6.8.1. Restrictions on cryptography--difficult as they may be to enforce--may also impose severe hardships on secure operating system design, Norm Hardy has made this point several times. - Agents and objects inside computer systems will likely need security, credentials, robustness, and even digital money for transactions. 6.8.2. Proofs of identity, passwords, and operating system use - ZKIPS especially in networks, where the chances of seeing a password being transmitted are much greater (an obvious point that is not much discussed) + operating systems and databases will need more secure procedures for access, for agents and the like to pay for services, etc. - unforgeable tokens 6.8.3. An often unmentioned reason why encyption is needed is for the creation of private, or virtual, networks - so that channels are independent of the "common carrier" + to make this clear: prospects are dangerously high for a consolidation under government control of networks - in parallel with roads + and like roads, may insist on equivalent of licenses - is-a-person - bans on encryption - The Nightmare Scenario: "We own the networks, we won't let anyone install new networks without our approval, and we will make the laws about what gets carried, what encryption can be used, and how taxes will be collected." - Fortunately, I doubt this is enforceable...too many ways to create virtual networks...satellites like Iridium, fiber optics, ways to hide crypto or bury it in other traffic + cyberspace walls... + more than just crypto: physical security is needed (and for much the same reason no "digital coin" exists) - processes running on controlled-accesss machines (as with remailers) - access by crypto + a web of mutually suspicious machines may be sufficient - robust cyberspaces built with DC-Net ("dining cryptographers") methods?
Next Page: 6.9 Ominous Trends
Previous Page: 6.7 Beyond Good and Evil, or, Why Crypto is Needed
By Tim May, see README
HTML by Jonathan Rochkind