An Enigma machine of one’s own.
Monday, December 26th, 2016
Sunday, December 6th, 2015
It’s a PDF and it’s an academic paper, but this rousing call to arms is a remarkably clear and engrossing read.
With few exceptions, the atomic scientists who worked on disarmament were not the same individuals as those who built the bomb. Their colleagues—fellow physicists—did that. Cryptographers didn’t turn the Internet into an instrument of total surveillance, but our colleagues—fellow computer scientists and engineers—did that.
It concludes with a series of design principles for the cryptographic community:
- Attend to problems’ social value. Do anti-surveillance research.
- Be introspective about why you are working on the problems you are.
- Apply practice-oriented provable security to anti-surveillance problems.
- Think twice, and then again, about accepting military funding.
- Regard ordinary people as those whose needs you ultimately aim to satisfy.
- Be open to diverse models. Regard all models as suspect and dialectical.
- Get a systems-level view. Attend to that which surrounds our field.
- Learn some privacy tools. Use them. Improve them.
- Stop with the cutesy pictures. Take adversaries seriously.
- Design and build a broadly useful cryptographic commons.
- Choose language well. Communication is integral to having an impact.
We need to erect a much expanded commons on the Internet. We need to realize popular services in a secure, distributed, and decentralized way, powered by free software and free/open hardware. We need to build systems beyond the reach of super-sized companies and spy agencies. Such services must be based on strong cryptography. Emphasizing that prerequisite, we need to expand our cryptographic commons.
Wednesday, May 13th, 2015
100 words 052
Alan Turing’s work at Station X is rightly lauded, but I can’t help feeling a bit uncomfortable with the way we make heroes of those who work in the shadows. After the war, England’s fictional hero was James Bond, the creation of former Bletchley worker Ian Fleming. And now we have GCHQ spying on its own citizens.
Righteousness in the past doesn’t earn a country a free pass for the future.
Thursday, August 14th, 2014
How computers work:
One day, a man name Alan Turing found a magic lamp, and rubbed it. Out popped a genie, and Turing wished for infinite wishes. Then we killed him for being gay, but we still have the wishes.
Then we networked computers together:
The network is ultimately not doing a favor for those in power, even if they think they’ve mastered it for now. It increases their power a bit, it increases the power of individuals immeasurably. We just have to learn to live in the age of networks.
We are all nodes in many networks. This is a beautiful description of how one of those networks operates.
Tuesday, February 26th, 2013
A clear explanation of the current state of homomorphic encryption.
Tuesday, January 3rd, 2012
Before there were HTTP codes, there were telegraphic codes. The Victorian internet indeed!