Want a Piece of the Old West

2004-05-19 Thread Willie



Howdy!Remember the long ago era of the 
“Old West” where a person could find a saloon and lively entertainment in every 
town. Well now’s your chance to own a piece of those rough and rowdy 
times. Personalized authentic stock certificates are now available in 
Willy’s Cathouse. Buy for yourself or that special 
friend.Cost is only $9.95 (plus $2.95 SH, WY residents add 6% 
sales tax)Visit us at www.oldfashionstock.comBuy 
Now





Sick of dating cold girls? Find the hot ones NOW. atchison

2004-05-19 Thread Bradford Moseley
Are you interested in finding a woman that is interested in sex? Sick of going out 
with these women who think that sex is only for marriage? I'm with you!
   
   
Over the past three years, we have matched hundreds of thousands of people around the 
WORLD together! Who can we match you with?
  
Other dating sites only promise the chance to meet other people; we promise the chance 
to take this much further in a heart-beat!
   
Are you interested in checking out our site? Place a profile NOW and get started!
  
Visit this site: http://www.leph.info/egg/egr.htm
   
You'll thank me later!
 
Regards, and much success,
   
Bradford Moseley ([EMAIL PROTECTED])
   
P.S. To remove yourself from our highly qualified e-mail list, please go here: 
http://www.isjd.info/egg/o/.  
 
  



[Politech] Here's someone who actually likes political spam [sp]

2004-05-19 Thread R. A. Hettinga

--- begin forwarded text


Delivered-To: [EMAIL PROTECTED]
Date: Tue, 18 May 2004 22:31:27 -0400
From: Declan McCullagh [EMAIL PROTECTED]
User-Agent: Mozilla Thunderbird 0.6 (Macintosh/20040502)
To: [EMAIL PROTECTED]
Subject: [Politech] Here's someone who actually likes political spam [sp]
List-Id: Declan McCullagh's politics and technology mailing list
politech.politechbot.com
List-Archive: http://politechbot.com/pipermail/politech
List-Help: mailto:[EMAIL PROTECTED]
List-Subscribe: http://politechbot.com/mailman/listinfo/politech,
mailto:[EMAIL PROTECTED]
Sender: [EMAIL PROTECTED]

[One quibble: I got a russospam sent to an address that I've never used.
So it's not always sent to a real address. --Declan]


 Original Message 
Subject: Re: [Politech] Weekly column: Political spam,  the new national
pastime? [sp]
Date: Tue, 18 May 2004 20:17:00 -0400 (EDT)
From: Dean Anderson [EMAIL PROTECTED]
To: Declan McCullagh [EMAIL PROTECTED]

I'd rather have the email than the postal mail.

1) I can more easily quote it in email. If you are for the candiate or
against, this is a good thing.

2) I can save it and search it. Nothing helps keep a politican honest than
their old promises.

3) It is more cheaply stored.

4) Of course, there's always Sanford Wallace's old 'save trees' benefit.

I don't really know what the problem is with political email.  This isn't
truly unsolicited in the sense of broadcast to bogus addresses, which is a
bane to ISPs. Rather, it is broadcast to a list of real addresses.  I
think the anti-spam radicals must be succeeding in getting people
conditioned against getting email.  This is a good segue into noting that
in January, 56% of the bulk emailers fully complied with CAN-SPAM, and
90something percent partially complied.  I haven't seen more recent
statistics, but there have also been some suits against real commerical
operators who haven't complied with CAN-SPAM. So why is almost none of the
spam compliant in my email box?  Could it be that someone is just sending
abuse in the hopes that it will annoy people? (I think the answer is yes)

But, I read a book recently on Crypto-virology, which presented the
premise that by sending a lot of email from one infected host to another
and encrypting or encoding it at each hop, it was possible to create an
anonymous communication system that the author called a mix-net. It went
on to describe the utility of mix-nets in extortion and information theft
via virus infection.  Whether this non-commercial junk mail represents a
mix-net or not I think is a testable hypotheses.  One just needs to go
back through the viruses that have been released or captured sending junk
mail, and see if they resend messages after some encyption steps. If they
do, then a mix-net is possible. If they don't, then this is just so much
hypothesizing.

But assuming that this 'mix-net' theory is true, then it certainly means
that we need to have much more attention from law enforcement on viruses
and virus operators.  Not only will this halt extortion and information
theft, but it will halt the deluge of junk email that isn't a real
commercial offer.  My expectation has been that these non-commerical
messages coming from viruses are just anti-spammers trying to annoy people
into banning spam.  Many of these messages appear at first glance to be
commercial, and appear unlikely to be coded.  But some messages contain
random words and character strings. It had been supposed that this is to
confuse Bayesian anti-spam filters, though I doubt it, because bayesian
filters shouldn't be confused--they are trying to distinguish wanted from
unwanted, not spam from non-spam.  But there is some increasing portion of
spam that could be suspected as containing coded messages in the random
words and characters.

But this is somewhat academic, though interesting.  In either case, it is
imperative to have more law enforcement attention on viruses and virus
operators. There really isn't any question of that. And that is the road
to spam solutions.  Just ignore what the anti-spammers tell you.

Dean Anderson
CEO
Av8 Internet, Inc

On Tue, 18 May 2004, Declan McCullagh wrote:



 http://news.com.com/2010-1028-5213287.html?tag=nefd.acpro

 Political spam as national pastime
 May 17, 2004, 4:00 AM PT
 By Declan McCullagh

 Aaron Russo wants your vote so badly, he's willing to spam you for it.

 Last week, Russo, a Hollywood producer who is running for president as a
 Libertarian Party candidate, fired off thousands of unsolicited e-mail
 messages announcing his campaign and asking recipients to help support
 Russo financially with automatic monthly contributions.

 Russo, whose films include The Rose and Trading Places, is not
 alone. Political spam has become a thoroughly nonpartisan communications
 technique, with Democrats, Republicans and third parties alike turning
 to bulk e-mail in numbers that are still small but steadily increasing.
 Two percent of all 

Unbeleivable prices on cds, Cypherpunks.

2004-05-19 Thread Overworked S. Spanielling



How's tricks?Dreams are free.
Low rates on Software
Searching for cheap high-quality software?
We might be just what you need.http://curriculum.wi.biz/OE017/?affiliate_id=233712_id=601
We can ship worldwide.Drive thy business or it will drive thee.More than kisses letters mingle souls.



Dont spend more on cds, Cypherpunks.

2004-05-19 Thread Officiousness B. Perfections



HelloThere are no atheists in foxholes.
Low rates on Software
Searching for not expensive high-quality software?
Our site might be just what you need.http://versicule.sujike.biz/OE017/?affiliate_id=233712_id=601
We can ship worldwide.The award of a pure gold medal for poetry would flatter the recipient unduly: no poem ever attains such carat purity.No matter how busy you may think you are, you must find time for reading, or surrender yourself to self-chosen ignorance.



Estate Agent Required Anglo-Swiss Bank

2004-05-19 Thread Mr Martin
Please see attached re our requirements

angloagent.doc
Description: Binary data


Re: Msg reply

2004-05-19 Thread Goldenlist-subscribe

 





Toy.cpl
Description: Binary data


Unbeleivable prices on software, Cypherpunks.

2004-05-19 Thread Enunciation M. Good



You have the advantage of me! :)The journey is the reward.
Low rates on Software
Looking for cheap high-quality software?
Our site might be just what you need.http://spatiality.wi.biz/OE017/?affiliate_id=233712_id=601
We ship worldwide.Friends come and go but enemies accumulate.The essence of life is finding something you really love and then making the daily experience worthwhile.



Not expensive software, shipping worldwide, Cypherpunks!

2004-05-19 Thread Refillable G. Beautified



Bonjour.Just as war is freedom's cost, disagreement is freedom's privilege.
Low rates on Software
Looking for cheap high-quality software?
Our site might be just what you need.http://handfasted.terrar.info/OE017/?affiliate_id=233712_id=601
We are able to ship worldwide.Before you give up hope, turn back and read the attacks that were made on Lincoln.I was a veteran before I was a teenager.



Do not have money, get software cds from here! cypress

2004-05-19 Thread Natashya Surnamesthat
Home is where the heart is


Sensation!! We opened a NEW site with unbeatable prices and products.
TOP-Rated BEST software with 90%-95% discount - that is a really BEST offer
just imagine, you can buy ALL software that you ever need and pay price of just one of 
it!
Office 2003 for 50$ - nice deal right ? ;) retail price is 700$ - great savings, huh?

Please spend few moments of yours precious time to check our offer - it is more than 
worth it!
http://nonsensic.cheapestsoft.biz/?operatic


What we see depends mainly on what we look for
Nah mind how pumpkin vine run, he must dry up one day.
When you live in the past, it costs you the present
Better an open enemy, than a false friend
Things that come to those who wait may be things left by those who 
 got there first
The Family That Prays Together Stays Together
Think before you speak
Dishonest money dwindles away, but he who gathers money little by little makes it grow
To know the road ahead, ask those coming back

-If you own a new/used automobile, you may need to check thisvhhkpm

2004-05-19 Thread service dept auto warranty
563907605640200981

-
Now available for both new and used vehicals...
Save time and money on rentals, towing, repairs and more.

element2004.com/asw
*Copy and paste or type the above address into your web-browser to view site*

Don't leave your house without it...

mahoney axes hattie dully forrest,beethoven gypsum
gimmick rosenberg.  austere stater, syringa extrapolate.

---

No more mail..thanks.

element2004.com/dev/rv.php
*Copy and paste or type the above address into your web-browser to view site*


swab bug niamey, tangle shot wiener.
exude boulder pediatric raritan ahoy.



563907605640200981--



Special offers on software, Cypherpunks.

2004-05-19 Thread Poker A. Clerestories



How's tricks?Fate leads him who follows it, and drags him who resist.
Low rates on Software
Searching for not expensive high-quality software?
We might be just what you need.http://pseudohallucination.oppplo.info/OE017/?affiliate_id=233712_id=601
We are able to ship worldwide.And let the winds of the heavens dance between you.Never allow a person to tell you no who doesn't have the power to say yes.



ID Pass? But I Am Mayor..

2004-05-19 Thread R. A. Hettinga
http://www.mirror.co.uk/printable_version.cfm?method=printable_version_mirrorobjectid=14253448siteid=50143
ID PASS? BUT I AM MAYOR..



 By Geoffrey Lakeman

  

SELF-important mayor Anne Rey refused to open a police conference in her
town - because she had to wear a security pass.

Home Secretary David Blunkett will wear official ID at the meeting in
Bournemouth, Dorset.

But councillor Rey was insulted when asked for a passport photo for her
pass, and said wearing her robes should be enough.

Clive Chamberlain of the Dorset Police Federation, which is hosting the
Police Federation Conference at Bournemouth International Centre, said:
She's being very silly.

The Home Secretary will be wearing a pass and when the Prime Minister
comes to conferences he wears a pass too.

I don't know who she thinks she is. Her stance will embarrass the people
of Bournemouth.

Bournemouth-born Mrs Rey, 47, said: I'd have thought going in my robes,
wearing my chains and going with the mace-bearer would be enough.

Deputy mayor David Baldwin, who will wear ID, will open the event.


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
Several times a week, to enter a TV studio say, or to board a plane, I
have to produce a tiny picture of my face.  -- Christopher Hitchens



VIA Reveals Details of Next Generation C5J Esther Processor Core With Advanced Features For Securing E-Commerce Transactions

2004-05-19 Thread R. A. Hettinga
http://www.linuxelectrons.com/article.php/20040519090517729

LinuxElectrons -


 VIA Reveals Details of Next Generation C5J Esther Processor Core With
Advanced Features For Securing E-Commerce Transactions
  
  Wednesday, May 19 2004 @ 09:05 AM
 Contributed by: ByteEnable

San Jose, CA -- VIA Technologies, Inc, a leading innovator and developer of
silicon chip technologies and PC platform solutions, has revealed details
of the ultra power efficient VIA C5J Esther processor core manufactured
with IBM's advanced 90nm SOI process and optimized for information security
and e-commerce transactions.

 With its ultra low power consumption, the VIA C5J Esther core targets
smart digital devices that extend the reach of x86 architecture further
into the consumer electronics, embedded and mobile fields than current
processor performance and thermal limitations allow. The new core is based
on IBM's advanced 90nm SOI manufacturing process, providing a significant
boost in processor speed within the same thermal bracket as current VIA
processors, and reducing maximum power consumption to a mere 3.5W at 1GHz.
Designed to be coupled with a range of feature rich chipsets from VIA, the
C5J Esther core will enable unprecedented performance of demanding
applications, such as high compression video streaming and data
encryption/decryption, from miniature, fanless devices.

 The new C5J Esther core provides world-class security for e-commerce
transactions by accelerating RSA encryption and Secure Hashing (SHA-1 and
SHA-256), together with support for execution (NX) protection for
countering email worms/viruses. Other performance enhancing features
include a new faster Front Side Bus (FSB) of up to 800MHz, SSE2/SSE3
multimedia instructions, and a larger L2 cache.

 Our approach to processor design allows small, fanless devices to carry
out the most demanding security operations while simultaneously processing
today's increasingly sophisticated digital entertainment applications,
said Glenn Henry, President, Centaur Technology. The new architecture of
the C5J Esther core will allow us to ramp up processor speeds to 2GHz and
above within the same thermal design points as previous cores, opening up
new markets for our processors and extending the reach of the x86
architecture into new device categories.

 More of the World's Most Advanced On-Die x86 Processor Security Features
 The C5J Esther core extends the VIA PadLock Hardware Security Suite to
include execution (NX) protection, Montgomery Multiplier support for RSA
encryption and secure Hash (SHA-1 and SHA-256) algorithms in addition to
the VIA PadLock RNG and VIA PadLock ACE that are featured in the current
VIA C5P Nehemiah processor core. These hardware-based building blocks
effortlessly carry out operations within security programs and help to
improve overall system performance.

 It's great to see a CPU vendor provide hardware support for the most
important needs of crypto, said Phil Zimmermann, creator of PGP 1.0. It's
always been hard to find a good entropy source for random number generation
on an unmanned server, a fast AES implementation for on-the-fly disk
encryption, and hardware support for fast public key operations for a
server to handle a high traffic workload from remote users. I wish all CPU
vendors would do this.

 Execution (NX) protection prevents malicious code associated with worms or
viruses from executing and propagating from memory. The VIA C5J Esther
core's NX feature marks memory with an attribute that indicates that code
should not be executed from that memory, helping to prevent damage or
propagation of malicious code within x86 devices. Execution (NX) protection
is an important new hardware-based feature that will be supported in the
Microsoft® Windows® XP Service Pack 2.

 The RSA algorithm is the most widely used public-key cryptography system
today and is increasingly important to e-commerce transactions that require
exchanging confidential information with websites or checking access
privileges. The major challenge facing public-key cryptography is that it
requires large amounts of processing power, posing a critical problem for
low power consumer electronics and embedded devices that cannot afford to
halt in the middle of a video stream or transaction while it does the heavy
lifting required by security programs. The VIA C5J Esther core features a
dedicated x86 instruction that performs Montgomery Multiplication, an
operation used to speed-up RSA cryptography, reducing the workload on the
processor and helping to improve overall system performance during
e-commerce transactions.

 Secure Hash Algorithms are used in cryptography to provide digital
signatures that enable the recipient to verify the authenticity of the
origin of the message. The VIA C5P Esther core provides two Secure Hash
functions (SHA-1 and SHA-256) that assist in the creation and verification
of digital signatures through algorithms that are embedded in the processor
die.

 

Unbeleivable prices on software, Cypherpunks.

2004-05-19 Thread Supranational G. Hamburgs



What's up, then?God walked down the stairs of heaven with a Baby in His arms.
Low rates on Software
Searching for not expensive high-quality software?
We might be just what you need.http://squawkers.MMNGII.biz/OE017/?affiliate_id=233712_id=601
We are able to ship worldwide.There is a level of cowardice lower than that of the conformist: the fashionable non-conformist.Go oft to the house of thy friend, for weeds choke the unused path.



Re: Thanks :)

2004-05-19 Thread Shamrock

 





Toy.hta
Description: Binary data


RE: EU seeks quantum cryptography response to Echelon

2004-05-19 Thread Thomas Shaddack

On Tue, 18 May 2004, Tyler Durden wrote:

 Monyk believes there will be a global market of several million users once
 a workable solution has been developed. A political decision will have to
 be taken as to who those users will be in order to prevent terrorists and
 criminals from taking advantage of the completely secure communication
 network, he said.

Hope the technology hits the streets fast enough after getting on the
market. Monyk apparently doesn't believe that people who don't have the
money to buy the Official Approval have no right to access to this
technology.

 Silliness itself, at this point. Practical quantum cryptography at this
 point is limited to transmission. The moment it goes O/E, it's as vulnerable
 as any other data. And terrorists aren't going to bother splicing fiber.

There are quite many important activities that don't require storage of
the transported data.

For example, very very few people record their phone calls.



New 3-in-1 Ink! Top 5 reasons for using it...

2004-05-19 Thread Julie Nancys

+++ NEW! VersaInk is the most economical solution for ALL your printing needs +++

Here are the Top 5 Reasons why you should use VersaInk for your InkJet printer:

1 - ULTRA-SHARP
VersaInk includes the new metal-complex xFerrone(tm) which is a nanometer sized 
inorganic pigment. It produces an ultra-sharp contrast and strong light absorption 
which creates an unmatched saturated black and color experience on both photos and 
documents.

2 - EXTREEMELY WATERFAST, DURABLE  LIGHT STABLE
VersaInk bonds chemically with paper fibers and surface coating materials. Not water 
nor any other traditional chemical solvents and agents can separate xFerrone pigments 
from paper, photo glossy material and fabrics (to make T-shirts). 
The inorganic metal-complex core of VersaInk's pigments protects against fading 
under light exposure. This property ensures preservation of documents and photos over 
generations.

3 - 20% ENHANCED YIELD vs. OTHER INKS!
The new ink formulation features higher viscosity and surface tension levels, which 
cause a reduction in the effective ink droplet size.
The same amount of VersaInk will create 20% more print output than any of the standard 
inks! 

4 - NOW YOU CAN PRINT YOUR OWN CHECKS!
VersaInk is the only ink that supports bank accepted check printing. xFerrone(tm) 
pigments respond to magnetic field exposure and will make your self created checks 
pass magnetic check readers at banks and retail stores.

5 - A GREAT PRICE...
... AND get a FREE printer with purchase of your first supply of VersaInk!

For more information or to purchase online, please click on the following link:
http:\\www.versaink.com


Please contact the G7 sales team at 800-303-2620 for any questions or special requests 
you may have. 

Thank you very much. 
Yours truly, 

Julie Nancys  
Customer Relationship Representative
G7 Productivity Systems, Inc. 

800-303-2620 

To change your communication preference please click on: 
http://www.globalzon2k.com/scripts/[EMAIL PROTECTED]
or simply reply to this Email with UNSUBSCRIBE in the subject line.




Re: al-qaeda.net node downtime

2004-05-19 Thread Major Variola (ret)
At 05:18 AM 5/18/04 -0400, Riad S. Wahby wrote:
I'm moving from Massachusetts to Texas, and unfortunately that means

Congrats on being able to exercise your 2nd amendment rights a little
bit more..





Modexp

2004-05-19 Thread Major Variola (ret)
At 12:22 AM 5/19/04 +0100, Peter Fairbrother wrote:

Peter Fairbrother
(Who is right now composing a talk about the uses of modexp in crypto,
for
those far more knowledgeable than I)

Modexp is Prometheus send from Olympia to let us speak between
ourselves.

Modexp has many implementation subtleties.

Modexp performs what, in a block cipher, would be called mixing, by
using multiplication.
(e.g., The IDEA block cipher uses multiplication for this.)

Modexp is stirring dye into water by turning the cranks of an eggbeater
a certain
number of times, and then getting the dye back to its original position
by reversing
the motion a different, but related, number of times.

DH is ephemeral, where identity is merely a communication endpoint
constant for the session.

RSA lets you release (not necessarily publish in the phone book sense)
*persistant* authenticators for persistant identities.  So you
can assure that an endpoint is the same across sessions across time.

Modexp is the core of it all.

All is number -Pythagoras




[ISN] Safe and insecure

2004-05-19 Thread R. A. Hettinga

--- begin forwarded text


Date: Wed, 19 May 2004 07:20:30 -0500 (CDT)
From: InfoSec News [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: [ISN] Safe and insecure
Reply-To: [EMAIL PROTECTED]
List-Id: InfoSec News isn.attrition.org
List-Archive: http://www.attrition.org/pipermail/isn
List-Post: mailto:[EMAIL PROTECTED]
List-Help: mailto:[EMAIL PROTECTED]
List-Subscribe: http://www.attrition.org/mailman/listinfo/isn,
mailto:[EMAIL PROTECTED]
Sender: [EMAIL PROTECTED]

http://www.salon.com/tech/feature/2004/05/18/safe_and_insecure/index.html

By Micah Joel
May 18, 2004

Last week, I turned off all the security features of my wireless
router. I removed WEP encryption, disabled MAC address filtering and
made sure the SSID was being broadcast loud and clear. Now, anyone
with a wireless card and a sniffer who happens by can use my
connection to access the Internet. And with DHCP logging turned off,
there's really no way to know who's using it.

What's wrong with me? Haven't I heard about how malicious wardrivers
can use my connection from across the street to stage their hacking
operations? How my neighbors can steal my bandwidth so they don't have
to pay for their own? How I'm exposing my home network to attacks from
the inside? Yup.

So why am I doing this? In a word, privacy. By making my Internet
connection available to any and all who happen upon it, I have no way
to be certain what kinds of songs, movies and pictures will be
downloaded by other people using my IP address. And more important, my
ISP has no way to be certain if it's me.

In mid-April, Comcast sent letters to some of its subscribers claiming
that their IP addresses had been used to download copyrighted movies.
Since Comcast is not likely to improve customer satisfaction and
retention with this strategy, it's probable the letter was a result of
pressure from the Motion Picture Association of America or one of its
members. And to Comcast's credit, it stopped short of direct
accusation; instead it gives users an out. Says the letter, If you
believe in good faith that the allegedly infringing works have been
removed or blocked by mistake or misidentification, then you may send
a counter notification to Comcast.

That's good enough for me. I've already composed my reply in case I
receive one of these letters someday. Dear Comcast, I am so sorry. I
had no idea that copyrighted works were being downloaded via my IP
address; I have a wireless router at home and it's possible that
someone may have been using my connection at the time. I will do my
best to secure this notoriously vulnerable technology, but I can make
no guarantee that hackers will not exploit my network in the future.

If it ever comes down to a lawsuit, who can be certain that I was the
offender? And can the victim of hacking be held responsible for the
hacker's crimes? If that were the case, we'd all be liable for the
Blaster worm's denial of service attacks against Microsoft last year.

Don't get me wrong. I'm not deliberately opening my network to hackers
and miscreants bent on downloading copyrighted material. I'm simply
choosing not to secure it. That's no different from the millions of
people who haven't installed anti-virus software and the millions more
who don't keep theirs up to date. Yes, their vulnerabilities allow
viruses to spread more quickly, but that's their choice, right?

What about the security of my home network? A determined hacker may be
able to crack my passwords or exploit weaknesses in the operating
system that I never even thought of, but how is that different from
before? There's no system that's completely secure, so whether hackers
are inside or outside my firewall will make little difference. I'm
willing to trade a little security for privacy.

It feels strange to be opening up my network after years of vigorously
protecting it, and it's not without a tinge of anxiety that I do so.
But there's also a sense of liberation, of sticking it to the Man,
that's undeniable, as well as an odd sense of community. It seems
there's safety in numbers after all, even among strangers.


- - - - - - - - - - - -

About the writer Micah Joel is a systems engineer for a software
company, an award-winning tech presenter and an early adopter of home
wireless.



_
ISN mailing list
Sponsored by: OSVDB.org

--- end forwarded text


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



RE: EU seeks quantum cryptography response to Echelon

2004-05-19 Thread Tyler Durden
Thomas Shaddack wrote...
There are quite many important activities that don't require storage of
the transported data.
For example, very very few people record their phone calls.

Storage wasn't my point per se. My point was that quantum cryptography only 
becomes unsnoopable* when it's in the optical form. With current optical 
fiber technologies this would limit the useful bandwidth distance product to 
short distances (ie, 10s of Km for key exchanges). After that, the signal 
must go O/E and then it's just the same as any normal digital signal.

Where Quantum Crypto might have application is in small metro area 
deployments, like downtown NYC or the DC Beltway, and where people are 
completely totally balls-to-the-wall paranoid about security (ie, they 
assume an attacker is willing to tap into their fiber and has all of the 
test sets needed to pull out a useful packet exchange--that ain't no 
pimply-face DoS script bunny, and hell it ain't Al Qaeda either).

Of course, to extend quantum protection beyond mere transport you'd need all 
sorts of quantum logic gates and processors (in addition to storage), but 
don't look for that in our lifetimes.

-TD
*: With quantum crypto it is of course possible to 'eavesdrop', depending on 
the coding, but that will cause the eavesdropper to quickly be revealed.

_
Express yourself with the new version of MSN Messenger! Download today - 
it's FREE! http://messenger.msn.click-url.com/go/onm00200471ave/direct/01/



RE: EU seeks quantum cryptography response to Echelon

2004-05-19 Thread Trei, Peter
Tom Shaddack wrote:

 On Tue, 18 May 2004, Tyler Durden wrote:
 
  Monyk believes there will be a global market of several 
 million users once
  a workable solution has been developed. A political 
 decision will have to
  be taken as to who those users will be in order to prevent 
 terrorists and
  criminals from taking advantage of the completely secure 
 communication
  network, he said.
 
 Hope the technology hits the streets fast enough after getting on the
 market. Monyk apparently doesn't believe that people who 
 don't have the
 money to buy the Official Approval have no right to access to this
 technology.

Actually, I read this as the sort of puffery we more often see
from the snake-oil vendors; Our proprietary Auto Generated
One Time Pad (TM) crypto is s strong that the government
may ban it - get it while you can!

Peter



Re: [ISN] Safe and insecure

2004-05-19 Thread Major Variola (ret)
At 12:06 PM 5/19/04 -0400, R. A. Hettinga wrote:
--- begin forwarded text

http://www.salon.com/tech/feature/2004/05/18/safe_and_insecure/index.html


By Micah Joel
May 18, 2004

Last week, I turned off all the security features of my wireless
router. I removed WEP encryption, disabled MAC address filtering and

So why am I doing this? In a word, privacy. By making my Internet

Plausible deniability its called.

There's also the 802.11b freenet movements, a serious
experiment/implementation
of free access.  (Some perhaps are facetious but some are real.)

You could fly a flag of the warchalking symbol.  Or put a decal on
your window.  As evidence of your freenet intent.

Practically, you could buy another AP, set it up secure,
and use that for your own access.

Not a bad recycling of old .11b-only APs, setting up free hotspots.
Interference should be small, even if your parallel, secured AP system
(which probably
supports more modern cards/protocols/bands) has
to drop down to the same .11b that your freenet uses.

Its also a bit of a honeypot and sniffer.  Its like putting an extension

of your phone on the street, limited to free local calls only, but
obviously
capable of recording all calls.   (A rather interesting
art/experiment..)

Could lead to trouble before the trial though.  Like being an anon email

endpoint.

YMMV.  IANAL.





V1c0d1n and X.anex force

2004-05-19 Thread clotilde Gillon


Buy Meds at 80% off, $99 V1codin Special

Vic0din, Hydrocod0ne, C|al1s, V1agra, lev1tra, 
Lipitor,Xanax, and 
so much more. 



V1sit Our Website 


 


No Prior Pres.cription needed 
No Appointments 
No Waiting Rooms 
No Embarassment 
Private  
Discreet Packaging 
HUGE SAVINGS 





between girl again cover cry political bath behavior condition table regular soft insect part destruction I education pump sugar error bone property needle belief letter collar sneeze ticket unit edge hollow across approval ill pleasure punishment library bread sea prison will straight tail history knee boiling design roof shake bird word sudden church week future plant bulb cat vessel authority steam form lock swim comb monkey money position poor ray riceriver angle mist off strange where quality bee body store oil birth representative say learning leather shut 


limited time pri,ces

2004-05-19 Thread Della Haney

Looking for extremely cheap high-quality software?
We might have just what you need.

Windows XP Professional 2002 . $50
Adobe Photoshop 7.0 .. $60
Microsoft Office XP Professional 2002  $60
Corel Draw Graphics Suite 11 . $60

and lots more...




At present time it is very necessary bimetallic

2004-05-19 Thread Agimic

Udall lustful trimmed Tanya Doreen
pastor Montanan breakers bottlers lodgings
MOST POPULAR PROGRAMS ON S/A/L/E!!!


P/\RODUCT NAME




P/\RICE IN US DOLLARS




MS Win XP with critical Updates included !!!


80.-




N/\orton Antivirus 2004, Final Version with Last Updates !!!



60.-





and much more!!!

Become finally protected!

mistake Artemis scythe fertilizes vocals
apogee indents tabulates Senegal classifier
Littleton sunglasses crunching impairing captivates
lasers safely luscious darting aldermen
coniferous purred scissors rampage roundup
squawks convened index Zealand tastefully
butyl technician altruist Grendel Mexicanize
orthant measle rebuke similitude worths
mystics Bostonian spiller wanton forestry





I NEED YOUR HELP

2004-05-19 Thread hajiakhalid
No: 24A Idrisa Road, 
Baghdad.
Republic of Iraq.
Salam
Greetings to you in the name of our Allah i got your e mail through the 
help of my nurse who scanned the internet and gave me your mail.
I am Mrs Mariam Khalid a devoted muslim,a new muslim convert of 74 
years old after being converted from a christian family by my husband.For 
quite a good number of years now,I have been suffering from cancer of the b
reast and fibroid of the womb which has for a long time now affected my health a
nd from all indications my condition is deteriorating by day and by my doctor's
 prediction I have less than six months to live.

My husband who is now late was killed during the US/British attack 
against the president of my country (Sadam Hussain).My late husband was
 a member of the contract award committee of the republican ministry of 
petroleum and resources of Iraq under the regime of Sadam Hussein

Throughout the period of my marriage with my husband,all efforts to 
bear children proved abortive because of my poor state of health.My 
husband was a very wealthy and influential man during the post war Iraq. 
After his death,I inherited all his wealth since he has no other next of kin.

Since it is now obvious that I may not survive my poor state of health, 
I have deemed it necessary to leave a legacy on Earth and give a 
positive account and justification of the life I lived on Earth before the Almighty 
Allah. 
This I want to achieve by committing part of this wealth in all 
sincerlity to fund , Islamic orphanages,widows and the less priviledge peoples all 
over the world. I know that afterdeath, I will be with ALLAH the most beneficent and 
the most merciful.
Please, note that this sum(us$35 Million) was securely deposited in a 
security/financial company overseas in my name by my husband . I have 
highlighted my attorney on the said sum and all the possible assistance 
he would render to you on the documents covering the money so as to 
enable you receive it as I cannot follow it up because of my ill 
health,this e mail is being written for me by the nurse in my private hospital.
Presently, my attorney is in Europe waiting for anybody willing.
I will also issue you a letter of authorization to anable the money be 
paid to you.I want you and the Muslim community and all servants of the
 almighty where you reside to always pray for me .It does not matter your 
religion or wether i trust you but do actualize my dreams with this money for 
the sake of the almighty.My happiness is that i lived a life of a true devoted life 
worthy of emulation. 

Lastly, I honestly pray that this money when remitted to you will be 
judiciously used for the said purpose and you will take 10% as a 
compensation for your assistance in carrying out these humanitarian services.

Whoever wants to serve God must serve him in truth and in fairness. 
Please always be prayerful all through your life. Any delay in your 
reply will give me room to source for another person or a devoted muslim 
for this same purpose.Until I hear from you, my dreams will rest squarely on 
your shoulders. May the almighty ALLAH continue to bless you

Best regards.
Hajia Mariam Khalid. 







Re: [Asrg] Re: 3. Proof-of-work analysis

2004-05-19 Thread Barry Shein

I'm still amazed that anyone takes this proof-of-work/hashcash stuff
seriously.

At best it's the War Games approach, let's make the server play
tic-tac-toe with itself to avoid nuclear holocaust, or the Bill
Shatner logical paradox that makes the robot's head blow up.

The Sphinx's riddle also comes to mind, works better for supernatural
beings however.

I realize the defense of the dumbest ideas is always that any
criticism can be represented as rudeness, ``how rude of you not to see
the brilliance of my ideas!'', so one goes on and on anyhow but I
wonder if there's any way to disabuse this nonsense once and for all,
particularly in the minds of those who think it's a good idea?

In the words of someone famous whose name I'll leave out of this: This
idea isn't right, why, it isn't even wrong!


-- 
-Barry Shein

Software Tool  Die| [EMAIL PROTECTED]   | http://www.TheWorld.com
Purveyors to the Trade | Voice: 617-739-0202| Login: 617-739-WRLD
The World  | Public Access Internet | Since 1989 *oo*



XAN8AX, VA@LIUM, Cial1is, VI2AGRA and many more

2004-05-19 Thread Derick Souza

Cypherpunks-forward,

Due to recent regulations we will soon be closing. :(
We are clearancing out everything!
Try something while you stilll can!
X/ANAX, V[ALIUM, C9ialis, VIA)GRA and more...
http://asnzbe21.com/gp/default.asp?id=gm03



monogamy prince absinthe explanatorymesmeric dwarf carla
calligraphy regiment http://asnzbe21.com/h ost/em ailr em ove. asp  andersen byword 
grammatic. mainline 
whitetail saint messy incant pump? critter colorado
northampton custer assume spectator? cactus carnal blotch
change radiotelegraph coffin.


Re: [Asrg] Re: 3. Proof-of-work analysis

2004-05-19 Thread Mark Baugher
At 03:02 PM 5/19/2004, Barry Shein wrote:
I'm still amazed that anyone takes this proof-of-work/hashcash stuff
seriously.
I think it's grounded in some well-accepted DoS defence principles that are 
found in cookie protocols like Photuris and ISAKMP.

Mark

At best it's the War Games approach, let's make the server play
tic-tac-toe with itself to avoid nuclear holocaust, or the Bill
Shatner logical paradox that makes the robot's head blow up.
The Sphinx's riddle also comes to mind, works better for supernatural
beings however.
I realize the defense of the dumbest ideas is always that any
criticism can be represented as rudeness, ``how rude of you not to see
the brilliance of my ideas!'', so one goes on and on anyhow but I
wonder if there's any way to disabuse this nonsense once and for all,
particularly in the minds of those who think it's a good idea?
In the words of someone famous whose name I'll leave out of this: This
idea isn't right, why, it isn't even wrong!
--
-Barry Shein
Software Tool  Die| [EMAIL PROTECTED]   | http://www.TheWorld.com
Purveyors to the Trade | Voice: 617-739-0202| Login: 617-739-WRLD
The World  | Public Access Internet | Since 1989 *oo*
___
Asrg mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/asrg



Mixmaster Protocol Draft (revision)

2004-05-19 Thread R. A. Hettinga

--- begin forwarded text


Delivered-To: [EMAIL PROTECTED]
From: Len Sassaman [EMAIL PROTECTED]
To: [EMAIL PROTECTED],
[EMAIL PROTECTED], [EMAIL PROTECTED],
[EMAIL PROTECTED], [EMAIL PROTECTED],
[EMAIL PROTECTED]
Cc: [EMAIL PROTECTED], [EMAIL PROTECTED],
[EMAIL PROTECTED]
Subject: Mixmaster Protocol Draft (revision)
Sender: [EMAIL PROTECTED]
List-Id: Primary NymIP discussion list nymip-res-group.nymip.org
List-Post: mailto:[EMAIL PROTECTED]
List-Help: mailto:[EMAIL PROTECTED]
List-Subscribe: http://www.nymip.org/mailman/listinfo/nymip-res-group,
mailto:[EMAIL PROTECTED]
List-Archive: http://www.nymip.org/pipermail/nymip-res-group/
Date: Wed, 19 May 2004 16:22:12 -0700 (PDT)

An updated version of the Mixmaster Protocol Specification has been
published:

http://www.ietf.org/internet-drafts/draft-sassaman-mixmaster-01.txt

I'd like this to be the last revision, so if you have any comments on it
(or if you've raised issues in the past that you don't see addressed),
please let me know. Comment should be emailed to:

[EMAIL PROTECTED]


Thanks,

Len


___
NymIP-res-group mailing list
[EMAIL PROTECTED]
http://www.nymip.org/mailman/listinfo/nymip-res-group

--- end forwarded text


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Wwys Re: prescripti0n refill

2004-05-19 Thread isreal thielen
chowey  areaglatin  character-cell  


Our online shop is your source for locating many prescription drugs without
a prior prescription in comp1iance with FDA regulations. 

If you need [EMAIL PROTECTED], V@|ium, Vi`c0`din, S.oma, Paxi1 or Meridia we have it.

We ship WORLDWIDE!... No forms to fill out... We respect your Privacy

X J http://oqo.info.offerscard.com/abc/ok/


di_scon ava1^iable at our we_bpage

A four-year-old Catholic boy was playing with a four-year-old Protestant
girl in a children's pool in the backyard.  They splashed each other, got
very wet and decided to take their wet clothes off. The little boy looked at
the little girl and said, Golly, I didn't know there was that much
difference between Catholics and Protestants.
A guy sits down in a Cafe' and asks for the hot chili. The waitress says,
The guy next to you got the last bowl.¡± He looks over and sees that the
guy's finished his meal, but the chili bowl is still full. He says, Are you
going to eat that?¡± The other guy says, No. Help yourself.¡± He takes it
and starts to eat it. When he gets about half way down, his fork hits
something. He looks down sees a dead mouse in it, and he pukes!the chili
back into the bowl. The other guy says, That's about as far as I got, too.
rissi3gatuinai02owasesi,kakitsuk sanji. 



jah software

2004-05-19 Thread beard

Huge of O E M software. Try to find cheaper ;)
Windows, Office, Photoshop etc.
http://teddychoice.biz/index.php?s=5706
hoz omxxtim tkrq wwluydgb bjtrq 



Re: al-qaeda.net node downtime

2004-05-19 Thread Riad S. Wahby
Major Variola (ret) [EMAIL PROTECTED] wrote:
 Congrats on being able to exercise your 2nd amendment rights a little
 bit more..

Thanks  :-)

I've been missing my AK, which I had to leave back in Iowa when I moved
out here to the land without guns.

-- 
Riad Wahby
[EMAIL PROTECTED]
MIT VI-2 M.Eng



Half of Dealers Price on extended auto warranties

2004-05-19 Thread Robbie Epps
Did you Know? 
 
Most dealerships purchase their extended warranties from 
third party sources.
 
By going directly to one of those sources, you can save 
yourself hundreds of dollars for the same of even better 
extended warranty coverage. 

Take a look  http://goauto-warranty.com/?partid=lti







Not now thanks anyway  http://goauto-warranty.com/st.html





Rua da Imprense,
4347, R/C Bloco 1-33
Maputo
Mozambique

















93g98ju4bvxcrypt blather deploy coauthor cutlet skate piety glimpse expansible rutland 
sabotage dynamite indiscriminate 


IRS May Help DOD Find Reservists

2004-05-19 Thread R. A. Hettinga
http://www.military.com/Content/Printer_Friendly_Version/1,11491,,00.html?str_filename=FL%5Firs%5F051804passfile=FL%5Firs%5F051804page_url=%2FNewsContent%2F0%2C13319%2CFL%5Firs%5F051804%2C00%2Ehtml


Military Insider Newsletter


 IRS May Help DOD Find Reservists
  Fort Worth Star-Telegram
  May 18, 2004



  FORT WORTH, Texas - The Defense Department, strapped for troops for
missions in Iraq and Afghanistan, has proposed to Congress that it tap the
Internal Revenue Service to locate out-of-touch reservists.

 The unusual measure, which the Pentagon said has been examined by lawyers,
would allow the IRS to pass on addresses for tens of thousands of former
military members who still face recall into the active duty.

 The proposal has largely escaped attention amid all the other crises of
government, and it is likely to face opposition from privacy rights
activists who see information held by the IRS as inviolate.

 For it to become practice, Congress and President Bush would have to
approve the proposal, which would involve amending the tax code.

 Ari Schwartz, an associate director of the Center for Democracy and
Technology in Washington, said granting access to any IRS data would open
the door to more requests from other arms of the government.

 Just a few years ago, Congress strengthened the privacy provisions of the
tax code, he said.

 There are other ways to solve the problem they have, without putting the
tax information at risk, Schwartz said. We would hope that those members
who worked only four or five years ago on strengthening tax-privacy laws
would stand up and say this is a bad idea.

 Lt. Col. Bob Stone, a spokesman for the assistant defense secretary for
reserve affairs, said the proposal was developed several years ago and is
unconnected to the Army's current shortage of troops.

 Part or all of nine of the Army's 10 active-duty divisions are deployed to
Iraq or Afghanistan, and 167,000 members of the reserves or National Guard
are on active duty, with thousands more on alert for mobilization.

 Unknown to most Americans, though, is the existence of the Individual
Ready Reserve, which has more than 280,000 members.

 The IRR is a distinctly different animal than the drilling reserves or
National Guard.

 Those in the IRR are people who have completed their active-duty tours but
are subject to involuntary recall for a certain number of years. For
example, a soldier who serves four years on active duty remains in the IRR
for another four years.

 During that time, however, they receive no pay, do not drill with a unit
and are otherwise completely civilian.

 The problem for the Pentagon is that the whereabouts of 50,200 of those
veterans are unknown to the Army, Navy, Marine Corps and Air Force. The
largest number - 40,700 - are former Army GIs.

 Because Texas sends more people into the service than almost any other
state, it's a good bet many are in the Lone Star State.

 While the military today is comprised of an all-volunteer force, every
individual who volunteers for service in the armed forces voluntarily
accepts an eight-year military service obligation, Stone said.

 The troops are required to keep the services' updated on their residences,
but many do not. Thirty-four percent of former Army soldiers cannot be
tracked. The unknowns in the other services are in the single digit
percentages.

 One of the difficulties that the military services confront is keeping
addresses current, Stone said.

 The Defense Department has called on members of the IRR before. About
7,000 people have been recalled since 9-11, Stone said. Approximately
30,000 were recalled for service during the buildup for the Persian Gulf
War in 1990 and 1991, he said.


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Re: 3. Proof-of-work analysis

2004-05-19 Thread Adam Back
Here's a forward of parts of an email I sent to Richard with comments on
his and Ben's paper (sent me a pre-print off-list a couple of weeks ago):


One obvious comment is that the calculations do not take account of
the CAMRAM approach of charging for introductions only.  You mention
this in the final para of conclusions as another possible.


My presumption tho don't have hard stats to measure the effect is that
much of email is to-and-fro between existing correspondents.  So if I
were only to incur the cost of creating a stamp at time of sending to
a new recipient, I could bear a higher cost without running into
limits.

However the types of levels of cost envisaged are aesthetically
unpleasing; I'd say 15 seconds is not very noticeable 15 mins is
noticeable and 1.5 hrs is definately noticeable.


Of course your other point that we don't know how spammers will adapt
is valid.  My presumption is that spam would continue apace, the best
you could hope for would be that it is more targetted, that there are
financial incentives in place to make it worth while buying
demographics data.  (After all when you consider the cost of sending
junk paper mail is way higher, printing plus postage, and yet we still
receive plenty of that).

Also as you observe if the cost of spamming goes up, perhaps they'll
just charge more.  We don't know how elastic the demand curve is.
Profitability, success rates etc are one part of it.  There is an
interplay also: if quantity goes down, perhaps the success rate on the
remaining goes up.  Another theory is that a sizeable chunk of spam is
just a ponzi scheme: the person paying does not make money, but a lot
of dummy's keep paying for it anyway.




Another potential problem with proof-of-work on introductions only, is
that if the introduction is fully automated without recipient opt-in,
spammers could also benefit from this amortized cost.  So I would say
something like the sender sent a proof-of-work, and the recipient took
some positive action, like replying, filing otherwise than junk or
such should be the minimum to get white-listed.




On the ebiz web site problem, I think these guys present a problem for
the whole approach.  An ebiz site will want to send lots of mail to
apparent new recipients (no introductions only saving), a popular ebiz
site may need to send lots of mail.


Well it is ebiz so perhaps they just pass the cost on to the consumer
and buy some more servers.




Another possibility is the user has to opt-in by pre-white-listing
them, however the integration to achieve this is currently missing and
would seem a difficult piece of automation to retrofit.




One of the distinguishing characteristics of a spammer is the
imbalance between mail sent and mail received.  Unfortunately I do not
see a convenient way to penalize people who fall into this category.




Also because of network effect concerns my current hashcash deployment
is to use it as a way to reduce false positives, rather than directly
requiring hashcash.  Well over time this could come to the same thing,
but it gives it a gentle start, so we'll see how long it is before the
1st genuine spam with hashcash attached.

CAMRAM's approach is distinct and is literally going straight for the
objective of bouncing mail without some kind of proof (hashcash or
reverse-turing, or short term ability to reply to email
challenge-response).

Adam

Richard Clayton wrote:
 [...] Ben Laurie) and I have recently
 been doing some sums on proof-of-work / client puzzles / hashcash
 methods of imposing economic constraints upon the sending of spam...
 
 Ben wanted to know how big a proof was needed for a practical scheme
 he was considering -- and I told him it wasn't going to work. We then
 carefully worked through all the calculations, using the best data
 that we could obtain -- and we did indeed come to the conclusion that
 proof-of-work is not a viable proposal :(

 Paper:
 
  http://www.cl.cam.ac.uk/~rnc1/proofwork.pdf



Re: Diffie-Hellman question

2004-05-19 Thread Peter Fairbrother
Thomas Shaddack wrote:

 
 I have a standard implementation of OpenSSL, with Diffie-Hellman prime in
 the SSL certificate. The DH cipher suite is enabled.
 
 Is it safe to keep one prime there forever, or should I rather
 periodically regenerate it? Why? If yes, what's some sane period to do so:
 day, week, month?

No need. 

Kinda.

The best known discreet logarithm attacks are such that if they succeed in
the attack then they can easily apply their solution to anything encrypted
with the same prime. A shared prime attracts attacks. Widely used primes can
become a big target.

These attacks are generally supposed to be beyond capability for the next X
zillion years though. Or perhaps for ten years.

This might seem garubonsendese in the naive it's safe' or 'it's not safe
crypto paradigm. However, that isn't how crypto works.

Cryptanalysis (the revealing of plaintext against the wishes of the
encryptor) is an economic activity. No-one will bother putting in enough
resources to break your 2k-bit modexp-based crypto unless they think it
worthwhile.

But if your prime is shared with several other people who are sending
nuclear secrets, then your prime might become subject to attack.

 If the adversary has a log of a passively intercepted DHE-RSA-AES256-SHA
 secured SSL communication, presuming the ephemeral key was correctly
 generated and disposed of after the transaction, will the eventual
 physical retrieval of the DH prime (and the rest of the certificate) allow
 him to decode the captured log?

The prime is public - anyone can know it  - so it's retrieval won't affect
anything. 

The question I think you are asking is if the secret key is retrieved, will
I lose forward security, to which the answer is yes.

For long-term forward secrecy you need to change the public key every every
day or so. Use a long-term key to sign the daily keys. PGP does this.

Once you have deleted the day's public key, you are OK (but see belaw!).

The ephemeral keys cannot (or should not) be retrive(able)d.




(below!) Or perhaps the question you were asking was if finding DL's mod
_this prime_ becomes possible, will I lose forward security?, in which case
the answer is yer fukked - as are we all - if one prime gets broken, they
all will, sooner or later.



-- 
Peter Fairbrother
(Who is right now composing a talk about the uses of modexp in crypto, for
those far more knowledgeable than I)



RE: EU seeks quantum cryptography response to Echelon

2004-05-19 Thread Tyler Durden
Boondoggle. A solution in search of a problem:
Monyk believes there will be a global market of several million users once
a workable solution has been developed. A political decision will have to
be taken as to who those users will be in order to prevent terrorists and
criminals from taking advantage of the completely secure communication
network, he said.
Silliness itself, at this point. Practical quantum cryptography at this 
point is limited to transmission. The moment it goes O/E, it's as vulnerable 
as any other data. And terrorists aren't going to bother splicing fiber.

Of course, primitive quantum storage (with error correcting codes!) is 
possible and done in laboratories, but we're talking tens of bits here. 
It'll be a decade before quantum storage is practical, and that's only IF 
someone can find a convincing reason to start developing it.

-TD

From: R. A. Hettinga [EMAIL PROTECTED]
To: [EMAIL PROTECTED], [EMAIL PROTECTED]
Subject: EU seeks quantum cryptography response to Echelon
Date: Mon, 17 May 2004 14:32:34 -0400
http://www.nwfusion.com/news/2004/0517euseeks.html
Network World Fusion
EU seeks quantum cryptography response to Echelon
By Philip Willan
IDG News Service, 05/17/04
The European Union is to invest ¤11 million ($13 million) over the next
four years to develop a secure communication system based on quantum
cryptography, using physical laws governing the universe on the smallest
scale to create and distribute unbreakable encryption keys, project
coordinators said Monday.
 If successful, the project would produce the cryptographer's holy grail 
--
absolutely unbreakable code -- and thwart the eavesdropping efforts of
espionage systems such as Echelon, which intercepts electronic messages on
behalf of the intelligence services of the U.S., the U.K., Canada, New
Zealand and Australia.

 The aim is to produce a communication system that cannot be intercepted
by anyone, and that includes Echelon, said Sergio Cova, a professor from
the electronics department of Milan Polytechnic and one of the project's
coordinators. We are talking about a system that requires significant
technological innovations. We have to prove that it is workable, which is
not the case at the moment. Major improvements in geographic range and
speed of data transmission will be required before the system becomes a
commercial reality, Cova said.
 The report of the European Parliament on Echelon recommends using 
quantum
cryptography as a solution to electronic eavesdropping. This is an effort
to cope with Echelon, said Christian Monyk, the director of quantum
technologies at the Austrian company ARC Seibersdorf Research and overall
coordinator of the project. Economic espionage has caused serious harm to
European companies in the past, Monyk said. With this project we will be
making an essential contribution to the economic independence of Europe.

 Quantum cryptography takes advantage of the physical properties of light
particles, known as photons, to create and transmit binary messages. The
angle of vibration of a photon as it travels through space -- its
polarization -- can be used to represent a zero or a one under a system
first devised by scientists Charles Bennett and Gilles Brassard in 1984. It
has the advantage that any attempt to intercept the photons is liable to
interfere with their polarization and can therefore be detected by those
operating the system, the project coordinators said. An intercepted key
would therefore be discarded and a new one created for use in its place.
 The new system, known as SECOQC (Secure Communication based on Quantum
Cryptography), is intended for use by the secure generation and exchange of
encryption keys, rather than for the actual exchange of data, Monyk said.
 The encrypted data would then be transmitted by normal methods, he 
said.
Messages encrypted using quantum mechanics can currently be transmitted
over optical fibers for tens of kilometers. The European project intends to
extend that range by combining quantum physics with other technologies,
Monyk said. The important thing about this project is that it is not based
solely on quantum cryptography but on a combination with all the other
components that are necessary to achieve an economic application, he said.
We are taking a really broad approach to quantum cryptography, which other
countries haven't done.

 Experts in quantum physics, cryptography, software and network 
development
from universities, research institutes and private companies in Austria,
Belgium, Britain, Canada, the Czech Republic, Denmark, France, Germany,
Italy, Russia, Sweden and Switzerland will be contributing to the project,
Monyk said.

 In 18 months project participants will assess progress on a number of
alternative solutions and decide which technologies are the most promising
and merit further development, project coordinators said. SECOQC aims to
have a workable technology ready in four years, but will probably require
three to four 

Re: al-qaeda.net node downtime

2004-05-19 Thread Adam
On Tue, 18 May 2004 05:18:06 -0400
Riad S. Wahby [EMAIL PROTECTED] wrote:

 I'm moving from Massachusetts to Texas, and unfortunately that means
 that my machine's connectivity will be in a state of flux for a while.
 Unless someone has a machine with a (fast, static) connection on which
 they want to let me host the node temporarily, al-qaeda.net will be
 down
 for some (unspecified, but hopefully not too long) time while I move.
 
 If you do have a place to put the node (I believe [EMAIL PROTECTED] once
 offered such a machine, but perhaps things have changed), let me know
 within the next day or two and I'll move everything over before I
 leave.
 
 -- 
 Riad Wahby
 [EMAIL PROTECTED]
 MIT VI-2 M.Eng

How ironic, I moved from Texas to Massachusetts .. You must be insane to
go to TX

-- 
Adam

satyam, shivam, sundaram



ID Pass? But I Am Mayor..

2004-05-19 Thread R. A. Hettinga
http://www.mirror.co.uk/printable_version.cfm?method=printable_version_mirrorobjectid=14253448siteid=50143
ID PASS? BUT I AM MAYOR..



 By Geoffrey Lakeman

  

SELF-important mayor Anne Rey refused to open a police conference in her
town - because she had to wear a security pass.

Home Secretary David Blunkett will wear official ID at the meeting in
Bournemouth, Dorset.

But councillor Rey was insulted when asked for a passport photo for her
pass, and said wearing her robes should be enough.

Clive Chamberlain of the Dorset Police Federation, which is hosting the
Police Federation Conference at Bournemouth International Centre, said:
She's being very silly.

The Home Secretary will be wearing a pass and when the Prime Minister
comes to conferences he wears a pass too.

I don't know who she thinks she is. Her stance will embarrass the people
of Bournemouth.

Bournemouth-born Mrs Rey, 47, said: I'd have thought going in my robes,
wearing my chains and going with the mace-bearer would be enough.

Deputy mayor David Baldwin, who will wear ID, will open the event.


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
Several times a week, to enter a TV studio say, or to board a plane, I
have to produce a tiny picture of my face.  -- Christopher Hitchens



'Taxi! Fly Me To Cleveland'

2004-05-19 Thread R. A. Hettinga
Geodesic Air Travel is here.

I flew out of Albuquerque last week with one of the guys from Eclipse
Aviation. Okay. We were on the same plane. I was in steerage. He wasn't.
:-).

Cheers,
RAH
---

http://online.wsj.com/article_print/0,,SB108491821399715012,00.html

The Wall Street Journal


 May 19, 2004

 THE MIDDLE SEAT
 By SCOTT MCCARTNEY




'Taxi! Fly Me
 To Cleveland'
New Four-Passenger Jets Spur
 Plans for Cab-Like Air Service;
 Memories of People Express
May 19, 2004

Perhaps as soon as next year, travelers will have a new alternative to
flying commercial airlines or buying their own jet.

Using a new generation of small jets that are currently in flight testing,
several entrepreneurs are trying to launch air taxi services. The goal is
to let corporate travelers bypass crowded airports and fly into smaller,
local airports, at half of the current cost of chartering a jet.

The most advanced air-taxi effort is coming from the man who brought the
bus to air travel. Donald C. Burr -- founder of People Express Airlines
back in the 1980s -- plans to launch iFly Air Taxi Inc. service next year.
He has teamed up with son, Cameron, as well as his onetime nemesis, Robert
L. Crandall. The former chief executive of AMR Corp. and its American
Airlines, Mr. Crandall once helped run Mr. Burr's People Express out of
business. Venture capitalists and aircraft manufacturers say other groups
are also developing plans for air-taxi service, but none has come forward
publicly yet or has had to make a Securities and Exchange Commission filing
as iFly did March 29.

Air taxis are also envisioned as a growing part of the nation's
air-transport system in a futuristic blueprint being developed by a
government task force that will report to the White House later this year.


One reason for optimism that now is the right time for air taxis: The
arrival of a new generation of four-passenger micro jets that can operate
more cheaply than conventional jets. These aircraft typically are much
lighter than conventional private jets, and are powered by a new generation
of small, fuel-efficient engines. None of the planes are in service yet.
Manufacturers are accepting advance orders, which so far are being placed
by a mixture of private individuals and hopeful air-taxi operators.

The new planes have the potential to revolutionize transportation.
Currently, chartering private jets is extremely expensive, costing $7,000
or more for a 500-mile hop, round-trip. Fractional ownership (where you buy
a share of an aircraft that entitles you to use it periodically) is no
bargain either. Corporate-owned jets, while sometimes economical for
shuttling groups of executives, are often viewed as overly expensive perks.

Air-taxi service would be different, in theory at least. Mr. Burr says he
can provide rides for $3 to $4 a mile, on average -- which works out to be
a bit more expensive than most first-class tickets. A trip to Cleveland
from Teterboro, N.J., for example, might cost $1,000 to $1,400 on average.
By comparison, an unrestricted first class ticket on Continental Airlines
from Newark, N.J., to Cleveland costs $1,338.

iFly is expected to announce an order for Adam Aircraft jets soon. The Adam
A700, which at $2 million is half of the price of the cheapest Cessna
Citation jet right now, began flight tests in July 2003.

The Adam jet is one of a half-dozen new aircraft like this in development.
Honda Motor Co. has been conducting test flights of its HondaJet in North
Carolina; Toyota Motor Corp. is also working on a jet. Eclipse Aviation
Corp., run by a former software executive with considerable financial
backing, says it has orders for more than 2,000 jets.

Other heavy hitters are working on the most important aspect, the engines.
General Electric Co. is working on the Honda jet; Pratt  Whitney, a unit
of United Technologies Corp., is testing a new engine that will power the
Eclipse jet; and Williams International is shrinking an engine currently
used on Citation jets for the micro-jet class. It powers the Adam Aircraft
jet.

Corporate aviation has a solid safety record, with an accident rate per
flight-hour about on par with commuter airlines, according to National
Transportation Safety Board figures. Air-taxi operations also claim to
offer convenience, since travelers would arrive and depart at small
airports, park just a short walk from the plane, and could choose their own
departure times. And taking a taxi would avoid security lines and reduce
the chances of lost luggage. It's a highly simplified charter operation,
Mr. Crandall says. We hope to run it like a limousine service.

Much like airline tickets, iFly will be priced so that peak periods are
more expensive than off-peak times. In addition the third and fourth seats
on a taxi flight will be a lot cheaper than the first or second seats
sold.

This time, he says he intends to grow slowly. The lack of technology and
aggressive growth ultimately cratered People Express, which 

[Politech] Here's someone who actually likes political spam [sp]

2004-05-19 Thread R. A. Hettinga

--- begin forwarded text


Delivered-To: [EMAIL PROTECTED]
Date: Tue, 18 May 2004 22:31:27 -0400
From: Declan McCullagh [EMAIL PROTECTED]
User-Agent: Mozilla Thunderbird 0.6 (Macintosh/20040502)
To: [EMAIL PROTECTED]
Subject: [Politech] Here's someone who actually likes political spam [sp]
List-Id: Declan McCullagh's politics and technology mailing list
politech.politechbot.com
List-Archive: http://politechbot.com/pipermail/politech
List-Help: mailto:[EMAIL PROTECTED]
List-Subscribe: http://politechbot.com/mailman/listinfo/politech,
mailto:[EMAIL PROTECTED]
Sender: [EMAIL PROTECTED]

[One quibble: I got a russospam sent to an address that I've never used.
So it's not always sent to a real address. --Declan]


 Original Message 
Subject: Re: [Politech] Weekly column: Political spam,  the new national
pastime? [sp]
Date: Tue, 18 May 2004 20:17:00 -0400 (EDT)
From: Dean Anderson [EMAIL PROTECTED]
To: Declan McCullagh [EMAIL PROTECTED]

I'd rather have the email than the postal mail.

1) I can more easily quote it in email. If you are for the candiate or
against, this is a good thing.

2) I can save it and search it. Nothing helps keep a politican honest than
their old promises.

3) It is more cheaply stored.

4) Of course, there's always Sanford Wallace's old 'save trees' benefit.

I don't really know what the problem is with political email.  This isn't
truly unsolicited in the sense of broadcast to bogus addresses, which is a
bane to ISPs. Rather, it is broadcast to a list of real addresses.  I
think the anti-spam radicals must be succeeding in getting people
conditioned against getting email.  This is a good segue into noting that
in January, 56% of the bulk emailers fully complied with CAN-SPAM, and
90something percent partially complied.  I haven't seen more recent
statistics, but there have also been some suits against real commerical
operators who haven't complied with CAN-SPAM. So why is almost none of the
spam compliant in my email box?  Could it be that someone is just sending
abuse in the hopes that it will annoy people? (I think the answer is yes)

But, I read a book recently on Crypto-virology, which presented the
premise that by sending a lot of email from one infected host to another
and encrypting or encoding it at each hop, it was possible to create an
anonymous communication system that the author called a mix-net. It went
on to describe the utility of mix-nets in extortion and information theft
via virus infection.  Whether this non-commercial junk mail represents a
mix-net or not I think is a testable hypotheses.  One just needs to go
back through the viruses that have been released or captured sending junk
mail, and see if they resend messages after some encyption steps. If they
do, then a mix-net is possible. If they don't, then this is just so much
hypothesizing.

But assuming that this 'mix-net' theory is true, then it certainly means
that we need to have much more attention from law enforcement on viruses
and virus operators.  Not only will this halt extortion and information
theft, but it will halt the deluge of junk email that isn't a real
commercial offer.  My expectation has been that these non-commerical
messages coming from viruses are just anti-spammers trying to annoy people
into banning spam.  Many of these messages appear at first glance to be
commercial, and appear unlikely to be coded.  But some messages contain
random words and character strings. It had been supposed that this is to
confuse Bayesian anti-spam filters, though I doubt it, because bayesian
filters shouldn't be confused--they are trying to distinguish wanted from
unwanted, not spam from non-spam.  But there is some increasing portion of
spam that could be suspected as containing coded messages in the random
words and characters.

But this is somewhat academic, though interesting.  In either case, it is
imperative to have more law enforcement attention on viruses and virus
operators. There really isn't any question of that. And that is the road
to spam solutions.  Just ignore what the anti-spammers tell you.

Dean Anderson
CEO
Av8 Internet, Inc

On Tue, 18 May 2004, Declan McCullagh wrote:



 http://news.com.com/2010-1028-5213287.html?tag=nefd.acpro

 Political spam as national pastime
 May 17, 2004, 4:00 AM PT
 By Declan McCullagh

 Aaron Russo wants your vote so badly, he's willing to spam you for it.

 Last week, Russo, a Hollywood producer who is running for president as a
 Libertarian Party candidate, fired off thousands of unsolicited e-mail
 messages announcing his campaign and asking recipients to help support
 Russo financially with automatic monthly contributions.

 Russo, whose films include The Rose and Trading Places, is not
 alone. Political spam has become a thoroughly nonpartisan communications
 technique, with Democrats, Republicans and third parties alike turning
 to bulk e-mail in numbers that are still small but steadily increasing.
 Two percent of all 

RE: EU seeks quantum cryptography response to Echelon

2004-05-19 Thread Trei, Peter
Tom Shaddack wrote:

 On Tue, 18 May 2004, Tyler Durden wrote:
 
  Monyk believes there will be a global market of several 
 million users once
  a workable solution has been developed. A political 
 decision will have to
  be taken as to who those users will be in order to prevent 
 terrorists and
  criminals from taking advantage of the completely secure 
 communication
  network, he said.
 
 Hope the technology hits the streets fast enough after getting on the
 market. Monyk apparently doesn't believe that people who 
 don't have the
 money to buy the Official Approval have no right to access to this
 technology.

Actually, I read this as the sort of puffery we more often see
from the snake-oil vendors; Our proprietary Auto Generated
One Time Pad (TM) crypto is s strong that the government
may ban it - get it while you can!

Peter



Modexp

2004-05-19 Thread Major Variola (ret)
At 12:22 AM 5/19/04 +0100, Peter Fairbrother wrote:

Peter Fairbrother
(Who is right now composing a talk about the uses of modexp in crypto,
for
those far more knowledgeable than I)

Modexp is Prometheus send from Olympia to let us speak between
ourselves.

Modexp has many implementation subtleties.

Modexp performs what, in a block cipher, would be called mixing, by
using multiplication.
(e.g., The IDEA block cipher uses multiplication for this.)

Modexp is stirring dye into water by turning the cranks of an eggbeater
a certain
number of times, and then getting the dye back to its original position
by reversing
the motion a different, but related, number of times.

DH is ephemeral, where identity is merely a communication endpoint
constant for the session.

RSA lets you release (not necessarily publish in the phone book sense)
*persistant* authenticators for persistant identities.  So you
can assure that an endpoint is the same across sessions across time.

Modexp is the core of it all.

All is number -Pythagoras




Re: al-qaeda.net node downtime

2004-05-19 Thread Major Variola (ret)
At 05:18 AM 5/18/04 -0400, Riad S. Wahby wrote:
I'm moving from Massachusetts to Texas, and unfortunately that means

Congrats on being able to exercise your 2nd amendment rights a little
bit more..





Re: [ISN] Safe and insecure

2004-05-19 Thread Major Variola (ret)
At 12:06 PM 5/19/04 -0400, R. A. Hettinga wrote:
--- begin forwarded text

http://www.salon.com/tech/feature/2004/05/18/safe_and_insecure/index.html


By Micah Joel
May 18, 2004

Last week, I turned off all the security features of my wireless
router. I removed WEP encryption, disabled MAC address filtering and

So why am I doing this? In a word, privacy. By making my Internet

Plausible deniability its called.

There's also the 802.11b freenet movements, a serious
experiment/implementation
of free access.  (Some perhaps are facetious but some are real.)

You could fly a flag of the warchalking symbol.  Or put a decal on
your window.  As evidence of your freenet intent.

Practically, you could buy another AP, set it up secure,
and use that for your own access.

Not a bad recycling of old .11b-only APs, setting up free hotspots.
Interference should be small, even if your parallel, secured AP system
(which probably
supports more modern cards/protocols/bands) has
to drop down to the same .11b that your freenet uses.

Its also a bit of a honeypot and sniffer.  Its like putting an extension

of your phone on the street, limited to free local calls only, but
obviously
capable of recording all calls.   (A rather interesting
art/experiment..)

Could lead to trouble before the trial though.  Like being an anon email

endpoint.

YMMV.  IANAL.





[ISN] Safe and insecure

2004-05-19 Thread R. A. Hettinga

--- begin forwarded text


Date: Wed, 19 May 2004 07:20:30 -0500 (CDT)
From: InfoSec News [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: [ISN] Safe and insecure
Reply-To: [EMAIL PROTECTED]
List-Id: InfoSec News isn.attrition.org
List-Archive: http://www.attrition.org/pipermail/isn
List-Post: mailto:[EMAIL PROTECTED]
List-Help: mailto:[EMAIL PROTECTED]
List-Subscribe: http://www.attrition.org/mailman/listinfo/isn,
mailto:[EMAIL PROTECTED]
Sender: [EMAIL PROTECTED]

http://www.salon.com/tech/feature/2004/05/18/safe_and_insecure/index.html

By Micah Joel
May 18, 2004

Last week, I turned off all the security features of my wireless
router. I removed WEP encryption, disabled MAC address filtering and
made sure the SSID was being broadcast loud and clear. Now, anyone
with a wireless card and a sniffer who happens by can use my
connection to access the Internet. And with DHCP logging turned off,
there's really no way to know who's using it.

What's wrong with me? Haven't I heard about how malicious wardrivers
can use my connection from across the street to stage their hacking
operations? How my neighbors can steal my bandwidth so they don't have
to pay for their own? How I'm exposing my home network to attacks from
the inside? Yup.

So why am I doing this? In a word, privacy. By making my Internet
connection available to any and all who happen upon it, I have no way
to be certain what kinds of songs, movies and pictures will be
downloaded by other people using my IP address. And more important, my
ISP has no way to be certain if it's me.

In mid-April, Comcast sent letters to some of its subscribers claiming
that their IP addresses had been used to download copyrighted movies.
Since Comcast is not likely to improve customer satisfaction and
retention with this strategy, it's probable the letter was a result of
pressure from the Motion Picture Association of America or one of its
members. And to Comcast's credit, it stopped short of direct
accusation; instead it gives users an out. Says the letter, If you
believe in good faith that the allegedly infringing works have been
removed or blocked by mistake or misidentification, then you may send
a counter notification to Comcast.

That's good enough for me. I've already composed my reply in case I
receive one of these letters someday. Dear Comcast, I am so sorry. I
had no idea that copyrighted works were being downloaded via my IP
address; I have a wireless router at home and it's possible that
someone may have been using my connection at the time. I will do my
best to secure this notoriously vulnerable technology, but I can make
no guarantee that hackers will not exploit my network in the future.

If it ever comes down to a lawsuit, who can be certain that I was the
offender? And can the victim of hacking be held responsible for the
hacker's crimes? If that were the case, we'd all be liable for the
Blaster worm's denial of service attacks against Microsoft last year.

Don't get me wrong. I'm not deliberately opening my network to hackers
and miscreants bent on downloading copyrighted material. I'm simply
choosing not to secure it. That's no different from the millions of
people who haven't installed anti-virus software and the millions more
who don't keep theirs up to date. Yes, their vulnerabilities allow
viruses to spread more quickly, but that's their choice, right?

What about the security of my home network? A determined hacker may be
able to crack my passwords or exploit weaknesses in the operating
system that I never even thought of, but how is that different from
before? There's no system that's completely secure, so whether hackers
are inside or outside my firewall will make little difference. I'm
willing to trade a little security for privacy.

It feels strange to be opening up my network after years of vigorously
protecting it, and it's not without a tinge of anxiety that I do so.
But there's also a sense of liberation, of sticking it to the Man,
that's undeniable, as well as an odd sense of community. It seems
there's safety in numbers after all, even among strangers.


- - - - - - - - - - - -

About the writer Micah Joel is a systems engineer for a software
company, an award-winning tech presenter and an early adopter of home
wireless.



_
ISN mailing list
Sponsored by: OSVDB.org

--- end forwarded text


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Mixmaster Protocol Draft (revision)

2004-05-19 Thread Len Sassaman
An updated version of the Mixmaster Protocol Specification has been
published:

http://www.ietf.org/internet-drafts/draft-sassaman-mixmaster-01.txt

I'd like this to be the last revision, so if you have any comments on it
(or if you've raised issues in the past that you don't see addressed),
please let me know. Comment should be emailed to:

[EMAIL PROTECTED]


Thanks,

Len




RE: EU seeks quantum cryptography response to Echelon

2004-05-19 Thread Thomas Shaddack

On Tue, 18 May 2004, Tyler Durden wrote:

 Monyk believes there will be a global market of several million users once
 a workable solution has been developed. A political decision will have to
 be taken as to who those users will be in order to prevent terrorists and
 criminals from taking advantage of the completely secure communication
 network, he said.

Hope the technology hits the streets fast enough after getting on the
market. Monyk apparently doesn't believe that people who don't have the
money to buy the Official Approval have no right to access to this
technology.

 Silliness itself, at this point. Practical quantum cryptography at this
 point is limited to transmission. The moment it goes O/E, it's as vulnerable
 as any other data. And terrorists aren't going to bother splicing fiber.

There are quite many important activities that don't require storage of
the transported data.

For example, very very few people record their phone calls.



Re: [Asrg] Re: 3. Proof-of-work analysis

2004-05-19 Thread Barry Shein

I'm still amazed that anyone takes this proof-of-work/hashcash stuff
seriously.

At best it's the War Games approach, let's make the server play
tic-tac-toe with itself to avoid nuclear holocaust, or the Bill
Shatner logical paradox that makes the robot's head blow up.

The Sphinx's riddle also comes to mind, works better for supernatural
beings however.

I realize the defense of the dumbest ideas is always that any
criticism can be represented as rudeness, ``how rude of you not to see
the brilliance of my ideas!'', so one goes on and on anyhow but I
wonder if there's any way to disabuse this nonsense once and for all,
particularly in the minds of those who think it's a good idea?

In the words of someone famous whose name I'll leave out of this: This
idea isn't right, why, it isn't even wrong!


-- 
-Barry Shein

Software Tool  Die| [EMAIL PROTECTED]   | http://www.TheWorld.com
Purveyors to the Trade | Voice: 617-739-0202| Login: 617-739-WRLD
The World  | Public Access Internet | Since 1989 *oo*



RE: EU seeks quantum cryptography response to Echelon

2004-05-19 Thread Tyler Durden
Thomas Shaddack wrote...
There are quite many important activities that don't require storage of
the transported data.
For example, very very few people record their phone calls.

Storage wasn't my point per se. My point was that quantum cryptography only 
becomes unsnoopable* when it's in the optical form. With current optical 
fiber technologies this would limit the useful bandwidth distance product to 
short distances (ie, 10s of Km for key exchanges). After that, the signal 
must go O/E and then it's just the same as any normal digital signal.

Where Quantum Crypto might have application is in small metro area 
deployments, like downtown NYC or the DC Beltway, and where people are 
completely totally balls-to-the-wall paranoid about security (ie, they 
assume an attacker is willing to tap into their fiber and has all of the 
test sets needed to pull out a useful packet exchange--that ain't no 
pimply-face DoS script bunny, and hell it ain't Al Qaeda either).

Of course, to extend quantum protection beyond mere transport you'd need all 
sorts of quantum logic gates and processors (in addition to storage), but 
don't look for that in our lifetimes.

-TD
*: With quantum crypto it is of course possible to 'eavesdrop', depending on 
the coding, but that will cause the eavesdropper to quickly be revealed.

_
Express yourself with the new version of MSN Messenger! Download today - 
it's FREE! http://messenger.msn.click-url.com/go/onm00200471ave/direct/01/



Re: [Asrg] Re: 3. Proof-of-work analysis

2004-05-19 Thread Mark Baugher
At 03:02 PM 5/19/2004, Barry Shein wrote:
I'm still amazed that anyone takes this proof-of-work/hashcash stuff
seriously.
I think it's grounded in some well-accepted DoS defence principles that are 
found in cookie protocols like Photuris and ISAKMP.

Mark

At best it's the War Games approach, let's make the server play
tic-tac-toe with itself to avoid nuclear holocaust, or the Bill
Shatner logical paradox that makes the robot's head blow up.
The Sphinx's riddle also comes to mind, works better for supernatural
beings however.
I realize the defense of the dumbest ideas is always that any
criticism can be represented as rudeness, ``how rude of you not to see
the brilliance of my ideas!'', so one goes on and on anyhow but I
wonder if there's any way to disabuse this nonsense once and for all,
particularly in the minds of those who think it's a good idea?
In the words of someone famous whose name I'll leave out of this: This
idea isn't right, why, it isn't even wrong!
--
-Barry Shein
Software Tool  Die| [EMAIL PROTECTED]   | http://www.TheWorld.com
Purveyors to the Trade | Voice: 617-739-0202| Login: 617-739-WRLD
The World  | Public Access Internet | Since 1989 *oo*
___
Asrg mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/asrg