Re: [Cryptography] prism-proof email in the degenerate case

2013-10-11 Thread d.nix
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1


On 10/10/2013 6:40 PM, grarpamp wrote:  On Thu, Oct 10, 2013 at 11:58
AM, R. Hirschfeld r...@unipay.nl wrote:
 To send a prism-proof email, encrypt it for your recipient and
 send it to irrefrangi...@mail.unipay.nl.  Don't include any
 information about
 
 To receive prism-proof email, subscribe to the irrefrangible
 mailing list at
 http://mail.unipay.nl/mailman/listinfo/irrefrangible/.  Use a
 
 This is the same as NNTP, but worse in that it's not distributed.
 

Is this not essentially alt.anonymous.messages, etc?

http://ritter.vg/blog-deanonymizing_amm.html
http://ritter.vg/blog-deanonymizing_amm_followup1.html

?

- --


-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.20 (MingW32)

iQEcBAEBAgAGBQJSV6VAAAoJEDMbeBxcUNAekEcIAIYsHOI384C4RJfNdBcpD6NR
a40C4LTQOwPJV335zUWWHjc6+6ZlUwwHimk2IQebNcEflNJn55O7k3N4CS7i4qtp
A9dxDxilCrSpwwwPnsso5bfrA2/PEVfux1yzCZ4lmf39xwl/y/0PyBO7DB8CMQcA
YatmYtzFAWktLYZSDuMIJPnzSKuaOnEQSiOXwCCTwgSIo3QRoNP+01JprroT168e
mylxsVP2R46YIIWx6uWl+oU2oflaa3/r/nLdS2OCV99uZXmu8UlJAVNq222YwELn
yhvkasfkRHtE6AhK1t5y9c4dB9cz5v2hTKNFlaRVf0PyA59ZRu8EAoZnWcJCDrM=
=gsqL
-END PGP SIGNATURE-
___
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography


Re: [Cryptography] PRISM-Proofing and PRISM-Hardening

2013-10-01 Thread d.nix
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1


 Found at: 
 http://www.nytimes.com/2007/02/05/technology/05secure.html?ex=1328331600en=295ec5d0994b0755ei=5090partner=rssuserlandemc=rss

 
 
 To quote from the above:
 
 The idea is that if customers do not see their [preselected] image,
 they could be at a fraudulent Web site, dummied up to look like
 their bank’s, and should not enter their passwords.
 
 The Harvard and M.I.T. researchers tested that hypothesis. In 
 October, they brought 67 Bank of America customers in the Boston
 area into a controlled environment and asked them to conduct
 routine online banking activities, like looking up account
 balances. But the researchers had secretly withdrawn the images.
 
 Of 60 participants who got that far into the study and whose 
 results could be verified, 58 entered passwords anyway. Only two
 chose not to log on, citing security concerns.
 
 This approach requires the customer to verify the image every log
 on. Conning them by replacing the image with, Site undergoing 
 maintenance[1] is fairly easy. With my approach, I would
 authenticate the bank's key once, when I establish an account or
 sign up for online banking. My software would check that
 authentication every time I log on after that. (If the bank decides
 to change it's key every year, I might need a new piece of paper
 every year -- which might get old after a few years.)
 
 
 and http://en.wikipedia.org/wiki/Phishing#cite_note-88 which say 
 simple things like show the right image don't work.
 
 Found at: 
 http://web.archive.org/web/20080406062154/http://people.seas.harvard.edu/~rachna/papers/emperor-security-indicators-bank-sitekey-phishing-study.pdf

 
It's also worth pointing out that common browser ad blocking / script
blocking / and site redirection add-on's and plugins (NoScript,
AdBlockPlus, Ghostery, etc...) can interfere with the identification
image display. My bank uses this sort of technology and it took me a
while to identify exactly which plug-in was blocking the security
image and then time to sort out an exception rule to not block it.

The point being - end users *will* install plug-ins and extensions
that may interfere with your verification tools.

Dave
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.20 (MingW32)

iQEcBAEBAgAGBQJSSh7jAAoJEDMbeBxcUNAel+AIAIx5Y1M0zlQtPU14aKaIE0Eo
jpQRCRgY4X/g30EnNt5wh+umKPS7ZSwPg62GfLpmntijPsGCThXVxY62OfJpnZU9
uWh+AwNG3RkMn90w2at1YaCbOyXiPEwN/2PuRsJ+RRQRKu4hbJmF1/1X36ykoIAc
s6LZ44a1FpIX8uGg5D6yo/emse3ZaKB6XlhoYZfbNlEnUc63/Sj8mC8K7ErhQbRu
qM8/LayQHLNDy+xHFfHLS2v8EJUz8DOVXKWBxxNY6Ig2Z4g4oUbbrhP1pAo2S9J9
YIR/DO4I+epiAy6WvLl/H31EHqnne5qN7B+nOz8mXxH/yg3zMliVmNKI6UCypyM=
=PXyH
-END PGP SIGNATURE-
___
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography

Re: [Cryptography] What is Intel® Core™ vPro™ Technology Animation

2013-09-24 Thread d.nix
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1



On 9/22/2013 2:23 PM, Jerry Leichter wrote:
 On Sep 21, 2013, at 10:05 PM, d.nix wrote:
 Hah hah hah. Uh, reading between the lines, color me *skeptical*
 that this is really what it claims to be, given the current
 understanding of things...
 
 http://www.intel.com/content/www/us/en/enterprise-security/what-is-vpro-technology-video.html

 
The question isn't whether it's what it claims to be.  It is that.  But
is it's *more* than it claims to be.
 

Yes, in my haste I neglected the only disclaimer bit; it is indeed a
means by which the *rightful owner/administrator* might perform very
useful tasks. The obvious crux of the biscuit is *who else* has
access, and what can they do surreptitiously?

If for example, the paper regarding manipulating the RNG circuit by
alternate chip doping is valid, then an adversary with deep pockets
and vast resources might well be able remotely target specific systems
on demand. Possibly even air gapped ones if this function is
controllable via a 3G signal as I have read elsewhere.

Or perhaps just outright reroute and tap information prior to
encryption, or subtly corrupt things in other ways such that processes
fail or leak data. A universal on-demand STUXNET, if you will... Yes,
idle unfounded speculation, I know... but still... these days the fear
is that we're not paranoid enough.

H. Maybe time to pull my old 1996 SGI R10K and R4400 boxes out of
storage. For a few *very* dedicated and air gapped tasks they might be
a small measure of worthwhile trouble.

Regards,

DN


-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.20 (MingW32)

iQEcBAEBAgAGBQJSP4OfAAoJEDMbeBxcUNAeVmUH/3MRSd/QkH9J/fY4iezSX/ME
2AbXaRSJmyLhZPW/c+moH0aUYAIPUQQ3JmVt0InZWM06jrR0pO/I9GxIM9IUWYM7
/6u/NLUcdiDtJx+BLcyUdtqSpYErkWQH9qoWxunDtUUj988xxTgia1Q+yN0h+ZOg
6PJtXB8+fTAGSoRCkhuokitB/XGbMFgAxtIyq2CMVSr3v0fOGCItvEq2wVzw8+h1
o0ps90OE3RLnel6u4YNm5EFRWoDiwN45+u/wGdXHJlSUZrncX1o6NsGvSC/0Pl94
7CYF7qpeltMMzpgPrp0IeWrls/G89FdOnjD97nzcCQ480RZAfpYCNXOIBURXq+I=
=SUzc
-END PGP SIGNATURE-
___
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography


[Cryptography] Fwd: Re: What is Intel® Core™ vPro™ Technology Animation

2013-09-24 Thread d.nix
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1



-  Original Message 
Subject: Re: What is Intel® Core™ vPro™ Technology Animation
Date: Mon, 23 Sep 2013 05:56:48 +0200
From:
To: cypherpu...@cpunks.org

Security Evaluation of Intel's Active Management Technology
VASSILIOS VERVERIS

Master of Science Thesis
Stockholm, Sweden 2010

[...]
During production AMT platforms are equipped with one or more active
embedded hashed root certificates (factory default) from various SSL
vendors worldwide.
[...]
In our laboratory environment (see section 3) we have tested and found
that the ZTC remote provisioning can be implemented even while the Intel
AMT functionality is disabled within the BIOS as illustrated in Figure
3.6. Surprisingly the AMT platform broadcasts an ARP request packet upon
connecting to a wired network (typically a LAN) and follows the sequence
described in section 3.7.1. From this point and beyond the attacker
operates the SCS and could manipulate the PC according to his/her
malicious activities (see section 3.7.5) even while the Intel AMT is
disabled in BIOS.

http://kth.diva-portal.org/smash/get/diva2:508256/FULLTEXT01

- --
H. That's not very reassuring.

DN
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.20 (MingW32)

iQEcBAEBAgAGBQJSP8W2AAoJEDMbeBxcUNAeYpgH/il2j/5ipVpRDsTjzOw0nPQH
MCiqNj9uqQGnAi9nCGHi99vFGax/IoTGcu/n7Tx+3Nqb9laacjyYu7lYREb5H/QR
cncppjotuIvNpVBhkLHES80cg71KmQ/UwwTHw1SCXCB7SIuYWaLELzcQyiK+4hj+
txlzxvx7sPEanksixZGTuR6ikq/H5RdHtDQoww/9eT2WmV+VXAGgm0ffs0sA4iQW
6aEGY1+dwi/+fOAWRjG4Wg51GsCpXeIsJ9ofjcwS8iWpyht51lwkvC6uladTXmoR
5iM9IAxPp/yz9CUkiFRNxAYMrjbMXt4xvXPgbzGM6rOYEGhqfSCv4s6671yxmDk=
=AibC
-END PGP SIGNATURE-
___
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography