well I was going to ask where I can download one of those time
travel machines, but since you're going to be like that I'll just
wait!  ;)

Brad

> (Brad, concerning my earlier reply: I was just kidding with ya, nothing
> personal.)

Don't worry, i'm quite used to sarcasm.

Actually, i've heard reports that most of the goverment secret security
places are way behind in Technology. I thought you might have had
an inside track on something though. 

Oh well.  

BTW I don't have an SUV, it's a Dakota, and Walmart is across the
street from me!


> 
> John Hebert
> 
> -----Original Message-----
> From: Mat Branyon
> To: [email protected]
> Sent: 6/18/03 1:24 PM
> Subject: Re: [brlug-general] RE: NSA's decryption clusters vs GPG, et.al.
> 
> You are talking in code again I think
> 
> On Wed, 2003-06-18 at 13:00, John Hebert wrote:
> > Call me sillier, but if I knew that for certain, do you think I would
> be
> > discussing it on a public mailing list?
> > 
> > It was a joke, based on exaggerated extrapolation. Now shut up, watch
> some
> > TV, and then drive your SUV to Walmart to buy something.
> > 
> > John Hebert
> > 
> > -----Original Message-----
> > From: Brad N Bendily
> > To: '[email protected] '
> > Sent: 6/18/03 12:47 PM
> > Subject: Re: NSA's decryption clusters vs GPG, et.al. was RE: GPG does
> not
> > pro vide "end to end encryption", but only mail c onte nt encryption
> was RE:
> > [brlug-general] Cox and smtp pain today.
> > 
> > call me silly but, do you know this? or is that your best guess?
> > 
> > Brad B
> > 
> > 
> > 
> > On Wed, 18 Jun 2003, John Hebert wrote:
> > 
> > > Well Alvaro, if you really insist we discuss this on a public list,
> > then I
> > > first must give a shout out to the ECHELON homeys: Howdy!
> > > 
> > > GPG has yet to broken, as far as is publicly known. However, you
> admit
> > > yourself that the estimates for brute force attack are outdated.
> > > 
> > > Just what do you think the DOD did with all of those old Cold War
> > bunkers
> > > around DC? They filled em full of blade stuffed racks running Linux
> > clusters
> > > and put em to work in parallel doing brute force decryption. They
> were
> > gonna
> > > upgrade to OpenBSD but they found out Theo de Raadt is a commie.
> > > 
> > > Let's do some math:
> > > 
> > > Let's say it takes 1 computer 1,000,000 years to brute force message
> > A.
> > > Then, theoretically, it will take 2 computers half that time:
> 500,000
> > years.
> > > 3 computers: 333,333 years, ... and so on.
> > > 
> > > Eventually, it comes down to this: 1 billion computers working in
> > parallel
> > > will decrypt message A in .365 of a day, about 8 hours. And 10
> billion
> > > computers will decrypt message A in less than an hour. And 100
> billion
> > > computers will decrypt the message before you actually ask the
> > computers to
> > > do so.
> > > 
> > > Now, I know you are an intelligent individual, but do you really
> think
> > that
> > > the DOD was paying $600 for a hammer since WWII? No. The DOD paid
> the
> > normal
> > > $23 for a contractor supplied hammer, and put the rest into a long
> > term
> > > black ops IT project in coordination with the defense contractors
> and
> > built
> > > up the NSA's toy room into an IT infrastructure that would make the
> > Krells's
> > > underground labs in "Forbidden Planet" look like the work of
> > brain-damaged
> > > infants.
> > > 
> > > Don't even get me started on their time-space travel machines.
> > > 
> > > :)
> > > 
> > > John Hebert
> > > 
> > > -----Original Message-----
> > > From: Alvaro Zuniga
> > > To: [email protected]
> > > Sent: 6/18/03 10:54 AM
> > > Subject: Re: GPG does not provide "end to end encryption", but only
> > mail c
> > > onte nt encryption was RE: [brlug-general] Cox and smtp pain today.
> > > 
> > > Thanks John:
> > > 
> > > How possible is for one of this messages to be decrypted? I have
> read
> > > that GPG 
> > > encryption has yet to be broken. Is that an outdated fact? For what
> I 
> > > understand about brute force algorithms, in order to break one of
> this
> > 
> > > messages, even with a small 8 character passphrase and say a 1024
> bit 
> > > encryption cipher, could take quit a bit of time. I am sure the
> > numbers
> > > I 
> > > have are quite outdated due to the hardware improvement, clustering,
> > > etc.  
> > > since the time I took a lecture on this subject; however, this
> number
> > > should 
> > > fall at least on the years category, in which case the illicit love
> > > affair 
> > > between x and y would most likely be over, is that not so( not about
> > the
> > > 
> > > affair )? I need to check out some info about those NSA's clusters.
> > The 
> > > "mile" word really captivated my heart. 
> > > 
> > > In terms of the headers of a message. How necessary is to indicate
> > that
> > > a 
> > > particular message is encrypted? I can only suspect that hackers are
> > the
> > > only 
> > > people that benefit from this information.  The only use I see is
> for
> > > the 
> > > programmer to know when to pop up passphrase box or fetch a public
> > key.
> > > I 
> > > would also expect the actual encrypted message to be free of headers
> > > because 
> > > that would identify the fact that it is encrypted or at least some
> > kind
> > > of 
> > > hint.
> > > 
> > > Thanks for the explanation, who knows what I was thinking.
> > > 
> > > Alvaro Zuniga
> > > 
> > > 
> > > Date: 
> > > Today 10:28:42 am
> > > 
> > > 
> > > How possible is for one of this messages to be decrypted? I have
> read
> > > that GPG 
> > > encryption has yet to be broken. Is that an outdated fact? For what
> I 
> > > understand about brute force algorithms, in order to break one of
> this
> > 
> > > messages, even with a small 8 character passphrase and say a 1024
> bit 
> > > encryption cipher, could take quit a bit of time. I am sure the
> > numbers
> > > I 
> > > have are quite outdated due to the hardware improvement, clustering,
> > > etc.  
> > > since the time I took a lecture on this subject; however, this
> number
> > > should 
> > > fall at least on the years category, in which case the illicit love
> > > affair 
> > > between x and y would most likely be over, is that not so( not about
> > the
> > > 
> > > affair )? I need to check out some info about those NSA's clusters.
> > The 
> > > "mile" word really captivated my heart. 
> > > 
> > > In terms of the headers of a message. How necessary is to indicate
> > that
> > > a 
> > > particular message is encrypted? I can only suspect that hackers are
> > the
> > > only 
> > > people that benefit from this information.  The only use I see is
> for
> > > the 
> > > programmer to know when to pop up passphrase box or fetch a public
> > key.
> > > I 
> > > would also expect the actual encrypted message to be free of headers
> > > because 
> > > that would identify the fact that it is encrypted or at least some
> > kind
> > > of 
> > > hint.
> > > 
> > > Thanks for the explanation, who knows what I was thinking.
> > > 
> > > Alvaro Zuniga
> > > 
> > > On Tuesday 17 June 2003 11:06 pm, will hill wrote:
> > > > On 2003.06.17 20:23 John Hebert wrote:
> > > > > I think he meant that something like Carnivore could easily pick
> > up
> > > the
> > > > > fact that only one out of ~100 messages were encrypted by
> parsing
> > > the
> > > > > message headers, and then somehow note that fact, or start a
> brute
> > > force
> > > > > decryption of it on the square miles of the NSA's underground
> > server
> > > > > clusters.
> > > >
> > > > That's about it.  Sometimes, the fact that you have something to
> > tell
> > > > someone is more important than what you say.  A sudden burst of
> > > encrypted
> > > > messages between JD Edwards and Peoplesoft might spark Lary's
> > > interest.
> > > >
> > > > _______________________________________________
> > > > General mailing list
> > > > [email protected]
> > > > http://brlug.net/mailman/listinfo/general_brlug.net
> > > 
> > > _______________________________________________
> > > General mailing list
> > > [email protected]
> > > http://brlug.net/mailman/listinfo/general_brlug.net
> > > 
> > > _______________________________________________
> > > General mailing list
> > > [email protected]
> > > http://brlug.net/mailman/listinfo/general_brlug.net
> > > 
> > 
> > 
> > _______________________________________________
> > General mailing list
> > [email protected]
> > http://brlug.net/mailman/listinfo/general_brlug.net
> > 
> > _______________________________________________
> > General mailing list
> > [email protected]
> > http://brlug.net/mailman/listinfo/general_brlug.net
> 
> _______________________________________________
> General mailing list
> [email protected]
> http://brlug.net/mailman/listinfo/general_brlug.net
> 


Reply via email to