<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version  (Ruby 3.1.2) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

<!ENTITY RFC7687 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7687.xml">
<!ENTITY RFC7258 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7258.xml">
<!ENTITY RFC8446 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8446.xml">
<!ENTITY I-D.ietf-tls-esni SYSTEM "https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-tls-esni.xml">
<!ENTITY RFC7858 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7858.xml">
<!ENTITY RFC8484 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8484.xml">
<!ENTITY RFC7540 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7540.xml">
<!ENTITY RFC9000 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9000.xml">
<!ENTITY I-D.farrelll-mpls-opportunistic-encrypt SYSTEM "https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.farrelll-mpls-opportunistic-encrypt.xml">
<!ENTITY RFC8461 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8461.xml">
<!ENTITY RFC7217 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7217.xml">
<!ENTITY RFC8064 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8064.xml">
<!ENTITY RFC8981 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8981.xml">
<!ENTITY RFC1984 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.1984.xml">
<!ENTITY RFC6462 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6462.xml">
<!ENTITY RFC7480 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7480.xml">
<!ENTITY RFC7481 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7481.xml">
<!ENTITY RFC9082 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9082.xml">
<!ENTITY RFC9083 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9083.xml">
<!ENTITY RFC7484 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7484.xml">
<!ENTITY RFC8056 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8056.xml">
<!ENTITY RFC8280 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8280.xml">
<!ENTITY DOI.10.5325_jinfopoli.11.2021.0376 SYSTEM "https://bib.ietf.org/public/rfc/bibxml7/reference.DOI.10.5325/jinfopoli.11.2021.0376.xml?anchor=Badii2021">
<!ENTITY RFC3365 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3365.xml">
]>


<rfc ipr="trust200902" docName="draft-farrell-tenyearsafter-01" category="info" submissionType="independent" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="Ten Years After">Reflections on Ten Years Past The Snowden Revelations</title>

    <author initials="S." surname="Farrell" fullname="Stephen Farrell">
      <organization>Trinity College, Dublin</organization>
      <address>
        <postal>
          <country>Ireland</country>
        </postal>
        <email>stephen.farrell@cs.tcd.ie</email>
      </address>
    </author>
    <author initials="F." surname="Badii" fullname="Farzaneh Badii">
      <organization>Digital Medusa</organization>
      <address>
        <email>farzaneh.badii@gmail.com</email>
      </address>
    </author>
    <author initials="B." surname="Schneier" fullname="Bruce Schneier">
      <organization>Harvard University</organization>
      <address>
        <postal>
          <country>USA</country>
        </postal>
        <email>schneier@schneier.com</email>
      </address>
    </author>
    <author initials="S. M." surname="Bellovin" fullname="Steven M. Bellovin">
      <organization>Columbia University</organization>
      <address>
        <postal>
          <country>USA</country>
        </postal>
        <email>smb@cs.columbia.edu</email>
      </address>
    </author>

    <date year="2023" month="June" day="12"/>

    
    
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>This memo contains the thoughts and recountings of events that
transpired during and after the release of information about the NSA
by Edward Snowden in 2013.  There are four perspectives: that of someone
who was involved with sifting through the information to responsibly
inform the public, that of a security area director of the IETF, that of a human
rights expert, and that of a computer science and law professor.  The purpose
of this memo is to provide some historical perspective, while at the
same time offering a view as to what security and privacy challenges
the technical community should consider.</t>



    </abstract>



  </front>

  <middle>


<section anchor="introduction"><name>Introduction</name>

<t>On June 6th, 2013, an article appeared in <em>The Guardian</em> <xref target="guard2013"/>
that was the beginning of a series of what have come to be known as
the Snowden Revelations, describing certain activities of the United
States National Security Agency (NSA).  These activities included,
amongst others, secret court orders, secret agreements for the receipt
of so-called "meta-information" that includes source, destination, and
timing of communications, tapping of communications lines, and other
activities.  The breathtaking scope of the operations shocked the
Internet technical community, and led to a sea change within the IETF,
IAB, and many parts of the private sector.</t>

<t>Now that some years have past, it seems appropriate to reflect on that
period of time, what effect the community's actions had, where
security has improved, how the threat surface has evolved, what areas
haven't improved, and where the community might invest future efforts.</t>

<t>Bruce Schneier begins this compendium of individual essays by bringing
us back to 2013, recalling how it was for him and others to report
what was happening, and the mindset of those involved.  Next, Stephen
Farrell reviews the technical community's reactions, technical
advances, and where threats remain.  Then Farzaneh Badii discusses the
impact of those advances – or lack thereof – on human rights.  Finally
Steven M. Bellovin puts the Snowden revelations into an ever-evolving
historical context of secrets and secret stealing that spans
centuries, closing with some suggestions for IETF.</t>

<t>Readers are invited to reflect for themselves on what impact we as a
community have had – or not had, and what positive contribution the
technical community can and should make to address security and
privacy of citizens of the world.</t>

<t>-- Eliot Lear, Independent Submissions Editor for the RFC Series</t>

</section>
<section anchor="bruce-schneier-snowden-ten-years-later"><name>Bruce Schneier: Snowden Ten Years Later</name>

<t>In 2013 and 2014, I wrote extensively about new revelations regarding
NSA surveillance based on the documents provided by Edward
Snowden. But I had a more personal involvement as well.</t>

<t>I wrote the essay below in September 2013. The <em>New Yorker</em> agreed to
publish it, but the <em>Guardian</em> asked me not to. It was
scared of UK law enforcement, and worried that this essay would
reflect badly on it. And given that the UK police would raid its
offices in July 2014, it had legitimate cause to be worried.</t>

<t>Now, ten years later, I offer this as a time capsule of what those
early months of Snowden were like.</t>

<t>**********</t>

<t>It’s a surreal experience, paging through hundreds of top-secret NSA
documents. You’re peering into a forbidden world: strange, confusing,
and fascinating all at the same time.</t>

<t>I had flown down to Rio de Janeiro in late August at the request of
Glenn Greenwald. He had been working on the Edward Snowden archive for
a couple of months, and had a pile of more technical documents that he
wanted help interpreting. According to Greenwald, Snowden also thought
that bringing me down was a good idea.</t>

<t>It made sense. I didn't know either of them, but I have been writing
about cryptography, security, and privacy for decades. I could
decipher some of the technical language that Greenwald had difficulty
with, and understand the context and importance of various
document. And I have long been publicly critical of the NSA’s
eavesdropping capabilities. My knowledge and expertise could help
figure out which stories needed to be reported.</t>

<t>I thought about it a lot before agreeing. This was before David
Miranda, Greenwald’s partner, was detained at Heathrow airport by the
UK authorities; but even without that, I knew there was a risk. I fly
a lot—a quarter of a million miles per year—and being put on a TSA
list, or being detained at the US border and having my electronics
confiscated, would be a major problem. So would the FBI breaking into my
home and seizing my personal electronics. But in the end, that made me
more determined to do it.</t>

<t>I did spend some time on the phone with the attorneys recommended to
me by the ACLU and the EFF. And I talked about it with my partner,
especially when Miranda was detained three days before my departure.
Both Greenwald and his employer, the <em>Guardian</em>, are careful about whom
they show the documents to. They publish only those portions essential
to getting the story out. It was important to them that I be a
co-author, not a source. I didn’t follow the legal reasoning, but the
point is that the <em>Guardian</em> doesn’t want to leak the documents to
random people. It will, however, write stories in the public interest,
and I would be allowed to review the documents as part of that
process. So after a Skype conversation with someone at the <em>Guardian</em>, I
signed a letter of engagement.</t>

<t>And then I flew to Brazil.</t>

<t>I saw only a tiny slice of the documents, and most of what I saw was
surprisingly banal. The concerns of the top-secret world are largely
tactical: system upgrades, operational problems owing to weather,
delays because of work backlogs, and so on. I paged through weekly
reports, presentation slides from status meetings, and general
briefings to educate visitors. Management is management, even inside
the NSA Reading the documents, I felt as though I were sitting through
some of those endless meetings.</t>

<t>The meeting presenters try to spice things up. Presentations regularly
include intelligence success stories. There were details—what had been
found, and how, and where it helped—and sometimes there were attaboys
from “customers” who used the intelligence. I’m sure these are
intended to remind NSA employees that they’re doing good. It
definitely had an effect on me. Those were all things I want the NSA
to be doing.</t>

<t>There were so many code names. Everything has one: every program,
every piece of equipment, every piece of software. Sometimes code
names had their own code names. The biggest secrets seem to be the
underlying real-world information: which particular company
MONEYROCKET is; what software vulnerability EGOTISTICALGIRAFFE—really,
I am not making that one up—is; how TURBINE works. Those secrets
collectively have a code name—ECI, for exceptionally compartmented
information—and almost never appear in the documents. Chatting with
Snowden on an encrypted IM connection, I joked that the NSA cafeteria
menu probably has code names for menu items. His response: “Trust me
when I say you have no idea.”</t>

<t>Those code names all come with logos, most of them amateurish and a
lot of them dumb. Note to the NSA: take some of that more than
ten-billion-dollar annual budget and hire yourself a design
firm. Really; it’ll pay off in morale.</t>

<t>Once in a while, though, I would see something that made me stop,
stand up, and pace around in circles. It wasn’t that what I read was
particularly exciting, or important. It was just that it was
startling. It changed—ever so slightly—how I thought about the world.</t>

<t>Greenwald said that that reaction was normal when people started
reading through the documents.</t>

<t>Intelligence professionals talk about how disorienting it is living on
the inside. You read so much classified information about the world’s
geopolitical events that you start seeing the world differently. You
become convinced that only the insiders know what’s really going on,
because the news media is so often wrong. Your family is
ignorant. Your friends are ignorant. The world is ignorant. The only
thing keeping you from ignorance is that constant stream of classified
knowledge. It’s hard not to feel superior, not to say things like “If
you only knew what we know” all the time. I can understand how General
Keith Alexander, the director of the NSA, comes across as so
supercilious; I only saw a minute fraction of that secret world, and I
started feeling it.</t>

<t>It turned out to be a terrible week to visit Greenwald, as he was
still dealing with the fallout from Miranda’s detention. Two other
journalists, one from the Nation and the other from the <em>Hindu</em>, were
also in town working with him. A lot of my week involved Greenwald
rushing into my hotel room, giving me a thumb drive of new stuff to
look through, and rushing out again.</t>

<t>A technician from the <em>Guardian</em> got a search capability working while I
was there, and I spent some time with it. Question: when you’re given
the capability to search through a database of NSA secrets, what’s the
first thing you look for? Answer: your name.</t>

<t>It wasn’t there. Neither were any of the algorithm names I knew, not
even algorithms I knew that the US government used.</t>

<t>I tried to talk to Greenwald about his own operational security. It
had been incredibly stupid for Miranda to be traveling with NSA
documents on the thumb drive. Transferring files electronically is
what encryption is for. I told Greenwald that he and Laura Poitras
should be sending large encrypted files of dummy documents back and
forth every day.</t>

<t>Once, at Greenwald’s home, I walked into the backyard and looked for
TEMPEST receivers hiding in the trees. I didn’t find any, but that
doesn’t mean they weren’t there. Greenwald has a lot of dogs, but I
don’t think that would hinder professionals. I’m sure that a bunch of
major governments have a complete copy of everything Greenwald
has. Maybe the black bag teams bumped into each other in those early
weeks.</t>

<t>I started doubting my own security procedures. Reading about the NSA’s
hacking abilities will do that to you. Can it break the encryption on
my hard drive? Probably not. Has the company that makes my encryption
software deliberately weakened the implementation for it?
Probably. Are NSA agents listening in on my calls back to the US? Very
probably. Could agents take control of my computer over the Internet
if they wanted to? Definitely. In the end, I decided to do my best and
stop worrying about it. It was the agency’s documents, after all. And
what I was working on would become public in a few weeks.</t>

<t>I wasn't sleeping well, either. A lot of it was the sheer magnitude of
what I saw. It's not that any of it was a real surprise. Those of us
in the information security community had long assumed that the NSA
was doing things like this. But we never really sat down and figured
out the details, and to have the details confirmed made a big
difference. Maybe I can make it clearer with an analogy. Everyone
knows that death is inevitable; there's absolutely no surprise about
that. Yet it arrives as a surprise, because we spend most of our lives
refusing to think about it. The NSA documents were a bit like
that. Knowing that it is surely true that the NSA is eavesdropping on
the world, and doing it in such a methodical and robust manner, is
very different from coming face-to-face with the reality that it is
and the details of how it is doing it.</t>

<t>I also found it incredibly difficult to keep the secrets. The
<em>Guardian</em>’s process is slow and methodical. I move much faster. I
drafted stories based on what I found. Then I wrote essays about those
stories, and essays about the essays. Writing was therapy; I would
wake up in the wee hours of the morning, and write an essay. But that
put me at least three levels beyond what was published.</t>

<t>Now that my involvement is out, and my first essays are out, I feel a
lot better. I'm sure it will get worse again when I find another
monumental revelation; there are still more documents to go through.</t>

<t>I’ve heard it said that Snowden wants to damage America. I can say
with certainty that he does not. So far, everyone involved in this
incident has been incredibly careful about what is released to the
public. There are many documents that could be immensely harmful to
the US, and no one has any intention of releasing them. The documents
the reporters release are carefully redacted. Greenwald and I
repeatedly debated with <em>Guardian</em> editors the newsworthiness of story
ideas, stressing that we would not expose government secrets simply
because they’re interesting.</t>

<t>The NSA got incredibly lucky; this could have ended with a massive
public dump like Chelsea Manning’s State Department cables. I suppose
it still could. Despite that, I can imagine how this feels to the NSA.
It’s used to keeping this stuff behind multiple levels of security:
gates with alarms, armed guards, safe doors, and military-grade
cryptography. It’s not supposed to be on a bunch of thumb drives in
Brazil, Germany, the UK, the US, and who knows where else, protected
largely by some random people’s opinions about what should or should
not remain secret. This is easily the greatest intelligence failure in
the history of ever. It’s amazing that one person could have had so
much access with so little accountability, and could sneak all of this
data out without raising any alarms. The odds are close to zero that
Snowden is the first person to do this; he’s just the first person to
make public that he did. It’s a testament to General Alexander’s power
that he hasn’t been forced to resign.</t>

<t>It’s not that we weren’t being careful about security, it’s that our
standards of care are so different. From the NSA’s point of view,
we’re all major security risks, myself included. I was taking notes
about classified material, crumpling them up, and throwing them into
the wastebasket. I was printing documents marked “TOP
SECRET/COMINT/NOFORN” in a hotel lobby. And once, I took the wrong
thumb drive with me to dinner, accidentally leaving the unencrypted
one filled with top-secret documents in my hotel room. It was an
honest mistake; they were both blue.</t>

<t>If I were an NSA employee, the policy would be to fire me for that alone.</t>

<t>Many have written about how being under constant surveillance changes
a person. When you know you’re being watched, you censor yourself. You
become less open, less spontaneous. You look at what you write on your
computer and dwell on what you’ve said on the telephone, wonder how it
would sound taken out of context, from the perspective of a
hypothetical observer. You’re more likely to conform. You suppress
your individuality. Even though I have worked in privacy for decades,
and already knew a lot about the NSA and what it does, the change was
palpable. That feeling hasn’t faded. I am now more careful about what
I say and write. I am less trusting of communications technology. I am
less trusting of the computer industry.</t>

<t>After much discussion, Greenwald and I agreed to write three stories
together to start. All of those are still in progress. In addition, I
wrote two commentaries on the Snowden documents that were recently
made public. There’s a lot more to come; even Greenwald hasn’t looked
through everything.</t>

<t>Since my trip to Brazil [one month before], I’ve flown back to the US
once and domestically seven times—all without incident. I’m not on any
list yet. At least, none that I know about.</t>

<t>**********</t>

<t>As it happened, I didn’t write much more with Greenwald or the
<em>Guardian</em>. Those two had a falling out, and by the time everything
settled and both began writing about the documents
independently—Greenwald at the newly formed website the <em>Intercept</em>—I
got cut out of the process somehow. I remember hearing that Greenwald
was annoyed with me, but I never learned the reason. We haven’t spoken
since.</t>

<t>Still, I was happy with the one story I was part of: how the NSA hacks
Tor. I consider it a personal success that I pushed the <em>Guardian</em> to
publish NSA documents detailing QUANTUM. I don’t think that would have
gotten out any other way. And I still use those pages today when I
teach cybersecurity to policymakers at the Harvard Kennedy School.</t>

<t>Other people wrote about the Snowden files, and wrote a lot. It was a
slow trickle at first, and then a more consistent flow. Between
Greenwald, Bart Gellman, and the <em>Guardian</em> reporters, there ended up
being steady stream of news. (Bart brought in Ashkan Soltani to help
him with the technical aspects, which was a great move on his part,
even if it cost Ashkan a government job later.) More stories were
covered by other publications.</t>

<t>It started getting weird. Both Greenwald and Gellman held documents
back so they could publish them in their books. Jake Appelbaum, who
had not yet been accused of sexual assault by multiple women, was
working with Poitras. He partnered with Spiegel to release an
implant catalog from the NSA’s Tailored Access Operations group. To
this day, I am convinced that that document was not in the Snowden
archives: that Jake got it somehow, and it was released under the
cover of Edward Snowden. I thought it was important enough that I
started writing about each item in that document in my blog: ”NSA
Exploit of the Week.” That got my website blocked by the DoD: I keep a
framed print of the censor’s message on my wall.</t>

<t>Perhaps the most surreal document disclosures were when artists
started writing fiction based on the documents. This was in 2016, when
Laura Poitras built a secure room in New York to house the
documents. By then, the documents were years out of date.  And now
they’re over a decade out of date. (They were leaked in 2013, but most
of them were from 2012 or before.)</t>

<t>I ended up being something of a public ambassador for the
documents. When I got back from Rio, I gave talks at a private
conference in Woods Hole, the Berkman Center at Harvard, something
called the Congress and Privacy and Surveillance in Geneva, events at
both CATO and New America in DC, an event at the University of
Pennsylvania, an event at EPIC and a “Stop Watching Us” rally in DC,
the RISCS conference in London, the ISF in Paris, and...then...at the
IETF meeting in Vancouver in November 2013. (I remember little of
this; I am reconstructing it all from my calendar.)</t>

<t>What struck me at the IETF was the indignation in the room, and the
calls to action. And there was action, across many fronts. We
technologists did a lot to help secure the Internet, for example.</t>

<t>The government didn’t do its part, though. Despite the public outcry,
investigations by Congress, pronouncements by President Obama, and
federal court rulings. I don’t think much has changed. The NSA
canceled a program here and a program there, and it is now more public
about defense. But I don’t think it is any less aggressive about
either bulk or targeted surveillance. Certainly its government
authorities haven’t been restricted in any way. And surveillance
capitalism is still the business model of the Internet.</t>

<t>And Edward Snowden? We were in contact for a while on Signal. I
visited him once in Moscow, in 2016. And I had him do an guest
lecture to my class at Harvard for a few years, remotely by
Jitsi. Afterwards, I would hold a session where I promised to answer
every question he would evade or not answer, explain every response he
did give, and be candid in a way that someone with an outstanding
arrest warrant simply cannot. Sometimes I thought I could channel
Snowden better than he could.</t>

<t>But now it’s been a decade. Everything he knows is old and out of
date. Everything we know is old and out of date. The NSA suffered an
even worse leak of its secrets by the Russians, under the guise of the
Shadow Brokers, in 2016 and 2017. The NSA has rebuilt. It again has
capabilities we can only surmise.</t>

</section>
<section anchor="stephen-farrell-ietf-and-internet-technical-community-reaction"><name>Stephen Farrell: IETF and Internet Technical community reaction</name>

<t>In 2013, the IETF and, more broadly, the Internet technical, security and
privacy research communities, were surprised by the surveillance and attack
efforts exposed by the Snowden revelations.  <xref target="timeline"/> While the
potential for such was known, it was the scale and pervasiveness of the
activities disclosed that was alarming and, I think it fair to say, quite
annoying, for very many Internet engineers.</t>

<t>As for the IETF's reaction, informal meetings during the July 2013 IETF meeting
in Berlin indicated that IETF participants considered that these revelations
showed that we needed to do more to improve the security and privacy properties
of IETF protocols, and to help ensure deployments made better use of the
security and privacy mechanisms that already existed. In August, the IETF setup
a new mailing list <xref target="perpass"/> that ended up being a useful venue for triaging
proposals for work on these topics. At the November 2013 IETF meeting, there
was a lively and very well attended plenary session <xref target="plenary-video"/> on
"hardening the Internet" against such attacks, followed by a "birds of a
feather" <xref target="Perpass-BoF"/> devoted to more detailed discussion of possible
actions in terms of new working groups, protocols and best-current-practice
(BCP) documents that could help improve matters.  This was followed in
February/March 2014 by a joint IAB/W3C workshop on "strengthening the Internet
against pervasive monitoring" <xref target="STRINT"/> held in London and attended by 150
engineers (still the only IAB workshop in my experience where we needed a
wait-list for people after capacity for the venue was reached!). The STRINT
workshop report was eventually published as <xref target="RFC7687"/> in 2015, but in the
meantime work proceeded on a Best Current Practice (BCP) document codifying
that the IETF community considered that "pervasive monitoring is an attack"
<xref target="RFC7258"/> (aka BCP188). The IETF last-call discussion for that short
document included more than 1000 emails - while there was broad agreement on
the overall message, a number of IETF participants considered enshrining that
message in the RFC series and IETF processes was controversial. In any case the
BCP was published in May 2014. The key statement on which rough consensus was
reached is in the abstract of RFC7258 and says "Pervasive monitoring is a
technical attack that should be mitigated in the design of IETF protocols,
where possible." That document has since been referenced <xref target="refs-to-7258"/> by
many IETF working groups and RFCs as justifying additional work on security and
privacy. Throughout that period and beyond, the repercussions of the Snowden
revelations remained a major and ongoing agenda item for both of the IETF's
main technical management bodies - the IAB and the IESG (on which I served at
the time).</t>

<t>So far, I've really only described the processes with which the IETF dealt with
the attacks, but there was of course also much technical work started by IETF
participants that was at least partly motivated by the Snowden revelations.</t>

<t>In November 2013 a working group was established to document better practices
for using TLS in applications <xref target="UTA"/> so that deployments would be less at risk
in the face of some of the attacks related to stripping TLS or having
applications mis-use TLS APIs or parameters.  Similar work was done to update
recommendations for use of cryptography in other protocols in the <xref target="CURDLE"/>
working group later.  The CURDLE working group was to an extent created to
enable use of a set of new elliptic curves that had been documented by the IRTF
crypto forum research group. <xref target="CFRG"/> That work in turn had been partly
motivated by (perhaps ultimately unfounded) concerns about elliptic curves
defined in NIST standards, following the DUAL_EC_DRBG debacle <xref target="dual-ec"/> 
(described further below) where a
NIST random number generator had been deliberately engineered to produce output
that could be vulnerable to NSA attack.</t>

<t>Work to develop a new version of TLS was started in 2014, mainly due to
concerns that TLSv1.2 and earlier version implementations had been shown to be
vulnerable to a range of attacks over the years. The work to develop TLSv1.3
<xref target="RFC8446"/> also however aimed to encrypt more of the handshake so as to
expose less information to network observers - a fairly direct result of the
Snowden revelations.  Work to further improve TLS in this respect continues
today using the so-called encrypted client hello (ECH) <xref target="I-D.ietf-tls-esni"/>
mechanism to remove one of the last privacy leaks present in current TLS.</t>

<t>Work on ECH was enabled by significant developments to encrypt DNS traffic,
using DNS over TLS (DoT) <xref target="RFC7858"/> or DNS over HTTPS (DoH) <xref target="RFC8484"/> which also started as a result of
the Snowden revelations. Prior to that, privacy hadn't really been considered
when it came to DNS data or (more importantly) the act of accessing DNS data.
The trend towards encrypting DNS traffic represents a significant change for
the Internet, both in terms of reducing cleartext, but also in terms of moving
points-of-control. The latter aspect was, and remains, controversial, but the
IETF did its job of defining new protocols that can enable better DNS privacy.
Work on HTTP version 2 <xref target="RFC7540"/> and QUIC <xref target="RFC9000"/> further demonstrates
the trend in the IETF towards always-encrypting protocols as the new norm, at
least at and above the transport layer.</t>

<t>Of course, not all such initiatives bore fruit, for example attempts to define
a new MPLS encryption mechanism <xref target="I-D.farrelll-mpls-opportunistic-encrypt"/>
foundered due to a lack of interest and the existence of the already deployed
IEEE MACSEC scheme. But there has been a fairly clear trend towards trying to
remove cleartext from the Internet as a precursor to provide improved privacy
when considering network observers as attackers.</t>

<t>The IETF of course, forms only one part of the broader Internet technical
community, and there were many non-IETF activities triggered by the Snowden
revelations, a number of which also eventually resulted in new IETF work to
standardise better security and privacy mechanisms developed elsewhere.</t>

<t>In 2013, the web was largely unencrypted despite HTTPS being relatively
usable and that was partly due to problems using the WebPKI at scale. The
Let's Encrypt <xref target="LE"/> initiative issued it's first certificates in 2015 as
part of it's aim to try move the web
towards being fully encrypted and has been extremely successful in helping
achieve that goal.  Subsequently, the automation protocols developed for
Let's Encrypt were standardised in the IETF's ACME <xref target="ACME"/> working group.</t>

<t>In 2013, most email transport between mail servers was cleartext,
directly enabling some of the attacks documented in the Snowden documents.
Significant effort by major mail services and MTA software developers since
then have resulted in more than 90% of email being encrypted between mail
servers and various IETF protocols have been defined in order to improve that
situation, e.g., SMTP MTA Strict Transport Security (MTA-STS). <xref target="RFC8461"/></t>

<t>Lastly, MAC addressees have historically been long-term fixed values visble to
local networks (and beyond), which enabled some tracking attacks that were
documented in the Snowden documents. <xref target="Toronto"/> 
Implementers/vendors and the IEEE 802
standards group recognised this weakness and started work on MAC address
randomisation that in turn lead to the IETF's <xref target="MADINAS"/> working group that
aims to ensure randomised MAC addresses can be used on the Internet without
causing unintentional harm.
There is also a history of IETF work on deprecating MAC-address based IPv6 interface identifiers,
advocating pseudo-random identifiers and temporary addresses, some of
which pre-dates Snowden. <xref target="RFC7217"/> <xref target="RFC8064"/> <xref target="RFC8981"/></t>

<t>In summary, the significantly large volume of technical work pursued in the
IETF and elsewhere as a result of the Snowden revelations has focussed on two
main things: decreasing the amount of plaintext that remains visible to network
observers and secondly reducing the number of long-term identifiers that enable
unexpected identification or re-identification of devices or users. This work
is not by any means complete, nor is deployment universal, but significant
progress has been made and the work continues even if the level of annoyance
at the attack has faded somewhat over time.</t>

<t>One should also note that there has been push-back against these improvements
in security and privacy and the changes they cause for deployments. That has
come from more or less two camps - those on whom these improvements force
change tend to react badly, but later figure out how to adjust. The second camp
being those who seemingly prefer not to strenghten security so as to for
example continue to achieve what they call "visibility" even in the face of the
many engineers who correctly argue that such an anti-encryption approach
inevitably leads to worse security overall. The recurring nature of this kind
of push-back is nicely illustrated by <xref target="RFC1984"/>. That informational document
was published in 1996 as an IETF response to an early iteration of the
perennial "encryption is bad" argument. In 2015, the unmodified 1996 text was
upgraded to a Best Current Practice (BCP200) as the underlying arguments have
not, and will not, change.</t>

<t>Looking back on all the above from a 2023 vantage point, I think that, as a
community of Internet engineers, we got a lot right, but that today there's way
more that needs to be done to better protect the security and privacy of people
who use the Internet. In particular, we (the technical community) haven't done
nearly as good a job at countering surveillance capitalism <xref target="zubhoff2019"/> which has exploded
in the last decade. In part, that's because many of the problems are outside of
the scope of bodies such as the IETF. For example, intrusive back-end sharing
of people's data for advertising purposes can't really be mitigated via
Internet protocols.</t>

<t>However, I also think that the real annoyance felt with respect to the Snowden
revelations is (in general) not felt nearly as much when it comes to the legal
but hugely privacy-invasive activities of major employers of Internet
engineers.</t>

<t>It's noteworthy that RFC7258 doesn't consider that bad actors are limited to
governments; and personally, I think many advertising industry schemes for
collecting data are egregious examples of pervasive monitoring and hence ought
also be considered an attack on the Internet that ought be mitigated where
possible.  However, the Internet technical community clearly hasn't acted in
that way over the last decade.</t>

<t>Perhaps that indicates that Internet engineers and the bodies in which they
congregate need to place much more emphasis on standards for ethical behaviour
than has been the case for the first half-century of the Internet.  And while
it would be good to see the current leaders of Internet bodies work to make
progress in that regard, at the time of writing, it sadly seems more likely that
government regulators will be the ones to try force better behaviour. That of
course comes with a significant risk of having regulations that stymie the kind
of permissionless innovation that characterised many earlier Internet
successes.</t>

<t>So while we got a lot right in our reaction to Snowden's revelations,
currently, we have a "worse" Internet.  Nonetheless, I do still hope to see a
sea-change there, as the importance of real Internet security and privacy for
people becomes utterly obvious to all, even the most hard core capitalists and
government signals intelligence agencies.  That may seem naive, but I remain
optimistic that as a fact-based community we (and eventually our employers)
will recognise that the lesser risk is to honestly aim to provide the best
security and privacy practically possible.</t>

</section>
<section anchor="farzaneh-badii-did-snowdens-revelations-help-with-protecting-human-rights-on-the-internet"><name>Farzaneh Badii: Did Snowden’s revelations help with protecting human rights on the Internet?</name>

<t>It is very difficult to scientifically measure the effect of Snowden's
revelations on human rights and the Internet. Anecdotally, we have
been witnessing dominant regulatory and policy approaches that impact
technologies and services that are at the core of protecting human
rights on the Internet. (A range of European Union laws that aims to
address online safety or concentration of data. There are many more
regulations that have an impact on the Internet.<xref target="Masnick2023"/>) There
has been little progress in fixing technical and policy issues that
help enable human rights. Snowden revelations did not have a
revolutionary effect on our approach towards not using policies and
technical means that have an effect on human rights, such as freedom
of expression, freedom of association and assembly and privacy. It did
not decrease the number of Internet shutdowns, nor the eagerness of
authoritarian (and even to some extent democratic countries) to
territorialize the Internet. Perhaps the revelations helped with the
evolution of some technical and policy aspects.</t>

<t>After Snowden’s revelations 10 years ago, engineers and advocates at
the Internet Engineering Task Force (IETF) responded in a few
ways. One prominent response was the issuance of a Best Current
Practice document, “Pervasive Monitoring Is an Attack” <xref target="RFC7258"/> by
Farrell and Tschofenig. The responses to Snowden revelations did not
mean that IETF had lost sight of issues such as privacy and
surveillance. There were instances of resistance to surveillance in
the past by engineers (we do not delve into how successful that was in
protecting human rights). But historically, many engineers believed
that widespread and habitual surveillance was too expensive to be
practical. The revelations proved them wrong.</t>

<t>Rights-centered activists were also involved with the IETF before the
revelations. For example, staff from Center for Democracy and
Technology (CDT) was undertaking work at the IETF (and was a member of
the Internet Architecture Board) and held workshops about the
challenges of creating privacy protective protocols and systems. The
technical shortcomings that were exploited by the National Security
Agency to carry out mass-scale surveillance were recognized by the
IETF before the Snowden revelations <xref target="Garfinkel1995"/>,<xref target="RFC6462"/>. In
2012, Joy Liddicoat and Avri Doria wrote a report at Internet Society
which extensively discussed the processes and principles of human
rights and Internet protocols <xref target="Doria2012"/>.</t>

<t>Perhaps the Snowden revelations brought more attention to the IETF and
its work as it related to important issues, such as privacy and
freedom of expression. It might have also expedited and helped with
more easily convening the Human Rights Protocol Considerations
research group in the Internet Research Task Force (IRTF). Co-chaired
by Niels ten Oever (who worked at Article 19 at the time) and Internet
governance activist Avri Doria, the Internet Research Task Force in
July 2015 chartered a Research Group on “Human Rights Protocol
Considerations” (the HRPC RG). The charter of the HRPC RG stated that
the group was established: “to research whether standards and
protocols can enable, strengthen or threaten human rights, as defined
in the UDHR and theInternational Covenant on Civil and Political
Rights (ICCPR).”</t>

<t>During the past decades, a few successful strides were made to create
protocols that, when and if implemented, aim at protecting privacy of
the users, as well as help with reducing pervasive surveillance. These
efforts were in keeping with the consensus of the IETF found in RFC
7258.  Sometimes these protocols have anti-censorship qualities as
well. A few examples immediately come to mind: 1) Encryption of DNS
queries (for example DNS over HTTPS); 2) ACME protocol underpinning
the Lets Encrypt initiative and 3) Registration Data Access Protocol
(RDAP)<xref target="RFC7480"/>,<xref target="RFC7481"/>,<xref target="RFC9082"/>,<xref target="RFC9083"/>,<xref target="RFC7484"/>,
<xref target="RFC8056"/>.(It is debatable that RDAP had anything to do with
Snowden revelations but it is still a good example and is finally
being implemented.)</t>

<t>DNS Queries over HTTPS protocol aimed to encrypt DNS queries. Four
years after RFC 7258, DoH was developed to tackle both active and
passive monitoring of DNS queries. It is also a tool that can help
with combatting censorship. Lets Encrypt was not an Internet protocol,
but it was an initiative that aimed to encrypt the web and later on
some of the automation protocols were standardized in the IETF ACME
working group. The Registration Data Access Protocol could solve a
long term problem: redacting the domain name registrants (and IP
address holders) sensitive, personal data but at the same time
enabling legitimate access to the information. As to the work of HRPC
research group, it has so far issued <xref target="RFC8280"/> by ten Oever and
Cath) and a number of informational Internet Drafts.</t>

<t>While we cannot really argue that all the movements and privacy
preserving protocols and initiatives that enable protecting human
rights at the infrastructure layer directly result from Snowden
revelations, I think it is safe to say that the revelations helped
with expediting the resolution of some of the “technical” hesitations
that had an effect on fixing Internet protocols that enabled
protection of human rights.</t>

<t>Unfortunately, the Snowden revelations have not yet helped us
meaningfully with adopting a human rights approach. We can’t agree on
prioritizing human rights in our Internet communities for a host of
reasons. This could be due to: 1) human rights are sometimes in
conflict with each other 2) it is simply not possible to mitigate the
human right violation through the Internet protocol 3) it is not
obvious for the engineers before the fact how the Internet protocol
contributes to enabling protection of human rights and how they can
fix the problem 4) the protocol is already there but market, law and a
host of other societal and political issues do not allow for
widespread implementation.</t>

<t>IETF did not purposefully take a long time to adopt and impelement protocols that
enabled human rights. There were technical and political issues that
created barriers. For example, the IETF community attempted a few
times before to create a protocol that would disclose the necessary
information of IP holders and domain name registrants while at the
same time protecting their data (CRIPS and IRIS are two
examples). However, it was not until RDAP was developed and the
General Data Protection Regulation (GDPR) was enacted that Internet
Corporation for Assigned Names and Numbers had to consider instructing
registries and registrars to implement RDAP and its community had to
come up with a privacy compliant policy.  Overall, a host of
regulatory and market incentives can halt or slow down the
implementation of human rights enabling protocols and implementation
could depend on other organizations with their own political and
stakeholder conflicts.</t>

<t>Sometimes the protocol is available, but the regulatory framework and
the market do not allow for implementation. One curious example of
this is sanctions and their effect on IP addresses of sanctioned
nations. Imagine if we argue that registration of IPv4 is affected by
sanctions because it is deemed as an economic resource and because of
scarcity and monetization. In theory, if we move to IPv6, we can solve
the problem of access to the resources because IPv6 is not a scarce
resource. However, as we know, adoption of IPv6 depends not only on
technical availability. Adoption of IPv6 won’t be the complete
solution either and depends on laws and policies and the market.</t>

<t>Sometimes there are arguments over implementation of a protocol
because as it is perceived, while it can protect freedom of expression
and reduce surveillance, it can hamper other human rights. For
instance, we still have doubts about implementing DNS over HTTPS
without seriously considering its contributions to fight with
censorship and bring encryption to DNS queries. The arguments against
implementation of DoH include protection of children online and lack
of law enforcement access to data.</t>

<t>We must acknowledge that sometimes the technical solutions that we use
that protect one right (for example encryption to protect the right to
privacy or prevent surveillance) could potentially affect technical
and policy solutions that try to protect other human rights (for
example encryption could prevent financial institutions from
monitoring employees network activities to detect fraudulent
behavior). Acknowledging and identifying these conflicts can help us
come up with alternative techniques that could protect human rights
while not hampering other technical solutions such as
encryption. Where such alternative techniques are not possible,
acknowledging the shortcoming could clarify and bring to light the
trade-offs that we have accepted in our Internet system.</t>

<t>Ironically, we advocate for connectivity and believe expressing
oneself on the Internet is a human right, but when a war erupts, we
resort to tools that impact that very concept. For example, some
believe via imposing sanctions on critical properties of the Internet,
we can punish the perpetrators of a war. The Regional Internet
Registries that are in charge of registration of IP addresses have
shown resilience to these requests.  However, some tech-companies, for
example Cogent <xref target="Roth2022"/>, decided not to serve sanctioned countries
and over-comply with sanctions. Over-compliance with sanctions could
hamper ordinary people's access to the Internet. <xref target="Badii2023"/></t>

<t>Perhaps we can solve some of these problems by undertaking a thorough
impact assessment and contextualization to reveal how and why Internet
protocols affect human rights (something Fidler and I argued
for <xref target="Badii2021"/>). Contextualization and
impact assessment can reveal how each Internet protocol or each line
of code, in which systems, have an impact on which and whose human
rights.</t>

<t>The HRPC RG (which I am a part of) and the larger human rights and
policy analyst communities are still struggling to analyze legal,
social and market factors alongside the protocols to have a good
understanding of what has an impact and what has to be changed. It is
hard, but it is not impossible. If we thoroughly document and research
the lifecycle of an Internet protocol and contextualize it, we might
have a better understanding of how and if we can actually fix which
parts of the protocol in order to protect human rights.</t>

<t>Overall, the revelations did, to some extent, contribute to the
evolution of our ideas and perspectives. Our next step should be to
undertake research on the impact of Internet systems (including
Internet protocols) on human rights, promote the implementation of
protocols good for human rights through policy and advocacy and focus
on which technical parts we can standardize to help with more
widespread implementation of human rights enabling Internet protocols.</t>

</section>
<section anchor="steven-m-bellovin-governments-and-cryptography-the-crypto-wars"><name>Steven M. Bellovin: Governments and Cryptography: The Crypto Wars</name>

<section anchor="historical-background"><name>Historical Background</name>

<t>It’s not a secret: many governments in the world don’t like it when
people encrypt their traffic. More precisely, they like strong
cryptography for themselves but not for others, whether those others
are private citizens or other countries. But the history is longer and
more complex than that.</t>

<t>For much of written history, both governments and individuals used
cryptography to protect their messages. To cite just one famous
example, Julius Caesar is said to have encrypted messages by shifting
letters in the alphabet by 3 <xref target="Kahn1996"/>. In modern parlance, 3 was
the key, and each letter was encrypted with</t>

<ul empty="true"><li>
  <t>C[i] = (P[i] + 3) mod 23</t>
</li></ul>

<t>(In his day, J, U, and W did not exist in the Latin alphabet.) Known
Arabic writings on cryptanalysis go back to at least the 8th century;
their sophistication shows that encryption was reasonably commonly
used. In the 9th century, Abu Yusuf Ya’qub ibn ‘Ishaq aṣ-Ṣabbah
al-Kindh developed and wrote about frequency analysis as a way to
crack ciphers <xref target="Borda2011"/>,<xref target="Kahn1996"/>.</t>

<t>In an era of minimal literacy, though, there wasn’t that much use of
encryption, simply because most people could neither read nor
write. Governments used encryption for diplomatic messages, and
cryptanalysts followed close behind. The famed Black Chambers of the
Renaissance era read messages from many different governments, while
early cryptographers devised stronger and stronger ciphers
<xref target="Kahn1996"/>. In Elizabethan times in England, Sir Francis Walsingham’s
intelligence agency intercepted and decrypted messages from Mary,
Queen of Scots; these messages formed some of the strongest evidence
against her and eventually led to her execution <xref target="Kahn1996"/>.</t>

<t>This pattern continued for centuries. In the United States, Thomas
Jefferson invented the so-called wheel cipher in the late 18th
century; it was reinvented about 100 years later by Etienne Bazeries
and used as a standard American military cipher well into World War II
<xref target="Kahn1996"/>. Jefferson and other statesmen of that era regularly used
cryptography when communicating with each other. An encrypted message
was even part of the evidence introduced in Aaron Burr’s 1807 trial
for treason <xref target="Kerr2020"/>,<xref target="Kahn1996"/>. Edgar Allan Poe claimed that he
could cryptanalyze any message sent to him <xref target="Kahn1996"/>.</t>

<t>The telegraph era upped the ante. In the U.S., just a year after
Samuel Morse deployed his first telegraph line between Baltimore and
Washington, his business partner, Francis Smith, published a codebook
to help customers protect their traffic from prying eyes
<xref target="Smith1845"/>.  In 1870, Britain nationalized its domestic telegraph network;
in response, Robert Slater published a more sophisticated codebook
<xref target="Slater1870"/>. On the government side, Britain took advantage of its
position as the central node in the world’s international telegraphic
networks to read a great deal of traffic passing through the country
<xref target="Headrick1991"/>,<xref target="Kennedy1971"/>. They used this ability strategically,
too—when war broke out in 1914, the British Navy cut Germany’s
undersea telegraph cables, forcing them to use radio; an intercept of
the so-called Zimmermann telegram, when cryptanalyzed, arguably led to
American entry into the war and thence to Germany’s defeat. Once the
U.S. entered the war, it required users of international telegraph
lines to deposit copies of the codebooks they used for compression, so
that censors could check messages for prohibited content <xref target="Kahn1996"/>.</t>

<t>In Victorian Britain, private citizens, often lovers, used encryption
in newspapers’ Personal columns to communicate without their parents’
knowledge. Charles Wheatstone and Charles Babbage used to solve these
elementary ciphers routinely, for their own amusement <xref target="Kahn1996"/>.</t>

<t>This pattern continued for many years. Governments regularly used
ciphers and codes, while other countries tried to break them; private
individuals would sometimes use encryption but not often, and rarely
well. But the two world wars marked a sea change, one that would soon
reverberate into the civilian world.</t>

<t>The first World War featured vast troop movements by all parties; this
in turn required a lot of encrypted communications, often by telegraph
or radio. These messages were often easily intercepted in
bulk. Furthermore, the difficulty of encrypting large volumes of
plaintext led to the development of a variety of mechanical encryption
devices, including Germany’s famed Enigma machine. World War II
amplified both trends. It also gave rise to machine-assisted
cryptanalysis, such as the United Kingdom’s bombes (derived from an
earlier Polish design) and Colossus machine, and the American’s device
for cracking Japan’s PURPLE system. The U.S. also used punch
card-based tabulators to assist in breaking other Japanese codes, such
as the Japanese Imperial Navy’s JN-25 <xref target="Kahn1996"/>,<xref target="Rowlett1998"/>.</t>

<t>These developments set the stage for the postwar SIGINT—Signals
Intelligence—environment. Many intra-government messages were sent by
radio, making them easy to intercept; advanced cryptanalytic machines
made cryptanalysis easier. Ciphers were getting stronger, though, and
government SIGINT agencies did not want to give up their access to
data. While there were undoubtedly many developments, two are well
known.</t>

<t>The first involved CryptoAG, a Swedish (and later Swiss) manufacturer
of encryption devices. The head of that company, Boris Hagelin, was a
friend of William F. Friedman, a pioneering American
cryptologist. During the 1950s, CryptoAG sold its devices to other
governments; apparently at Friedman’s behest, Hagelin weakened the
encryption in a way that let the NSA read the traffic <xref target="Miller2020"/>.</t>

<t>The story involving the British is less well-documented and less
clear. When some of Britain’s former colonies gained their
independence, the British government gave them captured, war surplus
Enigma machines to protect their own traffic. Some authors contend
that this was deceptive, in that these former colonies did not realize
that the British could read Enigma-protected traffic; others claim
that this was obvious but that these countries didn’t care: Britain
was no longer their enemy; it was neighboring countries they were
worried about. Again, though, this concerned governmental use of
encryption <xref target="Kahn1996"/>,<xref target="Baldwin2022"/>. There was still little private
use.</t>

</section>
<section anchor="the-crypto-wars-begin"><name>The Crypto Wars Begin</name>

<t>The modern era of conflict between individual’s desire for privacy and
government desires to read traffic began around 1972. The grain
harvest in the U.S.S.R. had failed; since relations between the Soviet
Union and the United States were temporarily comparatively warm, the
Soviet grain company— an arm of the Soviet government, of
course— entered into negotiations with private American
companies. Unknown to Americans at the time, Soviet intelligence was
intercepting the phone calls of the American negotiating teams. In
other words, private companies had to deal with state actors as a
threat. Eventually, U.S. intelligence learned of this, and came to a
realization: the private sector needed strong cryptography, too, to
protect American national interests <xref target="Broad1982"/>,<xref target="Johnson1998"/>). This
underscored the need for strong cryptography to protect American
civilian traffic—but the SIGINT people were unhappy at the thought of
more encryption that they couldn’t break.</t>

<t>Meanwhile, the U.S. was concerned about protecting 
unclassified data <xref target="Landau2014"/>. In 1973 and again in 1974, the
National Bureau of Standards (NBS) put out a call for a strong, modern
encryption algorithm. IBM submitted Lucifer, an internally developed
algorithm based on what has become known as a 16-round Feistel network. The
original version used a long key.
It seemed quite strong, so NBS sent it off to the NSA to
get their take. The eventual design, which was adopted in 1976 as the
Data Encryption Standard (DES), differed in some important ways from
Lucifer. 
First, the so-called S-boxes, the source of the cryptologic
strength of DES, were changed, and were now demonstrably not composed of
random integers. Many researchers alleged that the S-boxes contained
an NSA back door. It took 20 years for the truth to come out: the
S-boxes were in fact strengthened, not weakened. Most likely, IBM
independently discovered the attack now known as differential
cryptanalysis, though some scholars suspect that the NSA told them
about it. The non-random S-boxes protected against this attack. The
second change, though, was clearly insisted on by the NSA: the key size
was shortened, from Lucifer’s 112 bits to DES’s 56 bits. We now know
that the NSA wanted a 48-bit key size, while IBM wanted 64 bits; they
compromised at 56 bits.</t>

<t>Whitfield Diffie and Martin Hellman, at Stanford University, wondered
about the 56-bit keys. In 1979, they published a paper demonstrating
that the U.S. government, but few others, could afford to build a
brute-force cracking machine, one that could try all 2^56 possible
keys to crack a message. NSA denied tampering with the design; a
Senate investigating committee found that that was correct, but did
not discuss the shortened key length issue.</t>

<t>This, however, was not Diffie and Hellman’s greatest contribution to
cryptology. A few years earlier, they published a paper inventing what
is now known as public key cryptography. In 1978, Ronald Rivest, Adi
Shamir, and Leonard Adelman devised the RSA algorithm, which made it
usable. (An NSA employee, acting on his own, sent a letter warning
that academic conferences on cryptology might violate U.S. export
laws.)</t>

<t>Around the same time, George Davida at the University of Wisconsin
applied for a patent on a stream cipher; the NSA slapped a secrecy
order on the application. This barred him from even talking about his
invention. The publicity was devastating; the NSA had to back down.</t>

<t>The Crypto Wars had thus begun: civilians were inventing strong
encryption systems, and the NSA was tampering with them or trying to
suppress them. Bobby Inman, the then-director of the NSA, tried
creating a voluntary review process for academic papers, but very few
researchers were interested in participating <xref target="Landau1988"/>.</t>

<t>There were few major public battles during the 1980s, because there
were few new major use cases for civilian cryptography during that
time. There was one notable incident, though: Shamir, Amos Fiat, and
Uriel Feige invented zero-knowledge proofs and applied for a US
patent. In response, the US Army slapped a secrecy order on the
patent. After a great deal of public outrage and intervention by, of
all organizations, the NSA, the order was lifted on very narrow
grounds: the inventors were not American, and had been discussing
their work all over the world <xref target="Landau1988"/>.</t>

<t>In the 1990s, though, everything changed.</t>

</section>
<section anchor="the-battle-is-joined"><name>The Battle is Joined</name>

<t>There were three major developments in cryptography in the early
1990s. First, Phil Zimmermann released PGP (Pretty Good Privacy), a
package to encrypt email messages. In 1993, AT&amp;T planned to release
the TSD-3600, an easy-to-use phone encryptor aimed at business
travelers. Shortly after that, the Netscape Corporation released SSL
(Secure Socket Layer) as a way to enable web-based commerce using
their browser and web server. All of these were seen as threats by the
NSA and the FBI.</t>

<t>PGP was, at least arguably, covered by what was known as ITAR, the
International Trafficking in Arms Regulations—under American law,
encryption software was regarded as a weapon, so exports required a
license. It was also alleged to infringe the patents on the RSA
algorithm. Needless to say, both issues were problematic for what was
intended to be open source software. Eventually, the criminal
investigation into Zimmermann’s role in the spread of PGP overseas was
dropped, but the threat of such investigations remained to deter
others<xref target="Levy2001"/>.</t>

<t>The TSD-3600 was another matter. AT&amp;T was a major corporation that did
not want to pick a fight with the U.S. government, but international
business travelers were seen as a major market for the device. At the
government’s “request”, the DES chip was replaced with what was known
as the Clipper Chip. The Clipper chip used Skipjack, a cipher with
80-bit keys; it was thus much stronger against brute force attacks
than DES. However, it provided “key escrow”. Without going into any
details, the key escrow mechanism allowed U.S. government
eavesdroppers to consult a pair of (presumably secure) internal
databases and decrypt all communications protected by the chip. The
Clipper chip proved to be extremely unpopular with industry; that AT&amp;T
Bell Labs’ Matt Blaze found a weakness in the design<xref target="Blaze1994"/>, one
that let you use Skipjack without the key escrow feature, didn’t help
its reputation.</t>

<t>The third major development, SSL, was even trickier. SSL was aimed at
e-commerce, and of course Netscape wanted to be able to sell its
products outside the US. That would require an export license, so they
made a deal with the government: non-American users would receive a
version that used 40-bit keys, a key length far shorter than what the
NSA had agreed to 20 years earlier. (To get ahead of the story: there
was a compromise mode of operation, wherein an export-grade browser
could use strong encryption when talking to a financial
institution. This hybrid mode led to cryptographic weaknesses
discovered some 20 years later<xref target="Adrian2015"/>.)</t>

<t>Technologists and American industry pushed back. The IETF adopted the
Danvers Doctrine, described in <xref target="RFC3365"/>:</t>

<ul empty="true"><li>
  <t>At the 32nd IETF held in Danvers, Massachusetts during April of 1995
the IESG asked the plenary for a consensus on the strength of security
that should be provided by IETF standards.  Although the immediate
issue before the IETF was whether or not to support “export” grade
security (which is to say weak security) in standards, the question
raised the generic issue of security in general.</t>
</li></ul>

<ul empty="true"><li>
  <t>The overwhelming consensus was that the IETF should standardize on the
use of the best security available, regardless of national policies.
This consensus is often referred to as the “Danvers Doctrine”.</t>
</li></ul>

<t>Then American companies started losing business to their overseas
competitors, who did not have to comply with U.S. export laws. All of
this led to what seemed like a happy conclusion: the U.S. government
drastically loosened its export rules for cryptographic software. All
was well—or so it seemed…</t>

</section>
<section anchor="the-hidden-battle"><name>The Hidden Battle</name>

<t>Strong cryptography was here to stay, and it was no longer an American
monopoly, if indeed it ever was. The Information Assurance Directorate
of the NSA, the part of the agency that is supposed to protect
U.S. data, was pleased by the spread of strong cryptography. When the
Advanced Encryption Standard (AES) competition was held, there were no
allegations of malign NSA interference; in fact, the winning entry was
devised by two Europeans, Joan Daemen and Vincent Rijmen. But the NSA
and its SIGINT needs did not go away—the agency merely adopted other
techniques.</t>

<t>I have often noted that one doesn’t go through strong security, one
goes around it. When strong encryption became more common and much
more necessary, the NSA started going around it, by targeting
computers and the software that they run. And it seems clear that they
believe that AES is quite strong; they’ve even endorsed its use for
protecting TOP SECRET information. But there was an asterisk attached
to that endorsement: AES is suitable if and only if properly used and
implemented. Therein lies the rub.</t>

<t>The first known attempt to tamper with outside cryptographic
mechanisms was discovered in 2007, when two Microsoft researchers, Dan
Shumow and Niels Ferguson, noted an odd property of a
NIST-standardized random number generator, DUAL_EC_DRBG. (The NBS
renamed itself to NIST, the National Institute of Standards and
Technology.) Random numbers, unpredictable numbers are vital for
cryptography, but Shumow and Ferguson showed that if certain constants
in DUAL_EC_DRBG were chosen in a particular way with a
known-but-hidden other number, whoever knew that number could predict
all future random numbers from a system given a few sample bytes to
start from <xref target="Kostyuk2022"/>. These sample bytes could come from
known keys, nonces, or anything else. Where did the constants in
DUAL_EC_DRBG come from and how were they chosen or generated? No one
who knows is talking. But although cryptographers and security
specialists were very suspicious—Bruce Schneier wrote in 2007, before
more facts came out, that “both NIST and the NSA have some explaining
to do”; I assigned my students reading on the topic—the issue didn’t
really get any traction until six years later, when among the papers
that Edward Snowden disclosed was the information that the NSA had
indeed tampered with a major cryptographic standard.</t>

<t>The revelations didn’t stop there. There have been allegations that
the NSA paid some companies to use DUAL_EC_DRBG in their
products. Some people have claimed that there were attempts to modify
some IETF standards to make enough random bytes visible, to aid in
exploiting the random number generator. A major vendor of networking
gear, Juniper, did use DUAL_EC_DRBG in some of its products, but with
different constants<xref target="Checkoway2016"/>. Where did these come from? Were
they from the NSA or some other government? Could their source tree
have been hacked by an intelligence agency? There was a different hack
of their code at around the same time<xref target="Moore2015"/>. No one is talking.</t>

<t>The Snowden revelations also included data suggesting that the NSA had
a worldwide eavesdropping network and a group that tried very
specific, targeted hacks on very specific targets’ systems. In
retrospect, neither is surprising: “spies gonna spy”. The NSA’s
business is signals intelligence; of course they’re going to try to
intercept traffic. Indeed, the DUAL_EC_DRBG tampering is useless to
anyone who has not collected messages to decrypt. And targeted hacks
are a natural way around strong encryption: collect the data before it
is encrypted or after it is decrypted, and don’t worry about the
strength of the algorithms.</t>

<t>The privacy community, worldwide, was appalled, though perhaps they
shouldn’t have been. It calls to mind the line that Claude Rains'
character uttered in the movie
Casablanca <xref target="Curtiz"/>: “I’m shocked, shocked to find that gambling is going on in
here.” The immediate and continuing reaction was to deploy more
encryption. The standards have long existed; what was missing was
adoption. One barrier was the difficulty and expense of getting
certificates to use with TLS; that void was filled by Let's Encrypt<xref target="LE"/>,
which made free certificates easy to get online. Today, most HTTP
traffic is encrypted, so much so that Google’s search engine
down-ranks sites that do not use it. Major email providers uniformly
use TLS to protect all traffic. WiFi, though a local area issue, now
uses much stronger encryption. (It's important to remember that
security and insecurity have economic components. Security doesn't have
to be perfect to be very useful, if it raises the attackers' costs
by enough.)</t>

<t>The news on the software side is less good. Not a day goes by when one
does not read of organizations being hit by ransomware. It goes
without saying that any threat actor capable of encrypting disks is
also capable of stealing the information on them; indeed, that is a
frequent accompanying activity, since the threat of disclosure is
another incentive to pay for those sites that do have good enough
backups. Major vendors have put a lot of effort into securing their
software, bugs and operational errors by end-user sites persist.</t>

</section>
<section anchor="whither-the-ietf"><name>Whither the IETF?</name>
<t>Signal intelligence agencies, not just the NSA, but its peers around
the globe- most major countries have their own—are not going to go
away. The challenges that have beset the NSA are common to all such
agencies, and their solutions are likely the same. The question is
what should be done to protect individual privacy. A number of strong
democracies, such as Australia and the United Kingdom, are already
moving to restrict encryption. Spurred on by complaints from the FBI
and other law enforcement agencies, the US Congress frequently
considers bills to do the same.</t>

<t>The IETF has long had a commitment to strong, ubiquitous
encryption. This is a good thing. It needs to continue, with
cryptography and other security features designed into protocols from
the beginning. But there is also a need for maintenance. Parameters
such as key lengths and modulus sizes age; a value that is acceptable
today may not be 10 years hence. (We’ve already seen apparent problems
from 1024-bit moduli specified in an RFC, an RFC that was not modified
when technology improved enough that attacking encryption based on
them had become feasible.<xref target="Adrian2015"/>) The IETF can do nothing about
the code that vendors ship or that sites use, but it can alert the
world that it thinks things have changed.</t>

<t>Cryptoagility is of increasing importance. In the next very few years,
we will have so-called post-quantum algorithms. Both protocols and key
lengths will need to change, perhaps drastically. Is the IETF ready?
What will happen to, say, DNSSEC if key lengths become drastically
longer? Backwards compatibility will remain important, but that, of
course, opens the door to other attacks. We’ve long thought about
them; we need to be sure that our mechanisms work---we've
been surprised in the past.<xref target="BellovinRescorla2006"/></t>

<t>We also need to worry more about metadata. General Michael Hayden,
former director of both the NSA and the CIA, once remarked, “We kill
people based on metadata” <xref target="Ferran2014"/>. But caution is necessary;
attempts to hide metadata can have side-effects. To give a trivial
example, Tor is quite strong, but if your exit node is in a different
country than you are in, web sites that use IP geolocation may present
their content in a language foreign to you. More generally, many
attempts to hide metadata involving trusting a different party; that
party may turn out to be untrustworthy or it may itself become a
target of attack. As another prominent IETFer has remarked,
“Insecurity is like entropy; you can’t destroy it but you can move it
around.” The IETF has done a lot; it needs to do more. And remember
that the risk here is not just governments acting directly, it's also
private companies that collect the data and sell it to all comers.</t>

<t>Finally, the IETF must remember that its middle name is
“Engineering”. To me, one of the attributes of engineering is the art
of picking the right solution in an over-constrained
environment. Intelligence agencies won’t go away, nor will national
restrictions on cryptography. We have to pick the right path while
staying true to our principles.</t>

</section>
</section>
<section anchor="acknowledgments"><name>Acknowledgments</name>
<t>Susan Landau added many valuable comments to Steve Bellovin's essay.</t>

<t>This document was created at the behest of Eliot Lear, who also 
cat herded and did some editing.</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>Each or any of the authors may have forgotten or omitted things
or gotten things wrong. We're sorry if that's the case, but that's
in the nature of a look-back such as this. Such flaws almost 
certainly won't worsen security or privacy though.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>No changes to IANA processes are made by this memo.</t>

</section>


  </middle>

  <back>



    <references title='Informative References'>

<reference anchor="guard2013" >
  <front>
    <title>NSA collecting phone records of millions of Verizon customers daily</title>
    <author initials="G." surname="Greenwald" fullname="Glenn Greenwald">
      <organization>The Guardian</organization>
    </author>
    <date year="2013" month="June"/>
  </front>
</reference>
<reference anchor="ACME" target="https://datatracker.ietf.org/wg/acme/">
  <front>
    <title>Automated Certificate Management Environment (ACME)</title>
    <author >
      <organization>IETF</organization>
    </author>
    <date year="2023"/>
  </front>
</reference>
<reference anchor="Perpass-BoF" target="https://www.ietf.org/proceedings/88/perpass.html">
  <front>
    <title>IETF 88 Perpass BoF session</title>
    <author >
      <organization>IETF</organization>
    </author>
    <date year="2013"/>
  </front>
</reference>
<reference anchor="CFRG" target="https://datatracker.ietf.org/rg/cfrg/">
  <front>
    <title>IRTF Crypto Forum (CFRG)</title>
    <author >
      <organization>IETF</organization>
    </author>
    <date year="2023"/>
  </front>
</reference>
<reference anchor="CURDLE" target="https://datatracker.ietf.org/wg/curdle/">
  <front>
    <title>curdle WG</title>
    <author >
      <organization>IETF</organization>
    </author>
    <date year="2023"/>
  </front>
</reference>
<reference anchor="Curtiz" >
  <front>
    <title>Casablanca</title>
    <author initials="M." surname="Curtiz" fullname="Michael Curtiz">
      <organization></organization>
    </author>
    <author initials="J. J." surname="Epstein" fullname="Julius J. Epstein">
      <organization></organization>
    </author>
    <author initials="P. G." surname="Epstein" fullname="Philip G. Epstein">
      <organization></organization>
    </author>
    <author initials="H." surname="Koch" fullname="Howard Koch">
      <organization></organization>
    </author>
    <date year="1942"/>
  </front>
</reference>
<reference anchor="dual-ec" target="https://eprint.iacr.org/2015/767.pdf">
  <front>
    <title>Dual EC, A standardized back door</title>
    <author initials="D." surname="Bernstein" fullname="Daniel Bernstein">
      <organization></organization>
    </author>
    <author initials="T." surname="Lange" fullname="Tanja Lange">
      <organization></organization>
    </author>
    <author initials="R." surname="Niederhagen" fullname="Ruben Niederhagen">
      <organization></organization>
    </author>
    <date year="2016"/>
  </front>
</reference>
<reference anchor="LE" target="https://dl.acm.org/doi/pdf/10.1145/3319535.3363192">
  <front>
    <title>Let's Encrypt - an automated certificate authority to encrypt the entire web</title>
    <author initials="J." surname="Aas" fullname="Josh Aas">
      <organization></organization>
    </author>
    <author initials="R." surname="Barnes" fullname="Richard Barnes">
      <organization></organization>
    </author>
    <author initials="B." surname="Case" fullname="Benton Case">
      <organization></organization>
    </author>
    <author initials="Z." surname="Durumeric" fullname="Zakir Durumeric">
      <organization></organization>
    </author>
    <author initials="P." surname="Eckersley" fullname="Peter Eckersley">
      <organization></organization>
    </author>
    <author initials="A." surname="Flores-L{\'o}pez" fullname="Alan Flores-L{\'o}pez">
      <organization></organization>
    </author>
    <author initials="A." surname="Halderman" fullname="Alex Halderman">
      <organization></organization>
    </author>
    <author initials="J." surname="Hoffman-Andrews" fullname="Jacob Hoffman-Andrews">
      <organization></organization>
    </author>
    <author initials="J." surname="Kasten" fullname="James Kasten">
      <organization></organization>
    </author>
    <author initials="E." surname="Rescorla" fullname="Eric Rescorla">
      <organization></organization>
    </author>
    <author initials="S." surname="Schoen" fullname="Seth Schoen">
      <organization></organization>
    </author>
    <author initials="B." surname="Warren" fullname="Brad Warren">
      <organization></organization>
    </author>
    <date year="2019"/>
  </front>
</reference>
<reference anchor="MADINAS" target="https://datatracker.ietf.org/wg/madinas/)">
  <front>
    <title>MADINAS WG</title>
    <author >
      <organization>IETF</organization>
    </author>
    <date year="2023"/>
  </front>
</reference>
<reference anchor="perpass" target="https://mailarchive.ietf.org/arch/browse/perpass/">
  <front>
    <title>perpass mailing list</title>
    <author >
      <organization>IETF</organization>
    </author>
    <date year="2023"/>
  </front>
</reference>
<reference anchor="plenary-video" target="https://www.youtube.com/watch?v=oV71hhEpQ20&amp;pp=ygUQaWV0ZiA4OCBwbGVuYXJ5IA%3D%3D">
  <front>
    <title>IETF 88 Pleary video</title>
    <author >
      <organization>IETF</organization>
    </author>
    <date year="2013"/>
  </front>
</reference>
<reference anchor="refs-to-7258" target="https://datatracker.ietf.org/doc/rfc7258/referencedby/)">
  <front>
    <title>References to RFC7258</title>
    <author >
      <organization>IETF</organization>
    </author>
    <date year="2023"/>
  </front>
</reference>
<reference anchor="timeline" target="https://en.wikipedia.org/wiki/Global_surveillance_disclosures_(2013%E2%80%93present)">
  <front>
    <title>Global surveillance disclosures (2013–present)</title>
    <author >
      <organization>Wikimedia foundation</organization>
    </author>
    <date year="2023"/>
  </front>
</reference>
<reference anchor="STRINT" target="https://www.w3.org/2014/strint/">
  <front>
    <title>A W3C/IAB workshop on Strengthening the Internet Against Pervasive Monitoring (STRINT)</title>
    <author >
      <organization>IETF</organization>
    </author>
    <date year="2014"/>
  </front>
</reference>
<reference anchor="Toronto" target="https://www.npr.org/sections/thetwo-way/2014/01/31/269418375/airport-wi-fi-used-to-track-travelers-snowden-leak-alleges">
  <front>
    <title>Canada Used Airport Wi-Fi To Track Travelers, Snowden Leak Alleges</title>
    <author >
      <organization>National Public Radio</organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="UTA" target="https://datatracker.ietf.org/wg/uta/">
  <front>
    <title>Using TLS in Applications working group (UTA) working group</title>
    <author >
      <organization>IETF</organization>
    </author>
    <date year="2023"/>
  </front>
</reference>
<reference anchor="Kahn1996" >
  <front>
    <title>The Code Breakers, 2nd Edition</title>
    <author initials="D." surname="Kahn" fullname="David Kahn">
      <organization></organization>
    </author>
    <date year="1996"/>
  </front>
  <seriesInfo name="Scribner" value=""/>
</reference>
<reference anchor="Borda2011" >
  <front>
    <title>Fundamentals in Information Theory and Coding. Berlin</title>
    <author initials="M." surname="Borda" fullname="Monica Borda">
      <organization></organization>
    </author>
    <date year="2011"/>
  </front>
  <seriesInfo name="Springer" value=""/>
</reference>
<reference anchor="Kerr2020" >
  <front>
    <title>Decryption Originalism: The Lessons of Burr.</title>
    <author initials="O. S." surname="Kerr" fullname="Orin Kerr">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
  <seriesInfo name="Harvard Law Review" value="134:905"/>
</reference>
<reference anchor="Smith1845" target="http://books.google.com/books?id=Z45clCxsF7EC">
  <front>
    <title>The Secret Corresponding Vocabulary, Adapted for Use to Morse’s Electro-Magnetic Telegraph: And Also in Conducting Written Correspondence, Transmitted by the Mails, or Otherwise</title>
    <author initials="F. O." surname="Smith" fullname="Francis O. Smith">
      <organization></organization>
    </author>
    <date year="1845"/>
  </front>
  <seriesInfo name="Thurston, Isley &amp; Co" value=""/>
</reference>
<reference anchor="Slater1870" target="http://books.google.com/books?id=MJYBAAAAQAAJ">
  <front>
    <title>Telegraphic Code, to Ensure Secresy in the Transmission of Telegrams, First Edition.</title>
    <author initials="R." surname="Slater" fullname="Robert Slater">
      <organization></organization>
    </author>
    <date year="1870"/>
  </front>
  <seriesInfo name="W.R. Gray" value=""/>
</reference>
<reference anchor="Headrick1991" >
  <front>
    <title>The Invisible Weapon: Telecommunications and International Politics, 1851–1945</title>
    <author initials="D. R." surname="Headrick" fullname="Daniel R. Headrick">
      <organization></organization>
    </author>
    <date year="1991"/>
  </front>
  <seriesInfo name="Oxford University Press" value=""/>
</reference>
<reference anchor="Kennedy1971" target="http://www.jstor.org/stable/563928">
  <front>
    <title>Imperial Cable Communications and Strategy, 1870-1914</title>
    <author initials="P. M." surname="Kennedy" fullname="Paul M. Kennedy">
      <organization></organization>
    </author>
    <date year="1971"/>
  </front>
  <seriesInfo name="English Historical Review" value="86 (341): 728–52"/>
</reference>
<reference anchor="Rowlett1998" >
  <front>
    <title>The Story of MAGIC: Memoirs of an American Cryptologic Pioneer</title>
    <author initials="F. B." surname="Rowlett" fullname="Frank B. Rowlett">
      <organization></organization>
    </author>
    <date year="1988"/>
  </front>
  <seriesInfo name="Aegean Park Press" value=""/>
</reference>
<reference anchor="Miller2020" target="https://www.washingtonpost.com/graphics/2020/world/national-security/cia-crypto-encryption-machines-espionage/">
  <front>
    <title>The Intelligence Coup of the Century</title>
    <author initials="G." surname="Miller" fullname="Greg Miller">
      <organization></organization>
    </author>
    <date year="2020" month="February"/>
  </front>
  <seriesInfo name="The Washington Post" value=""/>
</reference>
<reference anchor="Baldwin2022" target="https://drenigma.org/2022/03/02/did-britain-sell-enigmas-postwar/">
  <front>
    <title>Did Britain Sell Enigmas Postwar?</title>
    <author initials="M." surname="Baldwin" fullname="Mark Baldwin">
      <organization></organization>
    </author>
    <date year="2022"/>
  </front>
  <seriesInfo name="Dr. Enigma (blog)" value=""/>
</reference>
<reference anchor="Broad1982" >
  <front>
    <title>Evading the Soviet Ear at Glen Cove</title>
    <author initials="W. J." surname="Broad" fullname="William J. Broad">
      <organization></organization>
    </author>
    <date year="1982"/>
  </front>
  <seriesInfo name="Science" value="217 (3): 910–11"/>
</reference>
<reference anchor="Landau1988" >
  <front>
    <title>Zero Knowledge and the Department of Defense</title>
    <author initials="S." surname="Landau" fullname="Susan Landau">
      <organization></organization>
    </author>
    <date year="1988"/>
  </front>
  <seriesInfo name="Notices of the American Mathematical Society [Special Article Series]" value="35 (1): 5–12"/>
</reference>
<reference anchor="Landau2014" >
  <front>
    <title>Under the Radar: NSA’s Efforts to Secure Private-Sector Telecommunications Infrastructure</title>
    <author initials="S." surname="Landau" fullname="Susan Landau">
      <organization></organization>
    </author>
    <date year="2014"/>
  </front>
  <seriesInfo name="Journal of National Security Law &amp; Policy" value="Vol 7, No. 3"/>
</reference>
<reference anchor="Johnson1998" target="https://www.nsa.gov/portals/75/documents/news-features/declassified-documents/cryptologic-histories/cold_war_iii.pdf">
  <front>
    <title>American Cryptology During the Cold War, 1945-1989; Book III: Retrenchment and Reform</title>
    <author initials="T. R." surname="Johnson" fullname="Thomas R. Johnson">
      <organization></organization>
    </author>
    <date year="1998"/>
  </front>
  <seriesInfo name="NSA" value=""/>
</reference>
<reference anchor="Kostyuk2022" target="https://www.harvardnsj.org/wp-content/uploads/sites/13/2022/06/Vol13Iss2_Kostyuk-Landau_Dual-EC-DRGB.pdf">
  <front>
    <title>Dueling Over DUAL_EC_DRBG: The Consequences of Corrupting a Cryptographic Standardization Process</title>
    <author initials="N." surname="Kostyuk" fullname="Nadyia Kostyuk">
      <organization></organization>
    </author>
    <author initials="S." surname="Landau" fullname="Susan Landau">
      <organization></organization>
    </author>
    <date year="2022"/>
  </front>
  <seriesInfo name="Harvard National Security Journal" value="13 (2): 224–84"/>
</reference>
<reference anchor="Ferran2014" target="https://abcnews.go.com/blogs/headlines/2014/05/ex-nsa-chief-we-kill-people-based-on-metadata">
  <front>
    <title>Ex-NSA Chief: "We Kill People Based on Metadata"</title>
    <author initials="L." surname="Ferran" fullname="Lee Ferran">
      <organization></organization>
    </author>
    <date year="2014" month="May"/>
  </front>
  <seriesInfo name="ABC News" value=""/>
</reference>
<reference anchor="Adrian2015" target="https://weakdh.org/imperfect-forward-secrecy.pdf">
  <front>
    <title>Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice.</title>
    <author initials="D." surname="Adrian" fullname="David Adrian">
      <organization></organization>
    </author>
    <author initials="K." surname="Bhargavan" fullname="Karthikeyan Bhargavan">
      <organization></organization>
    </author>
    <author initials="Z." surname="Durumeric" fullname="Zakir Durumeric">
      <organization></organization>
    </author>
    <author initials="P." surname="Gaudry" fullname="Pierrick Gaudry">
      <organization></organization>
    </author>
    <author initials="M." surname="Green" fullname="Matthew Green">
      <organization></organization>
    </author>
    <author initials="J. A." surname="Halderman" fullname="J. Alex Halderman">
      <organization></organization>
    </author>
    <author initials="N." surname="Heninger" fullname="Nadia Heninger">
      <organization></organization>
    </author>
    <date year="2015"/>
  </front>
  <seriesInfo name="Proceedings of the 22th ACM Conference on Computer and Communications Security (CCS)" value=""/>
</reference>
<reference anchor="BellovinRescorla2006" target="https://www.cs.columbia.edu/~smb/papers/new-hash.pdf">
  <front>
    <title>Deploying a New Hash Algorithm</title>
    <author initials="S. M." surname="Bellovin" fullname="Steven M. Bellovin">
      <organization></organization>
    </author>
    <author initials="E. K." surname="Rescorla" fullname="Eric K. rescorla">
      <organization></organization>
    </author>
    <date year="2006"/>
  </front>
  <seriesInfo name="Proceedings of NDSS '06" value=""/>
</reference>
<reference anchor="Blaze1994" target="http://www.mattblaze.org/papers/eesproto.pdf">
  <front>
    <title>Protocol Failures in the Escrowed Encryption Standard</title>
    <author initials="M." surname="Blaze" fullname="Matt Blaze">
      <organization></organization>
    </author>
    <date year="1994"/>
  </front>
  <seriesInfo name="Proceedings of Second ACM Conference on Computer and Communications Security" value=""/>
</reference>
<reference anchor="Checkoway2016" target="https://dl.acm.org/citation.cfm?id=2978395">
  <front>
    <title>A Systematic Analysis of the Juniper Dual EC Incident</title>
    <author initials="S." surname="Checkoway" fullname="Stephen Checkoway">
      <organization></organization>
    </author>
    <author initials="J." surname="Maskiewicz" fullname="Jacob Maskiewicz">
      <organization></organization>
    </author>
    <author initials="C." surname="Garman" fullname="Christina Garman">
      <organization></organization>
    </author>
    <author initials="J." surname="Fried" fullname="Joshua Fried">
      <organization></organization>
    </author>
    <author initials="S." surname="Cohney" fullname="Shaanan Cohney">
      <organization></organization>
    </author>
    <author initials="M." surname="Green" fullname="Matthew Green">
      <organization></organization>
    </author>
    <author initials="N." surname="Heninger" fullname="Nadia Heninger">
      <organization></organization>
    </author>
    <author initials="R. P." surname="Weinmann" fullname="Ralf-Philipp Weinmann">
      <organization></organization>
    </author>
    <author initials="E." surname="Rescorla" fullname="Eric Rescorla">
      <organization></organization>
    </author>
    <author initials="" surname="Hovav Shacham" fullname="Hovav Shacham">
      <organization></organization>
    </author>
    <date year="2016"/>
  </front>
  <seriesInfo name="Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security" value="468–79"/>
</reference>
<reference anchor="Levy2001" >
  <front>
    <title>Crypto: How the Code Rebels Beat the Government—Saving Privacy in the Digital Age</title>
    <author initials="S." surname="Levy" fullname="Steven Levy">
      <organization></organization>
    </author>
    <date year="2001"/>
  </front>
  <seriesInfo name="Viking" value=""/>
</reference>
<reference anchor="Moore2015" target="https://www.rapid7.com/blog/post/2015/12/20/cve-2015-7755-juniper-screenos-authentication-backdoor/">
  <front>
    <title>CVE-2015-7755: Juniper ScreenOS Authentication Backdoor</title>
    <author initials="H. D." surname="Moore" fullname="H.D. Moore">
      <organization></organization>
    </author>
    <date year="2015"/>
  </front>
  <seriesInfo name="Rapid7 Blog" value=""/>
</reference>
<reference anchor="Doria2012" target="https://www.internetsociety.org/resources/doc/2012/human-rights-and-internet-protocols-comparing-processes-and-principles/">
  <front>
    <title>Human Rights and Internet Protocols: Comparing Processes and Principles</title>
    <author initials="A." surname="Doria" fullname="Avri Doria">
      <organization></organization>
    </author>
    <author initials="J." surname="Liddicoat" fullname="Joy Liddicoat">
      <organization></organization>
    </author>
    <date year="2012"/>
  </front>
  <seriesInfo name="The Internet Society" value=""/>
</reference>
<reference anchor="Garfinkel1995" >
  <front>
    <title>GPG: Pretty Good Privacy</title>
    <author initials="S." surname="Garfinkel" fullname="Simson Garfinkel">
      <organization></organization>
    </author>
    <date year="1995"/>
  </front>
  <seriesInfo name="O'Reilly and Associates" value=""/>
</reference>
<reference anchor="Masnick2023" target="https://copia.is/library/unintended-consequences/">
  <front>
    <title>The Unintended Consequences of Internet Regulation</title>
    <author initials="M." surname="Masnick" fullname="Mike Masnick">
      <organization></organization>
    </author>
    <date year="2023"/>
  </front>
</reference>
<reference anchor="Roth2022" target="https://www.theverge.com/2022/3/5/22962822/internet-backbone-provider-cogent-shuts-off-service-russia">
  <front>
    <title>Internet backbone provider shuts off service in Russia</title>
    <author initials="E." surname="Roth" fullname="Emma Roth">
      <organization></organization>
    </author>
    <date year="2022" month="March"/>
  </front>
  <seriesInfo name="The Verge" value=""/>
</reference>
<reference anchor="zubhoff2019" >
  <front>
    <title>The age of surveillance capitalism, The fight for a human future at the new frontier of power</title>
    <author initials="S." surname="Zuboff" fullname="Shoshana Zuboff">
      <organization></organization>
    </author>
    <date year="2019"/>
  </front>
  <seriesInfo name="Profile Books, ISBN 9781781256855" value=""/>
</reference>
<reference anchor="Badii2023" target="https://digitalmedusa.org/wp-content/uploads/2023/05/SanctionsandtheInternet-DigitalMedusa.pdf">
  <front>
    <title>Sanctions and the Internet</title>
    <author initials="F." surname="Badii" fullname="Farzaneh Badii">
      <organization></organization>
    </author>
    <date year="2023"/>
  </front>
</reference>
&RFC7687;
&RFC7258;
&RFC8446;
&I-D.ietf-tls-esni;
&RFC7858;
&RFC8484;
&RFC7540;
&RFC9000;
&I-D.farrelll-mpls-opportunistic-encrypt;
&RFC8461;
&RFC7217;
&RFC8064;
&RFC8981;
&RFC1984;
&RFC6462;
&RFC7480;
&RFC7481;
&RFC9082;
&RFC9083;
&RFC7484;
&RFC8056;
&RFC8280;
&DOI.10.5325_jinfopoli.11.2021.0376;
&RFC3365;


    </references>


<section anchor="changes-from-earlier-versions"><name>Changes from Earlier Versions</name>

<t>Draft -01:</t>

<t><list style="symbols">
  <t>Changes based on ISE review</t>
</list></t>

<t>Draft -00:</t>

<t><list style="symbols">
  <t>Initial revision</t>
</list></t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

