attack. | |||
Work to develop a new version of TLS was started in 2014, mainly due | Work to develop a new version of TLS was started in 2014, mainly due | |||
to concerns that TLSv1.2 and earlier version implementations had been | to concerns that TLS 1.2 and earlier version implementations had been | |||
shown to be vulnerable to a range of attacks over the years. The | shown to be vulnerable to a range of attacks over the years. The | |||
work to develop TLSv1.3 [RFC8446] also however aimed to encrypt more | work to develop TLS 1.3 [RFC8446] also aimed to encrypt more of the | |||
of the handshake so as to expose less information to network | handshake so as to expose less information to network observers -- a | |||
observers - a fairly direct result of the Snowden revelations. Work | fairly direct result of the Snowden revelations. Work to further | |||
to further improve TLS in this respect continues today using the so- | improve TLS in this respect continues today using the so-called | |||
called encrypted client hello (ECH) [I-D.ietf-tls-esni] mechanism to | Encrypted Client Hello (ECH) mechanism [TLS-ECH] to remove one of the | |||
remove one of the last privacy leaks present in current TLS. | last privacy leaks present in current TLS. | |||
Work on ECH was enabled by significant developments to encrypt DNS | Work on ECH was enabled by significant developments to encrypt DNS | |||
traffic, using DNS over TLS (DoT) [RFC7858] or DNS over HTTPS (DoH) | traffic, using DNS over TLS (DoT) [RFC7858] or DNS Queries over HTTPS | |||
[RFC8484] which also started as a result of the Snowden revelations. | (DoH) [RFC8484], which also started as a result of the Snowden | |||
Prior to that, privacy hadn't really been considered when it came to | revelations. Prior to that, privacy hadn't really been considered | |||
DNS data or (more importantly) the act of accessing DNS data. The | when it came to DNS data or (more importantly) the act of accessing | |||
trend towards encrypting DNS traffic represents a significant change | DNS data. The trend towards encrypting DNS traffic represents a | |||
for the Internet, both in terms of reducing cleartext, but also in | significant change for the Internet, both in terms of reducing | |||
terms of moving points-of-control. The latter aspect was, and | cleartext, but also in terms of moving points-of-control. The latter | |||
remains, controversial, but the IETF did its job of defining new | aspect was, and remains, controversial, but the IETF did its job of | |||
protocols that can enable better DNS privacy. Work on HTTP version 2 | defining new protocols that can enable better DNS privacy. Work on | |||
[RFC7540] and QUIC [RFC9000] further demonstrates the trend in the | HTTP version 2 [RFC9113] and QUIC [RFC9000] further demonstrates the | |||
IETF towards always-encrypting protocols as the new norm, at least at | trend in the IETF towards always encrypting protocols as the new | |||
and above the transport layer. | norm, at least at and above the transport layer. | |||
Of course, not all such initiatives bore fruit, for example attempts | Of course, not all such initiatives bore fruit; for example, attempts | |||
to define a new MPLS encryption mechanism | to define a new MPLS encryption mechanism | |||
[I-D.farrelll-mpls-opportunistic-encrypt] foundered due to a lack of | [MPLS-OPPORTUNISTIC-ENCRYPT] foundered due to a lack of interest and | |||
interest and the existence of the already deployed IEEE MACSEC | the existence of the already deployed IEEE Media Access Control | |||
scheme. But there has been a fairly clear trend towards trying to | Security (MACsec) scheme. But there has been a fairly clear trend | |||
remove cleartext from the Internet as a precursor to provide improved | towards trying to remove cleartext from the Internet as a precursor | |||
privacy when considering network observers as attackers. | to provide improved privacy when considering network observers as | |||
attackers. | ||||
The IETF, of course, forms only one part of the broader Internet | The IETF, of course, forms only one part of the broader Internet | |||
technical community, and there were many non-IETF activities | technical community, and there were many non-IETF activities | |||
triggered by the Snowden revelations, a number of which also | triggered by the Snowden revelations, a number of which also | |||
eventually resulted in new IETF work to standardise better security | eventually resulted in new IETF work to standardise better security | |||
and privacy mechanisms developed elsewhere. | and privacy mechanisms developed elsewhere. | |||
In 2013, the web was largely unencrypted despite HTTPS being | In 2013, the web was largely unencrypted despite HTTPS being | |||
relatively usable and that was partly due to problems using the | relatively usable, and that was partly due to problems using the Web | |||
WebPKI at scale. The Let's Encrypt [LE] initiative issued its first | PKI at scale. The Let's Encrypt initiative [LE] issued its first | |||
certificates in 2015 as part of its aim to try to move the web | certificates in 2015 as part of its aim to try to move the web | |||
towards being fully encrypted, and has been extremely successful in | towards being fully encrypted, and it has been extremely successful | |||
helping achieve that goal. Subsequently, the automation protocols | in helping achieve that goal. Subsequently, the automation protocols | |||
developed for Let's Encrypt were standardised in the IETF's ACME | developed for Let's Encrypt were standardised in the IETF's ACME | |||
[ACME] working group. | Working Group [ACME]. | |||
In 2013, most email transport between mail servers was cleartext, | In 2013, most email transport between mail servers was cleartext, | |||
directly enabling some of the attacks documented in the Snowden | directly enabling some of the attacks documented in the Snowden | |||
documents. Significant effort by major mail services and MTA | documents. Significant effort by major mail services and MTA | |||
software developers since then have resulted in more than 90% of | software developers since then have resulted in more than 90% of | |||
email being encrypted between mail servers and various IETF protocols | email being encrypted between mail servers, and various IETF | |||
have been defined in order to improve that situation, e.g., SMTP MTA | protocols have been defined in order to improve that situation, e.g., | |||
Strict Transport Security (MTA-STS). [RFC8461] | SMTP MTA Strict Transport Security (MTA-STS) [RFC8461]. | |||
Lastly, MAC addresses have historically been long-term fixed values | Lastly, MAC addresses have historically been long-term fixed values | |||
visible to local networks (and beyond), which enabled some tracking | visible to local networks (and beyond), which enabled some tracking | |||
attacks that were documented in the Snowden documents. [Toronto] | attacks that were documented in the Snowden documents [Toronto]. | |||
Implementers/vendors and the IEEE 802 standards group recognised this | Implementers, vendors, and the IEEE 802 standards group recognised | |||
weakness and started work on MAC address randomisation that in turn | this weakness and started work on MAC address randomisation that in | |||
lead to the IETF's [MADINAS] working group that aims to ensure | turn led to the IETF's MADINAS Working Group [MADINAS], which aims to | |||
randomised MAC addresses can be used on the Internet without causing | ensure randomised MAC addresses can be used on the Internet without | |||
unintentional harm. There is also a history of IETF work on | causing unintentional harm. There is also a history of IETF work on | |||
deprecating MAC-address based IPv6 interface identifiers, advocating | deprecating MAC-address-based IPv6 interface identifiers and | |||
pseudo-random identifiers and temporary addresses, some of which pre- | advocating pseudorandom identifiers and temporary addresses, some of | |||
dates Snowden. [RFC7217] [RFC8064] [RFC8981] | which pre-dates Snowden [RFC7217] [RFC8064] [RFC8981]. | |||
In summary, the significantly large volume of technical work pursued | In summary, the significantly large volume of technical work pursued | |||
in the IETF and elsewhere as a result of the Snowden revelations has | in the IETF and elsewhere as a result of the Snowden revelations has | |||
focussed on two main things: decreasing the amount of plaintext that | focussed on two main things: decreasing the amount of plaintext that | |||
remains visible to network observers and secondly reducing the number | remains visible to network observers and secondly reducing the number | |||
of long-term identifiers that enable unexpected identification or re- | of long-term identifiers that enable unexpected identification or re- | |||
identification of devices or users. This work is not by any means | identification of devices or users. This work is not by any means | |||
complete, nor is deployment universal, but significant progress has | complete, nor is deployment universal, but significant progress has | |||
been made and the work continues even if the level of annoyance at | been made, and the work continues even if the level of annoyance at | |||
the attack has faded somewhat over time. | the attack has faded somewhat over time. | |||
One should also note that there has been push-back against these | One should also note that there has been pushback against these | |||
improvements in security and privacy and the changes they cause for | improvements in security and privacy and the changes they cause for | |||
deployments. That has come from more or less two camps - those on | deployments. That has come from more or less two camps: those on | |||
whom these improvements force change tend to react badly, but later | whom these improvements force change tend to react badly, but later | |||
figure out how to adjust. The second camp being those who seemingly | figure out how to adjust, and those who seemingly prefer not to | |||
prefer not to strengthen security so as to for example continue to | strengthen security so as to, for example, continue to achieve what | |||
achieve what they call "visibility" even in the face of the many | they call "visibility" even in the face of the many engineers who | |||
engineers who correctly argue that such an anti-encryption approach | correctly argue that such an anti-encryption approach inevitably | |||
inevitably leads to worse security overall. The recurring nature of | leads to worse security overall. The recurring nature of this kind | |||
this kind of push-back is nicely illustrated by [RFC1984]. That | of pushback is nicely illustrated by [RFC1984]. That informational | |||
informational document was published in 1996 as an IETF response to | document was published in 1996 as an IETF response to an early | |||
an early iteration of the perennial "encryption is bad" argument. In | iteration of the perennial "encryption is bad" argument. In 2015, | |||
2015, the unmodified 1996 text was upgraded to a Best Current | the unmodified 1996 text was upgraded to a BCP (BCP 200) as the | |||
Practice (BCP200) as the underlying arguments have not changed, and | underlying arguments have not changed, and will not change. | |||
will not change. | ||||
Looking back on all the above from a 2023 vantage point, I think | Looking back on all the above from a 2023 vantage point, I think | |||
that, as a community of Internet engineers, we got a lot right, but | that, as a community of Internet engineers, we got a lot right, but | |||
that today there's way more that needs to be done to better protect | that today there's way more that needs to be done to better protect | |||
the security and privacy of people who use the Internet. In | the security and privacy of people who use the Internet. In | |||
particular, we (the technical community) haven't done nearly as good | particular, we (the technical community) haven't done nearly as good | |||
a job at countering surveillance capitalism [zubhoff2019] which has | a job at countering surveillance capitalism [Zubhoff2019], which has | |||
exploded in the last decade. In part, that's because many of the | exploded in the last decade. In part, that's because many of the | |||
problems are outside of the scope of bodies such as the IETF. For | problems are outside of the scope of bodies such as the IETF. For | |||
example, intrusive back-end sharing of people's data for advertising | example, intrusive backend sharing of people's data for advertising | |||
purposes can't really be mitigated via Internet protocols. | purposes can't really be mitigated via Internet protocols. | |||
However, I also think that the real annoyance felt with respect to | However, I also think that the real annoyance felt with respect to | |||
the Snowden revelations is (in general) not felt nearly as much when | the Snowden revelations is (in general) not felt nearly as much when | |||
it comes to the legal but hugely privacy-invasive activities of major | it comes to the legal but hugely privacy-invasive activities of major | |||
employers of Internet engineers. | employers of Internet engineers. | |||
It's noteworthy that RFC7258 doesn't consider that bad actors are | It's noteworthy that RFC 7258 doesn't consider that bad actors are | |||
limited to governments, and personally, I think many advertising | limited to governments, and personally, I think many advertising | |||
industry schemes for collecting data are egregious examples of | industry schemes for collecting data are egregious examples of | |||
pervasive monitoring and hence ought also be considered an attack on | pervasive monitoring and hence ought also be considered an attack on | |||
the Internet that ought be mitigated where possible. However, the | the Internet that ought be mitigated where possible. However, the | |||
Internet technical community clearly hasn't acted in that way over | Internet technical community clearly hasn't acted in that way over | |||
the last decade. | the last decade. | |||
Perhaps that indicates that Internet engineers and the bodies in | Perhaps that indicates that Internet engineers and the bodies in | |||
which they congregate need to place much more emphasis on standards | which they congregate need to place much more emphasis on standards | |||
for ethical behaviour than has been the case for the first half- | for ethical behaviour than has been the case for the first half- | |||
century of the Internet. And while it would be good to see the | century of the Internet. And while it would be good to see the | |||
current leaders of Internet bodies work to make progress in that | current leaders of Internet bodies work to make progress in that | |||
regard, at the time of writing, it sadly seems more likely that | regard, at the time of writing, it sadly seems more likely that | |||
government regulators will be the ones to try force better behaviour. | government regulators will be the ones to try force better behaviour. | |||
That of course comes with a significant risk of having regulations | That of course comes with a significant risk of having regulations | |||
that stymie the kind of permissionless innovation that characterised | that stymie the kind of permissionless innovation that characterised | |||
many earlier Internet successes. | many earlier Internet successes. | |||
So while we got a lot right in our reaction to Snowden's revelations, | So while we got a lot right in our reaction to Snowden's revelations, | |||
currently, we have a "worse" Internet. Nonetheless, I do still hope | currently, we have a "worse" Internet. Nonetheless, I do still hope | |||
to see a sea-change there, as the importance of real Internet | to see a sea change there, as the importance of real Internet | |||
security and privacy for people becomes utterly obvious to all, even | security and privacy for people becomes utterly obvious to all, even | |||
the most hard core capitalists and government signals intelligence | the most hard-core capitalists and government signals intelligence | |||
agencies. That may seem naive, but I remain optimistic that as a | agencies. That may seem naive, but I remain optimistic that, as a | |||
fact-based community we (and eventually our employers) will recognise | fact-based community, we (and eventually our employers) will | |||
that the lesser risk is to honestly aim to provide the best security | recognise that the lesser risk is to honestly aim to provide the best | |||
and privacy practically possible. | security and privacy practically possible. | |||
4. Farzaneh Badii: Did Snowden's revelations help with protecting human | 4. Farzaneh Badii: Did Snowden's Revelations Help with Protecting Human | |||
rights on the Internet? | Rights on the Internet? | |||
It is very difficult to empirically measure the effect of Snowden's | It is very difficult to empirically measure the effect of Snowden's | |||
revelations on human rights and the Internet. Anecdotally, we have | revelations on human rights and the Internet. Anecdotally, we have | |||
been witnessing dominant regulatory and policy approaches that impact | been witnessing dominant regulatory and policy approaches that impact | |||
technologies and services that are at the core of protecting human | technologies and services that are at the core of protecting human | |||
rights on the Internet. (A range of European Union laws that aims to | rights on the Internet. (A range of European Union laws aims to | |||
address online safety or concentration of data. There are many more | address online safety or concentration of data. There are many more | |||
regulations that have an impact on the Internet.[Masnick2023]) There | regulations that have an impact on the Internet [Masnick2023].) | |||
has been little progress in fixing technical and policy issues that | There has been little progress in fixing technical and policy issues | |||
help enable human rights. Snowden revelations did not have a | that help enable human rights. The Snowden revelations did not | |||
revolutionary effect on our approach towards not using policies and | revolutionize the Internet governance and technical approaches to | |||
technical means that have an effect on human rights, such as freedom | support human rights such as freedom of expression, freedom of | |||
of expression, freedom of association and assembly and privacy. It | association and assembly, and privacy. It did not decrease the | |||
did not decrease the number of Internet shutdowns, nor the eagerness | number of Internet shutdowns nor the eagerness of authoritarian (and | |||
of authoritarian (and even to some extent democratic) countries to | even to some extent democratic) countries to territorialize the | |||
territorialize the Internet. In some cases, the governments argued | Internet. In some cases, the governments argued that they should | |||
that they should have more data sovereignty or Internet sovereignty. | have more data sovereignty or Internet sovereignty. Perhaps the | |||
Perhaps the revelations helped with the evolution of some technical | revelations helped with the evolution of some technical and policy | |||
and policy aspects. | aspects. | |||
After Snowden’s revelations 10 years ago, engineers and advocates at | After Snowden's revelations 10 years ago, engineers and advocates at | |||
the Internet Engineering Task Force (IETF) responded in a few ways. | the IETF responded in a few ways. One prominent response was the | |||
One prominent response was the issuance of a Best Current Practice | issuance of a BCP document, "Pervasive Monitoring Is an Attack" | |||
document, “Pervasive Monitoring Is an Attack” [RFC7258] by Farrell | [RFC7258] by Farrell and Tschofenig. The responses to the Snowden | |||
and Tschofenig. The responses to Snowden revelations did not mean | revelations did not mean that IETF had lost sight of issues such as | |||
that IETF had lost sight of issues such as privacy and surveillance. | privacy and surveillance. There were instances of resistance to | |||
There were instances of resistance to surveillance in the past by | surveillance in the past by engineers (we do not delve into how | |||
engineers (we do not delve into how successful that was in protecting | successful that was in protecting human rights). However, | |||
human rights). But historically, many engineers believed that | historically, many engineers believed that widespread and habitual | |||
widespread and habitual surveillance was too expensive to be | surveillance was too expensive to be practical. The revelations | |||
practical. The revelations proved them wrong. | proved them wrong. | |||
Rights-centered activists were also involved with the IETF before the | Rights-centered activists were also involved with the IETF before the | |||
revelations. For example, staff from Center for Democracy and | revelations. For example, staff from Center for Democracy and | |||
Technology (CDT) was undertaking work at the IETF (and was a member | Technology (CDT) was undertaking work at the IETF (and was a member | |||
of the Internet Architecture Board) and held workshops about the | of the Internet Architecture Board) and held workshops about the | |||
challenges of creating privacy protective protocols and systems. The | challenges of creating privacy-protective protocols and systems. The | |||
technical shortcomings that were exploited by the National Security | technical shortcomings that were exploited by the National Security | |||
Agency to carry out mass-scale surveillance were recognized by the | Agency to carry out mass-scale surveillance were recognized by the | |||
IETF before the Snowden revelations [Garfinkel1995],[RFC6462]. In | IETF before the Snowden revelations [Garfinkel1995] [RFC6462]. In | |||
2012, Joy Liddicoat and Avri Doria wrote a report at Internet Society | 2012, Joy Liddicoat and Avri Doria wrote a report for the Internet | |||
which extensively discussed the processes and principles of human | Society that extensively discussed the processes and principles of | |||
rights and Internet protocols [Doria2012]. | human rights and Internet protocols [Doria2012]. | |||
Perhaps the Snowden revelations brought more attention to the IETF | Perhaps the Snowden revelations brought more attention to the IETF | |||
and its work as it related to important issues, such as privacy and | and its work as it related to important issues, such as privacy and | |||
freedom of expression. It might have also expedited and helped with | freedom of expression. It might have also expedited and helped with | |||
more easily convening the Human Rights Protocol Considerations | more easily convening the Human Rights Protocol Considerations | |||
research group in the Internet Research Task Force (IRTF). Co- | Research Group (HRPC) in the Internet Research Task Force (IRTF) in | |||
chaired by Niels ten Oever (who worked at Article 19 at the time) and | July 2015. The HRPC RG was originally co-chaired by Niels ten Oever | |||
Internet governance activist Avri Doria, the Internet Research Task | (who worked at Article 19 at the time) and Internet governance | |||
Force in July 2015 chartered a Research Group on “Human Rights | activist Avri Doria. The charter of the HRPC RG states that the | |||
Protocol Considerations” (the HRPC RG). The charter of the HRPC RG | group was established: "to research whether standards and protocols | |||
stated that the group was established: “to research whether standards | can enable, strengthen or threaten human rights, as defined in the | |||
and protocols can enable, strengthen or threaten human rights, as | Universal Declaration of Human Rights (UDHR) and the International | |||
defined in the UDHR and the International Covenant on Civil and | Covenant on Civil and Political Rights (ICCPR)." | |||
Political Rights (ICCPR).” | ||||
During the past decades, a few successful strides were made to create | During the past decade, a few successful strides were made to create | |||
protocols that, when and if implemented, aim at protecting privacy of | protocols that, when and if implemented, aim at protecting privacy of | |||
the users, as well as help with reducing pervasive surveillance. | the users, as well as help with reducing pervasive surveillance. | |||
These efforts were in keeping with the consensus of the IETF found in | These efforts were in keeping with the consensus of the IETF found in | |||
RFC 7258. Sometimes these protocols have anti-censorship qualities | RFC 7258. Sometimes these protocols have anti-censorship qualities | |||
as well. A few examples immediately come to mind: 1) Encryption of | as well. A few examples immediately come to mind: 1) the encryption | |||
DNS queries (for example DNS over HTTPS); 2) ACME protocol | of DNS queries (for example, DNS over HTTPS), 2) ACME protocol | |||
underpinning the Let's Encrypt initiative and 3) Registration Data | underpinning the Let's Encrypt initiative, and 3) Registration Data | |||
Access Protocol | Access Protocol (RDAP) [RFC7480] [RFC7481] [RFC8056] [RFC9082] | |||
(RDAP)[RFC7480],[RFC7481],[RFC9082],[RFC9083],[RFC7484], [RFC8056]. | [RFC9083] [RFC9224]. (It is debatable that RDAP had anything to do | |||
(It is debatable that RDAP had anything to do with Snowden | with the Snowden revelations, but it is still a good example and is | |||
revelations but it is still a good example and is finally being | finally being implemented.) | |||
implemented.) | ||||
DNS Queries over HTTPS protocol aimed to encrypt DNS queries. Four | The DNS Queries over HTTPS protocol aimed to encrypt DNS queries. | |||
years after RFC 7258, DoH was developed to tackle both active and | Four years after RFC 7258, DoH was developed to tackle both active | |||
passive monitoring of DNS queries. It is also a tool that can help | and passive monitoring of DNS queries. It is also a tool that can | |||
with combatting censorship. Before the revelations, DNS query | help with combatting censorship. Before the revelations, DNS query | |||
privacy would have been controversial due to being expensive or | privacy would have been controversial due to being expensive or | |||
unnecessary but the Snowden revelations made it more plausible. | unnecessary, but the Snowden revelations made it more plausible. | |||
Let's Encrypt was not an Internet protocol, but it was an initiative | Let's Encrypt was not an Internet protocol, but it was an initiative | |||
that aimed to encrypt the web and later on some of the automation | that aimed to encrypt the web, and later on some of the automation | |||
protocols were standardized in the IETF ACME working group. The | protocols were standardized in the IETF ACME Working Group. RDAP | |||
Registration Data Access Protocol could solve a long term problem: | could solve a long-term problem: redacting the domain name | |||
redacting the domain name registrants (and IP address holders) | registrants' (and IP address holders') sensitive, personal data but | |||
sensitive, personal data but at the same time enabling legitimate | at the same time enabling legitimate access to the information. As | |||
access to the information. As to the work of HRPC research group, it | to the work of HRPC Research Group, it has so far issued [RFC8280] by | |||
has so far issued [RFC8280] by ten Oever and Cath) and a number of | ten Oever and Cath and a number of informational Internet-Drafts. | |||
informational Internet-Drafts. | ||||
While we cannot really argue that all the movements and privacy | While we cannot really argue that all the movements and privacy- | |||
preserving protocols and initiatives that enable protecting human | preserving protocols and initiatives that enable protecting human | |||
rights at the infrastructure layer solely or directly result from | rights at the infrastructure layer solely or directly result from the | |||
Snowden revelations, I think it is safe to say that the revelations | Snowden revelations, I think it is safe to say that the revelations | |||
helped with expediting the resolution of some of the “technical” | helped with expediting the resolution of some of the "technical" | |||
hesitations that had an effect on fixing Internet protocols that | hesitations that had an effect on fixing Internet protocols that | |||
enabled protection of human rights. | enabled protection of human rights. | |||
Unfortunately, the Snowden revelations have not yet helped us | Unfortunately, the Snowden revelations have not yet helped us | |||
meaningfully with adopting a human rights approach. We can’t agree | meaningfully with adopting a human rights approach. We can't agree | |||
on prioritizing human rights in our Internet communities for a host | on prioritizing human rights in our Internet communities for a host | |||
of reasons. This could be due to: 1) human rights are sometimes in | of reasons. This could be due to: 1) human rights are sometimes in | |||
conflict with each other 2) it is simply not possible to mitigate the | conflict with each other; 2) it is simply not possible to mitigate | |||
human right violation through the Internet protocol 3) it is not | the human right violation through the Internet protocol; 3) it is not | |||
obvious for the engineers before-the-fact how the Internet protocol | obvious for the engineers in advance how the Internet protocol | |||
contributes to enabling human rights protections, or precisely what | contributes to enabling human rights protections, or precisely what | |||
they ought to do 4) the protocol is already there but market, law and | they ought to do; 4) the protocol is already there, but market, law, | |||
a host of other societal and political issues do not allow for | and a host of other societal and political issues do not allow for | |||
widespread implementation. | widespread implementation. | |||
IETF did not purposefully take a long time to adopt and implement | IETF did not purposefully take a long time to adopt and implement | |||
protocols that enabled human rights. There were technical and | protocols that enabled human rights. There were technical and | |||
political issues that created barriers. For example, as WHOIS was | political issues that created barriers. For example, as WHOIS was | |||
not capable of accommodating a tiered access option, the IETF | not capable of accommodating a tiered-access option, the IETF | |||
community attempted a few times before to create a protocol that | community attempted a few times before to create a protocol that | |||
would disclose the necessary information of IP holders and domain | would disclose the necessary information of IP holders and domain | |||
name registrants while at the same time protecting their data (CRISP | name registrants while at the same time protecting their data (Cross | |||
and later on IRIS are the examples). However, IRIS was technically | Registry Internet Service Protocol (CRISP) and later on Internet | |||
very difficult to implement. It was not until RDAP was developed and | Registry Information Service (IRIS) are the examples). However, IRIS | |||
the General Data Protection Regulation (GDPR) was enacted that | was technically very difficult to implement. It was not until RDAP | |||
Internet Corporation for Assigned Names and Numbers had to consider | was developed and the General Data Protection Regulation (GDPR) was | |||
instructing registries and registrars to implement RDAP and its | enacted that Internet Corporation for Assigned Names and Numbers had | |||
community had to come up with a privacy compliant policy. Overall, a | to consider instructing registries and registrars to implement RDAP | |||
host of regulatory and market incentives can halt or slow down the | and its community had to come up with a privacy-compliant policy. | |||
implementation of human rights enabling protocols and implementation | Overall, a host of regulatory and market incentives can halt or slow | |||
could depend on other organizations with their own political and | down the implementation of human-rights-enabling protocols and | |||
stakeholder conflicts. Sometimes the protocol is available, but the | implementation could depend on other organizations with their own | |||
regulatory framework and the market do not allow for implementation. | political and stakeholder conflicts. Sometimes the protocol is | |||
Sometimes the surrounding context includes practical dimensions that | available, but the regulatory framework and the market do not allow | |||
are easy to overlook in a purely engineering-focused argument. | for implementation. Sometimes the surrounding context includes | |||
practical dimensions that are easy to overlook in a purely | ||||
engineering-focused argument. | ||||
A curious example of this is sanctions regimes that target | A curious example of this is sanctions regimes that target | |||
transactions involving economically-valuable assets. As a result, | transactions involving economically valuable assets. As a result, | |||
sanctions might limit sanctioned nations' and entities' access to | sanctions might limit sanctioned nations' and entities' access to | |||
IPv4 resources (because the existence of a resale market for these | IPv4 resources (because the existence of a resale market for these | |||
addresses causes acquiring them to be interpreted as buying something | addresses causes acquiring them to be interpreted as buying something | |||
of value), though the same consideration may not apply to IPv6 | of value), though the same consideration may not apply to IPv6 | |||
address resources. But IPv6 adoption itself depends on a host of | address resources. But IPv6 adoption itself depends on a host of | |||
complex factors that are by no means limited to technical comparisons | complex factors that are by no means limited to technical comparisons | |||
of the properties of IPv4 and IPv6. Someone focused only on | of the properties of IPv4 and IPv6. Someone focused only on | |||
technical features of protocols may devise an elegant solution but be | technical features of protocols may devise an elegant solution but be | |||
surprised both by deployment challenges and unintended downstream | surprised both by deployment challenges and unintended downstream | |||
effects. Sometimes there are arguments over implementation of a | effects. Sometimes there are arguments over implementation of a | |||
protocol because as it is perceived, while it can protect freedom of | protocol because as it is perceived, while it can protect freedom of | |||
expression and reduce surveillance, it can hamper other human rights. | expression and reduce surveillance, it can hamper other human rights. | |||
For instance, we still have doubts about implementing DNS over HTTPS | For instance, the technical community and some network operators | |||
without seriously considering its contributions to fight with | still have doubts about the implementation of DNS over HTTPS, despite | |||
censorship and bring encryption to DNS queries. The arguments | its potential to circumvent censorship and its ability to encrypt DNS | |||
against implementation of DoH include protection of children online | queries. The arguments against implementation of DoH include | |||
and lack of law enforcement access to data. | protection of children online and lack of law enforcement access to | |||
data. | ||||
We must acknowledge that sometimes the technical solutions that we | We must acknowledge that sometimes the technical solutions that we | |||
use that protect one right (for example encryption to protect the | use that protect one right (for example, encryption to protect the | |||
right to privacy or prevent surveillance) could potentially affect | right to privacy or to prevent surveillance) could potentially affect | |||
technical and policy solutions that try to protect other human rights | technical and policy solutions that try to protect other human rights | |||
(for example encryption could prevent financial institutions from | (for example, encryption could prevent financial institutions from | |||
monitoring employees' network activities to detect fraudulent | monitoring employees' network activities to detect fraudulent | |||
behavior). Acknowledging and identifying these conflicts can help us | behavior). Acknowledging and identifying these conflicts can help us | |||
come up with alternative techniques that could protect human rights | come up with alternative techniques that could protect human rights | |||
while not hampering other technical solutions such as encryption. | while not hampering other technical solutions such as encryption. | |||
Where such alternative techniques are not possible, acknowledging the | Where such alternative techniques are not possible, acknowledging the | |||
shortcoming could clarify and bring to light the trade-offs that we | shortcoming could clarify and bring to light the trade-offs that we | |||
have accepted in our Internet system. | have accepted in our Internet system. | |||
Ironically, we advocate for connectivity and believe expressing | Ironically, we advocate for connectivity and believe expressing | |||
oneself on the Internet is a human right, but when a war erupts, we | oneself on the Internet is a human right, but when a war erupts, we | |||
resort to tools that impact that very concept. For example, some | resort to tools that impact that very concept. For example, some | |||
believe via imposing sanctions on critical properties of the | believe that, by imposing sanctions on critical properties of the | |||
Internet, we can punish the perpetrators of a war. The Regional | Internet, we can punish the perpetrators of a war. The Regional | |||
Internet Registries that are in charge of registration of IP | Internet Registries that are in charge of registration of IP | |||
addresses have shown resilience to these requests. However, some | addresses have shown resilience to these requests. However, some | |||
tech-companies, for example Cogent [Roth2022], decided not to serve | tech companies (for example, Cogent [Roth2022]) decided not to serve | |||
sanctioned countries and over-comply with sanctions. Over-compliance | sanctioned countries and overcomplied with sanctions. Overcompliance | |||
with sanctions could hamper ordinary people's access to the Internet. | with sanctions could hamper ordinary people's access to the Internet | |||
[Badii2023] | [Badii2023]. | |||
Perhaps we can solve some of these problems by undertaking a thorough | Perhaps we can solve some of these problems by undertaking a thorough | |||
impact assessment and contextualization to reveal how and why | impact assessment and contextualization to reveal how and why | |||
Internet protocols affect human rights (something Fidler and I argued | Internet protocols affect human rights (something Fidler and I argued | |||
for [Badii2021]). Contextualization and impact assessment can reveal | for [Badii2021]). Contextualization and impact assessment can reveal | |||
how each Internet protocol or each line of code, in which systems, | how each Internet protocol or each line of code, in which systems, | |||
have an impact on which and whose human rights. | have an impact on which and whose human rights. | |||
The HRPC RG (which I am a part of) and the larger human rights and | The HRPC RG (which I am a part of) and the larger human rights and | |||
policy analyst communities are still struggling to analyze legal, | policy analyst communities are still struggling to analyze legal, | |||
social and market factors alongside the protocols to have a good | social, and market factors alongside the protocols to have a good | |||
understanding of what has an impact and what has to be changed. It | understanding of what has an impact and what has to be changed. It | |||
is hard, but it is not impossible. If we thoroughly document and | is hard, but it is not impossible. If we thoroughly document and | |||
research the lifecycle of an Internet protocol and contextualize it, | research the lifecycle of an Internet protocol and contextualize it, | |||
we might have a better understanding of how and if we can actually | we might have a better understanding of which parts of the protocol | |||
fix which parts of the protocol in order to protect human rights. | to fix and how to fix them in order to protect human rights. | |||
Overall, the revelations did, to some extent, contribute to the | Overall, the revelations did, to some extent, contribute to the | |||
evolution of our ideas and perspectives. Our next step should be to | evolution of our ideas and perspectives. Our next step should be to | |||
undertake research on the impact of Internet systems (including | undertake research on the impact of Internet systems (including | |||
Internet protocols) on human rights, promote the implementation of | Internet protocols) on human rights, promote the implementation of | |||
protocols good for human rights through policy and advocacy and focus | protocols good for human rights through policy and advocacy, and | |||
on which technical parts we can standardize to help with more | focus on which technical parts we can standardize to help with more | |||
widespread implementation of human rights enabling Internet | widespread implementation of human-rights-enabling Internet | |||
protocols. | protocols. | |||
5. Steven M. Bellovin: Governments and Cryptography: The Crypto Wars | 5. Steven M. Bellovin: Governments and Cryptography: The Crypto Wars | |||
5.1. Historical Background | 5.1. Historical Background | |||
It’s not a secret: many governments in the world don’t like it when | It's not a secret: many governments in the world don't like it when | |||
people encrypt their traffic. More precisely, they like strong | people encrypt their traffic. More precisely, they like strong | |||
cryptography for themselves but not for others, whether those others | cryptography for themselves but not for others, whether those others | |||
are private citizens or other countries. But the history is longer | are private citizens or other countries. But the history is longer | |||
and more complex than that. | and more complex than that. | |||
For much of written history, both governments and individuals used | For much of written history, both governments and individuals used | |||
cryptography to protect their messages. To cite just one famous | cryptography to protect their messages. To cite just one famous | |||
example, Julius Caesar is said to have encrypted messages by shifting | example, Julius Caesar is said to have encrypted messages by shifting | |||
letters in the alphabet by 3 [Kahn1996]. In modern parlance, 3 was | letters in the alphabet by 3 [Kahn1996]. In modern parlance, 3 was | |||
the key, and each letter was encrypted with | the key, and each letter was encrypted with | |||
C[i] = (P[i] + 3) mod 23 | C[i] = (P[i] + 3) mod 23 | |||
(The Latin alphabet of his time had only 23 letters.) Known Arabic | (The Latin alphabet of his time had only 23 letters.) Known Arabic | |||
writings on cryptanalysis go back to at least the 8th century; their | writings on cryptanalysis go back to at least the 8th century; their | |||
sophistication shows that encryption was reasonably commonly used. | sophistication shows that encryption was reasonably commonly used. | |||
In the 9th century, Abu Yusuf Ya’qub ibn ‘Ishaq aṣ-Ṣabbah al-Kindi | In the 9th century, Abū Yūsuf Yaʻqūb ibn ʼIsḥāq aṣ-Ṣabbāḥ al-Kindī | |||
developed and wrote about frequency analysis as a way to crack | developed and wrote about frequency analysis as a way to crack | |||
ciphers [Borda2011],[Kahn1996]. | ciphers [Borda2011] [Kahn1996]. | |||
In an era of minimal literacy, though, there wasn’t that much use of | In an era of minimal literacy, though, there wasn't that much use of | |||
encryption, simply because most people could neither read nor write. | encryption, simply because most people could neither read nor write. | |||
Governments used encryption for diplomatic messages, and | Governments used encryption for diplomatic messages, and | |||
cryptanalysts followed close behind. The famed Black Chambers of the | cryptanalysts followed close behind. The famed Black Chambers of the | |||
Renaissance era read messages from many different governments, while | Renaissance era read messages from many different governments, while | |||
early cryptographers devised stronger and stronger ciphers | early cryptographers devised stronger and stronger ciphers | |||
[Kahn1996]. In Elizabethan times in England, Sir Francis | [Kahn1996]. In Elizabethan times in England, Sir Francis | |||
Walsingham’s intelligence agency intercepted and decrypted messages | Walsingham's intelligence agency intercepted and decrypted messages | |||
from Mary, Queen of Scots; these messages formed some of the | from Mary, Queen of Scots; these messages formed some of the | |||
strongest evidence against her and eventually led to her execution | strongest evidence against her and eventually led to her execution | |||
[Kahn1996]. | [Kahn1996]. | |||
This pattern continued for centuries. In the United States, Thomas | This pattern continued for centuries. In the United States, Thomas | |||
Jefferson invented the so-called wheel cipher in the late 18th | Jefferson invented the so-called wheel cipher in the late 18th | |||
century; it was reinvented about 100 years later by Etienne Bazeries | century; it was reinvented about 100 years later by Étienne Bazeries | |||
and used as a standard American military cipher well into World War | and used as a standard American military cipher well into World War | |||
II [Kahn1996]. Jefferson and other statesmen of that era regularly | II [Kahn1996]. Jefferson and other statesmen of the late 18th and | |||
used cryptography when communicating with each other. An encrypted | early 19th centuries regularly used cryptography when communicating | |||
message was even part of the evidence introduced in Aaron Burr’s 1807 | with each other. An encrypted message was even part of the evidence | |||
trial for treason [Kerr2020],[Kahn1996]. Edgar Allan Poe claimed | introduced in Aaron Burr's 1807 trial for treason [Kerr2020] | |||
that he could cryptanalyze any message sent to him [Kahn1996]. | [Kahn1996]. Edgar Allan Poe claimed that he could cryptanalyze any | |||
message sent to him [Kahn1996]. | ||||
The telegraph era upped the ante. In the U.S., just a year after | The telegraph era upped the ante. In the US, just a year after | |||
Samuel Morse deployed his first telegraph line between Baltimore and | Samuel Morse deployed his first telegraph line between Baltimore and | |||
Washington, his business partner, Francis Smith, published a codebook | Washington, his business partner, Francis Smith, published a codebook | |||
to help customers protect their traffic from prying eyes [Smith1845]. | to help customers protect their traffic from prying eyes [Smith1845]. | |||
In 1870, Britain nationalized its domestic telegraph network; in | In 1870, Britain nationalized its domestic telegraph network; in | |||
response, Robert Slater published a more sophisticated codebook | response, Robert Slater published a more sophisticated codebook | |||
[Slater1870]. On the government side, Britain took advantage of its | [Slater1870]. On the government side, Britain took advantage of its | |||
position as the central node in the world’s international telegraphic | position as the central node in the world's international telegraphic | |||
networks to read a great deal of traffic passing through the country | networks to read a great deal of traffic passing through the country | |||
[Headrick1991],[Kennedy1971]. They used this ability strategically, | [Headrick1991] [Kennedy1971]. They used this ability strategically, | |||
too—when war broke out in 1914, the British Navy cut Germany’s | too -- when war broke out in 1914, the British Navy cut Germany's | |||
undersea telegraph cables, forcing them to use radio; an intercept of | undersea telegraph cables, forcing them to use radio; an intercept of | |||
the so-called Zimmermann telegram, when cryptanalyzed, arguably led | the so-called Zimmermann telegram, when cryptanalyzed, arguably led | |||
to American entry into the war and thence to Germany’s defeat. Once | to American entry into the war and thence to Germany's defeat. Once | |||
the U.S. entered the war, it required users of international | the US entered the war, it required users of international telegraph | |||
telegraph lines to deposit copies of the codebooks they used for | lines to deposit copies of the codebooks they used for compression, | |||
compression, so that censors could check messages for prohibited | so that censors could check messages for prohibited content | |||
content [Kahn1996]. | [Kahn1996]. | |||
In Victorian Britain, private citizens, often lovers, used encryption | In Victorian Britain, private citizens, often lovers, used encryption | |||
in newspapers’ Personal columns to communicate without their parents’ | in newspapers' personal columns to communicate without their parents' | |||
knowledge. Charles Wheatstone and Charles Babbage used to solve | knowledge. Charles Wheatstone and Charles Babbage used to solve | |||
these elementary ciphers routinely, for their own amusement | these elementary ciphers routinely for their own amusement | |||
[Kahn1996]. | [Kahn1996]. | |||
This pattern continued for many years. Governments regularly used | This pattern continued for many years. Governments regularly used | |||
ciphers and codes, while other countries tried to break them; private | ciphers and codes, while other countries tried to break them; private | |||
individuals would sometimes use encryption but not often, and rarely | individuals would sometimes use encryption but not often, and rarely | |||
well. But the two world wars marked a sea change, one that would | well. But the two World Wars marked a sea change, one that would | |||
soon reverberate into the civilian world. | soon reverberate into the civilian world. | |||
The first World War featured vast troop movements by all parties; | The first World War featured vast troop movements by all parties; | |||
this in turn required a lot of encrypted communications, often by | this in turn required a lot of encrypted communications, often by | |||
telegraph or radio. These messages were often easily intercepted in | telegraph or radio. These messages were often easily intercepted in | |||
bulk. Furthermore, the difficulty of encrypting large volumes of | bulk. Furthermore, the difficulty of encrypting large volumes of | |||
plaintext led to the development of a variety of mechanical | plaintext led to the development of a variety of mechanical | |||
encryption devices, including Germany’s famed Enigma machine. World | encryption devices, including Germany's famed Enigma machine. World | |||
War II amplified both trends. It also gave rise to machine-assisted | War II amplified both trends. It also gave rise to machine-assisted | |||
cryptanalysis, such as the United Kingdom’s bombes (derived from an | cryptanalysis, such as the United Kingdom's bombes (derived from an | |||
earlier Polish design) and Colossus machine, and the American’s | earlier Polish design) and Colossus machine, and the American's | |||
device for cracking Japan’s PURPLE system. The U.S. also used punch | device for cracking Japan's PURPLE system. The US also used punch | |||
card-based tabulators to assist in breaking other Japanese codes, | card-based tabulators to assist in breaking other Japanese codes, | |||
such as the Japanese Imperial Navy’s JN-25 [Kahn1996],[Rowlett1998]. | such as the Japanese Imperial Navy's JN-25 [Kahn1996] [Rowlett1998]. | |||
These developments set the stage for the postwar SIGINT—Signals | These developments set the stage for the postwar SIGINT (Signals | |||
Intelligence—environment. Many intra-government messages were sent | Intelligence) environment. Many intragovernmental messages were sent | |||
by radio, making them easy to intercept; advanced cryptanalytic | by radio, making them easy to intercept; advanced cryptanalytic | |||
machines made cryptanalysis easier. Ciphers were getting stronger, | machines made cryptanalysis easier. Ciphers were getting stronger, | |||
though, and government SIGINT agencies did not want to give up their | though, and government SIGINT agencies did not want to give up their | |||
access to data. While there were undoubtedly many developments, two | access to data. While there were undoubtedly many developments, two | |||
are well known. | are well known. | |||
The first involved CryptoAG, a Swedish (and later Swiss) manufacturer | The first involved CryptoAG, a Swedish (and later Swiss) manufacturer | |||
of encryption devices. The head of that company, Boris Hagelin, was | of encryption devices. The head of that company, Boris Hagelin, was | |||
a friend of William F. Friedman, a pioneering American cryptologist. | a friend of William F. Friedman, a pioneering American cryptologist. | |||
During the 1950s, CryptoAG sold its devices to other governments; | During the 1950s, CryptoAG sold its devices to other governments; | |||
apparently at Friedman’s behest, Hagelin weakened the encryption in a | apparently at Friedman's behest, Hagelin weakened the encryption in a | |||
way that let the NSA read the traffic [Miller2020]. | way that let the NSA read the traffic [Miller2020]. | |||
The story involving the British is less well-documented and less | The story involving the British is less well-documented and less | |||
clear. When some of Britain’s former colonies gained their | clear. When some of Britain's former colonies gained their | |||
independence, the British government gave them captured, war surplus | independence, the British government gave them captured, war-surplus | |||
Enigma machines to protect their own traffic. Some authors contend | Enigma machines to protect their own traffic. Some authors contend | |||
that this was deceptive, in that these former colonies did not | that this was deceptive, in that these former colonies did not | |||
realize that the British could read Enigma-protected traffic; others | realize that the British could read Enigma-protected traffic; others | |||
claim that this was obvious but that these countries didn’t care: | claim that this was obvious but that these countries didn't care: | |||
Britain was no longer their enemy; it was neighboring countries they | Britain was no longer their enemy; it was neighboring countries they | |||
were worried about. Again, though, this concerned governmental use | were worried about. Again, though, this concerned governmental use | |||
of encryption [Kahn1996],[Baldwin2022]. There was still little | of encryption [Kahn1996] [Baldwin2022]. There was still little | |||
private use. | private use. | |||
5.2. The Crypto Wars Begin | 5.2. The Crypto Wars Begin | |||
The modern era of conflict between individual’s desire for privacy | The modern era of conflict between an individual's desire for privacy | |||
and government desires to read traffic began around 1972. The grain | and the government desires to read traffic began around 1972. The | |||
harvest in the U.S.S.R. had failed; since relations between the | grain harvest in the USSR had failed; since relations between the | |||
Soviet Union and the United States were temporarily comparatively | Soviet Union and the United States were temporarily comparatively | |||
warm, the Soviet grain company— an arm of the Soviet government, of | warm, the Soviet grain company -- an arm of the Soviet government, of | |||
course— entered into negotiations with private American companies. | course -- entered into negotiations with private American companies. | |||
Unknown to Americans at the time, Soviet intelligence was | Unknown to Americans at the time, Soviet intelligence was | |||
intercepting the phone calls of the American negotiating teams. In | intercepting the phone calls of the American negotiating teams. In | |||
other words, private companies had to deal with state actors as a | other words, private companies had to deal with state actors as a | |||
threat. Eventually, U.S. intelligence learned of this, and came to a | threat. Eventually, US intelligence learned of this and came to a | |||
realization: the private sector needed strong cryptography, too, to | realization: the private sector needed strong cryptography, too, to | |||
protect American national interests [Broad1982],[Johnson1998]). This | protect American national interests [Broad1982] [Johnson1998]. This | |||
underscored the need for strong cryptography to protect American | underscored the need for strong cryptography to protect American | |||
civilian traffic—but the SIGINT people were unhappy at the thought of | civilian traffic -- but the SIGINT people were unhappy at the thought | |||
more encryption that they couldn’t break. | of more encryption that they couldn't break. | |||
Meanwhile, the U.S. was concerned about protecting unclassified data | Meanwhile, the US was concerned about protecting unclassified data | |||
[Landau2014]. In 1973 and again in 1974, the National Bureau of | [Landau2014]. In 1973 and again in 1974, the National Bureau of | |||
Standards (NBS) put out a call for a strong, modern encryption | Standards (NBS) put out a call for a strong, modern encryption | |||
algorithm. IBM submitted Lucifer, an internally developed algorithm | algorithm. IBM submitted Lucifer, an internally developed algorithm | |||
based on what has become known as a 16-round Feistel network. The | based on what has become known as a 16-round Feistel network. The | |||
original version used a long key. It seemed quite strong, so NBS | original version used a long key. It seemed quite strong, so NBS | |||
sent it off to the NSA to get their take. The eventual design, which | sent it off to the NSA to get their take. The eventual design, which | |||
was adopted in 1976 as the Data Encryption Standard (DES), differed | was adopted in 1976 as the Data Encryption Standard (DES), differed | |||
in some important ways from Lucifer. First, the so-called S-boxes, | in some important ways from Lucifer. First, the so-called S-boxes, | |||
the source of the cryptologic strength of DES, were changed, and were | the source of the cryptologic strength of DES, were changed, and were | |||
now demonstrably not composed of random integers. Many researchers | now demonstrably not composed of random integers. Many researchers | |||
alleged that the S-boxes contained an NSA back door. It took nearly | alleged that the S-boxes contained an NSA back door. It took nearly | |||
20 years for the truth to come out: the S-boxes were in fact | 20 years for the truth to come out: the S-boxes were in fact | |||
strengthened, not weakened. Most likely, IBM independently | strengthened, not weakened. Most likely, IBM independently | |||
discovered the attack now known as differential cryptanalysis, though | discovered the attack now known as differential cryptanalysis, though | |||
some scholars suspect that the NSA told them about it. The non- | some scholars suspect that the NSA told them about it. The nonrandom | |||
random S-boxes protected against this attack. The second change, | S-boxes protected against this attack. The second change, though, | |||
though, was clearly insisted on by the NSA: the key size was | was clearly insisted on by the NSA: the key size was shortened, from | |||
shortened, from Lucifer’s 112 bits to DES’s 56 bits. We now know | Lucifer's 112 bits to DES's 56 bits. We now know that the NSA wanted | |||
that the NSA wanted a 48-bit key size, while IBM wanted 64 bits; they | a 48-bit key size, while IBM wanted 64 bits; they compromised at 56 | |||
compromised at 56 bits. | bits. | |||
Whitfield Diffie and Martin Hellman, at Stanford University, wondered | Whitfield Diffie and Martin Hellman, at Stanford University, wondered | |||
about the 56-bit keys. In 1979, they published a paper demonstrating | about the 56-bit keys. In 1979, they published a paper demonstrating | |||
that the U.S. government, but few others, could afford to build a | that the US government, but few others, could afford to build a | |||
brute-force cracking machine, one that could try all 2^56 possible | brute-force cracking machine, one that could try all 2^56 possible | |||
keys to crack a message. NSA denied tampering with the design; a | keys to crack a message. NSA denied tampering with the design; a | |||
Senate investigating committee found that that was correct, but did | Senate investigating committee found that assertion to be correct, | |||
not discuss the shortened key length issue. | but did not discuss the shortened key length issue. | |||
This, however, was not Diffie and Hellman’s greatest contribution to | This, however, was not Diffie and Hellman's greatest contribution to | |||
cryptology. A few years earlier, they published a paper inventing | cryptology. A few years earlier, they had published a paper | |||
what is now known as public key cryptography. (In fact, public key | inventing what is now known as public key cryptography. (In fact, | |||
encryption had been invented a few years earlier at GCHQ, but they | public key encryption had been invented a few years earlier at UK | |||
kept their discovery classified until 1997.) In 1978, Ronald Rivest, | Government Communications Headquarters (GCHQ), but they kept their | |||
Adi Shamir, and Leonard Adleman devised the RSA algorithm, which made | discovery classified until 1997.) In 1978, Ronald Rivest, Adi | |||
it usable. (An NSA employee, acting on his own, sent a letter | Shamir, and Leonard Adleman devised the RSA algorithm, which made it | |||
warning that academic conferences on cryptology might violate U.S. | usable. (An NSA employee, acting on his own, sent a letter warning | |||
export laws.) | that academic conferences on cryptology might violate US export | |||
laws.) | ||||
Around the same time, George Davida at the University of Wisconsin | Around the same time, George Davida at the University of Wisconsin | |||
applied for a patent on a stream cipher; the NSA slapped a secrecy | applied for a patent on a stream cipher; the NSA slapped a secrecy | |||
order on the application. This barred him from even talking about | order on the application. This barred him from even talking about | |||
his invention. The publicity was devastating; the NSA had to back | his invention. The publicity was devastating; the NSA had to back | |||
down. | down. | |||
The Crypto Wars had thus begun: civilians were inventing strong | The Crypto Wars had thus begun: civilians were inventing strong | |||
encryption systems, and the NSA was tampering with them or trying to | encryption systems, and the NSA was tampering with them or trying to | |||
suppress them. Bobby Inman, the then-director of the NSA, tried | suppress them. Bobby Inman, the then-director of the NSA, tried | |||
creating a voluntary review process for academic papers, but very few | creating a voluntary review process for academic papers, but very few | |||
researchers were interested in participating [Landau1988]. | researchers were interested in participating [Landau1988]. | |||
There were few major public battles during the 1980s, because there | There were few major public battles during the 1980s because there | |||
were few new major use cases for civilian cryptography during that | were few new major use cases for civilian cryptography during that | |||
time. There was one notable incident, though: Shamir, Amos Fiat, and | time. There was one notable incident, though: Shamir, Amos Fiat, and | |||
Uriel Feige invented zero-knowledge proofs and applied for a US | Uriel Feige invented zero-knowledge proofs and applied for a US | |||
patent. In response, the US Army slapped a secrecy order on the | patent. In response, the US Army slapped a secrecy order on the | |||
patent. After a great deal of public outrage and intervention by, of | patent. After a great deal of public outrage and intervention by, of | |||
all organizations, the NSA, the order was lifted on very narrow | all organizations, the NSA, the order was lifted on very narrow | |||
grounds: the inventors were not American, and had been discussing | grounds: the inventors were not American, and they had been | |||
their work all over the world [Landau1988]. | discussing their work all over the world [Landau1988]. | |||
In the 1990s, though, everything changed. | In the 1990s, though, everything changed. | |||
5.3. The Battle is Joined | 5.3. The Battle Is Joined | |||
There were three major developments in cryptography in the early | There were three major developments in cryptography in the early | |||
1990s. First, Phil Zimmermann released PGP (Pretty Good Privacy), a | 1990s. First, Phil Zimmermann released PGP (Pretty Good Privacy), a | |||
package to encrypt email messages. In 1993, AT&T planned to release | package to encrypt email messages. In 1993, AT&T planned to release | |||
the TSD-3600, an easy-to-use phone encryptor aimed at business | the TSD-3600, an easy-to-use phone encryptor aimed at business | |||
travelers. Shortly after that, the Netscape Corporation released SSL | travelers. Shortly after that, the Netscape Communications | |||
(Secure Socket Layer) as a way to enable web-based commerce using | Corporation released SSL (Secure Socket Layer) as a way to enable | |||
their browser and web server. All of these were seen as threats by | web-based commerce using their browser and web server. All of these | |||
the NSA and the FBI. | were seen as threats by the NSA and the FBI. | |||
PGP was, at least arguably, covered by what was known as ITAR, the | PGP was, at least arguably, covered by what was known as ITAR, the | |||
International Trafficking in Arms Regulations—under American law, | International Trafficking in Arms Regulations -- under American law, | |||
encryption software was regarded as a weapon, so exports required a | encryption software was regarded as a weapon, so exports required a | |||
license. It was also alleged to infringe the patents on the RSA | license. It was also alleged to infringe the patents on the RSA | |||
algorithm. Needless to say, both issues were problematic for what | algorithm. Needless to say, both issues were problematic for what | |||
was intended to be open source software. Eventually, the criminal | was intended to be open source software. Eventually, the criminal | |||
investigation into Zimmermann’s role in the spread of PGP overseas | investigation into Zimmermann's role in the spread of PGP overseas | |||
was dropped, but the threat of such investigations remained to deter | was dropped, but the threat of such investigations remained to deter | |||
others[Levy2001]. | others [Levy2001]. | |||
The TSD-3600 was another matter. AT&T was a major corporation that | The TSD-3600 was another matter. AT&T was a major corporation that | |||
did not want to pick a fight with the U.S. government, but | did not want to pick a fight with the US government, but | |||
international business travelers were seen as a major market for the | international business travelers were seen as a major market for the | |||
device. At the government’s “request”, the DES chip was replaced | device. At the government's "request", the DES chip was replaced | |||
with what was known as the Clipper Chip. The Clipper chip used | with what was known as the Clipper chip. The Clipper chip used | |||
Skipjack, a cipher with 80-bit keys; it was thus much stronger | Skipjack, a cipher with 80-bit keys; it was thus much stronger | |||
against brute force attacks than DES. However, it provided “key | against brute-force attacks than DES. However, it provided "key | |||
escrow”. Without going into any details, the key escrow mechanism | escrow". Without going into any details, the key escrow mechanism | |||
allowed U.S. government eavesdroppers to consult a pair of | allowed US government eavesdroppers to consult a pair of (presumably | |||
(presumably secure) internal databases and decrypt all communications | secure) internal databases and decrypt all communications protected | |||
protected by the chip. The Clipper chip proved to be extremely | by the chip. The Clipper chip proved to be extremely unpopular with | |||
unpopular with industry; that AT&T Bell Labs’ Matt Blaze found a | industry; that AT&T Bell Labs' Matt Blaze found a weakness in the | |||
weakness in the design[Blaze1994], one that let you use Skipjack | design [Blaze1994], one that let you use Skipjack without the key | |||
without the key escrow feature, didn’t help its reputation. | escrow feature, didn't help its reputation. | |||
The third major development, SSL, was even trickier. SSL was aimed | The third major development, SSL, was even trickier. SSL was aimed | |||
at e-commerce, and of course Netscape wanted to be able to sell its | at e-commerce, and of course Netscape wanted to be able to sell its | |||
products outside the US. That would require an export license, so | products outside the US. That would require an export license, so | |||
they made a deal with the government: non-American users would | they made a deal with the government: non-American users would | |||
receive a version that used 40-bit keys, a key length far shorter | receive a version that used 40-bit keys, a key length far shorter | |||
than what the NSA had agreed to 20 years earlier. (To get ahead of | than what the NSA had agreed to 20 years earlier. (To get ahead of | |||
the story: there was a compromise mode of operation, wherein an | the story: there was a compromise mode of operation, wherein an | |||
export-grade browser could use strong encryption when talking to a | export-grade browser could use strong encryption when talking to a | |||
financial institution. This hybrid mode led to cryptographic | financial institution. This hybrid mode led to cryptographic | |||
weaknesses discovered some 20 years later[Adrian2015].) | weaknesses discovered some 20 years later [Adrian2015].) | |||
Technologists and American industry pushed back. The IETF adopted | Technologists and American industry pushed back. The IETF adopted | |||
the Danvers Doctrine, described in [RFC3365]: | the Danvers Doctrine, described in [RFC3365]: | |||
At the 32nd IETF held in Danvers, Massachusetts during April of | | At the 32cd [sic] IETF held in Danvers, Massachusetts during April | |||
1995 the IESG asked the plenary for a consensus on the strength of | | of 1995 the IESG asked the plenary for a consensus on the strength | |||
security that should be provided by IETF standards. Although the | | of security that should be provided by IETF standards. Although | |||
immediate issue before the IETF was whether or not to support | | the immediate issue before the IETF was whether or not to support | |||
“export” grade security (which is to say weak security) in | | "export" grade security (which is to say weak security) in | |||
standards, the question raised the generic issue of security in | | standards the question raised the generic issue of security in | |||
general. | | general. | |||
| | ||||
The overwhelming consensus was that the IETF should standardize on | | The overwhelming consensus was that the IETF should standardize on | |||
the use of the best security available, regardless of national | | the use of the best security available, regardless of national | |||
policies. This consensus is often referred to as the “Danvers | | policies. This consensus is often referred to as the "Danvers | |||
Doctrine”. | | Doctrine". | |||
Then American companies started losing business to their overseas | Then American companies started losing business to their overseas | |||
competitors, who did not have to comply with U.S. export laws. All | competitors, who did not have to comply with US export laws. All of | |||
of this led to what seemed like a happy conclusion: the U.S. | this led to what seemed like a happy conclusion: the US government | |||
government drastically loosened its export rules for cryptographic | drastically loosened its export rules for cryptographic software. | |||
software. All was well—or so it seemed… | All was well -- or so it seemed... | |||
5.4. The Hidden Battle | 5.4. The Hidden Battle | |||
Strong cryptography was here to stay, and it was no longer an | Strong cryptography was here to stay, and it was no longer an | |||
American monopoly, if indeed it ever was. The Information Assurance | American monopoly, if indeed it ever was. The Information Assurance | |||
Directorate of the NSA, the part of the agency that is supposed to | Directorate of the NSA, the part of the agency that is supposed to | |||
protect U.S. data, was pleased by the spread of strong cryptography. | protect US data, was pleased by the spread of strong cryptography. | |||
When the Advanced Encryption Standard (AES) competition was held, | When the Advanced Encryption Standard (AES) competition was held, | |||
there were no allegations of malign NSA interference; in fact, the | there were no allegations of malign NSA interference; in fact, the | |||
winning entry was devised by two Europeans, Joan Daemen and Vincent | winning entry was devised by two Europeans, Joan Daemen and Vincent | |||
Rijmen. But the NSA and its SIGINT needs did not go away—the agency | Rijmen. But the NSA and its SIGINT needs did not go away -- the | |||
merely adopted other techniques. | agency merely adopted other techniques. | |||
I have often noted that one doesn’t go through strong security, one | I have often noted that one doesn't go through strong security, one | |||
goes around it. When strong encryption became more common and much | goes around it. When strong encryption became more common and much | |||
more necessary, the NSA started going around it, by targeting | more necessary, the NSA started going around it, by targeting | |||
computers and the software that they run. And it seems clear that | computers and the software that they run. And it seems clear that | |||
they believe that AES is quite strong; they’ve even endorsed its use | they believe that AES is quite strong; they've even endorsed its use | |||
for protecting TOP SECRET information. But there was an asterisk | for protecting TOP SECRET information. But there was an asterisk | |||
attached to that endorsement: AES is suitable if and only if properly | attached to that endorsement: AES is suitable if and only if properly | |||
used and implemented. Therein lies the rub. | used and implemented. Therein lies the rub. | |||
The first apparent attempt to tamper with outside cryptographic | The first apparent attempt to tamper with outside cryptographic | |||
mechanisms was discovered in 2007, when two Microsoft researchers, | mechanisms was discovered in 2007, when two Microsoft researchers, | |||
Dan Shumow and Niels Ferguson, noted an odd property of a NIST- | Dan Shumow and Niels Ferguson, noted an odd property of a NIST- | |||
standardized random number generator, DUAL_EC_DRBG. (The NBS had | standardized random number generator, DUAL_EC_DRBG. (The NBS had | |||
been renamed to NIST, the National Institute of Standards and | been renamed to NIST, the National Institute of Standards and | |||
Technology.) Random numbers are vital for cryptography, but Shumow | Technology.) Random numbers are vital for cryptography, but Shumow | |||
and Ferguson showed that if certain constants in DUAL_EC_DRBG were | and Ferguson showed that if certain constants in DUAL_EC_DRBG were | |||
chosen in a particular way with a known-but-hidden other number, | chosen in a particular way with a known-but-hidden other number, | |||
whoever knew that number could predict all future random numbers from | whoever knew that number could predict all future random numbers from | |||
a system given a few sample bytes to start from [Kostyuk2022]. These | a system given a few sample bytes to start from [Kostyuk2022]. These | |||
sample bytes could come from known keys, nonces, or anything else. | sample bytes could come from known keys, nonces, or anything else. | |||
Where did the constants in DUAL_EC_DRBG come from and how were they | Where did the constants in DUAL_EC_DRBG come from and how were they | |||
chosen or generated? No one who knows is talking. But although | chosen or generated? No one who knows is talking. But although | |||
cryptographers and security specialists were very suspicious—Bruce | cryptographers and security specialists were very suspicious -- Bruce | |||
Schneier wrote in 2007, before more facts came out, that “both NIST | Schneier wrote in 2007, before more facts came out, that "both NIST | |||
and the NSA have some explaining to do”; I assigned my students | and the NSA have some explaining to do"; I assigned my students | |||
reading on the topic—the issue didn’t really get any traction until | reading on the topic -- the issue didn't really get any traction | |||
six years later, when among the papers that Edward Snowden disclosed | until six years later, when among the papers that Edward Snowden | |||
was the information that the NSA had indeed tampered with a major | disclosed was the information that the NSA had indeed tampered with a | |||
cryptographic standard, though published reports did not specifically | major cryptographic standard, though published reports did not | |||
name DUAL_EC_DRBG or explain what the purpose was. | specifically name DUAL_EC_DRBG or explain what the purpose was. | |||
The revelations didn’t stop there. There have been allegations that | The revelations didn't stop there. There have been allegations that | |||
the NSA paid some companies to use DUAL_EC_DRBG in their products. | the NSA paid some companies to use DUAL_EC_DRBG in their products. | |||
Some people have claimed that there were attempts to modify some IETF | Some people have claimed that there were attempts to modify some IETF | |||
standards to make enough random bytes visible, to aid in exploiting | standards to make enough random bytes visible, to aid in exploiting | |||
the random number generator. A major vendor of networking gear, | the random number generator. A major vendor of networking gear, | |||
Juniper, did use DUAL_EC_DRBG in some of its products, but with | Juniper, did use DUAL_EC_DRBG in some of its products, but with | |||
different constants [Checkoway2016]. Where did these come from? | different constants [Checkoway2016]. Where did these come from? | |||
Were they from the NSA or some other government? Could their source | Were they from the NSA or some other government? Could their source | |||
tree have been hacked by an intelligence agency? There was a | tree have been hacked by an intelligence agency? There was a | |||
different hack of their code at around the same time[Moore2015]. No | different hack of their code at around the same time [Moore2015]. No | |||
one is talking. | one is talking. | |||
The Snowden revelations also included data suggesting that the NSA | The Snowden revelations also included data suggesting that the NSA | |||
had a worldwide eavesdropping network and a group that tried very | had a worldwide eavesdropping network and a group that tried very | |||
specific, targeted hacks on very specific targets’ systems. In | specific, targeted hacks on very specific targets' systems. In | |||
retrospect, neither is surprising: “spies gonna spy”. The NSA’s | retrospect, neither is surprising: "spies gonna spy". The NSA's | |||
business is signals intelligence; of course they’re going to try to | business is signals intelligence; of course they're going to try to | |||
intercept traffic. Indeed, the DUAL_EC_DRBG tampering is useless to | intercept traffic. Indeed, the DUAL_EC_DRBG tampering is useless to | |||
anyone who has not collected messages to decrypt. And targeted hacks | anyone who has not collected messages to decrypt. And targeted hacks | |||
are a natural way around strong encryption: collect the data before | are a natural way around strong encryption: collect the data before | |||
it is encrypted or after it is decrypted, and don’t worry about the | it is encrypted or after it is decrypted, and don't worry about the | |||
strength of the algorithms. | strength of the algorithms. | |||
The privacy community, worldwide, was appalled, though perhaps they | The privacy community, worldwide, was appalled, though perhaps they | |||
shouldn’t have been. It calls to mind the line that Claude Rains' | shouldn't have been. It calls to mind the line that Claude Rains' | |||
character uttered in the movie Casablanca [Curtiz]: “I’m shocked, | character uttered in the movie Casablanca [Curtiz]: "I'm shocked, | |||
shocked to find that gambling is going on in here.” The immediate and | shocked to find that gambling is going on in here." The immediate | |||
continuing reaction was to deploy more encryption. The standards | and continuing reaction was to deploy more encryption. The standards | |||
have long existed; what was missing was adoption. One barrier was | have long existed; what was missing was adoption. One barrier was | |||
the difficulty and expense of getting certificates to use with TLS, | the difficulty and expense of getting certificates to use with TLS, | |||
the successor to SSL; that void was filled by Let's Encrypt [LE], | the successor to SSL; that void was filled by Let's Encrypt [LE], | |||
which made free certificates easy to get online. Today, most HTTP | which made free certificates easy to get online. Today, most HTTP | |||
traffic is encrypted, so much so that Google’s search engine down- | traffic is encrypted, so much so that Google's search engine down- | |||
ranks sites that do not use it. Major email providers uniformly use | ranks sites that do not use it. Major email providers uniformly use | |||
TLS to protect all traffic. WiFi, though a local area issue, now | TLS to protect all traffic. Wi-Fi, though a local area issue, now | |||
uses much stronger encryption. (It's important to remember that | uses much stronger encryption. (It's important to remember that | |||
security and insecurity have economic components. Security doesn't | security and insecurity have economic components. Security doesn't | |||
have to be perfect to be very useful, if it raises the attackers' | have to be perfect to be very useful, if it raises the attackers' | |||
costs by enough.) | costs by enough.) | |||
The news on the software side is less good. Not a day goes by when | The news on the software side is less good. Not a day goes by when | |||
one does not read of organizations being hit by ransomware. It goes | one does not read of organizations being hit by ransomware. It goes | |||
without saying that any threat actor capable of encrypting disks is | without saying that any threat actor capable of encrypting disks is | |||
also capable of stealing the information on them; indeed, that is a | also capable of stealing the information on them; indeed, that is a | |||
frequent accompanying activity, since the threat of disclosure is | frequent accompanying activity, since the threat of disclosure is | |||
another incentive to pay for those sites that do have good enough | another incentive to pay for those sites that do have good enough | |||
backups. Major vendors have put a lot of effort into securing their | backups. Major vendors have put a lot of effort into securing their | |||
software, but bugs and operational errors by end-user sites persist. | software, but bugs and operational errors by end-user sites persist. | |||
5.5. Whither the IETF? | 5.5. Whither the IETF? | |||
Signal intelligence agencies, not just the NSA, but its peers around | Signal intelligence agencies, not just the NSA, but its peers around | |||
the globe—most major countries have their own—are not going to go | the globe -- most major countries have their own -- are not going to | |||
away. The challenges that have beset the NSA are common to all such | go away. The challenges that have beset the NSA are common to all | |||
agencies, and their solutions are likely the same. The question is | such agencies, and their solutions are likely the same. The question | |||
what should be done to protect individual privacy. A number of | is what should be done to protect individual privacy. A number of | |||
strong democracies, such as Australia and the United Kingdom, are, in | strong democracies, such as Australia and the United Kingdom, are, in | |||
a resumption of the Crypto Wars, moving to restrict encryption. | a resumption of the Crypto Wars, moving to restrict encryption. | |||
Spurred on by complaints from the FBI and other law enforcement | Spurred on by complaints from the FBI and other law enforcement | |||
agencies, the US Congress frequently considers bills to do the same. | agencies, the US Congress frequently considers bills to do the same. | |||
The IETF has long had a commitment to strong, ubiquitous encryption. | The IETF has long had a commitment to strong, ubiquitous encryption. | |||
This is a good thing. It needs to continue, with cryptography and | This is a good thing. It needs to continue, with cryptography and | |||
other security features designed into protocols from the beginning. | other security features designed into protocols from the beginning. | |||
But there is also a need for maintenance. Parameters such as key | But there is also a need for maintenance. Parameters such as key | |||
lengths and modulus sizes age; a value that is acceptable today may | lengths and modulus sizes age; a value that is acceptable today may | |||
not be 10 years hence. (We’ve already seen apparent problems from | not be 10 years hence. (We've already seen apparent problems from | |||
1024-bit moduli specified in an RFC, an RFC that was not modified | 1024-bit moduli specified in an RFC, an RFC that was not modified | |||
when technology improved enough that attacking encryption based on | when technology improved enough that attacking encryption based on | |||
them had become feasible.[Adrian2015]) The IETF can do nothing about | them had become feasible [Adrian2015].) The IETF can do nothing | |||
the code that vendors ship or that sites use, but it can alert the | about the code that vendors ship or that sites use, but it can alert | |||
world that it thinks things have changed. | the world that it thinks things have changed. | |||
Cryptoagility is of increasing importance. In the next very few | Cryptoagility is of increasing importance. In the next very few | |||
years, we will have so-called post-quantum algorithms. Both | years, we will have so-called post-quantum algorithms. Both | |||
protocols and key lengths will need to change, perhaps drastically. | protocols and key lengths will need to change, perhaps drastically. | |||
Is the IETF ready? What will happen to, say, DNSSEC if key lengths | Is the IETF ready? What will happen to, say, DNSSEC if key lengths | |||
become drastically longer? Backwards compatibility will remain | become drastically longer? Backwards compatibility will remain | |||
important, but that, of course, opens the door to other attacks. | important, but that, of course, opens the door to other attacks. | |||
We’ve long thought about them; we need to be sure that our mechanisms | We've long thought about them; we need to be sure that our mechanisms | |||
work—we've been surprised in the past.[BellovinRescorla2006] | work -- we've been surprised in the past [BellovinRescorla2006]. | |||
We also need to worry more about metadata. General Michael Hayden, | We also need to worry more about metadata. General Michael Hayden, | |||
former director of both the NSA and the CIA, once remarked, “We kill | former director of both the NSA and the CIA, once remarked, "We kill | |||
people based on metadata” [Ferran2014]. But caution is necessary; | people based on metadata" [Ferran2014]. But caution is necessary; | |||
attempts to hide metadata can have side-effects. To give a trivial | attempts to hide metadata can have side effects. To give a trivial | |||
example, Tor is quite strong, but if your exit node is in a different | example, Tor is quite strong, but if your exit node is in a different | |||
country than you are in, web sites that use IP geolocation may | country than you are in, web sites that use IP geolocation may | |||
present their content in a language foreign to you. Some sites even | present their content in a language foreign to you. Some sites even | |||
block connections from known Tor exit nodes. More generally, many | block connections from known Tor exit nodes. More generally, many | |||
attempts to hide metadata involve trusting a different party; that | attempts to hide metadata involve trusting a different party; that | |||
party may turn out to be untrustworthy or it may itself become a | party may turn out to be untrustworthy or it may itself become a | |||
target of attack. As another prominent IETFer has remarked, | target of attack. As another prominent IETFer has remarked, | |||
“Insecurity is like entropy; you can’t destroy it but you can move it | "Insecurity is like entropy; you can't destroy it, but you can move | |||
around.” The IETF has done a lot; it needs to do more. And remember | it around." The IETF has done a lot; it needs to do more. And | |||
that the risk here is not just governments acting directly, it's also | remember that the risk here is not just governments acting directly, | |||
private companies that collect the data and sell it to all comers. | it's also private companies that collect the data and sell it to all | |||
comers. | ||||
Finally, the IETF must remember that its middle name is | Finally, the IETF must remember that its middle name is | |||
“Engineering”. To me, one of the attributes of engineering is the art | "Engineering". To me, one of the attributes of engineering is the | |||
of picking the right solution in an over-constrained environment. | art of picking the right solution in an over-constrained environment. | |||
Intelligence agencies won’t go away, nor will national restrictions | Intelligence agencies won't go away, nor will national restrictions | |||
on cryptography. We have to pick the right path while staying true | on cryptography. We have to pick the right path while staying true | |||
to our principles. | to our principles. | |||
6. Acknowledgments | 6. Security Considerations | |||
Susan Landau added many valuable comments to Steve Bellovin's essay. | ||||
We thank Carsten Bormann, Brian Carpenter, Wendy Grossman, Kathleen | ||||
Moriarty, Jan Schaumann, Seth David Schoen, and Paul Wouters for | ||||
comments and review of this text, though that of course doesn't mean | ||||
that they necessrily agree with the text. | ||||
This document was created at the behest of Eliot Lear, who also cat | ||||
herded and did some editing. | ||||
7. Security Considerations | ||||
Each or any of the authors may have forgotten or omitted things or | Each or any of the authors may have forgotten or omitted things or | |||
gotten things wrong. We're sorry if that's the case, but that's in | gotten things wrong. We're sorry if that's the case, but that's in | |||
the nature of a look-back such as this. Such flaws almost certainly | the nature of a look-back such as this. Such flaws almost certainly | |||
won't worsen security or privacy though. | won't worsen security or privacy, though. | |||
8. IANA Considerations | 7. IANA Considerations | |||
No changes to IANA processes are made by this memo. | This document has no IANA actions. | |||
9. Informative References | 8. Informative References | |||
[ACME] IETF, "Automated Certificate Management Environment | [ACME] IETF, "Automated Certificate Management Environment | |||
(ACME)", 2023, <https://datatracker.ietf.org/wg/acme/>. | (acme)", <https://datatracker.ietf.org/wg/acme/about/>. | |||
[Adrian2015] | [Adrian2015] | |||
Adrian, D., Bhargavan, K., Durumeric, Z., Gaudry, P., | Adrian, D., Bhargavan, K., Durumeric, Z., Gaudry, P., | |||
Green, M., Halderman, J. A., and N. Heninger, "Imperfect | Green, M., Halderman, J. A., Heninger, N., Springhall, D., | |||
Forward Secrecy: How Diffie-Hellman Fails in Practice.", | Thomé, E., Valenta, L., VanderSloot, B., Wustrow, E., | |||
Proceedings of the 22th ACM Conference on Computer and | Zanella-Béguelin, S., and P. Zimmermann, "Imperfect | |||
Communications Security (CCS), 2015, | Forward Secrecy: How Diffie-Hellman Fails in Practice", | |||
<https://weakdh.org/imperfect-forward-secrecy.pdf>. | CCS '15: Proceedings of the 22th ACM Conference on | |||
Computer and Communications Security, October 2015, | ||||
<https://dl.acm.org/doi/10.1145/2810103.2813707>. | ||||
[Badii2021] | [Badii2021] | |||
Badiei, F., Fidler, B., and The Pennsylvania State | Badiei, F., Fidler, B., and The Pennsylvania State | |||
University Press, "The Would-Be Technocracy: Evaluating | University Press, "The Would-Be Technocracy: Evaluating | |||
Efforts to Direct and Control Social Change with Internet | Efforts to Direct and Control Social Change with Internet | |||
Protocol Design", Journal of Information Policy, vol. 11, | Protocol Design", Journal of Information Policy, vol. 11, | |||
pp. 376-402, DOI 10.5325/jinfopoli.11.2021.0376, 1 | pp. 376-402, DOI 10.5325/jinfopoli.11.2021.0376, December | |||
December 2021, | 2021, <https://doi.org/10.5325/jinfopoli.11.2021.0376>. | |||
<http://dx.doi.org/10.5325/jinfopoli.11.2021.0376>. | ||||
[Badii2023] | [Badii2023] | |||
Badii, F., "Sanctions and the Internet", 2023, | Badiei, F., "Sanctions and the Internet", Digital Medusa, | |||
<https://digitalmedusa.org/wp-content/uploads/2023/05/ | 2023, <https://digitalmedusa.org/wp- | |||
SanctionsandtheInternet-DigitalMedusa.pdf>. | content/uploads/2023/05/SanctionsandtheInternet- | |||
DigitalMedusa.pdf>. | ||||
[Baldwin2022] | [Baldwin2022] | |||
Baldwin, M., "Did Britain Sell Enigmas Postwar?", Dr. | Baldwin, M., "Did Britain sell Enigmas postwar?", Dr. | |||
Enigma (blog), 2022, <https://drenigma.org/2022/03/02/did- | Enigma, March 2022, <https://drenigma.org/2022/03/02/did- | |||
britain-sell-enigmas-postwar/>. | britain-sell-enigmas-postwar/>. | |||
[BellovinRescorla2006] | [BellovinRescorla2006] | |||
Bellovin, S. M. and E. K. Rescorla, "Deploying a New Hash | Bellovin, S. M. and E. K. Rescorla, "Deploying a New Hash | |||
Algorithm", Proceedings of NDSS '06, 2006, | Algorithm", Proceedings of NDSS '06, February 2006, | |||
<https://www.cs.columbia.edu/~smb/papers/new-hash.pdf>. | <https://www.cs.columbia.edu/~smb/papers/new-hash.pdf>. | |||
[Blaze1994] | [Blaze1994] | |||
Blaze, M., "Protocol Failures in the Escrowed Encryption | Blaze, M., "Protocol Failure in the Escrowed Encryption | |||
Standard", Proceedings of Second ACM Conference on | Standard", CCS '94: Proceedings of Second ACM Conference | |||
Computer and Communications Security, 1994, | on Computer and Communications Security, 1994, | |||
<http://www.mattblaze.org/papers/eesproto.pdf>. | <https://dl.acm.org/doi/10.1145/191177.191193>. | |||
[Borda2011] | [Borda2011] | |||
Borda, M., "Fundamentals in Information Theory and Coding. | Borda, M., "Fundamentals in Information Theory and | |||
Berlin", Springer, 2011. | Coding", Springer-Berlin, May 2011. | |||
[Broad1982] | [Broad1982] | |||
Broad, W. J., "Evading the Soviet Ear at Glen Cove", | Broad, W. J., "Evading the Soviet Ear at Glen Cove", | |||
Science 217 (3): 910-11, 1982. | Science, 217:4563, pp. 910-911, September 1982, | |||
<https://www.science.org/doi/abs/10.1126/ | ||||
science.217.4563.910>. | ||||
[CFRG] IETF, "IRTF Crypto Forum (CFRG)", 2023, | [CFRG] IRTF, "Crypto Forum (cfrg)", | |||
<https://datatracker.ietf.org/rg/cfrg/>. | <https://datatracker.ietf.org/rg/cfrg/about/>. | |||
[Checkoway2016] | [Checkoway2016] | |||
Checkoway, S., Maskiewicz, J., Garman, C., Fried, J., | Checkoway, S., Maskiewicz, J., Garman, C., Fried, J., | |||
Cohney, S., Green, M., Heninger, N., Weinmann, R. P., | Cohney, S., Green, M., Heninger, N., Weinmann, R. P., | |||
Rescorla, E., and Hovav Shacham, "A Systematic Analysis of | Rescorla, E., and Hovav Shacham, "A Systematic Analysis of | |||
the Juniper Dual EC Incident", Proceedings of the 2016 ACM | the Juniper Dual EC Incident", CCS '16: Proceedings of the | |||
SIGSAC Conference on Computer and Communications | 2016 ACM SIGSAC Conference on Computer and Communications | |||
Security 468-79, 2016, | Security, pp. 468-479, October 2016, | |||
<https://dl.acm.org/citation.cfm?id=2978395>. | <https://dl.acm.org/citation.cfm?id=2978395>. | |||
[CURDLE] IETF, "curdle WG", 2023, | [CURDLE] IETF, "CURves, Deprecating and a Little more Encryption | |||
<https://datatracker.ietf.org/wg/curdle/>. | (curdle)", | |||
<https://datatracker.ietf.org/wg/curdle/about/>. | ||||
[Curtiz] Curtiz, M., Epstein, J. J., Epstein, P. G., and H. Koch, | [Curtiz] Curtiz, M., Epstein, J. J., Epstein, P. G., and H. Koch, | |||
"Casablanca", 1942. | "Casablanca", Warner Bros. Pictures, November 1942. | |||
[Doria2012] | [Doria2012] | |||
Doria, A. and J. Liddicoat, "Human Rights and Internet | Liddicoat, J. and A. Doria, "Human Rights and Internet | |||
Protocols: Comparing Processes and Principles", The | Protocols: Comparing Processes and Principles", The | |||
Internet Society, 2012, | Internet Society, December 2012, | |||
<https://www.internetsociety.org/resources/doc/2012/human- | <https://www.internetsociety.org/resources/doc/2012/human- | |||
rights-and-internet-protocols-comparing-processes-and- | rights-and-internet-protocols-comparing-processes-and- | |||
principles/>. | principles/>. | |||
[dual-ec] Bernstein, D., Lange, T., and R. Niederhagen, "Dual EC, A | [Dual-EC] Bernstein, D., Lange, T., and R. Niederhagen, "Dual EC: A | |||
standardized back door", 2016, | Standardized Back Door", July 2016, | |||
<https://eprint.iacr.org/2015/767.pdf>. | <https://eprint.iacr.org/2015/767.pdf>. | |||
[Ferran2014] | [Ferran2014] | |||
Ferran, L., "Ex-NSA Chief: "We Kill People Based on | Ferran, L., "Ex-NSA Chief: "We Kill People Based on | |||
Metadata"", ABC News, May 2014, | Metadata"", ABC News, May 2014, | |||
<https://abcnews.go.com/blogs/headlines/2014/05/ex-nsa- | <https://abcnews.go.com/blogs/headlines/2014/05/ex-nsa- | |||
chief-we-kill-people-based-on-metadata>. | chief-we-kill-people-based-on-metadata>. | |||
[Garfinkel1995] | [Garfinkel1995] | |||
Garfinkel, S., "GPG: Pretty Good Privacy", O'Reilly and | Garfinkel, S., "PGP: Pretty Good Privacy", O'Reilly and | |||
Associates, 1995. | Associates, January 1995. | |||
[guard2013] | [Guard2013] | |||
Greenwald, G., "NSA collecting phone records of millions | Greenwald, G., "NSA collecting phone records of millions | |||
of Verizon customers daily", June 2013. | of Verizon customers daily", The Guardian, June 2013. | |||
[Headrick1991] | [Headrick1991] | |||
Headrick, D. R., "The Invisible Weapon: Telecommunications | Headrick, D. R., "The Invisible Weapon: Telecommunications | |||
and International Politics, 1851–1945", Oxford University | and International Politics, 1851-1945", Oxford University | |||
Press, 1991. | Press, 1991. | |||
[I-D.farrelll-mpls-opportunistic-encrypt] | ||||
Farrel, A. and S. Farrell, "Opportunistic Security in MPLS | ||||
Networks", Work in Progress, Internet-Draft, draft- | ||||
farrelll-mpls-opportunistic-encrypt-05, 17 June 2015, | ||||
<https://datatracker.ietf.org/doc/html/draft-farrelll- | ||||
mpls-opportunistic-encrypt-05>. | ||||
[I-D.ietf-tls-esni] | ||||
Rescorla, E., Oku, K., Sullivan, N., and C. A. Wood, "TLS | ||||
Encrypted Client Hello", Work in Progress, Internet-Draft, | ||||
draft-ietf-tls-esni-16, 6 April 2023, | ||||
<https://datatracker.ietf.org/doc/html/draft-ietf-tls- | ||||
esni-16>. | ||||
[Johnson1998] | [Johnson1998] | |||
Johnson, T. R., "American Cryptology During the Cold War, | Johnson, T. R., "American Cryptology During the Cold War, | |||
1945-1989; Book III: Retrenchment and Reform", NSA, 1998, | 1945-1989; Book III: Retrenchment and Reform, 1972-1980", | |||
Center for Cryptologic History, NSA, 1998, | ||||
<https://www.nsa.gov/portals/75/documents/news-features/ | <https://www.nsa.gov/portals/75/documents/news-features/ | |||
declassified-documents/cryptologic-histories/ | declassified-documents/cryptologic-histories/ | |||
cold_war_iii.pdf>. | cold_war_iii.pdf>. | |||
[Kahn1996] Kahn, D., "The Code Breakers, 2nd Edition", Scribner, | [Kahn1996] Kahn, D., "The Codebreakers: The Comprehensive History of | |||
1996. | Secret Communication from Ancient Times to the Internet", | |||
2nd Edition, Scribner, 1996. | ||||
[Kennedy1971] | [Kennedy1971] | |||
Kennedy, P. M., "Imperial Cable Communications and | Kennedy, P. M., "Imperial cable communications and | |||
Strategy, 1870-1914", English Historical Review 86 (341): | strategy, 1870-1914", English Historical Review, 86:341, | |||
728-52, 1971, <http://www.jstor.org/stable/563928>. | pp. 728-752, Oxford University Press, October 1971, | |||
<https://www.jstor.org/stable/563928>. | ||||
[Kerr2020] Kerr, O. S., "Decryption Originalism: The Lessons of | [Kerr2020] Kerr, O. S., "Decryption Originalism: The Lessons of | |||
Burr.", Harvard Law Review 134:905, 2020. | Burr", Harvard Law Review, 134:905, January 2021, | |||
<https://papers.ssrn.com/sol3/ | ||||
papers.cfm?abstract_id=3533069>. | ||||
[Kostyuk2022] | [Kostyuk2022] | |||
Kostyuk, N. and S. Landau, "Dueling Over DUAL_EC_DRBG: The | Kostyuk, N. and S. Landau, "Dueling over DUAL_EC_DRBG: The | |||
Consequences of Corrupting a Cryptographic Standardization | Consequences of Corrupting a Cryptographic Standardization | |||
Process", Harvard National Security Journal 13 (2): | Process", Harvard National Security Journal, 13:2, pp. | |||
224-84, 2022, <https://www.harvardnsj.org/wp- | 224-284, June 2022, <https://www.harvardnsj.org/wp- | |||
content/uploads/sites/13/2022/06/Vol13Iss2_Kostyuk- | content/uploads/sites/13/2022/06/Vol13Iss2_Kostyuk- | |||
Landau_Dual-EC-DRGB.pdf>. | Landau_Dual-EC-DRGB.pdf>. | |||
[Landau1988] | [Landau1988] | |||
Landau, S., "Zero Knowledge and the Department of | Landau, S., "Zero Knowledge and the Department of | |||
Defense", Notices of the American Mathematical Society | Defense", Notices of the American Mathematical Society, | |||
[Special Article Series] 35 (1): 5-12, 1988. | 35:1, pp. 5-12, January 1988, | |||
<https://privacyink.org/pdf/Zero_Knowledge.pdf>. | ||||
[Landau2014] | [Landau2014] | |||
Landau, S., "Under the Radar: NSA’s Efforts to Secure | Landau, S., "Under the Radar: NSA's Efforts to Secure | |||
Private-Sector Telecommunications Infrastructure", Journal | Private-Sector Telecommunications Infrastructure", Journal | |||
of National Security Law & Policy Vol 7, No. 3, 2014. | of National Security Law & Policy, 7:3, September 2014, | |||
<https://jnslp.com/wp-content/uploads/2015/03/ | ||||
NSA%E2%80%99s-Efforts-to-Secure-Private-Sector- | ||||
Telecommunications-Infrastructure_2.pdf>. | ||||
[LE] Aas, J., Barnes, R., Case, B., Durumeric, Z., Eckersley, | [LE] Aas, J., Barnes, R., Case, B., Durumeric, Z., Eckersley, | |||
P., Flores-López, A., Halderman, A., Hoffman-Andrews, J., | P., Flores-López, A., Halderman, A., Hoffman-Andrews, J., | |||
Kasten, J., Rescorla, E., Schoen, S. D., and B. Warren, | Kasten, J., Rescorla, E., Schoen, S. D., and B. Warren, | |||
"Let's Encrypt - an automated certificate authority to | "Let's Encrypt: An Automated Certificate Authority to | |||
encrypt the entire web", 2019, | Encrypt the Entire Web", CCS '19: Proceedings of the 2019 | |||
ACM SIGSAC Conference on Computer and Communications | ||||
Security, November 2019, | ||||
<https://dl.acm.org/doi/pdf/10.1145/3319535.3363192>. | <https://dl.acm.org/doi/pdf/10.1145/3319535.3363192>. | |||
[Levy2001] Levy, S., "Crypto: How the Code Rebels Beat the | [Levy2001] Levy, S., "Crypto: How the Code Rebels Beat the | |||
Government—Saving Privacy in the Digital Age", Viking, | Government-Saving Privacy in the Digital Age", Penguin | |||
2001. | Publishing Group, January 2001. | |||
[MADINAS] IETF, "MADINAS WG", 2023, | [MADINAS] IETF, "MAC Address Device Identification for Network and | |||
<https://datatracker.ietf.org/wg/madinas/>. | Application Services (madinas)", | |||
<https://datatracker.ietf.org/wg/madinas/about>. | ||||
[Masnick2023] | [Masnick2023] | |||
Masnick, M., "The Unintended Consequences of Internet | Masnick, M., "The Unintended Consequences of Internet | |||
Regulation", 2023, | Regulation", Copia, April 2023, | |||
<https://copia.is/library/unintended-consequences/>. | <https://copia.is/library/unintended-consequences/>. | |||
[Miller2020] | [Miller2020] | |||
Miller, G., "The Intelligence Coup of the Century", The | Miller, G., "The intelligence coup of the century", The | |||
Washington Post, February 2020, | Washington Post, February 2020, | |||
<https://www.washingtonpost.com/graphics/2020/world/ | <https://www.washingtonpost.com/graphics/2020/world/ | |||
national-security/cia-crypto-encryption-machines- | national-security/cia-crypto-encryption-machines- | |||
espionage/>. | espionage/>. | |||
[Moore2015] | [Moore2015] | |||
Moore, H. D., "CVE-2015-7755: Juniper ScreenOS | Moore, H. D., "CVE-2015-7755: Juniper ScreenOS | |||
Authentication Backdoor", Rapid7 Blog, 2015, | Authentication Backdoor", Rapid7, December 2015, | |||
<https://www.rapid7.com/blog/post/2015/12/20/cve- | <https://www.rapid7.com/blog/post/2015/12/20/cve- | |||
2015-7755-juniper-screenos-authentication-backdoor/>. | 2015-7755-juniper-screenos-authentication-backdoor/>. | |||
[perpass] IETF, "perpass mailing list", 2023, | [MPLS-OPPORTUNISTIC-ENCRYPT] | |||
Farrel, A. and S. Farrell, "Opportunistic Security in MPLS | ||||
Networks", Work in Progress, Internet-Draft, draft-ietf- | ||||
mpls-opportunistic-encrypt-03, 28 March 2017, | ||||
<https://datatracker.ietf.org/doc/html/draft-ietf-mpls- | ||||
opportunistic-encrypt-03>. | ||||
[Perpass] IETF, "perpass mailing list", | ||||
<https://mailarchive.ietf.org/arch/browse/perpass/>. | <https://mailarchive.ietf.org/arch/browse/perpass/>. | |||
[Perpass-BoF] | [Perpass-BoF] | |||
IETF, "IETF 88 Perpass BoF session", 2013, | IETF, "perpass BoF -- Handling Pervasive Monitoring in the | |||
IETF", IETF 88 Proceedings, November 2013, | ||||
<https://www.ietf.org/proceedings/88/perpass.html>. | <https://www.ietf.org/proceedings/88/perpass.html>. | |||
[plenary-video] | [Plenary-video] | |||
IETF, "IETF 88 Technical Plenary: Hardening The Internet", | "IETF 88 Technical Plenary: Hardening The Internet", | |||
2013, <https://www.youtube.com/ | YouTube video, 2:37:28, posted by "IETF - Internet | |||
Engineering Task Force", November 2013, | ||||
<https://www.youtube.com/ | ||||
watch?v=oV71hhEpQ20&pp=ygUQaWV0ZiA4OCBwbGVuYXJ5IA%3D%3D>. | watch?v=oV71hhEpQ20&pp=ygUQaWV0ZiA4OCBwbGVuYXJ5IA%3D%3D>. | |||
[refs-to-7258] | [Refs-to-7258] | |||
IETF, "References to RFC7258", 2023, | IETF, "References to RFC7258", | |||
<https://datatracker.ietf.org/doc/rfc7258/referencedby/>. | <https://datatracker.ietf.org/doc/rfc7258/referencedby/>. | |||
[RFC1984] IAB and IESG, "IAB and IESG Statement on Cryptographic | [RFC1984] IAB and IESG, "IAB and IESG Statement on Cryptographic | |||
Technology and the Internet", BCP 200, RFC 1984, | Technology and the Internet", BCP 200, RFC 1984, | |||
DOI 10.17487/RFC1984, August 1996, | DOI 10.17487/RFC1984, August 1996, | |||
<https://www.rfc-editor.org/info/rfc1984>. | <https://www.rfc-editor.org/info/rfc1984>. | |||
[RFC3365] Schiller, J., "Strong Security Requirements for Internet | [RFC3365] Schiller, J., "Strong Security Requirements for Internet | |||
Engineering Task Force Standard Protocols", BCP 61, | Engineering Task Force Standard Protocols", BCP 61, | |||
RFC 3365, DOI 10.17487/RFC3365, August 2002, | RFC 3365, DOI 10.17487/RFC3365, August 2002, | |||
skipping to change at page 33, line 25 ¶ | skipping to change at line 1527 ¶ | |||
[RFC7480] Newton, A., Ellacott, B., and N. Kong, "HTTP Usage in the | [RFC7480] Newton, A., Ellacott, B., and N. Kong, "HTTP Usage in the | |||
Registration Data Access Protocol (RDAP)", STD 95, | Registration Data Access Protocol (RDAP)", STD 95, | |||
RFC 7480, DOI 10.17487/RFC7480, March 2015, | RFC 7480, DOI 10.17487/RFC7480, March 2015, | |||
<https://www.rfc-editor.org/info/rfc7480>. | <https://www.rfc-editor.org/info/rfc7480>. | |||
[RFC7481] Hollenbeck, S. and N. Kong, "Security Services for the | [RFC7481] Hollenbeck, S. and N. Kong, "Security Services for the | |||
Registration Data Access Protocol (RDAP)", STD 95, | Registration Data Access Protocol (RDAP)", STD 95, | |||
RFC 7481, DOI 10.17487/RFC7481, March 2015, | RFC 7481, DOI 10.17487/RFC7481, March 2015, | |||
<https://www.rfc-editor.org/info/rfc7481>. | <https://www.rfc-editor.org/info/rfc7481>. | |||
[RFC7484] Blanchet, M., "Finding the Authoritative Registration Data | ||||
(RDAP) Service", RFC 7484, DOI 10.17487/RFC7484, March | ||||
2015, <https://www.rfc-editor.org/info/rfc7484>. | ||||
[RFC7540] Belshe, M., Peon, R., and M. Thomson, Ed., "Hypertext | ||||
Transfer Protocol Version 2 (HTTP/2)", RFC 7540, | ||||
DOI 10.17487/RFC7540, May 2015, | ||||
<https://www.rfc-editor.org/info/rfc7540>. | ||||
[RFC7687] Farrell, S., Wenning, R., Bos, B., Blanchet, M., and H. | [RFC7687] Farrell, S., Wenning, R., Bos, B., Blanchet, M., and H. | |||
Tschofenig, "Report from the Strengthening the Internet | Tschofenig, "Report from the Strengthening the Internet | |||
(STRINT) Workshop", RFC 7687, DOI 10.17487/RFC7687, | (STRINT) Workshop", RFC 7687, DOI 10.17487/RFC7687, | |||
December 2015, <https://www.rfc-editor.org/info/rfc7687>. | December 2015, <https://www.rfc-editor.org/info/rfc7687>. | |||
[RFC7858] Hu, Z., Zhu, L., Heidemann, J., Mankin, A., Wessels, D., | [RFC7858] Hu, Z., Zhu, L., Heidemann, J., Mankin, A., Wessels, D., | |||
and P. Hoffman, "Specification for DNS over Transport | and P. Hoffman, "Specification for DNS over Transport | |||
Layer Security (TLS)", RFC 7858, DOI 10.17487/RFC7858, May | Layer Security (TLS)", RFC 7858, DOI 10.17487/RFC7858, May | |||
2016, <https://www.rfc-editor.org/info/rfc7858>. | 2016, <https://www.rfc-editor.org/info/rfc7858>. | |||
skipping to change at page 34, line 43 ¶ | skipping to change at line 1585 ¶ | |||
[RFC9082] Hollenbeck, S. and A. Newton, "Registration Data Access | [RFC9082] Hollenbeck, S. and A. Newton, "Registration Data Access | |||
Protocol (RDAP) Query Format", STD 95, RFC 9082, | Protocol (RDAP) Query Format", STD 95, RFC 9082, | |||
DOI 10.17487/RFC9082, June 2021, | DOI 10.17487/RFC9082, June 2021, | |||
<https://www.rfc-editor.org/info/rfc9082>. | <https://www.rfc-editor.org/info/rfc9082>. | |||
[RFC9083] Hollenbeck, S. and A. Newton, "JSON Responses for the | [RFC9083] Hollenbeck, S. and A. Newton, "JSON Responses for the | |||
Registration Data Access Protocol (RDAP)", STD 95, | Registration Data Access Protocol (RDAP)", STD 95, | |||
RFC 9083, DOI 10.17487/RFC9083, June 2021, | RFC 9083, DOI 10.17487/RFC9083, June 2021, | |||
<https://www.rfc-editor.org/info/rfc9083>. | <https://www.rfc-editor.org/info/rfc9083>. | |||
[RFC9113] Thomson, M., Ed. and C. Benfield, Ed., "HTTP/2", RFC 9113, | ||||
DOI 10.17487/RFC9113, June 2022, | ||||
<https://www.rfc-editor.org/info/rfc9113>. | ||||
[RFC9224] Blanchet, M., "Finding the Authoritative Registration Data | ||||
Access Protocol (RDAP) Service", STD 95, RFC 9224, | ||||
DOI 10.17487/RFC9224, March 2022, | ||||
<https://www.rfc-editor.org/info/rfc9224>. | ||||
[Roth2022] Roth, E., "Internet backbone provider shuts off service in | [Roth2022] Roth, E., "Internet backbone provider shuts off service in | |||
Russia", The Verge, March 2022, | Russia", The Verge, March 2022, | |||
<https://www.theverge.com/2022/3/5/22962822/internet- | <https://www.theverge.com/2022/3/5/22962822/internet- | |||
backbone-provider-cogent-shuts-off-service-russia>. | backbone-provider-cogent-shuts-off-service-russia>. | |||
[Rowlett1998] | [Rowlett1998] | |||
Rowlett, F. B., "The Story of MAGIC: Memoirs of an | Rowlett, F. B., "The Story of Magic, Memoirs of an | |||
American Cryptologic Pioneer", Aegean Park Press, 1988. | American Cryptologic Pioneer", Aegean Park Press, 1998. | |||
[Slater1870] | [Slater1870] | |||
Slater, R., "Telegraphic Code, to Ensure Secresy in the | Slater, R., "Telegraphic Code, to Ensure Secresy in the | |||
Transmission of Telegrams, First Edition.", W.R. Gray, | Transmission of Telegrams", First Edition, W.R. Gray, | |||
1870, <http://books.google.com/books?id=MJYBAAAAQAAJ>. | 1870, <https://books.google.com/books?id=MJYBAAAAQAAJ>. | |||
[Smith1845] | [Smith1845] | |||
Smith, F. O., "The Secret Corresponding Vocabulary, | Smith, F. O., "The Secret Corresponding Vocabulary: | |||
Adapted for Use to Morse’s Electro-Magnetic Telegraph: And | Adapted for Use to Morse's Electro-Magnetic Telegraph, and | |||
Also in Conducting Written Correspondence, Transmitted by | Also in Conducting Written Correspondence, Transmitted by | |||
the Mails, or Otherwise", Thurston, Isley & Co, 1845, | the Mails, or Otherwise", Thurston, Isley & Company, 1845, | |||
<http://books.google.com/books?id=Z45clCxsF7EC>. | <https://books.google.com/books?id=Z45clCxsF7EC>. | |||
[STRINT] IETF, "A W3C/IAB workshop on Strengthening the Internet | [STRINT] W3C and IAB, "A W3C/IAB workshop on Strengthening the | |||
Against Pervasive Monitoring (STRINT)", 2014, | Internet Against Pervasive Monitoring (STRINT)", March | |||
<https://www.w3.org/2014/strint/>. | 2014, <https://www.w3.org/2014/strint/>. | |||
[timeline] Wikimedia foundation, "Global surveillance disclosures | [Timeline] Wikipedia, "Global surveillance disclosures | |||
(2013–present)", 2023, <https://en.wikipedia.org/wiki/ | (2013-present)", July 2023, <https://en.wikipedia.org/w/in | |||
Global_surveillance_disclosures_(2013%E2%80%93present)>. | dex.php?title=Global_surveillance_disclosures_(2013%E2%80% | |||
93present)&oldid=1161557819>. | ||||
[Toronto] National Public Radio, "Canada Used Airport Wi-Fi To Track | [TLS-ECH] Rescorla, E., Oku, K., Sullivan, N., and C. A. Wood, "TLS | |||
Travelers, Snowden Leak Alleges", n.d., | Encrypted Client Hello", Work in Progress, Internet-Draft, | |||
draft-ietf-tls-esni-16, 6 April 2023, | ||||
<https://datatracker.ietf.org/doc/html/draft-ietf-tls- | ||||
esni-16>. | ||||
[Toronto] Memmott, M., "Canada Used Airport Wi-Fi To Track | ||||
Travelers, Snowden Leak Alleges", NPR, January 2014, | ||||
<https://www.npr.org/sections/thetwo- | <https://www.npr.org/sections/thetwo- | |||
way/2014/01/31/269418375/airport-wi-fi-used-to-track- | way/2014/01/31/269418375/airport-wi-fi-used-to-track- | |||
travelers-snowden-leak-alleges>. | travelers-snowden-leak-alleges>. | |||
[UTA] IETF, "Using TLS in Applications working group (UTA) | [UTA] IETF, "Using TLS in Applications (uta)", | |||
working group", 2023, | <https://datatracker.ietf.org/wg/uta/about>. | |||
<https://datatracker.ietf.org/wg/uta/>. | ||||
[zubhoff2019] | ||||
Zuboff, S., "The age of surveillance capitalism, The fight | ||||
for a human future at the new frontier of power", Profile | ||||
Books, ISBN 9781781256855, 2019. | ||||
Appendix A. Changes from Earlier Versions | ||||
RFC editor: please remove this section. | ||||
Draft -05: | ||||
* minor tweaks | ||||
Drafts -03 and -04: | ||||
* (mostly) Changes based on Schoen review | ||||
Draft -02: | ||||
* A bunch of typo fixes and added acks. | [Zubhoff2019] | |||
Zuboff, S., "The Age of Surveillance Capitalism: The Fight | ||||
for a Human Future at the New Frontier of Power", | ||||
PublicAffairs, ISBN 9781781256855, January 2019. | ||||
Draft -01: | Acknowledgments | |||
* Changes based on ISE review | Susan Landau added many valuable comments to Steve Bellovin's essay. | |||
Draft -00: | We thank Carsten Bormann, Brian Carpenter, Wendy Grossman, Kathleen | |||
Moriarty, Jan Schaumann, Seth David Schoen, and Paul Wouters for | ||||
comments and review of this text, though that of course doesn't mean | ||||
that they necessarily agree with the text. | ||||
* Initial revision | This document was created at the behest of Eliot Lear, who also cat | |||
herded and did some editing. | ||||
Authors' Addresses | Authors' Addresses | |||
Stephen Farrell | Stephen Farrell | |||
Trinity College, Dublin | Trinity College, Dublin | |||
Ireland | Ireland | |||
Email: stephen.farrell@cs.tcd.ie | Email: stephen.farrell@cs.tcd.ie | |||
Farzaneh Badii | Farzaneh Badii | |||
Digital Medusa | Digital Medusa | |||
End of changes. 215 change blocks. | ||||
835 lines changed or deleted | 837 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. |