BLU Discuss list archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Discuss] AeroFS
- Subject: [Discuss] AeroFS
- From: blu at nedharvey.com (Edward Ned Harvey (blu))
- Date: Mon, 21 Apr 2014 02:11:44 +0000
- In-reply-to: <li6oazw6naq.fsf@panix5.panix.com>
- References: <CAL8cYW1fEhj-reUNptW4+vfU5nywX-OB0=PCKUOQE_Vt1qCD=A@mail.gmail.com> <5352BED2.7020908@gmail.com> <5352E966.5020102@gmail.com> <5f076efda37e4520883033872ccf6dc9@CO2PR04MB684.namprd04.prod.outlook.com> <li6oazw6naq.fsf@panix5.panix.com>
> From: Mike Small [mailto:smallm at panix.com] > Sent: Sunday, April 20, 2014 11:20 AM > > Then don't use closed source OSes? LOL, yeah, my point. ;-) (Just to strip the potential for any misunderstanding, this is sarcasm. The idea of only supporting open source OSes is ridiculous, especially when open source isn't exactly devoid of bugs either.) > How do you examine closed source crypto? It's a fair argument that the > code being available isn't sufficient to have all its bugs (intentional > or normal) found, but if the code's not available at all... Inspect what you can. For example as I described with the SslStream. Even if the source isn't available, the behavior is observable, and lots of times documentation is available, etc. If somebody wants to attack a closed source application, the unavailability of source sure doesn't stop 'em from trying. So you do the same thing. (Or I do, anyway.) Without source, go and inspect what you can see. Look at its behavior, look for weaknesses, try to understand the limitations. A lot of its components will be straight up public standards, such as AES, SHA, etc. And generally, documentation outright tells you this is what's being used. The very *concept* of "closed source crypto" in this context is barely even applicable. Because seriously, how do you even define it? If an application is built on top of public standard libraries... Even if the application is closed source and the entire encryption library is closed source, as long as you're informed that an asymmetric keypair is being used, or a password with PBKDF2... Then you know the crypto. Suppose Truecrypt was actually closed source hypothetically. It would be irrelevant, because (a) you've never read the source anyway, and (b) it's as plain as day, right there in the GUI interface, exactly what they're doing. You select which cipher to use, you select which hash to use, you give it a password, and voila. Crypto.
- References:
- [Discuss] Ubuntu One file services
- From: genuineaudio at gmail.com (Stuart Conner)
- [Discuss] Ubuntu One file services
- From: richard.pieri at gmail.com (Richard Pieri)
- [Discuss] AeroFS
- From: tmetro+blu at gmail.com (Tom Metro)
- [Discuss] AeroFS
- From: blu at nedharvey.com (Edward Ned Harvey (blu))
- [Discuss] AeroFS
- From: smallm at panix.com (Mike Small)
- [Discuss] Ubuntu One file services
- Prev by Date: [Discuss] Building a non-profit membership list?
- Next by Date: [Discuss] AeroFS
- Previous by thread: [Discuss] AeroFS
- Next by thread: [Discuss] AeroFS
- Index(es):