[Discuss] NAS: encryption
Richard Pieri
richard.pieri at gmail.com
Wed Jul 8 11:53:35 EDT 2015
On 7/8/2015 11:06 AM, Chuck Anderson wrote:
> I think this whole discussion revolves around choice. With open
> source, I have a choice to audit the code if I so desire, or to hire
> someone to do so on my behalf. With internal drive encryption, I have
> (almost) no choice but to trust someone else's judgement about the
> implementation, whether that be the manufacturer or the government or
> some industry body or nonprofit. Their incentives and my incentives
> may not always be aligned.
You are not qualified to perform a security audit. Neither am I. Only a
handful of people in the world have those chops and most of them work
for the NSA and GQHQ and maybe the FSB. The rest charge a great deal of
money for their time and expertise, money that you as an individual
probably don't have.
You only have the illusion of choice.
> I say "almost" no choice, because I guess I could reverse engineer the
> device. But this is much harder to do than if I had the source code
> in the first place. Isn't that one of the major selling points of
> open source software?
If you are not qualified to audit the thing then you are not qualified
to reimplement it. The license is irrelevant.
> Even if I do not exercise my choice to audit the code, the mere fact
> that anyone can chooose to do so at any time can be a deterrent to
> trying to "pull a fast one" and hide malicious code in there.
It didn't stop the NSA from compromising Dual_EC_DRBG. It didn't stop
Intel from compromising RdRand (likely at the NSA's prompting). It
didn't prevent the ProFTPD sources from being compromised. It didn't
prevent the OpenSSH sources from being compromised.
--
Rich P.
More information about the Discuss
mailing list