[prev in list] [next in list] [prev in thread] [next in thread] 

List:       cryptography
Subject:    Re: [Cryptography] Schneier's Internet Security Agency - bad idea because we don't know what it will
From:       Tom Mitchell <mitch () niftyegg ! com>
Date:       2017-02-28 21:57:54
Message-ID: CAAMy4USB-E3L36O_kce+jpk=0WAAYea1BkRzigG45GZmXP8OJg () mail ! gmail ! com
[Download RAW message or body]

[Attachment #2 (multipart/alternative)]


On Tue, Feb 28, 2017 at 7:09 AM, Henry Baker <hbaker1@pipeline.com> wrote:

> At 04:35 PM 2/27/2017, Kevin W. Wall wrote:
> >On Mon, Feb 27, 2017 at 4:14 PM, Henry Baker <hbaker1@pipeline.com>
> wrote: ...<big snip>...
> >> How hard is it for a wifi device to search for all SSID's (including
> hidden

....

> So it wouldn't be hard for a sleazy Vizio to make deals with these even
> sleazier ISP's for easy/legal access to the Internet.


This is an interesting risk.
If the key used by a Vizio like company was to become public a million
"secure" hot spots
would become universal untraceable access to anyone: good, bad, frugal,
cheap.

If the TLAs are serious about national security this should be tested for
as well as be made
illegal to import including software updates.

As convenient setup goes little prevents a device from setting up a mesh
network of nearest neighbors
and then hop their way to a connection.

Automatic updates with bad services might precede a heavy handed larger
attack.
Like sleeper cells but not people.


-- 
  T o m    M i t c h e l l

[Attachment #5 (text/html)]

<div dir="ltr"><div class="gmail_extra"><div class="gmail_quote">On Tue, Feb 28, 2017 \
at 7:09 AM, Henry Baker <span dir="ltr">&lt;<a href="mailto:hbaker1@pipeline.com" \
target="_blank">hbaker1@pipeline.com</a>&gt;</span> wrote:<br><blockquote \
class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc \
solid;padding-left:1ex"><span class="">At 04:35 PM 2/27/2017, Kevin W. Wall \
wrote:<br> &gt;On Mon, Feb 27, 2017 at 4:14 PM, Henry Baker &lt;<a \
href="mailto:hbaker1@pipeline.com">hbaker1@pipeline.com</a>&gt; wrote: ...&lt;big \
snip&gt;...<br> </span><span class="">&gt;&gt; How hard is it for a wifi device to \
search for all SSID&#39;s (including hidden</span></blockquote><div>....  \
</div><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc \
solid;padding-left:1ex"> So it wouldn&#39;t be hard for a sleazy Vizio to make deals \
with these even sleazier ISP&#39;s for easy/legal access to the \
Internet.</blockquote><div><br>This is an interesting risk.  <br>If the key used by a \
Vizio like company was to become public a million &quot;secure&quot; hot \
spots<br>would become universal untraceable access to anyone: good, bad, frugal, \
cheap.<br><br>If the TLAs are serious about national security this should be tested \
for as well as be made</div><div>illegal to import including software updates.     \
<br><br>As convenient setup goes little prevents a device from setting up a mesh \
network of nearest neighbors</div><div>and then hop their way to a connection.   \
<br><br>Automatic updates with bad services might precede a heavy handed larger \
attack.<br>Like sleeper cells but not people.<br><br></div></div><div><br></div>-- \
<br><div class="gmail_signature" data-smartmail="gmail_signature"><div dir="ltr">   T \
o m      M i t c h e l l</div></div> </div></div>


[Attachment #6 (text/plain)]

_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography

[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic