[cryptography] Reply to Zooko (in Markdown)
zooko at zooko.com
Thu Aug 29 18:26:48 EDT 2013
On Sat, Aug 24, 2013 at 09:18:33PM +0300, ianG wrote:
> I'm not convinced that the US feds can at this stage order the
> backdooring of software, carte blanche. Is there any evidence of
> (I suspect that all their powers in this area are from pressure and
> horse trading. E.g., the export of cryptomunitions needs a
I don't know. I asked a lawyer a few days ago -- a person who is, as far as I
can tell, one of the leading experts in this field. Their answer was that
In any case, you don't appear to be arguing that Silent Text is different than
Silent Mail, only that the U.S. Federal Government would not require Silent
Circle to actively backdoor their own products. This argument applies equally
to the canceled product and the current ones.
In fact, I don't think it is a useful question for evaluating the security of
services that you rely on. If a service provider could spy on you at the behest
of their government, then an attacker who infiltrated that service provider's
systems could also spy on you.
Imagine that your adversary is not the U.S. NSA, but instead Chinese
cyber-warriors, and instead of contacting your service provider and demanding
cooperation, they simply remotely infiltrate your service provider's employee's
laptops. They've apparently done this many times in recent years, to Adobe,
Google, Microsoft, Nortel Networks, and basically every other company you can
So I don't think the question of "To whom is my service provider vulnerable?"
is the right question. You can't really know the answer, so it doesn't help you
much to wonder about it. The right question is "Am I vulnerable to my service
provider?". The answer, as far as Silent Circle's current products go, is
> I would be surprised if there was a single stated reason.
Here are the first five hits from DuckDuckGo for the query "silent circle
"We knew USG would come after us." That's why Silent Circle CEO Michael
Janke tells TechCrunch his company shut down its Silent Mail encrypted
Silent Circle, the provider of a range of secure communications services,
has pre-emptively closed its Silent Mail email service in order to stop
U.S. authorities from spying on its customers
Silent Circle, the global encrypted communications firm revolutionizing
mobile security for organizations and individuals alike, today announced it
has discontinued its Silent Mail e-mail encryption service in order to
preempt governments' demands for customer information in the escalating
surveillance environment targeting global communications.
the Lavabit e-mail service used by National Security Agency leaker Edward
Snowden announced Thursday that it would shut down, implying heavily that
it had received some sort of government request for information. Hours
later ... Silent Circle, said it would preemptively shut down its Silent
Mail service to avoid ending up in the same position.
There are far too many leaks of information and metadata intrinsically in
the email protocols themselves. Email as we know it with SMTP, POP3, and
IMAP cannot be secure.
(Kudos to Jon for saying something sensical in that last one!)
More information about the cryptography