Feeds

Q&A: Schneier on trust, NSA spying and the end of US internet hegemony

Basically, we're screwed for the next decade or so

Top 5 reasons to deploy VMware with Tegile

RSA 2014 Bruce Schneier is the man who literally wrote the book on modern encryption, publishing Applied Cryptography in 1994, and for the past 20 years has been an important and sometimes outspoken voice in the security industry.

He founded the firm Counterpane Internet Security (later sold to BT), and is also a board member of the Electronic Frontier Foundation and an Advisory Board Member of the Electronic Privacy Information Center.

More recently he's been working on documents released by Edward Snowden on NSA activities and presented his findings at this year's RSA conference in San Francisco. The Register took the opportunity of sitting down with Schneier at the event and chewing through the current state of security, privacy and government intrusion online.

The Reg: This conference opened with a statement from RSA chief Art Coviello regarding the use of the flawed NSA-championed Dual Elliptic Curve Deterministic Random Bit Generator in an encryption toolkit product.

Coviello said RSA did all it could to secure its software. What's your take on the affair?

Schneier: I believe that's true. When NIST came out with that RNG standard, it was one of four choices available, and those choices tracked other crypto suites. It made sense in a holistic way that there should be an elliptic curve in there. It was slower, it was kludgier, but some people thought that was a plus, not a minus.

By 2007 there was the first inkling that there might be a backdoor, but it was just guessing and it is part of the NIST standard. Any toolkit that says "we're compliant" [with a particular standard], which I'm sure is a requirement for all sorts of contracts, had to implement it.

My guess is that RSA didn't know anything was amiss and when a large customer comes in with technical changes that don’t really matter you just do them. I think RSA was more a victim here, and I think it's been unfortunate that over the last couple of months they haven't been able to tell their story clearly.

It's hard to tease out who did what and when. Certainly, I didn't boycott the RSA conference – I'm here for myself and the attendees, not for RSA – and if I was going to list companies to boycott because of their NSA collaboration, RSA wouldn’t even make the top 10.

Who would be your top 10?

I think AT&T certainly would be on top, but I personally use AT&T's cellphone service. It's really hard to pick. That's the worst poison of these NSA actions; that we no longer know who to trust.

We cannot trust any phone company, any operating system provider, any application's vendor, any security company. We simply don’t know who is colluding, who has been compelled to collude, who is being owned surreptitiously, and all the transparency reports and denials don’t really tell us anything.

In your last-but-one book Liars and Outliers you went into great detail about the importance of trust. In the wake of NSA spying, has trust been irretrievably lost?

I really think some of losses in trust are going to be very difficult, if not impossible to get back. The NSA deliberately subverted products and standards. We rely on these things for our security and there was the implicit assumption that those in charge of them were making them as good as they could.

Additionally, US companies are going to find it very hard to get users to trust them again. The best slogan a company like Google can say now is "we're secure, except for the attacks we don’t know about and the attacks we are prohibited by law from telling you about," which is a sucky marketing slogan.

Even if the NSA says, like they are saying, "no, we haven't subverted standards," no one believes them. If the President says he's changed the NSA's policy so they don’t do this any more, how do we know there isn’t another even more secret organization that he formed to get around those rules? In a sense there's been a blind trust that we've had all these years that we finally have been shown was ill-founded, and I don’t know if it's possible – at least with current technology – to get it back.

So what's your solution?

You can imagine some future technology where you can prove assurance, where you can prove that a piece of software or hardware does what you believe it does and nothing more. That's not beyond the realm of possibility. We don’t know how to do that but it seems plausible that someday we will. Until then the problems are not technical, they are political and social, and there aren’t technical solutions to those kind of problems.

Remote control for virtualized desktops

More from The Register

next story
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
Mozilla, EFF, Cisco back free-as-in-FREE-BEER SSL cert authority
Let’s Encrypt to give HTTPS-everywhere a boost in 2015
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
Meet OneRNG: a fully-open entropy generator for a paranoid age
Kiwis to seek random investors for crowd-funded randomiser
Got an iPhone or iPad? LOOK OUT for MASQUE-D INTRUDERS
UNjailbroken iOS 7, 8 open to evil, says secbiz FireEye
USB coding anarchy: Consider all sticks licked
Thumb drive design ruled by almighty buck
Attack reveals 81 percent of Tor users but admins call for calm
Cisco Netflow a handy tool for cheapskate attackers
prev story

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Simplify SSL certificate management across the enterprise
Simple steps to take control of SSL across the enterprise, and recommendations for a management platform for full visibility and single-point of control for these Certificates.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.