Fwd: HiveCache - P2P Backups

2003-01-22 Thread R. A. Hettinga

--- begin forwarded text


Status: RO
Date: Tue, 21 Jan 2003 14:36:40 -0800
To: [EMAIL PROTECTED]
From: Fearghas McKay [EMAIL PROTECTED]
Subject: Fwd: HiveCache - P2P Backups
Reply-To: Usual People List [EMAIL PROTECTED]
Sender: [EMAIL PROTECTED]


--- begin forwarded text


From: Peter Gradwell [EMAIL PROTECTED] (by way of Fearghas McKay
[EMAIL PROTECTED])
To: [EMAIL PROTECTED]
Subject: HiveCache - P2P Backups
Date: Tue, 21 Jan 2003 14:04:35 -0800

Hello

Apologies for the intrusion. As well has running an ISP, I have an
interest in Grid Computing systems and micro accounting architectures.

As part of the interest, I would like to deploy a product called
HiveCache (www.hivecache.com) to my customer base, and others
interested.

HiveCache is a p2p backup system where by you define an amount of disk
space available on your machine (which is connected via broadband of
course!) and vice versa, your files get split up, encrypted and then
stored on everyone elses' disk space.

HiveCache does all sorts of clever things, like making sure enough
copies are kept in various places, files are split  encrypted,
allowing you to retrieve them, etc.

Ultimately, I would like to faciliate a system where by we act as a
clearing house so that users can buy  sell disk space  resources.

In order to get going however, I would like to take part in the
HiveCache pilot. To do this, I require 25-50 willing volunteers.

You will need:

- an always on broadband connection
- a few gig of spare disk space
- a little enthusiasm and a willingness to return comments

If that sounds like you, then please could you drop an email to
[EMAIL PROTECTED] stating your
- name,
- email,
- type of internet connection and
- what operating system you're running on.

Any questions, let me know.

many thanks
peter

-- 
peter gradwell. gradwell dot com Ltd. http://www.gradwell.com/
engineering  hosting services for email, web and usenet

--- end forwarded text

--- end forwarded text


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



Re: Verizon must comply with RIAA's DMCA subpoena

2003-01-22 Thread Will A. Rodger
William Allen Simpson says, of the Verizon decision:
 wrote:

All this to learn the identity of a computer at a particular IP address.
Presumbly, Verizon will now be smart enough to say: All of our IP
addresses are assigned using DHCP, and we have no record of the name
of any subscriber associated with an IP address.

Declan adds:

I was thinking along the same lines. This seems to be a market 
opportunity 
for an Internet provider that keeps no IP address-identity records for 
more than a few minutes or hours.

That would be a wise move. That would continue for about three weeks, and 
then we'd see a bill out of Congress demanding that ISPs retain identity 
for, oh, maybe seven years?

Will Rodger
Director Public Policy
CCIA
www.ccianet.org


-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



RE: Verizon must comply with RIAA's DMCA subpoena

2003-01-22 Thread Ian Brown
 That would be a wise move. That would continue for about three weeks, and
 then we'd see a bill out of Congress demanding that ISPs retain identity
 for, oh, maybe seven years?

UK law enforcement is already asking for this for two years, and subscriber
details (name, address, payment mechanisms etc.) for five years:
http://www.guardian.co.uk/bigbrother/privacy/statesurveillance/story/0,12382
,790124,00.html

Oh, and they want a global system.



-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



Verizon appeals gainst RIAA's DMCA subpoena

2003-01-22 Thread Francois Grieu
source:
http://www.theregister.co.uk/content/6/28976.html

Verizon appeals a court decision that it has to diclose one of its 
subscriber's identity following RIAA's claims that this subscriber 
illegally shared (or is it downloaded) copyrighted works.

Rationale for the appel includes that complying would opens the door 
for anyone who makes a mere allegation of copyright infringement to 
gain complete access to private subscriber information without the 
due process protections afforded by the courts.

  Francois Grieu

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


[ISN] REVIEW: Internet Cryptography, Richard E. Smith

2003-01-22 Thread R. A. Hettinga

--- begin forwarded text


Status: RO
Date: Wed, 22 Jan 2003 05:49:54 -0600 (CST)
From: InfoSec News [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: [ISN] REVIEW: Internet Cryptography, Richard E. Smith
Sender: [EMAIL PROTECTED]
Reply-To: InfoSec News [EMAIL PROTECTED]

Forwarded from: Rob, grandpa of Ryan, Trevor, Devon  Hannah
[EMAIL PROTECTED]

BKINTCRP.RVW   20021215

Internet Cryptography, Richard E. Smith, 1997, 0-201-92480-3,
U$29.95/C$44.95
%A   Richard E. Smith [EMAIL PROTECTED]
%C   P.O. Box 520, 26 Prince Andrew Place, Don Mills, Ontario  M3C 2T8
%D   1997
%G   0-201-92480-3
%I   Addison-Wesley Publishing Co.
%O   U$29.95/C$44.95 416-447-5101 fax: 416-443-0948 [EMAIL PROTECTED]
%O  http://www.amazon.com/exec/obidos/ASIN/0201924803/robsladesinterne
%P   356 p.
%T   Internet Cryptography

According to the preface, this book is aimed at non-specialists who
need to know just enough about cryptography to make informed technical
decisions.  As an example, Smith suggests systems administrators and
managers who, while not formally charged with security, still have to
use cryptographic techniques to secure their networks or
transmissions.

Chapter one is an introduction, contrasting what we want; secure
communications; with the environment we have to work in; a wide open
Internet.  The text also looks at the balance that must be maintained
between convenience and requirements.  Encryption basics, in chapter
two, presents the concepts of symmetric cryptography, use, and choice.
There is a clear explanation of the ideas without overwhelming
technical details.  (It is interesting to note how quickly the
cryptographic technology changes: SKIPJACK and ITAR were still
important when the book was written, and are now basically
irrelevant.)  Some random thoughts on network implementation of
encryption are given in chapter three.  Managing secret keys, in
chapter four, provides good conceptual coverage of generation and
management, although the discussion of the problems of key escrow is
weak.  Because of the requirements for technical details when
discussing protocols, chapter five, on IPSec, is different from other
material in the book.  It also includes a brief mention of other
protocols.  Chapter six discusses the use of IPSec in virtual private
networks, while seven examines IPSec in terms of remote access.
Chapter eight looks at IPSec in relation to firewalls, but it is
difficult to see how this would be used in an actual application.

Chapter nine reviews public key encryption and SSL (Secure Sockets
Layer).  The basic concepts of asymmetric cryptography are presented
well, but may be unconvincing due to the lack of mathematical support
and details.  While there is an introduction to the related idea of
digital signatures, SSL is really only barely mentioned.  World Wide
Web transaction security, in chapter ten, provides practical examples
of the technologies discussed.  The same is true of email, in chapter
eleven, but digital signatures get a bit more explanation.  Chapter
twelve builds on the signature concept to introduce PKI (Public Key
Infrastructure) notions.

The fundamentals are written clearly and well, and are quite suitable
for managers and users.  Despite the lack of detail, the text may even
be suitable for some security professionals who need a rough
background without needing to work with the technology itself.  The
work is easy to read, although the idiosyncratic structure may be
confusing, and the value of some chapters questionable.

copyright Robert M. Slade, 2002   BKINTCRP.RVW   20021215

-- 
==
[EMAIL PROTECTED]  [EMAIL PROTECTED]  [EMAIL PROTECTED] [EMAIL PROTECTED]
Find book info victoria.tc.ca/techrev/ or sun.soci.niu.edu/~rslade/
Upcoming (ISC)^2 CISSP CBK review seminars (+1-888-333-4458):
February 10, 2003   February 14, 2003   St. Louis, MO
March 31, 2003  April 4, 2003   Indianapolis, IN



-
ISN is currently hosted by Attrition.org

To unsubscribe email [EMAIL PROTECTED] with 'unsubscribe isn'
in the BODY of the mail.

--- end forwarded text


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



Re: Verizon must comply with RIAA's DMCA subpoena

2003-01-22 Thread tpurdy
On Wed, 22 Jan 2003 16:18:47 -, Ian Brown [EMAIL PROTECTED]
wrote:

 That would be a wise move. That would continue for about three weeks, and
 then we'd see a bill out of Congress demanding that ISPs retain identity
 for, oh, maybe seven years?

UK law enforcement is already asking for this for two years, and subscriber
details (name, address, payment mechanisms etc.) for five years:
http://www.guardian.co.uk/bigbrother/privacy/statesurveillance/story/0,12382
,790124,00.html

Oh, and they want a global system.

That rips it.

I'm conserving juice at the outlet, which limits my entertainment
options and makes me much less of a consumer; new cars have/will-have
GPS to track my donut foraging travels, and are made like crap, so I'm
definitely not buying another; I'm already boycotting all music and
video media, due the goofiness in Hollywood; and now I'll say goodbye to
ISPs that narc for the world government -- 1st world gov, 3rd world, I'm
not sure and who can tell the difference, today anyway.

Does any portion of whatever world government have totalistic designs on
the Yukon?  Sure, the canadian government probably has a stack of
tourist/emmigration forms to fill out, and they'd hate it if I just
dropped out of sight there.  But, if I wore a white parka and ski pants,
I'd look just like another underfed polar bear.  Surely polar bears
aren't on anyone's hit-list?

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



Re: Fwd: HiveCache - P2P Backups

2003-01-22 Thread John Ioannidis
Take a look at the following paper:

@inproceedings{fileteller,
  author = {John Ioannidis and Sotiris Ioannidis and Angelos Keromytis and Vass
ilis Prevelakis},
  title = {{Fileteller: Paying and Getting Paid for File Storage}},
  booktitle = {Proceedings of the Sixth International Conference on Financial C
ryptography},
  month = {March},
  year = {2002}
}



On Tue, Jan 21, 2003 at 11:42:28PM -0500, R. A. Hettinga wrote:
 
 --- begin forwarded text
 
 
 Status: RO
 Date: Tue, 21 Jan 2003 14:36:40 -0800
 To: [EMAIL PROTECTED]
 From: Fearghas McKay [EMAIL PROTECTED]
 Subject: Fwd: HiveCache - P2P Backups
 Reply-To: Usual People List [EMAIL PROTECTED]
 Sender: [EMAIL PROTECTED]
 
 
 --- begin forwarded text
 
 
 From: Peter Gradwell [EMAIL PROTECTED] (by way of Fearghas McKay
 [EMAIL PROTECTED])
 To: [EMAIL PROTECTED]
 Subject: HiveCache - P2P Backups
 Date: Tue, 21 Jan 2003 14:04:35 -0800
 
 Hello
 
 Apologies for the intrusion. As well has running an ISP, I have an
 interest in Grid Computing systems and micro accounting architectures.
 
 As part of the interest, I would like to deploy a product called
 HiveCache (www.hivecache.com) to my customer base, and others
 interested.
 
 HiveCache is a p2p backup system where by you define an amount of disk
 space available on your machine (which is connected via broadband of
 course!) and vice versa, your files get split up, encrypted and then
 stored on everyone elses' disk space.
 
 HiveCache does all sorts of clever things, like making sure enough
 copies are kept in various places, files are split  encrypted,
 allowing you to retrieve them, etc.
 
 Ultimately, I would like to faciliate a system where by we act as a
 clearing house so that users can buy  sell disk space  resources.
 
 In order to get going however, I would like to take part in the
 HiveCache pilot. To do this, I require 25-50 willing volunteers.
 
 You will need:
 
 - an always on broadband connection
 - a few gig of spare disk space
 - a little enthusiasm and a willingness to return comments
 
 If that sounds like you, then please could you drop an email to
 [EMAIL PROTECTED] stating your
 - name,
 - email,
 - type of internet connection and
 - what operating system you're running on.
 
 Any questions, let me know.
 
 many thanks
 peter
 
 -- 
 peter gradwell. gradwell dot com Ltd. http://www.gradwell.com/
 engineering  hosting services for email, web and usenet
 
 --- end forwarded text
 
 --- end forwarded text
 
 
 -- 
 -
 R. A. Hettinga mailto: [EMAIL PROTECTED]
 The Internet Bearer Underwriting Corporation http://www.ibuc.com/
 44 Farquhar Street, Boston, MA 02131 USA
 ... however it may deserve respect for its usefulness and antiquity,
 [predicting the end of the world] has not been found agreeable to
 experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
 
 -
 The Cryptography Mailing List
 Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]