Re: [cryptography] To Protect and Infect Slides

2014-01-09 Thread ianG
On 9/01/14 00:38 AM, d...@geer.org wrote: Keying off of one phrase alone, This combat is about far more than crypto... I suggest you immediately familiarize yourself with last month's changes to the Wassenaar Agreement, perhaps starting here:

Re: [cryptography] To Protect and Infect Slides

2014-01-08 Thread dan
Keying off of one phrase alone, This combat is about far more than crypto... I suggest you immediately familiarize yourself with last month's changes to the Wassenaar Agreement, perhaps starting here:

Re: [cryptography] To Protect and Infect Slides

2014-01-08 Thread Paul Grubbs
New to the mailing list, sorry if this is formatted improperly. Does the 'intrusion software' category include open-source stuff like Metasploit? Also, how will this affect software security testing by private companies? Many infosec consulting companies have in-house proprietary software for

Re: [cryptography] To Protect and Infect Slides

2014-01-08 Thread John Young
Thanks. We posted the Wassenaar changes on Cryptome on December 19. http://cryptome.org/2013/12/wassenaar-intrusion.htm http://cryptome.org/2013/12/wassenaar-list-13-1204.pdf The intrusion software has received some but not sufficient attention. And beyond the sections you cite there are many

Re: [cryptography] To Protect and Infect Slides

2014-01-06 Thread Laurens Vets
On 2014-01-05 01:01, John Young wrote: If your server or ISP generates log files, as all do, you cannot be secure. If upstream servers generate log files, as all do, you cannot be secure. If local, regional, national and international servers generate log files, as all do, you cannot be secure.

Re: [cryptography] To Protect and Infect Slides

2014-01-06 Thread John Young
Logs needed run the Internet steadily, securely and cheaply are not what logs files have grown into: Bloated, malicious, exploitive and very lucrative spying on users. This is why there are thousands of firms providing log files exploitation programs and services. Every product manufacturer touts

Re: [cryptography] To Protect and Infect Slides

2014-01-05 Thread Isaac Gorton
Hi Jacob, I just watched your 30c3 presentation on Youtube. About halfway through you described an exploit on Dell servers that uses the JTAG, and then asked; Why did Dell leave a JTAG debugging interface on these servers?” There is nothing nefarious or uncommon about an active JTAG

Re: [cryptography] To Protect and Infect Slides

2014-01-05 Thread Kevin W. Wall
On Tue, Dec 31, 2013 at 3:13 PM, Jacob Appelbaum ja...@appelbaum.netwrote: Kevin W. Wall: On Tue, Dec 31, 2013 at 3:10 PM, John Young j...@pipeline.com wrote: 30c3 slides from Jacob Appelbaum: http://cryptome.org/2013/12/appelbaum-30c3.pdf (3.8MB) And you can find his actual prez

Re: [cryptography] To Protect and Infect Slides

2014-01-04 Thread Eduardo Robles Elvira
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 31/12/13 21:13, Jacob Appelbaum wrote: I'm also happy to answer questions in discussion form about the content of the talk and so on. I believe we've now released quite a lot of useful information that is deeply in the public interest. All

Re: [cryptography] To Protect and Infect Slides

2014-01-04 Thread John Young
If your server or ISP generates log files, as all do, you cannot be secure. If upstream servers generate log files, as all do, you cannot be secure. If local, regional, national and international servers generate log files, as all do, you cannot be secure. So long as log files are ubiquitous on

Re: [cryptography] To Protect and Infect Slides

2014-01-04 Thread Kevin
On 1/4/2014 7:01 PM, John Young wrote: If your server or ISP generates log files, as all do, you cannot be secure. If upstream servers generate log files, as all do, you cannot be secure. If local, regional, national and international servers generate log files, as all do, you cannot be secure.

Re: [cryptography] To Protect and Infect Slides

2014-01-01 Thread Ralph Holz
Hi Jake, Ian Grigg just made a point on metzdowd that I think is true: if you want to change the NSA, you need to address the many corporates that profit from what they are doing. Because the chain goes like this: corporate money - election campaigns - representatives - NSA What do you think?

Re: [cryptography] To Protect and Infect Slides

2014-01-01 Thread coderman
On Wed, Jan 1, 2014 at 3:56 AM, Ralph Holz h...@net.in.tum.de wrote: Hi Jake, Ian Grigg just made a point on metzdowd that I think is true: if you want to change the NSA, you need to address the [...] [... money] Because the chain goes like this: corporate money - election campaigns -

Re: [cryptography] To Protect and Infect Slides

2014-01-01 Thread Shawn Wilson
If you'll notice that both political parties have expanded on the NSA's mission, scope, and probably funding. I doubt there are any business motives here. In fact, it seems to me there are the exact opposite. Though, since much of government is now contracted out, I do wonder who this was

Re: [cryptography] To Protect and Infect Slides

2014-01-01 Thread John Young
Jake's, Assange's and others' emphasis at 30c3 was to pursue technological offenses rather than futile expectation of political, financial and legal controls of spying which inevitably confirm what spies do, for it is in their interest to support spyin and secrecy to maintain hegemonic,

Re: [cryptography] To Protect and Infect Slides

2014-01-01 Thread Ed Stone
On Wed, Jan 1, 2014 at 3:56 AM, Ralph Holz h...@net.in.tum.de wrote: Hi Jake, Ian Grigg just made a point on metzdowd that I think is true: if you want to change the NSA, you need to address the many corporates that profit from what they are doing. Because the chain goes like this:

Re: [cryptography] To Protect and Infect Slides

2014-01-01 Thread Jeffrey Walton
On Wed, Jan 1, 2014 at 7:22 AM, coderman coder...@gmail.com wrote: On Wed, Jan 1, 2014 at 3:56 AM, Ralph Holz h...@net.in.tum.de wrote: Hi Jake, Ian Grigg just made a point on metzdowd that I think is true: if you want to change the NSA, you need to address the [...] [... money] Because the

Re: [cryptography] To Protect and Infect Slides

2013-12-31 Thread Kevin W. Wall
On Tue, Dec 31, 2013 at 3:10 PM, John Young j...@pipeline.com wrote: 30c3 slides from Jacob Appelbaum: http://cryptome.org/2013/12/appelbaum-30c3.pdf (3.8MB) And you can find his actual prez here: https://www.youtube.com/watch?v=b0w36GAyZIA Worth the hour, although I'm sure your blood