Hacker News new | past | comments | ask | show | jobs | submit | more enkid's comments login

Some languages are tenseless.


The Friedman Doctrine ( what you are espousing, that business are only set up to make money) is a relatively recent social construct, having been first articulated in 1970. Questioning whether or not it should be the basis of how we organize an economy is perfectly valid. Simply saying "this is the responsibility of Google" is missing the point. Cases like this should make us ask if this should be the way we assign responsibility to businesses or if we should assign them different responsibilities.


To anyone curious I'd also really recommend reading the original piece

https://www.nytimes.com/1970/09/13/archives/a-friedman-doctr...

The argument made here includes not just that the company should not spend it's resources on things other than profit for the sake of shareholders, but also worries about employees and customers. At least in this article Friedman was advocating for something much more positive than the situation we found ourselves in today


>The Friedman Doctrine ( what you are espousing, that business are only set up to make money) is a relatively recent social construct, having been first articulated in 1970.

What were the robber barons of the 19th century doing then? Or do you think that companies like standard oil were not "only set up to make money"?


The robber barons are specifically examples of people considered not to be fulfilling their social responsibilities. The idea that business are only responsible to make money is the new concept, not that people were acting only to make money previously. It was seen as a bad thing, now its a deflection for bad behavior.


It's purposeful. It's green washing money - they are able to get good press by doing something pretty minor, like holding a conference. But that money ultimately came from causing far greater environmental harm.


I don't think the purpose of this sort of research is to be immediately applicable, it more shows a direction that could be useful in the future. Shor's algorithm has not been used practically, but it's hard to imagine modern cryptography without "post quantum" being an important topic.


Sounds like it's a pretentious researcher trying to be clever.


Not just big companies, government travellers too. There's a reason military is allowed to board first.


What's the reason? I assume this is a US thing?


It’s similar to tipping, once one guy starts doing it all the others look like assholes unless they start doing it too. A similar phenomenon happens sometimes in drive-through coffee shops: someone will pre-pay for the coffee of the person behind them in line, then that person is informed that a stranger paid for their coffee. There is then a social expectation to do the same thing for the next person in line to keep the chain of anonymous “charity” going. Nobody wants to be the asshole that breaks the chain. It’s certainly an odd phenomenon, but many people love it.



The stated reasons is patriotism. The real reason is that the military buys a lot of airline tickets and the military member gets to choose from a list of flights from a variety of airlines.


Military also are allowed more than the normal allowance of baggage and carry-on for the same reason.

Families with children are also allowed to board early, because they slow down the boarding process otherwise.


I suspect that one airline made the first step with that, and it was name-and-shame until everyone fell in line at that point.


The commenter didn't say anything about caste.


I'm pretty sure Russian hackers target former USSR countries. Estonia and Ukraine come to mind, but I would imagine all of the Baltic states, Georgia, and Moldova would be ok as well.


There was an article about this -https://krebsonsecurity.com/2021/05/try-this-one-weird-trick... . Basically, malicious programs will not target hosts that have Cyrillic or other languages of Russian aligned countries.


There have been a ton of attacks originating from Russia against Ukraine and Estonia very publicly. Read Sandworm for a deep dive. Just because some hackers are lazy and use a Cyrillic keyboard as a lazy man's geofencing does not mean these countries are off limits.


Yes, I agree with you. I just remember some countries were not targeted by Russian hackers, think like some agreement.


I read a lot of James Bond novels, so I can imagine what goes on...


Does the 44% not include the 26%?


If your threat model includes the nation state where you physical infrastructure is, you're hosed.


> If your threat model includes the nation state where you physical infrastructure is, you're hosed.

True. But even if you trust your nation state 100%, having a backdoor means you now have to worry about it falling into the wrong hands.


Even if you trust your nation state 100% having a backdoor means it has already fallen into the wrong hands. That's because 'nation state' is not synonymous with 'people running the nation state'.


Literally hosed. There's a funny jargon term "rubber hose cryptography" that's used to refer to the cryptanalysis method where you beat someone with a rubber hose until they give you the key. It's 100% effective against all forms of cryptography including even post-quantum algorithms.


You would be surprised that for a percent this would not work. Some even like it. Some have a deathwish and want to be a martyr. Some people blow themselves up to further a cause. Also put under heavy stress memories of keys cannot be recalled at times.

It's probably slightly less effective than threatening to kill family members but probably more than threat of jail time.

Either way you require someone alive and with mental awareness. The mind reading tools found in science fiction hasn't been developed yet.


It doesn't matter, something will be found that will coerce them into talking. Nobody is an island. Everyone has a breaking point, if it's not rubber hoses, it's socks full of rocks, or it's bottles of mineral water, or any number of methods. Don't think for a second that someone hasn't thought of a better way to get information out of somebody else.


Yep... read up on interrogation resistance.


We're talking about normal people, not psychopaths.


Terrorists are generally highly altruistic, not psychopaths.

It’s a lot easier to blow yourself up(or to spread ideology which encourages it)for a cause that you believe is helping people, in particular _your_ people.


The terrorists that blow themselves up and that blow other people up are usually misguided brainwashed angry young men. It's nothing to do with ideology, everything to do with power. Or did you think blowing up schools full of girls is something people genuinely believe helps their people, to give just one example?

Ordinary people just want to be left alone. Old guys wishing for more power will use anything to get it, including sacrificing the younger generations.


> did you think blowing up schools full of girls is something people genuinely believe helps their people

It absolutely is something that they think helps their people, yes.


No, it's something that a bunch of old guys with issues told them helps their people.

Beliefs stop when they are no longer about yourself but about how other people should live. Especially when those other people loudly protest that this is how you think they should be living. Killing them is just murder, not the spreading of ideas.

But hey, those human rights are just for decoration anyway.


> it's something that a bunch of old guys with issues told them helps their people

I don’t understand why you said “no” before this; I believe this agreed with what I’m saying.


We're back to what psychopathy is all about:

https://en.wikipedia.org/wiki/Psychopathy#Signs_and_symptoms


The old men persuade the would-be suicide bomber that educating women will liberate and liberalize them, and that this is counter to the interests of those who prefer the traditional order of society. Are they even lying?


Yes, they're lying.

The 'traditional order of society' is a society run by psycho pathological individuals and benefits nobody except for those individuals.

But you already knew that, didn't you?


You're deeply mistaken if you think there aren't men who don't genuinely prefer the traditional order of women being subjugated by men.

1. Not everybody shares your values.

2. People who don't share your values are not necessarily brainwashed.

3. People may do things that are irrational under your system of values, but rational under their own.

And BTW, there is no a single fighting force in the world that doesn't have old men persuading young men to sign up and risk throwing away their lives. There's not a whole lot of difference between regular soldiers persuaded to participate in a forlorn hope or banzai charge attacking a defended position and a suicide bomber or kamikaze.


Are you saying that liberalizing the society is not counter to the interests of those who prefer traditional society?

I think it clearly is.


Who makes that determination ? And by what justification ?


That's actually not true. It can do nothing about M of N cryptography. (That's when a key is broken up such that there are N parts, and at least M (less than N) are required to decrypt. It doesn't matter how many rubber hoses you have, one person can fully divulge or give access to their key and it's still safe.


I always giggle a little when really smart people forget thugs exist and do what they’re told. If that includes breaking the knees of M people to get what they’re after, then M pairs of knees are gonna get destroyed.

This isn’t hard to understand, but it’s easy to forget our civilization hangs by a thread more often than any of us care to admit.


I don't remember the provenance of the quip, but somewhere at a def con or a hope, I heard, "The point of cryptography is to force the government to torture you."


They're perfectly ok with that, and depending on where you live this may happen in more or less overt ways. If the government wants your information, they will get your information. Your very best outcome is to simply rot in detention until you cough up your keys.


Now that I think about it, I'm pretty sure it was a session about root zone security, and Adam Langley was in the room. I was thinking, damn, kinda sucks to be the guy that holds Google's private keys. They want someone's information, so they let you rot...


power in numbers

can't torture us all!


Are we deep enough in the thread for the customary reminder that each measure makes it incrementally harder to attack a system?

(Including a system of people.)

Even nation state adversaries don’t have infinite resources to allocate for all opponents.


I think you can probably get away with only breaking one pair of knees and sending a video of it to the other people.


Youtube would delist that before they could all see it though.


You know there are other ways to have a video and send it to people than YouTube, right? You can just email a link from dropbox or gdrive, or an attachment, or send a WhatsApp/Telegram/etc. message, send a letter with a USB drive, etc.


Yes. It was just a dumb joke :/


> You can just email a link from dropbox or gdrive, or an attachment, or send a WhatsApp/Telegram/etc. message

Why do you think governments are demanding those services give them access to quickly remove "misinformation"?


Any organization that is really really serious about security will obviously keep at least N-M +1 folks, along with their family, in other countries.

Which is a much much higher bar to clear for any would be rubber hose attackers.


Your secrets aren't really safe unless Xi and Putin each have part of your key personally memorized.


That’s hyperbole


Lets say for example

Bob, Jon, and Tom have pieces of the key. Bob and Jon are in the US and arrested over and commanded by a court to give up the key. Tom is the holdout. The US will issue an international arrest warrant, and now Tom can never safely fly again or the plane will be diverted to the nearest US friendly airport where they will be extradited. So, yea, "safe" is very situational here.


Doesn't Tom's key fragment have to be on a disk somewhere for things to work?

That's the actual weak link to attack.


That situation just requires a longer hose


Or M hoses.


and more beatings.


Sure, so you hit all of the people that have all of the pieces. Problem solved.


Or you publicly announce you're hitting 1 of the N people with the rubber hose until M-1 of the other people send you their key fragments.

It's not like these keys are shared among disinterested strangers who have no attachment to each other.


Somehow, somewhere you've just influenced a megacorp's internal crypto process.


This probably works if each person has a cyanide+happy drug pill or a grenade and is willing to sacrifice themselves and the rubber-hoser(s). I think that requires a rare level of devotion. This process must also disable a simple and fragile signalling device to let the others know what's coming.


This would not work well, because you can’t do it in a secret manner. Overuse of the rubber hose cryptography will become known, and there will be public backlash.


Seems like the NSA is threatening everyone of arrest (=state-organized violence) if they don’t secretly give them keys, and Snowden revealed it, and there is no public backlash.


Hose-resistant cryptography is possible. Secret sharing comes to mind, or a system by which even the principals can only compromise a key slowly.


I mean in the end everything is people just like Logan Roy said in Succession. Cryptography or any software protections are the same. It's a great quote that is very true:

> "Oh, yes... The law? The law is people. And people is politics. And I can handle of people."


“I can handle of people”? Cannot parse.


I think that was a mobile typo. The quote is just "I can handle people"


i feel like "typo" should mean "typing error" and not "autocorrect fubar"

mixing the two implicates humans for the errors of machines

edit:

unless failure to disable autocorrect is counted as a user error


That's exactly what happened!


Addendum: if your threat model includes any nation state that has significant ties to the nation state that hosts your physical or transit infrastructure, you're hosed.


How might this apply or what are the implications of Signal given its US jurisdiction?


The US authorities can make the same orders that they made with LavaBit (i.e. ordering them to produce a backdoored build and replace yours with it), and they can make them secretly. Given that Signal by design requires you to use it with auto-update enabled (and, notably, goes to some effort to take down ways of using it without auto-update), and has no real verification of those auto-updated builds, I would consider it foolish to rely on the secrecy of Signal if your threat model includes the US authorities or anyone who might be able to call in a favour with them.


How odd. I have, and continue, to use Signal without auto-update enabled.

I have been prompted, twice in three years to update though.

Perhaps the requirement depends on your country?


Ya, does it do that thing banking apps do where it insists on the most recent version in order to even be usable?

Otherwise, thats more of an iOS option that can be easily altered

Settings < App Store < Automatic Downloads > App Updates


Signal started keeping sensitive user data in the cloud a while ago. All the information they brag about previously not being able to turn over because they don't collect it in the first place, well they collect it now. Name, photo, phone number, and worst of all a list of all your contacts is stored forever.

It's not stored very securely either. I wouldn't doubt that three letter agencies have an attack that lets them access the data, but even if they didn't they can just brute force a pin to get whatever they need.

https://community.signalusers.org/t/proper-secure-value-secu...


Signal relies on the client program to not be compromised to keep conversations secret


Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: