Re: maximize best case, worst case, or average case? (TCPA)

2002-06-30 Thread Ryan Lackey
ardware
> > chip to PCs back in 83 or 84 time frame (aka the TCPA idea for PCs is
> going
> > on at least 20 years old now).  It was the first time I ran into
> embedding
> > chip in a metal case that would create electrical discharge frying the
> chip
> > if the container was breached.
> >
> > Remember when applications came with their own copy-protection floppy
> > disks?  it was possible to build up a library of such disks 
> > requiring all sorts of remove, search, insert ... when switching from one
> > application to another. They eventually disappeared ... but imagine if
> they
> > had survived into the multitasking era  when it would have been
> > necessary to have multiple different copy protection floppy disks crammed
> > into the same drive at the same time. The chip was suppose to provide an
> > analog to the CPU serial number used for licensing software on mainframes
> >  dating at least from the original IBM 370s (store cpuid hardware
> > instruction).
> >
> > Some of the higher-end applications still do that with some form of
> dongle
> > (originally in the serial port) that comes with the application  it
> > doesn't quite have the downside of trying to cram multiple floppies into
> > the same drive concurrently; the serial port dongles allow for them to be
> > inline cascaded ... and in theory still be able to use the serial port
> for
> > other use at the same time.
> >
> > i believe that there is some statistic some place about the UK and the US
> > are really great  that in those two countries the copyright piracy is
> > estimated to only be 50 percent.
> 
> --
> Ryan Lackey [RL7618 RL5931-RIPE][EMAIL PROTECTED]
> CTO and Co-founder, HavenCo Ltd.+44 7970 633 277
> the free world just milliseconds away   http://www.havenco.com/
> OpenPGP 4096: B8B8 3D95 F940 9760 C64B  DE90 07AD BE07 D2E0 301F
> 
> 
> 

-- 
Ryan Lackey [RL7618 RL5931-RIPE][EMAIL PROTECTED]
CTO and Co-founder, HavenCo Ltd.+44 7970 633 277 
the free world just milliseconds away   http://www.havenco.com/
OpenPGP 4096: B8B8 3D95 F940 9760 C64B  DE90 07AD BE07 D2E0 301F

-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]



Re: maximize best case, worst case, or average case? (TCPA)

2002-06-30 Thread Ryan Lackey

I think dongles (and non-copyable floppies) have been around since the early 
80s at least...maybe the 70s.  Tamper-resistant CPU modules have been around 
since the ATM network, I believe, in the form of PIN processors stored
inside safes)

The fundamental difference between a "dongle" and a full "trusted module" 
containing the critical application code is that with a dongle, you can
just patch the application to skip over the checks (although they can be
repeated, and relatively arcane).

If the whole application, or at least the non-cloneable parts of the 
application, exist in a sealed module, the rest of the application can't
be patched to just skip over this code.

Another option for this is a client server or oracle model where the really 
sensitive pieces (say, a magic algorithm for finding oil from GIS data,
or a good natural language processor) are stored on vendor-controlled
hardware centrally located, with only the UI executing on the end user's 
machine.

What I'd really like is a design which accomplishes the "good" parts of TCPA,
ensuring that when code claims to be executing in a certain form, it really is,
and providing a way to guarantee this remotely -- without making it easy
to implement restrictions on content copying.  It would be nice to have the
good parts of TCPA, and given the resistance to DRM, if security and TCPA 
have their fates bound, they'll probably both die an extended and painful 
death.

I suppose the real difference between a crypto-specific module and a general 
purpose module is how much of the UI is within the trusted platform envelope.
If the module is only used for handling cryptographic keys, as an addition to
an insecure general purpose CPU, with no user I/O, it seems unlikely to be
useful for DRM.  If the entire machine is inside the envelope, it seems 
obviously useful for DRM, and DRM would likely be the dominant application.
If only a limited user IO is included in the envelope, sufficient for
user authentication and keying, and to allow the user to load 
initially-trusted code onto the general purpose CPU, but where the user
can fully use whatever general purpose code on the general purpose CPU,
even uncertified code, with the certified module, it's not really useful
for DRM, but still useful for the non-DRM security applications which are
the alleged purpose behind TCPA.

(given that text piracy doesn't seem to be a serious commercial concern,
simply keeping video and audio playback and network communications outside 
the TCPA envelope entirely is good enough, in practice...this way, both 
authentication and keying can be done in text mode, and document 
distribution control, privacy of records, etc. can be accomplished, provided 
there is ALSO the ability to do arbitrary text processing and computing 
outside the trusted envelope, .)

If it's the user's own data being protected, you don't need to worry about 
the user intentionally circumventing the protections.  Any design which
removes control from the 'superuser' of the machine is fundamentally about
protecting someone other than the user.

This, I think, is the difference between TCPA and smartcards.  Notice
which one has in its short lifetime attracted far more enmity :)


Quoting [EMAIL PROTECTED] <[EMAIL PROTECTED]>:
> 
> 
> I remember looking at possibility at adding tamper resisistent hardware
> chip to PCs back in 83 or 84 time frame (aka the TCPA idea for PCs is going
> on at least 20 years old now).  It was the first time I ran into embedding
> chip in a metal case that would create electrical discharge frying the chip
> if the container was breached.
> 
> Remember when applications came with their own copy-protection floppy
> disks?  it was possible to build up a library of such disks 
> requiring all sorts of remove, search, insert ... when switching from one
> application to another. They eventually disappeared ... but imagine if they
> had survived into the multitasking era  when it would have been
> necessary to have multiple different copy protection floppy disks crammed
> into the same drive at the same time. The chip was suppose to provide an
> analog to the CPU serial number used for licensing software on mainframes
>  dating at least from the original IBM 370s (store cpuid hardware
> instruction).
> 
> Some of the higher-end applications still do that with some form of dongle
> (originally in the serial port) that comes with the application  it
> doesn't quite have the downside of trying to cram multiple floppies into
> the same drive concurrently; the serial port dongles allow for them to be
> inline cascaded ... and in theory still be able to use the serial port for
> other use at the same time.
> 
> i believe that there is some statistic some place about the UK and the US
> ar

Re: anonymous digital cash and other (now) iffy stuff

2001-09-22 Thread Ryan Lackey
 you seem to imply,
open warfare on personal liberty shall be declared, most of those concerns
go away; if it's a felony to deploy ecash, you'll want to be anonymous
anyway, and then violating someone's patent just doesn't seem like a big
deal in comparison.

> [...]

> Sealand will probably still keep maintaining its idiotic claim to be an
> independent state, but if the UK government wants to search they can
> easily get a warrant. If sealand were outside UK territorial waters (it
> ain't anymore) the navy can board at any time of their choice any structure
> or vessel that is not registered with the shipping registry of a recognised
> state that is in international waters.

Sealand's claim to statehood rests on the following argument:

1) An artificial island, Roughs Tower, was constructed in 1942 by the 
   British Government in then international waters, for the purpose of
   defense.  This island was not constructed for the purposes of extending
   the UK's territory, but only to defend the UK's mainland from air or
   sea attack.

2) Subsequent to cessation of hostilities, WWII, 1945, the UK removed 
   personnel and some equipment from the island, abandoning it.  The UK did 
   not return to the island at any subsequent point.

3) In 1966, Roy Bates, a UK citizen, along with others, landed on Sealand
   and occupied it.  It was at this point abandoned for over 20 years by
   the UK government.  Roy, his wife Joan, and son Michael established
   permanent primary residence on the island, renaming it Sealand.

4) Through repeated legal challenges, including firing on ships of the royal
   navy, mounting armed counter-invasion, resolving the issue of taxation of
   UK citizens resident on Sealand as if they were resident in any other
   foreign country, etc., Sealand's sovereignty has been repeatedly reaffirmed.
   We have a large body of supporting documentation from the past 59 years;
   I'll try to put more of it up on our website in the future.

5) Despite the UK extending territorial waters in 1987 to 12nm, Sealand
   was by that point established for more than 20 years, and extended its
   own territorial waters to 18nm the day before.  Similarly, treaties and
   amendments to the laws of the sea in the 1980s prohibiting the construction
   of platforms in international waters by sovereign governments in order to
   extend territorial waters did not apply to the UK in 1942, nor did they
   apply to Sealand when founded in 1966.  Such treaties also support the
   long legal tradition of artificial and reclaimed land being treated as 
   land for the purposes of international and national law.

None of this has been in the least affected by an apparent new willingness
on the part of the US and other nations to invade arbitrary other nations.
Sealand has nothing to do with any of the recent terrorist events; if Osama
bin Ladin were, for instance, living on Sealand, I would fully expect
Sealand would be asked to turn him over[1] or face invasion.  Sealand's
legal status is NOT the issue; international realpolitik of larger states
vs. smaller ones is much more the issue.  In fact, given such a situation,
it seems more likely they would treat Sealand as a state, and ask us to
comply with a demand placed in such language.

Independently of that, HavenCo operates.  If HavenCo/Sealand is shut down by 
invasion by the nation of ---, HavenCo can continue to operate
from other locations; indeed, eliminating Sealand would simply establish more
need for our services and ensure our next facility has more customers and
capital equipment than Sealand.

[1] There *was* a time where cypherpunks wrote code, rather than worrying 
about influencing legislation; they assumed the government was 
malicious and all powerful anddesigned technical systems to defeat them 
still; I don't think that time is over.  Indeed, an upcoming conference, 
CodeCon, exists to advance the state of the art in and promote discussion 
of such systems; CFP to be sent shortly.)

[2] Which would be done, but in multiple boxes/bags/jars, just as our
ultimate response to someone presenting a clear military threat unless we
hand over a given customer machine is to destroy it completely and then
refund the customer's unused balance.

-- 
Ryan Lackey [RL7618 RL5931-RIPE][EMAIL PROTECTED]
CTO and Co-founder, HavenCo Ltd.+44 7970 633 277 
the free world just milliseconds away   http://www.havenco.com/
OpenPGP 4096: B8B8 3D95 F940 9760 C64B  DE90 07AD BE07 D2E0 301F




-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]



[Announce] HavenCo Sealand Remailer Online

2001-09-16 Thread Ryan Lackey
A


AAAAAAAA
AQAB
- -End Mix Key-

- -- 
Ryan Lackey [RL7618 RL5931-RIPE][EMAIL PROTECTED]
CTO and Co-founder, HavenCo Ltd.+44 7970 633 277 
the free world just milliseconds away   http://www.havenco.com/
OpenPGP 4096: B8B8 3D95 F940 9760 C64B  DE90 07AD BE07 D2E0 301F








-BEGIN PGP SIGNATURE-
Comment: For info see http://www.gnupg.org

iD8DBQE7pFF4B62+B9LgMB8RAvt9AJ9NP4C+MUAVfSVbWDEm3pHLwGLFjACgniyJ
eOmNvq0SqDxoCmLENigWIBs=
=ejVv
-END PGP SIGNATURE-


-- 
Ryan Lackey [RL7618 RL5931-RIPE][EMAIL PROTECTED]
CTO and Co-founder, HavenCo Ltd.+44 7970 633 277 
the free world just milliseconds away   http://www.havenco.com/
OpenPGP 4096: B8B8 3D95 F940 9760 C64B  DE90 07AD BE07 D2E0 301F











-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]



Re: Starium (was Re: article: german secure phone)

2001-06-05 Thread Ryan Lackey

Quoting Bram Cohen <[EMAIL PROTECTED]>:

> I heard from an investor that they decided the first box was 'not secure
> enough' and spent a bunch more time and money building the second mox,
> which makes it harder to do physical snooping at either end, as a result
> of which they haven't shipped a product and are now imploding.

I was told that the primary concern was lowering unit costs.  The original
COMSEC 3-DES phone had a unit cost of approximately USD 1000.  Build cost was
probably something like USD 300.

The Privatel, etc. equipment seems to be USD 400-500, with a build cost of
about USD 50-100.

Eric's goal was a chipset suitable for mobile telephony (the primary market
for secure telephones which are not inside the STE regime) and unit cost
of +USD 50, with USD 20 or so chip cost.  I'm sure there were a lot of
problems with that -- FCC licensing, the difficulties of designing chips
in general, any possible resistance from equipment/handset manufacturers,
etc.

It is highly unclear if there is enough of a market for USD 500 terminals
which are not mobile and do not interoperate with STE.  They are clearly
not going to be sold into the STE marketplace.  "Privacy fetishists"
are not a viable market for any product except maybe t-shirts with cool
slogans.  Corporate users need more sophisticated key management
than the current offerings.  The real value users want mobile (GSM)
functionality.  The www.sectra.se Sectra Tiger provides decent key
management and mobile use, but it's a USD 2 500 platform.  I think they will
sell more USD 2 500 DECT+GSM secure units than $500 privatels, though.

Outside the US, outside PBXes, landlines are 100% dead in the market that
can pay $500-2500 for security.  Inside the US, they may be dead too.  The
only reason I can think of to use landline is to gain some measure of
anonymity by using a random payphone or otherwise unlinkable phone; of 
course, anonymity is even less a viable market than privacy by about
100x, and if you really care, you can swap SIMs and optionally scramble
IMEI in flash, or just replace phones between use.

These secure phones, if they don't interoperate with STE and define their own
standards, have serious "network effects" problems.  I think the only way
around it would be to have a free or low cost 
software/VoIP/VoIP-PSTN/voicemodem solution.  If you gave away or sold cheaply
a software version, and sold a hardware mobile terminal at USD 5 000, you
would make more profit than if you sold only desktop terminals at USD 500-1000.

That being said, phones suck.
--
[EMAIL PROTECTED]+41 1 27 42 491 (corporate, fax)
Chief Technical Officer +44 (0)7970 633 277 (mobile)
HavenCo, Ltd. ||| Secure Offshore Colocation ||| http://www.havenco.com/
1024D/4096g 0xD2E0301F B8B8 3D95 F940 9760 C64B  DE90 07AD BE07 D2E0 301F












-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]