The Internet: all encrypted, all the time?
Can the Internet be encrypted by default?
With the current debates about lawful intercept and increasing numbers of man-in-the-middle attacks, maybe the Internet should finally be made secure by default.
Encryption is currently used sparingly, mostly when connecting to e-commerce and financial services over the web. Here the https protocol is used and traffic between the user’s web browser and the server is protected from eavesdropping using SSL. The problems with this scheme are legendary, mostly associated with requiring users to notice when encryption is on and off, and knowing how to interpret certificate information and error messages.
But could encryption be turned on all the time, automatically?
Google has recently made https the default for Gmail, demonstrated that encryption can be scaled to millions of users. What about scaling it to the entire Internet?
Tcpcrypt is an extension to the TCP protocol designed to make encryption the default. It is backwardly compatible with traditional TCP, and it would protect old applications that don’t have encryption. And it works faster than the SSL we rely on today.
You can read more about tcpcrypt in a recent technical paper, on a tcpcrypt community web site, and on Wikipedia.
The Internet: all encrypted, all the time? Read More »

A good,
Google is introducing two-factor authentication to its Google Apps products. This means that in order to access the enterprise services (mail, documents, etc.) the Google user will have to know their password and also supply a one-time verification code. That code will be sent to your cell phone, or generated by a special application on the smart phone.
There are
Employers are
Researchers will be presenting a paper at the IEEE security conference in Oakland next week that demonstrates various attacks against the computer systems in modern cars. These attacks allow someone to control a variety of systems, including the breaks, and even erase all evidence of the attacks. We know a lot about building safety critical systems, but we seem to also be good at ignoring the lessons.
Here is an interesting attack method: launch a denial-of-phone attack to prevent communication with a bank while draining the accounts. Apparently, fake VoIP accounts were setup to phone the victim repeatedly while the bad guys transferred thousands of dollars out of the accounts. This is an example of a cross-over attack using different types of technologies to perform the fraud.
A military supplier has been making lots of money selling dowsing-like devices to troops in Iraq that are supposed to detect explosives and other nasty materials. They devices come equipped with different programming cards to customize the substances they search for.
My new employer, The Office of the Privacy Commissioner of Canada, is again calling for research and public education proposals for its contributions programs.