Re: eJazeera?

2002-11-11 Thread Harmon Seaver
On Sun, Nov 10, 2002 at 03:44:53PM -0500, Tyler Durden wrote:

(snip)
 Other methods seek to eliminate the need for various levels of 
 pre-knowledge between Bob and Alice, and to also stave off the round up 
 scenario where a large group is examined and cleansed of all electronica, 
 before data can make it onto the public net. (Less likely in US now, but 
 easily possible elsewhere).

   I don't think you can rule that out in the US -- seems to have been happening
a lot in recent times, the pigs corral a large group, keep them stationary for
some time, possibly with mass arrest following. 



-- 
Harmon Seaver   
CyberShamanix
http://www.cybershamanix.com

War is just a racket ... something that is not what it seems to the
majority of people. Only a small group knows what its about. It is
conducted for the benefit of the very few at the expense of the
masses.  --- Major General Smedley Butler, 1933

Our overriding purpose, from the beginning through to the present
day, has been world domination - that is, to build and maintain the
capacity to coerce everybody else on the planet: nonviolently, if
possible, and violently, if necessary. But the purpose of US foreign
policy of domination is not just to make the rest of the world jump
through hoops; the purpose is to faciliate our exploitation of
resources.
- Ramsey Clark, former US Attorney General
http://www.thesunmagazine.org/bully.html




Re: Photos in transport plane of prisoners: Time for eJazeera?

2002-11-11 Thread Mike Rosing
On Sun, 10 Nov 2002, Adam Shostack wrote:

 A full police state can't prevent anything, it can just make some
 things less common.  For example, samizdat in the USSR still got
 copied and passed around.  Drug use is a problem in US prisons.  Etc.

that kind of info can be limited by simply shooting everyone who was
close enough to take pictures.  No other military personell are going to
risk taking more.

Drugs are different than info.  there's real cash transfered, so guards
can quadruple their paychecks in a week.  But maybe that's a hint on how
to keep info flowing :-)

Patience, persistence, truth,
Dr. mike




Re: eJazeera?

2002-11-11 Thread Morlock Elloi
 Other methods seek to eliminate the need for various levels of pre-knowledge 
 between Bob and Alice, and to also stave off the round up scenario where a 
 large group is examined and cleansed of all electronica, before data can 

Live streaming is out of question as it would make detection trivial (not with
triangulation but by looking at the live video.)

So the mode would be

1) capture

2) move to the edge of the arena

3) stream via standardised protocol using (camouflaged) 8 3db omni stick
antenna. Do this in AP mode.

4) go to 1


Relayers could just point their 18 dB dishes from places as far as 3-4 miles
and capture (3). You can bet that every single news crew would be also dishing
for signal.

The countermeasure would be jamming 2.4 GHz, but this just means positioning
(2) farther away.



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:
U2 on LAUNCH - Exclusive greatest hits videos
http://launch.yahoo.com/u2




Transparent drive encryption now in FreeBSD

2002-11-11 Thread Lucky Green
FreeBSD's 5.0 release, due out in a couple of weeks, will offer much
anticipated transparent mass storage encryption. Subscribers to this
list so inclined are encouraged to review and test this new feature.

URLs:
  http://www.freebsd.org/cgi/cvsweb.cgi/src/sbin/gbde/
  http://www.freebsd.org/cgi/cvsweb.cgi/src/sys/geom/bde/

  
Thanks,
--Lucky Green




Workshop on HCI and Security at CHI2003

2002-11-11 Thread Adam Shostack
I think that the intersection of usability and security is of
tremendous import, and wanted to share an under-advertised sort of
workshop announcement:

http://www.acm.org/sigchi/

The conference home page is

http://www.chi2003.org/

The workshop page is

http://www.iit.nrc.ca/~patricka/CHI_2003/HCISEC/workshop.html

I thought that the workshop info would be accessible from the
conference site, but that appears not to be the case (at least not
yet).

Feel free to forward the URL to anyone else you think might be
interested.  Since it's at CHI, I expect we'll get plenty of people
from that community, but we also really want attendees from the
security community as well. 

- Chris




Re: eJazeera?

2002-11-11 Thread Bill Frantz
At 12:44 PM -0800 11/10/02, Tyler Durden wrote:
The methods can be various, but the easiest one was (I think) described by
Tim May. Bob and Alice are pre-known to each other. Bob holds a camera,
Alice has a Wi-Fi enabled laptop operational in her knapsack. After Bob
takes the photos/video, he transfers the images to ALice, who walks off and
moves the data to a secure and public site.

FWIW - I saw a TV transmitter kit in Fry's for $28.  It takes input from
Camcorders and broadcasts it on channel 3 or 4.  (It is low power so it
comes under FCC part 15 regulations.)  If you give one of these to the
camera holder, and one or more others have receivers/recorders, you have a
simple, cheap, off the shelf system.

Cheers - Bill


-
Bill Frantz   | The principal effect of| Periwinkle -- Consulting
(408)356-8506 | DMCA/SDMI is to prevent| 16345 Englewood Ave.
[EMAIL PROTECTED] | fair use.  | Los Gatos, CA 95032, USA




The End of the Golden Age of Crypto

2002-11-11 Thread Mike Duvos
Tim May wrote:

  So, in these four areas real code is being generated. These get
  mentioned on the list...one just has to notice them, and remember.

  My main point is to refute the defeatism that often is clothed in the
  language of cynicism and ennui. Much is still being done. It isn't
  getting the attention of the press, which is probably a good 
  thing. (They have moved on to other topics. And nobody is being
  threatened with jail, so crypto is no longer as edgy as it was when PRZ
  was facing prosecution, when crypto exports were illegal, when Clipper
  was in the news.)

Crypto export has been decriminalized, and cryptanalysis programs are now
illegal circumvention devices under the DMCA.  I am hard pressed to view
this as an improvement.  If DECSS and Advanced eBook Processor produce an
exhaltation of prosecutors bent on putting the authors in jail, I doubt
we'll be hearing if someone invents DE-SSH or DE-AES.  This greatly
reduces my faith in the robustness of ciphers, particularly those that
have been around to have their tires kicked for a decade or two.

Break a code, go to jail.  Even a silly code, like XOR. 

The 90's were the Golden Age of public access to crypto, largely driven by
public key cryptography and the need for people to do secure communication
over the Internet without physically meeting to exchange keys.

The 00's will be the Golden Age of something else.  Superintelligent AI
perhaps. 

  Even Rivest, Shamir, and Adleman knew essentially no number
  theory. One of them got the idea that maybe the difficulty of factoring
  could be used as the core for what they were doing...I have also heard
  that the idea came from another on the staff at MIT, but I won't get
  into that right now. Then they crammed and learned what they needed
  to learn about stuff like Euler's totient function, methods for finding
  primes, etc. It was enough.

Such cryptography is based on faith, much like tea-leaf reading.  We have
absolutely no hard mathematical evidence that factoring is any harder than
multiplying or taking square roots, or of the existence of easily computed
functions with computationally intractable inverses. 

We infer the existence of such things solely from the observation that the
human mind has not yet produced solutions to such problems.  If they were
really easy, we conjecture, someone would have figured out the answer by
now. 

Well, maybe. 

Evidence is begining to emerge which suggests that such a view may be
fundamentally flawed, and just as most humans cannot multiply 100 digit
numbers in their heads, so there are countless wonderful and simple
formulas whose derivation from scratch is so complex that no one will ever
find them simply by trying to derive them directly. 

Are hard problems hard because they have no simple solutions, or simply
because their simple solutions lie slightly beyond the range of our
current deductive radar?  Are they hard, or are we simply bad programmers? 

Compelling evidence for the latter explanation is beginning to mass. 

Consider, for instance, the following simple power series
(Bailey,Borwein,Plouffe) for Pi as a sum of inverse powers of 16. Multiply
by a power of 16 and take the fractional part, and you can compute
hexadecimal digits of Pi starting anywhere.

Pi = sum[0,infinity] [4/(8n+1) - 2/(8n+4) - 1/(8n+5) - 1/(8n+6)] * 1/16^n

Now it's pretty easy to verify that this does indeed compute Pi, with a
symbolic integrator, a pile of scratch paper, and much cancellation. 

Going in the other direction, however, is virtually impossible, unless you
already know precisely what you are looking for.  Given the task of
locating a rapidly convergent series for Pi in inverse powers of 16,
suitable for calculating arbitrary hexidecimal digits of Pi, one might
very well bumble around calculating forever, without stumbling across it.
The derivation is simply too difficult, and exists in a forest of equally
difficult derivations which don't produce Pi.

So how, one might inquire, did we come into possession of this handy
formula?  Well, it wasn't derived in a conventional sense.  Instead, a
computer program, PSLQ, a polynomial time numerically stable algorithm for
finding relationships between real numbers, was used to examine all such
formulas, and see if any of them produced Pi.  One did.  

It is likely our ability to generate algorithms by a direct grep of all
formulas having a specific form, and perhaps in the near future, all
formulas under a certain length, will uncover many simple but difficult to
directly derive formulas that do useful things.  It is this ability which
poses the greatest threat to cryptography in the current decade, as we
find to our surprise that many of the things we thought were hard, like
factorization, were merely obtuse, like trying to multiply big numbers in
your head. 
 
I think there's a very good chance that by the end of the decade, we will
all be laughing hysterically at how we ever could have thought 

eJazeera?

2002-11-11 Thread Tyler Durden
Well, the rason d'etre of 'eJazeera' as I see it is primarily for 
publically-taken photos and videos to be quickly gypsied away from their 
port of origination (ie, the camera that took them), so that they can 
eventually make it into a public place on ye old 'Net. The enabling 
technology as I see it here is802.11b, Wi-Fi. A typical scenario is the case 
of public demonstrations where the local authorities are called in, and 
where they get, shall we say, a little overzealous. In many such cases 
(here, New York City, Here, USA, and there--China, etc...), such authorities 
will attempt to confiscate devices that could have captured the events or 
captured the perpetrators (and their badge numbers, if applicable) in photo 
or video.

The ultimate aim of eJazeera is to make even the thought of capturing such 
video non-existent, due to the commonplace practices outlined in an 
eJazeera-type document (or eventually tribal knowledge). Short of that, it 
is of course in itself desirable for such events to get onto the public 
'Net.

The methods can be various, but the easiest one was (I think) described by 
Tim May. Bob and Alice are pre-known to each other. Bob holds a camera, 
Alice has a Wi-Fi enabled laptop operational in her knapsack. After Bob 
takes the photos/video, he transfers the images to ALice, who walks off and 
moves the data to a secure and public site.

Other methods seek to eliminate the need for various levels of pre-knowledge 
between Bob and Alice, and to also stave off the round up scenario where a 
large group is examined and cleansed of all electronica, before data can 
make it onto the public net. (Less likely in US now, but easily possible 
elsewhere).

ALso to be addressed in the document are (possibly) suggested technologies, 
down to the actual gadgets and manufacturers, and recommended spacial 
resolutions vs distances in order to record, say, badge numbers and facial 
features. Also, powering requirements won't hurt, as well as suggested 
methods for mitigating power issues.

(Hey--this might be way beyond what's needed or desirable, butI still think 
like an engineer).

In a reasonably just world, such images might be used in he short run to 
prosecute those that overstepped their legal bounds. Inthe long run, the 
commonplace practice of uploading such images should act as a deterrent to 
such overzealousness.

As it turns out, however, those POWs being transported were photographed in 
such a way as to not need something like eJazeera (unless the scope as I 
imagine it is broadened...is it worthwhile to consider the robust creation 
of image links etc... on the 'Net?).

-TD







From: Major Variola (ret) [EMAIL PROTECTED]
To: [EMAIL PROTECTED] [EMAIL PROTECTED]
Subject: Re: Photos in transport plane of prisoners: Time for eJazeera?
Date: Sat, 09 Nov 2002 17:53:48 -0800

At 08:32 PM 11/9/02 -0500, Tyler Durden wrote:
So I'm still playing with the idea of a publically-accessible document
that
outlines the strategies, technologies, aims and requirements for
somehow
uploading images and data to public repositorioes.

Such a document should enumerate the threat model and describe how each
threat
is resisted, or not.

Specific use-cases can be written: the GI who took the picture; the
photo-developer-tech who
kept copies; the bored netop who intercepted the pix; an activist who is
under insert type
surveillance.

Anyone interested? And what does it mean (if anything) to do this
within the
context of the Cypherpunk list?

Dis be da place, at least for talk :-)



_
Help STOP SPAM with the new MSN 8 and get 2 months FREE*  
http://join.msn.com/?page=features/junkmail



Hollings loss is our gain

2002-11-11 Thread Steve Schear
Those with an interest in consumer rights and DRM may take heart.  With the 
Republicans taking control of the Senate, Sen. Ernst Hollings will no 
longer be Chairman of the Commerce Committee.  His drive to sell out 
consumers for the special interests from Hollywood may now be blunted.  It 
will be interesting to see which Republican is selected to replace him and 
what policies are emphasized in the coming term.

steve



Re: eJazeera?

2002-11-11 Thread Ken Brown
As always, standards are driven by the mass-market and the mass market
is already speaking on this one. In 18 months time there will be no
difference between mobile phones  cheap digital cameras - all but the
cheapest phones will come with built-in cameras.

Its almost certain that these devices will have GPS location, and
probable that they will have Bluetooth as well. 802.11 less likely
because of power consumption - possible that there will be little base
stations  to go Blt - WiFi  so the Bluetooth becomes a wireless drop
cable. 

Realtime video isn't on the horizon unless someone pulls a lot of
bandwidth out of the bag, as ever network speeds grow more slowly than
processing power.

So effectively everybody will be walking around with the ability to take
timestamped photos and transmit them. BrinWorld arrives, at least in
public places.  No policeman gets to bludgeon a demonstrator unrecorded
ever again - expect them to wear visors and helmets increasingly often,
and to remove the identifying marks from uniforms (as, or course, riot
cops and vigilantes have been doing for decades)

The authorities will be able to take down the cell networks - though
they won't be able to do that without causing some publicity.  They
won't be able to confiscate all phones from everyone who is walking the
street. Presumably in high-security situation (like interviews with
presidents or rides on torture planes) phones can be removed from
visitors but they will be rare.  Mobile phones are now so ubiquitous
that taking them away has come to seem as odd as asking visitors to
remove their shoes or to wear face masks. 


Ken Brown


Tyler Durden wrote:
 
 Well, the rason d'etre of 'eJazeera' as I see it is primarily for
 publically-taken photos and videos to be quickly gypsied away from their
 port of origination (ie, the camera that took them), so that they can
 eventually make it into a public place on ye old 'Net. The enabling
 technology as I see it here is802.11b, Wi-Fi. A typical scenario is the case
 of public demonstrations where the local authorities are called in, and
 where they get, shall we say, a little overzealous. In many such cases
 (here, New York City, Here, USA, and there--China, etc...), such authorities
 will attempt to confiscate devices that could have captured the events or
 captured the perpetrators (and their badge numbers, if applicable) in photo
 or video.
 
 The ultimate aim of eJazeera is to make even the thought of capturing such
 video non-existent, due to the commonplace practices outlined in an
 eJazeera-type document (or eventually tribal knowledge). Short of that, it
 is of course in itself desirable for such events to get onto the public
 'Net.




Re: The End of the Golden Age of Crypto

2002-11-11 Thread Eric Cordian
Mike Duvos writes:

 Break a code, go to jail.  Even a silly code, like XOR. 

This is probably true.  In the current political climate, anyone who
posts turbo-factor on the Internet, and destroys secure communications
worldwide, can probably expect the secret tribunal followed by lethal
injection, after being smeared in the press as a traitor. 

Remember, if you're not on Shrub's bandwagon, helping him beat his little
drum, you're with the terrorists.

 The 00's will be the Golden Age of something else.  Superintelligent AI
 perhaps. 

Opposite ends of the complexity spectrum.  Superintelligent AI can break
strong crypto.  Strong crypto means superintelligent AI requires
intractable computation.

Perhaps the complexity landscape permits only a middle ground.  Not
particularly smart AI, and not particularly strong crypto.

 Even Rivest, Shamir, and Adleman knew essentially no number theory. 

 ... cryptography is based on faith, much like tea-leaf reading.  

A .sigfile quality observation, I'm sure.

 We have absolutely no hard mathematical evidence that factoring is any
 harder than multiplying or taking square roots, ...

I've always found it irksome that we haven't managed to move beyond
combination of congruences/homomorphism-based factoring techniques.

There has to be a simpler technique for unraveling multiplication, which,
after all, is a very simple and straightforward manipulation of bits.

 It is likely our ability to generate algorithms by a direct grep of all
 formulas having a specific form, and perhaps in the near future, all
 formulas under a certain length, will uncover many simple but difficult to
 directly derive formulas that do useful things.

Automated mining of reality for awesome but simple equations whose
derivations are just a bit too messy for humans to manually perform will
probably play an increasingly important role in the future of mathematics.

Ramanujan, as I recall, produced a lot of stuff which proved to be
correct, but which seemed impossible to arrive at without knowing it in
the first place.

 Delete PGP, Win a Free Turkey,

Har.

 Yes, folks.  It's the End of the Golden Age of Crypto.

Well, I'm not quite ready to run out and close the patent office yet.

We still have quantum cryptography and one-time pads, which, if our
current understanding is correct, are intrinsically unbreakable.

If one-way functions turn out to have been a crack-induced hallucination, 
quantum cryptography can replace public key systems for secure key
exchange.  

Some crypto-notable, I forget who, proposed putting satellites in orbit
which transmitted high bandwidth random noise, which one would XOR with
ones data before sending it.  The recipient, also receiving the satellite
signal, would know the starting bit in the random garbage, and could
decrypt.  Since it would be impractical to record the output of the
satellite over any period of time, this would preclude messages being
later decrypted, no matter how much CPU was thrown at them, as the
information to decrypt them would no longer exist.

Techniques like this, with satellite-based quantum crypto key exchange
services, would permit us to retain a reliable national crypto
infrastructure, should complexity-based systems fall apart under increased
combinatorial scrutiny.

-- 
Eric Michael Cordian 0+
O:.T:.O:. Mathematical Munitions Division
Do What Thou Wilt Shall Be The Whole Of The Law




Re: [eros-arch] Did you *really* zeroize that key?

2002-11-11 Thread Jeroen C. van Gelderen
On Sunday, November 10, 2002, at 07:33 PM, Jonathan S. Shapiro wrote:

4. Encrypt all *used* storage as it goes to disk, whereupon you don't
need to worry about explicitly zeroing the deleted storage.


This can be a problem when you are somehow forced to decrypt your 
storage contents to allow forensics.

The last, I think, is the right answer. On the whole, when my laptop is
stolen I don't want anybody to get *anything* useful off of that drive.
If they can't get anything useful, then in particular they cannot get my
crypto keys and I'm done.


Law enforcement can get your crypto keys in some backward countries.

First question: what is your threat model?

-J
--
Jeroen C. van Gelderen -- [EMAIL PROTECTED]

If you took the entire world-population (~6.5bn) and put them in Nebraska
(~77k square miles) you'd get a population density of 84k per square 
mile.
For reference: the population density in Manhattan is 85k per square 
mile.



Re: eJazeera?

2002-11-11 Thread Elyn Wollensky
 As always, standards are driven by the mass-market and the mass market
 is already speaking on this one. In 18 months time there will be no
 difference between mobile phones  cheap digital cameras - all but the
 cheapest phones will come with built-in cameras.

hate to bud in but ...

it is the cheap phones  plans that actually capitalize on the camera
phones. In Japan the easy example is J-Phone. They couldn't migrate to 3G or
upgrade to full 2.5G, so they put out really, really cheap camera phones
(subsidized with rebates to make them practically free) and captured the
teen market. In the US (as seen by TO-Mobiles extremely cheap new camera
phone currently being hocked in the US for a carrier that had to be
rebranded in order to now be sold off), this approach will be picked up by
more and more of the discount carriers (including pay as you go schemes) -
especially as rates are whatever the carrier want to make them for data.

 Its almost certain that these devices will have GPS location, and
 probable that they will have Bluetooth as well. 802.11 less likely
 because of power consumption - possible that there will be little base
 stations  to go Blt - WiFi  so the Bluetooth becomes a wireless drop
 cable.

The GPS locators all come pre-built in to the newer phones in Asia and
Europe  are heading to the US quicker then you can say government
ailout  -- now whether the carrier's announce this feature and/ or the crack
sales staffs at their stores know about them or not is irrelevant. Just
getting a Cingular or ATT Wireless carrier or salesperson to acknowledge
that you can flip chips from their phones to other phones is impossible,
(based on extensive personal research in the DC and NYC areas) as they won't
or don't understand the concept - but that doesn't mean it can't and isn't
being done.  Wi-Fi doesn't exist yet, but it is being experimented on and
will come as bandwidth use picks up, in order to cash in on VoIP schemes
(especially since this use - voice or not - could be labeled as data and
carriers could price at will and this would make up for the lost money from
the flat rate pricing wars).

 Realtime video isn't on the horizon unless someone pulls a lot of
 bandwidth out of the bag, as ever network speeds grow more slowly than
 processing power.

Actually in Asia (notably Korea and Japan) it works as well as internet
RealPlayer streaming video (in Japan, KDDI's flips from 2.5 to 3G without a
hitch and when going from 3 to 2.5G presents just a short time lag in time -
think of the buffering on RealPlayer -  NTT DoCoMo's all 3G video works
pretty flawlessly, but has certain area restrictions that they're working on
correcting). Europe's lagging a bit, but several government  EU loans are
subsidizing infrastructure costs and new intra-carrier arrangements are
helping them move towards video-capability by years end (at least in the
bigger cities). In the US the bandwidth is being sat on by carriers, as most
carriers own it already (remember the 3G Auctions a few years ago?) they
just don't have the money to roll-out a new infrastructure at the moment 
our government doesn't look ready to subsidize a complete infrastructure
redo like the French, German, Swedish (et al). As soon as the telcos see a
money making app they'll be on it quicker then you could imagine -- and with
several foreign carriers looking for investments in the US mobile market in
Q1 2003, it could be a lot sooner then anyone thinks.

;~)
e

 So effectively everybody will be walking around with the ability to take
 timestamped photos and transmit them. BrinWorld arrives, at least in
 public places.  No policeman gets to bludgeon a demonstrator unrecorded
 ever again - expect them to wear visors and helmets increasingly often,
 and to remove the identifying marks from uniforms (as, or course, riot
 cops and vigilantes have been doing for decades)

 The authorities will be able to take down the cell networks - though
 they won't be able to do that without causing some publicity.  They
 won't be able to confiscate all phones from everyone who is walking the
 street. Presumably in high-security situation (like interviews with
 presidents or rides on torture planes) phones can be removed from
 visitors but they will be rare.  Mobile phones are now so ubiquitous
 that taking them away has come to seem as odd as asking visitors to
 remove their shoes or to wear face masks.


 Ken Brown


 Tyler Durden wrote:
 
  Well, the rason d'etre of 'eJazeera' as I see it is primarily for
  publically-taken photos and videos to be quickly gypsied away from
their
  port of origination (ie, the camera that took them), so that they can
  eventually make it into a public place on ye old 'Net. The enabling
  technology as I see it here is802.11b, Wi-Fi. A typical scenario is the
case
  of public demonstrations where the local authorities are called in,
and
  where they get, shall we say, a little overzealous. In many such cases
  (here, New York City, 

Re: [eros-arch] Did you *really* zeroize that key?

2002-11-11 Thread Jonathan S. Shapiro
[Dave: since Bill forwarded his reply to eros-arch, I'm copying you and
cypherpunks on the reply.]

Background: Dave suggested language-level support for storage that must
be zeroed when freed. Bill Frantz forwarded this to me in the context of
paging-related optimizations and a possible exposure arising in EROS on
this issue.

So first, the OS *has* to know about the zero on free requirement, or
it *cannot* do the right thing. This is an issue both for swap and for
persistent data. In each case, blocks can be released without being
explicitly zeroed. The EROS system provides a per-block this block is
zero bit as part of the per-block metadata. This tremendously helps us
avoid I/Os, but it creates an exposure to offline forensics that could
be quite serious in the absence of other provisions. There are analogous
issues in conventional file systems that do lazy storage clearing.

I think it's useful to differentiate two bugs: exposure resulting from
reallocation of uncleaned storage, and exposure to offline forensics
through failure to clear the data. The first is just a bug, plain and
simple.

The second is part of a much larger problem. While cryptographic keys
are arguably more sensitive than most other data, they are certainly not
the *only* sensitive data, and it is impossible in general for
applications to know which data are sensitive. Wiley Coyote probably
wants his ACME A-Bomb plans encrypted, but might not care about the
HOWTO: Drop Big Rock on Roadrunner document. Lacking any knowledge of
content semantics, the word processor cannot tell which is which (a
point I found difficulty making clear to the Air Force recently).

In abstract, there appear to be four feasible design options:

1. Expose yourself to forensics! [Picture of disk drive in open
trenchcoat will not appear in countries where such content would be
considered lewd or suggestive]. That is, don't try to solve the problem
at all.

2. Accept a limited window of vulnerability by using background zeroing
during otherwise idle cycles. Problem is that the exposure at any given
time is unknown.

3. Tell the OS what to do, e.g. by a new option M_MUSTZERO to mmap() or
equivalent. The ELF object file format could very easily be extended in
this way today by adding a new section type and teaching the dynamic
loader about it -- the necessary directives are already in place in the
compilers to support the .init section. Big problem: it's yet another
exceptional condition that can go wrong.

4. Encrypt all *used* storage as it goes to disk, whereupon you don't
need to worry about explicitly zeroing the deleted storage.


The last, I think, is the right answer. On the whole, when my laptop is
stolen I don't want anybody to get *anything* useful off of that drive.
If they can't get anything useful, then in particular they cannot get my
crypto keys and I'm done.

Of course, this requires a per-device secure memory...

shap




Re: Transparent drive encryption now in FreeBSD

2002-11-11 Thread Tyler Durden
Sorry, I'm new, but does this refer to the notion of splitting up a document 
holographically, and placing the various pieces of numerous servers 
throughout the 'Net? (Any one piece will probably not contain a complete 
copy of the information, and is encrypted too, sot that it is not possible 
to say that Server X holds forbidden piece of info Y.) Andas I remember, 
removal of any one (or multiple) pieces on varying servers will do nothing 
towards elimating that content from the Universe.

Can any one confirm that this is more or less Transparent Mass Sotage 
Encryption?


From: Lucky Green [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
CC: [EMAIL PROTECTED]
Subject: Transparent drive encryption now in FreeBSD
Date: Sun, 10 Nov 2002 21:40:42 -0800

FreeBSD's 5.0 release, due out in a couple of weeks, will offer much
anticipated transparent mass storage encryption. Subscribers to this
list so inclined are encouraged to review and test this new feature.

URLs:
  http://www.freebsd.org/cgi/cvsweb.cgi/src/sbin/gbde/
  http://www.freebsd.org/cgi/cvsweb.cgi/src/sys/geom/bde/


Thanks,
--Lucky Green



_
MSN 8 with e-mail virus protection service: 2 months FREE* 
http://join.msn.com/?page=features/virus



Re: eJazeera?

2002-11-11 Thread Major Variola (ret)
All you need is
1. A few activists incl. a few to capture the content (eg, videographer,

photographer) who are willing to carry a few extra pounds
2. Someone to pony up the equiptment (some of which must be treated as
expendable)
3. Someone to set up  test the rig with the deployees.

Depending on your circles, you may find each of these types in different
abundances.

 The enabling
 technology as I see it here is802.11b, Wi-Fi. A typical scenario is
the case
 of public demonstrations where the local authorities are called in,
and
 where they get, shall we say, a little overzealous. In many such cases

 (here, New York City, Here, USA, and there--China, etc...), such
authorities
 will attempt to confiscate devices that could have captured the events
or
 captured the perpetrators (and their badge numbers, if applicable) in
photo
 or video.




Re: eJazeera?

2002-11-11 Thread Major Variola (ret)
 3) stream via standardised protocol using (camouflaged) 8 3db omni
stick
 antenna. Do this in AP mode.

Camoflaging this in the obvious place we note that our metallicized
underwear provides
a nice ground plane reflector, adding a db or two.




Re: eJazeera?

2002-11-11 Thread Steve Furlong
On Monday 11 November 2002 15:38, Major Variola (ret) wrote:
  3) stream via standardised protocol using (camouflaged) 8 3db omni

 stick

  antenna. Do this in AP mode.

 Camoflaging this in the obvious place we note that our metallicized
 underwear provides
 a nice ground plane reflector, adding a db or two.

Hey, that's a _good_ idea! And we can get side shielding by sticking the 
antenna between a fat guy's ass cheeks. The Fedz might notice that he's 
always keeping his butt pointed in one direction, but maybe that's 
normal at these events.

-- 
Steve FurlongComputer Condottiere   Have GNU, Will Travel

Vote Idiotarian --- it's easier than thinking




Re: Workshop on HCI and Security at CHI2003

2002-11-11 Thread Adam Shostack
Since posting, I got a better web page:

http://www.iit.nrc.ca/~patricka/CHI2003/HCISEC/index.html

Adam

On Mon, Nov 11, 2002 at 09:54:51AM -0500, Adam Shostack wrote:
| I think that the intersection of usability and security is of
| tremendous import, and wanted to share an under-advertised sort of
| workshop announcement:
| 
| http://www.acm.org/sigchi/
| 
| The conference home page is
| 
| http://www.chi2003.org/
| 
| The workshop page is
| 
| http://www.iit.nrc.ca/~patricka/CHI_2003/HCISEC/workshop.html
| 
| I thought that the workshop info would be accessible from the
| conference site, but that appears not to be the case (at least not
| yet).
| 
| Feel free to forward the URL to anyone else you think might be
| interested.  Since it's at CHI, I expect we'll get plenty of people
| from that community, but we also really want attendees from the
| security community as well. 
| 
| - Chris
| 
| -
| The Cryptography Mailing List
| Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]

-- 
It is seldom that liberty of any kind is lost all at once.
   -Hume




Re: [eros-arch] Did you *really* zeroize that key?

2002-11-11 Thread Dave Howe
Jeroen C. van Gelderen wrote:
 The last, I think, is the right answer. On the whole, when my laptop
 is stolen I don't want anybody to get *anything* useful off of that
 drive. If they can't get anything useful, then in particular they
 cannot get my crypto keys and I'm done.
 Law enforcement can get your crypto keys in some backward countries.
Yup, the UK is one of them. I think we are more concerned with hacking and
outright theft though, rather than being presented with a warrant and told
hand them thare key thingies over, sonny
Well I am anyhow :)




Re: Transparent drive encryption now in FreeBSD

2002-11-11 Thread David Wagner
Tyler Durden wrote:
Sorry, I'm new, but does this refer to the notion of splitting up a document 
holographically, and placing the various pieces of numerous servers 
throughout the 'Net?

No.  It is referring to conventional encryption of your local hard disk.




Re: [Dewayne-Net] RE: Hollings loss is our gain

2002-11-11 Thread Steve Schear
At 12:29 PM 11/11/2002 -0800, Dewayne Hendricks wrote:

[Note:  This comment comes from reader Chuck Jackson. DLH]

   At 11:00 -0800 11/11/02, Steve Schear wrote:

With the Republicans taking control of the Senate, Sen. Ernst
Hollings will no longer be Chairman of the Commerce
Committee.
SNIP

It will be interesting to see which
Republican is selected to replace him and what policies are
emphasized in the coming term.

It is virtually certain to be Senator McCain.


Although it always difficult to determine where a politician really stands 
on an issue.  Senator John McCain's (R-Arizona) said: I believe the 
concerns of content providers are justified. They invest creativity, 
effort, and capital into producing high quality films and programming and 
should be able, adequately, to protect their investments. I am 
apprehensive, however, of proposals that select technological winners and 
losers and mandate government intervention in the marketplace.

steve




RE: Transparent drive encryption now in FreeBSD

2002-11-11 Thread Lucky Green
Tyler wrote:
 Sorry, I'm new, but does this refer to the notion of 
 splitting up a document 
 holographically, and placing the various pieces of numerous servers 
 throughout the 'Net? (Any one piece will probably not contain 
 a complete 
 copy of the information, and is encrypted too, sot that it is 
 not possible 
 to say that Server X holds forbidden piece of info Y.) Andas 
 I remember, 
 removal of any one (or multiple) pieces on varying servers 
 will do nothing 
 towards elimating that content from the Universe.

FreeBSD's new GBDE subsystem has a different objective: it simply
provides for local drive-level encryption. I called it a mass storage
encryption system since the encryption is not necessarily limited to
hard drives, but could be used for other file systems, such as those on
a USB token or MemoryStick. The URLs in my original post explain some of
the details of what GBDE offers.

[...]
 FreeBSD's 5.0 release, due out in a couple of weeks, will offer much 
 anticipated transparent mass storage encryption. Subscribers to this 
 list so inclined are encouraged to review and test this new feature.
 
 URLs:
http://www.freebsd.org/cgi/cvsweb.cgi/src/sbin/gbde/
http://www.freebsd.org/cgi/cvsweb.cgi/src/sys/geom/bde/
 
 
 Thanks,
 --Lucky Green
 
 
 _
 MSN 8 with e-mail virus protection service: 2 months FREE* 
 http://join.msn.com/?page=features/virus