<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version  (Ruby 3.0.4) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

<!ENTITY RFC7687 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7687.xml">
<!ENTITY RFC7258 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7258.xml">
<!ENTITY RFC8446 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8446.xml">
<!ENTITY I-D.ietf-tls-esni SYSTEM "https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-tls-esni.xml">
<!ENTITY RFC7858 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7858.xml">
<!ENTITY RFC8484 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8484.xml">
<!ENTITY RFC7540 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7540.xml">
<!ENTITY RFC9000 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9000.xml">
<!ENTITY I-D.farrelll-mpls-opportunistic-encrypt SYSTEM "https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.farrelll-mpls-opportunistic-encrypt.xml">
<!ENTITY RFC8461 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8461.xml">
<!ENTITY RFC1984 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.1984.xml">
<!ENTITY RFC6462 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6462.xml">
<!ENTITY RFC7480 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7480.xml">
<!ENTITY RFC7481 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7481.xml">
<!ENTITY RFC9082 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9082.xml">
<!ENTITY RFC9083 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9083.xml">
<!ENTITY RFC7484 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7484.xml">
<!ENTITY RFC8056 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8056.xml">
<!ENTITY RFC8280 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8280.xml">
<!ENTITY DOI.10.5325_jinfopoli.11.2021.0376 SYSTEM "https://bib.ietf.org/public/rfc/bibxml7/reference.DOI.10.5325/jinfopoli.11.2021.0376.xml?anchor=Badii2021">
<!ENTITY RFC3365 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3365.xml">
]>


<rfc ipr="trust200902" docName="draft-farrell-tenyearsafter-00" category="info" submissionType="independent" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="Ten Years After">Reflections on Ten Years Past The Snowden Revelations</title>

    <author initials="S." surname="Farrell" fullname="Stephen Farrell">
      <organization>Trinity College, Dublin</organization>
      <address>
        <postal>
          <country>Ireland</country>
        </postal>
        <email>stephen.farrell@cs.tcd.ie</email>
      </address>
    </author>
    <author initials="F." surname="Badii" fullname="Farzaneh Badii">
      <organization>Digital Medusa</organization>
      <address>
        <email>farzaneh.badii@gmail.com</email>
      </address>
    </author>
    <author initials="B." surname="Schneier" fullname="Bruce Schneier">
      <organization>Harvard University</organization>
      <address>
        <postal>
          <country>USA</country>
        </postal>
        <email>schneier@schneier.com</email>
      </address>
    </author>
    <author initials="S. M." surname="Bellovin" fullname="Steven M. Bellovin">
      <organization>Columbia University</organization>
      <address>
        <postal>
          <country>USA</country>
        </postal>
        <email>smb@cs.columbia.edu</email>
      </address>
    </author>

    <date year="2023" month="May" day="20"/>

    
    
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>This memo contains the thoughts and recountings of events that
transpired during and after the release of information about the NSA
by Edward Snowden.  There are four perspectives: that of someone
who was involved with sifting through the information to responsibly
inform the public, a security area director of the IETF, a human
rights expert, and of a computer science and law expert.  The purpose
of this memo is to provide some historical perspective, while at the
same time offering a view as to what security and privacy challenges
the technical community should consider.</t>



    </abstract>



  </front>

  <middle>


<section anchor="introduction"><name>Introduction</name>

<t>On June 6th, 2013, an article appeared in <em>The Guardian</em>
<xref target="guard2013"/> that was the beginning of a series of what have come to
be known as revelations about the activities of the United States
National Security Agency (NSA).  These activities included, amongst
others, secret court orders, secret agreements for the receipt of
so-called "meta-information" that includes source, destination, and
timing of communications, tapping of communications lines, and other
activities.  The breathtaking scope of the operations shocked the
Internet technical community, and led to a sea change within the
IETF, IAB, and many parts of the private sector.</t>

<t>Now that some years have past, it seems appropriate to reflect on that
period of time, what effect the community's actions had, where
security has improved, how the threat surface has evolved, what areas
haven't improved, and where the community might invest future efforts.</t>

<t>Bruce Schneier begins this compendium of individual essays by bringing
us back to 2013, recalling how it was for him and others to report
what was happening, and the mindset of those involved.  Next, Stephen
Farrell reviews the technical community's reactions, technical
advances, and where threats remain.  Then Farzaneh Badii discusses the
impact of those advances – or lack thereof – on human rights.  Finally
Steven M. Bellovin puts the Snowden revelations into an ever-evolving
historical context of secrets and secret stealing that spans
centuries, closing with some suggestions for IETF.</t>

<t>Readers are invited to reflect for themselves on what impact we as a
community have had – or not had, and what positive contribution the
technical community can and should make to address security and
privacy of citizens of the world.</t>

<t>-- Eliot Lear, Independent Submissions Editor for the RFC Series</t>

</section>
<section anchor="bruce-schneier-snowden-ten-years-later"><name>Bruce Schneier: Snowden Ten Years Later</name>

<t>In 2013 and 2014, I wrote extensively about new revelations regarding
NSA surveillance based on the documents provided by Edward
Snowden. But I had a more personal involvement as well.</t>

<t>I wrote the essay below in September 2013. The <em>New Yorker</em> agreed to
publish it, but the <em>Guardian</em> asked me not to. It was
scared of UK law enforcement, and worried that this essay would
reflect badly on it. And given that the UK police would raid its
offices in July 2014, it had legitimate cause to be worried.</t>

<t>Now, ten years later, I offer this as a time capsule of what those
early months of Snowden were like.</t>

<t>**********</t>

<t>It’s a surreal experience, paging through hundreds of top-secret NSA
documents. You’re peering into a forbidden world: strange, confusing,
and fascinating all at the same time.</t>

<t>I had flown down to Rio de Janeiro in late August at the request of
Glenn Greenwald. He had been working on the Edward Snowden archive for
a couple of months, and had a pile of more technical documents that he
wanted help interpreting. According to Greenwald, Snowden also thought
that bringing me down was a good idea.</t>

<t>It made sense. I didn't know either of them, but I have been writing
about cryptography, security, and privacy for decades. I could
decipher some of the technical language that Greenwald had difficulty
with, and understand the context and importance of various
document. And I have long been publicly critical of the NSA’s
eavesdropping capabilities. My knowledge and expertise could help
figure out which stories needed to be reported.</t>

<t>I thought about it a lot before agreeing. This was before David
Miranda, Greenwald’s partner, was detained at Heathrow airport by the
UK authorities; but even without that, I knew there was a risk. I fly
a lot—a quarter of a million miles per year—and being put on a TSA
list, or being detained at the US border and having my electronics
seized, would be a major problem. So would the FBI breaking into my
home and seizing my personal electronics. But in the end, that made me
more determined to do it.</t>

<t>I did spend some time on the phone with the attorneys recommended to
me by the ACLU and the EFF. And I talked about it with my partner,
especially when Miranda was detained three days before my departure.
Both Greenwald and his employer, the <em>Guardian</em>, are careful about whom
they show the documents to. They publish only those portions essential
to getting the story out. It was important to them that I be a
co-author, not a source. I didn’t follow the legal reasoning, but the
point is that the <em>Guardian</em> doesn’t want to leak the documents to
random people. It will, however, write stories in the public interest,
and I would be allowed to review the documents as part of that
process. So after a Skype conversation with someone at the <em>Guardian</em>, I
signed a letter of engagement.</t>

<t>And then I flew to Brazil.</t>

<t>I saw only a tiny slice of the documents, and most of what I saw was
surprisingly banal. The concerns of the top-secret world are largely
tactical: system upgrades, operational problems owing to weather,
delays because of work backlogs, and so on. I paged through weekly
reports, presentation slides from status meetings, and general
briefings to educate visitors. Management is management, even inside
the NSA Reading the documents, I felt as though I were sitting through
some of those endless meetings.</t>

<t>The meeting presenters try to spice things up. Presentations regularly
include intelligence success stories. There were details—what had been
found, and how, and where it helped—and sometimes there were attaboys
from “customers” who used the intelligence. I’m sure these are
intended to remind NSA employees that they’re doing good. It
definitely had an effect on me. Those were all things I want the NSA
to be doing.</t>

<t>There were so many code names. Everything has one: every program,
every piece of equipment, every piece of software. Sometimes code
names had their own code names. The biggest secrets seem to be the
underlying real-world information: which particular company
MONEYROCKET is; what software vulnerability EGOTISTICALGIRAFFE—really,
I am not making that one up—is; how TURBINE works. Those secrets
collectively have a code name—ECI, for exceptionally compartmented
information—and almost never appear in the documents. Chatting with
Snowden on an encrypted IM connection, I joked that the NSA cafeteria
menu probably has code names for menu items. His response: “Trust me
when I say you have no idea.”</t>

<t>Those code names all come with logos, most of them amateurish and a
lot of them dumb. Note to the NSA: take some of that more than
ten-billion-dollar annual budget and hire yourself a design
firm. Really; it’ll pay off in morale.</t>

<t>Once in a while, though, I would see something that made me stop,
stand up, and pace around in circles. It wasn’t that what I read was
particularly exciting, or important. It was just that it was
startling. It changed—ever so slightly—how I thought about the world.</t>

<t>Greenwald said that that reaction was normal when people started
reading through the documents.</t>

<t>Intelligence professionals talk about how disorienting it is living on
the inside. You read so much classified information about the world’s
geopolitical events that you start seeing the world differently. You
become convinced that only the insiders know what’s really going on,
because the news media is so often wrong. Your family is
ignorant. Your friends are ignorant. The world is ignorant. The only
thing keeping you from ignorance is that constant stream of classified
knowledge. It’s hard not to feel superior, not to say things like “If
you only knew what we know” all the time. I can understand how General
Keith Alexander, the director of the NSA, comes across as so
supercilious; I only saw a minute fraction of that secret world, and I
started feeling it.</t>

<t>It turned out to be a terrible week to visit Greenwald, as he was
still dealing with the fallout from Miranda’s detention. Two other
journalists, one from the Nation and the other from the <em>Hindu</em>, were
also in town working with him. A lot of my week involved Greenwald
rushing into my hotel room, giving me a thumb drive of new stuff to
look through, and rushing out again.  I did get to "meet" Snowden over
secure chat.</t>

<t>A technician from the <em>Guardian</em> got a search capability working while I
was there, and I spent some time with it. Question: when you’re given
the capability to search through a database of NSA secrets, what’s the
first thing you look for? Answer: your name.</t>

<t>It wasn’t there. Neither were any of the algorithm names I knew, not
even algorithms I knew that the US government used.</t>

<t>I tried to talk to Greenwald about his own operational security. It
had been incredibly stupid for Miranda to be traveling with NSA
documents on the thumb drive. Transferring files electronically is
what encryption is for. I told Greenwald that he and Laura Poitras
should be sending large encrypted files of dummy documents back and
forth every day.</t>

<t>Once, at Greenwald’s home, I walked into the backyard and looked for
TEMPEST receivers hiding in the trees. I didn’t find any, but that
doesn’t mean they weren’t there. Greenwald has a lot of dogs, but I
don’t think that would hinder professionals. I’m sure that a bunch of
major governments have a complete copy of everything Greenwald
has. Maybe the black bag teams bumped into each other in those early
weeks.</t>

<t>I started doubting my own security procedures. Reading about the NSA’s
hacking abilities will do that to you. Can it break the encryption on
my hard drive? Probably not. Has the company that makes my encryption
software deliberately weakened the implementation for it?
Probably. Are NSA agents listening in on my calls back to the US? Very
probably. Could agents take control of my computer over the Internet
if they wanted to? Definitely. In the end, I decided to do my best and
stop worrying about it. It was the agency’s documents, after all. And
what I was working on would become public in a few weeks.</t>

<t>I wasn't sleeping well, either. A lot of it was the sheer magnitude of
what I saw. It's not that any of it was a real surprise. Those of us
in the information security community had long assumed that the NSA
was doing things like this. But we never really sat down and figured
out the details, and to have the details confirmed made a big
difference. Maybe I can make it clearer with an analogy. Everyone
knows that death is inevitable; there's absolutely no surprise about
that. Yet it arrives as a surprise, because we spend most of our lives
refusing to think about it. The NSA documents were a bit like
that. Knowing that it is surely true that the NSA is eavesdropping on
the world, and doing it in such a methodical and robust manner, is
very different from coming face-to-face with the reality that it is
and the details of how it is doing it.</t>

<t>I also found it incredibly difficult to keep the secrets. The
<em>Guardian</em>’s process is slow and methodical. I move much faster. I
drafted stories based on what I found. Then I wrote essays about those
stories, and essays about the essays. Writing was therapy; I would
wake up in the wee hours of the morning, and write an essay. But that
put me at least three levels beyond what was published.</t>

<t>Now that my involvement is out, and my first essays are out, I feel a
lot better. I'm sure it will get worse again when I find another
monumental revelation; there are still more documents to go through.</t>

<t>I’ve heard it said that Snowden wants to damage America. I can say
with certainty that he does not. So far, everyone involved in this
incident has been incredibly careful about what is released to the
public. There are many documents that could be immensely harmful to
the US, and no one has any intention of releasing them. The documents
the reporters release are carefully redacted. Greenwald and I
repeatedly debated with <em>Guardian</em> editors the newsworthiness of story
ideas, stressing that we would not expose government secrets simply
because they’re interesting.</t>

<t>The NSA got incredibly lucky; this could have ended with a massive
public dump like Chelsea Manning’s State Department cables. I suppose
it still could. Despite that, I can imagine how this feels to the NSA
It’s used to keeping this stuff behind multiple levels of security:
gates with alarms, armed guards, safe doors, and military-grade
cryptography. It’s not supposed to be on a bunch of thumb drives in
Brazil, Germany, the UK, the US, and who knows where else, protected
largely by some random people’s opinions about what should or should
not remain secret. This is easily the greatest intelligence failure in
the history of ever. It’s amazing that one person could have had so
much access with so little accountability, and could sneak all of this
data out without raising any alarms. The odds are close to zero that
Snowden is the first person to do this; he’s just the first person to
make public that he did. It’s a testament to General Alexander’s power
that he hasn’t been forced to resign.</t>

<t>It’s not that we weren’t being careful about security, it’s that our
standards of care are so different. From the NSA’s point of view,
we’re all major security risks, myself included. I was taking notes
about classified material, crumpling them up, and throwing them into
the wastebasket. I was printing documents marked “TOP
SECRET/COMINT/NOFORN” in a hotel lobby. And once, I took the wrong
thumb drive with me to dinner, accidentally leaving the unencrypted
one filled with top-secret documents in my hotel room. It was an
honest mistake; they were both blue.</t>

<t>If I were an NSA employee, the policy would be to fire me for that alone.</t>

<t>Many have written about how being under constant surveillance changes
a person. When you know you’re being watched, you censor yourself. You
become less open, less spontaneous. You look at what you write on your
computer and dwell on what you’ve said on the telephone, wonder how it
would sound taken out of context, from the perspective of a
hypothetical observer. You’re more likely to conform. You suppress
your individuality. Even though I have worked in privacy for decades,
and already knew a lot about the NSA and what it does, the change was
palpable. That feeling hasn’t faded. I am now more careful about what
I say and write. I am less trusting of communications technology. I am
less trusting of the computer industry.</t>

<t>After much discussion, Greenwald and I agreed to write three stories
together to start. All of those are still in progress. In addition, I
wrote two commentaries on the Snowden documents that were recently
made public. There’s a lot more to come; even Greenwald hasn’t looked
through everything.</t>

<t>Since my trip to Brazil [one month before], I’ve flown back to the US
once and domestically seven times—all without incident. I’m not on any
list yet. At least, none that I know about.</t>

<t>**********</t>

<t>As it happened, I didn’t write much more with Greenwald or the
<em>Guardian</em>. Those two had a falling out, and by the time everything
settled and both began writing about the documents
independently—Greenwald at the newly formed website the <em>Intercept</em>—I
got cut out of the process somehow. I remember hearing that Greenwald
was annoyed with me, but I never learned the reason. We haven’t spoken
since.</t>

<t>Still, I was happy with the one story I was part of: how the NSA hacks
Tor. I consider it a personal success that I pushed the <em>Guardian</em> to
publish NSA documents detailing QUANTUM. I don’t think that would have
gotten out any other way. And I still use those pages today when I
teach cybersecurity to policymakers at the Harvard Kennedy School.</t>

<t>Other people wrote about the Snowden files, and wrote a lot. It was a
slow trickle at first, and then a more consistent flow. Between
Greenwald, Bart Gellman, and the <em>Guardian</em> reporters, there ended up
being steady stream of news. (Bart brought in Ashkan Soltani to help
him with the technical aspects, which was a great move on his part,
even if it cost Ashkan a government job later.) More stories were
covered by other publications.</t>

<t>It started getting weird. Both Greenwald and Gellman held documents
back so they could publish them in their books. Jake Appelbaum, who
had not yet been accused of sexual assault by multiple women, was
working with Laura Poitras. He partnered with Spiegel to release an
implant catalog from the NSA’s Tailored Access Operations group. To
this day, I am convinced that that document was not in the Snowden
archives: that Jake got it somehow, and it was released under the
cover of Edward Snowden. I thought it was important enough that I
started writing about each item in that document in my blog: ”NSA
Exploit of the Week.” That got my website blocked by the DoD: I keep a
framed print of the censor’s message on my wall.</t>

<t>Perhaps the most surreal document disclosures were when artists
started writing fiction based on the documents. This was in 2016, when
the <em>Intercept</em> finally built a secure room in New York to house the
documents. By then, the documents were years out of date, and now
they’re over a decade out of date. (They were leaked in 2013, but most
of them were from 2012 or before.)</t>

<t>I ended up being something of a public ambassador for the
documents. When I got back from Rio, I gave talks at a private
conference in Woods Hole, the Berkman Center at Harvard, something
called the Congress and Privacy and Surveillance in Geneva, events at
both CATO and New America in DC, an event at the University of
Pennsylvania, an event at EPIC and a “Stop Watching Us” rally in DC,
the RISCS conference in London, the ISF in Paris, and...then...at the
IETF meeting in Vancouver in November 2013. (I remember little of
this; I am reconstructing it all from my calendar.)</t>

<t>What struck me at the IETF was the indignation in the room, and the
calls to action. And there was action, across many fronts. We
technologists did a lot to help secure the Internet, for example.</t>

<t>The government didn’t do its part, though. Despite the public outcry,
investigations by Congress, pronouncements by President Obama, and
federal court rulings. I don’t think much has changed. The NSA
canceled a program here and a program there, and it is now more public
about defense. But I don’t think it is any less aggressive about
either bulk or targeted surveillance. Certainly its government
authorities haven’t been restricted in any way. And surveillance
capitalism is still the business model of the Internet.</t>

<t>And Edward Snowden? We were in contact for a while on Signal. I
visited him once in Moscow, in 2016. And I had him do an annual guest
lecture to my class at Harvard for a few years, remotely by
Jitsi. Afterwards, I would hold a session where I promised to answer
every question he would evade or not answer, explain every response he
did give, and be candid in a way that someone with an outstanding
arrest warrant simply cannot. Sometimes I thought I could channel
Snowden better than he could.</t>

<t>But now it’s been a decade. Everything he knows is old and out of
date. Everything we know is old and out of date. The NSA suffered an
even worse leak of its secrets by the Russians, under the guise of the
Shadow Brokers, in 2016 and 2017. The NSA has rebuilt. It again has
capabilities we can only surmise.</t>

</section>
<section anchor="stephen-farrell-ietf-and-internet-technical-community-reaction"><name>Stephen Farrell: IETF and Internet Technical community reaction</name>

<t>In 2013, the IETF and, more broadly, the Internet technical, security and
privacy research communities, were surprised by the surveillance and attack
efforts exposed by the Snowden revelations.  <xref target="timeline"/> While the
potential for such was known, it was the scale and pervasiveness of the
activities disclosed that was alarming and, I think it fair to say, quite
annoying, for very many Internet engineers.</t>

<t>As for the IETF's reaction, informal meetings during the July 2013 IETF meeting
in Berlin indicated that IETF participants considered that these revelations
showed that we needed to do more to improve the security and privacy properties
of IETF protocols, and to help ensure deployments made better use of the
security and privacy mechanisms that already existed. In August, the IETF setup
a new mailing list <xref target="perpass"/> that ended up being a useful venue for triaging
proposals for work on these topics. At the November 2013 IETF meeting, there
was a lively and very well attended plenary session <xref target="plenary-video"/> on
"hardening the Internet" against such attacks, followed by a "birds of a
feather" <xref target="BoF-session"/> devoted to more detailed discussion of possible
actions in terms of new working groups, protocols and best-current-practice
(BCP) documents that could help improve matters.  This was followed in
February/March 2014 by a joint IAB/W3C workshop on "strengthening the Internet
against pervasive monitoring" <xref target="STRINT"/> held in London and attended by 150
engineers (still the only IAB workshop in my experience where we needed a
wait-list for people after capacity for the venue was reached!). The STRINT
workshop report was eventually published as <xref target="RFC7687"/> in 2015, but in the
meantime work proceeded on a Best Current Practice (BCP) document codifying
that the IETF community considered that "pervasive monitoring is an attack"
<xref target="RFC7258"/> (aka BCP188). The IETF last-call discussion for that short
document included more than 1000 emails - while there was broad agreement on
the overall message, a number of IETF participants considered enshrining that
message in the RFC series and IETF processes was controversial. In any case the
BCP was published in May 2014. The key statement on which rough consensus was
reached is in the abstract of RFC7258 and says "Pervasive monitoring is a
technical attack that should be mitigated in the design of IETF protocols,
where possible." That document has since been referenced <xref target="refs-to-7258"/> by
many IETF working groups and RFCs as justifying additional work on security and
privacy. Throughout that period and beyond, the repercussions of the Snowden
revelations remained a major and ongoing agenda item for both of the IETF's
main technical management bodies - the IAB and the IESG (on which I served at
the time).</t>

<t>So far, I've really only described the processes with which the IETF dealt with
the attacks, but there was of course also much technical work started by IETF
participants that was at least partly motivated by the Snowden revelations.</t>

<t>In November 2013 a working group was established to document better practices
for using TLS in applications <xref target="UTA"/> so that deployments would be less at risk
in the face of some of the attacks related to stripping TLS or having
applications mis-use TLS APIs or parameters.  Similar work was done to update
recommendations for use of cryptography in other protocols in the <xref target="CURDLE"/>
working group later.  The CURDLE working group was to an extent created to
enable use of a set of new elliptic curves that had been documented by the IRTF
crypto forum research group. <xref target="CFRG"/> That work in turn had been partly
motivated by (perhaps ultimately unfounded) concerns about elliptic curves
defined in NIST standards, following the DUAL_EC_DRBG debacle <xref target="dual-ec"/> 
(described further below) where a
NIST random number generator had been deliberately engineered to produce output
that could be vulnerable to NSA attack.</t>

<t>Work to develop a new version of TLS was started in 2014, mainly due to
concerns that TLSv1.2 and earlier version implementations had been shown to be
vulnerable to a range of attacks over the years. The work to develop TLSv1.3
<xref target="RFC8446"/> also however aimed to encrypt more of the handshake so as to
expose less information to network observers - a fairly direct result of the
Snowden revelations.  Work to further improve TLS in this respect continues
today using the so-called encrypted client hello (ECH) <xref target="I-D.ietf-tls-esni"/>
mechanism to remove one of the last privacy leaks present in current TLS.</t>

<t>Work on ECH was enabled by significant developments to encrypt DNS traffic,
using DNS over TCP (DoT) <xref target="RFC7858"/> or DNS over HTTP (DoH) <xref target="RFC8484"/> which also started as a result of
the Snowden revelations. Prior to that, privacy hadn't really been considered
when it came to DNS data or (more importantly) the act of accessing DNS data.
The trend towards encrypting DNS traffic represents a significant change for
the Internet, both in terms of reducing cleartext, but also in terms of moving
points-of-control. The latter aspect was, and remains, controversial, but the
IETF did it's job of defining new protocols that can enable better DNS privacy.
Work on HTTP version 2 <xref target="RFC7540"/> and QUIC <xref target="RFC9000"/> further demonstrates
the trend in the IETF towards always-encrypting protocols as the new norm, at
least at and above the transport layer.</t>

<t>Of course, not all such initiatives bore fruit, for example attempts to define
a new MPLS encryption mechanism <xref target="I-D.farrelll-mpls-opportunistic-encrypt"/>
foundered due to a lack of interest and the existence of the already deployed
IEEE MACSEC scheme. But there has been a fairly clear trend towards trying to
remove cleartext from the Internet as a precursor to provide improved privacy
when considering network observers as attackers.</t>

<t>The IETF of course, forms only one part of the broader Internet technical
community, and there were many non-IETF activities triggered by the Snowden
revelations, a number of which also eventually resulted in new IETF work to
standardise better security and privacy mechanisms developed elsewhere.</t>

<t>In 2013, the web was largely unencrypted despite HTTPS being relatively
usable and that was partly due to problems using the WebPKI at scale. The
Let's Encrypt <xref target="LE"/> initiative was established in 2015 to try move the web
towards being fully encryted and has been extremely successful in helping
achieve that goal.  Subsequently, the automation protocols developed for
Let's Encrypt were standardised in the IETF's ACME <xref target="ACME"/> working group.</t>

<t>In 2013, most email transport between mail servers was cleartext,
directly enabling some of the attacks documented in the Snowden documents.
Significant effort by major mail services and MTA software developers since
then have resulted in more than 90% of email being encrypted between mail
servers and various IETF protocols have been defined in order to improve that
situation, e.g., SMTP MTA Strict Transport Security (MTA-STS). <xref target="RFC8461"/></t>

<t>Lastly, MAC addressees have historically been long-term fixed values visble to
local networks (and beyond), which enabled some tracking attacks that were
documented in the Snowden documents. <xref target="Toronto"/> The IEEE 802
standards group recognised this weakness and started work on MAC address
randomisation that in turn lead to the IETF's <xref target="MADINAS"/> working group that
aims to ensure randomised MAC addresses can be used on the Internet without
causing unintentional harm.</t>

<t>In summary, the significantly large volume of technical work pursued in the
IETF and elsewhere as a result of the Snowden revelations has focussed on two
main things: decreasing the amount of plaintext that remains visible to network
observers and secondly reducing the number of long-term identifiers that enable
unexpected identification or re-identification of devices or users. This work
is not by any means complete, nor is deployment universal, but significant
progress has been made and the work continues even if the level of annoyance
at the attack has faded somewhat over time.</t>

<t>One should also note that there has been push-back against these improvements
in security and privacy and the changes they cause for deployments. That has
come from more or less two camps - those on whom these improvements force
change tend to react badly, but later figure out how to adjust. The second camp
being those who seemingly prefer not to strenghten security so as to for
example continue to achieve what they call "visibility" even in the face of the
many engineers who correctly argue that such an anti-encryption approach
inevitably leads to worse security overall. The recurring nature of this kind
of push-back is nicely illustrated by <xref target="RFC1984"/>. That informational document
was published in 1996 as an IETF response to an early iteration of the
perennial "encryption is bad" argument. In 2015, the unmodified 1996 text was
upgraded to a Best Current Practice (BCP200) as the underlying arguments have
not, and will not, change.</t>

<t>Looking back on all the above from a 2023 vantage point, I think that, as a
community of Internet engineers, we got a lot right, but that today there's way
more that needs to be done to better protect the security and privacy of people
who use the Internet. In particular, we (the technical community) haven't done
nearly as good a job at countering surveillance capitalism which has exploded
in the last decade. In part, that's because many of the problems are outside of
the scope of bodies such as the IETF. For example, intrusive back-end sharing
of people's data for advertising purposes can't really be mitigated via
Internet protocols.</t>

<t>However, I also think that the real annoyance felt with respect to the Snowden
revelations is (in general) not felt nearly as much when it comes to the legal
but hugely privacy-invasive activities of major employers of Internet
engineers.</t>

<t>It's noteworthy that RFC7258 doesn't consider that bad actors are limited to
governments; and personally, I think many advertising industry schemes for
collecting data are egregious examples of pervasive monitoring and hence ought
also be considered an attack on the Internet that ought be mitigated where
possible.  However, the Internet technical community clearly hasn't acted in
that way over the last decade.</t>

<t>Perhaps that indicates that Internet engineers and the bodies in which they
congregate need to place much more emphasis on standards for ethical behaviour
than has been the case for the first half-century of the Internet.  And while
it would be good to see the current leaders of Internet bodies work to make
progress in that regard, at the time of writing, it sadly seems more likely that
government regulators will be the ones to try force better behaviour. That of
course comes with a significant risk of having regulations that stymie the kind
of permissionless innovation that characterised many earlier Internet
successes.</t>

<t>So while we got a lot right in our reaction to Snowden's revelations,
currently, we have a "worse" Internet.  Nonetheless, I do still hope to see a
sea-change there, as the importance of real Internet security and privacy for
people becomes utterly obvious to all, even the most hard core capitalists and
government signals intelligence agencies.  That may seem naive, but I remain
optimistic that as a fact-based community we (and eventually our employers)
will recognise that the lesser risk is to honestly aim to provide the best
security and privacy practically possible.</t>

</section>
<section anchor="farzaneh-badii-did-snowdens-revelations-help-with-protecting-human-rights-on-the-internet"><name>Farzaneh Badii: Did Snowden’s revelations help with protecting human rights on the Internet?</name>

<t>It is very difficult to scientifically measure the effect of Snowden's
revelations on human rights and the Internet. Anecdotally, we have
been witnessing dominant regulatory and policy approaches that impact
technologies and services that are at the core of protecting human
rights on the Internet. (A range of European Union laws that aims to
address online safety or concentration of data. There are many more
regulations that have an impact on the Internet.<xref target="Masnick2023"/>) There
has been little progress in fixing technical and policy issues that
help enable human rights. Snowden revelations did not have a
revolutionary effect on our approach towards not using policies and
technical means that have an effect on human rights, such as freedom
of expression, freedom of association and assembly and privacy. It did
not decrease the number of Internet shutdowns, nor the eagerness of
authoritarian (and even to some extent democratic countries) to
territorialize the Internet. Perhaps the revelations helped with the
evolution of some technical and policy aspects.</t>

<t>After Snowden’s revelations 10 years ago, engineers and advocates at
the Internet Engineering Task Force (IETF) responded in a few
ways. One prominent response was the issuance of a Best Current
Practice document, “Pervasive Monitoring Is an Attack” <xref target="RFC7258"/> by
Farrell and Tschofenig. The responses to Snowden revelations did not
mean that IETF had lost sight of issues such as privacy and
surveillance. There were instances of resistance to surveillance in
the past by engineers (we do not delve into how successful that was in
protecting human rights). But historically, many engineers believed
that widespread and habitual surveillance was too expensive to be
practical. The revelations proved them wrong.</t>

<t>Rights-centered activists were also involved with the IETF before the
revelations. For example, staff from Center for Democracy and
Technology (CDT) was undertaking work at the IETF (and was a member of
the Internet Architecture Board) and held workshops about the
challenges of creating privacy protective protocols and systems. The
technical shortcomings that were exploited by the National Security
Agency to carry out mass-scale surveillance were recognized by the
IETF before the Snowden revelations <xref target="Garfinkel1995"/>,<xref target="RFC6462"/>. In
2012, Joy Liddicoat and Avri Doria wrote a report at Internet Society
which extensively discussed the processes and principles of human
rights and Internet protocols <xref target="Doria2012"/>.</t>

<t>Perhaps the Snowden revelations brought more attention to the IETF and
its work as it related to important issues, such as privacy and
freedom of expression. It might have also expedited and helped with
more easily convening the Human Rights Protocol Considerations
research group in the Internet Research Task Force (IRTF). Co-chaired
by Niels ten Oever (who worked at Article 19 at the time) and Internet
governance activist Avri Doria, the Internet Research Task Force in
July 2015 chartered a Research Group on “Human Rights Protocol
Considerations” (the HRPC RG). The charter of the HRPC RG stated that
the group was established: “to research whether standards and
protocols can enable, strengthen or threaten human rights, as defined
in the UDHR and theInternational Covenant on Civil and Political
Rights (ICCPR).”</t>

<t>During the past decades, a few successful strides were made to create
protocols that, when and if implemented, aim at protecting privacy of
the users, as well as help with reducing pervasive surveillance. These
efforts were in keeping with the consensus of the IETF found in RFC
7258.  Sometimes these protocols have anti-censorship qualities as
well. A few examples immediately come to mind: 1) Encryption of DNS
queries (for example DNS over HTTPS); 2) ACME protocol underpinning
the Lets Encrypt initiative and 3) Registration Data Access Protocol
(RDAP)<xref target="RFC7480"/>,<xref target="RFC7481"/>,<xref target="RFC9082"/>,<xref target="RFC9083"/>,<xref target="RFC7484"/>,
<xref target="RFC8056"/>.(It is debatable that RDAP had anything to do with
Snowden revelations but it is still a good example and is finally
being implemented.)</t>

<t>DNS Queries over HTTPS protocol aimed to encrypt DNS queries. Four
years after RFC 7258, DoH was developed to tackle both active and
passive monitoring of DNS queries. It is also a tool that can help
with combatting censorship. Lets Encrypt was not an Internet protocol,
but it was an initiative that aimed to encrypt the web and later on
some of the automation protocols were standardized in the IETF ACME
working group. The Registration Data Access Protocol could solve a
long term problem: redacting the domain name registrants (and IP
address holders) sensitive, personal data but at the same time
enabling legitimate access to the information. As to the work of HRPC
research group, it has so far issued <xref target="RFC8280"/> by ten Oever and
Cath) and a number of informational Internet Drafts.</t>

<t>While we cannot really argue that all the movements and privacy
preserving protocols and initiatives that enable protecting human
rights at the infrastructure layer directly result from Snowden
revelations, I think it is safe to say that the revelations helped
with expediting the resolution of some of the “technical” hesitations
that had an effect on fixing Internet protocols that enabled
protection of human rights.</t>

<t>Unfortunately, Snowden revelations have not yet helped us meaningfully
with adopting a human rights approach. We can’t agree on prioritizing
human rights in our Internet communities for a host of reasons. This
could be due to: 1) human rights are sometimes in conflict with each
other 2) it is simply not possible to mitigate the human right
violation through the Internet protocol 3) it is not obvious for the
engineers before the fact how the Internet protocol contributes to
enabling protection of human rights and how they can fix the problem
4) the protocol is already there but market, law and a host of other
societal and political issues do not allow for widespread
implementation.</t>

<t>IETF did not purposefully take a long time to adopt protocols that
enabled human rights. There were technical and political issues that
created barriers. For example, the IETF community attempted a few
times before to create a protocol that would disclose the necessary
information of IP holders and domain name registrants while at the
same time protecting their data (CRIPS and IRIS are two
examples). However, it was not until RDAP was developed and the
General Data Protection Regulation (GDPR) was enacted that Internet
Corporation for Assigned Names and Numbers had to consider instructing
registries and registrars to implement RDAP and its community had to
come up with a privacy compliant policy.  Overall, a host of
regulatory and market incentives can halt or slow down the
implementation of human rights enabling protocols and implementation
could depend on other organizations with their own political and
stakeholder conflicts.</t>

<t>Sometimes the protocol is available, but the regulatory framework and
the market do not allow for implementation. One curious example of
this is sanctions and their effect on IP addresses of sanctioned
nations. Imagine if we argue that registration of IPv4 is affected by
sanctions because it is deemed as an economic resource and because of
scarcity and monetization. In theory, if we move to IPv6, we can solve
the problem of access to the resources because IPv6 is not a scarce
resource. However, as we know, adoption of IPv6 depends not only on
technical availability. Adoption of IPv6 won’t be the complete
solution either and depends on laws and policies and the market.</t>

<t>Sometimes there are arguments over implementation of a protocol
because as it is perceived, while it can protect freedom of expression
and reduce surveillance, it can hamper other human rights. For
instance, we still have doubts about implementing DNS over HTTPS
without seriously considering its contributions to fight with
censorship and bring encryption to DNS queries. The arguments against
implementation of DoH include protection of children online and lack
of law enforcement access to data.</t>

<t>Ironically, we advocate for connectivity and believe expressing
oneself on the Internet is a human right, but when a war erupts, we
resort to tools that impact that very concept. For example, some
believe via imposing sanctions on critical properties of the Internet,
we can punish the perpetrators of a war. The Regional Internet
Registries that are in charge of registration of IP addresses have
shown resilience to these requests. However, some tech-companies (-
for example Cogent <xref target="Roth2022"/>) have not shied away from not serving
sanctioned countries, even if it is over-compliance and could cause
disconnecting ordinary people.</t>

<t>Perhaps we can solve some of these problems by undertaking a thorough
impact assessment and contextualization to reveal how and why Internet
protocols affect human rights (something Fidler and I argued
for<xref target="Badii2021"/>). Contextualization and
impact assessment can reveal how each Internet protocol or each line
of code, in which systems, have an impact on which and whose human
rights.</t>

<t>The HRPC RG (which I am a part of) and the larger human rights and
policy analyst communities are still struggling to analyze legal,
social and market factors alongside the protocols to have a good
understanding of what has an impact and what has to be changed. It is
hard, but it is not impossible. If we thoroughly document and research
the lifecycle of an Internet protocol and contextualize it, we might
have a better understanding of how and if we can actually fix which
parts of the protocol in order to protect human rights.</t>

<t>Overall, the revelations did, to some extent, contribute to the
evolution of our ideas and perspectives. Our next step should be to
undertake research on the impact of Internet systems (including
Internet protocols) on human rights, promote the implementation of
protocols good for human rights through policy and advocacy and focus
on which technical parts we can standardize to help with more
widespread implementation of human rights enabling Internet protocols.</t>

</section>
<section anchor="steven-m-bellovin-governments-and-cryptography-the-crypto-wars"><name>Steven M. Bellovin: Governments and Cryptography: The Crypto Wars</name>

<section anchor="historical-background"><name>Historical Background</name>

<t>It’s not a secret: many governments in the world don’t like it when
people encrypt their traffic. More precisely, they like strong
cryptography for themselves but not for others, whether those others
are private citizens or other countries. But the history is longer and
more complex than that.</t>

<t>For much of written history, both governments and individuals used
cryptography to protect their messages. To cite just one famous
example, Julius Caesar is said to have encrypted messages by shifting
letters in the alphabet by 3 <xref target="Kahn1996"/>. In modern parlance, 3 was
the key, and each letter was encrypted with</t>

<ul empty="true"><li>
  <t>C[i] = (P[i] + 3) mod 23</t>
</li></ul>

<t>(In his day, J, U, and W did not exist in the Latin alphabet.) Known
Arabic writings on cryptanalysis go back to at least the 8th century;
their sophistication shows that encryption was reasonably commonly
used. In the 9th century, Abu Yusuf Ya’qub ibn ‘Ishaq aṣ-Ṣabbah
al-Kindh developed and wrote about frequency analysis as a way to
crack ciphers <xref target="Borda2011"/>,<xref target="Kahn1996"/>.</t>

<t>In an era of minimal literacy, though, there wasn’t that much use of
encryption, simply because most people could neither read nor
write. Governments used encryption for diplomatic messages, and
cryptanalysts followed close behind. The famed Black Chambers of the
Renaissance era read messages from many different governments, while
early cryptographers devised stronger and stronger ciphers
<xref target="Kahn1996"/>. In Elizabethan times in England, Sir Francis Walsingham’s
intelligence agency intercepted and decrypted messages from Mary,
Queen of Scots; these messages formed some of the strongest evidence
against her and eventually led to her execution <xref target="Kahn1996"/>.</t>

<t>This pattern continued for centuries. In the United States, Thomas
Jefferson invented the so-called wheel cipher in the late 18th
century; it was reinvented about 100 years later by Etienne Bazeries
and used as a standard American military cipher well into World War II
<xref target="Kahn1996"/>. Jefferson and other statesmen of that era regularly used
cryptography when communicating with each other. An encrypted message
was even part of the evidence introduced in Aaron Burr’s 1807 trial
for treason <xref target="Kerr2020"/>,<xref target="Kahn1996"/>. Edgar Allan Poe claimed that he
could cryptanalyze any message sent to him <xref target="Kahn1996"/>.</t>

<t>The telegraph era upped the ante. In the U.S., just a year after
Samuel Morse deployed his first telegraph line between Baltimore and
Washington, his business partner, Francis Smith, published a codebook
to help customers protect their traffic from prying eyes
<xref target="Smith1845"/>.  In 1870, Britain nationalized its domestic telegraph network;
in response, Robert Slater published a more sophisticated codebook
<xref target="Slater1870"/>. On the government side, Britain took advantage of its
position as the central node in the world’s international telegraphic
networks to read a great deal of traffic passing through the country
<xref target="Headrick1991"/>,<xref target="Kennedy1971"/>. They used this ability strategically,
too—when war broke out in 1914, the British Navy cut Germany’s
undersea telegraph cables, forcing them to use radio; an intercept of
the so-called Zimmermann telegram, when cryptanalyzed, arguably led to
American entry into the war and thence to Germany’s defeat. Once the
U.S. entered the war, it required users of international telegraph
lines to deposit copies of the codebooks they used for compression, so
that censors could check messages for prohibited content <xref target="Kahn1996"/>.</t>

<t>In Victorian Britain, private citizens, often lovers, used encryption
in newspapers’ Personal columns to communicate without their parents’
knowledge. Charles Wheatstone and Charles Babbage used to solve these
elementary ciphers routinely, for their own amusement <xref target="Kahn1996"/>.</t>

<t>This pattern continued for many years. Governments regularly used
ciphers and codes, while other countries tried to break them; private
individuals would sometimes use encryption but not often, and rarely
well. But the two world wars marked a sea change, one that would soon
reverberate into the civilian world.</t>

<t>The first World War featured vast troop movements by all parties; this
in turn required a lot of encrypted communications, often by telegraph
or radio. These messages were often easily intercepted in
bulk. Furthermore, the difficulty of encrypting large volumes of
plaintext led to the development of a variety of mechanical encryption
devices, including Germany’s famed Enigma machine. World War II
amplified both trends. It also gave rise to machine-assisted
cryptanalysis, such as the United Kingdom’s bombes (derived from an
earlier Polish design) and Colossus machine, and the American’s device
for cracking Japan’s PURPLE system. The U.S. also used punch
card-based tabulators to assist in breaking other Japanese codes, such
as the Japanese Imperial Navy’s JN-25 <xref target="Kahn1996"/>,<xref target="Rowlett1998"/>.</t>

<t>These developments set the stage for the postwar SIGINT—Signals
Intelligence—environment. Many intra-government messages were sent by
radio, making them easy to intercept; advanced cryptanalytic machines
made cryptanalysis easier. Ciphers were getting stronger, though, and
government SIGINT agencies did not want to give up their access to
data. While there were undoubtedly many developments, two are well
known.</t>

<t>The first involved CryptoAG, a Swedish (and later Swiss) manufacturer
of encryption devices. The head of that company, Boris Hagelin, was a
friend of William F. Friedman, a pioneering American
cryptologist. During the 1950s, CryptoAG sold its devices to other
governments; apparently at Friedman’s behest, Hagelin weakened the
encryption in a way that let the NSA read the traffic <xref target="Miller2020"/>.</t>

<t>The story involving the British is less well-documented and less
clear. When some of Britain’s former colonies gained their
independence, the British government gave them captured, war surplus
Enigma machines to protect their own traffic. Some authors contend
that this was deceptive, in that these former colonies did not realize
that the British could read Enigma-protected traffic; others claim
that this was obvious but that these countries didn’t care: Britain
was no longer their enemy; it was neighboring countries they were
worried about. Again, though, this concerned governmental use of
encryption <xref target="Kahn1996"/>,<xref target="Baldwin2022"/>. There was still little private
use.</t>

</section>
<section anchor="the-crypto-wars-begin"><name>The Crypto Wars Begin</name>

<t>The modern era of conflict between individual’s desire for privacy and
government desires to read traffic began around 1972. The grain
harvest in the U.S.S.R. had failed; since relations between the Soviet
Union and the United States were temporarily comparatively warm, the
Soviet grain company— an arm of the Soviet government, of
course— entered into negotiations with private American
companies. Unknown to Americans at the time, Soviet intelligence was
intercepting the phone calls of the American negotiating teams. In
other words, private companies had to deal with state actors as a
threat. Eventually, U.S. intelligence learned of this, and came to a
realization: the private sector needed strong cryptography, too, to
protect American national interests <xref target="Broad1982"/>,<xref target="Johnson1998"/>). This
underscored the need for strong cryptography to protect American
civilian traffic—but the SIGINT people were unhappy at the thought of
more encryption that they couldn’t break.</t>

<t>Meanwhile, the Pentagon was concerned about protecting its
unclassified data <xref target="Landau2014"/>. In 1973 and again in 1974, the
National Bureau of Standards (NBS) put out a call for a strong, modern
encryption algorithm. IBM submitted Lucifer, an internally developed
algorithm. It seemed quite strong, so NBS sent it off to the NSA to
get their take. The eventual design, which was adopted in 1976 as the
Data Encryption Standard (DES), differed in two important ways from
Lucifer. First, the so-called S-boxes, the source of the cryptologic
strength of DES, were changed, and were demonstrably not composed of
random integers. Many researchers alleged that the S-boxes contained
an NSA back door. It took 20 years for the truth to come out: the
S-boxes were in fact strengthened, not weakened. Most likely, IBM
independently discovered the attack now known as differential
cryptanalysis, though some scholars suspect that the NSA told them
about it. The non-random S-boxes protected against this attack. The
other change, though, was clearly insisted on by the NSA: the key size
was shortened, from Lucifer’s 112 bits to DES’s 56 bits. We now know
that the NSA wanted a 48-bit key size, while IBM wanted 64 bits; they
compromised at 56 bits.</t>

<t>Whitfield Diffie and Martin Hellman, at Stanford University, wondered
about the 56-bit keys. In 1979, they published a paper demonstrating
that the U.S. government, but few others, could afford to build a
brute-force cracking machine, one that could try all 2^56 possible
keys to crack a message. NSA denied tampering with the design; a
Senate investigating committee found that that was correct, but did
not discuss the shortened key length issue.</t>

<t>This, however, was not Diffie and Hellman’s greatest contribution to
cryptology. A few years earlier, they published a paper inventing what
is now known as public key cryptography. In 1978, Ronald Rivest, Adi
Shamir, and Leonard Adelman devised the RSA algorithm, which made it
usable. (An NSA employee, acting on his own, sent a letter warning
that academic conferences on cryptology might violate U.S. export
laws.)</t>

<t>Around the same time, George Davida at the University of Wisconsin
applied for a patent on a stream cipher; the NSA slapped a secrecy
order on the application. This barred him from even talking about his
invention. The publicity was devastating; the NSA had to back down.</t>

<t>The Crypto Wars had thus begun: civilians were inventing strong
encryption systems, and the NSA was tampering with them or trying to
suppress them. Bobby Inman, the then-director of the NSA, tried
creating a voluntary review process for academic papers, but very few
researchers were interested in participating <xref target="Landau1988"/>.</t>

<t>There were few major public battles during the 1980s, because there
were few new major use cases for civilian cryptography during that
time. There was one notable incident, though: Shamir, Amos Fiat, and
Uriel Feige invented zero-knowledge proofs and applied for a US
patent. In response, the US Army slapped a secrecy order on the
patent. After a great deal of public outrage and intervention by, of
all organizations, the NSA, the order was lifted on very narrow
grounds: the inventors were not American, and had been discussing
their work all over the world <xref target="Landau1988"/>.</t>

<t>In the 1990s, though, everything changed.</t>

</section>
<section anchor="the-battle-is-joined"><name>The Battle is Joined</name>

<t>There were three major developments in cryptography in the early
1990s. First, Phil Zimmerman released PGP (Pretty Good Privacy), a
package to encrypt email messages. In 1993, AT&amp;T planned to release
the TSD-3600, an easy-to-use phone encryptor aimed at business
travelers. Shortly after that, the Netscape Corporation released SSL
(Secure Socket Layer) as a way to enable web-based commerce using
their browser and web server. All of these were seen as threats by the
NSA and the FBI.</t>

<t>PGP was, at least arguably, covered by what was known as ITAR, the
International Trafficking in Arms Regulations—under American law,
encryption software was regarded as a weapon, so exports required a
license. It was also alleged to infringe the patents on the RSA
algorithm. Needless to say, both issues were problematic for what was
intended to be open source software. Eventually, the criminal
investigation into Zimmerman’s role in the spread of PGP overseas was
dropped, but the threat of such investigations remained to deter
others<xref target="Levy2001"/>.</t>

<t>The TSD-3600 was another matter. AT&amp;T was a major corporation that did
not want to pick a fight with the U.S. government, but international
business travelers were seen as a major market for the device. At the
government’s “request”, the DES chip was replaced with what was known
as the Clipper Chip. The Clipper chip used Skipjack, a cipher with
80-bit keys; it was thus much stronger against brute force attacks
than DES. However, it provided “key escrow”. Without going into any
details, the key escrow mechanism allowed U.S. government
eavesdroppers to consult a pair of (presumably secure) internal
databases and decrypt all communications protected by the chip. The
Clipper chip proved to be extremely unpopular with industry; that AT&amp;T
Bell Labs’ Matt Blaze found a weakness in the design<xref target="Blaze1994"/>, one
that let you use Skipjack without the key escrow feature didn’t help
its reputation.</t>

<t>The third major development, SSL, was even trickier. SSL was aimed at
e-commerce, and of course Netscape wanted to be able to sell its
products outside the US. That would require an export license, so they
made a deal with the government: non-American users would receive a
version that used 40-bit keys, a key length far shorter than what the
NSA had agreed to 20 years earlier. (To get ahead of the story: there
was a compromise mode of operation, wherein an export-grade browser
could use strong encryption when talking to a financial
institution. This hybrid mode led to cryptographic weaknesses
discovered some 20 years later<xref target="Adrian2015"/>.)</t>

<t>Technologists and American industry pushed back. The IETF adopted the
Danvers Doctrine, described in <xref target="RFC3365"/>:</t>

<ul empty="true"><li>
  <t>At the 32nd IETF held in Danvers, Massachusetts during April of 1995
the IESG asked the plenary for a consensus on the strength of security
that should be provided by IETF standards.  Although the immediate
issue before the IETF was whether or not to support “export” grade
security (which is to say weak security) in standards, the question
raised the generic issue of security in general.</t>
</li></ul>

<ul empty="true"><li>
  <t>The overwhelming consensus was that the IETF should standardize on the
use of the best security available, regardless of national policies.
This consensus is often referred to as the “Danvers Doctrine”.</t>
</li></ul>

<t>Then American companies started losing business to their overseas
competitors, who did not have to comply with U.S. export laws. All of
this led to what seemed like a happy conclusion: the U.S. government
drastically loosened its export rules for cryptographic software. All
was well—or so it seemed…</t>

</section>
<section anchor="the-hidden-battle"><name>The Hidden Battle</name>

<t>Strong cryptography was here to stay, and it was no longer an American
monopoly, if indeed it ever was. The Information Assurance Directorate
of the NSA, the part of the agency that is supposed to protect
U.S. data, was pleased by the spread of strong cryptography. When the
Advanced Encryption Standard (AES) competition was held, there were no
allegations of malign NSA interference; in fact, the winning entry was
devised by two Europeans, Joan Daemen and Vincent Rijmen. But the NSA
and its SIGINT needs did not go away—the agency merely adopted other
techniques.</t>

<t>I have often noted that one doesn’t go through strong security, one
goes around it. When strong encryption became more common and much
more necessary, the NSA started going around it, by targeting
computers and the software that they run. And it seems clear that they
believe that AES is quite strong; they’ve even endorsed its use for
protecting TOP SECRET information. But there was an asterisk attached
to that endorsement: AES is suitable if and only if properly used and
implemented. Therein lies the rub.</t>

<t>The first known attempt to tamper with outside cryptographic
mechanisms was discovered in 2007, when two Microsoft researchers, Dan
Shumow and Niels Ferguson, noted an odd property of a
NIST-standardized random number generator, DUAL_EC_DRBG. (The NBS
renamed itself to NIST, the National Institute of Standards and
Technology.) Random numbers, unpredictable numbers are vital for
cryptography, but Shumow and Ferguson showed that if certain constants
in DUAL_EC_DRBG were chosen in a particular way with a
known-but-hidden other number, whoever knew that number could predict
all future random numbers from a system given a few sample bytes to
start from <xref target="Kostyuk2022"/>. These sample bytes could come from
known keys, nonces, or anything else. Where did the constants in
DUAL_EC_DRBG come from and how were they chosen or generated? No one
who knows is talking. But although cryptographers and security
specialists were very suspicious—Bruce Schneier wrote in 2007, before
more facts came out, that “both NIST and the NSA have some explaining
to do”; I assigned my students reading on the topic—the issue didn’t
really get any traction until six years later, when among the papers
that Edward Snowden disclosed was the information that the NSA had
indeed tampered with a major cryptographic standard.</t>

<t>The revelations didn’t stop there. There have been allegations that
the NSA paid some companies to use DUAL_EC_DRBG in their
products. Some people have claimed that there were attempts to modify
some IETF standards to make enough random bytes visible, to aid in
exploiting the random number generator. A major vendor of networking
gear, Juniper, did use DUAL_EC_DRBG in some of its products, but with
different constants<xref target="Checkoway2016"/>. Where did these come from? Were
they from the NSA or some other government? Could their source tree
have been hacked by an intelligence agency? There was a different hack
of their code at around the same time<xref target="Moore2015"/>. No one is talking.</t>

<t>The Snowden revelations also included data suggesting that the NSA had
a worldwide eavesdropping network and a group that tried very
specific, targeted hacks on very specific targets’ systems. In
retrospect, neither is surprising: “spies gonna spy”. The NSA’s
business is signals intelligence; of course they’re going to try to
intercept traffic. Indeed, the DUAL_EC_DRBG tampering is useless to
anyone who has not collected messages to decrypt. And targeted hacks
are a natural way around strong encryption: collect the data before it
is encrypted or after it is decrypted, and don’t worry about the
strength of the algorithms.</t>

<t>The privacy community, worldwide, was appalled, though perhaps they
shouldn’t have been. It calls to mind Claude Rains famous line from
Casablanca: “I’m shocked, shocked to find that gambling is going on in
here.” The immediate and continuing reaction was to deploy more
encryption. The standards have long existed; what was missing was
adoption. One barrier was the difficulty and expense of getting
certificates to use with TLS; that void was filled by Let's Encrypt<xref target="LE"/>,
which made free certificates easy to get online. Today, most HTTP
traffic is encrypted, so much so that Google’s search engine
down-ranks sites that do not use it. Major email providers uniformly
use TLS to protect all traffic. WiFi, though a local area issue, now
uses much stronger encryption.</t>

<t>The news on the software side is less good. Not a day goes by when one
does not read of organizations being hit by ransomware. It goes
without saying that any threat actor capable of encrypting disks is
also capable of stealing the information on them; indeed, that is a
frequent accompanying activity, since the threat of disclosure is
another incentive to pay for those sites that do have good enough
backups. Major vendors have put a lot of effort into securing their
software, but bugs and operational errors by end-user sites persist.</t>

</section>
<section anchor="whither-the-ietf"><name>Whither the IETF?</name>
<t>Signal intelligence agencies, not just the NSA, but its peers around
the globe- most major countries have their own—are not going to go
away. The challenges that have beset the NSA are common to all such
agencies, and their solutions are likely the same. The question is
what should be done to protect individual privacy. A number of strong
democracies, such as Australia and the United Kingdom, are already
moving to restrict encryption. Spurred on by complaints from the FBI
and other law enforcement agencies, the US Congress frequently
considers bills to do the same.</t>

<t>The IETF has long had a commitment to strong, ubiquitous
encryption. This is a good thing. It needs to continue, with
cryptography and other security features designed into protocols from
the beginning. But there is also a need for maintenance. Parameters
such as key lengths and modulus sizes age; a value that is acceptable
today may not be 10 years hence. (We’ve already seen apparent problems
from 1024-bit moduli specified in an RFC, an RFC that was not modified
when technology improved enough that attacking encryption based on
them had become feasible.<xref target="Adrian2015"/>) The IETF can do nothing about
the code that vendors ship or that sites use, but it can alert the
world that it thinks things have changed.</t>

<t>Cryptoagility is of increasing importance. In the next very few years,
we will have so-called post-quantum algorithms. Both protocols and key
lengths will need to change, perhaps drastically. Is the IETF ready?
What will happen to, say, DNSSEC if key lengths become drastically
longer? Backwards compatibility will remain important, but that, of
course, opens the door to other attacks. We’ve long thought about
them; we need to be sure that our mechanisms work.</t>

<t>We also need to worry more about metadata. General Michael Hayden,
former director of both the NSA and the CIA, once remarked, “We kill
people based on metadata” <xref target="Ferran2014"/>. But caution is necessary;
attempts to hide metadata can have side-effects. To give a trivial
example, Tor is quite strong, but if your exit node is in a different
country than you are in, web sites that use IP geolocation may present
their content in a language foreign to you. More generally, many
attempts to hide metadata involving trusting a different party; that
party may turn out to be untrustworthy or it may itself become a
target of attack. As another prominent IETFer has remarked,
“Insecurity is like entropy; you can’t destroy it but you can move it
around.”</t>

<t>Finally, the IETF must remember that its middle name is
“Engineering”. To me, one of the attributes of engineering is the art
of picking the right solution in an over-constrained
environment. Intelligence agencies won’t go away, nor will national
restrictions on cryptography. We have to pick the right path while
staying true to our principles.</t>

</section>
</section>
<section anchor="acknowledgments"><name>Acknowledgments</name>
<t>Susan Landau added many valuable comments to Steve Bellovin's essay.</t>

<t>This document was created at the behest of Eliot Lear, who also 
cat herded and did some editing.</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>Each or any of the authors may have forgotten or omitted things
or gotten things wrong. We're sorry if that's the case, but that's
in the nature of a look-back such as this. Such flaws almost 
certainly won't worsen security or privacy though.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>No changes to IANA processes are made by this memo.</t>

</section>


  </middle>

  <back>



    <references title='Informative References'>

<reference anchor="guard2013" >
  <front>
    <title>NSA collecting phone records of millions of Verizon customers daily</title>
    <author initials="G." surname="Greenwald" fullname="Glenn Greenwald">
      <organization>The Guardian</organization>
    </author>
    <date year="2013" month="June"/>
  </front>
</reference>
<reference anchor="ACME" target="https://datatracker.ietf.org/wg/acme/">
  <front>
    <title>Automated Certificate Management Environment (ACME)</title>
    <author >
      <organization>IETF</organization>
    </author>
    <date year="2023"/>
  </front>
</reference>
<reference anchor="BoF-session" target="https://www.ietf.org/proceedings/88/perpass.html">
  <front>
    <title>IETF 88 BoF session</title>
    <author >
      <organization>IETF</organization>
    </author>
    <date year="2013"/>
  </front>
</reference>
<reference anchor="CFRG" target="https://datatracker.ietf.org/rg/cfrg/">
  <front>
    <title>IRTF Crypto Forum (CFRG)</title>
    <author >
      <organization>IETF</organization>
    </author>
    <date year="2023"/>
  </front>
</reference>
<reference anchor="CURDLE" target="https://datatracker.ietf.org/wg/curdle/">
  <front>
    <title>curdle WG</title>
    <author >
      <organization>IETF</organization>
    </author>
    <date year="2023"/>
  </front>
</reference>
<reference anchor="dual-ec" target="https://eprint.iacr.org/2015/767.pdf">
  <front>
    <title>Dual EC, A standardized back door</title>
    <author initials="D." surname="Bernstein" fullname="Daniel Bernstein">
      <organization></organization>
    </author>
    <author initials="T." surname="Lange" fullname="Tanja Lange">
      <organization></organization>
    </author>
    <author initials="R." surname="Niederhagen" fullname="Ruben Niederhagen">
      <organization></organization>
    </author>
    <date year="2016"/>
  </front>
</reference>
<reference anchor="LE" target="https://dl.acm.org/doi/pdf/10.1145/3319535.3363192">
  <front>
    <title>Let's Encrypt - an automated certificate authority to encrypt the entire web</title>
    <author initials="J." surname="Aas" fullname="Josh Aas">
      <organization></organization>
    </author>
    <author initials="R." surname="Barnes" fullname="Richard Barnes">
      <organization></organization>
    </author>
    <author initials="B." surname="Case" fullname="Benton Case">
      <organization></organization>
    </author>
    <author initials="Z." surname="Durumeric" fullname="Zakir Durumeric">
      <organization></organization>
    </author>
    <author initials="P." surname="Eckersley" fullname="Peter Eckersley">
      <organization></organization>
    </author>
    <author initials="A." surname="Flores-L{\'o}pez" fullname="Alan Flores-L{\'o}pez">
      <organization></organization>
    </author>
    <author initials="A." surname="Halderman" fullname="Alex Halderman">
      <organization></organization>
    </author>
    <author initials="J." surname="Hoffman-Andrews" fullname="Jacob Hoffman-Andrews">
      <organization></organization>
    </author>
    <author initials="J." surname="Kasten" fullname="James Kasten">
      <organization></organization>
    </author>
    <author initials="E." surname="Rescorla" fullname="Eric Rescorla">
      <organization></organization>
    </author>
    <author initials="S." surname="Shoen" fullname="Seth Shoen">
      <organization></organization>
    </author>
    <author initials="B." surname="Warren" fullname="Brad Warren">
      <organization></organization>
    </author>
    <date year="2019"/>
  </front>
</reference>
<reference anchor="MADINAS" target="https://datatracker.ietf.org/wg/madinas/)">
  <front>
    <title>MADINAS WG</title>
    <author >
      <organization>IETF</organization>
    </author>
    <date year="2023"/>
  </front>
</reference>
<reference anchor="perpass" target="https://mailarchive.ietf.org/arch/browse/perpass/">
  <front>
    <title>perpass mailing list</title>
    <author >
      <organization>IETF</organization>
    </author>
    <date year="2023"/>
  </front>
</reference>
<reference anchor="plenary-video" target="https://www.youtube.com/watch?v=oV71hhEpQ20&amp;pp=ygUQaWV0ZiA4OCBwbGVuYXJ5IA%3D%3D">
  <front>
    <title>IETF 88 Pleary video</title>
    <author >
      <organization>IETF</organization>
    </author>
    <date year="2013"/>
  </front>
</reference>
<reference anchor="refs-to-7258" target="https://datatracker.ietf.org/doc/rfc7258/referencedby/)">
  <front>
    <title>References to RFC7258</title>
    <author >
      <organization>IETF</organization>
    </author>
    <date year="2023"/>
  </front>
</reference>
<reference anchor="timeline" target="https://en.wikipedia.org/wiki/Global_surveillance_disclosures_(2013%E2%80%93present)">
  <front>
    <title>Global surveillance disclosures (2013–present)</title>
    <author >
      <organization>Wikimedia foundation</organization>
    </author>
    <date year="2023"/>
  </front>
</reference>
<reference anchor="STRINT" target="https://www.w3.org/2014/strint/">
  <front>
    <title>A W3C/IAB workshop on Strengthening the Internet Against Pervasive Monitoring (STRINT)</title>
    <author >
      <organization>IETF</organization>
    </author>
    <date year="2014"/>
  </front>
</reference>
<reference anchor="Toronto" target="https://www.npr.org/sections/thetwo-way/2014/01/31/269418375/airport-wi-fi-used-to-track-travelers-snowden-leak-alleges">
  <front>
    <title>Canada Used Airport Wi-Fi To Track Travelers, Snowden Leak Alleges</title>
    <author >
      <organization>National Public Radio</organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="UTA" target="https://datatracker.ietf.org/wg/uta/">
  <front>
    <title>Using TLS in Applications working group (UTA) working group</title>
    <author >
      <organization>IETF</organization>
    </author>
    <date year="2023"/>
  </front>
</reference>
<reference anchor="Kahn1996" >
  <front>
    <title>The Code Breakers, 2nd Edition</title>
    <author initials="D." surname="Kahn" fullname="David Kahn">
      <organization></organization>
    </author>
    <date year="1996"/>
  </front>
  <seriesInfo name="Scribner" value=""/>
</reference>
<reference anchor="Borda2011" >
  <front>
    <title>Fundamentals in Information Theory and Coding. Berlin</title>
    <author initials="M." surname="Borda" fullname="Monica Borda">
      <organization></organization>
    </author>
    <date year="2011"/>
  </front>
  <seriesInfo name="Springer" value=""/>
</reference>
<reference anchor="Kerr2020" >
  <front>
    <title>Decryption Originalism: The Lessons of Burr.</title>
    <author initials="O. S." surname="Kerr" fullname="Orin Kerr">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
  <seriesInfo name="Harvard Law Review" value="134:905"/>
</reference>
<reference anchor="Smith1845" target="http://books.google.com/books?id=Z45clCxsF7EC">
  <front>
    <title>The Secret Corresponding Vocabulary, Adapted for Use to Morse’s Electro-Magnetic Telegraph: And Also in Conducting Written Correspondence, Transmitted by the Mails, or Otherwise</title>
    <author initials="F. O." surname="Smith" fullname="Francis O. Smith">
      <organization></organization>
    </author>
    <date year="1845"/>
  </front>
  <seriesInfo name="Thurston, Isley &amp; Co" value=""/>
</reference>
<reference anchor="Slater1870" target="http://books.google.com/books?id=MJYBAAAAQAAJ">
  <front>
    <title>Telegraphic Code, to Ensure Secresy in the Transmission of Telegrams, First Edition.</title>
    <author initials="R." surname="Slater" fullname="Robert Slater">
      <organization></organization>
    </author>
    <date year="1870"/>
  </front>
  <seriesInfo name="W.R. Gray" value=""/>
</reference>
<reference anchor="Headrick1991" >
  <front>
    <title>The Invisible Weapon: Telecommunications and International Politics, 1851–1945</title>
    <author initials="D. R." surname="Headrick" fullname="Daniel R. Headrick">
      <organization></organization>
    </author>
    <date year="1991"/>
  </front>
  <seriesInfo name="Oxford University Press" value=""/>
</reference>
<reference anchor="Kennedy1971" target="http://www.jstor.org/stable/563928">
  <front>
    <title>Imperial Cable Communications and Strategy, 1870-1914</title>
    <author initials="P. M." surname="Kennedy" fullname="Paul M. Kennedy">
      <organization></organization>
    </author>
    <date year="1971"/>
  </front>
  <seriesInfo name="English Historical Review" value="86 (341): 728–52"/>
</reference>
<reference anchor="Rowlett1998" >
  <front>
    <title>The Story of MAGIC: Memoirs of an American Cryptologic Pioneer</title>
    <author initials="F. B." surname="Rowlett" fullname="Frank B. Rowlett">
      <organization></organization>
    </author>
    <date year="1988"/>
  </front>
  <seriesInfo name="Aegean Park Press" value=""/>
</reference>
<reference anchor="Miller2020" target="https://www.washingtonpost.com/graphics/2020/world/national-security/cia-crypto-encryption-machines-espionage/">
  <front>
    <title>The Intelligence Coup of the Century</title>
    <author initials="G." surname="Miller" fullname="Greg Miller">
      <organization></organization>
    </author>
    <date year="2020" month="February"/>
  </front>
  <seriesInfo name="The Washington Post" value=""/>
</reference>
<reference anchor="Baldwin2022" target="https://drenigma.org/2022/03/02/did-britain-sell-enigmas-postwar/">
  <front>
    <title>Did Britain Sell Enigmas Postwar?</title>
    <author initials="M." surname="Baldwin" fullname="Mark Baldwin">
      <organization></organization>
    </author>
    <date year="2022"/>
  </front>
  <seriesInfo name="Dr. Enigma (blog)" value=""/>
</reference>
<reference anchor="Broad1982" >
  <front>
    <title>Evading the Soviet Ear at Glen Cove</title>
    <author initials="W. J." surname="Broad" fullname="William J. Broad">
      <organization></organization>
    </author>
    <date year="1982"/>
  </front>
  <seriesInfo name="Science" value="217 (3): 910–11"/>
</reference>
<reference anchor="Landau1988" >
  <front>
    <title>Zero Knowledge and the Department of Defense</title>
    <author initials="S." surname="Landau" fullname="Susan Landau">
      <organization></organization>
    </author>
    <date year="1988"/>
  </front>
  <seriesInfo name="Notices of the American Mathematical Society [Special Article Series]" value="35 (1): 5–12"/>
</reference>
<reference anchor="Landau2014" >
  <front>
    <title>Under the Radar: NSA’s Efforts to Secure Private-Sector Telecommunications Infrastructure</title>
    <author initials="S." surname="Landau" fullname="Susan Landau">
      <organization></organization>
    </author>
    <date year="2014"/>
  </front>
  <seriesInfo name="Journal of National Security Law &amp; Policy" value="Vol 7, No. 3"/>
</reference>
<reference anchor="Johnson1998" target="https://www.nsa.gov/portals/75/documents/news-features/declassified-documents/cryptologic-histories/cold_war_iii.pdf">
  <front>
    <title>American Cryptology During the Cold War, 1945-1989; Book III: Retrenchment and Reform</title>
    <author initials="T. R." surname="Johnson" fullname="Thomas R. Johnson">
      <organization></organization>
    </author>
    <date year="1998"/>
  </front>
  <seriesInfo name="NSA" value=""/>
</reference>
<reference anchor="Kostyuk2022" target="https://www.harvardnsj.org/wp-content/uploads/sites/13/2022/06/Vol13Iss2_Kostyuk-Landau_Dual-EC-DRGB.pdf">
  <front>
    <title>Dueling Over DUAL_EC_DRBG: The Consequences of Corrupting a Cryptographic Standardization Process</title>
    <author initials="N." surname="Kostyuk" fullname="Nadyia Kostyuk">
      <organization></organization>
    </author>
    <author initials="S." surname="Landau" fullname="Susan Landau">
      <organization></organization>
    </author>
    <date year="2022"/>
  </front>
  <seriesInfo name="Harvard National Security Journal" value="13 (2): 224–84"/>
</reference>
<reference anchor="Ferran2014" target="https://abcnews.go.com/blogs/headlines/2014/05/ex-nsa-chief-we-kill-people-based-on-metadata">
  <front>
    <title>Ex-NSA Chief: "We Kill People Based on Metadata"</title>
    <author initials="L." surname="Ferran" fullname="Lee Ferran">
      <organization></organization>
    </author>
    <date year="2014" month="May"/>
  </front>
  <seriesInfo name="ABC News" value=""/>
</reference>
<reference anchor="Adrian2015" target="https://weakdh.org/imperfect-forward-secrecy.pdf">
  <front>
    <title>Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice.</title>
    <author initials="D." surname="Adrian" fullname="David Adrian">
      <organization></organization>
    </author>
    <author initials="K." surname="Bhargavan" fullname="Karthikeyan Bhargavan">
      <organization></organization>
    </author>
    <author initials="Z." surname="Durumeric" fullname="Zakir Durumeric">
      <organization></organization>
    </author>
    <author initials="P." surname="Gaudry" fullname="Pierrick Gaudry">
      <organization></organization>
    </author>
    <author initials="M." surname="Green" fullname="Matthew Green">
      <organization></organization>
    </author>
    <author initials="J. A." surname="Halderman" fullname="J. Alex Halderman">
      <organization></organization>
    </author>
    <author initials="N." surname="Heninger" fullname="Nadia Heninger">
      <organization></organization>
    </author>
    <date year="2015"/>
  </front>
  <seriesInfo name="Proceedings of the 22th ACM Conference on Computer and Communications Security (CCS)" value=""/>
</reference>
<reference anchor="Blaze1994" target="http://www.mattblaze.org/papers/eesproto.pdf">
  <front>
    <title>Did Britain Sell Enigmas Postwar?</title>
    <author initials="M." surname="Blaze" fullname="Matt Blaze">
      <organization></organization>
    </author>
    <date year="1994"/>
  </front>
  <seriesInfo name="Dr. Enigma (blog)" value=""/>
</reference>
<reference anchor="Checkoway2016" target="https://dl.acm.org/citation.cfm?id=2978395">
  <front>
    <title>A Systematic Analysis of the Juniper Dual EC Incident</title>
    <author initials="S." surname="Checkoway" fullname="Stephen Checkoway">
      <organization></organization>
    </author>
    <author initials="J." surname="Maskiewicz" fullname="Jacob Maskiewicz">
      <organization></organization>
    </author>
    <author initials="C." surname="Garman" fullname="Christina Garman">
      <organization></organization>
    </author>
    <author initials="J." surname="Fried" fullname="Joshua Fried">
      <organization></organization>
    </author>
    <author initials="S." surname="Cohney" fullname="Shaanan Cohney">
      <organization></organization>
    </author>
    <author initials="M." surname="Green" fullname="Matthew Green">
      <organization></organization>
    </author>
    <author initials="N." surname="Heninger" fullname="Nadia Heninger">
      <organization></organization>
    </author>
    <author initials="R. P." surname="Weinmann" fullname="Ralf-Philipp Weinmann">
      <organization></organization>
    </author>
    <author initials="E." surname="Rescorla" fullname="Eric Rescorla">
      <organization></organization>
    </author>
    <author initials="" surname="Hovav Shacham" fullname="Hovav Shacham">
      <organization></organization>
    </author>
    <date year="2016"/>
  </front>
  <seriesInfo name="Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security" value="468–79"/>
</reference>
<reference anchor="Levy2001" >
  <front>
    <title>Crypto: How the Code Rebels Beat the Government—Saving Privacy in the Digital Age</title>
    <author initials="S." surname="Levy" fullname="Steven Levy">
      <organization></organization>
    </author>
    <date year="2001"/>
  </front>
  <seriesInfo name="Viking" value=""/>
</reference>
<reference anchor="Moore2015" target="https://www.rapid7.com/blog/post/2015/12/20/cve-2015-7755-juniper-screenos-authentication-backdoor/">
  <front>
    <title>CVE-2015-7755: Juniper ScreenOS Authentication Backdoor</title>
    <author initials="H. D." surname="Moore" fullname="H.D. Moore">
      <organization></organization>
    </author>
    <date year="2015"/>
  </front>
  <seriesInfo name="Rapid7 Blog" value=""/>
</reference>
<reference anchor="Doria2012" target="https://www.internetsociety.org/resources/doc/2012/human-rights-and-internet-protocols-comparing-processes-and-principles/">
  <front>
    <title>Human Rights and Internet Protocols: Comparing Processes and Principles</title>
    <author initials="A." surname="Doria" fullname="Avri Doria">
      <organization></organization>
    </author>
    <author initials="J." surname="Liddicoat" fullname="Joy Liddicoat">
      <organization></organization>
    </author>
    <date year="2012"/>
  </front>
  <seriesInfo name="The Internet Society" value=""/>
</reference>
<reference anchor="Garfinkel1995" >
  <front>
    <title>GPG: Pretty Good Privacy</title>
    <author initials="S." surname="Garfinkel" fullname="Simson Garfinkel">
      <organization></organization>
    </author>
    <date year="1995"/>
  </front>
  <seriesInfo name="O'Reilly and Associates" value=""/>
</reference>
<reference anchor="Masnick2023" target="https://copia.is/library/unintended-consequences/">
  <front>
    <title>The Unintended Consequences of Internet Regulation</title>
    <author initials="M." surname="Masnick" fullname="Mike Masnick">
      <organization></organization>
    </author>
    <date year="2023"/>
  </front>
</reference>
<reference anchor="Roth2022" target="https://www.theverge.com/2022/3/5/22962822/internet-backbone-provider-cogent-shuts-off-service-russia">
  <front>
    <title>Internet backbone provider shuts off service in Russia</title>
    <author initials="E." surname="Roth" fullname="Emma Roth">
      <organization></organization>
    </author>
    <date year="2022" month="March"/>
  </front>
  <seriesInfo name="The Verge" value=""/>
</reference>
&RFC7687;
&RFC7258;
&RFC8446;
&I-D.ietf-tls-esni;
&RFC7858;
&RFC8484;
&RFC7540;
&RFC9000;
&I-D.farrelll-mpls-opportunistic-encrypt;
&RFC8461;
&RFC1984;
&RFC6462;
&RFC7480;
&RFC7481;
&RFC9082;
&RFC9083;
&RFC7484;
&RFC8056;
&RFC8280;
&DOI.10.5325_jinfopoli.11.2021.0376;
&RFC3365;


    </references>


<section anchor="changes-from-earlier-versions"><name>Changes from Earlier Versions</name>

<t>Draft -00:</t>

<t><list style="symbols">
  <t>Initial revision</t>
</list></t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

