Microsoft Passport fades away

2004-10-23 Thread Jerrold Leichter
From Computerworld:

Microsoft Scales Back Passport Ambitions

Microsoft's decision to reposition its .Net Passport identification
system comes as Monster.com is dropping support for the authentication
service.

http://www.computerworld.com/newsletter/0,4902,96838,00.html?nlid=PM


-- Jerry


-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


RE: Are new passports [an] identity-theft risk?

2004-10-23 Thread Whyte, William

 R.A. Hettinga wrote:
  
 http://worldnetdaily.com/news/printer-friendly.asp?ARTICLE_ID=41030
 
   An engineer and RFID expert with Intel claims there is 
 little danger of
  unauthorized people reading the new passports. Roy Want 
 told the newssite:
  It is actually quite hard to read RFID at a distance, 
 saying a person's
  keys, bag and body interfere with the radio waves.
 
 Who was it that pointed out that radio waves don't
 interfere, rather, receivers can't discriminate?

Absolutely. I'd add that while it's *currently* hard to
read at a distance, passports typically have a lifetime
of 10 years and I'd be very surprised if the technology
wasn't significantly better five years out.

William

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: Financial identity is *dangerous*? (was re: Fake companies, real money)

2004-10-23 Thread dan

|   What machine, attached to a network, using a web browser, and 
|   sending and receiving mail, would you trust? 
|  
|  I would suggest pursuing work along the lines of a Virtual Machine Monitor
|  (VMM) like VMWare.  This way you can run a legacy OS, even Windows,
|  alongside a high security simplified OS which handles your transactions.

Hal,

I'm pretty sure that you are answering the question
Why did Microsoft buy Connectix?[1]  -- the answer
was not, in other words, to screw Mac OS X users
but to break the conundrum Ballmer finds himself
in where the road forks towards (1) fix the security
problem but lose backward compatibility, or (2) keep
the backward compatibility but never fix the problem.
His Board would prefer (2), the annuity of locked-in
users, but it forces a bet that software liability
never happens.  Fixing the problem, for which the
calls grow more strident daily, puts the desktop
platform into play even more than it is now as
it asks the users (who, having lost compatibility,
thus have nothing to lose) to marry Redmond a
second time.  A VM-cures-all strategy is then
an attempt to avoid having to choose between (1)
and (2) by breaking backward compatibility for
new things but bridging the old things with a
magic box that both preserves the annuity revenue
stream from locked-in users while it keeps the
liability bar at bay.

Or so I think.

--dan


[1] http://www.microsoft.com/windows/virtualpc/previous/default.mspx


-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Patriot Act redux?

2004-10-23 Thread R.A. Hettinga
http://news.com.com/2102-1071_3-5414087.html?tag=st.util.print



 Patriot Act redux?
 By Declan McCullagh
 http://news.com.com/Patriot+Act+redux/2010-1071_3-5414087.html

 Story last modified October 18, 2004, 4:00 AM PDT



With Election Day fast approaching, it was only a matter of time before the
usual congressional shenanigans that typically punctuate the political
season.

 This time, politicians appear to have seized on what could be called the
Patriot Act strategy, drafting antiterrorism legislation in secret and then
ramming it through the Senate and House of Representatives with minimal
debate. Then it's back to the home districts to boast how they protected
voters from the bad guys.

 The vehicles chosen for this strategy are two bills described as being
inspired by the 9/11 Commission's report, a politically potent text that's
become a best-selling book. The Senate and House have approved their own
versions of the legislation, and negotiators are now meeting privately to
decide on the final draft.

 Early indications are not promising. While portions of the massive
legislation are no doubt praiseworthy, other important sections--especially
those envisioning stuffing more information into government
databases--deserve special scrutiny from privacy hawks.

 Both the House and Senate bills coerce state governments into creating
what critics are calling a national ID card.
 Because the House version is nearly three times as long, its authors had
more room to promote private agendas.

 One section anticipates storing the lifetime travel history of each
foreign national or United States citizen into a database for the
convenience of government officials. It mentions passports, but there's
nothing that would preclude recording the details of trips that Americans
take inside the United States.

 President Bush would be required to create a secure information sharing
network to exchange data among law enforcement, military and spy agencies.
Aside from a bland assurance that civil liberties will be protected,
there are zero details on what databases will be vacuumed in or what
oversight will take place.

 A second network would be created by the first person to get the new job
of national intelligence director. That network must provide immediate
access to information in databases of federal law enforcement agencies and
the intelligence community that is necessary to identify terrorists.

 It hardly needs to be said that snaring terrorists is what our government
should be doing. But it's not clear that the House bill is a step in the
right direction.

 Jim Dempsey, executive director of the Center for Democracy and
Technology, hopes that the aides negotiating the final bill end up adopting
the Senate language instead. It also would create an information-sharing
network--while requiring that Congress receive semiannual reports on how
the network is being used.

  There are dozens if not hundreds of government programs under way to do
just that (already), Dempsey warns. They are fragmented; they are
overlapping. They are occurring outside of any framework of oversight.

 Still, the Senate bill is no prize. A last-minute amendment added by Sen.
John McCain, R-Ariz., would require the Department of Homeland Security to
create an integrated screening system inside the United States.

 McCain envisions erecting physical checkpoints, dubbed screening points,
near subways, airports, bus stations, train stations, federal buildings,
telephone companies, Internet hubs and any other critical infrastructure
facility deemed vulnerable to terrorist attacks. Secretary Tom Ridge would
appear to be authorized to issue new federal IDs--with biometric
identifiers--that Americans could be required to show at checkpoints.

 Both the House and Senate bills coerce state governments into creating
what critics are calling a national ID card. Under the proposals, federal
agencies will accept only licenses and state ID cards that comply with
specific to-be-established standards--a requirement that would affect
anyone who wants to get a U.S. passport, obtain Social Security benefits,
or even wander into a federal courthouse.

 That's why Jim Harper, director of information policy studies at the Cato
Institute, is no fan of either bill. They say that if we just put
appropriate rules and restrictions in place, everything will be fine,
Harper said. But of course those rules and restrictions will drop away
over the years or if there are new terrorist attacks. They say, 'Of course
lion-taming is safe. They're our friends.' But then one day the lion grabs
you by the neck and drags you off the stage.

 A few other courageous Washingtonians have raised similar concerns. Rep.
Ron Paul, R-Texas, warned last week that the House bill will not make
America safer (but will definitely) make us less free. And 25 former
senior officials from the FBI, CIA and military have sent a letter to
Congress indicating that the 9/11 Commission's 

Re: Crypto blogs?

2004-10-23 Thread Jon Callas
On 18 Oct 2004, at 12:49 PM, Hal Finney wrote:
Does anyone have pointers to crypto related weblogs?  Bruce Schneier
recently announced that Crypto-Gram would be coming out incrementally
in blog form at http://www.schneier.com/blog/.  I follow Ian Grigg's
Financial Cryptography blog, http://www.financialcryptography.com/.
Recently I learned about Adam Shostack's http://www.emergentchaos.com/,
although it seems to be more security than crypto.
Any other good ones?
Matt Hamrick's Cryptonomicon.net is good.
There are also my PGP CTO corner articles at 
http://www.pgp.com/resources/ctocorner/.

Jon
-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


How to store the car-valued bearer bond? (was Financial identity...)

2004-10-23 Thread Ian Grigg

Aaron Whitehouse wrote:
None. But a machine that had one purpose in life:
to manage the bearer bond, that could be trusted
to a reasonable degree. The trick is to stop
thinking of the machine as a general purpose
computer and think of it as a platform for one
single application. Then secure that machine/OS/
stack/application combination.
Oh, and make it small enough to fit in the pocket,
put a display *and* a keypad on it, and tell the
user not to lose it.
iang

How much difference is there, practically, between this and using a 
smartcard credit card in an external reader with a keypad? Aside from 
the weight of the 'computer' in your pocket...
Theoretically, there may not be much difference, depending
on where the theory starts...
Practically there are a bunch of differences, which are
more or less issues, depending.
1.  The data store (a.k.a. the smart card) is separated
from the IO package.  Is this an advantage or a disadvantage?
For the most part it gives the user 2 tokens to worry about,
the expense of an additional interface, and more mass, as you
point out.  I can't quite see any offsetting advantage myself
in all that over one box that does the lot.  So that's a minus.
2.  The data store is in some sense secure.  If it's got
a car-valued bearer bond on it, that's probably not
secure enough.  It might give some security in the event
of loss, but so would a combined package with some other
password on it.  It is a marginal security improvement
over a single purpose non-smart package, and thus would
have a primary benefit in marketing (see Blue).  It's a
plus, but a small plus, as a single-purpose package could
just build in a smart card if it so desired.
3.  The smart card interface is not good.  It has to be
taken out of your trusted reader and put in someone else's
trusted reader.  Bad news.  So someone else's trusted
reader tells you it is paying you dividends on your bond,
when in fact it is replacing the bond with a mickey mouse
loyalty coupon.  Getting around that disadvantage costs
systems operators a bundle of money and restrictions.
This makes for a huge minus.
4.  The smart card interface, part 2.  In practice, smart
card readers are an example of historical detritus.  We
all said next year is the year of the smartcard in 1995,
and it still is.  In practice, the interfaces we want on our
bearer bond hardware token are these:  802.11x, ethernet,
bluetooth, IR, ... in that approximate order, all with IP
layered over and our real hot bearer transfer protocol, and
not some hokey old telco thing.  The smart card interface is
another huge minus, because it means that the infrastructure
is all specialised, the protocols are all closed, and the
system is all controlled at some level or other, which means
some big fella has to dig deep in the pockets to finance it.
Score card so far:  2 big minuses, one small minus, and
a small plus.
That would seem to me a more realistic expectation on consumers who are 
going to have, before too long, credit cards that fit that description 
and quite possibly the readers to go with them.
Next year is the year of the smart card!  In practice,
that advantage is just a rationalisation.  We can't use
any of those tokens to store your bearer bond.  If we
are going to ask someone to store a bearer bond, we
have to give that person the token.  Which means we can
start with a blank sheet of paper, we don't need to use
any smart card patriotism to justify your choices.
iang
-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: Are new passports [an] identity-theft risk?

2004-10-23 Thread Adam Shostack
On Fri, Oct 22, 2004 at 11:01:16AM -0400, Whyte, William wrote:
| 
|  R.A. Hettinga wrote:
|   
|  http://worldnetdaily.com/news/printer-friendly.asp?ARTICLE_ID=41030
|  
|An engineer and RFID expert with Intel claims there is 
|  little danger of
|   unauthorized people reading the new passports. Roy Want 
|  told the newssite:
|   It is actually quite hard to read RFID at a distance, 
|  saying a person's
|   keys, bag and body interfere with the radio waves.
|  
|  Who was it that pointed out that radio waves don't
|  interfere, rather, receivers can't discriminate?
| 
| Absolutely. I'd add that while it's *currently* hard to
| read at a distance, passports typically have a lifetime
| of 10 years and I'd be very surprised if the technology
| wasn't significantly better five years out.

5 years?  I don't think we have that long.

The technology will mature *very* rapidly if Virginia makes their
driver's licenses RFID-enabled, or if the US goes ahead with the
passports.  Why?  Because there will be a stunning amount of money to
be stolen by not identity thieves, but real thieves.  Imagine sitting
with a laptop, a good antenna, and some software outside a metro
station in Virginia.  Or an upscale restaurant in Adams-Morgan,
reading off the addresses of those who will be away from home for the
next 3 hours.

Adam

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]