"Documents leaked by former NSA contractor Edward Snowden show that the NSA created and promulgated a flawed formula for generating random numbers to create a "back door" in encryption products, the New York Times reported in September."Enough about the alleged wrongdoings of an encryption company and our own National Security Agency. Whether they did it, or they didn't, needs to be vetted in public, and RSA not denying the allegations is making this issue even more interesting. But let's talk about some of the fallout in the security community.
What has become interesting is the slow trickle of #InfoSec echo chamber big-shots that have been 'cancelling their talk' at RSA. Now, I'm not criticizing anyone's moral imperative ... but if you're cancelling your talk/training/etc long after many of the attendees have purchased their tickets and scheduled their attendance - who are you really hurting? This is a sticking point with me. If you're going to take a stand against RSA's alleged malfeasance, then you should do it in a way that creates the least amount of collateral damage, and cancelling your talk or training is a, in my personal opinion, poor choice.
So, here are a few things you could do instead of cancelling your appearance and screwing over attendees:
- Make a T-shirt that says "RSA has violated our trust" and wear it during your talk
- Take 2 minutes at the start of you talk, and discuss the issue you're taking with RSA's alleged behavior
- Blog about the issue and publicize it
- Change your talk, without telling the organizers, to be about the damage that their alleged wrong-doing have caused
- Speak at the conference, but refuse to give RSA any positive press
- Speak at Security BSides SF and draw attention to the issue
- Make a sign and stand outside the RSA Conference venue in protest
- Refuse to buy/use/endorse RSA products/services
- Urge others to refuse to buy/use/endorse RSA products/services
- Work with the industry to identify and flag uses of the weakened crypto component in software packages - as a vulnerability finding