William Yager [ARCHIVE] on Nostr: 📅 Original date posted:2014-08-19 📝 Original message:What, exactly, do we hope ...
📅 Original date posted:2014-08-19
📝 Original message:What, exactly, do we hope to achieve from having end-to-end encryption?
Even if it worked perfectly, it wouldn't be very useful.
But it won't work perfectly, because we don't have any method of
authentication. The bitcoin network is trivially MITMable. It's designed to
work even in the face of that, but any encryption we implement will just
get blown away by anyone who cares enough to stand in the middle of two
nodes.
As far as I can see, we get a microscopic obfuscatory advantage over a very
weak passive attacker, at the cost of hugely increased software complexity
(and possibly increased CPU time).
So again; what do we hope to achieve? Why bother? Not a lot of sensitive
information is transmitted in the clear. The little information that might
be considered sensitive is better protected by anonymization (a la Tor),
not encryption.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <
http://lists.linuxfoundation.org/pipermail/bitcoin-dev/attachments/20140819/1be9d73c/attachment.html>
Published at
2023-06-07 15:25:22Event JSON
{
"id": "0e6141cc464efdbdcb254e38c864967d5f1222f2da76c711d3ea9c21242d1d7c",
"pubkey": "dac5021a7b00b2588f37695f479d6d47ad5dbacbb4f6beec1ddd295ae976e83c",
"created_at": 1686151522,
"kind": 1,
"tags": [
[
"e",
"f7d80207f3f3e09247c97d3e8c17b8e8b9ffc855be5e4ac09f019815084b2528",
"",
"root"
],
[
"e",
"7ef5ceba6b45410be90fb2e596e86eaaf706c00dd9ec6c36c637daeeca049f7d",
"",
"reply"
],
[
"p",
"daa2fc676a25e3b5b45644540bcbd1e1168b111427cd0e3cf19c56194fb231aa"
]
],
"content": "📅 Original date posted:2014-08-19\n📝 Original message:What, exactly, do we hope to achieve from having end-to-end encryption?\n\nEven if it worked perfectly, it wouldn't be very useful.\n\nBut it won't work perfectly, because we don't have any method of\nauthentication. The bitcoin network is trivially MITMable. It's designed to\nwork even in the face of that, but any encryption we implement will just\nget blown away by anyone who cares enough to stand in the middle of two\nnodes.\n\nAs far as I can see, we get a microscopic obfuscatory advantage over a very\nweak passive attacker, at the cost of hugely increased software complexity\n(and possibly increased CPU time).\n\nSo again; what do we hope to achieve? Why bother? Not a lot of sensitive\ninformation is transmitted in the clear. The little information that might\nbe considered sensitive is better protected by anonymization (a la Tor),\nnot encryption.\n-------------- next part --------------\nAn HTML attachment was scrubbed...\nURL: \u003chttp://lists.linuxfoundation.org/pipermail/bitcoin-dev/attachments/20140819/1be9d73c/attachment.html\u003e",
"sig": "282eeb3a6190fe8e6ef6aa4443edb7762a5dfff67594b302dbb1ace976b77510a3752c7e6cbf52fadcbee74872883e1e2b50ce9f2ba5c1187b1ed4f8464ade72"
}