--- begin forwarded text
Status: U
Date: Mon, 17 Sep 2001 23:26:24 -0400
To: [EMAIL PROTECTED]
From: Declan McCullagh <[EMAIL PROTECTED]>
Subject: FC: Majority of Americans want anti-encryption laws, poll says
Sender: [EMAIL PROTECTED]
Reply-To: [EMAIL PROTECTED]
The following excerpts come f
--- begin forwarded text
Status: U
Date: Mon, 17 Sep 2001 22:32:32 -0500
To: [EMAIL PROTECTED]
From: [EMAIL PROTECTED] (by way of [EMAIL PROTECTED])
Subject: ip: US cyberwarriors plan assault on Mideast states
Cc: [EMAIL PROTECTED]
http://www.knoxstudio.com/shns/story.cfm?pk=SIEGE-HACKERS-09-
we were somewhat involved in the implementation of support of commerce
server and hiding account numbers using SSL encryption (probably one of the
most wide-spread use of the technology in the world today).
random refs:
http://www.garlic.com/~lynn/aadsm5.htm#asrn2
http://www.garlic.com/~lynn/aad
At 02:14 PM 9/17/01 -0400, Jim Windle wrote:
>Second, if we assume for a minute that the terrorist use public key
>systems
Given their 1. quality opsec including 2. wise avoidance of wireless
phones, etc, and their
3. dependence on long-time personal contacts, isn't it more likely that
private k
At 07:21 PM 09/16/2001 -0700, David Honig wrote:
>At 06:02 PM 9/16/01 -0400, Angelos D. Keromytis wrote:
> >Niels Provos (U. of Michigan) has a very interesting paper on detecting
> >steganography on the network (he talked about it during the USENIX Sec. WIP
> >session). Basically, he didn't find
Peter Trei wrote:
> > From:
> > [EMAIL PROTECTED][SMTP:[EMAIL PROTECTED]]
> >
> > In article <[EMAIL PROTECTED]>,
> > Perry E. Metzger <[EMAIL PROTECTED]> wrote:
> > >
> > >Helger Lipmaa <[EMAIL PROTECTED]> writes:
> >
> > >> Why just not to use a C code?
> > >
> > >Because it is typically slower
> Therefore cryptography is treated differently by political
> logic.
>
> [Moderator's note: Everyone who's got a copy of Netscape or IE has
> cryptographic software in their hands, and most of them have used
it. --Perry]
>
> And, beyond that, we have to keep in mind a certain detail:
>
> Air plan
At 01:25 PM 9/17/01 -0500, Matt Crawford wrote:
>Somehow I doubt that it was not a speech or debate in the senate.
And what is the basis for this doubt?
All evidence, including that which I quoted in my original message,
indicates that he first said it in a media interview. Here is some more
In this debate about restrictions on crypto after Tuesday's events I
think it important to address the issues on logical and empirical
rather than emotional or ideological grounds. I have made a number of
posts but would like to try to summarise. These are my thoughts, your
mileage may vary. Wh
> >Senator Hatch was interviewed by national media on Tuesday and stated that
> >the US government had voice intercepts of calls talking about success with
> >two targets. He was later criticized for talking about the intercepts.
>
> Hm, criticized? Why not indicted?
>
>(a) Whoever kno
Title: RE: Which internet services were used?
Several of these reports are based on an article that I did. (CNN reported from the article as well, but made too many assumptions and lapse into error.)
Essentially, AOL and Earthlink have admitted to working with the FBI to provide whatever data
On Sat, Sep 15, 2001 at 10:16:27AM -0700, Carl Ellison wrote:
> I'm told that the LINUX 2.4 kernel comes with the RNG driver
> built-in, but I haven't tried that.
It works almost out of box, kernel detects the chip and if you have the
necessary device file created (character 10,183 AFAIK) you ca
> [Moderator's note: Everyone who's got a copy of Netscape or IE has
> cryptographic software in their hands, and most of them have used it. --Perry]
That's a technical view. I was talking about a political view.
In a political discussion there's no point in technical arguments,
if less than 3%
In message <[EMAIL PROTECTED]>, David Honig writ
es:
>At 06:02 PM 9/16/01 -0400, Angelos D. Keromytis wrote:
>>Niels Provos (U. of Michigan) has a very interesting paper on detecting
>>steganography on the network (he talked about it during the USENIX Sec. WIP
>>session). Basically, he didn't fin
On Mon, 17 Sep 2001 11:50:13 Hadmut Danisch wrote:
>
>Depends on which kind of logic you apply.
>
>Technical logic: Yes, you're right.
>
>Policital logic: No, you're wrong.
>
>The reason is, that air planes, phones, hotels, cars, etc.
>are used by common people - those who elect politicians -
>
At 11:50 AM 9/17/01 +0200, Hadmut Danisch wrote:
>Which politician would dare to ban hotels?
Which politician would fail to support mandatory registration of
motel occupants with local 'authorities'?
>[Moderator's note: Everyone who's got a copy of Netscape or IE has
>cryptographic software in
On Mon, Sep 17, 2001 at 09:10:48AM -0500, Matt Crawford wrote:
>
> The only details I've heard are that the terrorists have "elaborate
> web sites" to "recruit and solicit donations." Far short of
> operational use of the internet.
>
They had two websites in Germany, one for recruiting people
> From:
> [EMAIL PROTECTED][SMTP:[EMAIL PROTECTED]]
>
> In article <[EMAIL PROTECTED]>,
> Perry E. Metzger <[EMAIL PROTECTED]> wrote:
> >
> >Helger Lipmaa <[EMAIL PROTECTED]> writes:
>
> >> Why just not to use a C code?
> >
> >Because it is typically slower by many times than hand tuned assembl
> A german TV news magazine (ZDF spezial) just mentioned that
> the terrorists prepared and coordinated
> also by using the internet, but no details were told.
>
> [Moderator: I've listened to virtually all the news conferences made
> so far. The FBI has yet to make any such statement.
The only
On Sun, 16 Sep 2001, Peter Fairbrother wrote:
> Banning cryptography to deter terrorism, or controlling it to give
> GAK, is much in the news these days. I wonder if it could be done?
The noble goal of this "ban all crypto"-move, seems to be that all
messages should be understandable and readabe
Peter Fairbrother <[EMAIL PROTECTED]> writes:
> Incidently, even the A5/1 algorithm is supposedly not very secure against eg
> LEAs, Corporations, or perhaps even a very dedicated amateur, though I have
> no exact details to hand.
A normal PC with several hundred gigabytes of disk space and two w
[Some mailer problems. Perry, if possible, can you inject this mail
with the headers below?]
--- Forwarded Message
Subject: Re: How to ban crypto?
To: "Angelos D. Keromytis" <[EMAIL PROTECTED]>
Cc: Carl Ellison <[EMAIL PROTECTED]>, [EMAIL PROTECTED],
[EMAIL PROTECTED]
From: Niels Provo
On Fri, Sep 14, 2001 at 01:57:37PM -0400, Jim Windle wrote:
>
> Yes and by the logic of your argument jet airliners, telephones,
> hotel romms and rental cars also allow terrorists to commit there acts.
>
Depends on which kind of logic you apply.
Technical logic: Yes, you're right.
Policital
--- begin forwarded text
Status: U
Date: Sun, 16 Sep 2001 20:36:04 -0400 (EDT)
From: Charles Platt <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Subject: The Enduring Power of Stupidity
The Enduring Power of Stupidity
During the past five days I have read many essays. To me, all
of them have
At 11:21 PM 9/16/01 -0400, P.J. Ponder wrote:
>Senator Hatch was interviewed by national media on Tuesday and stated that
>the US government had voice intercepts of calls talking about success with
>two targets. He was later criticized for talking about the intercepts.
Hm, criticized? Why n
Slashdot put up a decent, relevant article this afternoon.
(Yes, a real original article, not just a quickie squib.)
http://slashdot.org/article.pl?sid=01/09/16/1647231
James S. Tyre mailto:[EMAIL
Matt Blaze <[EMAIL PROTECTED]> writes:
> If anything, the key escrow problem has become much harder. Today,
> far more than three years ago, encryption is central to protecting
> many aspects of what we call "critical infrastructure", and, although I've
> not systematically studied this recently,
27 matches
Mail list logo