insider threat report, by SS

2004-09-08 Thread Major Variola (ret)
Insider Threat Study: Illicit Cyber Activity in the Banking and Finance Sector Marisa Reddy Randazzo, Ph.D. Dawn Cappelli Michelle Keeney, Ph.D. Andrew Moore Eileen Kowalski CERT® Coordination Center National Threat Assessment Center Software Engineering Institute United States Secret Service

Re: Seth Schoen's Hard to Verify Signatures

2004-09-08 Thread Major Variola (ret)
At 11:48 AM 9/8/04 -0700, Hal Finney wrote: Seth Schoen of the EFF proposed an interesting cryptographic primitive called a hard to verify signature in his blog at http://vitanuova.loyalty.org/weblog/nb.cgi/view/vitanuova/2004/09/02 . The idea is to have a signature which is fast to make but slow

Re: Gilmore case...Who can make laws?

2004-09-08 Thread Major Variola (ret)
At 11:19 AM 9/8/04 -0400, Tyler Durden wrote: Hum. I wonder. Do you think these secret regulations are communicated via secure channels? What would happen if someone decided to send their own regulations out to all of the local airline security offices rescinding any private regs, particularly if

Re: Seth Schoen's Hard to Verify Signatures

2004-09-08 Thread Major Variola (ret)
At 11:48 AM 9/8/04 -0700, Hal Finney wrote: Seth Schoen of the EFF proposed an interesting cryptographic primitive called a hard to verify signature in his blog at http://vitanuova.loyalty.org/weblog/nb.cgi/view/vitanuova/2004/09/02 . The idea is to have a signature which is fast to make but slow

RE: stegedetect Variola's Suitcase

2004-09-07 Thread Major Variola (ret)
At 11:57 AM 9/7/04 -0400, Sunder wrote: The answer to that question depends on some leg work which involves converting the source code to stegetect into hardware and seeing how fast that hardware runs, then multiplying by X where X is how many of the chips you can afford to build. A quick perusal

Private GPS tracking

2004-09-04 Thread Major Variola (ret)
GLENDALE, Calif. - Police arrested a man they said tracked his ex-girlfriend's whereabouts by attaching a global positioning system to her car. Ara Gabrielyan, 32, was arrested Aug. 29 on one count of stalking and three

whatever is necessary

2004-09-03 Thread Major Variola (ret)
At 08:57 AM 9/3/04 -0400, Tyler Durden wrote: Well, W did say he'd do whatever is necessary. I caught the last bit of Bush's rant. The scary part was him talking about the resurrection of NYC. Given how his little bubble-brain is addicted to xianity, and his coterie has geo-political messianic

Re: The cages on the Hudson, AKA Little Guantanamo (fwd)

2004-09-02 Thread Major Variola (ret)
At 10:55 PM 9/1/04 -0700, Bill Stewart wrote: Puerto Ricans in the ethnic neighborhoods along the shore might get uppity and take over the naval base, which everybody knew had Nuke-u-lur Weapons even though they'd never admit it, and the naval base might not be able to defend itself against a mob,

Re: The cages on the Hudson, AKA Little Guantanamo (fwd)

2004-09-02 Thread Major Variola (ret)
At 10:55 PM 9/1/04 -0700, Bill Stewart wrote: Puerto Ricans in the ethnic neighborhoods along the shore might get uppity and take over the naval base, which everybody knew had Nuke-u-lur Weapons even though they'd never admit it, and the naval base might not be able to defend itself against a mob,

Re: Remailers an unsolveable paradox?

2004-09-01 Thread Major Variola (ret)
At 01:30 PM 9/1/04 +0200, Nomen Nescio wrote: Yet we need to make sure we're not abused too much since sooner or later laws will catch up with the remailers should abuse sky-rocket. You need a Bill of Rights that specifies freedom of expression, and judges that understand it. Since you appear

making your own stamps

2004-09-01 Thread Major Variola (ret)
http://www.thesmokinggun.com/archive/0831041_photostamps_1.html?link=eaf

Re: Remailers an unsolveable paradox?

2004-09-01 Thread Major Variola (ret)
At 01:30 PM 9/1/04 +0200, Nomen Nescio wrote: Yet we need to make sure we're not abused too much since sooner or later laws will catch up with the remailers should abuse sky-rocket. You need a Bill of Rights that specifies freedom of expression, and judges that understand it. Since you appear

Re: Backdoor found in Diebold Voting Tabulators

2004-08-31 Thread Major Variola (ret)
http://www.blackboxvoting.org/?q=node/view/77 is up Seems its due to an intentional, insider job, and not just as an engineering backdoor (c) Cisco Consumer Report: Part 2 - Problems with GEMS Central Tabulator Submitted by Bev Harris on Thu,

RIAA can't stomache cassette recorders

2004-08-31 Thread Major Variola (ret)
We remain concerned about any devices or software that permit listeners to transform a broadcast into a music library, RIAA spokesman Jonathan Lamy said. http://wired.com/news/digiwood/0,1412,64761,00.html?tw=wn_tophead_6

Pigradio survey of anonymizing systems

2004-08-31 Thread Major Variola (ret)
The pigs want to be able to send anonymous messages over IP or POTS using their emergency 700 Mhz comm system: http://www.ncs.gov/informationportal/Web_Proxy_Report.doc

drooling at tracking immigrant$, with contact$

2004-08-31 Thread Major Variola (ret)
http://www.dhs.gov/interweb/assetlibrary/Vendor_Day_List_FIN818.pdf The following list of companies have expressed an interest in the US-VISIT System requirement by participating in the Industry Conference and/or responding to the sources sought RFI. This list is being provided in an attempt to

John gets hassled, but those with $ are not

2004-08-31 Thread Major Variola (ret)
JY reports on the Fed nervousness about his publications; but anyone with a few hundred $ can buy a CDROM or nicely printed map of the same info. [listsig: surveillance, 1st amendment, everyone is a reporter] MAP DETAILS This 2003/2004 edition of the N. American Natural Gas System map is the

Re: Backdoor found in Diebold Voting Tabulators

2004-08-31 Thread Major Variola (ret)
http://www.blackboxvoting.org/?q=node/view/77 is up Seems its due to an intentional, insider job, and not just as an engineering backdoor (c) Cisco Consumer Report: Part 2 - Problems with GEMS Central Tabulator Submitted by Bev Harris on Thu,

sex propoganda [psyops]

2004-08-26 Thread Major Variola (ret)
http://www.psywarrior.com/sexandprop.html H.M.G.'s secret pornographer http://www.seftondelmer.co.uk/hmg.htm

sex propoganda [psyops]

2004-08-26 Thread Major Variola (ret)
http://www.psywarrior.com/sexandprop.html H.M.G.'s secret pornographer http://www.seftondelmer.co.uk/hmg.htm

Re: Digital camera fingerprinting...

2004-08-25 Thread Major Variola (ret)
would be, how many *other* cameras have column 67 disabled? One of every thousand? And how many thousand cameras were sold? Pope Major Variola (ret)

Welcome to the Church of Strong Cryptography.

2004-08-25 Thread Major Variola (ret)
At 01:26 PM 8/24/04 -0400, Tyler Durden wrote: PS: I thought Tyler had nominated himself as leader? :-) No, almost the opposite. I propose that any 'Cypherpunk' can declare himself to be leader and make 'official statements' at any time. Oh, then you'd be reformed cypherpunk. The orthodoxy is

Re: Digital camera fingerprinting...

2004-08-25 Thread Major Variola (ret)
would be, how many *other* cameras have column 67 disabled? One of every thousand? And how many thousand cameras were sold? Pope Major Variola (ret)

Welcome to the Church of Strong Cryptography.

2004-08-25 Thread Major Variola (ret)
At 01:26 PM 8/24/04 -0400, Tyler Durden wrote: PS: I thought Tyler had nominated himself as leader? :-) No, almost the opposite. I propose that any 'Cypherpunk' can declare himself to be leader and make 'official statements' at any time. Oh, then you'd be reformed cypherpunk. The orthodoxy is

Re: Another John Young Sighting

2004-08-24 Thread Major Variola (ret)
At 09:09 PM 8/23/04 -0400, An Metet wrote: You may laugh but 74% (or whatever is the % who believes Saddam personally piloted all 9/11 planes) of americans will believe it. So Mr. Young is anarchist for all practical purposes and consequences. And you are all his associates. While acknowledging

worm uses webcams to spy

2004-08-23 Thread Major Variola (ret)
ok, from /., but highly amusing Meet the Peeping Tom worm A worm that has the capability to using webcams to spy on users is circulating across the Net. http://www.theregister.co.uk/2004/08/23/peeping_tom_worm/

worm uses webcams to spy

2004-08-23 Thread Major Variola (ret)
ok, from /., but highly amusing Meet the Peeping Tom worm A worm that has the capability to using webcams to spy on users is circulating across the Net. http://www.theregister.co.uk/2004/08/23/peeping_tom_worm/

judges who get it

2004-08-20 Thread Major Variola (ret)
Court rejects piracy claims against P2P file-sharing networks Friday, August 20, 2004 1:05:55 PM ET New Ratings NEW YORK, August 20 (New Ratings) – A federal appeals court in the US has declared that the online file-sharing software companies are not liable to copyright infringement charges.

Plonk this

2004-08-18 Thread Major Variola (ret)
At 09:20 AM 8/18/04 -0400, R. A. Hettinga wrote: Hey, I have an idea! Why don't I write a script crossposting everything from sci.crypt to cypherpunks! How about a few dozen other on-topic newsgroups and mailing lists too? Go ahead. Are you going to reformat them for legibility first, if

Plonk this

2004-08-18 Thread Major Variola (ret)
At 09:20 AM 8/18/04 -0400, R. A. Hettinga wrote: Hey, I have an idea! Why don't I write a script crossposting everything from sci.crypt to cypherpunks! How about a few dozen other on-topic newsgroups and mailing lists too? Go ahead. Are you going to reformat them for legibility first, if

Israelis voting for Bush defeated Gore

2004-08-16 Thread Major Variola (ret)
Contrary to widespread belief, it was more likely American voters in Israel, not Florida, who put George W. Bush in the White House four years ago — a phenomenon that has Kerry's supporters in Israel vowing to do whatever it takes to make certain that doesn't happen again in November. Those who

Re: yes, they look for stego, as a Hacker Tool

2004-08-15 Thread Major Variola (ret)
At 02:43 AM 8/15/04 +0200, Thomas Shaddack wrote: On Sat, 14 Aug 2004, Major Variola (ret) wrote: It was disturbing that, as the bottom fell out of telecom, and handsets became commoditized, faceplates and ringtones were highly profitable. Faceplates are at least made of atoms

Trust no one: backdoored CPUs

2004-08-15 Thread Major Variola (ret)
We worried about compromized OSes, BIOSes, read last week about a PNG library bug that lets images run buffer exploits, now CPUs can be backdoored: From Scheier's Crypto-gram: Here's an interesting hardware security vulnerability. Turns out that it's possible to update the AMD K8 processor

Israelis voting for Bush defeated Gore

2004-08-15 Thread Major Variola (ret)
Contrary to widespread belief, it was more likely American voters in Israel, not Florida, who put George W. Bush in the White House four years ago — a phenomenon that has Kerry's supporters in Israel vowing to do whatever it takes to make certain that doesn't happen again in November. Those who

Re: yes, they look for stego, as a Hacker Tool

2004-08-15 Thread Major Variola (ret)
At 02:43 AM 8/15/04 +0200, Thomas Shaddack wrote: On Sat, 14 Aug 2004, Major Variola (ret) wrote: It was disturbing that, as the bottom fell out of telecom, and handsets became commoditized, faceplates and ringtones were highly profitable. Faceplates are at least made of atoms

Re: yes, they look for stego, as a Hacker Tool

2004-08-15 Thread Major Variola (ret)
At 05:30 AM 8/14/04 +0200, Thomas Shaddack wrote: On Fri, 13 Aug 2004, Major Variola (ret) wrote: Even if you map a particular hash into one of a million known-benign values, which takes work, there are multiple orthagonal hash algorithms included on the NIST CD. (Eg good luck finding values

Trust no one: backdoored CPUs

2004-08-15 Thread Major Variola (ret)
We worried about compromized OSes, BIOSes, read last week about a PNG library bug that lets images run buffer exploits, now CPUs can be backdoored: From Scheier's Crypto-gram: Here's an interesting hardware security vulnerability. Turns out that it's possible to update the AMD K8 processor

Re: yes, they look for stego, as a Hacker Tool

2004-08-14 Thread Major Variola (ret)
At 01:48 AM 8/14/04 +0200, Thomas Shaddack wrote: Then you have the forest where every tree is marked and the leprechaun is laughing. Love that story. But the self-watermarking you later mention is a problem. Even if you map a particular hash into one of a million known-benign values, which

yes, they look for stego, as a Hacker Tool

2004-08-13 Thread Major Variola (ret)
A cool thing for this purpose could be a patch for gcc to produce unique code every time, perhaps using some of the polymorphic methods used by viruses. The purpose would be that they do not figure out that you are using some security program, so they don't suspect that noise in the file or

Re: Forensics on PDAs, notes from the field

2004-08-13 Thread Major Variola (ret)
At 01:46 PM 8/13/04 -0400, John Kelsey wrote: From: Major Variola (ret) [EMAIL PROTECTED] Obvious lesson: Steganography tool authors, your programs should use the worm/HIV trick of changing their signatures with every invocation. Much harder for the forensic fedz to recognize your tools

Re: Forensics on PDAs, notes from the field

2004-08-13 Thread Major Variola (ret)
On Fri, 13 Aug 2004, Thomas Shaddack wrote: In the world of industrial espionage and divorce lawyers, the FedZ aren't the only threat model. At 03:06 PM 8/13/04 -0400, Sunder wrote: Right, in which case GPG (or any other decent crypto system) is just fine, or you wouldn't be looking for

Re: yes, they look for stego, as a Hacker Tool

2004-08-13 Thread Major Variola (ret)
At 01:48 AM 8/14/04 +0200, Thomas Shaddack wrote: Then you have the forest where every tree is marked and the leprechaun is laughing. Love that story. But the self-watermarking you later mention is a problem. Even if you map a particular hash into one of a million known-benign values, which

Re: Forensics on PDAs, notes from the field

2004-08-13 Thread Major Variola (ret)
Quoth Thomas Shaddack [EMAIL PROTECTED] Obvious lesson: Steganography tool authors, your programs should use the worm/HIV trick of changing their signatures with every invocation. Much harder for the forensic fedz to recognize your tools. (As suspicious, of course). It should be enough to

Re: Forensics on PDAs, notes from the field (your teenage son's homemade porn)

2004-08-13 Thread Major Variola (ret)
At 10:07 PM 8/13/04 +0200, Thomas Shaddack wrote: On Fri, 13 Aug 2004, Tyler Durden wrote: And it seems to me to be a difficult task getting ahold of enough photos that would be believably worth encrypting. Homemade porn? Your 16 year old son's homemade porn. [google on Heidl rape; a deputy

Re: Forensics on PDAs, notes from the field

2004-08-13 Thread Major Variola (ret)
At 01:46 PM 8/13/04 -0400, John Kelsey wrote: From: Major Variola (ret) [EMAIL PROTECTED] Obvious lesson: Steganography tool authors, your programs should use the worm/HIV trick of changing their signatures with every invocation. Much harder for the forensic fedz to recognize your tools

Re: Forensics on PDAs, notes from the field

2004-08-13 Thread Major Variola (ret)
On Fri, 13 Aug 2004, Thomas Shaddack wrote: In the world of industrial espionage and divorce lawyers, the FedZ aren't the only threat model. At 03:06 PM 8/13/04 -0400, Sunder wrote: Right, in which case GPG (or any other decent crypto system) is just fine, or you wouldn't be looking for

Re: Forensics on PDAs, notes from the field

2004-08-13 Thread Major Variola (ret)
At 02:11 PM 8/13/04 -0400, Sunder wrote: If you're suspected of something really big, or you're middle eastern, then you need to worry about PDA forensics. Otherwise, you're just another geek with a case of megalomania thinking you're important enough for the FedZ to give a shit about you.

yes, they look for stego, as a Hacker Tool

2004-08-13 Thread Major Variola (ret)
A cool thing for this purpose could be a patch for gcc to produce unique code every time, perhaps using some of the polymorphic methods used by viruses. The purpose would be that they do not figure out that you are using some security program, so they don't suspect that noise in the file or

Re: Forensics on PDAs, notes from the field

2004-08-12 Thread Major Variola (ret)
Quoth Thomas Shaddack [EMAIL PROTECTED] Obvious lesson: Steganography tool authors, your programs should use the worm/HIV trick of changing their signatures with every invocation. Much harder for the forensic fedz to recognize your tools. (As suspicious, of course). It should be enough to

Forensics on PDAs, notes from the field

2004-08-12 Thread Major Variola (ret)
Saint John of Cryptome has a particularly tasty link to http://csrc.nist.gov/publications/drafts.html#sp800-72 which describes the state of the art in PDA forensics. There is also a link to a CDROM of secure hashes of various benign and less benign programs that the NIST knows about. Including a

Re: [osint] Al Qaeda's Travel Network

2004-08-11 Thread Major Variola (ret)
Al Qaeda operatives rarely travel directly from Point A to Point B. Instead, they jump from country to country, with each destination having its own end use and with multiple stops between beginning and end. Hey, don't they know that onion-routing was patented by the Navy? Or that the mix network

Re: A Billion for Bin Laden

2004-08-11 Thread Major Variola (ret)
With the possibility of earning a $1 billion bounty, however, professional Bin Laden hunting firms would form, allowing the U.S. to enlist the efficiency and creativity of the free market in our fight against Osama. This is brilliant, worthy of being called channelling Tim M. As it relies

Forensics on PDAs, notes from the field

2004-08-11 Thread Major Variola (ret)
Saint John of Cryptome has a particularly tasty link to http://csrc.nist.gov/publications/drafts.html#sp800-72 which describes the state of the art in PDA forensics. There is also a link to a CDROM of secure hashes of various benign and less benign programs that the NIST knows about. Including a

Re: A Billion for Bin Laden

2004-08-11 Thread Major Variola (ret)
With the possibility of earning a $1 billion bounty, however, professional Bin Laden hunting firms would form, allowing the U.S. to enlist the efficiency and creativity of the free market in our fight against Osama. This is brilliant, worthy of being called channelling Tim M. As it relies

Re: [osint] Al Qaeda's Travel Network

2004-08-11 Thread Major Variola (ret)
Al Qaeda operatives rarely travel directly from Point A to Point B. Instead, they jump from country to country, with each destination having its own end use and with multiple stops between beginning and end. Hey, don't they know that onion-routing was patented by the Navy? Or that the mix network

Re: Wired on Navy's new version of Onion Routing

2004-08-09 Thread Major Variola (ret)
At 04:58 AM 8/6/04 -0700, Sarad AV wrote: Since they are using symmetric keys, for a network of 'n' nodes, each node need to know the secret key that they share with the remaining (n-1) nodes.Total number of symmetric keys that need to be distributed is [n*(n-1)]/2. Key management is harder when

Re: Is Source Code Is Like a Machine Gun?

2004-08-09 Thread Major Variola (ret)
Re Is Source Code Is Like a Machine Gun? A better thought experiment would be a numerically controlled machine and a control tape, which, when the machine is turned on, produces sculpture that is also a machine gun (or merely the sear for a machine gun which can be dropped into a semi-automatic

Re: Wired on Navy's new version of Onion Routing

2004-08-08 Thread Major Variola (ret)
At 04:58 AM 8/6/04 -0700, Sarad AV wrote: Since they are using symmetric keys, for a network of 'n' nodes, each node need to know the secret key that they share with the remaining (n-1) nodes.Total number of symmetric keys that need to be distributed is [n*(n-1)]/2. Key management is harder when

Bluesniper question

2004-08-08 Thread Major Variola (ret)
Why do the long range RF folks always use Yagis? Aren't Yagis supposed to be fairly broadband? Aren't there other highly-directional (ie high gain in one direction) antennae which (simply by virtue of being narrow bandwidth) would be better? Or is it that Yagi's broadband-ness allows for more

Re: Is Source Code Is Like a Machine Gun?

2004-08-08 Thread Major Variola (ret)
Re Is Source Code Is Like a Machine Gun? A better thought experiment would be a numerically controlled machine and a control tape, which, when the machine is turned on, produces sculpture that is also a machine gun (or merely the sear for a machine gun which can be dropped into a semi-automatic

Simpson scores

2004-08-07 Thread Major Variola (ret)
http://www.technologyreview.com/articles/04/08/wo_garfinkel080404.asp Good article re secure hashing

Simpson scores

2004-08-06 Thread Major Variola (ret)
http://www.technologyreview.com/articles/04/08/wo_garfinkel080404.asp Good article re secure hashing

Re: On what the NSA does with its tech

2004-08-05 Thread Major Variola (ret)
At 02:23 AM 8/5/04 +0200, Thomas Shaddack wrote: The impracticability of breaking symmetric ciphers is only a comparatively small part of the overall problem. Indeed. Following Schneier's axiom, go for the humans, it would not be too hard to involutarily addict someone to something which the

Re: On what the NSA does with its tech

2004-08-04 Thread Major Variola (ret)
At 02:23 AM 8/5/04 +0200, Thomas Shaddack wrote: The impracticability of breaking symmetric ciphers is only a comparatively small part of the overall problem. Indeed. Following Schneier's axiom, go for the humans, it would not be too hard to involutarily addict someone to something which the

Re: Al Qaeda crypto reportedly fails the test

2004-08-04 Thread Major Variola (ret)
At 10:18 PM 8/3/04 +0100, Ian Grigg wrote: http://www.thesmokinggun.com/archive/jihad13chap3.html [Moderator's Note: One wonders if the document on the Smoking Gun website is even remotely real. It is amazingly amateurish -- the sort of code practices that were obsolete before the Second World

Re: Al Qaeda crypto reportedly fails the test

2004-08-03 Thread Major Variola (ret)
At 10:18 PM 8/3/04 +0100, Ian Grigg wrote: http://www.thesmokinggun.com/archive/jihad13chap3.html [Moderator's Note: One wonders if the document on the Smoking Gun website is even remotely real. It is amazingly amateurish -- the sort of code practices that were obsolete before the Second World

Re: Al-Q targeting NY corporations...ah well.

2004-08-03 Thread Major Variola (ret)
At 09:53 PM 8/1/04 -0400, Tyler Durden wrote: the following statements are officially* fairly cypherpunkinsh: * Fuck you Variola...I just had a couple of dark Spatens ON TAP. I therefore declare that any Cypherpunk is officially authorized to make an official Cypherpunk statement, particularly if

Re: Giesecke Devrient

2004-08-03 Thread Major Variola (ret)
At 05:17 PM 8/2/04 +0200, Eugen Leitl wrote: Assuming I generate a key on a RSA smart card made by GD, what kind of prestige track do these people have? They seem to be pretty secretive, that's not a good sign. FWIW: They make the SIMs for T-Mobile (ie Deutsche Telecom AG) so they are part of

On what the NSA does with its tech

2004-08-03 Thread Major Variola (ret)
At 02:39 PM 8/2/04 -0400, John Kelsey wrote: This is silly. They have black budgets, but not infinite ones. Given their budget (whatever it is), they want to buy the most processing bang for their buck. Yes. They can't break a 128 bit key. That's obvious. (if all the atoms in the universe

RE: On how the NSA can be generations ahead

2004-08-03 Thread Major Variola (ret)
At 05:23 PM 8/1/04 -0400, Tyler Durden wrote: No, the NSA is probably generations ahead in some areas, but their fabs aren't much better than what's available commercially. Yes, upon consideration I agreed, re critical dimensions. That's why I brought up uneconomically sized chips, and the

Re: Al-Q targeting NY corporations?

2004-08-03 Thread Major Variola (ret)
At 12:58 PM 8/1/04 -0400, Sunder wrote: You Al-Qaeda types hate us for having freedom, right? You're not taken in by that mularky, are you? Read the Fatwa. Best summarized by a line from a 'Floyd song, get your filthy hands off my desert. Go for the Baltimore/Maryland prep schools. Soft

Re: Al-Q targeting NY corporations?

2004-08-02 Thread Major Variola (ret)
At 12:58 PM 8/1/04 -0400, Sunder wrote: You Al-Qaeda types hate us for having freedom, right? You're not taken in by that mularky, are you? Read the Fatwa. Best summarized by a line from a 'Floyd song, get your filthy hands off my desert. Go for the Baltimore/Maryland prep schools. Soft

RE: On how the NSA can be generations ahead

2004-08-02 Thread Major Variola (ret)
At 05:23 PM 8/1/04 -0400, Tyler Durden wrote: No, the NSA is probably generations ahead in some areas, but their fabs aren't much better than what's available commercially. Yes, upon consideration I agreed, re critical dimensions. That's why I brought up uneconomically sized chips, and the

Re: Al-Q targeting NY corporations...ah well.

2004-08-02 Thread Major Variola (ret)
At 09:53 PM 8/1/04 -0400, Tyler Durden wrote: the following statements are officially* fairly cypherpunkinsh: * Fuck you Variola...I just had a couple of dark Spatens ON TAP. I therefore declare that any Cypherpunk is officially authorized to make an official Cypherpunk statement, particularly if

Re: Giesecke Devrient

2004-08-02 Thread Major Variola (ret)
At 05:17 PM 8/2/04 +0200, Eugen Leitl wrote: Assuming I generate a key on a RSA smart card made by GD, what kind of prestige track do these people have? They seem to be pretty secretive, that's not a good sign. FWIW: They make the SIMs for T-Mobile (ie Deutsche Telecom AG) so they are part of

On what the NSA does with its tech

2004-08-02 Thread Major Variola (ret)
At 02:39 PM 8/2/04 -0400, John Kelsey wrote: This is silly. They have black budgets, but not infinite ones. Given their budget (whatever it is), they want to buy the most processing bang for their buck. Yes. They can't break a 128 bit key. That's obvious. (if all the atoms in the universe

On how the NSA can be generations ahead

2004-08-01 Thread Major Variola (ret)
Tyler D asked about how the NSA could be so far ahead. Besides their ability to make 2 sq. chips at 10% yield (not something a commercial entity could get away with) they can also *thin and glue* those chips into say stacks of 5 thinned die. 2 sq = 4 x performance 5 thinned die with GHz vias = 20

Re: Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-08-01 Thread Major Variola (ret)
At 12:07 AM 7/29/04 -0500, J.A. Terranson wrote: On Wed, 28 Jul 2004, Major Variola (ret) wrote: Did you know that your teeth enamel contain isotope ratios that encode regions where you might have grown up around age 6? Yes. I am also aware that tooth enamel has the interesting property

Re: Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-08-01 Thread Major Variola (ret)
At 12:36 PM 7/29/04 -0400, Tyler Durden wrote: Remember that the spookfabs don't have to contend with *economics and yield*. Damn, this is precisely where I wish Tim May was still around. We are all just echoes of the voices in his head. But I did work for a company that owned fabs. And have

Re: Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-07-30 Thread Major Variola (ret)
At 12:07 AM 7/29/04 -0500, J.A. Terranson wrote: On Wed, 28 Jul 2004, Major Variola (ret) wrote: Did you know that your teeth enamel contain isotope ratios that encode regions where you might have grown up around age 6? Yes. I am also aware that tooth enamel has the interesting property

Re: Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-07-30 Thread Major Variola (ret)
At 12:36 PM 7/29/04 -0400, Tyler Durden wrote: Remember that the spookfabs don't have to contend with *economics and yield*. Damn, this is precisely where I wish Tim May was still around. We are all just echoes of the voices in his head. But I did work for a company that owned fabs. And have

Re: Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-07-29 Thread Major Variola (ret)
At 06:44 PM 7/24/04 -0500, J.A. Terranson wrote: On Sat, 24 Jul 2004, Major Variola (ret) wrote: There might be blind cypherpunks, we don't discriminate[1], There Is No We. touche' [1] the original phone phreaks were blind, This is a ridiculous statement, and even worse, leaks information

Re: Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-07-29 Thread Major Variola (ret)
At 03:52 PM 7/27/04 -0400, Tyler Durden wrote: Variola wrote... In the *public* lit. Well, perhaps but perhaps not. Burst-mode signaling, transceivers, and networking technology are a good example. If you see DISA, NSA, and DARPA all working with the acknoledged experts inthe academic field, and

Thanks Declan

2004-07-29 Thread Major Variola (ret)
1. Thanks Declan for pruning my beliefs ---I had actually thought the younger, stupider, more surrounded by idiots Bush had puked that quote re Athiests not being 'Merikans. But Googling and your 0-ROI investment in Lexis-Nexus shows that stupidity is heriditary. But this is why you are an

Re: Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-07-24 Thread Major Variola (ret)
At 09:47 PM 7/23/04 -0500, J.A. Terranson wrote: What I meant was, Ames and that FBI dude Hansen (sp?), at least the KGB got Ames' wife as part of the package, whereas the FBI CI dude let his wife off as part of the deal he cut. Nice xian that he was, he was into strippers. Aren't we *all*

Got Osama?

2004-07-24 Thread Major Variola (ret)
At 12:40 PM 7/23/04 +0200, Thomas Shaddack wrote: On Thu, 22 Jul 2004, Major Variola (ret) wrote: My point is only that they will be killed should they leak their actual capabilities. Well... I am reading a book about intelligence now. Specifically, Ernst Volkman: Spies - the secret agents who

LMAO

2004-07-24 Thread Major Variola (ret)
Working for a major Kiretsu, I learn that a certain keypress sequence during boot enables SSH. Security by obscurity, baby. Never heard of Mr. Kirchoff? Undocumented backdoor feature, baby. LMAO, yours, MV

Re: Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-07-24 Thread Major Variola (ret)
At 09:47 PM 7/23/04 -0500, J.A. Terranson wrote: What I meant was, Ames and that FBI dude Hansen (sp?), at least the KGB got Ames' wife as part of the package, whereas the FBI CI dude let his wife off as part of the deal he cut. Nice xian that he was, he was into strippers. Aren't we *all*

Re: Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-07-23 Thread Major Variola (ret)
At 10:27 AM 7/22/04 -0400, Tyler Durden wrote: Gilmore et al used a bunch of old Sun Chassis for his Kocher's DEScracker. You think this is somehow more than 100 watts, in a diplo suitcase, nowadays? My point was, Gilmore et al were way behind what's capable. Proof of concept needn't be

Re: Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-07-23 Thread Major Variola (ret)
At 12:39 AM 7/22/04 -0500, J.A. Terranson wrote: On Wed, 21 Jul 2004, Major Variola (ret) wrote: I'm following the Principle of not underestimating the adversary, Don't go overboard: remember that there is a difference between underestimating your adversary and unrealistically *over*estimating

Re: Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-07-22 Thread Major Variola (ret)
At 10:27 AM 7/22/04 -0400, Tyler Durden wrote: Gilmore et al used a bunch of old Sun Chassis for his Kocher's DEScracker. You think this is somehow more than 100 watts, in a diplo suitcase, nowadays? My point was, Gilmore et al were way behind what's capable. Proof of concept needn't be

Re: Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-07-22 Thread Major Variola (ret)
At 12:39 AM 7/22/04 -0500, J.A. Terranson wrote: On Wed, 21 Jul 2004, Major Variola (ret) wrote: I'm following the Principle of not underestimating the adversary, Don't go overboard: remember that there is a difference between underestimating your adversary and unrealistically *over*estimating

Re: Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-07-22 Thread Major Variola (ret)
At 10:09 AM 7/21/04 -0400, Tyler Durden wrote: Variola wrote... Dark fiber. Dark Fiber ain't a talisman you merely wave at data to get it to magically move to where you want it to.You've got to LIGHT that fiber, and to light that fiber you need LOTS and LOTS of power-hungry, space-occupying

Re: Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-07-22 Thread Major Variola (ret)
At 11:28 AM 7/21/04 -0400, Tyler Durden wrote: As for the cable landings, likewise I've never heard anyone mention that they saw any government equipment at the landings, so I suspect it's relatively minimal. I'm sorry but I have to puke at your cluelessness. Do you actually think the folks in

Re: Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-07-22 Thread Major Variola (ret)
At 10:12 PM 7/21/04 -0500, J.A. Terranson wrote: On Wed, 21 Jul 2004, Major Variola (ret) wrote: With all due respect, you think Ft. Meade uses the same COTS crap as you are forced to deal with? Bwah hah hah. Sorry Major, I'm gonna have to call you on that one. Yes, they are lighting

Re: Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-07-21 Thread Major Variola (ret)
At 10:09 AM 7/21/04 -0400, Tyler Durden wrote: Variola wrote... Dark fiber. Dark Fiber ain't a talisman you merely wave at data to get it to magically move to where you want it to.You've got to LIGHT that fiber, and to light that fiber you need LOTS and LOTS of power-hungry, space-occupying

Re: Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-07-21 Thread Major Variola (ret)
At 11:28 AM 7/21/04 -0400, Tyler Durden wrote: As for the cable landings, likewise I've never heard anyone mention that they saw any government equipment at the landings, so I suspect it's relatively minimal. I'm sorry but I have to puke at your cluelessness. Do you actually think the folks in

Re: Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-07-21 Thread Major Variola (ret)
At 10:12 PM 7/21/04 -0500, J.A. Terranson wrote: On Wed, 21 Jul 2004, Major Variola (ret) wrote: With all due respect, you think Ft. Meade uses the same COTS crap as you are forced to deal with? Bwah hah hah. Sorry Major, I'm gonna have to call you on that one. Yes, they are lighting

Re: Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-07-20 Thread Major Variola (ret)
At 07:56 AM 7/19/04 -0500, J.A. Terranson wrote: On Sun, 18 Jul 2004, Major Variola (ret) wrote: You don't know about tape robots, or offline indexing, eh? None of which qualify here - remember, the discussion was based upon a quiet implementation. The thread was about wiretapping. My point

phishing: catch and release

2004-07-20 Thread Major Variola (ret)
At 08:41 AM 7/19/04 -0700, James A. Donald wrote: And as Hettinga predicted, the more anonymous and irreversible the transaction service, the cheaper and more convenient its services. All happening as predicted. D'uh. So why don't we have anonymous chaumian cash by now? USPTO Observe Tim May,

<    1   2   3   4   5   6   7   8   9   10   >