Re: ecash, cut choose and private credentials (Re: Jim Bell)

2000-12-03 Thread Adam Back
James wrote: Adam Back wrote: Hal says: http://www.finney.org/~hal/chcash1.html and http://www.finney.org/~hal/chcash2.html Wow look at the dates on those files -- Oct 93, and we still no deployed ecash. You'd think there would be a market there for porn sites alone

ecash, cut choose and private credentials (Re: Jim Bell)

2000-11-28 Thread Adam Back
[Hey Hal, what happened to your Chaum's ecash description? Can't find it to link to]. Anonymous wrote: Ray wrote: Even if she provides enough tokens to completely populate the cut-and-choose protocol, those tokens still have to have splits of valid identification information for

link padding traffic analysis (Re: ZKS -- the path to world domination)

2000-11-22 Thread Adam Back
Obfuscation writes: Adam Back writes: It's as strong as we could make it. Private interactive communications are a hard problem. As Wei and I were discussing in the "PipeNet protocol" thread in the last couple of weeks, there are 4 main properties you're trying to optimise o

ZKS Smart Privacy Policies

2000-10-31 Thread Adam Back
[Sent this once from a dud address trying to work around a mail problem -- apologies for duplicates] cypherpunk agent X wrote: Here we get to the meat of the issue... the item that NAI tried to force down our throats...Corporate Key Escrow.. this time via key splitting... Shades of the NSA

auditable gaming PRNGs (Re: PRNG server)

2000-09-03 Thread Adam Back
Seems to me you can do better with a gaming server. If the gaming server servers RNGs in a sequence such that each sample in the sequence can be verified, they don't need to trust the server; or at least there is an audit function. Eg. say that the server publishes subsequent pre-images in a

Re: /dev/random (Re: deriving yarrow test vectors)

2000-08-28 Thread Adam Back
HJ Keller writes: On Fri, Aug 25, 2000 at 09:54:02PM -0400, Adam Back wrote: You can see the effect if you do: % od -x /dev/random and hold down for example the control key, or any other key. You get a continuous stream of output while you hold the key down. This applies

/dev/random (Re: deriving yarrow test vectors)

2000-08-25 Thread Adam Back
Eric wrote: Adam wrote: There is for example code in PGP which looks at inter key press timings, and constructs 1st and 2nd order differentials to try to avoid stuck keys, people pressing the same key repeatedly etc. There's also the code in the linux /dev/random implementation, which

deriving yarrow test vectors

2000-08-24 Thread Adam Back
We would like to encourage people who have written yarrow implementations to participate in deriving test vectors. By arriving at a standard set of test vectors, we can better assure ourselves that implementations are consistent with the specification, and iron out different interpretations

mailcrypt-3.5.x security patch

2000-08-19 Thread Adam Back
identities, with an entry in your .emacs file which looks like this: (set-variable 'mc-pgp-user-id "Adam Back [EMAIL PROTECTED]") Mailcrypt-3.5 introduced pgp5 and gnuPG support. But they also changed the variable name. So if kept your existing .emacs file, they would silently ignore yo

RSA expiry commemorative version of PGP?

2000-08-02 Thread Adam Back
So as the RSA patent is expiring, and the PGP folks are pissed at RSA for various underhand legal shenanigans, can we expect a PGP version with RSA on by default, perhaps released midnight 20 September as a ceromonial event at the party? What about a GnuPG version which includes RSA and IDEA,

Re: reverse Zero Knowledge?

2000-08-01 Thread Adam Back
Ben writes: Imagine there is a blinding function b, and an unblinding function b'. Alice sends Bob b(y). Bob produces z=f'(b(y)). Alice extracts x = b'(z). Has this been done for RSA etc? Pass, but I can't see why anyone would, since f'() for RSA is thought to not exist. f' exists

carnivore is a windoze app... ha

2000-07-27 Thread Adam Back
Declan reports in his article that Carnivore is a "windows 2000 computer". Given the insecurity of windows, with or without source sooner or later someone is going to figure out a virus which frags it. Say like the email address overflow which hit outlook recently. The payload could be

alt.cypherpunks / mail2news (Re: cypherpunks spam - destroy the mailing list and go for a)slashsite

2000-07-16 Thread Adam Back
Tim writes: Making the Cypherpunks list a Usenet group has been discussed many, many times. In fact, search Usenet for "cypherpunks" and one should find one or more newsgroups, ready for use. (IIRC, Adam Back created several groups.) Not me. I think it was Paul Bradley i

FBI site blocking ZKS? (Re: Feds' hands caught in cookie jar)

2000-06-30 Thread Adam Back
Patrick writes: Of further interest is the fact that I cannot access the FBI website at all from the ZKS system. I use US-based ZKS proxies, so in effect the FBI is denying me, a U.S. taxpaying citizen, access to the public FBI website (created with my money of course). [...] I think

comments on proposed mixmaster v3 protocol

2000-06-30 Thread Adam Back
http://www.eskimo.com/~rowdenw/crypt/Mix/draft-moeller-v3-01.txt Some comments on the proposed mixmaster 3 protocol (see above). - Section 3.2 describes using Elgamal. Two problems with this 1) I'm not sure Elgamal is a good idea. RSA patent expires RSN, probably before mix3 is likely to get

napster vs gnutella -- why distributed systems win

2000-05-10 Thread Adam Back
So Napster (www.napster.com) has an architecture which includes a central server architecture for searching, and connecting to the network, has been legally forced to remove 100s of thousands of user accounts [1] So the is possible because a) the notion of an 'account' exists (napster is an IRC

Re: About payee untraceability ...

2000-03-09 Thread Adam Back
Stefan Brands writes: ... By the way, to forestall Clarice unblinding the cash received from Dave and thus knowing the identity of the cash Alice gets, here's one option: Alice provides the appropriate keys in an envelope Clarice encrypted to Dave, such that Dave encrypts the

stego / stealth remailers (Re: python script for stealth remailer)

2000-03-09 Thread Adam Back
Ch'i writes: I've been intrigued with the idea of "stealth remailers", which retrieve messages from news servers. In order to play with this idea a little I've written a quick-and-dirty python script. [...] So the stealth remailer conceals from the attacker which entry point the originator

Re: LogJam

2000-02-28 Thread Adam Back
Marcel Popescu [EMAIL PROTECTED] writes: Actually it's more like the store owner logging your name when you come in just to take a look at his price for beer (and he doesn't even have to ask you, because his security system will just query your ID smartcard). And while he's at it,