Re: Technological Solution

2001-04-29 Thread dmolnar
On Sat, 28 Apr 2001, Declan McCullagh wrote: If only they worked. There was an interesting paper presented here in Pittsburgh at the info hiding workshop this week that suggested a way to strengthen the somewhat-suckful mixmaster network. (Of That would be A Reputation System To Increase

RE: layered deception

2001-04-29 Thread Sandy Sandfort
Declan wrote: I rather like the idea of encrypting the logs on the fly and shipping them offshore. Your offshore partner will be instructed to turn over the logs only if you are not asking for them under duress. (A reasonable protocol can probably be worked out. Would a court order

Re: Technological Solution

2001-04-29 Thread Declan McCullagh
On Sat, Apr 28, 2001 at 08:49:43PM -0700, Tim May wrote: Well, better than nothing. (Like I said in another article tonight, the best is often the enemy of the good.) We knew even in 1992 that remailers were a pale imitation of the DC Nets discussed a few years earlier by Chaum and

Re: Technological Solution

2001-04-29 Thread Tim May
At 11:22 PM -0400 4/28/01, Declan McCullagh wrote: On Sat, Apr 28, 2001 at 06:32:08PM -0700, Tim May wrote: None of the non-cryptographic methods are very resistant to legal, technical, sniffing, and black bag attacks. And only multiply-chained encrypted-at-each-stage messages, a la

Re: Technological Solution

2001-04-29 Thread John Young
Tim May wrote: None of the non-cryptographic methods are very resistant to legal, technical, sniffing, and black bag attacks. And only multiply-chained encrypted-at-each-stage messages, a la remailers, are adequate for high-value messages. Those who've read it know that Jim Bamford's Body of

Re: Technological Solution

2001-04-29 Thread Tim May
At 6:32 PM -0700 4/28/01, Tim May wrote: (You see, the quick review process is much better than the method you suggested re: economics, that people read the main textbooks. People don't need to spend several months wading through cryptography textbooks to come up to a level that is sufficient

Re: Technological Solution

2001-04-29 Thread Tim May
At 2:24 PM -0500 4/28/01, Aimee Farr wrote: Reading the IMC gag order, Henson, the latest anonymous poster stuff, and Tim et. al. beating my head in pavement Since many forums don't allow for 'nymity, (or people just don't), what about a protected/offshore self-destruct quicktopic-like

Choate - Enough is Enough

2001-04-29 Thread aluger
10 messages in a row from Choat on the 29th in the course of an hour and not a single one held a pair of relevant bytes. C'mon. Enough is enough. Will someone at lne.com finally decide that he qualifies as spam and start filtering? That simple act would improve the signal to noise ratio

Re: layered deception

2001-04-29 Thread Tim May
On Sunday, April 29, 2001, at 07:41 PM, Declan McCullagh wrote: I think Matt is a bit too quick to conclude a court will charge the operator with contempt and that the contempt charge will stick on appeal. Obviously judges have a lot of discretion, but it doesn't seem to me like the

RE: layered deception

2001-04-29 Thread Phillip H. Zakas
i agree...unless you're specifically directed to do so, maintaining log files is completely optional. there are no regs requiring isps or websites or mail providers to do so, other than the standard 'you need to comply with a court order or search warrant, etc.' as for the 'encrypt it' or

Re: layered deception

2001-04-29 Thread Kevin L Prigge
On Mon, Apr 30, 2001 at 12:13:01AM -0400, Phillip H. Zakas wrote: i agree...unless you're specifically directed to do so, maintaining log files is completely optional. there are no regs requiring isps or websites or mail providers to do so, other than the standard 'you need to comply with a

RE: layered deception

2001-04-29 Thread Sandy Sandfort
Kevin wrote: From recent experience, LE provides us with an order to preserve certain logged information. The order is in advance of obtaining a search warrant... What form do these orders take? Who, specifically, makes the order? What authority is cited to back up the power to make such

Re: layered deception

2001-04-29 Thread Kevin L Prigge
On Sun, Apr 29, 2001 at 10:11:40PM -0700, Sandy Sandfort wrote: Kevin wrote: From recent experience, LE provides us with an order to preserve certain logged information. The order is in advance of obtaining a search warrant... What form do these orders take? Who, specifically,

Re: layered deception

2001-04-29 Thread Tim May
On Sunday, April 29, 2001, at 10:59 PM, Kevin L Prigge wrote: On Sun, Apr 29, 2001 at 10:11:40PM -0700, Sandy Sandfort wrote: Kevin wrote: From recent experience, LE provides us with an order to preserve certain logged information. The order is in advance of obtaining a search warrant...