User:Gmaxwell/things im surprised dont exist: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 1: | Line 1: | ||
Now that we have crypto-currency it's obvious that we are living in the future, — Where is my flying car? | |||
Here are some things which I'm surprised don't exist (at all or beyond research toys)… | |||
* Practical high latency mix networks. | * Practical high latency mix networks. |
Revision as of 21:35, 26 June 2014
Now that we have crypto-currency it's obvious that we are living in the future, — Where is my flying car?
Here are some things which I'm surprised don't exist (at all or beyond research toys)…
- Practical high latency mix networks.
- All realtime tools like tor an I2P have inherently poor privacy. There are many applications that want privacy (email like uses, bitcoin transactions) which are highly delay tolerant... but there are no modern cryptographic privacy networks that make use of this fact. There is a flooding privacy network (bitmessage) but the design is awkward and flooding only has (at best) strong reviver privacy.
- Usable cryptographic voting tools
- Okay, the whole lofty goal of replacing public political elections is a bit deal and it's not surprising that it's not done... but where are the tools where I and my IRC computer geek friends can use to have an informal secret ballot election to vote someone off the island?
- Usable cryptographic auction tools
- Like the above though the result is slightly different
- Threshold cryptography ... anywhere except bitcoin
- E.g. why can't a software team use 3 of 5 gpg signing for its releases?
- Encrypted, authenticated, reputable multiparty chat
- Dear lord, why the @#$@ are we still using IRC?
- Strong steganography
- The invention of wet paper codes and perturbed quantization, in theory, allow embedding hidden messages in noisy multimedia content in ways which are arbitrarily indistinguishable even to an observer with perfect knoweldge of the encoder (but not the original image or message). The idea is that the image is decoded with a very high rate error correcting code, allowing the sender free choice over what bits they distort to encode their message— and they can use powerful image statistics on higher resolution versions of the image to determine where their distortion will be least detectable. Yet there are no public implementations of the most efficient codes or of embedders with strong statistical models
- High security microprocessor architectures
- Why does valgrind level tracing exist only in the form of a 10-100x slowdown, why isn't there security more fine grained than NX— things like capability security in hardware? Many applications don't need high performance, using additional transistors to increase security would be a big win— intel MPX is a small move in this direction, but a pretty limited one.
- Usage systems languages setup to facilitate formal methods to prevent software being the orgy of fail that it is today
- There is a little progress here, ATS has strong facilitation for formal methods though its not very usable. Rust achieves a high level of usability, but is only much stronger than C/C++ for memory safety.
- Remote attestation
- The IBM cryptocards implement a strong functionality where a tamper resistant and detecting computer on a card can run code and produce a certificate chain, traceable to IBM, that gives you pretty good confidence that the code which is claimed to be running on it actually is. This lets mutually distrusting parties have some trustworthy shared computation. Though the security is limited to the (fairly strong tamper resistance) this kind of remote attest has many of the same applications as homemorphic encryption, secure multiparty computation, and program obfuscation with good performance and without a mathematical breakthrough. But the cryptocard is the only product I'm aware of offering this, and I'm not aware of any public service using it. The remote attest efforts around things like Intel TXT appear to be far weaker (and also not widely deployed).