<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Spire Security Viewpoint &#187; Trust Management</title>
	<atom:link href="http://spiresecurity.com/?cat=4&#038;feed=rss2" rel="self" type="application/rss+xml" />
	<link>http://spiresecurity.com</link>
	<description>Risk and Cybersecurity Analysis</description>
	<lastBuildDate>Fri, 14 Nov 2014 00:11:00 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.5.1</generator>
		<item>
		<title>You say you want an evolution&#8230;</title>
		<link>http://spiresecurity.com/?p=944</link>
		<comments>http://spiresecurity.com/?p=944#comments</comments>
		<pubDate>Tue, 20 Oct 2009 04:43:38 +0000</pubDate>
		<dc:creator>Pete Lindstrom</dc:creator>
				<category><![CDATA[Highlights]]></category>
		<category><![CDATA[Random]]></category>
		<category><![CDATA[Trust Management]]></category>
		<category><![CDATA[Vulnerability Management]]></category>

		<guid isPermaLink="false">http://spiresecurity.com/?p=944</guid>
		<description><![CDATA[&#8230; well, you know, we all want to change the world. Josh Corman from ISS/IBM is ready for change. He lays out a call to action over on fudsec.com. Lots of good comments over there. Here is my contribution: I&#8230;<p class="more-link-p"><a class="more-link" href="http://spiresecurity.com/?p=944">Read more &#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p>&#8230; well, you know, we all want to change the world.</p>
<p>Josh Corman from ISS/IBM is ready for change. He lays out a <a href="http://fudsec.com/do-the-evolution-1">call to action over on fudsec.com</a>. Lots of good comments over there. Here is my contribution:</p>
<blockquote>
<div id="pcomment_comments_new_5846329" style="background-image: none; background-color: transparent;">
<div id="pcomment_commentunit_1312173" class="commentunit">
<div class="comment">
<p><em>I agree wholeheartedly that we need to consider evolution and that our profession is reticent to do so. Compliance slows things down even more. We have plenty of opportunities for re-architecting security as the components are already there. Consider taking deperimeterization to its logical conclusion. Or integrating obfuscation, transformation, tracers, and tethers into an architecture.</em></p>
<p><em>I wrote a column for ISSA Journal a while back with some ideas for security evolution:</em></p>
<p><em>1. Conscientious software<br />
2. Remote attestation<br />
3. Microsecurity<br />
4. Contextual mapping<br />
5. Hyperdynamic processing</em></p>
<p><em>(see <a rel="nofollow" href="../../?p=208">http://spiresecurity.com/?p=208</a> for more information).</em></p>
<p><em>The cool thing is that this is about evolution and not revolution &#8211; the roots of capabilities like trusted computing, for example, are well-defined and simply need to be applied to today&#8217;s architectures.</em></p>
<p><em>I think virtualization and cloud computing have really exposed internal computing components in ways that make evolution discussions very timely.</em></div>
</div>
</div>
</blockquote>
]]></content:encoded>
			<wfw:commentRss>http://spiresecurity.com/?feed=rss2&#038;p=944</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Has SSL Outlived its Usefulness? (Which it never really had&#8230;)</title>
		<link>http://spiresecurity.com/?p=324</link>
		<comments>http://spiresecurity.com/?p=324#comments</comments>
		<pubDate>Sat, 24 Mar 2007 21:58:18 +0000</pubDate>
		<dc:creator>Pete Lindstrom</dc:creator>
				<category><![CDATA[Identity Management]]></category>
		<category><![CDATA[Trust Management]]></category>

		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=324</guid>
		<description><![CDATA[
<p class="more-link-p"><a class="more-link" href="http://spiresecurity.com/?p=324">Read more &#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p>You know, at some point we should really re-evaluate the use of SSL in our Web architectures. Let&#8217;s face it, it hasn&#8217;t really done much for us:</p>
<p>1) Users read way too much into its functional value.</p>
<p>2) The threat model for sensitive Web data has never been one of sniffing traffic. There are still way too many accessible websites for this to be the case.</p>
<p>3) If you are going to compromise some device, you might as well compromised the host and not some intermediate device.</p>
<p>4) The bad guys are now leveraging SSL more and more to shield their activities from good guy sniffers.</p>
<p>Sure, it is needed nowadays for basic authentication protection, but we really shouldn&#8217;t be using userid/password pairs in clear text anyway.</p>
]]></content:encoded>
			<wfw:commentRss>http://spiresecurity.com/?feed=rss2&#038;p=324</wfw:commentRss>
		<slash:comments>5</slash:comments>
		</item>
		<item>
		<title>Look Into my Crystal Ball</title>
		<link>http://spiresecurity.com/?p=407</link>
		<comments>http://spiresecurity.com/?p=407#comments</comments>
		<pubDate>Tue, 11 Jul 2006 19:12:41 +0000</pubDate>
		<dc:creator>Pete Lindstrom</dc:creator>
				<category><![CDATA[Trust Management]]></category>

		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=407</guid>
		<description><![CDATA[
<p class="more-link-p"><a class="more-link" href="http://spiresecurity.com/?p=407">Read more &#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p><a href="http://riskman.typepad.com/perilocity/2006/07/a_stitch_in_tim.html">Perilocity picks up</a> the Gartner numbers comparing preventive data encryption +- HIPS:</p>
<blockquote dir="ltr"><p><em>&quot;A company with at least 10,000 accounts to protect can spend, in the first year, as little as $6 per customer account for just data encryption, or as much as $16 per customer account for data encryption, host-based intrusion prevention and strong security audits combined,&quot; Litan said in an accompanying statement. &quot;Compare [that] with an expenditure of at least $90 per customer account when data is compromised or exposed during a breach,&quot; she added. </em></p>
</blockquote>
<p dir="ltr">This is useful stuff, but I can&#8217;t quite agree with Perilocity&#8217;s conclusion: </p>
<blockquote dir="ltr"><p dir="ltr"><em>So if you split the difference and spend $10/customer on security as prevention, that stitch in time really does save nine stitches fixing it later. Prevention is good risk management.</em></p>
</blockquote>
<p dir="ltr">This only works if you can either predict which of your laptops are going to be compromised, or you assume that more than 1 in 9 of your total laptops will be compromised.</p>
<p dir="ltr">Chris Walsh at Emergent Chaos has <a href="http://www.emergentchaos.com/archives/2006/06/is_encryption_worth_it.html">good details</a>.<em> </em></p>
<p dir="ltr"><strong>Update:</strong> I just realized that I&#8217;ve been assuming &quot;laptops&quot; all along, since the Gartner estimates initially made the news when Gartner testified before Congress about the VA debacle. The key denominator here is the customer account, and the security costs discussed are server-side costs. Obviously, my assumption is quite different from the scenario in the Gartner report. From what I can tell, the Gartner estimates don&#8217;t even include client-side security (encryption and/or HIPS), which means that the VA (or anyone compromised) would have spent the money for prevention against the wrong attack, then would have incurred the costs of the breach as well.</p>
<p dir="ltr">
]]></content:encoded>
			<wfw:commentRss>http://spiresecurity.com/?feed=rss2&#038;p=407</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Spire Security&#8217;s First Law of Encryption</title>
		<link>http://spiresecurity.com/?p=459</link>
		<comments>http://spiresecurity.com/?p=459#comments</comments>
		<pubDate>Sat, 18 Feb 2006 04:10:26 +0000</pubDate>
		<dc:creator>Pete Lindstrom</dc:creator>
				<category><![CDATA[Trust Management]]></category>

		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=459</guid>
		<description><![CDATA[
<p class="more-link-p"><a class="more-link" href="http://spiresecurity.com/?p=459">Read more &#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p>&quot;Encryption only provides confidentiality between the point of encryption and the point of decryption.&quot;</p>
<p>I know it&#8217;s a &quot;duh&quot; but it appears that many organizations aren&#8217;t actually considering this truism when putting together their encryption strategies.</p>
<p>Note that I said &quot;confidentiality&quot; &#8211; if you had been watching me type, you would have seen me use the word &quot;protection&quot; initially. I switched it to &quot;confidentiality&quot; because I sometimes wonder if encrypting the wrong things in the wrong places would still satisfy regulatory requirements and thereby provide a level of &quot;protection&quot; that has nothing to do with confidentiality.</p></p>
]]></content:encoded>
			<wfw:commentRss>http://spiresecurity.com/?feed=rss2&#038;p=459</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>NUMB3RS</title>
		<link>http://spiresecurity.com/?p=480</link>
		<comments>http://spiresecurity.com/?p=480#comments</comments>
		<pubDate>Tue, 10 Jan 2006 03:33:21 +0000</pubDate>
		<dc:creator>Pete Lindstrom</dc:creator>
				<category><![CDATA[Identity Management]]></category>
		<category><![CDATA[Trust Management]]></category>

		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=480</guid>
		<description><![CDATA[
<p class="more-link-p"><a class="more-link" href="http://spiresecurity.com/?p=480">Read more &#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p>Among my many vices is television watching, and since NUMB3RS (I wonder if they realize there is a typo in the title?) came out, I have ReplayTV&#8217;ed it (man, I need a TIVO) often. I was (am, actually) watching the 12/16 episode where they are trying to lookup the records an environmentalist suspected of arson. Alas, they can&#8217;t, because </p>
<blockquote dir="ltr" style="MARGIN-RIGHT: 0px"><p><em>&quot;it looks like Eckworth used a Diffie-Hellman encryption code&#8230;basically impossible to crack</em>&quot; on the password for his second screen name.</p>
</blockquote>
<p dir="ltr">Hmm, even I may be able to help the FBI on this one:&nbsp; The &quot;technical expert&quot; who reported those details is colluding with the bad guys! Don&#8217;t listen to her and arrest her immediately! (Man, my Encyclopedia Brown days are rushing at me on this one).</p>
<p dir="ltr">I know there have been many references to crypto and other security tools in television and movies that are amusing. Please feel free to leave your favorite reference in the comments section (or a link if somebody is doing this already). (I think The Net with Sandra Bullock had an IP address in the 500 range&#8230;)</p>
]]></content:encoded>
			<wfw:commentRss>http://spiresecurity.com/?feed=rss2&#038;p=480</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>Musicmatch Makes Me Feel Warm and Comfortable. Not</title>
		<link>http://spiresecurity.com/?p=556</link>
		<comments>http://spiresecurity.com/?p=556#comments</comments>
		<pubDate>Tue, 16 Aug 2005 14:04:32 +0000</pubDate>
		<dc:creator>Pete Lindstrom</dc:creator>
				<category><![CDATA[Trust Management]]></category>

		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=556</guid>
		<description><![CDATA[
<p class="more-link-p"><a class="more-link" href="http://spiresecurity.com/?p=556">Read more &#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p>Figured I&#8217;d finally try to download some music (I am partial to buying CDs and burning them). Musicmatch says:</p>
<p><em>&quot;We use SSL encryption, so your information is secure.&quot;</em></p>
<p>This is a circa-1997 security logic failure.</p>
]]></content:encoded>
			<wfw:commentRss>http://spiresecurity.com/?feed=rss2&#038;p=556</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>PKI vs. PGP</title>
		<link>http://spiresecurity.com/?p=563</link>
		<comments>http://spiresecurity.com/?p=563#comments</comments>
		<pubDate>Wed, 10 Aug 2005 19:13:32 +0000</pubDate>
		<dc:creator>Pete Lindstrom</dc:creator>
				<category><![CDATA[Identity Management]]></category>
		<category><![CDATA[Trust Management]]></category>

		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=563</guid>
		<description><![CDATA[
<p class="more-link-p"><a class="more-link" href="http://spiresecurity.com/?p=563">Read more &#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p>George Ou writes on his ZDNet blog:</p>
<blockquote dir="ltr" style="MARGIN-RIGHT: 0px"><p><em>Phil Zimmermann criticizes existing VoIP cryptographic solutions for relying on </em><a href="http://en.wikipedia.org/wiki/PKI"><span style="color: #003399;"><em>PKI</em></span></a><em>.&nbsp; Given the fact that Zimmermann&#8217;s PGP technology has always been an alternative to PKI based technologies, one can expect a bit of a natural bias against PKI-based solutions.&nbsp; Just about every other PKI-alternative cryptography company has gone as far as declaring </em><a id="more-86"></a><em>PKI dead even tough PKI has been thriving for the last decade with E-Commerce leading the charge in a massive global PKI implementation.&nbsp; I&#8217;ve personally designed and deployed many PKI solutions for large corporations for all sorts of security applications ranging from remote VPN access to wireless LAN security, and I can attest that the technology is simple, scalable, and reliable.&nbsp; It&#8217;s an undeniable fact that any solution that promises to bypass PKI always end up being more trouble than it&#8217;s worth.</em></p>
</blockquote>
<p dir="ltr">While there does seem to be growing evidence of PKI &quot;winning&quot; the war of trust, this is likely not a zero-sum game &#8211; the two can coexist easily. In fact, Zimmermann highlights the real difference quite clearly &#8211; either a hierarchical, organized key management system (PKI) is useful within your enterprise, or it&#8217;s not (PGP). And if you have both, you build a bridge.</p>
<p dir="ltr">It is surprising to read Ou criticizing Zimmermann&#8217;s bias without addressing his own (as a &quot;personal designer and deployer of many PKI systems&quot;). What&#8217;s more, to suggest there is such thing as an &quot;undeniable fact&quot; within the confines of his argument is outright laughable and stoops to the kind of rhetoric people use to support a weak argument. I am not sure why he chose to use this kind of &quot;chump change&quot; in an argument that I believe is fairly strong to begin with.</p>
<p dir="ltr">As with all technology, PKI is always evolving. What may have been true 7 or 8 years ago isn&#8217;t necessarily true today. Key management and identity validation have always been the strong points of a PKI, and always will be, but there are many, many hybrid solutions (Certificate Management Solutions?) out there that are good enough for whatever problem they are trying to solve.</p>
]]></content:encoded>
			<wfw:commentRss>http://spiresecurity.com/?feed=rss2&#038;p=563</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Now What?</title>
		<link>http://spiresecurity.com/?p=589</link>
		<comments>http://spiresecurity.com/?p=589#comments</comments>
		<pubDate>Sun, 12 Jun 2005 00:47:00 +0000</pubDate>
		<dc:creator>Pete Lindstrom</dc:creator>
				<category><![CDATA[Trust Management]]></category>

		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=589</guid>
		<description><![CDATA[
<p class="more-link-p"><a class="more-link" href="http://spiresecurity.com/?p=589">Read more &#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p>Two or three years ago (whenever Microsoft first announced Palladium, later changed to NGSCB), Ross Anderson was a prime opponent to the concept. He never really understood NGSCB, which is about trusted programs, and always referred to it as a platform for Digital Rights Management (DRM). This was always strange to me, because Anderson and others were strongly against NGSCB and yet let Microsoft launch its <em>real </em>DRM platform, <a href="http://www.microsoft.com/windowsserver2003/evaluation/overview/technologies/rmenterprise.mspx">Rights Management Server</a>, with nary a peep. (MS really does want to promote and use DRM, just not with NGSCB).</p>
<p>Anyway, Anderson&#8217;s big concern was lock-in &#8211; the idea that with NGSCB, Microsoft could lock-in its customers with Microsoft Office because the file creator held the key. Certainly, lock-in exists everywhere &#8211; why do you think we have so many different battery sizes? An attempt at lock-in that never really worked. Even train tracks and paper form printers were manufactured for lock-in. And yes, every morning the razor you use is likely to be an attempt at lockin.</p>
<p>So, Anderson has written things like:</p>
<blockquote dir="ltr" style="MARGIN-RIGHT: 0px"><p>&quot;<em>The main effect of Trusted Computing may be to increase the lock-in of users of products such as Microsoft Office, and thus in the medium term raise the prices that can be charged for them. &quot;</em></p>
</blockquote>
<p dir="ltr">and</p>
<blockquote dir="ltr" style="MARGIN-RIGHT: 0px"><p dir="ltr"><em>&quot;Locking competitors out of application file formats was one of the motivations for TC: see a </em><a href="http://www.cl.cam.ac.uk/ftp/users/rja14/lucky"><em>post</em></a><em> by Lucky Green, and go to his talk at </em><a href="http://www.cypherpunks.to/"><em>Def Con</em></a><em> to hear more. It&#8217;s a tactic that&#8217;s spreading beyond the computer world. Congress is getting </em><a href="http://www.ftp.cl.cam.ac.uk/ftp/users/rja14/car-diagnostics.html"><em>upset</em></a><em> at carmakers using data format lockout to stop their customers getting repairs done at independent dealers. And the Microsoft folk say they want TC everywhere, even in your watch. The economic consequences could be globally significant. &quot;</em></p>
</blockquote>
<p dir="ltr">Now Microsoft has gone and ruined everything by announcing that the next generation of <a href="http://www.usatoday.com/tech/products/software/2005-06-02-office-xml-format_x.htm">Office will use XML</a> as its primary file format.</p>
<p dir="ltr">USA Today even goes so far as to say: </p>
<blockquote dir="ltr" style="MARGIN-RIGHT: 0px"><p dir="ltr"><em>The new format will make it easier for other programs to read Office documents, an improvement the software titan says is aimed at boosting workers&#8217; productivity.</em></p>
</blockquote>
<p dir="ltr">Could be a big snow job by Microsoft, and certainly it is possible to maintain lock-in simply using DRM rather than file formats. But it doesn&#8217;t seem likely that either NGSCB or Office will be promoting any lock-in that is insurmountable.</p>
<p dir="ltr">I wonder if Ross Anderson will modify his opinion on NGSCB.</p>
]]></content:encoded>
			<wfw:commentRss>http://spiresecurity.com/?feed=rss2&#038;p=589</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>A Prediction: Microsoft&#8217;s Next Security Acquisition</title>
		<link>http://spiresecurity.com/?p=625</link>
		<comments>http://spiresecurity.com/?p=625#comments</comments>
		<pubDate>Mon, 14 Mar 2005 15:03:49 +0000</pubDate>
		<dc:creator>Pete Lindstrom</dc:creator>
				<category><![CDATA[Trust Management]]></category>

		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=625</guid>
		<description><![CDATA[
<p class="more-link-p"><a class="more-link" href="http://spiresecurity.com/?p=625">Read more &#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p>Liquid Machines. You heard it here first (or not). (I am speculating, by the way).</p>
]]></content:encoded>
			<wfw:commentRss>http://spiresecurity.com/?feed=rss2&#038;p=625</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Random Lock-In Thoughts</title>
		<link>http://spiresecurity.com/?p=642</link>
		<comments>http://spiresecurity.com/?p=642#comments</comments>
		<pubDate>Wed, 23 Feb 2005 04:22:22 +0000</pubDate>
		<dc:creator>Pete Lindstrom</dc:creator>
				<category><![CDATA[Trust Management]]></category>

		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=642</guid>
		<description><![CDATA[
<p class="more-link-p"><a class="more-link" href="http://spiresecurity.com/?p=642">Read more &#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p>It is awfully common to bash Microsoft about their efforts in trusted operating systems (NGSCB) and, less frequently, DRM (Rights Management Server). It seems that people are concerned about lock-in to applications with specific content.</p>
<p>Here&#8217;s what I don&#8217;t get &#8211; why don&#8217;t people rip on Apple or Sun or Sony, too? Even Adobe gets barely a ripple of backlash&#8230; Apple is my biggest kick because there is a company that plays hard and tough with intellectual property.</p>
]]></content:encoded>
			<wfw:commentRss>http://spiresecurity.com/?feed=rss2&#038;p=642</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
