Re: [PracticalSecurity] Anonymity - great technology but hardly used

2005-10-26 Thread Stephan Neuhaus
cyphrpunk wrote: The main threat to this illegal but widely practiced activity is legal action by copyright holders against individual traders. The only effective protection against these threats is the barrier that could be provided by anonymity. An effective, anonymous file sharing network

Re: On the orthogonality of anonymity to current market demand

2005-10-26 Thread John Kelsey
From: R.A. Hettinga [EMAIL PROTECTED] Sent: Oct 25, 2005 8:34 AM To: cryptography@metzdowd.com, [EMAIL PROTECTED] Subject: On the orthogonality of anonymity to current market demand ... That is to say, your analysis conflicts with the whole trend towards T-0 trading, execution, clearing and

[no subject]

2005-10-26 Thread The Nationalist Alliance
Title: THE NATIONALIST ALLIANCE WEEK THE NATIONALIST ALLIANCE WEEK Speak The Truth And Fear No-one www.allnationalist.com email: [EMAIL PROTECTED] in a week where we see rioting in Birmingham over sexual attacks commited by asian men and the mass media coverage we see that a program in

RE: [EMAIL PROTECTED]: Skype security evaluation]

2005-10-26 Thread Ivars Suba
Is it possible that Skype doesn't use RSA encryption? Or if they do, do they do it without using any padding, and is that safe? No ,Skype use RSA encryption: Each party contributes 128 random bits toward the 256-bit session key. The contributions are exchanged as RSA cryptograms. The two

/. [Snooping Through Walls with Microwaves]

2005-10-26 Thread Eugen Leitl
Link: http://slashdot.org/article.pl?sid=05/10/26/0424211 Posted by: ScuttleMonkey, on 2005-10-26 10:26:00 denis-The-menace writes According to an article from newscientist, scientists have devised a system to [1]use microwave energy for surveillance. If people are speaking inside the

RE: crypto on sonet is free, Tyler

2005-10-26 Thread Tyler Durden
Yo Variola! Did you notice the date stamp on that post? Did you do a stint on Survivor or something? Or as I said to the short-lived Tom Veil, What, no Starbucks near your Unabomber shack? -TD From: Major Variola (ret) [EMAIL PROTECTED] To: [EMAIL PROTECTED] [EMAIL PROTECTED] Subject:

Re: [PracticalSecurity] Anonymity - great technology but hardly used

2005-10-26 Thread J
--- Travis H. [EMAIL PROTECTED] wrote: [snip] Another issue involves the ease of use when switching between a [slower] anonymous service and a fast non-anonymous service. I have a tool called metaprox on my website (see URL in sig) that allows you to choose what proxies you use on a

Re: [EMAIL PROTECTED]: Skype security evaluation]

2005-10-26 Thread Dirk-Willem van Gulik
On Mon, 24 Oct 2005, cyphrpunk wrote: Is it possible that Skype doesn't use RSA encryption? Or if they do, do they do it without using any padding, and is that safe? You may want to read the report itself: http://www.skype.com/security/files/2005-031%20security%20evaluation.pdf and

cwqficmxgzaynntr

2005-10-26 Thread service
Dear user cypherpunks, You have successfully updated the password of your Minder account. If you did not authorize this change or if you need assistance with your account, please contact Minder customer service at: [EMAIL PROTECTED] Thank you for using Minder! The Minder Support Team

Legally thwarting FBI surveillance of libraries and ISPs

2005-10-26 Thread Steve Schear
I'm one of those that believes that agrees with Louis Brandice's dissenting opinion about the constitutionality of wiretaps. That they violate the privacy of those parties who call or are called by the party being wiretapped. I have written on this in 2002/2003. There seem to be at least two

On Digital Cash-like Payment Systems

2005-10-26 Thread James A. Donald
Date sent: Tue, 25 Oct 2005 00:38:36 +0200 To: cyphrpunk [EMAIL PROTECTED] Copies to: John Kelsey [EMAIL PROTECTED], Ian G [EMAIL PROTECTED], [EMAIL PROTECTED], cryptography@metzdowd.com, [EMAIL PROTECTED] From: [EMAIL

Re: [fc-discuss] Financial Cryptography Update: On Digital Cash-like Payment Systems

2005-10-26 Thread James A. Donald
-- Steve Schear [EMAIL PROTECTED] Yes, but unfortunately it is not clear at all that courts would find the opposite, either. If a lawsuit names the currency issuer as a defendant, which it almost certainly would, a judge might order the issuer's finances frozen or impose other measures

Re: [fc-discuss] Financial Cryptography Update: On Digital Cash-like Payment Systems

2005-10-26 Thread Ian G
John Kelsey wrote: From: cyphrpunk [EMAIL PROTECTED] Digital wallets will require real security in user PCs. Still I don't see why we don't already have this problem with online banking and similar financial services. Couldn't a virus today steal people's passwords and command their banks to

Re: On the orthogonality of anonymity to current market demand

2005-10-26 Thread James A. Donald
-- John Kelsey What's with the heat-death nonsense? Physical bearer instruments imply stout locks and vaults and alarm systems and armed guards and all the rest, all the way down to infrastructure like police forces and armies (private or public) to avoid having the biggest gang end up

Re: [PracticalSecurity] Anonymity - great technology but hardly used

2005-10-26 Thread Alexander Klimov
On Wed, 26 Oct 2005, JЖrn Schmidt wrote: --- Travis H. [EMAIL PROTECTED] wrote: [snip] Another issue involves the ease of use when switching between a [slower] anonymous service and a fast non-anonymous service. I have a tool called metaprox on my website (see URL in sig) that allows

Re: [PracticalSecurity] Anonymity - great technology but hardly used

2005-10-26 Thread Justin
On 2005-10-26T08:21:08+0200, Stephan Neuhaus wrote: cyphrpunk wrote: The main threat to this illegal but widely practiced activity is legal action by copyright holders against individual traders. The only effective protection against these threats is the barrier that could be provided

packet traffic analysis

2005-10-26 Thread John Denker
Travis H. wrote: Part of the problem is using a packet-switched network; if we had circuit-based, then thwarting traffic analysis is easy; you just fill the link with random garbage when not transmitting packets. OK so far ... There are two problems with this; one, getting enough

Re: [PracticalSecurity] Anonymity - great technology but hardly used

2005-10-26 Thread Hagai Bar-El
Hello, At 25/10/05 07:18, cyphrpunk wrote: http://www.hbarel.com/Blog/entry0006.html I believe that for anonymity and pseudonymity technologies to survive they have to be applied to applications that require them by design, rather than to mass-market applications that can also do

Re: [PracticalSecurity] Anonymity - great technology but hardly used

2005-10-26 Thread Ben Laurie
Travis H. wrote: Part of the problem is using a packet-switched network; if we had circuit-based, then thwarting traffic analysis is easy; you just fill the link with random garbage when not transmitting packets. I considered doing this with SLIP back before broadband (back when my friend

Re: [PracticalSecurity] Anonymity - great technology but hardly used

2005-10-26 Thread Shawn K. Quinn
On Tue, 2005-10-25 at 23:40 -0500, Travis H. wrote: Many of the anonymity protocols require multiple participants, and thus are subject to what economists call network externalities. The best example I can think of is Microsoft Office file formats. I don't buy MS Office because it's the best

MediaSentiment Newsletter: Vol. No. 1, Issue No. 12, October 17, 2005

2005-10-26 Thread Newsletter

Re: Can you help?

2005-10-26 Thread Cypherpunks - Look Good Ideas
Thanks for notifying us with your weight problem concerns. Our 2 Nutritionists are online 24 hours a day to answer your questions or concerns. Charles Hernandez and Pamela King have been nutritionists for the past 10 years and are recommending that you try a 2-3 month supply of hoodia.

crypto on sonet is free, Tyler

2005-10-26 Thread Major Variola (ret)
At 03:15 PM 6/8/04 -0400, Tyler Durden wrote: Well, it's interesting to consider how/if that might be possible. SONET scrambles the payload prior to transmission..adding an additional crypto layer prior to transmission would mean changing the line rate, so probably a no-no. Tyler, one can

RE: crypto on sonet is free, Tyler

2005-10-26 Thread Tyler Durden
Yo Variola! Did you notice the date stamp on that post? Did you do a stint on Survivor or something? Or as I said to the short-lived Tom Veil, What, no Starbucks near your Unabomber shack? -TD From: Major Variola (ret) [EMAIL PROTECTED] To: [EMAIL PROTECTED] [EMAIL PROTECTED] Subject:

Re: [PracticalSecurity] Anonymity - great technology but hardly used

2005-10-26 Thread Stephan Neuhaus
cyphrpunk wrote: The main threat to this illegal but widely practiced activity is legal action by copyright holders against individual traders. The only effective protection against these threats is the barrier that could be provided by anonymity. An effective, anonymous file sharing network

Re: [PracticalSecurity] Anonymity - great technology but hardly used

2005-10-26 Thread Travis H.
Part of the problem is using a packet-switched network; if we had circuit-based, then thwarting traffic analysis is easy; you just fill the link with random garbage when not transmitting packets. I considered doing this with SLIP back before broadband (back when my friend was my ISP). There are

Re: On the orthogonality of anonymity to current market demand

2005-10-26 Thread John Kelsey
From: R.A. Hettinga [EMAIL PROTECTED] Sent: Oct 25, 2005 8:34 AM To: cryptography@metzdowd.com, [EMAIL PROTECTED] Subject: On the orthogonality of anonymity to current market demand .. That is to say, your analysis conflicts with the whole trend towards T-0 trading, execution, clearing and

Re: [EMAIL PROTECTED]: Skype security evaluation]

2005-10-26 Thread Dirk-Willem van Gulik
On Mon, 24 Oct 2005, cyphrpunk wrote: Is it possible that Skype doesn't use RSA encryption? Or if they do, do they do it without using any padding, and is that safe? You may want to read the report itself: http://www.skype.com/security/files/2005-031%20security%20evaluation.pdf and

Re: [PracticalSecurity] Anonymity - great technology but hardly used

2005-10-26 Thread J
--- Travis H. [EMAIL PROTECTED] wrote: [snip] Another issue involves the ease of use when switching between a [slower] anonymous service and a fast non-anonymous service. I have a tool called metaprox on my website (see URL in sig) that allows you to choose what proxies you use on a

Re: [fc-discuss] Financial Cryptography Update: On Digital Cash-like Payment Systems

2005-10-26 Thread Travis H.
If you have to be that confident in your computer security to use the payment system, it's not going to have many clients. Maybe the trusted computing platform (palladium) may have something to offer after all, namely enabling naive users to use services that require confidence in their own

RE: [EMAIL PROTECTED]: Skype security evaluation]

2005-10-26 Thread Ivars Suba
Is it possible that Skype doesn't use RSA encryption? Or if they do, do they do it without using any padding, and is that safe? No ,Skype use RSA encryption: Each party contributes 128 random bits toward the 256-bit session key. The contributions are exchanged as RSA cryptograms. The two

Re: [fc-discuss] Financial Cryptography Update: On Digital Cash-like Payment Systems

2005-10-26 Thread Ian G
John Kelsey wrote: From: cyphrpunk [EMAIL PROTECTED] Digital wallets will require real security in user PCs. Still I don't see why we don't already have this problem with online banking and similar financial services. Couldn't a virus today steal people's passwords and command their banks to

Legally thwarting FBI surveillance of libraries and ISPs

2005-10-26 Thread Steve Schear
I'm one of those that believes that agrees with Louis Brandice's dissenting opinion about the constitutionality of wiretaps. That they violate the privacy of those parties who call or are called by the party being wiretapped. I have written on this in 2002/2003. There seem to be at least two

Re: [PracticalSecurity] Anonymity - great technology but hardly used

2005-10-26 Thread Justin
On 2005-10-26T08:21:08+0200, Stephan Neuhaus wrote: cyphrpunk wrote: The main threat to this illegal but widely practiced activity is legal action by copyright holders against individual traders. The only effective protection against these threats is the barrier that could be provided

Re: [PracticalSecurity] Anonymity - great technology but hardly used

2005-10-26 Thread Alexander Klimov
On Wed, 26 Oct 2005, JЖrn Schmidt wrote: --- Travis H. [EMAIL PROTECTED] wrote: [snip] Another issue involves the ease of use when switching between a [slower] anonymous service and a fast non-anonymous service. I have a tool called metaprox on my website (see URL in sig) that allows

Re: [fc-discuss] Financial Cryptography Update: On Digital Cash-like Payment Systems

2005-10-26 Thread James A. Donald
-- Steve Schear [EMAIL PROTECTED] Yes, but unfortunately it is not clear at all that courts would find the opposite, either. If a lawsuit names the currency issuer as a defendant, which it almost certainly would, a judge might order the issuer's finances frozen or impose other measures

Re: On the orthogonality of anonymity to current market demand

2005-10-26 Thread James A. Donald
-- John Kelsey What's with the heat-death nonsense? Physical bearer instruments imply stout locks and vaults and alarm systems and armed guards and all the rest, all the way down to infrastructure like police forces and armies (private or public) to avoid having the biggest gang end up

packet traffic analysis

2005-10-26 Thread John Denker
Travis H. wrote: Part of the problem is using a packet-switched network; if we had circuit-based, then thwarting traffic analysis is easy; you just fill the link with random garbage when not transmitting packets. OK so far ... There are two problems with this; one, getting enough

Re: [PracticalSecurity] Anonymity - great technology but hardly used

2005-10-26 Thread Hagai Bar-El
Hello, At 25/10/05 07:18, cyphrpunk wrote: http://www.hbarel.com/Blog/entry0006.html I believe that for anonymity and pseudonymity technologies to survive they have to be applied to applications that require them by design, rather than to mass-market applications that can also do