Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I can't help wondering if this is what prompted Google to adopt perfect forward secrecy in November 2011, and for Facebook to say last month it would follow suit, which I wrote about here: http://news.cnet.com/8301-13578_3-57591179-38/data-meet-spie...

Note I have no direct knowledge that this is the motivation, but it strikes me that PFS is a solution to a specific threat model of an eavesdropper having passive access to the network. I'd be eager to hear more from people who are more familiar with the issue than I am.



At the very least, if some judge in [rural county where Google has a datacenter] issues a subpoena for the keys necessary to decrypt a packet capture obtained by the Sheriff's Office in the course of investigating a local crime

A: They can credibly argue that they don't have that information, and it won't trigger an avalanche of copycat subpoenas.

B: The crypto key being sought by the subpoena is not one that would enable decryption of all Google, but rather one specific to the connection.


It's true that there are more Title III intercept orders targeting Internet providers and companies that come from states vs. the Feds. Note these stats do not include Foreign Intelligence Surveillance Act eavesdropping.

But because Google can be compelled to divulge the plaintext of, say, email messages or G+ posts if subject to a lawful court order, there's no need to perform a more difficult and expensive Title III wiretap. Real-time services like Hangouts are an exception, but it's still easier to serve a Title III order on Google than try to install a box on a rural ISP in Georgia and try to intercept and decode the stream.

Re: your point B, PFS would protect against passive attacks even if the master SSL key is known to Eve, and a subpoena would be insufficient legal process to obtain an ephemeral session key.


Yes it does seem a rather useful, if passive-aggressive, solution to the alternative of fighting the requests in court, secretly.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: