principle 1: no keys used to secure communications in any part of the system are a-priori escrowed with third parties
principle 2: second crypto recipients on encrypted communications should not be used to allow access to third parties who are not messaging recipients manually selected by the sender
principle 3: communications should be encrypted to the minimum number of recipients (typically one), and those keys should have as short a life time as is practically possible
principle 4: deployment wins. Violating any of
principles 1, 2 or 3 whilst still remaining better than GAK-neutral
can be justified where deployment is thereby increased to the extent
that the reduced GAK resistance of the product can be justified by the
overall increase in GAK resistancy in the target jurisdictions. This
can be expressed loosely as the equation:
introduced resistancy =
deployment x resistancy rating
Corollary 2: where communications are transmitted in ways which violate principles 1, 2 or 3 it is in general more GAK resistant to enforce as far as possible that the recovery or escrow information remains in as close proximity to the data as possible, and as much under the control of the user as possible.
Corollary 3: where communications are transmitted which violate principles 1, 2 or 3 it is in general more GAK resistant to make these communications as difficult to automate as possible. For example no scripting support is given thereby weakly enforcing that GUI user interaction is required, and/or that the recovery process is made artificially time consuming (by not storing all bits of the key thereby weakly forcing the use of brute force to recover the key), and/or that the communication could use non electronic, or hard to automate communication channels
Corollary 4: Where a profit function outside the individuals control interferes with GR maximisation of principle 4, continuing in this environment may be justifiable where this tactic helps promote global GAK resistance in the target jursidiction. Examples of novel ways of making the best of this imposed profit function overlayed on the solution space of designs may be: attempts to subvert standardisation processes to make the standards GAK resistant even for GAK neutral developers, or to code GAK resistant implementations for GR-neutral employers without informing them of these coding decisions, or to promote GR implementation and protocol design to contacts in the cryptographic developer community, or to anonymously release useful proprietary GR optimisation technology, or to sabotage ergonomics or reliability functions in implementations of very low GR rated designs.
Comments to the lists or to me (Adam Back) at <adam@cypherspace.org>