Re: Proof of Work - atmospheric carbon

2009-01-26 Thread John Gilmore
  If POW tokens do become useful, and especially if they become money,
  machines will no longer sit idle. Users will expect their computers to
  be earning them money (assuming the reward is greater than the cost to
  operate).

Computers are already designed to consume much less electricity when
idle than when running full tilt.  This trend will continue and
extend; some modern chips throttle down to zero MHz and virtually zero
watts at idle, waking automatically at the next interrupt.

The last thing we need is to deploy a system designed to burn all
available cycles, consuming electricity and generating carbon dioxide,
all over the Internet, in order to produce small amounts of bitbux to
get emails or spams through.

Can't we just convert actual money in a bank account into bitbux --
cheaply and without a carbon tax?  Please?

John

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to majord...@metzdowd.com


Re: Obama's secure PDA

2009-01-26 Thread Paul Hoffman
At 2:49 AM -0500 1/26/09, Ivan Krstiç wrote:
There are still conflicting reports about whether the hardware is an altered 
RIM BlackBerry or a different device, though the most likely contender for the 
latter option appears to be the General Dynamics Sectéra Edge, which features 
a trusted [secondary] display and two buttons used to switch between 
classified and unclassified operation.

Government Computer News says it is definitely not a BlackBerry. However, GCN's 
reporters aren't always as good as they should be (or even as good as the 
regular IT press) on getting their facts straight on security issues.

http://gcn.com/articles/2009/01/23/obama-gets-super-secure-smartphone.aspx

I too would like to hear more information on this, particularly the crypto that 
is known to be used on the Edge.

--Paul Hoffman, Director
--VPN Consortium

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to majord...@metzdowd.com


Re: Proof of Work - atmospheric carbon

2009-01-26 Thread John Levine
Can't we just convert actual money in a bank account into bitbux --
cheaply and without a carbon tax?  Please?

If only.  People have been saying for at least a decade that all we
have to do to solve the spam problem is to charge a small fee for
every message sent.  Unfortunately, there's a variety of reasons
that's never going to work.  One of the larger reasons is that despite
a lot of smart people working on micropayments, we have nothing
approaching a system that will work for billions of tranactions per
day, where 90% of the purported payments are bogus, along with the
lack of any interface to the real world financial system that would
scale and withstand the predictable attacks.

My white paper could use a little updating, but the basic conclusions
remain sound:

http://www.taugh.com/epostage.pdf

R's,
John

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to majord...@metzdowd.com


Re: Obama's secure PDA

2009-01-26 Thread Thor Lancelot Simon
On Mon, Jan 26, 2009 at 02:49:31AM -0500, Ivan Krsti? wrote:

 Finally, any idea why the Sect?ra is certified up to Top Secret for  
 voice but only up to Secret for e-mail? (That is, what are the differing 
 requirements?)

I know no specific details but strongly suspect the difference in
requirements, and thus certifications, stems from the likelyhood that
the device stores (even very briefly) email and cached web objects, but
does not store voice communications.

Thor

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to majord...@metzdowd.com


Re: Obama's secure PDA

2009-01-26 Thread Jerry Leichter

On Jan 26, 2009, at 2:49 AM, Ivan Krstić wrote:
[A]ny idea why the Sectéra is certified up to Top Secret for voice  
but only up to Secret for e-mail? (That is, what are the differing  
requirements?)
I have no information, but a guess:  Phone conversation encryption, at  
all levels, has been around for many years.  Email is a relative  
newcomer.  Further, the problem for voice is inherently simpler:  A  
conversation is transient.  It's not expected to be recorded, and I'm  
sure the devices are designed to make recording a conversation  
difficult even for someone with full access to the phone.  So you're  
dealing with establishing a secure session, with nothing left after  
the fact.  If you're talking email, on the other hand, you're  
inherently dealing with information at rest.  That changes the whole  
game, introducing issues of key management, maintenance of security  
level of time - a conversation once completed is gone, so the question  
of how to declassify it or move it to another compartment or whatever  
cannot arise - how to deal with forwarding, and so on.  All of this is  
inherent in a usable email system.  An email system for the White  
House has the additional complication of the Presidential Records  
Act:  Phone conversations don't have to be recorded, but mail messages  
do (and have to remain accessible).


It makes one wonder if this is a Sectéra limitation, a Sectéra-for- 
the-President limitation, or whether there is no Top Secret email  
infrastructure at all


-- Jerry

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to majord...@metzdowd.com