Hacker News new | past | comments | ask | show | jobs | submit login

Give me a break. 12,000 people have signed up for our crypto challenges, in which they write 6-7 batches of 8 crypto exploits each in the language of their choosing --- people have invented new programming languages to do them in, and we've gotten them through all of the challenges --- and, by directly engaging us over email, get both validation of each of their challenge responses and 1:1 support. I am off the charts tired of people acting like my issue with incompetent crypto is a form of "elitism".

The fact that you managed to inject that bogus complaint into this particular story, which, if you'd read the just 142 words I wrote a little carefully, is obviously the exact opposite of what you're "concerned" about, is all the more annoying.

What "draws my ire" is cryptographic incompetence. Cryptographic incompetence gets people hurt. I do not give a shit about how those developers feel.

For whatever it's worth to anyone else reading this: you will rarely ever see me get pissy about an incompetent amateur breaking crypto. Breaking crypto is what you're supposed to do to get good at crypto.




Your last statement is exactly what's always bothered me about your attitude, and how it contradicts directly with the sentence prior.

I'm not going to give you a break so long as you don't give folks who are trying to create things a break. Bad crypto gets people killed, but no crypto does too, and perhaps your elitist attitude (and it's not just you, it's the community at large) is why we have only TrueCrypt and nothing else.


Bad crypto gets more people hurt than no crypto, because it tricks them into revealing secrets to investigators under the pretense that they're safe when they're not.

No part of my attitude impacts how many FDE solutions we have. We don't have lots of FDE systems because, unlike terribly broken Javascript cryptography applications, FDE systems are very difficult to write.

Apropos neither of those last two statements: it's not clear to me that you understand what's actually being announced in this Ars story.


Well, naturally you, possibly part of the problem, would deny the problem exists. We had this discussion before, and this is where we quickly landed.

As for the article, I haven't actually commented on it whatsoever; I was commenting on your announcement. It's interesting to me you wrote that, but whatever.


If there's something in this comment you expect me to respond to, clarify, or recognize as a coherent argument, I can't find it.

If you have questions about the Truecrypt Phase 2 audit, and I'm in a position to answer them, I will endeavor to do that.


Is it intended for experienced crypto programmers or new folks who want to learn more? Does that question make sense? You didn't give many details (which is fair).


If you're an experienced crypto designer, we'd like to talk to you about volunteering alongside Nate and I as unpaid advisors.

If you're interested in learning more about cryptography, we'd like to talk to you about working on the audit directly, reporting to an advisor. As I understand it, many of these auditor roles will have stipends associated with them.

If you're aware of an elite cadre of crypto people that might be available to serve in the auditor roles, I'd love to know about it. The overwhelming majority of the people that do our crypto challenges have zero prior crypto experience, and many of those are the same people we hope to see staffing Phase 2 of the audit.

Teaching a bunch of developers some new stuff about cryptography would be a nice knock-on benefit of the audit, but it's important that I be clear that the funding for this audit was earmarked for actually improving the security situation for Truecrypt. So we'll probably be somewhat selective about the audit team. I'll have more to say about this next week. This all got sprung on me very quickly, like I said, because of this week's events.


Seems TrueCrypt is dead and declared unfit for use. So the security situation is already improved.


"As to why the audit is proceeding: it's obvious, at least to me. Tens of thousands of people will continue to use Truecrypt no matter what we do..."

So, no, the security situation has not already improved.


You might want to think a little deeper about your last statement.

If you don't have access to crypto, you can take other precautions. If you use bad crypto, you can be lulled into a false sense of security. There is nothing more dangerous than thinking you are secure, when in actuality, you aren't.


What if, due to the bullying nature of a niche industry, there are no other precautions to take?


Good question.

First, I think that if you cannot think of an alternative to crypto, you should think twice about doing anything that could get you or your friends killed.

Second, I urge you to consider the difference between these two developers:

Developer A is just learning crypto. She makes many mistakes and builds some truly horrible systems. But, she is just learning and she never actually intends for anyone to use her systems.

Developer B thinks she is a crypto god. She releases a tool and claims it is incredibly secure. However, it contains fatal flaws.

If someone bullies developer A, I think that many people would jump to her defense. On the other hand, developer B is a very dangerous person whose hubris has created a dangerous situation.


The developer we really love is Developer C. Developer C has looked at what's happened with A & B, done some reading, and decided they're genuinely interested in cryptography and want to understand what makes it tick.

So, rather than learning exactly enough cryptography to built an application that appears to journalists to be secure but actually isn't, Developer C takes the time to read papers and actually code up crypto attacks.

Man, we love Developer C. Developer C is awesome. Developer C is going to learn so much building crypto attacks. There's a good chance that after doing that for just a couple months, Developer C will discover novel variations of crypto attacks nobody has thought of yet. From that work, everyone (who really cares about crypto) will benefit.

At the end of this process, Developer C will not only be terrifying, but also in a vastly better position to implement sound cryptography than other developers. Ironically, though, the experience of seeing so much broken cryptography is going to make Developer C hesitant to publish random new cryptographic tools the moment they hit their text editor. Like Adam Langley and Trevor Perrin, they will quietly hone their designs for months or even years, making sure they've gotten things right before getting other people to risk their secrets by using them.

Developer C is just getting started now. We love Developer C. We have an avalanche of crypto exercises for them to play with, and, if they know they're interested and engaged, there's a good chance I want to talk to Developer C about helping with the Truecrypt audit this summer.


If only it were so clear, which developers were which. Developer B is what everyone in the industry assumes everyone is, even if they're just developer A.


When you brag on Twitter that Edward Snowden and Glenn Greenwald used your tool to coordinate the largest intelligence leak in the history of the world, I think it's safe to say the jury is in about whether you're Developer A or Developer B.


I don't believe the TC dev(s) did that?


No, the Cryptocat devs did.


This is getting off topic, but I have learned something very valuable about the technology industry. If you are developer A, do not be afraid to admit that you are still learning and that you don't know what you don't know. If you approach your own learning process with humility, I can guarantee that you will find many people who are willing to help you.

People run into trouble when they try to pass themselves off as being more qualified than they are.


Just to be clear, are you suggesting that there is an elite cadre of cryptobullies browbeating the general public into broadcasting compromising information all over the cleartext internet?


Nope, I'm suggesting that a negative and hostile attitude, like the one exhibited towards the CryptoCat team by tptacek and others is not healthy to the industry.


Negativity and hostility towards poorly constructed cryptographic applications is unhealthy in what way?




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: