DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports Events Over 2 million developers have joined DZone. Join Today! Thanks for visiting DZone today,
Edit Profile Manage Email Subscriptions Moderation Admin Console How to Post to DZone Article Submission Guidelines
View Profile
Sign Out
Refcards
Trend Reports
Events
Zones
Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
  1. DZone
  2. Software Design and Architecture
  3. Security
  4. Crap tech industry metaphors

Crap tech industry metaphors

Matt Ballantine user avatar by
Matt Ballantine
·
Feb. 21, 15 · Interview
Like (0)
Save
Tweet
Share
1.20K Views

Join the DZone community and get the full member experience.

Join For Free

So, right, imagine that you’ve got a padlock. And imagine that that padlock has got two keyholes, and can only be unlocked if both keys are used. But the key to lock the padlock is different to the key that is used to unlock the padlock, and whilst you are the only person who has one of those keys, the rest of the entire world has access to the other key so that means that they can unlock things that, erm, oh, wait, you can unlock things that you’ve locked so that erm. Err. Have you seen how much it costs to get a key cut at Simpson’s these days?

Metaphors are a wonderful thing. They help us to make complicated things understandable by those without deep technical expertise. But sometimes this simplification becomes metaphor’s biggest weakness. And that’s where we’ve got to with the Public Key/Private Key metaphor to describe complex digital encryption models, and potentially why politicians seem to be getting all confused about banning encryption in ways that are basically impossible in a Public/Private Key system. Because politicians are seeming to think that within encryption models that use Public and Private Keys, third parties like ISPs hold magic skeleton keys that can unlock anything at will. And they don’t – because otherwise it would be called public/private/magic skeleton keys encryption.

Now it’s easy to point at politicians and journalists at this point and yell that they are all stupid. But they’re not (well, if they are, this debacle isn’t the conclusive evidence). Public/Private key encryption is tricky for normal people to get their heads around, and because of the analogy that is based around the simple and understandable objects like physical keys, misinterpretation of the subject is easy.

What to do instead? Well, sometimes complicated things aren’t distillable down into easily understood, soundbiteable chunks. Some things are, actually, quite complicated. As it is with encryption: modern digital encryption allows me to seal something up in a way that means that only people who I want to see it probably can. Probably, because nothing is entirely secure. The you are just going to have to leave the rest to your trust in some rather complicated maths. If you want to know more, read Simon Singh’s rather spiffing book on the subject.

Skeleton (computer programming) Threading Trust (business) security Book Journalist IT

Opinions expressed by DZone contributors are their own.

Popular on DZone

  • Using AI and Machine Learning To Create Software
  • A Simple Union Between .NET Core and Python
  • Writing a Modern HTTP(S) Tunnel in Rust
  • SAST: How Code Analysis Tools Look for Security Flaws

Comments

Partner Resources

X

ABOUT US

  • About DZone
  • Send feedback
  • Careers
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 600 Park Offices Drive
  • Suite 300
  • Durham, NC 27709
  • support@dzone.com
  • +1 (919) 678-0300

Let's be friends: