Re: making anonymity illegal

2003-01-26 Thread geer
Will A. Rodger [EMAIL PROTECTED] writes: That would be a wise move. That would continue for about three weeks, and then we'd see a bill out of Congress demanding that ISPs retain identity for, oh, maybe seven years? The population can be rather easily bought to do this, coercion won't

Re: DOJ proposes US data-rentention law.

2002-06-22 Thread geer
Steve, Not arguing, but the hardware cost curve for storage has a shorter halving time than the cost curve for CPU (Moore's Law) and the corresponding halving time for bandwidth is shorter still. If that relationship holds up over a period of years, today's tradeoffs between cache,

Re: Schneier on Bernstein factoring machine

2002-04-17 Thread Dan Geer
The union of the two sets of cryptography users and paranoid people is necessarily non-empty. Who would bother to use cryptography sans a threat model? And if you've got a non-empty threat model, then by definition you're paranoid. Uh, I don't have to run faster than the bear I

Re: KYC: new FinCEN rule on information sharing

2002-03-01 Thread Dan Geer
http://www.treas.gov/fincen/po1044.htm For what it is worth, the apparent consensus view amongst U.S. financial institutions is that if T+1 clearence and straight through processing (STP) are to become operational realities, then authentication and authorization credentials must be ones

Re: Where's the smart money?

2002-02-11 Thread Dan Geer
I predict a new EMP vandalism tool that fries the moneychip. And provides an alibi to passers of notes with no working chip. You are, of course, assuming that RFID money that has been damaged will still be accepted without manual processing delays to the putative depositor. I can, after

Re: biometrics

2002-02-06 Thread Dan Geer
|At 07:59 PM 1/26/2002 -0500, Scott Guthery wrote: |(A test GSM authentication algorithm, COMP128, was attacked |but it is not used in any large GSM networks. And it |was the algorithm not the SIM that was attacked.) | |and at Sun, 27 Jan 2002 13:56:13 EST. Greg Rose

Re: biometrics

2002-02-06 Thread Dan Geer
In the article they repeat the recommendation that you never use/register the same shared-secret in different domains ... for every environment you are involved with ... you have to choose a different shared-secret. One of the issues of biometrics as a shared-secret password

Re: biometrics

2002-01-24 Thread Dan Geer
Folks, while we argue fine points we drift towards irrelevance [1] National ID in Development (USA Today) [2] Computer Security, Biometrics Dominate NIST Agenda (Washington Post) --dan [1] National ID in Development USA Today, 22 January 2002 Federal and state groups are moving to create

Re: Learning the rules

2002-01-24 Thread Dan Geer
... They begin with swashbuckling independence: new players spring up, operating in a sort of new frontier, unconstrained by governments. But, once a technology acquires commercial importance, rules and standards emerge. Why? Because, argues Ms Spar, the industry's most

Re: Stegdetect 0.4 released and results from USENET search available

2001-12-30 Thread Dan Geer
I download all of alt.anonymous.messages from the same news server that large numbers of people post and download child porn on. It might be that child porn posted to these lists is the most attractive vehicle as it is illegal everywhere, it will not be downloaded at random, those who do

Re: New encryption technology closes WLAN security loopholes

2001-09-30 Thread Dan Geer
Or in other words, the first requirement for perimeter security is a perimeter. Wireless networks have no interior. Merging them with a perimeter-protected network will yield a network with the character of the wireless net. This is at once the the beauty of community nets and the end

Re: Outreach Volunteers Needed - Content Control is a Dead End

2001-08-30 Thread Dan Geer
Content control is a dead end. Folks, You only get an even number of {privacy, copyright} -- either the owner of information controls how it is used or he does not. Either you embrace copyright-and-privacy, or you embrace neither. It really is time to be careful what you ask for. --dan