Podcast
Root Causes 353: Why Isn't PKI Everywhere?


Hosted by
Tim Callan
Chief Compliance Officer
Jason Soroko
Fellow
Original broadcast date
January 10, 2024
Our hosts firmly believe that PKI is a necessary component of all digital interactions. And yet there are still gaps in PKI implementation. We discuss these gaps and why they persist.
Podcast Transcript
Lightly edited for flow and brevity.
So I think what you are saying, Tim, is let’s call out some of the surprising areas where it still isn’t and probably should be. I think that’s what’s interesting to me.
It’s a real mix. And it’s surprising. Because your smartphones, for example, consumer-level technology. But it’s very advanced and, my goodness, it is incredibly prevalent within the iPhone environment and any of the devices that typically host Android, etc. There are keys and certificates all over. In other words, asymmetric secrets are doing all three of those things.
Right? All over. But, and yet, there’s all kinds of consumer-level systems that are, you know, burgeoning IoT systems, for example.
The second thing I think related to that is flexibility in use of chipsets. All these things have chips. There tends to be a relatively small number of fairly standard chips that are used for many, many, many, many use cases. And manufacturers want to be able to source these chips out of Taiwan and they want flexibility. They want to be able to go from manufacturer to manufacturer, get a quote. How many can you get me? What’s it gonna cost? And when can you deliver it? And they want to pick the quote that best suites those three. And trying to suddenly lock yourself into some kind of PKI algorithm at the chip level just hurts their flexibility in creating their bomb. And again, they choose that over the security. And why is that? That’s because the market doesn’t reward security.
Because there is some effort that’s required. There’s some effort that’s required. Like, for example, Apple and Samsung have the capability to design it in. And so they do. Right? They do.
Not only is there technical debt and it’s tough to refactor but, also, people who set up critical systems are experts in uptime. And we’ve talked about this before. True, true heroes of making things that have to work always work. And by introducing rule sets around asymmetric secrets, they risk that.
What do I even do?
In just about all modern vehicles. And so, imagine if you were encrypting the communication between the systems, between the different modules within the vehicle and, you know, whether there’s an authentication sequence or even just making sure, Tim, that even if you are not encrypting, even if you’re not authenticating, is every single computer system within the car, does it have a signed firmware so that it doesn’t get changed by some sort of malicious over-the-air update event.
Without finance systems sloshing money back and forth across the world all day long every day, our society would probably come to a standstill. And that’s the truth. And yet, there’s very few systems that have more encryption, authentication and signing in those systems.
It’s completely ubiquitous and prevalent within finance and so what I’d like to say is there are examples of critical systems that do use it.
Logins. Freakin’ logins. And I don’t even mean logins on your little consumer site where I don’t know anything about computers, and it’s deemed to be a low stakes kind of environment. And you and I have talked about the horror show that is passwords more times than we can count but logins at the enterprise level. Logins for people who work for large companies or government or places where they absolutely have the knowledge and the acumen and the resources to get it right and the stakes are high and yet I’m still logging in with username and password. You know, basic shared secret strategies. What’s going on there?

