• (disco)
  • (disco)

    @Remy was on that unlist-watch almost faster than @PaulaBean...

    Edit: Also, mailto link was strip-ified:

    (mailto:[email protected]?subject=“Encryption By Analogy Reply”)

  • (disco) in reply to Tsaukpaetra

    Good catch. And yeah, I sometimes unlist manually when the Paula craps out when I create the article. It prevents accidental multiple threads.

  • (disco)

    Trump is basically what happens when you seed a Markov Chain out of 4chan threads and let it run for President.

    :laughing:

  • (disco)

    Our bad intuition when it comes to probability can be seen in the Monty Hall Problem

    ...oh dear.

  • (disco)

    I'm disappointed with Pres. Obama's positions on personal privacy and the power of the security services in this country. I must confess, I expected him to be more on the side of the individual, and less on the side of government intrusion. But then, he turned out to be more of a friend to Big Business than I had hoped he would be as well.

    Look, the Snoops can follow your every move by tracking your phone, monitor every call, SMS and internet connection it makes, all in real time. The only thing that leaves, is the contents of the phone, which they can also obtain. But do I have to give them the encryption keys as well? No, I don't. They're perfectly able to figure them out for themselves if they want to badly enough. It's just easier to strong-arm Apple into doing it for them.

  • (disco)

    Take a random person, and ask them: “I flipped a coin ten times, and it came up heads every time. Is it more or less likely that the next flip will also be heads?” Most people will get it wrong, because we intuitively know that 11 heads is very unlikely, but actually every coin flip is strict 50/50 odds.

    In fact the more times it comes up heads the more you should bet on heads -- the coin is more likely to be biased to heads.

    While Schroedinger's cat may or may not be dead Hetherington's cat, F.D.C. Willard aka Chester is known to be dead by now...Though he was probably still alive when I took Classical Mechanics from Hetherington as an undergrad.

  • (disco)

    Maybe we need a better analogy than a "key" + "lock".

    A lot of encryption is about signatures, maybe those are a better analogy to emphasise - is there ever a time when it's OK for someone else to forge your signature?

    Or counterfeit protection - should we have a "less absolutist" stance on anti-counterfeit measures on currency and financial transactions?

  • (disco)

    Are you sure that's really the President's view on encryption, Wayne? Because it looks a heck of a lot like a goat. Maybe I should pick the other door...

  • (disco)

    I actually think the analogy of a safe still holds for the most part. The big difference is that the safe isn't buried in your house or behind a bigger, heavier safe (i.e., a bank vault). Your safe is attached to a quad copter with infinite fuel and a publicly accessible web interface where anybody can make it come to them whenever they want. So yeah, you've got a safe, but literally anybody can attempt to break into it under whatever conditions they please.

    Given that, what would most people put into the safe? Probably nothing very important: if anybody figures out a weakness in a model of safe, they'll just instruct every quad copter carrying that model safe to them and they'll have access to all of the juicy data therein. It also can't have a little red button that only the cops know about that opens it without the password, because if anybody else finds the red button, it will invalidate the security of every model of safe that has the button.

    Well, the data on our phones or stored in our networks is the safe attached to the quad copter. If you're going to put anything important on there, then the safe has to be as impenetrable as the technology of the time allows.

  • (disco)

    Observation: the article comments on the "I don’t see why it’s so hard to make encryption that the government can spy on" fallacy.

    It's easy to make encryption the government can spy on. What's hard is making encryption that only the government can spy on.

  • (disco)

    @boomzilla, @PJH, @abarker, @Yamikuronue, @aliceif, @Remy I do believe this should be listed now.

  • (disco)
  • (disco)
  • (disco)

    now, now.... @Yamikuronue, @PJH.... No need to fight over who gets to push the button.

    [image]
  • (disco) in reply to accalia

    We weren't. Seems two other people were though...

    [image]
  • (disco)

    Last week, US President Obama said something that is usually the sort of line we give the “idiot boss” character in one of our stories.

    He's good at those sorts of lines. :passport_control:

    Take a random person, and ask them: “I flipped a coin ten times, and it came up heads every time. Is it more or less likely that the next flip will also be heads?” Most people will get it wrong, because we intuitively know that 11 heads is very unlikely, but actually every coin flip is strict 50/50 odds.

    I'd suspect the coin may have two heads under these conditions.

    When the President says, “Hey, if we have a warrant, we should be able to search your phone,” that’s intuitively correct (that’s the whole point of a warrant), but actually wrong. As previously stated, encryption that can be broken isn’t encryption worth having.

    TDEMSYR. "We should be able to search your phone" is independent of the encryption. At that point, you are required to hand over the keys, IIRC. This is confusing the legal / moral issue with the encryption. If you had an "impenetrable" vault only accessible through some magic power you have, they should able to search it upon a warrant. That's orthogonal to the actual ability to compel you to follow the law.

    When I see things like this battle of encryption, I think that it’s less important to educate people about the correct details, and more important to break their incorrect preconceptions.

    Maybe your incorrect preconception is that they agree with you that truly unbreakable encryption is a good thing.

  • (disco)

    I saw an analogy that seemed alright to me. It's still with its flaws but it's not horrible:

    Imagine there's a house that had a grim murder in it. It's in a community where everyone has their own key, but if you don't have that key, then there's no brute force way to get in. The only solution would be to provide a special key that one can use to enter any house. The investigators can get that key, for sure, but there's no foolproof way to keep it from getting copied and eventually sold on the black market for anyone to use.

    Now, imagine that, instead of a house where you have to, you know, travel to it to even break in, this house exists in a virtual realm where anyone can access it from anywhere. They could be in another state, country, or even continent. Hell, they could even be in the International Space Station and have the same access to your stuff, and you won't even know if they ever accessed it.

    That is until you find your nude photos on 4chan.

  • (disco)

    "Most of you have probably seen a demonstration or visualization like this one which uses a rubber mat to show how gravity warps spacetime. [...] Of course, both of those analogies actually do a really bad job of actually explaining the phenomenon. They’re simplistic and obscure a lot of details in the name of getting the point across- in technical terms, they’re leaking abstractions"

    Look-a-here: https://astronomy.stackexchange.com/questions/14148/how-does-gravity-really-work and here: https://xkcd.com/895/

  • (disco)

    Sticking to the key/lock/vault analogy, and using a master key as a government back door, let's continue with an actual example:

    TSA master keys got photographed, and now anyone can have a master key to any luggage in any airport.

    Extend the example:

    The bad guy puts his stuff in a box, locks that with a different key, and puts that box in his luggage. The bad guy is safe. Everyone else has unlocked luggage.

  • (disco) in reply to RFoxmich
    RFoxmich:
    Take a random person, and ask them: “I flipped a coin ten times, and it came up heads every time. Is it more or less likely that the next flip will also be heads?” Most people will get it wrong, because we intuitively know that 11 heads is very unlikely, but actually every coin flip is strict 50/50 odds.

    I had a discussion about blackjack with a coworker yesterday. He claimed that an inexperienced player "screws up the table" by taking other people's cards. No matter how many times I told him that it's equally likely that the player would take your good card as take your bad card, he wouldn't budge on his belief that the guy to the right of him influences his chance of winning. He was completely deaf to the idea that if you are counting, more known cards makes the count more accurate. His only basis for his opinion was the times he "felt cheated" by a guy who took a stupid hit, busted, and went down with the exact card the coworker needed to make 21.

  • (disco)
    Remy Porter:
    I’m going to assume the person I’m talking about is sincere and attempting to make the correct choice. I will assume no one is being willfully ignorant, manipulative, or purposefully harmful.

    Bad, bad, bad assumption.

    It is a much much safer and better assumption to assume that almost all politicians, regardless of ideology, are insincere and manipulative. Sometimes ignorant (although I doubt that in this case) and almost always harmful to our rights.

    Trying to educate a politician as to the facts, when they already know the facts and simply do not want to publicly acknowledge them because they are inconvenient to acknowledge and would be harmful to their agenda, is a waste of time.

  • (disco) in reply to Developer_Dude

    As I mentioned in the HTML comments- it's the spherical chicken in a vacuum assumption.

  • (disco)

    Astronomer and science-popularizer Neil DeGrasse-Tyson put his foot in it last week, when he tweeted “If there were ever a species for whom sex hurt, it surely went extinct long ago.” Now, he’s an extremely smart man, and has done great things for helping the public grasp with some serious cosmic questions- but this statement is wrong. Just ask bed-bugs.

    Not to mention black widow spiders...

    Tyson reminds me of Michael Jordan: A superstar in one very specific field, but dangerously incompetent outside of it, particularly when he says things like how we shouldn't worry about GMOs because they're exactly equivalent to selective breeding, which mankind has practiced throughout history. Nevermind that 1) selective breeding has done real harm in some cases (producing monocultures and wiping out genetic diversity) and 2) there's a huge difference between breeding (mixing around genes naturally found in a species) and genetic manipulation (adding new genes that never existed in the species's genome).

    Saying something like that, as a respected scientist that people actually listen to, is scary because it can do real harm. I lost a ton of respect for him at that point.

  • (disco)

    The biggest part of this mess that is forgotten is that the FBI had the opportunity to get the information they needed. Apple told the FBI to not reset the cloud service password for the account. They were told to let the phone synchronize to the cloud service. At that point, Apple was ready and willing to cooperate and give the FBI what they needed.

    But instead, the upper-level idiots at the FBI reset the password, thus bringing us down the path we are on. So, the analogy is that the FBI is asking for the master key to unlock every iPhone--making every iPhone insecure, because they were too stupid to follow the instructions that allowed them entry to a single iPhone. Kinda like, "Oops, I put a wall up over the door--can you give me a rocket launcher so that I can get in?"

  • (disco) in reply to JanDoggen

    I thought I had the perfect analogy to explain the nature of the analogy of the rubber sheet to spacetime, but when I thought about it some more it wasn't really the same thing at all.

  • (disco)

    I think we have all struggled with explaining technical limitations to stake holders who don't understand the why of things, and it is a struggle.

    My solution in the work place has been to take the stance of "I am the expert, you pay me for my expertise, take it"

    The reality is there is no way of making people understand a complex subject without first teaching them the complexities. If they can't be bothered to learn then, simply put, they will never learn.

    What we will really need are laws in place that state policy makers need to be educated on the topics for which they are making policies on. Yes it is a burden, but so is having law makers making decisions on things they don't even understand.

    You don't hear law makers require that doctors "just grow an arm back" because "we landed a guy on the moon" and because "my laser eye surgery worked"....

    When a doctor says "This is my advice, I am the expert so listen" lawmakers tend to listen and admit to themselves "maybe they can't grow back an arm"....

    Security and tech experts need the same clout, so that when they say "we are the experts, listen to our expertise" the lawmakers don't feel like it is up for debate.

  • (disco) in reply to CarrieVS

    You should have used a cat.

    Or maybe just put butter on one side of the rubber sheet.

  • (disco)

    BTW, you don't even need math for strong (and in fact unbreakable) encryption: Use one-time pads.

    Yes there's a couple drawbacks, like the fact that you need to be able to distribute them. But unless your pad is noticeably nonrandom, it's solid. On the subject of 1time pads: does anyone know if recycling a pad within a single message leads to any decryption capabilities? Because if not, then once you've distributed the first pad, you just use it to encrypt and send out the next one-time pad, ... :smile:

  • (disco) in reply to cellocgw

    and.. naturally, recycling is A Bad Thing (tm) . OTOH, combined with quantum encryption, there's a paper from 2005 which claims

    Quantum information is a valuable resource which can be encrypted in order to protect it. We consider the size of the one-time pad that is needed to protect quantum information in a number of cases. The situation is dramatically different from the classical case: we prove that one can recycle the one-time pad without compromising security. The protocol for recycling relies on detecting whether eavesdropping has occurred, and further relies on the fact that information contained in the encrypted quantum state cannot be fully accessed. We prove the security of recycling rates when authentication of quantum states is accepted, and when it is rejected. We note that recycling schemes respect a general law of cryptography which we prove relating the size of private keys, sent qubits, and encrypted messages. We discuss applications for encryption of quantum information in light of the resources needed for teleportation. Potential uses include the protection of resources such as entanglement and the memory of quantum computers. We also introduce another application: encrypted secret sharing and find that one can even reuse the private key that is used to encrypt a classical message. In a number of cases, one finds that the amount of private key needed for authentication or protection is smaller than in the general case.

    Not that it would be a surprise if some subsequent paper disproved this. Quantum stuff is weird.

  • (disco) in reply to cellocgw

    Isn't that essentially what Google Authenticator does?

  • (disco)
    TheDawgLives:
    A great take on Sheri Pym

    ..the wife of Ant-man?

  • (disco) in reply to Yamikuronue
    Yamikuronue:
    Isn't that essentially what Google Authenticator does?
    [s]Pretty much, yeah[/s] Seems I misread; oh well
  • (disco) in reply to cellocgw
    cellocgw:
    On the subject of 1time pads: does anyone know if recycling a pad within a single message leads to any decryption capabilities?
    Yes, it's subject to the ratchet attack. If you're able to guess part of the plaintext of one message, you can use that portion of the pad against the other part of the first message and see if it makes sense. Chances are you'll end up in the middle of some plaintext whose surrounding structure you can guess, and use against the first part of message, using each to further decrypt the other.
    cellocgw:
    Because if not, then once you've distributed the first pad, you just use it to encrypt and send out the next one-time pad.
    This does defeat the ratchet attack, but it's still weaker. You need to find a document encrypted with the second pad, and you can validate the guesses you make about the first document with the second. But there's not a way to propagate discovery back from the second document to the first, since there's no way to figure out what entropy belongs to which one-time pad, only the sum of them both.
    Yamikuronue:
    Isn't that essentially what Google Authenticator does?
    Nope, it encrypts the timestamp or counter directly, without forming a chain of all timestamps back to 1970 / all counters back to provisioning. It's all about *speed*, man. [image]
  • (disco) in reply to Mason_Wheeler
    Mason_Wheeler:
    Tyson reminds me of Michael Jordan: A superstar in one very specific field, but dangerously incompetent outside of it, particularly when he says things like how we shouldn't worry about GMOs because they're exactly equivalent to selective breeding, which mankind has practiced throughout history.
    That's why I become immediately distrustful when a scientist talks about something not in his field of expertise. For example, I once watched a documentary about water done by Germany's equivalent of the BBC where the first 10 minutes seemed to be fine. Then they go this astrophysicist on the line who talked about how feelings could influence the cristallization of water - shout "Hate" and you'd get very pointy snowflakes, whisper "Love" and you'd get 'nice' snowflakes. :rolleyes:
    Mason_Wheeler:
    2) there's a huge difference between breeding (mixing around genes naturally found in a species) and genetic manipulation (adding new genes that never existed in the species's genome).

    You're forgetting about mutations.

  • (disco) in reply to RFoxmich

    Take a random person, and ask them: “I flipped a coin ten times, and it came up heads every time. Is it more or less likely that the next flip will also be heads?” Most people will get it wrong, because we intuitively know that 11 heads is very unlikely, but actually every coin flip is strict 50/50 odds.

    No, they won't get it wrong. Because it is more likely that the next flip is heads. By a long shot.

    Hint: you didn't stipulate that the coin is fair or that flips are independent. Since there is no reason to assume the coin is fair, the maximum likelihood estimator for the probability of heads on the next flip is 100%.

  • (disco) in reply to Captain

    One of the tests in my stochastics homework once deducted a point because I did not stipulate that "you can only draw as many balls out of the urn as there are balls in the urn."

    That's why I like physics: We don't have to deal with such bullshit.

  • (disco) in reply to Captain
    Captain:
    you didn't stipulate that the coin is fair or that flips are independent

    I'll allow that the coin might not be fair, but individual flips of a coin are pretty much by definition independent, regardless of whether the coin is fair or not.

  • (disco) in reply to anotherusername

    Well, you could make the coin out of lead and scrape off a bit off one side (asymmetrically, of course) every time it falls on this side...

  • (disco)

    Let's put it this way: Your mind is "encrypted" and (presently) only you know the "key". Would you let the government (or anyone else for that matter) have the decrypting key to your mind?

    I didn't think so.

    Sure there are interrogration techniques that will coerce bits from someone, but there is no "key" that will decrypt your entire mind. I consider this a positive thing.

  • (disco) in reply to anotherusername
    anotherusername:
    I'll allow that the coin might not be fair, but individual flips of a coin are pretty much by definition independent, regardless of whether the coin is fair or not.

    Can you toss a coin in such a way as to make it more likely to land (the same way up|the other way up) as you were holding it when you flipped it? If you then always picked it up (the same way|the other way) as it landed, it wouldn't be independent.

  • (disco) in reply to Rhywden
    Rhywden:
    you could make the coin out of lead and scrape off a bit off one side

    Anything fancy like that would go outside of the description of simply "flipping" the coin.

    CarrieVS:
    Can you toss a coin in such a way as to make it more likely to land (the same way up|the other way up) as you were holding it when you flipped it?

    That would be very difficult and also go outside the description of "flipping" it.

  • (disco) in reply to Captain

    What I think Remy was saying is that most people will say "Tails is due so I'll bet on that" when in fact what I was pointing out is that 10 heads in a row is beginning to be evidence of a biased coin and you should bet on heads.

    Since you are cap obvious I'll spell it out:

    Either the coin is fair or it isn't:

    • If the coin is fair the reasoning leading to betting on tails is faulty -- though you still have P=.5 of getting it right, since all tosses are independent samples from a (discrete) probability distribution where P(heads) = P(tails) = 0.5. -- Remy's piont
    • If the coin is biased, the evidence is that it is biased towards heads so betting on heads will give you something better than 0.5 of being right since the next toss is an independent sample from a probability distribution where: P(heads) > 0.5 > P(tails) -- my point.

    Maybe I'm misunderstanding your reply because - uhm ...maybe it's too obvious for me :stuck_out_tongue:

  • (disco) in reply to CarrieVS
    CarrieVS:
    Can you toss a coin in such a way as to make it more likely to land (the same way up|the other way up) as you were holding it when you flipped it?

    It's not just how you toss it, but if/how it lands.

    http://econ.ucsb.edu/~doug/240a/Coin%20Flip.htm

    • If the coin is tossed and caught, it has about a 51% chance of landing on the same face it was launched. (If it starts out as heads, there's a 51% chance it will end as heads).
    • If the coin is spun, rather than tossed, it can have a much-larger-than-50% chance of ending with the heavier side down. Spun coins can exhibit "huge bias" (some spun coins will fall tails-up 80% of the time).
    • If the coin is tossed and allowed to clatter to the floor, this probably adds randomness.
    • If the coin is tossed and allowed to clatter to the floor where it spins, as will sometimes happen, the above spinning bias probably comes into play.
  • (disco) in reply to NedFodder

    So the answer is simple: the coin must be flipped by firing it out of a modified shotgun, bouncing off a kitchen sponge, to then come to rest on a wooden table; the table is then flipped.

    There, that should add sufficient randomness :smile:

  • (disco) in reply to Rhywden
    Rhywden:
    For example, I once watched a documentary about water done by Germany's equivalent of the BBC where the first 10 minutes seemed to be fine. Then they go this astrophysicist on the line who talked about how feelings could influence the cristallization of water - shout "Hate" and you'd get very pointy snowflakes, whisper "Love" and you'd get 'nice' snowflakes. :rolleyes:

    :wtf:

    Did this astrophysicist give any kind of remotely possible explanation? I'd be willing to accept that the difference in vibrations between shouting and whispering could have an effect. I'd even go as far as entertaining the slim possibility that those emotions being active in a person's brain have some subtly different electromagnetic radiation that causes it.

    :fire: Exhibit B: Ben Carson. Widely considered a great neurosurgeon, yet still thinks the Earth is 6,000 years old.

  • (disco)

    Why do non-technical people fail to grasp important issues

    Same reason technical people do. Mostly it's down to not having done enough work to build up the conceptual background required, and that is mostly down to the fact that no human being has infinite amounts of time at their disposal.

    and how can we do a better job helping them?

    By being visibly good at what we do so that when people want an informed opinion they will ask for one.

    The fundamental issue you're trying to address here, it seems to me, is too narrow. Lack of technical knowledge is not the only, or even the most frequent, reason for terrible decision making.

    The making of terrible decisions by powerful people has been a feature of human society for as long as there have been human beings, and there is no way to stop it from happening. All we can do - all any of us can ever do - is keep on attempting to use our own best judgment to influence the decisions we see being made by the powerful people within our own orbits, while continuing our own personal internal jihad against Dunning-Kruger*.

    When the knowledge that you are completely surrounded by utterly sincere Trump supporters becomes too much to bear, I recommend taking long walks in heavily treed country. Don't forget your bells and your pepper spray.

    *Engineers in particular would do well to spend more time paying attention to the output of some of those "useless" liberal arts majors.

  • (disco)

    I don't understand some things in this debate.

    "Government X or politician Y wants to ban encryption" Do they want to ban companies in their country from selling encryption software, or do they want to ban all citizens from running it? So if they succeed, and I implement an encryption scheme in C and run it on my own device, am I breaking the law?

    "A backdoor is different from a warrant to search your home, because it would enable the bad guys to access your data as well" How is it different? The bad guys break into my home if they are bad enough. Bad guys can do anything, because they are bad.

    "Encryption is math, and you can't ban math" Who said you can't? You can't ban my foot or my car, and you can't generally ban me going to places using them, but I am definitely banned from, say, using them to enter Area 51, and I will be shot down if I try. It seems to me that you could ban encryption no problem without banning math in general.

  • (disco) in reply to ka1axy

    But do I have to give them the encryption keys as well? No, I don't

    I wouldn't count on that. see Orin Kerr's article Encryption and the Fifth Amendment Right Against Self-Incrimination it discusses United States v. Fricosu, where a defendant was ordered to produce an unencrypted hard drive with the provision

    That the government SHALL BE precluded from using Ms. Fricosu’s act of production of the unencrypted contents of the computer’s hard drive against her in any prosecution

    He also links to previous discussions of In re Boucher were another defendant was forced to turn over an unecrypted hard drive.

    There's also United States v. Kirschner where the court said requiring a defendant to reveal a password would violate the 5th amendment.

    Since you have federal courts disagreeing on this I would expect sooner or later SCOTUS will grant cert on a password case.

  • (disco)

Leave a comment on “Encryption By Analogy”

Log In or post as a guest

Replying to comment #463472:

« Return to Article