<<< Date Index >>>     <<< Thread Index >>>

Re: New whitepaper "The Phishing Guide"



[ On Thursday, September 23, 2004 at 12:21:40 (-0700), Seth Arnold wrote: ]
> Subject: Re: New whitepaper "The Phishing Guide"
>
> Methinks PGP is good for talking within friends, but perhaps trusting
> communications from J. Random Corporation with PGP as your best means of
> verification is a stretch. The Web Of Trust idea only takes you so far
> in combating these problems -- I've heard anecdotal evidence that
> someone has replicated the entire "Web Of Trust" graph with identical
> uids on keys of EFF members. If one starts the search from the desired
> key and searches until finding a plausible name, one is doomed. One must
> return to one's own key

You seem to be blaming the existing state of the PGP web of trust on
some fundamental failing in its design and yet you then go on to admit
that people use the wrong kinds of things in real life to authenticate
and identify others with, and you further admit that the public in
general still has a lot to learn about using computing and networking
infrastructures safely in their daily lives.

PGP's web of trust can be almost infinitely more reliable, trustworthy,
and controllable, than any one, or many, for-profit certification
agencies.

Just because one takes a set of dedicated PGP users and tries but fails
to establish trust relationships with non-PGP users doesn't mean PGP's
web of trust is broken -- one of the parties is "broken", not the web of
trust itself or the concept of a web of trust.  Obviously in order to
establish trusted end-to-end communciations both parties must be
dedicated to using the technology that achieves their goal and both
parties must have some basis for relating to each other.  The web of
trust simply allows that relationship to have a somewhat less direct
nature and to be many-to-many instead of one-to-one.

The idea that a web of trust can work very well once it reaches critical
mass can be trivially demonstrated through simple analysis of the web of
"friends" formed in any of these large online networking systems such as
Orkut.


> -- AND have faith that everyone in the middle
> played fairly.

No, that's not true -- faith doesn't enter into it.  In a sufficiently
connected and properly maintained web of trust it should be relatively
easy for conspirators to be weeded out and eliminated.

Not that such a thing is easy to achieve of course.

Obviously a sufficient level of interconnection in a web of trust
requires a critical mass of users; and proper maintenance of the web of
trust requires a sufficient level of proficiency and dedication on the
part of those users.  It would certainly help a lot of those users where
encouraged to learn what they need to know and encouraged to pay
attention to maintaining their status and involvement through the
initiative of whatever large institutions many people are already
involved with.  Unfortunately it seems such institutions (e.g. banks,
etc.) have so far gone in the direction of using for-profit (and usually
for-profit public corporate) entities to manage x.509 style certificate
authorities.

Technically there is not a lot of difference between PGP's web of trust
and a group of certificate authorities.  PGP is not just for mail and
SSL/TLS is not just for HTTP.  There are indeed deficiencies in PGP's
implementation choices.  A public web of trust can be built using any
public-key crypto system.  I think the important thing is that we need
to work on building a democratic web of trust -- and learn to rely less
on certificate authorities operated by for-profit, and particularly
public, corporations.  The public corporation is anything but
democratic, especially when it gets involved in the affairs of private
individuals and government bodies.

-- 
                                                Greg A. Woods

+1 416 218-0098                  VE3TCP            RoboHack <woods@xxxxxxxxxxx>
Planix, Inc. <woods@xxxxxxxxxx>          Secrets of the Weird <woods@xxxxxxxxx>