Re: [Cryptography] prism proof email, namespaces, and anonymity

2013-09-15 Thread StealthMonger
by the appropriate key and presented. Other messages are discarded. [1] See mailto URL below. -- -- StealthMonger stealthmon...@nym.mixmin.net Long, random latency is part of the price of Internet anonymity. anonget: Is this anonymous browsing, or what? http://groups.google.ws

[Cryptography] dead man switch [was: Re: Snowden fabricated digital keys to get access to NSA servers?]

2013-07-07 Thread StealthMonger
it will indeed release that secret. (For example, in one implementation -- NOT CRYPTOGRAPHICALLY STRONG -- a secret file's access permissions can only be granted by the robot.) -- -- StealthMonger stealthmon...@nym.mixmin.net Long, random latency is part of the price of Internet anonymity

Re: [Cryptography] Snowden fabricated digital keys to get access to NSA servers?

2013-07-04 Thread StealthMonger
of a dead man switch in the present case. [1] http://lists.randombit.net/pipermail/cryptography/2012-September/thread.html -- -- StealthMonger stealthmon...@nym.mixmin.net Long, random latency is part of the price of Internet anonymity. anonget: Is this anonymous browsing, or what

Re: A mighty fortress is our PKI, Part II

2010-07-29 Thread StealthMonger
. For these applications, the security has to be in the message, not the connection. Offline verification is essential. -- StealthMonger stealthmon...@nym.mixmin.net -- stealthmail: Scripts to hide whether you're doing email, or when, or with whom. mailto:stealthsu

Re: Why the poor uptake of encrypted email?

2008-12-16 Thread StealthMonger
. stealthmail: Scripts to hide whether you're doing email, or when, or with whom. mailto:stealthsu...@nym.mixmin.net -- StealthMonger stealthmon...@nym.mixmin.net stealthmon...@nym.panta-rhei.eu.org

Why the poor uptake of encrypted email? [Was: Re: Secrets and cell phones.]

2008-12-08 Thread StealthMonger
James A. Donald [EMAIL PROTECTED] writes: Of course, the old cypherpunk dream is a system with end to end encryption, with individuals having the choice of holding their own secrets, rather than these secrets being managed by some not very trusted authority We discovered, however,

Re: road toll transponder hacked

2008-08-28 Thread StealthMonger
, untraceable nyms may be the only way that one can live as a responsible adult, rather than a subject of a nanny state. -- StealthMonger [EMAIL PROTECTED] [EMAIL PROTECTED] -- stealthmail: Scripts to hide whether you're doing email, or when, or with whom. mailto:[EMAIL

Re: Fixing SSL (was Re: Dutch Transport Card Broken)

2008-02-03 Thread StealthMonger
is online, real-time. Even if other clues are erased, there's still traffic analysis in this case. What the offline paradigm has going for it is the possibility of true, untraceable anonymity through the use of anonymizing remailers and related technologies. -- StealthMonger [EMAIL PROTECTED

The need for off-line communication [was: Re: 307 digit number factored]

2007-06-09 Thread StealthMonger
off-line does the option exist of untraceable traffic mixing such as remailer chains. This subject is on-topic here because cryptography is an indispensable ingredient of these untraceable traffic mixes. -- StealthMonger [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL

Re: 307 digit number factored

2007-05-24 Thread StealthMonger
latency and can be traced by traffic analysis. -- StealthMonger [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED] -- stealthmail: Scripts to hide whether you're doing email, or when, or with whom. http://stealthsuite.afflictions.org

Re: Piercing network anonymity in real time

2006-05-14 Thread StealthMonger
Ivan Krstic [EMAIL PROTECTED] writes: Calling this piercing network anonymity in real time is highly misleading; in reality, it's more like making it bloody obvious that there's no such thing as network anonymity. No. Ever hear of Chaum's Dining Cryptographers [1]? Anonymity right there at

Re: Piercing network anonymity in real time

2006-05-10 Thread StealthMonger
[EMAIL PROTECTED] writes: eTelemetry Locate [Image] Locate dynamically discovers, correlates and archives the person behind the IP address ... Another reason to use StealthMail -- see package description below. StealthMail still needs an

Re: PGP master keys

2006-04-28 Thread StealthMonger
. In a version downloaded via the Agora web-to-mail gateway at Sat, 29 Apr 2006 03:42:05 +0900 (JST), the second sentence reads PGP says its open source encryption code also guarantees no back doors. (full stop) -- StealthMonger

Re: NPR : E-Mail Encryption Rare in Everyday Use

2006-03-01 Thread StealthMonger
. It has been in everyday use for years, although not widely. Details on request. I am looking for someone to host it. Any volunteers? -- StealthMonger [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED

Re: X.509 / PKI, PGP, and IBE Secure Email Technologies

2005-12-08 Thread StealthMonger
James A. Donald [EMAIL PROTECTED] writes: ... email should be sent by a direct connection from the client to the recipient mail server, rather than this store and forward crap. This would eliminate the only available technique for strong anonymity or pseudonymity. Strong anonymity or