Re: yes, they look for stego, as a Hacker Tool

2004-08-15 Thread Major Variola (ret)
At 02:43 AM 8/15/04 +0200, Thomas Shaddack wrote: On Sat, 14 Aug 2004, Major Variola (ret) wrote: It was disturbing that, as the bottom fell out of telecom, and handsets became commoditized, faceplates and ringtones were highly profitable. Faceplates are at least made of atoms. There are

Apparently one can spell Snake Oil in Capital Letters, too (Re: CRYPTO-GRAM, August 15, 2004)

2004-08-15 Thread R. A. Hettinga
At 11:26 PM -0500 8/14/04, Bruce Schneier wrote: From: Ken Lavender [EMAIL PROTECTED] Subject: ICS Atlanta I am APPAULED at your comments that you had made on your website: http://www.schneier.com/crypto-gram-0407.html#9 You have statements are nothing but slander defamation. They

Re: yes, they look for stego, as a Hacker Tool

2004-08-15 Thread Major Variola (ret)
At 05:30 AM 8/14/04 +0200, Thomas Shaddack wrote: On Fri, 13 Aug 2004, Major Variola (ret) wrote: Even if you map a particular hash into one of a million known-benign values, which takes work, there are multiple orthagonal hash algorithms included on the NIST CD. (Eg good luck finding values

[osint] FBI Warns Storage Unit Operators

2004-08-15 Thread R. A. Hettinga
--- begin forwarded text To: Bruce Tefft [EMAIL PROTECTED] Thread-Index: AcSAr6Y/Mj9PmYHqQZO/G2/Eo29FYgAgaLTg From: Bruce Tefft [EMAIL PROTECTED] Mailing-List: list [EMAIL PROTECTED]; contact [EMAIL PROTECTED] Delivered-To: mailing list [EMAIL PROTECTED] Date: Fri, 13 Aug 2004 08:30:35 -0400

Re: yes, they look for stego, as a Hacker Tool

2004-08-15 Thread Thomas Shaddack
On Sat, 14 Aug 2004, Major Variola (ret) wrote: Argh. You misunderstood me. I don't want to find hash collisions, to create a false known hash - that is just too difficult. I want to make every file in the machine recognized as unidentifiable. No, I understood this. In a later post it was

RPOW - Reusable Proofs of Work

2004-08-15 Thread Hal Finney
I'd like to invite members of this list to try out my new hashcash-based server, rpow.net. This system receives hashcash as a Proof of Work (POW) token, and in exchange creates RSA-signed tokens which I call Reusable Proof of Work (RPOW) tokens. RPOWs can then be transferred from person to

The New Digital Media: You Might Have It, But Not Really Own It

2004-08-15 Thread R. A. Hettinga
Anyone who knows about cryptography quickly comes to the conclusion that if it's encrypted, and I have the key it's *my* property. It doesn't matter what the lawyers say -- or even the guys they hire with guns at your friendly local geographic force monopoly. :-). Now if we can figure out a way

Trust no one: backdoored CPUs

2004-08-15 Thread Major Variola (ret)
We worried about compromized OSes, BIOSes, read last week about a PNG library bug that lets images run buffer exploits, now CPUs can be backdoored: From Scheier's Crypto-gram: Here's an interesting hardware security vulnerability. Turns out that it's possible to update the AMD K8 processor

Re: Trust no one: backdoored CPUs

2004-08-15 Thread J.A. Terranson
On Sun, 15 Aug 2004, Major Variola (ret) wrote: We worried about compromized OSes, BIOSes, read last week about a PNG library bug that lets images run buffer exploits, now CPUs can be backdoored: From Scheier's Crypto-gram: Here's an interesting hardware security vulnerability. Turns