Cryptography-Digest Digest #987, Volume #11 Fri, 9 Jun 00 11:13:01 EDT
Contents:
Re: Davvey Griffith, bitter little lying PIZZABOY tries to get "malicious" whackers
to do his dirty work. (Charlie Chainsaw)
Re: randomness tests (John)
Re: Some dumb questions (Jim Gillogly)
Re: Random IV Generation (Eric Lee Green)
----------------------------------------------------------------------------
Subject: Re: Davvey Griffith, bitter little lying PIZZABOY tries to get "malicious"
whackers to do his dirty work.
Crossposted-To:
alt.hackers.malicious,alt.usenet.kooks,alt.romath,alt.fan.karl-malden.nose,alt.fan.mark-brian,alt.politics.uk
From: [EMAIL PROTECTED] (Charlie Chainsaw)
Date: Fri, 9 Jun 2000 06:47:18 -0600
[EMAIL PROTECTED] wrote:
> In alt.hackers.malicious Belinda <[EMAIL PROTECTED]> wrote:
>>>> I'm not a barrater. Never claimed to be. Keep repeating a 4 year old lie,
>>>> Daavey. Says a lot about you.
>>>
>>>You don't have to actually BE a lawyer to be a barrater. All it takes is
>>>abuse of the legal system.
>> From the American Heritage Dictionary: bar.ra.tor also bar.ra.ter
>> (b?r??-t?r) n. Law. One that persistently instigates lawsuits.
>> Try to find a more appropriate ad-hominem, Daaavey.
> Why? The definition still suits you?
>>>>>>>These twerps are the ones who attacked APDD and AHM.
>>>>>
>>>>>> The record clearly shows that we were the ones who defended ourselves after
>>>>>> first being attacked by netkkopping pizzaboys and fuckheaded crackers. Spin
>>>>>> it 'til the cows come home, Daaaavey boy - Deja tells the *real* story.
>>>>>
>>>>>Which record? The broken one that keeps going "netkop! postmaster!
>>>>>whaaa!" over and over again? Deja clearly shows that JamesE announced to
>>>>>the world that he was back and wanted revenge.
>>>
>>>> Actually, Daavey, James announced that he would continue to post to APDD, an
>>>> unmoderated alt. group if he pleased. You retaliated with email threats. I
>>>> have all of them, btw.
>>>
>>>James can't even tell the difference between email and usenet.
>> You can't even tell when you've been trolled.
> What can you do to APDD now? Troll it some more? The people your looking
> to irritate are all gone to a mailing list which is quite safe from your
> ilk.
>>>>>He ran to Gary to rally the peanut gallery and they started flooding APDD.
>>>
>>>> This is where the lies start. You were screaming FLOOD! over an
>>>> insignificant amount of posts. *That's* why you got laughed out of nanau.
>>>
>>>Hyperbole.
>> Yes, claiming that a handful of posts was a "flood" was indeed hyperbole.
>> Thanks for admitting it.
> Oops. You missed what I was referring to.
>>>>>Are you capable of
>>>>>noticing this from the general content of the messages from February til
>>>>>mid-April or do you need diagrams and graphs?
>>>
>>>> Chart it out, sweetie. I think you'd be surprised at the numbers.
>>>
>>>Gee, you ARE dense.
>> Um, no. Do the math, Daavey. Maybe the numbers will convince you to put
>> your Burnore obsession aside and deal with some facts.
> Have you any clue of the metric involved? Count the number of posts that
> had anything to do with trollery in February, March, and April. Notice
> the increase.
>>>> It will show that you're a whining little netkop who destroyed APDD because
>>>> you thought it was YOUR group.
>>>
>>>As if you, Gary, or James has more of a claim there than I?
>> What's that whooshing sound I hear? Must be a point flying right over
>> Daaavey's head.
> You mean that wasn't a gnat farting?
>>>>>Perhaps I should dig up mailing list archives
>>>
>>>> Why don't you just go back to Thorne's site? He put his own spin on every
>>>> single thing the Anonymous Asshole did. One stop shopping for your
>>>> obsession, Daavey. That's how this all started. Your obsession. Remember,
>>>> you had a chance at a truce. But no-o-o-o, Daavey was going to be the one
>>>> to bring down DataBasix.
>>>
>>>Or I could just go back to my archive of Cypherpunk listmail.
>> Oooh, you've got an archive, too! When are you going to immortalize yours
>> on a website? You'll have to go a long way to beat out Jerry Terranson. He
>> spends $29.95 monthly just so he can have a special website devoted to
>> archiving everything Burnore/DataBasix related.
> Why should I bother when one can run a search on altavista for free?
>> Since this will probably go over your head, let me make it simpler for you,
>> Daavey: I don't care about your archive. I'd bet real money that no one
>> other than the usual obsessos care about your archive.
> Where did I imply that you should visit this archive? You can go use a
> search engine like everyone else who lacks access to my machinery.
>>>Which truce are you talking about? The one where James E declared himself
>>>emperor???
>> No. The ones where neutral parties tried to talk you into backing off in
>> return for the stopping the crossposting and concluded that you were being
>> spoon fed by Thorne.
> Neutral parties who just so happened to make regular use of their
> databasix accounts. Uh, right.
>>>> I guess you following me around that means it's going to be your life's
>>>> work, eh?
>>>
>>>Maybe you should ask yourself what's really going on.
>> I see another fanboy following me around screeching about his interpretation
>> of something that happened four years ago.
> Something that I watched unfold as it happened.
>>>>>of Gary doing silly things with the list manager software.
>>>
>>>> This is simple babbling on your part.
>>>
>>>So?
>> Autoflame Grade: A
> Ooo.. smokin!
>>>>>Perhaps I hould dig up texts on the demise of Huge Cajones and your role
>>>>>therein.
>>>
>>>> If you want to drag out stuff that is FOUR YEARS OLD, knock yourself out.
>>>> The simple fact remains that *you* *weren't* *there*. If you want to repeat
>>>> anonymous hearsay, have at it. Apparently that lecture your supervisor gave
>>>> you didn't make any impression, did it?
>>>
>>>Mailing list posts from the man you attacked hardly count as hearsay.
>> No, they count as *one* *side* *of* *the* *story*. No wonder you have to
>> deliver pizzas for a living. You're not smart enough to do anything else.
> You'd be surprised how much money one can make delivering pizza. However,
> programming, sysadminning, and doing security consulting is a bit more
> rewarding. Pizza-delivery was good to get me by until the computer stuff
> took off.
>>>>>The ones where Gary defends the treatment of Jeff are especially juicy.
>>>
>>>> Either you have a significant reading comprehension problem or Thorne's
>>>> coaching was more twisted than usual.
>>>
>>>Thorne was posting to the Cypherpunks list?
>> Gary was posting a 'defense of the treatment of Jeff' to the Cypherpunks
>> list?
> I thought we were talking about Thorne's bogeyman-like power to anywhere
> insert malicious stories about poor ol' Gary.
>>>> FTR, I don't give a damn what you manage to dredge out of the archives.
>>>> Jeff is an arrogant asshole who allowed his remailer to be used for
>>>> widescale spambaiting and illegal harassment and chose to handle it by
>>>> lashing out at the only people he could find. He repeatedly made unfounded
>>>> accusations on Usenet and then issued half-assed retractions in email.
>>>
>>>Please define "illegal harassment".
>> No. This is my last discussion with you on this topic. Take it to
>> alt.dead-horse.beat.beat.beat.
> Noted: Belinda accused Jeff of allowing illegal harassment, but refused
> to explain herself.
>>>Is it fingering someone for a crime?
>> Never happened, Dimmy^H^H^H^Daaavey.
> So are you saying that no such harassment occurred? That there really is
> no such thing as statutory rape?
>>>>>>>Perhaps you should consider an objective view.
>>>>>
>>>>>> Which won't come from Daaavey, bitter little whining pizzaboy who doesn't
>>>>>> like reaping what he has sown.
>>>>>
>>>>>Oops, there goes Belinda blowing dandelion seeds around again!
>>>
>>>> Yeah, that really made sense.
>>>
>>>It's called a "metaphor"<SLAP>
>> Give it a break, college boy. It didn't have the relevance to be a
>> metaphor. That makes it a non sequitur.
> Okay, you can ignore that too.
>>>>>>>You should also consider Belinda's history of going real-life in the
>>>>>>>well-documented case of when she impersonated a lawyer to shut down an
>>>>>>>anonymous remailer. Is that what one expects of an honest person?
>>>>>
>>>>>> One expects that an honest person wouldn't persist in going around repeating
>>>>>> nasty, *unfounded* allegations from several years ago, Daavey.
>>>>>
>>>>>Whatever could you be referring to? Huge Cajones? No, that's
>>>>>well-established fact and is now a textbook example of legal assaults on
>>>>>privacy.
>>>
>>>> Something repeated over and over and over again by someone posting
>>>> *anonymously* and then repeated over and over and over again by net.kooks
>>>> like Thorne does not well-established fact make.
>>>
>>>What? That you screwed Jeff to protect Gary?
>> Never happened, Daavey.
> Oops. I should have realized that Belinda might have interpreted that to
> say "...had sex with Jeff to protect Gary?". What I meant was
> "...harassed and threatened Jeff to protect Gary?".
>>>> Ask yourself this, pizzaboy: Jeff claimed that he repeatedly stood up to
>>>> the Church of Scientology and all their lawyers. So why did he supposedly
>>>> cave in to me when I'm not even a fricking lawyer, when he KNEW I wasn't a
>>>> lawyer? Please do explain just how the hell I managed to pull off a
>>>> "textbook example of legal assaults on privacy" simply by sending him ONE
>>>> EMAIL. (Hurry, run off to Dimmy for some coaching.)
>>>
>>>Did you even READ his explaination of why he took it down?
>> I not only read it, I met personally with him and discussed it. The phone
>> calls to his employer, which he specifically stated on Usenet and in person
>> did not come from us, were part of the reason he took it down. The other
>> reason he gave us privately for taking it down turned out to be a lie on his
>> part.
> I can assume that Jeff doesn't like being harassed. Because you and
> others harassed him, he took the remailer down. That rash of harassment
> was prompted by your actions. What is so hard about this?
>>>Everyone has
>>>a breaking point and YOUR harassment of him was the last straw. He states
>>>quite clearly he doesn't want to be harassed anymore.
>> He and others also fingered the person who prompted the barrage of telephone
>> calls. You need to go back and read a bit more carefully, pizzaboy.
> How is that relevant? He was harassed, so he removed what was irritating
> the harassers.
>>>Your impersonation
>>>of a lawyer only made it more odious.
>> I never impersonated a lawyer. Your logic is full of holes, anyway. If I
>> did impersonate a lawyer and Jeff figured it out, then where's the threat to
>> him? Eh?
> Subject: Jeff's Side of the Story.
> From: [EMAIL PROTECTED] (Jeff Burchell)
> Date: 1997/07/01
> Followup-To: alt.privacy.anon-server,alt.fan.steve-winter,
> alt.religion.scientology,alt.anonymous,misc.misc,
> alt.censorship,news.admin.censorship,comp.org.eff.talk,
> news.admin.net-abuse.misc
> Organization: Content, Inc
> Newsgroups: alt.privacy.anon-server,alt.fan.steve-winter,
> alt.religion.scientology,alt.anonymous,misc.misc,
> alt.censorship,news.admin.censorship,alt.cypherpunks,
> comp.org.eff.talk,news.admin.net-abuse.misc
> [snip]
> I did respond in a fashion much like this, about a week before the attacks
> started coming. Mr. Burnore requested a copy of my (non-existant) logs.
> I told him to get me something in writing, signed by his lawyer that
> stipulated that the logs were confidential, and not to be revealed to
> anyone outside of the lawyer's office.
> I received a letter from Belinda Bryan. She is not registered with the
> State Bar of California, and is thus, not a California lawyer. I then
> ignored the request, and forwarded the correspondence to the State
> Attorney General's office (as impersonating a lawyer in CA is defined
> as fraud with extenuating circumstances).
> [end quote]
> Seems pretty clear that Jeff was quite convinced that you presented
> yourself as a lawyer.
>>>> Your pretty words don't mean squat, Daavey. The fact that you are literate
>>>> doesn't disguise the trumping fact that you're simply spreading bullshit
>>>> with an especially nice butter knife.
>>>
>>>You just don't like it when someone sees through your bullshit and calls
>>>you on your inconsistencies.
>> There are no inconsistencies in my side of the story, Daaavey.
> So what do you call your claim to have never impersonated a lawyer while a
> post from Jeff claims that you did? Are you calling Jeff a liar?
>>>> Do continue to ramble on about events of four years ago, fanboy. We'd hate
>>>> for whackjobs like Thorne and Terranson to be the only ones so concerned
>>>> about it.
>>>
>>>How does being immortalized in cryptology texts make you feel?
>> In good company.
> What's that supposed to mean? That you feel good about practicing what's
> known as "rubber-hose cryptography"?
That's "rubber-hose cryptanalysis". You know, if you're going to use
technical terms on Usenet, you really should be aware that each term has a
precisely defined meaning, and posting nonsense like the above is the best
way to ensure that everyone reading your posts knows you're an idiot.
>> The cryptos are always bitching about something.
> Like "that won't work, you can break it by doing this...". Science is
> like that.
>> Their archives also serve as an excellent fanboy meter. (There's a
>> message there, Daavey. Think about it.)
> The "fanboy" metric being defined as anything critical of you and your
> techniques in that field.
>>>> No, that's called common sense. You displayed all the classic signs of
>>>> being coached by Thorne. *Everyone* saw it.
>>>
>>>Show me where I fawned over Thorne and his doings. Since I don't use
>>>"X-No-Archive: yes", this should be easy... if such posts even existed in
>>>the first place.
>> Actions speak louder than words, Daaavey.
> So you've found the articles? What search parameters did you use?
>>>>>Here we go again. Where did I claim to be a postmaster of ANY DOMAIN?
>>>
>>>> When you decided to make harassing phone calls to databasix. When you told
>>>> Gary that you would use your position as postmaster of csu to get our plug
>>>> pulled if Gary wouldn't make James stop crossposting to APDD.
>>>
>>>So it's harassment if as soon as I identify myself, Gary starts screaming
>>>and foaming?
>> Lying comes easily to you, doesn't it?
>> [flush]
> Then prove that the conversation went differently. A lot of people agree
> that Gary screaming on the phone is much more likely than Gary politely
> disagreeing on the phone.
>>>You're not a reliable witness.
>> Says a lying, obsessed pizzaboy.
> Belinda runs out of ammo and pulls out the "liar liar pants of fire"
> defense.
>>>I have a lot of people all over San
>>>Francisco who agree that screaming at people on the phone is very much in
>>>character for Gary.
>> Then where are they? Is this like the "lurkers support me in email" tactic?
> No, it's the people who populate the computer enthusiast scene up there.
>>>Who else would have witnessed this call?
>> Worried?
> Name some names and then I'll consider being a bit worried.
>> [blah blah blah]
> Yet again, no answer to a simple question.
>>>And you can't prove the content of that call.
>> Nor can you.
> I can show that my version is much more likely than yours.
>>>You have your reputation for telling the truth (ie, none).
>> My reputation for telling the truth is just fine among the non-kook faction.
> non-kook defined as who? non-cryptologists? non-computer-types?
>>>I have mine
>> as a whining netkop who brags about making people lose net access over
>> off-topic posts to a fricking pizza delivery group by lying about
>> non-existent status as a university postmaster.
> Whoops! There goes the ol' postmaster accusation again. Don't you ever
> tire of that one? How about showing me where I bragged about making
> someone lose access?
>>>(can point to lots of
>>>people who agree that Gary's behavior is in character)
>> because they either exist only in my imagination or are obsessed kooks, just
>> like me.
> Trouble with grammer, hm?
>>>Try to find a lie.
>> You'll become so exhausted pointing each one out that
>>>You won't find any.
>> time to stop to eat or sleep and eventually you'll die, making me happy.
> This is unintelligible.
>>>>>If you disbelieve that Gary would scream obscenities and hurl wild threats
>>>>>like that over the phone, one need only talk to people who were involved
>>>>>in the ISP business in San Fransisco when he lived there.
>>>
>>>> Oh, really? Is that why we've had no problems finding peers based on the
>>>> recommendations of people he did business with in northern California?
>>>
>>>Common repeat spammers can often get peers. They often tell other
>>>spammers about service providers friendly to their activities. The same
>>>principle applies to you.
>> You might want to think about who peers with us before you make such
>> ludicrous remarks.
> The very same uu.net which has often allowed spam to be emailed and posted
> to usenet?
>>>>>> Not to mention the ones where you brag about
>>>>>> calling our then-current upstream and our then-pending upstream in an
>>>>>> effort to get our connectivity yanked.
>>>>>And this is significant because...
>>>> Because it proves that you're a netkkkopping control freak who, rather than
>>>> ignore a few crossposts, tries to bring down a whole domain.
>>>
>>>Belinda redefines "few" again...
>> Daavey demonstrates his inability to deal with the truth again.
> Your version of the truth doesn't jive with observable fact (refer to the
> above post from Jeff about you playing lawyer).
>>>> And here you are, following me around and posting to AHM, hoping they'll be
>>>> able to accomplish what you didn't. Dream on, pizzaboy.
>>>
>>>AHM was a scapegoat for yours and Gary's own incompetence. Someone broke
>>>in and you two needed someone to blame.
>> The people who admitted to it would seem a logical choice.
> So you picked up more attackers from AHM. Big deal.
>>>If a script kiddie from AHM or the like really did cause you damage,
>> Who said anything about damage, Daavey?
> Notice that word "if" up there. It means something.
>>>as you claim,
>> And this claim can be seen where?
> This was around the 30th of May when you said that the attacks came well
> before someone nabbed your unshadowed password file. Search dejanews for
> "+hackers +databasix +ahm +security +"cra><0r"". It's in the quotes of
> the first hit you find.
>>>then your problems are much more serious.
>> Problems? What problems?
> Do you know what computer security is?
>>>> Poor, bitter Daavey. Your brand spankin' new majordomo list just doesn't
>>>> cut it, does it?
>>>
>>>It works just fine, thanks.
>> Then why are you back on Usenet whining about "your" pizza delivery group?
> I'm here to challenge your supposed right to cause trouble.
>>>> You had to come back to Usenet and follow me around like a
>>>> yipping little ankle-biter. Following in the footsteps of an anonymous
>>>> lunatic and a the small, albeit determined cadre of net.kooks who dog my
>>>> every word. Here comes Daavey, sniffing along behind them, thinking
>>>> maybe if *he* repeats the old stuff over again, he might actually
>>>> accomplish something other than making himself look like just another
>>>> fanboy.
>>>
>>>Poor abused Belinda...
>> You misspelled "amused". HTH.
> You think it funny that you can accuse without proof? You think it funny
> that you can harass people without pissing them off? You think it funny
> that your actions are coming back to haunt you?
>>>> Say, what's the subscription address of that list again? I know someone who
>>>> might be interested.
>>>
>>>Since you're apparently are so 31337, you can find it yourself.
>> I've never claimed to be elite. But I'll tell my friend that you're not
>> really anxious to have new subscribers because after all, if your list
>> succeeds, you'll have one less thing to bitch about.
> So you'll sic a script kiddie on me?
> --
> David Griffith
> [EMAIL PROTECTED]
------------------------------
Subject: Re: randomness tests
From: John <[EMAIL PROTECTED]>
Date: Fri, 09 Jun 2000 08:01:05 -0700
You want to start with the standard mean, standard deviation,
etc. Also, the spread is very important. Chi-Square test is
also a good one.
Also, it is important to test a big enough sample.
* Sent from RemarQ http://www.remarq.com The Internet's Discussion Network *
The fastest and easiest way to search and participate in Usenet - Free!
------------------------------
From: Jim Gillogly <[EMAIL PROTECTED]>
Subject: Re: Some dumb questions
Date: Fri, 09 Jun 2000 15:06:03 +0000
Mok-Kong Shen wrote:
>
> Jim Gillogly wrote:
>
> > Mok-Kong Shen wrote:
> > > from other viewpoints, e.g. operating expenses/difficulties. (To
> > > avoid flames from other readers due to misunderstanding, let me
> > > repeat that I don't 'recommend' or 'propose' using n-OTP with
> > > frequency flattening as desciribed above and that I am in fact not
> > > even sympathetic to OTP as such.)
> >
> > Why, then, did you restart this discussion? Trying to help somebody
> > out who was trying to breathe new life into the rotting corpse of
> > a dead system seemed like a worthy goal, but wanking around with
> > something <nobody> believes in seems like a waste of time. I'm out
> > of this one.
>
> Pardon. Which discussion? The frequency distribution issue? Since
> you in your previous post once again touched about the issue of
> cracking based on frequencies, I thought that it were consequently
> allowed to respond to that on my part. Or was that perhaps a sin
> of mine?
Not at all. The discussion is the one with the above title, i.e. the
entire thread -- you initiated it apparently to find out ways to improve
the security of N-time pads, but you've said here that you do not
recommend or propose either N-time pads or 1-time pads. This leads
me to wonder what the point was of this exercise -- was it simply to
increase the volume in sci.crypt?
> Nonetheless, I like to point out it is a subjective matter whether
> OTP is a 'dead system'. At least till recently there have been several
The "dead system" is the N-time pad, not the 1-time pad.
--
Jim Gillogly
20 Forelithe S.R. 2000, 15:01
12.19.7.5.0, 13 Ahau 3 Zotz, First Lord of Night
------------------------------
From: Eric Lee Green <[EMAIL PROTECTED]>
Subject: Re: Random IV Generation
Date: Fri, 09 Jun 2000 15:08:09 GMT
Adam Durana wrote:
> An initialization vector (IV), does not need to be generated by a secure
> random number generator. It does not even need to be random. It just has
> to be unique for each message.
Good point. So really, a non-cryptographic-quality PRNG (i.e., statistically
valid but predictable PRNG) would be just as useful for IV generation as long
as it has a period equal to or longer than 2^block_size and an initialization
set as large as the block size.
The advantage of using a cryptographic-quality RNG/PRNG in this situation is
more related to the fact that most non-cryptographic-quality PRNG's have a
very limited initialization set. For example, one PRNG that I looked at has
2^24 possible initial values. If you are trying to ensure uniqueness, that
means that you're going to have to re-key your cipher after that # of messages
(actually, after some smaller # of messages, I'll let someone who knows more
math tackle that one). If you are doing something like, say, IPSec, you could
easily have that number of messages in a fairly short amount of time.
Of course, for something like IPSec, you could simply establish a symmetric
key and IV when the tunnel is established, and simply increment the IV
(rolling over at 2^BLOCK_SIZE) for each subsequent message sent with that
symmetric key, right? Of course, you still need a cryptographic-quality
RNG/PRNG to establish the symmetric key...
--
Eric Lee Green [EMAIL PROTECTED]
Software Engineer Visit our Web page:
Enhanced Software Technologies, Inc. http://www.estinc.com/
(602) 470-1115 voice (602) 470-1116 fax
------------------------------
** FOR YOUR REFERENCE **
The service address, to which questions about the list itself and requests
to be added to or deleted from it should be directed, is:
Internet: [EMAIL PROTECTED]
You can send mail to the entire list (and sci.crypt) via:
Internet: [EMAIL PROTECTED]
End of Cryptography-Digest Digest
******************************