[tahoe-dev] [tahoe-lafs] #1216: document our commitment never to add government backdoors
tahoe-lafs
trac at tahoe-lafs.org
Thu Sep 30 23:52:50 UTC 2010
#1216: document our commitment never to add government backdoors
-----------------------------------------------------+----------------------
Reporter: davidsarah | Owner: somebody
Type: defect | Status: new
Priority: major | Milestone: soon (release n/a)
Component: documentation | Version: 1.8.0
Keywords: security confidentiality integrity docs | Launchpad Bug:
-----------------------------------------------------+----------------------
The New York Times has recently reported that the current U.S.
administration is proposing a bill that would apparently, if passed,
require communication systems to facilitate government wiretapping and
access to encrypted data:
http://www.nytimes.com/2010/09/27/us/27wiretap.html (login required;
username/password pairs available at
http://www.bugmenot.com/view/nytimes.com).
Commentary by the [https://www.eff.org/deeplinks/2010/09/government-seeks
Electronic Frontier Foundation], [http://reason.com/blog/2010/09/27/obama-
administration-frustrate Peter Suderman / Reason], [http://www.cato-at-
liberty.org/designing-an-insecure-internet/ Julian Sanchez / Cato
Institute].
The core Tahoe developers promise never to change Tahoe-LAFS to facilitate
government access to data stored or transmitted by it. Even if it were
desirable to facilitate such access -- which it is not -- we believe it
would not be technically feasible to do so without severely compromising
Tahoe-LAFS' security against other attackers. There have been many
examples in which backdoors intended for use by goverment have introduced
vulnerabilities exploitable by other parties (a notable example being the
Greek cellphone eavesdropping scandal in 2004/5). RFCs
[http://tools.ietf.org/html/rfc1984 1984] and
[http://tools.ietf.org/html/rfc2804 2804] elaborate on the security case
against such backdoors.
Note that since Tahoe-LAFS is open-source software, forks by people other
than the current core developers are possible. In that event, we would try
to persuade any such forks to adopt a similar policy.
--
Ticket URL: <http://tahoe-lafs.org/trac/tahoe-lafs/ticket/1216>
tahoe-lafs <http://tahoe-lafs.org>
secure decentralized storage
More information about the tahoe-dev
mailing list