[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Government-Controlled Trust Hierarchies
Two recent threads have been:
* Government-controlled ID systems (National ID Card, is-a-person
credentials, etc.)
* Software Key Escrow (SKE)
These two threads are intimately connected, I claim. We would do well
to consider how they relate, given the recent revelations about plans
for SKE by Microsoft, the already-existing (but mostly unused?)
features in Apple's AOCE/System 7 Pro/etc. system, the proposal by
Stephen Walker at TIS of an SKE system, and the press for a National
ID card.
The "anarchic" model of the "web of trust" found in PGP is anathema to
control freaks...sorry if this sounds like I'm grinding an ideological
axe, but I don't feel I have to make posts to _this_ group sound like
impartial, academic papers.
Someone discussing key escrow here recently said that one thing he's
want to see in any "voluntary" system is "proof of identity." Though
many of us here dismissed his arguments as Detweileresque, in that
Detweiler was always trashing pseudonymity (while being by far the
most obvious user of it, ironically). But I think these arguments are
common in some circles.
For example, to use the Apple Open Collaboration Environment (AOCE)
stuff, one gets one's key by submitting to RSA a notarized statement
of one's identity. I haven't done this, and have no intentions to ever
do so, but I gather than one take's one's passport, birth certificate,
etc., down to a Notary Public, she confirms that the person is indeed
"Sue D. Nym," signs and stamps the AOCE or RSADSI form, and this is
snail-mailed to RSADSI in Redwood Shores. Some days or weeks later,
one's key arrives.
Sort of kills the idea of multiple keys for multiple purposes, of
changing keys frequently, and of not going through such a process in
the first place. Oh, and of course it costs money (the Notary for
sure, and maybe RSADSI...though maybe Apple gives your a free coupon
"Good for One Key Generation").
The Microsoft thing may be going down a similar track. The Microsoft
paralegal who confirmed to me yesterday (via Blanc Weber, who can
attest to what I'm saying) that MS is indeed pursuing SKE claimed
that this is primarily to meet export laws and will not apply, he
claims, to U.S. users.
(I'm confused. If it's _export_ laws, and not _import_ laws into
Haiti, Iraq, France, or other police state who may insist on key
escrow, then won't all U.S.-sold packages of "Chicago" have to have
this SKE built in? Why should U.S. export laws care about what key
escrow laws other countries have? Since when do we enforce other
countries' laws at our borders?)
From everything I am seeing, SKE will be incorporated into some
widely-used operating systems, notably, Microsoft's upcoming release
of "Chicago," the successor to Windows 3.1. (Chicago is essentially
Windows 4.0)
Who will write this? The SKE proposal described at the Karlsruhe
workshop in international key escrow was authored by Stephen Walker
and David Balenson of Trusted Information Systems. Matt Blaze's post
yesterday discussed this in more detail.
I suggest we look very closely for connections between TIS and
Microsoft, Apple, Novell, Sun, and any other major OS providers. I
believe TIS is preparing an SKE system that involves the "proof of
identity" notary system Apple and RSADSI are now using, that involves
mandatory selection of escrow agents (*), and that will be widely
deployed in upcoming future operating systems, probably in Chicago in
1995 and maybe in Apple's System 7.5 in '95 as well.
As Hal Finney notes, this will nuke the "web of trust" model, and will
also make all systems in which keys need to be generated on an ad hoc,
as needed basis very difficult or impossible to deploy--at least if
the built-in systems of Chicago or System 7.5 are to be used.
(* A note of confusion. I don't see how the schemes described by Matt
Blaze, Carl Ellison, and others here, in which groups of communicants
agree on a mutual escrow agent can work. For example, suppose a bunch
of say, "OK, we'll play your silly game. We'll use your software,
but our "escrow agents" will be "cypherpunks.nil" and
"bitbucket.void," both of which consign all incoming keys to oblivion.
Whutja gonna do now?" This makes the escrow agents a charade, unless
of course there are laws regulating escrow agents!)
In closing, it looks like the anarchic, distributed, web-of-trust
stuff has been recognized as something governments need to quash. The
first attack, Clipper, failed miserably, for various reasons.
The second attack is much more insidious. Use various pressures on
Microsoft (Gee, I wonder what _that_ could be?) to deploy a Beltway
Bandit-deveoloped (TIS, with inputs from Denning, NIST/NSA) system
that is, happily, "freely exportable." This satisfies Cantwell (so she
drops her bill), this allows Clipper to be quietly killed, this allows
Microsoft to free export Chicago, Daytona, and other such products,
and this presumably keeps the national security state people happy.
Well, this is my scenario. It could be wrong in some details, but
clearly something is brewing out there....too many pieces are matching
up.
Vigilance!
--Tim May
--
..........................................................................
Timothy C. May | Crypto Anarchy: encryption, digital money,
[email protected] | anonymous networks, digital pseudonyms, zero
408-688-5409 | knowledge, reputations, information markets,
W.A.S.T.E.: Aptos, CA | black markets, collapse of governments.
Higher Power: 2^859433 | Public Key: PGP and MailSafe available.
"National borders are just speed bumps on the information superhighway."