{"id":2141,"date":"2016-10-30T08:44:15","date_gmt":"2016-10-30T06:44:15","guid":{"rendered":"https:\/\/www.ofcourseimright.com\/?p=2141"},"modified":"2016-10-30T08:48:47","modified_gmt":"2016-10-30T06:48:47","slug":"time-to-end-the-war-on-the-network","status":"publish","type":"post","link":"https:\/\/ofcourseimright.com\/?p=2141","title":{"rendered":"Time to end the war on the network"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-1826\" src=\"https:\/\/www.ofcourseimright.com\/blog\/wp-content\/uploads\/2015\/11\/Screen-Shot-2015-11-19-at-3.09.32-PM.png\" alt=\"Edward Snowden\" width=\"160\" height=\"194\" \/>When <a href=\"https:\/\/en.wikipedia.org\/wiki\/Edward_Snowden\">Edward Snowden<\/a> disclosed the <a href=\"https:\/\/www.nsa.gov\">NSA<\/a>\u2019s activities, many people came to realize that network systems can be misused, even though this was always the case.\u00a0 People just realized what was possible.\u00a0 What happened next was a concerted effort to protect protect data from what has become known as \u201c<a href=\"https:\/\/tools.ietf.org\/html\/rfc7258\">pervasive surveillance<\/a>\u201d.\u00a0 This included development of a new version of <a href=\"https:\/\/tools.ietf.org\/html\/rfc7540\">HTTP<\/a> that is always encrypted and an easy way to get certificates.<\/p>\n<p>However, when end nodes hide everything from the network, not only can the network not be used by the bad guys, but it can no longer be used by the good guys to either authorize appropriate communications or identify attacks.\u00a0 A example is <a href=\"https:\/\/en.wikipedia.org\/wiki\/Spam\">spam<\/a>.\u00a0 Your mail server sits in front of you and can reject messages when they contain malware or are just garbage.\u00a0 It does that by examining both the source of the message and the message itself.\u00a0 Similarly, anyone who has read my writing about Things knows that the network needs just a little bit of information from the device in order to stop unwanted communications.<\/p>\n<p>I have written an <a href=\"https:\/\/tools.ietf.org\/html\/draft-lear-network-helps-01\">Internet Draft<\/a> that begins to establish a framework for when and how information should be shared, with the idea being that information should be carefully shared with a purpose, understanding that there are risks involved in doing so.\u00a0 The attacks on <a href=\"https:\/\/www.twitter.com\">Twitter<\/a> and on <a href=\"https:\/\/krebsonsecurity.com\">krebsonsecurity.com<\/a> are preventable, but it requires us to recognize that end nodes are not infallible, and they never will be.\u00a0 Neither, by the way, are network devices.\u00a0 So long as all of these systems are designed and built by humans, that will be the case.\u00a0 Each can help each other in good measure to protect the system as a whole.<\/p>\n<hr \/>\n<p><small>Photo of Edward Swowden By <a href=\"https:\/\/commons.wikimedia.org\/w\/index.php?curid=27176492\">Laura Poitras \/ Praxis Films, CC BY 3.0<\/a><\/small><\/p>\n","protected":false},"excerpt":{"rendered":"<p>When Edward Snowden disclosed the NSA\u2019s activities, many people came to realize that network systems can be misused, even though this was always the case.\u00a0 People just realized what was possible.\u00a0 What happened next was a concerted effort to protect protect data from what has become known as \u201cpervasive surveillance\u201d.\u00a0 This included development of a &hellip; <a href=\"https:\/\/ofcourseimright.com\/?p=2141\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Time to end the war on the network&#8221;<\/span><\/a><\/p>\n","protected":false},"author":172,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[87,545,9],"tags":[511,78,496,553],"class_list":["post-2141","post","type-post","status-publish","format-standard","hentry","category-internet","category-iot","category-security","tag-iot","tag-network","tag-security","tag-snowden"],"_links":{"self":[{"href":"https:\/\/ofcourseimright.com\/index.php?rest_route=\/wp\/v2\/posts\/2141","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ofcourseimright.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ofcourseimright.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ofcourseimright.com\/index.php?rest_route=\/wp\/v2\/users\/172"}],"replies":[{"embeddable":true,"href":"https:\/\/ofcourseimright.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2141"}],"version-history":[{"count":3,"href":"https:\/\/ofcourseimright.com\/index.php?rest_route=\/wp\/v2\/posts\/2141\/revisions"}],"predecessor-version":[{"id":2144,"href":"https:\/\/ofcourseimright.com\/index.php?rest_route=\/wp\/v2\/posts\/2141\/revisions\/2144"}],"wp:attachment":[{"href":"https:\/\/ofcourseimright.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2141"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ofcourseimright.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2141"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ofcourseimright.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2141"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}