{"id":27463,"date":"2014-11-16T21:44:19","date_gmt":"2014-11-17T02:44:19","guid":{"rendered":"http:\/\/www.opensource.im\/?p=27463"},"modified":"2014-11-16T21:44:19","modified_gmt":"2014-11-17T02:44:19","slug":"everything-needs-crypto-says-internet-architecture-board","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/everything-needs-crypto-says-internet-architecture-board.php","title":{"rendered":"EVERYTHING needs crypto says Internet Architecture Board"},"content":{"rendered":"<p><p>        Beginner's guide to SSL certificates  <\/p>\n<p>    The Internet Architecture Board (IAB) has called for encryption    to become the norm for all internet traffic.  <\/p>\n<p>    Last Friday, the IAB issued a statement saying that since there    is no single place in the Internet protocol stack that offers    the chance to protect all kinds of communication, encryption    must be adopted throughout the protocol stack.  <\/p>\n<p>    The     statement reflects earlier, more piecemeal moves in the    Internet Engineering Task Force (IETF) to start    spook-proofing the Internet.  <\/p>\n<p>    Rather than looking at a particular protocol proposal, the IAB    statement is designed to lay down a fundamental principle for    designers: encryption, the board says, should be the norm for    Internet traffic.  <\/p>\n<p>    Encryption should be authenticated where possible, but even    protocols providing confidentiality without authentication are    useful in the face of pervasive surveillance.  <\/p>\n<p>    The statement strengthens a long-held view within the Internet    Engineering Task Force articulated in 1986 in RFC 1984, which    stated that    government policies to monitor the Internet are against the    interests of consumers and the business community, are largely    irrelevant to issues of military security, and provide only    marginal or illusory benefit to law enforcement agencies.  <\/p>\n<p>    This year, RFC    7258, described pervasive monitoring as an     attack.  <\/p>\n<p>    Even where a protocol's own operation doesn't need encryption,    the IAB wants protocol designers to think beyond their    immediate problem, because information leaked by one protocol    can be made part of a more substantial body of information by    cross-correlation.  <\/p>\n<p>    In other worlds, even if a protocol doesn't particularly deal    with user traffic, such as one handling negotiations between    routers, its designers should adopt encryption to ensure it    doesn't reveal information that does somehow compromise    privacy.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Go here to read the rest:<br \/>\n<a target=\"_blank\" href=\"http:\/\/go.theregister.com\/feed\/www.theregister.co.uk\/2014\/11\/16\/net_gurus_face_off_against_spooks_encrypt_everything\" title=\"EVERYTHING needs crypto says Internet Architecture Board\">EVERYTHING needs crypto says Internet Architecture Board<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Beginner's guide to SSL certificates The Internet Architecture Board (IAB) has called for encryption to become the norm for all internet traffic. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-27463","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/27463"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=27463"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/27463\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=27463"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=27463"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=27463"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}