summaryrefslogtreecommitdiff
path: root/8d/9b45db494d9743e24004cb527ec0145a03d8a4
blob: d8a2abf1a6d42c5cd6b9c9a6e08dd5e5db56709b (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
Received: from sog-mx-1.v43.ch3.sourceforge.com ([172.29.43.191]
	helo=mx.sourceforge.net)
	by sfs-ml-3.v29.ch3.sourceforge.com with esmtp (Exim 4.76)
	(envelope-from <will.yager@gmail.com>) id 1XJuZ4-00028x-Ba
	for bitcoin-development@lists.sourceforge.net;
	Wed, 20 Aug 2014 01:19:50 +0000
Received-SPF: pass (sog-mx-1.v43.ch3.sourceforge.com: domain of gmail.com
	designates 209.85.216.45 as permitted sender)
	client-ip=209.85.216.45; envelope-from=will.yager@gmail.com;
	helo=mail-qa0-f45.google.com; 
Received: from mail-qa0-f45.google.com ([209.85.216.45])
	by sog-mx-1.v43.ch3.sourceforge.com with esmtps (TLSv1:RC4-SHA:128)
	(Exim 4.76) id 1XJuZ3-00088A-Fw
	for bitcoin-development@lists.sourceforge.net;
	Wed, 20 Aug 2014 01:19:50 +0000
Received: by mail-qa0-f45.google.com with SMTP id cm18so6366765qab.32
	for <bitcoin-development@lists.sourceforge.net>;
	Tue, 19 Aug 2014 18:19:44 -0700 (PDT)
MIME-Version: 1.0
X-Received: by 10.140.28.6 with SMTP id 6mr68271420qgy.90.1408497584011; Tue,
	19 Aug 2014 18:19:44 -0700 (PDT)
Received: by 10.140.51.37 with HTTP; Tue, 19 Aug 2014 18:19:43 -0700 (PDT)
In-Reply-To: <e8baf847-6829-4d0f-85fb-5fd194ae9054@email.android.com>
References: <CA+8=xuJ+YDTNjyDW7DvP8KPN_nrFWpE68HvLw6EokFa-B-QGKw@mail.gmail.com>
	<CA+8=xuKRyO1=bu7cgNGHvtAeqgKBxjTH2uUkb61GdCuEQWEu5A@mail.gmail.com>
	<0C0EF7F9-DBBA-4872-897D-63CFA3853726@ricmoo.com>
	<CA+8=xu+KWSF6XYgH-_t87na6M6UOD0CM1su8sizxn5a4b0_Xrw@mail.gmail.com>
	<33D4B2E3-DBF0-444E-B76A-765C4C17E964@ricmoo.com>
	<53F37635.5070807@riseup.net>
	<CAAS2fgTF6424+FfzaL=+iaio2zu_uM_74yKohi7T3dtz=J9CjA@mail.gmail.com>
	<53F38AC9.4000608@corganlabs.com> <53F3DFF7.9070709@jrn.me.uk>
	<CAJHLa0ORxgQrkc4oiqSa3NdNHLU-0pmZDLjXUSpBKWBsBWTgcQ@mail.gmail.com>
	<3476b0a1-e08a-46bf-9ee4-ef56fcb02d72@email.android.com>
	<CAJHLa0PnvpAaTgaUej=1G7CJ9=BYSjEWvXybfEaG9pFJxsM8fQ@mail.gmail.com>
	<b7934ce1-a22f-42d2-92ed-bc5a1c3a27be@email.android.com>
	<CAG8oi1PSnuP2UHqNRbcwmU8TPEh__Nw-npa=itQrUsnNeMVkBw@mail.gmail.com>
	<e8baf847-6829-4d0f-85fb-5fd194ae9054@email.android.com>
Date: Tue, 19 Aug 2014 20:19:43 -0500
Message-ID: <CAG8oi1MpMVqp_Am6aj=hLV5z-CfY7HNSuMQ6k4uVscM=aKsOYA@mail.gmail.com>
From: William Yager <will.yager@gmail.com>
To: Peter Todd <pete@petertodd.org>, 
	Bitcoin Dev <bitcoin-development@lists.sourceforge.net>
Content-Type: multipart/alternative; boundary=001a1139807629818505010566fd
X-Spam-Score: -0.6 (/)
X-Spam-Report: Spam Filtering performed by mx.sourceforge.net.
	See http://spamassassin.org/tag/ for more details.
	-1.5 SPF_CHECK_PASS SPF reports sender host as permitted sender for
	sender-domain
	0.0 FREEMAIL_FROM Sender email is commonly abused enduser mail provider
	(will.yager[at]gmail.com)
	-0.0 SPF_PASS               SPF: sender matches SPF record
	1.0 HTML_MESSAGE           BODY: HTML included in message
	-0.1 DKIM_VALID_AU Message has a valid DKIM or DK signature from
	author's domain
	0.1 DKIM_SIGNED            Message has a DKIM or DK signature,
	not necessarily valid
	-0.1 DKIM_VALID Message has at least one valid DKIM or DK signature
X-Headers-End: 1XJuZ3-00088A-Fw
Subject: Re: [Bitcoin-development] Proposal: Encrypt bitcoin messages
X-BeenThere: bitcoin-development@lists.sourceforge.net
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: <bitcoin-development.lists.sourceforge.net>
List-Unsubscribe: <https://lists.sourceforge.net/lists/listinfo/bitcoin-development>,
	<mailto:bitcoin-development-request@lists.sourceforge.net?subject=unsubscribe>
List-Archive: <http://sourceforge.net/mailarchive/forum.php?forum_name=bitcoin-development>
List-Post: <mailto:bitcoin-development@lists.sourceforge.net>
List-Help: <mailto:bitcoin-development-request@lists.sourceforge.net?subject=help>
List-Subscribe: <https://lists.sourceforge.net/lists/listinfo/bitcoin-development>,
	<mailto:bitcoin-development-request@lists.sourceforge.net?subject=subscribe>
X-List-Received-Date: Wed, 20 Aug 2014 01:19:50 -0000

--001a1139807629818505010566fd
Content-Type: text/plain; charset=UTF-8

On Tue, Aug 19, 2014 at 8:14 PM, Peter Todd <pete@petertodd.org> wrote:

>
> Don't let perfect be the enemy of good.
>

I'm not. I don't think this proposal is even good.


> You realize that by your own definition even the NSA is mostly a "weak
> passive attacker" They do *not* have the ability to attack more than a
> small, targeted, subset of connection for both technical and political
> reasons. For starters, MITM attacks are easily detected - "Bitcoin network
> attacked by unknown agents! Has your ISP been compromised?" would make for
> great headlines and would soon see the problem fixed both technically and
> politically.
>
>
Again, the NSA might get an absolutely trivial amount of data from
monitoring connections on the Bitcoin network. A bit of publicity is *not*
worth drastically increasing the software complexity of the client.


> In any case, my suggestion of enabling hidden service support by default
> adds both encryption and reasonably good authentication.


Enabling hidden service support by default would introduce an insanely huge
attack surface.

And you're conflating two different things; using Tor is valuable to
Bitcoin because it would provide some anonymity. The encryption aspect is
pretty much useless for us.

--001a1139807629818505010566fd
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">On Tue, Aug 19, 2014 at 8:14 PM, Peter Todd <span dir=3D"l=
tr">&lt;<a href=3D"mailto:pete@petertodd.org" target=3D"_blank">pete@petert=
odd.org</a>&gt;</span> wrote:<br><div class=3D"gmail_extra"><div class=3D"g=
mail_quote">
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex"><div class=3D"">
<br>
</div><div class=3D"">Don&#39;t let perfect be the enemy of good.<br></div>=
</blockquote><div><br></div><div>I&#39;m not. I don&#39;t think this propos=
al is even good.</div><div>=C2=A0</div><blockquote class=3D"gmail_quote" st=
yle=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
You realize that by your own definition even the NSA is mostly a &quot;weak=
 passive attacker&quot; They do *not* have the ability to attack more than =
a small, targeted, subset of connection for both technical and political re=
asons. For starters, MITM attacks are easily detected - &quot;Bitcoin netwo=
rk attacked by unknown agents! Has your ISP been compromised?&quot; would m=
ake for great headlines and would soon see the problem fixed both technical=
ly and politically.<br>
<br></blockquote><div><br></div><div>Again, the NSA might get an absolutely=
 trivial amount of data from monitoring connections on the Bitcoin network.=
 A bit of publicity is *not* worth drastically increasing the software comp=
lexity of the client.</div>
<div>=C2=A0</div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8=
ex;border-left:1px #ccc solid;padding-left:1ex">
In any case, my suggestion of enabling hidden service support by default ad=
ds both encryption and reasonably good authentication.</blockquote><div><br=
></div><div>Enabling hidden service support by default would introduce an i=
nsanely huge attack surface.=C2=A0</div>
<div><br></div><div>And you&#39;re conflating two different things; using T=
or is valuable to Bitcoin because it would provide some anonymity. The encr=
yption aspect is pretty much useless for us.</div></div></div></div>

--001a1139807629818505010566fd--