Re: Jim Bell's adversity

2019-10-21 Thread Zenaan Harkness
On Tue, Oct 22, 2019 at 03:43:15AM +, jim bell wrote:
>  On Monday, October 21, 2019, 06:16:53 PM PDT, Zenaan Harkness 
>  wrote:
>  
>  
>  On Tue, Oct 22, 2019 at 10:46:54AM +1100, Zenaan Harkness wrote:
> > On Mon, Oct 21, 2019 at 09:14:10PM +, jim bell wrote:
> > > First claim:
> > > 
> > > EVENTS
> > > 
> > > All previous pages and paragraphs herein are incorporated inclusive.
> > > 
> > > Claim #1
> > > 
> > > Beginning at a concealed time unknown to plaintiffs, various government 
> > > agents including Defendants Jeff Gordon and Steven Walsh but not limited 
> > > to these, with the assistance of unknown-named private citizens, began to 
> > > act as individuals and as groups and as a group, in all their respective 
> > > capacities, in a collusion and a conspiracy against private citizens 
> > > including the plaintiffs in a scheme or plan in order to deny and violate 
> > > their Constitutional rights.
> > > 
> > > These victim private citizens included attendees of a Portland, Oregon 
> > > political/social/legal group called the "Multnomah County Common Law 
> > > Court", (hereafter MCCLC), which met during the late 1996 through 1997 
> > > time frame, and continued until a date and time unknown to Plaintiff 
> > > James Dalton Bell. The group of government agents and private-citizen 
> > > co-conspirators is hereafter in some cases referred to as the 
> > > Infiltrators, and the group of MCCLC attendees and other victims is 
> > > referred to as Citizens.
> > > -  end of quote 
> > > --
> > 
> > 
> > Stunning. Absolutely stunning stuff! And still to today, "main
> > stream" media blackout.
> 
> And that INCLUDES Declan McCullagh.  Remember him?   He had the prospect of 
> covering a truly gigantic story, but he flinched.  In early 2002, he claimed 
> he would visit me at USP Lompoc, to cover my story,  He never showed.  And he 
> lied about it:  Claimed that he couldn't, 'at the last moment', but in 
> reality he didn't even bother to fill out the paperwork to have a visit 
> approved...and that would have had to happen 2 weeks prior to the visit.
> I don't object to the mere lack of a visit:  I objected to the fact that he 
> apparently went from covering the story...WHEN the government would have 
> WANTED him to cover it...to suddenly abandoning the story once I got 
> 'convicted'.
> 
> > Well, today is a new day - I encourage you to create a new
> > affidavit/deposition, attaching/exhibiting all previous documents,
> > get it signed and witnessed, and begin your claim anew.
> Eventually...
> 
> > There can be no statute of limitations on such government corruption,
> > and with the two lame stream parties fighting amongst themselves,
> > there's a chance you'll get an actual proper case going this time...
> 
> Limitations is very complicated.  According to a 1937 Supreme Court decision, 
> Erie Railroad v. Tompkins  
> https://en.wikipedia.org/wiki/Erie_Railroad_Co._v._Tompkins  the SC held that 
> if a federal law had no explicit rule attached, Federal courts had to 
> 'borrow' the corresponding rule from State law.  This included the 
> limitations period ("statute of limitations").    That would have been great 
> in the State of Washington, which up to 1993 'tolled' (stopped the clock) on 
> a civil suit while a person was a prisoner.  Here's a good handling of the 
> general problem, not specifically on Washington:  
> https://www.repository.law.indiana.edu/cgi/viewcontent.cgi?article=1583=ilj
> 
> Before 1993, being a prisoner tolled the limitations period.  In 1993, that 
> law was repealed.
> https://www.prisonlegalnews.org/news/1993/aug/15/wa-repeals-cons-tolling-statute/
> 
> I knew about this in 2001, so I knew that I couldn't wait.


Additionally, you can always file, along with your claim, a "special
leave" application (or whatever they call that in the US - this
means, although you may technically be past any particular arguable
statute of limitation, you apply to the court to waive that
limitation, in the interests of justice (amongst other grounds...).

And always remember to add the various "public interest" grounds -
the public has an interest that wrongs and evils are (if belatedly)
brought to justice, the public have an interest to see justice be
done, the public have especially significant interests around the
organs (departments) and executors (individuals) of government, being
held to account.

If you include a bunch of such grounds, and all your evidence, and
it's still not enough, and you -still- need more "persuasion" (this
is the term used in Australian courts), your next step is to build
support for the exposure of the injustice and the claim to bring at
least some justice, with one or more of:

 - petition to parliament, with as many petitioners as you are
   willing to spend time gathering

 - a letter in support of your case from one or another 

WIRED: IBM Says Google’s Quantum Leap Was a Quantum Flop

2019-10-21 Thread jim bell
WIRED: IBM Says Google’s Quantum Leap Was a Quantum Flop.
https://www.wired.com/story/ibm-googles-quantum-leap-quantum-flop


Whodathunkit? CIA, FBI computers used for Wikipedia edits

2019-10-21 Thread Razer
WASHINGTON (Reuters) - People using CIA and FBI computers have edited entries 
in the online encyclopedia Wikipedia on topics including the Iraq war and the 
Guantanamo prison, according to a new tracing program.

A screenshot of Wikipedia.com, taken on August 16, 2007. (image onsite) 

The changes may violate Wikipedia’s conflict-of-interest guidelines, a 
spokeswoman for the site said on Thursday.

The program, WikiScanner, was developed by Virgil Griffith of the Santa Fe 
Institute in New Mexico and posted this month on a Web site that was quickly 
overwhelmed with searches.

The program allows users to track the source of computers used to make changes 
to the popular Internet encyclopedia where anyone can submit and edit entries.

WikiScanner revealed that CIA computers were used to edit an entry on the 
U.S.-led invasion of Iraq in 2003. A graphic on casualties was edited to add 
that many figures were estimated and were not broken down by class.

Another entry on former CIA chief William Colby was edited by CIA computers to 
expand his career history and discuss the merits of a Vietnam War rural 
pacification program that he headed.

Aerial and satellite images of the U.S. prison for terrorism suspects at 
Guantanamo Bay, Cuba, were removed using a computer traced to the FBI, 
WikiScanner showed.

CIA spokesman George Little said he could not confirm whether CIA computers 
were used in the changes, adding that “the agency always expects its computer 
systems to be used responsibly.”

The FBI did not have an immediate response.

Computers at numerous other organizations and companies were found to have been 
involved in editing articles related to them.

Griffith said he developed WikiScanner “to create minor public relations 
disasters for companies and organizations I dislike (and) to see what 
‘interesting organizations’ (which I am neutral towards) are up to.”

It was not known whether changes were made by an official representative of an 
agency or company, Griffith said, but it was certain the change was made by 
someone with access to the organization’s network.

It violates Wikipedia’s neutrality guidelines for a person with close ties to 
an issue to contribute to an entry about it, said spokeswoman Sandy Ordonez of 
the Wikimedia Foundation, Wikipedia’s parent organization.

However, she said, “Wikipedia is self-correcting,” meaning misleading entries 
can be quickly revised by another editor. She said Wikimedia welcomed the 
WikiScanner.

WikiScanner can be found at wikiscanner.virgil.gr/

https://www.reuters.com/article/us-security-wikipedia/cia-fbi-computers-used-for-wikipedia-edits-idUSN1642896020070816


Rr
Sent from my Androgyne dee-vice with K-9 Mail

Re: Assange "fails in bid to delay extradition battle with US"

2019-10-21 Thread jim bell
 On Monday, October 21, 2019, 08:12:07 PM PDT, Greg Newby  
wrote:
 
 On Mon, Oct 21, 2019 at 06:51:31PM +, jim bell wrote:

>> Jim Bell's comment:
>> (But first, note that the term "extraterritoriality" was commonly used in 
>> TWO senses in regards to Assange:  First, perhaps the most common usage was 
>> the fact that Assange could stay in the Embassy as if it were a different 
>> country, not UK.  That is NOT the sense I am most interested in, at least in 
>> part because nobody seemed to be substantially challenging that issue.  The 
>> second usage, is the concept that a country can have criminal jurisdiction 
>> over acts committed in another nation.  Put simply, can the US declare 
>> actions by a person outside the US, when there is no clear connection to the 
>> US?   I very much doubt that, in this case.  Below, you can see that I 
>> looked at some statutes, and did not find any specific reference to 
>> 'extraterritoriality' as part of the statutes which were then cited.  This 
>> material includes points which included references to US court decisions 
>> which declared that unless a statute clearly claims 'extraterritoriality' 
>> over acts in other nations, it should be presumed to not apply.
>> Did the US add any charges which DID have extraterritoriality references 
>> built into the statutes?)
> 
>> It's frustrating that these news-item references aren't written to include 
>> issues such as extraterritoriality included.  I will now do a time limited 
>> Google-search for 'Assange extraterritoriality' over the last months to find 
>> useful references.  Nothing.  Perhaps a law journal will have addressed this 
>> important matter.  
>> Let's not forget what I said on April 29, 2019:


>Thanks for resending the analysis below. I spent a little time following up on 
>your searches, including looking at whether 'comity' is a pathway to valid 
>extratorritality. Like you, I came up with no basis in the USC, including, as 
>you cited, in the sections dealing with espionage.

I noticed at least a couple decades ago that the word "comity" is pronounced 
dangerously close to "comedy".  And with very similar meaning, as well. 
Months ago, I sent an email to a woman barrister on Assange's case my analysis, 
below.  No answer, but I suppose I didn't expect one.  

>Commentary:

>It is not in the interests of most commercial media outlets to highlight the 
>legal shortcomings of the US efforts to extradite Assange, any more than it is 
>to highlight the attacks on journalistic freedom, war on whistleblowers, etc.

>But even non-mainstream coverage seems to ignore the key issue of 
>extraterritoriality. It's not a difficult concept to grasp. I don't think this 
>is a concept that occurs to most journalists.

>From the 1973 movie, "The Paper Chase".   
>https://www.youtube.com/watch?v=zruWCuNmWV8    
"You come in with a skull full of mush, and you leave thinking like a lawyer."
I remember seeing this movie first in a theater, first-run.   It really 
impressed me!   It was at this time I decided...that I definitely DIDN'T WANT 
TO BECOME A LAWYER!!!   Why?   Because science and engineering don't cheat.  
Law sets up rules, but then the people doing it cheat.

>Generations of Americans have grown up with the notion that the US is the 
>World's police force. The ubiquity of US enforcement - i.e., military might, 
>and many other mechanisms - is not questioned. It is celebrated.

Sadly, yes.

>My theory concerning the relentless pursuit of Assange is that the ultimate 
>court outcomes are not the main object. The main object is ongoing and very 
>public punishment, certainly including unending incarceration and 
>intimidation, for daring to air the US' dirty laundry.- Greg

Well, I DEMAND they 'play by the rules', in the way they refused to do so in my 
case.  
                Jim Bell



> ---jim bell 
> To:CypherPunks
> Apr 29 at 5:31 PM
> From:     https://www.justice.gov/opa/press-release/file/1153486/download
> 15(B) to intentionally access a computer, without authorization and exceeding 
> authorized access, to obtain information from a department and agency of the 
> United States in furtherance of a criminal act in violation of the laws of 
> the United States, that is, a violation of Title 18, United States Code, 
> Sections 641, 793(c), and 793(e). (In violation of Title 18, United States 
> Code, Sections 371, 1030(a)(l), 1030(a)(2), 1030(c)(2)(B)(ii).) 
> 
> [end of partial quote]
> There is a principle of American law, upheld by the Supreme Court, that a 
> Federal law is only supposed to be considered of "extraterritorial" 
> application (applies outside the boundaries of United States territory) if 
> the Congress specifically intended that application, and was signified by 
> including such language within the law 
> itself.https://en.wikipedia.org/wiki/Extraterritorial_jurisdiction
> 
> "In Morrison v. National Australia Bank, 2010, the 

Re: Jim Bell's adversity

2019-10-21 Thread jim bell
 On Monday, October 21, 2019, 06:16:53 PM PDT, Zenaan Harkness 
 wrote:
 
 
 On Tue, Oct 22, 2019 at 10:46:54AM +1100, Zenaan Harkness wrote:
> On Mon, Oct 21, 2019 at 09:14:10PM +, jim bell wrote:
> > First claim:
> > 
> > EVENTS
> > 
> > All previous pages and paragraphs herein are incorporated inclusive.
> > 
> > Claim #1
> > 
> > Beginning at a concealed time unknown to plaintiffs, various government 
> > agents including Defendants Jeff Gordon and Steven Walsh but not limited to 
> > these, with the assistance of unknown-named private citizens, began to act 
> > as individuals and as groups and as a group, in all their respective 
> > capacities, in a collusion and a conspiracy against private citizens 
> > including the plaintiffs in a scheme or plan in order to deny and violate 
> > their Constitutional rights.
> > 
> > These victim private citizens included attendees of a Portland, Oregon 
> > political/social/legal group called the "Multnomah County Common Law 
> > Court", (hereafter MCCLC), which met during the late 1996 through 1997 time 
> > frame, and continued until a date and time unknown to Plaintiff James 
> > Dalton Bell. The group of government agents and private-citizen 
> > co-conspirators is hereafter in some cases referred to as the Infiltrators, 
> > and the group of MCCLC attendees and other victims is referred to as 
> > Citizens.
> > -  end of quote 
> > --
> 
> 
> Stunning. Absolutely stunning stuff! And still to today, "main
> stream" media blackout.

And that INCLUDES Declan McCullagh.  Remember him?   He had the prospect of 
covering a truly gigantic story, but he flinched.  In early 2002, he claimed he 
would visit me at USP Lompoc, to cover my story,  He never showed.  And he lied 
about it:  Claimed that he couldn't, 'at the last moment', but in reality he 
didn't even bother to fill out the paperwork to have a visit approved...and 
that would have had to happen 2 weeks prior to the visit.
I don't object to the mere lack of a visit:  I objected to the fact that he 
apparently went from covering the story...WHEN the government would have WANTED 
him to cover it...to suddenly abandoning the story once I got 'convicted'.

> Well, today is a new day - I encourage you to create a new
> affidavit/deposition, attaching/exhibiting all previous documents,
> get it signed and witnessed, and begin your claim anew.
Eventually...

> There can be no statute of limitations on such government corruption,
> and with the two lame stream parties fighting amongst themselves,
> there's a chance you'll get an actual proper case going this time...

Limitations is very complicated.  According to a 1937 Supreme Court decision, 
Erie Railroad v. Tompkins  
https://en.wikipedia.org/wiki/Erie_Railroad_Co._v._Tompkins  the SC held that 
if a federal law had no explicit rule attached, Federal courts had to 'borrow' 
the corresponding rule from State law.  This included the limitations period 
("statute of limitations").    That would have been great in the State of 
Washington, which up to 1993 'tolled' (stopped the clock) on a civil suit while 
a person was a prisoner.  Here's a good handling of the general problem, not 
specifically on Washington:  
https://www.repository.law.indiana.edu/cgi/viewcontent.cgi?article=1583=ilj

Before 1993, being a prisoner tolled the limitations period.  In 1993, that law 
was repealed.
https://www.prisonlegalnews.org/news/1993/aug/15/wa-repeals-cons-tolling-statute/

I knew about this in 2001, so I knew that I couldn't wait.

>Timing is really important Jim - the folks who did you over in their
pathetic star chamber, may not (all?) be holding seats of powertoday.

Yes, I knew how important knowing these statutes was.

>Then again, other similarly criminal humans may have replaced those
who've moved on."

No doubt..


>Notwithstanding, it's a fair bet that the first time you attempted to
file your claim, those who had most to lose by your claim running in
the courts, were still in direct power.

>And so although a good experience, that may not have been the wisest
time to bring your claim - as in, today might have much better chance
of success for you.

>This is my assumptive hope...

I believe I will eventually get what amounts to 'justice'.   AP?


>If you do deign to launch your claim at this time, and you have any
questions at all, feel free to send me any question at all either on
or off list - some I can answer, but only generally (Australian
jurisdiction here, and IANAL).

>Also, you may happen across someone in the US who is of good spirit
and has some knowledge (even just on legal process) who may be
willing to assist you.

Well, the lawsuit I wrote in 2003 should have been plenty...


  

Re: riots in chile

2019-10-21 Thread Razer
See this infographic: 
https://www.reddit.com/r/COMPLETEANARCHY/comments/dkspnx/the_actual_causes_of_insurrection_in_chile/

Rr
Sent from my Androgyne dee-vice with K-9 Mail

On October 21, 2019 11:32:41 AM PDT, "Punk - Stasi 2.0"  wrote:
>
>
>https://www.bbc.com/news/world-latin-america-50106743
>
>one obvious question : to what degree are the riots the result of a 
>facebook-nsa-fukerberg-pentagon-etc experiment. 
>
>as an interesting aside their are not mentioned here
>https://consortiumnews.com/ - I guess that site is an even bigger piece
>of shit than I thought. 


Tik-Tok... It's NOT just for Pepe Pervs

2019-10-21 Thread Razer
The company Nazis keep! Just wonder if they use pink hearts too?

"Islamic State propagandists are reportedly trying to exploit social media app 
TikTok as a recruiting tool. The Wall Street Journal says social media 
monitoring agency Storyful recently identified around two dozen ISIS-related 
accounts, all of which have since been removed. The accounts posted videos 
aimed at recruiting followers and bolstering support for the terrorist group — 
featuring Islamic State anthems and footage of corpses and ISIS fighters.

It’s not clear how big a presence ISIS has on TikTok. Terrorist propaganda is a 
perennial issue for social media platforms. Companies like Facebook and Google 
share a database of known terrorist imagery that can be automatically removed 
when it’s detected online. They’ve also faced (and won) several lawsuits for 
allowing it even temporarily on their platforms. Facebook said in September 
that it removed more than 26 million pieces of global terrorist propaganda over 
the past two years. TikTok’s parent company ByteDance didn’t immediately 
respond to a request for comment about how much terrorist content TikTok finds 
and takes down.

The accounts that Storyful identified also appear to be relatively small. The 
Journal identifies one video as earning 68 likes and some accounts as having 
around 1,000 followers; Storyful didn’t immediately confirm whether that’s 
typical of the accounts’ popularity, or whether these are the first accounts 
they’ve found on TikTok.

TikTok videos circulate largely thanks to TikTok’s recommendation algorithm. 
And in this case, it’s not clear that the algorithm is promoting ISIS content, 
just that this content exists on the hugely popular platform. However, as the 
Journal notes, TikTok has a young user base and is known for lighthearted, 
joke-y content — sometimes to the point of alleged political censorship. So 
there’s an added incongruity when it’s used by terrorists." 
https://www.theverge.com/2019/10/21/20925416/tiktok-islamic-state-terrorist-propaganda-recruitment-account-videos

Rr
Sent from my Androgyne dee-vice with K-9 Mail

Re: Assange "fails in bid to delay extradition battle with US"

2019-10-21 Thread Greg Newby
On Mon, Oct 21, 2019 at 06:51:31PM +, jim bell wrote:
>  On Monday, October 21, 2019, 09:15:26 AM PDT, Greg Newby  
> wrote:
>  
>  
>  >Spotted in Fox news online, but it looks like this is also on the AP wire
> https://www.foxnews.com/world/wikileaks-julian-assange-appears-in-court
> 
> >Meanwhile, it appears Chelsea Manning is still in jail in Alexandria, for 
> >refusing to cooperate with the grand jury investigation against Assange: 
> >https://en.wikipedia.org/wiki/Chelsea_Manning
> 
> 
> >The Fox article:
>  
> >WikiLeaks’ Julian Assange fails in bid to delay extradition battle with US
> >Greg Norman
> >By Greg Norman | Fox News
> 
> Jim Bell's comment:
> (But first, note that the term "extraterritoriality" was commonly used in TWO 
> senses in regards to Assange:  First, perhaps the most common usage was the 
> fact that Assange could stay in the Embassy as if it were a different 
> country, not UK.  That is NOT the sense I am most interested in, at least in 
> part because nobody seemed to be substantially challenging that issue.  The 
> second usage, is the concept that a country can have criminal jurisdiction 
> over acts committed in another nation.  Put simply, can the US declare 
> actions by a person outside the US, when there is no clear connection to the 
> US?   I very much doubt that, in this case.  Below, you can see that I looked 
> at some statutes, and did not find any specific reference to 
> 'extraterritoriality' as part of the statutes which were then cited.  This 
> material includes points which included references to US court decisions 
> which declared that unless a statute clearly claims 'extraterritoriality' 
> over acts in other nations, it should be presumed to not apply.
> Did the US add any charges which DID have extraterritoriality references 
> built into the statutes?)
> 
> It's frustrating that these news-item references aren't written to include 
> issues such as extraterritoriality included.  I will now do a time limited 
> Google-search for 'Assange extraterritoriality' over the last months to find 
> useful references.  Nothing.  Perhaps a law journal will have addressed this 
> important matter.  
> Let's not forget what I said on April 29, 2019:


Thanks for resending the analysis below. I spent a little time following up on 
your searches, including looking at whether 'comity' is a pathway to valid 
extratorritality. Like you, I came up with no basis in the USC, including, as 
you cited, in the sections dealing with espionage.

Commentary:

It is not in the interests of most commercial media outlets to highlight the 
legal shortcomings of the US efforts to extradite Assange, any more than it is 
to highlight the attacks on journalistic freedom, war on whistleblowers, etc.

But even non-mainstream coverage seems to ignore the key issue of 
extraterritoriality. It's not a difficult concept to grasp. I don't think this 
is a concept that occurs to most journalists.

Generations of Americans have grown up with the notion that the US is the 
World's police force. The ubiquity of US enforcement - i.e., military might, 
and many other mechanisms - is not questioned. It is celebrated.

My theory concerning the relentless pursuit of Assange is that the ultimate 
court outcomes are not the main object. The main object is ongoing and very 
public punishment, certainly including unending incarceration and intimidation, 
for daring to air the US' dirty laundry.
 - Greg



> ---jim bell 
> To:CypherPunks
> Apr 29 at 5:31 PM
> From:     https://www.justice.gov/opa/press-release/file/1153486/download
> 15(B) to intentionally access a computer, without authorization and exceeding 
> authorized access, to obtain information from a department and agency of the 
> United States in furtherance of a criminal act in violation of the laws of 
> the United States, that is, a violation of Title 18, United States Code, 
> Sections 641, 793(c), and 793(e). (In violation of Title 18, United States 
> Code, Sections 371, 1030(a)(l), 1030(a)(2), 1030(c)(2)(B)(ii).) 
> 
> [end of partial quote]
> There is a principle of American law, upheld by the Supreme Court, that a 
> Federal law is only supposed to be considered of "extraterritorial" 
> application (applies outside the boundaries of United States territory) if 
> the Congress specifically intended that application, and was signified by 
> including such language within the law 
> itself.https://en.wikipedia.org/wiki/Extraterritorial_jurisdiction
> 
> "In Morrison v. National Australia Bank, 2010, the Supreme Court held that in 
> interpreting a statute, the "presumption against extraterritoriality" is 
> absolute unless the text of the statute explicitly says otherwise."
> 
> "https://www.skadden.com/insights/publications/2016/06/us-supreme-court-continues-to-limit-extraterritori
> 
> 
> http://www.virginialawreview.org/volumes/content/rjr-nabisco-and-runaway-canon
> >From that:
> "The 

Re: minion-design.pdf / low bandwidth high latency long term connections

2019-10-21 Thread Zenaan Harkness
On Mon, Oct 21, 2019 at 11:03:40PM -0300, Punk - Stasi 2.0 wrote:
> On Tue, 22 Oct 2019 12:40:25 +1100
> Zenaan Harkness  wrote:
> 
> > covfefe net is the UDP network layer chaff fill, packet switched
> > network.
> 
>   1) can you stop your stupid trump nazi propaganda? there's no 'covfefe 
> net'

Stop getting triggered, snowflake ;)

You can name your version whatever meme suits you. I'll kick it off
for you right now - you can probably improve this tho:

 - Juan "I am not a snowflake" Net


>   2) can it be (virtual) packet switched actually? 'Onion routing'
>   means ones has to set up a 3 hops route using public keys to
>   get 3 symmetric keys etc. That's done once per circuit in
>   tor. Doing it once per packet may be a bit too much?

You're right - we can't set up per packet, but instead set up
(exchange PKs, negotiate a session key), per-node.

Remember, I must be able to control my own routing/hops decisions,
for my chosen routing of packets within any circuit of my choosing.

Once I've established a "symmetric session key" for the nodes I want
to route through and nodes I wish to talk to, I can then send any
number of wheat or chaff UDP packets (which must be indistinguishable
from each other), to any target node that I've negotiated such
session keys with.

Session key's might be long lasting - I need to bone up on perfect
forward secrecy though (PFS); TODO.


> > This is where chaff fill - those "dummy messages" mentioned above -
> > needs to be done, in the network layer.
> 
> 
> > The reason?  Once available, any "message" or "stream" type can layer
> > on top (including TCP) - the nature of a network layer of course.
> > 
> 


covfefe net stream types

2019-10-21 Thread Zenaan Harkness
Attached.

This is just a grab bag needing adding to.


Stream types


Current stream types grab bag:

- "main stream" web browsing

- bittorrent/ ftp/ http file upload and download
- regular movie download
- software updates distribution

- multi-cast
- voice (internet radio)
- video (internet TV)

- text messages/ tweets
- extremely high value but rare short text messages
- boring/ regular text messages

- real time media, e.g. voice and video phone calls
- latency sensitive, as opposed to e.g. radio show 
distribution, which can tolerate
  significant buffering and therefore latency

- routing/ network control/setup/request/response type messages



Re: minion-design.pdf / low bandwidth high latency long term connections

2019-10-21 Thread Zenaan Harkness
On Mon, Oct 21, 2019 at 10:38:55PM -0300, Punk - Stasi 2.0 wrote:
> On Tue, 22 Oct 2019 11:03:59 +1100
> Zenaan Harkness  wrote:
> 
> > On Mon, Oct 21, 2019 at 06:58:57PM -0300, Punk - Stasi 2.0 wrote:
> > > 
> > >   courtesy of tor scum dingledine and matheson and a GCHQ guy, danezis 
> > > who now works for facebook-NSA as well. Wait, facebook, nsa, gchq, 
> > > university of london, etc so many aliases for the same mafia. 
> > > 
> > > 
> > >   anyway :  https://www.mixminion.net/minion-design.pdf
> > 
> > Have not begun to read that yet, 
> 
>   there's a good deal of handwaving bullshit in there 
> 
> "The adversary can delay messages...The efficacy of this attack is poorly 
> understood, but
> it may well be quite damaging" 
> 
>   so they admit that their own fucking system is 'poorly understood' by 
> their own fucking selves and may be 'quite damaged' - well I guess that's at 
> least half honest. 
> 
> 
> "Dummy traffic is an old approach to improving anonymity, but its efficacy is 
> still not well analyzed." 
> 
>   oh really? 
> 
> "We need stronger intuition about how to use dummy messages."
> 
>   ...stronger...intuition...?
> 
> "While many people have speculated about the benefits of dummy traffic, we 
> have not yet seen any  convincing analysis." 
>   
> 
> 
> "Exit attacks - Use the mix network to send hate mail" 
> "ISPs do not tolerate systems that potentially deliver hate mail" 
> 
> 
>   ...'hate mail'? agents of the child murdering pentagon like dingledine 
> are worried about 'hate mail'...?
> 
> 
>   bottom line for me is that the system is (a lot) more complex than I 
> expected - and doesn't seem too reliable either. 
> 
> 
>   The 'acknowledgments' section is kinda 'intersting' too
> 
>   cohen and 'zooko' wilcox get mentioned and..."We further thank all the 
> unnamed cypherpunks out there who have worked on remailer issues for the past 
> decades." 
> 
> 
>   isn't the collaboration between 'cypherpunks' and the pentagon quite 
> touching. 

Indeed.

covfefe net is the UDP network layer chaff fill, packet switched
network.

This is where chaff fill - those "dummy messages" mentioned above -
needs to be done, in the network layer.
The reason?  Once available, any "message" or "stream" type can layer
on top (including TCP) - the nature of a network layer of course.



Re: F2F UDP mesh net prototype proof of concept

2019-10-21 Thread Zenaan Harkness
On Mon, Oct 21, 2019 at 06:28:01PM +1100, Zenaan Harkness wrote:
> On Sun, Oct 20, 2019 at 08:40:09PM -0300, Punk - Stasi 2.0 wrote:
> > 3) virtual-circuit-switched, or packet-switched? Is packet switiching 
> > the most expensive and the most secure option?

More on "Is packet switching the most expensive"?

Packet switching is actually the least expensive (in CPU and bw
overhead), optimal (in bw usage) base layer.

The simplest reason this is so, is that TCP (or any other connection
oriented protocol) as a base layer, incurs various oveheads -
re-transmission delays, latency due to (required for TCP) re-ordering
queues, and other attack and timing issues related to the specific
protocol in use (TCP for Tor), and the point being:

 - these issues/overheads, are incurred for all streams, even packet
   based streams which do NOT need TCP overhead.



Re: Jim Bell's adversity

2019-10-21 Thread Zenaan Harkness
On Tue, Oct 22, 2019 at 10:46:54AM +1100, Zenaan Harkness wrote:
> On Mon, Oct 21, 2019 at 09:14:10PM +, jim bell wrote:
> > First claim:
> > 
> > EVENTS
> > 
> > All previous pages and paragraphs herein are incorporated inclusive.
> > 
> > Claim #1
> > 
> > Beginning at a concealed time unknown to plaintiffs, various government 
> > agents including Defendants Jeff Gordon and Steven Walsh but not limited to 
> > these, with the assistance of unknown-named private citizens, began to act 
> > as individuals and as groups and as a group, in all their respective 
> > capacities, in a collusion and a conspiracy against private citizens 
> > including the plaintiffs in a scheme or plan in order to deny and violate 
> > their Constitutional rights.
> > 
> > These victim private citizens included attendees of a Portland, Oregon 
> > political/social/legal group called the "Multnomah County Common Law 
> > Court", (hereafter MCCLC), which met during the late 1996 through 1997 time 
> > frame, and continued until a date and time unknown to Plaintiff James 
> > Dalton Bell. The group of government agents and private-citizen 
> > co-conspirators is hereafter in some cases referred to as the Infiltrators, 
> > and the group of MCCLC attendees and other victims is referred to as 
> > Citizens.
> > -  end of quote 
> > --
> 
> 
> Stunning. Absolutely stunning stuff! And still to today, "main
> stream" media blackout.
> 
> Well, today is a new day - I encourage you to create a new
> affidavit/deposition, attaching/exhibiting all previous documents,
> get it signed and witnessed, and begin your claim anew.
> 
> There can be no statute of limitations on such government corruption,
> and with the two lame stream parties fighting amongst themselves,
> there's a chance you'll get an actual proper case going this time...


Timing is really important Jim - the folks who did you over in their
pathetic star chamber, may not (all?) be holding seats of power
today.

Then again, other similarly criminal humans may have replaced those
who've moved on.

Notwithstanding, it's a fair bet that the first time you attempted to
file your claim, those who had most to lose by your claim running in
the courts, were still in direct power.

And so although a good experience, that may not have been the wisest
time to bring your claim - as in, today might have much better chance
of success for you.

This is my assumptive hope...


If you do deign to launch your claim at this time, and you have any
questions at all, feel free to send me any question at all either on
or off list - some I can answer, but only generally (Australian
jurisdiction here, and IANAL).

Also, you may happen across someone in the US who is of good spirit
and has some knowledge (even just on legal process) who may be
willing to assist you.



Re: Box for simple Tor node.

2019-10-21 Thread Zenaan Harkness
On Tue, Oct 22, 2019 at 10:20:35AM +1100, Zenaan Harkness wrote:
> On Mon, Oct 21, 2019 at 06:06:15PM +, jim bell wrote:
> >  On Monday, October 21, 2019, 04:00:16 AM PDT, grarpamp 
> >  wrote:

> >  To do that, it would be desireable to  make that
> > chaff look as much as possible like real traffic.
> 
> Ahh, I see the thought. Yes, that thought makes sense on first blush,
> but the problem is, if our encryption is so poor that chaff packets
> are distinguishable from wheat, our chaff system is broken.
> 
> And yes, as above, chaff is to fill the gaps, not to create flows or
> streams that are not otherwise needed - the goal is simply to
> disguise traffic, not to create completely arbitrary fill traffic
> (and if the encryption is not broken, all traffic should look
> completely arbitrary - this is a fundamental 'broken' with Tor's non
> chaff filled TCP flows).
> 
> 
> >  A packet sent
> > through all, or a large number of nodes will have a genuine path. 
> 
> Yes, "chaff paths" is the concept here, now I understand. I believe
> that would be counter productive to network utilisation, and as
> coderman points out, for too little gain.
> 
> I can see how chaff paths could possibly make sense in the Tor
> network.
> 
> Also, but more fundamentally, what we are aiming for with chaff fill,
> at least in a packet switched network, is something better than "chaff
> paths":
> 
>  - we want streams to not be distinguishable
>- this is a known (and fundamental) problem with Tor
> 
>  - chaff packets seeks a functional improvement on this fundamental
>problem with Tor
> 
>  - the reason Tor is so bad, is that entry and exit nodes are
>dominated by GPAs, and the "default set up of Tor Browser" for an
>end user is therefore fundamentally broken
>- this is why I stress the importance of running your own home
>  node (if you're using Tor at all), and more so, running that as
>  an exit node if you want any reasonable plausible deniability
> 
> Covfefe net hopes to overcome this fundamental Tor (as it stands)
> problem.

On second blush, although I might trust an immediate friend (first
hop), I might effectively set up a circuit through friend B, to C,
where I control the chaff, inserting chaff when I'm not using this
"mini circuit" - in this way B does not know that the circuit from A
to C is partly chaff, or purely data, or purely chaff.

Node C might have something to say about that if I don't utilize this
mini route for too long (that would be a waste of B's generous
bandwidth provision).

We could consider or name this mini route ABC, a chaff route in the
sense that A controls the route, inserting chaff as needed.



> > Assuming the spy bugs one node, he will see traffic come in, and
> > leave for another.  Just like an ordinary instance of traffic.  
> 
> "chaff fill" is a misnomer perhaps leading people's' thoughts astray,
> we should say something like:
> 
> Chaff packets:
> 
>  1) Are, to an onlooker or snooper, indistinguishable from wheat
> packets, both in their size, and in their timing of delivery, and
> in all consequential timing for packets returning, or outgoing,
> from the node that receives a chaff packet.
> 
>  2) Are only ever used as padding to fill gaps, so that stream begin,
> and stream end are not distinguishable (to the snoop), and also
> so that stream data, and surrounding chaff packets, are also not
> distinguishable from one another.
> 
>  (A stream is a packet flow such as a request, and the corresponding
>  response for the content of a web page.)
> 
> 
> > An alternative would be a system where each node spontaneously
> > generates chaff.   Spying on a node would see such spontaneous
> > 'traffic' generations.  Maybe it would be clearer that that was
> > chaff?
> 
> Yes, this is the Covfefe model - chaff packets, to fill the gaps, so
> the snoop cannot tell whether any data or streams are being sent, or
> not, at all.
> 
> 
> > But I'm just throwing out ideas.  I assume that the 'chaff' issue
> > has been professionally detailed in some academic papers.
> 
> Possibly - if someone has a link, I'd be happy to read it, but the
> principle seems to jump out and smack us in the face, but I can
> imagine that there could be some useful academic analysis of chaff
> and network theory - if such exists...
> 


minion-design.pdf / low bandwidth high latency long term connections

2019-10-21 Thread Zenaan Harkness
On Mon, Oct 21, 2019 at 06:58:57PM -0300, Punk - Stasi 2.0 wrote:
> 
>   courtesy of tor scum dingledine and matheson and a GCHQ guy, danezis 
> who now works for facebook-NSA as well. Wait, facebook, nsa, gchq, university 
> of london, etc so many aliases for the same mafia. 
> 
> 
>   anyway :  https://www.mixminion.net/minion-design.pdf

Have not begun to read that yet, but one of the stream covfefe will
"recommend as a default for all users" is a really low bandwidth
("bw") and high latency, permanent connection.

1KiB/s is much too fat, and at 80MiB/day (2.4GiB per month) folks
will complain.

But let's consider just 512 bytes every 10 minutes (a single small
UDP packet):

  1 * 6 * 24 * 30 ~= up to 4320 separate "message sends" per month

  each message send can contain up to 512 / 128 = 4 "std tweets"
  therefore 17,280 "std tweets" at 10 minute latency

  at 512 * 6 * 24 * 30 ~= 2.1 MiB bandwidth per month

NOW we're talking some serious chaff for high value random tweets at
any time, with a maximum latency of 10 minutes, for only 2.1MiB of
bandwidth per month!

No doubt some folks can imagine some nice applications for this
"recommended baseload" stream :)

Now, if your mixing, then those 17,280 tweets need to be divided by
the "mixing hop count" to work out actual payload, so let's say your
actual tweets go through 10 hops, we have (up to) 1,728 high value
tweets per node, per month, with possibly up to 10*10=100 minutes
maximum latency (although I'm confident we can eliminate most of that
with nodes cascading off one another in waves, so that maximum
latency should be at most say 30 time units.

If we need lower latency, say 1 minute, we're still only talking
21MiB bandwidth per month - and as a bonus we have 10 fold message
capacity, for 1/10th the latency, a win win (except on the bw front
of course).

To repeat a key point from a previous email: by treating different
types of streams for their own nature, we can not only reason about
network impact and various performance metrics, but we can ensure
that any design caters to include that type of stream.



Re: F2F UDP mesh net prototype proof of concept

2019-10-21 Thread Zenaan Harkness
On Mon, Oct 21, 2019 at 06:58:57PM -0300, Punk - Stasi 2.0 wrote:
> 
>   courtesy of tor scum dingledine and matheson and a GCHQ guy, danezis 
> who now works for facebook-NSA as well. Wait, facebook, nsa, gchq, university 
> of london, etc so many aliases for the same mafia. 
> 
> 
>   anyway :  https://www.mixminion.net/minion-design.pdf

Thank you, I'll have a read.



Re: Jim Bell's adversity

2019-10-21 Thread Zenaan Harkness
On Mon, Oct 21, 2019 at 09:14:10PM +, jim bell wrote:
>  My comments inline:
> On Sunday, October 20, 2019, 12:32:30 AM PDT, Zenaan Harkness 
>  wrote:  
>  
>  On Sun, Oct 20, 2019 at 06:08:02AM +, jim bell wrote:
> >  On Saturday, October 19, 2019, 07:31:14 PM PDT, Zenaan Harkness 
> > wrote:
> >  
> >  
> >> >Hi Jim, I want to know - were you ever offered any "sell out" type of
> >>> option from the prosecutors who put you in jail for all those years?
> > 
> > 
> >> The only 'deal' I was given was an offer for 2 years if I pled guilty, in 
> >> 2001.  I refused, because I knew that the government was corrupt.  What I 
> >> didn't know, at the time, was that this corrupt government (and a previous 
> >> corrupt attorney) engaged in a fake "appeal" case in the Ninth Circuit 
> >> Court of Appeals, case number 99-30210.   Do a Google search for 'jim bell 
> >> "99-30210".     
> >> https://cpunks.wordpress.com/2013/11/19/jim-bell-to-andy-greenberg-your-errors-about-me-in-your-book/
> >>   
> >> This explains how I found out that Andy Greenberg is such a jerk.  Clearly 
> >> he wants to avoid covering what would have been a fascinating story, but 
> >> one that puts the Federal government in a very bad light.  
> >> And here's the lawsuit I wrote, until June 2003.   
> >> https://cryptome.org/jdb/jdb-v-usa-ric.htm   
> > 
> >>   I also didn't know that my then-current corrupt attorney was strenuously 
> >>working on the Federal government's behalf, and would work with the judge 
> >>to prohibit me from putting on MY defense.  The only 'defense' I received 
> >>was the one the Feds wanted to allow me.  Essentially nothing.  
> >> These events are why I will demand a change in the system before I allow 
> >> it to operate:   Whenever a person is charged with a crime, the government 
> >> MUST offer a deal, including a specific time of imprisonment.   If the 
> >> defendant refuses the deal, and if he is convicted, he cannot be sentenced 
> >> to any time greater than the plea deal defined, plus 10% or 6 months.
> >> And, the jury will have to state what the maximum punishment their verdict 
> >> will allow, and if that is lower than the deal, that jury's limitation 
> >> will control.  
> >> The reason is that the current system forces people to plead guilty based 
> >> on the threat of far greater punishment than what the government would 
> >> otherwise be satisfied with.  Take away that threat, and the government 
> >> will have no choice but give realistic plea agreements, knowing that the 
> >> defendant has a free choice to refuse, without what amounts to 
> >> retaliation. 
> >                 Jim Bell
> 
> 
> >Indeed. High corruption.
> 
> 
> >And might we collectively add, damn bro, what a stand you took!
> 
> >That was 18 years or something right? Because you would NOT plead
> guilty?
> A total of about 13 years, from May 1997 through March 12, 2012, spread over 
> a period of about 15 years.
> 
> 
> >THAT, is a serious stand for principle!
> 
> Keep in mind that I should have EASILY been able to destroy the government's 
> case, if I had known about the pre-April-2000 existence of the 9th Circuit 
> appeals case 99-30210, which I believe was re-forged in about April 2000.  
> They had faked an ongoing 'appeals case', ostensibly in my name, and 
> ostensibly I was representing myself ('pro-se'), but in reality the dozens of 
> mailings that should have been coming to me were concealed by government 
> agents.  Court people, Federal Bureau of Prisons people, etc.  Completely 
> unexpectedly, in March 2000, I demanded (in a letter to the 9th Circuit) an 
> 'appeal' for my 'probation violation' case.  That, I much later realized, put 
> these government crooks in a major bind:  Ordinary, I would have to demand an 
> appeal within 10 court-days, excluding weekends and holidays. (So I was WAY 
> too late!!!)  But it turns out that the Government was actually in the 
> process of giving me a forged-and-fake 'appeal', which they had been doing 
> since about June 1999, so they couldn't turn around and deny me an appeal!!
> Eventually, after I was released in April 2000, I was given a (colluding) 
> lawyer, Jonathan Solovy (Seattle) who apparently agreed to conceal the 
> pre-April-2000 faked existence of appeal 99-30210.   Had he asked even one 
> question, like "Jim, it looks like you've been handing this case since June 
> 1999 pro-se.  What was your theory of appeal?"   I would then have said, "I 
> don't know what you are talking about.  I initiated this case in March 2000 
> by a letter I sent to the 9th Circuit, demanding an appeal case."    That 
> simple revelation would have blown apart everything.   As is was, I only 
> discovered the pre-April 2000 existence of case 99-30210 in about June 2003.  
>  So, Solovy was a major crook who enabled the government to convict me.  
> 
> "OK. So. You have a moral and ethical claim (not yet "made out")
> against the US government."
> 
> Larger 

Re: Box for simple Tor node.

2019-10-21 Thread Zenaan Harkness
On Mon, Oct 21, 2019 at 06:06:15PM +, jim bell wrote:
>  On Monday, October 21, 2019, 04:00:16 AM PDT, grarpamp  
> wrote:
>  
>  
>  On 10/13/19, jim bell  wrote:
> >> arbitrarily-long hops (256 hops?  65,536 hops?
> >> An even larger power-of-2 hops?)
> 
> >Hops, alone, don't add much protection beyond
> a good routing of 3 to 9 or so. They're more for fucking
> with traditional jurisdictional log reconstruction trails,
> than dealing with GPA's, GT-1's and GAA'a including Sybil
> that can just follow traffic patterns across the mesh bisecting
> in real time, or more generally... sort and match traffic patterns
> between all sets of two edge hosts.
> 
> Okay, I was just joshing about the "256 hops" part.  While there may not be 
> any hard limit built into the system, I believe I later said that 16 hops 
> would be enough for anybody.(Somehow, didn't I remember about 35 years ago 
> that Bill Gates said something like, ""640 kilobytes of main memory would be 
> enough for anybody?   We see where THAT led!)
> 
> 
> >If applied together with other tech, especially
> regarding nets where you want any kind of
> useable stream (even delivery of storage or msgs
> is in a way a stream), beyond those hops is going to get
> really unperformant, and less security return than thought.
> 
> >You can demo today by recompile Tor and Phantom and tweak I2P,
> to set arbitrary hop levels beyond single digits... are you more
> secure from G* as result... probably not.
> 
> However, one use of "many" hops would be the generation of chaff
> 'traffic'.  The goal, presumably, of adding chaff is to disguise
> the real traffic.

Sort of.

The goal of chaff is to fill the blanks - so when I'm not sending
wheat, in Tor land, it's obvious that I've stopped sending. Chaff
means when I stop sending, my node still send chaff - just purely
random filled packets, so that an observer cannot tell whether I've
begun or ended a connection, or whether I'm sending anything at all.

(Same for the receive loop of course too...)


>  To do that, it would be desireable to  make that
> chaff look as much as possible like real traffic.

Ahh, I see the thought. Yes, that thought makes sense on first blush,
but the problem is, if our encryption is so poor that chaff packets
are distinguishable from wheat, our chaff system is broken.

And yes, as above, chaff is to fill the gaps, not to create flows or
streams that are not otherwise needed - the goal is simply to
disguise traffic, not to create completely arbitrary fill traffic
(and if the encryption is not broken, all traffic should look
completely arbitrary - this is a fundamental 'broken' with Tor's non
chaff filled TCP flows).


>  A packet sent
> through all, or a large number of nodes will have a genuine path. 

Yes, "chaff paths" is the concept here, now I understand. I believe
that would be counter productive to network utilisation, and as
coderman points out, for too little gain.

I can see how chaff paths could possibly make sense in the Tor
network.

Also, but more fundamentally, what we are aiming for with chaff fill,
at least in a packet switched network, is something better than "chaff
paths":

 - we want streams to not be distinguishable
   - this is a known (and fundamental) problem with Tor

 - chaff packets seeks a functional improvement on this fundamental
   problem with Tor

 - the reason Tor is so bad, is that entry and exit nodes are
   dominated by GPAs, and the "default set up of Tor Browser" for an
   end user is therefore fundamentally broken
   - this is why I stress the importance of running your own home
 node (if you're using Tor at all), and more so, running that as
 an exit node if you want any reasonable plausible deniability

Covfefe net hopes to overcome this fundamental Tor (as it stands)
problem.


> Assuming the spy bugs one node, he will see traffic come in, and
> leave for another.  Just like an ordinary instance of traffic.  

"chaff fill" is a misnomer perhaps leading people's' thoughts astray,
we should say something like:

Chaff packets:

 1) Are, to an onlooker or snooper, indistinguishable from wheat
packets, both in their size, and in their timing of delivery, and
in all consequential timing for packets returning, or outgoing,
from the node that receives a chaff packet.

 2) Are only ever used as padding to fill gaps, so that stream begin,
and stream end are not distinguishable (to the snoop), and also
so that stream data, and surrounding chaff packets, are also not
distinguishable from one another.

 (A stream is a packet flow such as a request, and the corresponding
 response for the content of a web page.)


> An alternative would be a system where each node spontaneously
> generates chaff.   Spying on a node would see such spontaneous
> 'traffic' generations.  Maybe it would be clearer that that was
> chaff?

Yes, this is the Covfefe model - chaff packets, to fill the gaps, so
the snoop cannot tell whether any 

Re: Jim Bell's adversity

2019-10-21 Thread jim bell
 My comments inline:
On Sunday, October 20, 2019, 12:32:30 AM PDT, Zenaan Harkness 
 wrote:  
 
 On Sun, Oct 20, 2019 at 06:08:02AM +, jim bell wrote:
>  On Saturday, October 19, 2019, 07:31:14 PM PDT, Zenaan Harkness 
> wrote:
>  
>  
>> >Hi Jim, I want to know - were you ever offered any "sell out" type of
>>> option from the prosecutors who put you in jail for all those years?
> 
> 
>> The only 'deal' I was given was an offer for 2 years if I pled guilty, in 
>> 2001.  I refused, because I knew that the government was corrupt.  What I 
>> didn't know, at the time, was that this corrupt government (and a previous 
>> corrupt attorney) engaged in a fake "appeal" case in the Ninth Circuit Court 
>> of Appeals, case number 99-30210.   Do a Google search for 'jim bell 
>> "99-30210".     
>> https://cpunks.wordpress.com/2013/11/19/jim-bell-to-andy-greenberg-your-errors-about-me-in-your-book/
>>   
>> This explains how I found out that Andy Greenberg is such a jerk.  Clearly 
>> he wants to avoid covering what would have been a fascinating story, but one 
>> that puts the Federal government in a very bad light.  
>> And here's the lawsuit I wrote, until June 2003.   
>> https://cryptome.org/jdb/jdb-v-usa-ric.htm   
> 
>>   I also didn't know that my then-current corrupt attorney was strenuously 
>>working on the Federal government's behalf, and would work with the judge to 
>>prohibit me from putting on MY defense.  The only 'defense' I received was 
>>the one the Feds wanted to allow me.  Essentially nothing.  
>> These events are why I will demand a change in the system before I allow it 
>> to operate:   Whenever a person is charged with a crime, the government MUST 
>> offer a deal, including a specific time of imprisonment.   If the defendant 
>> refuses the deal, and if he is convicted, he cannot be sentenced to any time 
>> greater than the plea deal defined, plus 10% or 6 months.
>> And, the jury will have to state what the maximum punishment their verdict 
>> will allow, and if that is lower than the deal, that jury's limitation will 
>> control.  
>> The reason is that the current system forces people to plead guilty based on 
>> the threat of far greater punishment than what the government would 
>> otherwise be satisfied with.  Take away that threat, and the government will 
>> have no choice but give realistic plea agreements, knowing that the 
>> defendant has a free choice to refuse, without what amounts to retaliation. 
>                 Jim Bell


>Indeed. High corruption.


>And might we collectively add, damn bro, what a stand you took!

>That was 18 years or something right? Because you would NOT plead
guilty?
A total of about 13 years, from May 1997 through March 12, 2012, spread over a 
period of about 15 years.


>THAT, is a serious stand for principle!

Keep in mind that I should have EASILY been able to destroy the government's 
case, if I had known about the pre-April-2000 existence of the 9th Circuit 
appeals case 99-30210, which I believe was re-forged in about April 2000.  They 
had faked an ongoing 'appeals case', ostensibly in my name, and ostensibly I 
was representing myself ('pro-se'), but in reality the dozens of mailings that 
should have been coming to me were concealed by government agents.  Court 
people, Federal Bureau of Prisons people, etc.  Completely unexpectedly, in 
March 2000, I demanded (in a letter to the 9th Circuit) an 'appeal' for my 
'probation violation' case.  That, I much later realized, put these government 
crooks in a major bind:  Ordinary, I would have to demand an appeal within 10 
court-days, excluding weekends and holidays. (So I was WAY too late!!!)  But it 
turns out that the Government was actually in the process of giving me a 
forged-and-fake 'appeal', which they had been doing since about June 1999, so 
they couldn't turn around and deny me an appeal!!
Eventually, after I was released in April 2000, I was given a (colluding) 
lawyer, Jonathan Solovy (Seattle) who apparently agreed to conceal the 
pre-April-2000 faked existence of appeal 99-30210.   Had he asked even one 
question, like "Jim, it looks like you've been handing this case since June 
1999 pro-se.  What was your theory of appeal?"   I would then have said, "I 
don't know what you are talking about.  I initiated this case in March 2000 by 
a letter I sent to the 9th Circuit, demanding an appeal case."    That simple 
revelation would have blown apart everything.   As is was, I only discovered 
the pre-April 2000 existence of case 99-30210 in about June 2003.   So, Solovy 
was a major crook who enabled the government to convict me.  

"OK. So. You have a moral and ethical claim (not yet "made out")
against the US government."

Larger than you can possibly imagine !!!

"You might be familiar with the two documents required to begin any
court case?

 - your story (e.g. affidavit, deposition, etc)

 - your originating process (Originating Motion, Grand Jury Summons,
  

Re: Assange "fails in bid to delay extradition battle with US"

2019-10-21 Thread jim bell
 On Monday, October 21, 2019, 09:15:26 AM PDT, Greg Newby  
wrote:
 
 
 >Spotted in Fox news online, but it looks like this is also on the AP wire
https://www.foxnews.com/world/wikileaks-julian-assange-appears-in-court

>Meanwhile, it appears Chelsea Manning is still in jail in Alexandria, for 
>refusing to cooperate with the grand jury investigation against Assange: 
>https://en.wikipedia.org/wiki/Chelsea_Manning


>The Fox article:
 
>WikiLeaks’ Julian Assange fails in bid to delay extradition battle with US
>Greg Norman
>By Greg Norman | Fox News

Jim Bell's comment:
(But first, note that the term "extraterritoriality" was commonly used in TWO 
senses in regards to Assange:  First, perhaps the most common usage was the 
fact that Assange could stay in the Embassy as if it were a different country, 
not UK.  That is NOT the sense I am most interested in, at least in part 
because nobody seemed to be substantially challenging that issue.  The second 
usage, is the concept that a country can have criminal jurisdiction over acts 
committed in another nation.  Put simply, can the US declare actions by a 
person outside the US, when there is no clear connection to the US?   I very 
much doubt that, in this case.  Below, you can see that I looked at some 
statutes, and did not find any specific reference to 'extraterritoriality' as 
part of the statutes which were then cited.  This material includes points 
which included references to US court decisions which declared that unless a 
statute clearly claims 'extraterritoriality' over acts in other nations, it 
should be presumed to not apply.
Did the US add any charges which DID have extraterritoriality references built 
into the statutes?)

It's frustrating that these news-item references aren't written to include 
issues such as extraterritoriality included.  I will now do a time limited 
Google-search for 'Assange extraterritoriality' over the last months to find 
useful references.  Nothing.  Perhaps a law journal will have addressed this 
important matter.  
Let's not forget what I said on April 29, 2019:

---jim bell 
To:CypherPunks
Apr 29 at 5:31 PM
From:     https://www.justice.gov/opa/press-release/file/1153486/download
15(B) to intentionally access a computer, without authorization and exceeding 
authorized access, to obtain information from a department and agency of the 
United States in furtherance of a criminal act in violation of the laws of the 
United States, that is, a violation of Title 18, United States Code, Sections 
641, 793(c), and 793(e). (In violation of Title 18, United States Code, 
Sections 371, 1030(a)(l), 1030(a)(2), 1030(c)(2)(B)(ii).) 

[end of partial quote]
There is a principle of American law, upheld by the Supreme Court, that a 
Federal law is only supposed to be considered of "extraterritorial" application 
(applies outside the boundaries of United States territory) if the Congress 
specifically intended that application, and was signified by including such 
language within the law 
itself.https://en.wikipedia.org/wiki/Extraterritorial_jurisdiction

"In Morrison v. National Australia Bank, 2010, the Supreme Court held that in 
interpreting a statute, the "presumption against extraterritoriality" is 
absolute unless the text of the statute explicitly says otherwise."

"https://www.skadden.com/insights/publications/2016/06/us-supreme-court-continues-to-limit-extraterritori


http://www.virginialawreview.org/volumes/content/rjr-nabisco-and-runaway-canon
>From that:
"The Supreme Court threw out the lawsuit after invoking the presumption against 
extraterritoriality. That canon of statutory interpretation instructs judges to 
assume “that legislation of Congress, unless a contrary intent appears, is 
meant to apply only within the territorial jurisdiction of the United 
States.”[8] In applying the presumption in RJR Nabisco, however, a majority of 
four Justices[9] rejected multiple indications that Congress intended RICO’s 
private right of action to extend abroad[10] while raising the bar on what 
Congress must do to make its extraterritorial expectations clear.[11]"          
   [end of quote]

Understanding the presumption against extraterritoriality:     
https://scholarship.law.berkeley.edu/cgi/viewcontent.cgi?article=1170=bjil



Very interesting:        
https://www.thefacultylounge.org/2019/04/some-thoughts-on-the-extradition-of-julian-assange.html
>From that:"THE RULE OF DUAL CRIMINALITY: Even if extradition is sought only 
>under the computer intrusion indictment, it will still need to meet the test 
>of dual criminality, found in Article 2, which provides that "An offense shall 
>be an extraditable offense if the conduct on which the offense is based is 
>punishable under the laws in both States." Although computer hacking is no 
>doubt also a crime in the U.K., there is a further wrinkle of territoriality, 
>because Assange's alleged offense was committed outside the 

What

2019-10-21 Thread postdone
happened to Punks username?

Re: Neowin: New OnionShare 2.2 update makes it easy to share files and host sites on the Tor network

2019-10-21 Thread jim bell
 

On Monday, October 21, 2019, 04:10:23 AM PDT, grarpamp  
wrote:  
 
 On 10/17/19, jim bell  wrote:
> >  Okay, I'm not advocating (or opposing) this concept.  It just seemed to me
> >that since we are talking TOR-related features, we should pay attention to
>> what TOR currently claims to provide.
>> I think a few months ago, I mentioned the idea (which I assume somebody else
>> thought of first, probably years ago) of splitting a file into two (or
>> more?) pieces, stored in two (or more?) separate systems), which when XOR'd
>> together, provide the (forbidden, banned, 'reallybad!!!' 'highly-illegal')
>> product file.  Neither file, alone, would be 'forbidden'.
>> The purpose of this is not 'secrecy' of course, but merely deniability.
>> Without the other file(s), the one file _I_ possess will be
>> indistinguishable from a random number.  In fact, it could be a random
>> number, which when XOR'd with a forbidden text, becomes what amounts to
>> another random number, and somebody else's system will hold the other
>> 'random number'  .  Think Vernam cipher, otherwise known as a "one-time
>> pad".  https://en.wikipedia.org/wiki/One-time_pad


>See the related...

>https://en.wikipedia.org/wiki/OFFSystem

Yup.  Sounds like it,    Remember, 'deniability', not 'secrecy'.  
              Jim Bell  

Re: Box for simple Tor node.

2019-10-21 Thread jim bell
 On Monday, October 21, 2019, 04:00:16 AM PDT, grarpamp  
wrote:
 
 
 On 10/13/19, jim bell  wrote:
>> arbitrarily-long hops (256 hops?  65,536 hops?
>> An even larger power-of-2 hops?)

>Hops, alone, don't add much protection beyond
a good routing of 3 to 9 or so. They're more for fucking
with traditional jurisdictional log reconstruction trails,
than dealing with GPA's, GT-1's and GAA'a including Sybil
that can just follow traffic patterns across the mesh bisecting
in real time, or more generally... sort and match traffic patterns
between all sets of two edge hosts.

Okay, I was just joshing about the "256 hops" part.  While there may not be any 
hard limit built into the system, I believe I later said that 16 hops would be 
enough for anybody.(Somehow, didn't I remember about 35 years ago that Bill 
Gates said something like, ""640 kilobytes of main memory would be enough for 
anybody?   We see where THAT led!)


>If applied together with other tech, especially
regarding nets where you want any kind of
useable stream (even delivery of storage or msgs
is in a way a stream), beyond those hops is going to get
really unperformant, and less security return than thought.

>You can demo today by recompile Tor and Phantom and tweak I2P,
to set arbitrary hop levels beyond single digits... are you more
secure from G* as result... probably not.

However, one use of "many" hops would be the generation of chaff 'traffic'.  
The goal, presumably, of adding chaff is to disguise the real traffic.  To do 
that, it would be desireable to  make that chaff look as much as possible like 
real traffic.  A packet sent through all, or a large number of nodes will have 
a genuine path.  Assuming the spy bugs one node, he will see traffic come in, 
and leave for another.  Just like an ordinary instance of traffic.  
An alternative would be a system where each node spontaneously generates chaff. 
  Spying on a node would see such spontaneous 'traffic' generations.  Maybe it 
would be clearer that that was chaff?

But I'm just throwing out ideas.  I assume that the 'chaff' issue has been 
professionally detailed in some academic papers.
             Jim Bell

  

covfefe packet switched network - user routing - hiding hop counts/ routing info, from intermediate nodes and GPAs

2019-10-21 Thread Zenaan Harkness
Example: A routes packet P, via nodes B then C, to node D.

Nodes: A B C D

PK means "public key", each node knows the PK of the other nodes it
communciates with or routes to.

Using PK is shorthand - actual encrypted link usually uses PK crypto
to negotiate a symmetric session key, which might be changed over
time and other complexities, but for the purpose of comprehending
basic implementation steps and understanding issues arising, it's
sufficient to think in simpler terms of just per node public keys.

"Physical" hops in the following example routes:
  AB
  BC
  CD

"Virtual" routes we can consider in examples:
  AB
  ABC
  ABCD
  and also BC, BD, and CD

Each hop, e.g. AB, needs their comms to be encrypted to protect from
eves droppers.

So when A sends P to B, P is encrypted with B's PK.

We can use a notation like B(P) to mean encrypt P with B's PK.

Similarly notation B'(B(P)) to mean decrypt B(P) to get the
raw/unencrypted packet P, from the encrypted version B(P).



1) A sends P only to B
  1.1  A encrypts P to B, i.e. sending B(P) to B
  1.2  B decrypts, doing B'(B(P)) to get P



2) A sends P to C, via B
  A wants B to not read P, only to forward C(P) on to C;
  So, naievely, A sends C(P) to B, with a request to forward C(P)
  onwards to C.
  This is naieve, since two problems arise:

  i) A's request to B is not encrypted, only P is encrypted as
C(P).

  ii) A sends the encrypted packet C(P) first to B (with the
routing instruction), and then B also sends C(P) (without any
additional routing instructions), to C, but the same set of
encrypted bytes has been sent first via AB, and second via BC;
the obvious problem with this is that an onlooker (GPA), can
simply see that "something" (encrypted) has been sent from A to
C, which defeats the purpose of A sending via B at all - there
is no benefit over just sending C(P) directly to C.

This particular sub-problem can be solved in a couple of
immediate ways:

I) B receives C(P) from A, so instead of sending that to C, it
  sends C(C(P)) to C, which C can decrypt, but C needs to know,
  or guess how many layers to unwrap, and this puts extra
  unnecessary load on C - the more hops, the more load on the end
  point of the route, aka not good.

II) A first encrypts P using C's PK, then does similarly for node
  B, so sending B(C(P)) to B, which B decrypts to get C(P), which
  B can on-send to node C with no extra encryption effort!

  This puts the load on A, to encrypt its packets according to
  the total route desired.
  This is logical, as A wants to minimize trust in any downstream
  nodes, so doing the work yourself pays off with certainty and
  less need for trust, greater privacy, and while A is at it, it
  can embed the required routing header for each hop, into the
  appropriately layer, thus encrypting all routing requests.


  A routing header can be denoted with the letter "r", followed if
  needed by the node letter for the target node of the route request,
  e.g. "rC" means "route this packet to node C".

  So for A to 'properly' send P to node C:
2.1  A sends B(rC+C(P)) to node B
2.2  B decrypts, getting rC + C(P)
2.3  B sends C(P) to node C


An obvious information exposure bug in steps 2.1 and 2.3 is that the
unless we somehow compensate for this, the packet B(rC+C(P)), is
larger than the packet C(P) - so our GPA snoop can see that A's
packet sent to B, is larger than B's packet sent to C, and it's not
hard to guess that the difference is gonna be routing information.

The simple solution to different packet sizes is to rely on B to pad
C(P) with some random bytes (which need to be ignored by C), so that
it's the same size as B(rC+C(P)).
But this means once again, relying on B to do the right thing here.
Can we get around this reliance on B?

The problem only gets worse as we go to an example that includes the
next hop, CD...

Separating routing requests into separate packets ("control" packets
or whatever we might call them) would have downsides of extra
buffering and latency to handle dropped packets, packet sequence
problems (we're talking UDP here), lower-level packet routing timing
issues, requests to resend packets that don't arrive after a timeout
etc etc. This is way too complex (reimplementing TCP basically), so
forget that - routing requests must be embedded, attached or
otherwise be very closely associated, with the packets being routed.
Whether routing info is a "tag", a "byte", an IP (v4 or v6) address
or etc doesn't matter - a smaller header doesn't make the problem go
away, AFAICS.



Re: Neowin: New OnionShare 2.2 update makes it easy to share files and host sites on the Tor network

2019-10-21 Thread Zenaan Harkness
On Mon, Oct 21, 2019 at 07:08:58AM -0400, grarpamp wrote:
> See the related...
> 
> https://en.wikipedia.org/wiki/OFFSystem

Nice!

Can imagine OFFSystem, combined with even just 1- or 2-hop onion
routing, where you route amongst 'friends', to be a viable low
overhead (extra bandwidth) and reasonably low latency and therefore
to replace existing torrent clients.

Which reminds me - we must treat different streams according to the
nature of the stream.

  - Phone call demands low latency, reasonably low bandwidth.

  - Bittorrent demands high throughput, is fine with utilizing excess
available bandwidth (like running a coin miner in your idle
process).

  - Text messages/ txt chat, are miniscule bandwidth, can tolerate
unpredictable latency (at least, up to a few seconds if it so
happens), but to achieve a systemic difference, we -must- achieve
wheat in the chaff (and "via trusted friends") "disappearing
act".
- some txt messages can tolerate super high latency, in exchange
  for significantly increased anonymity and etc properties

  - comfort for the main stream end consumer crowd accessing MSM web
sites, demands low privacy, low security, bursty, relatively low
latency streams to view heavy moronic web page "CNN brain
programming"
- like Tor achieves

Within the confines of:
  - packet switched altnet
  - with end-user node making own routing decisions
  - plus applied/configured meat space "friend trust metrics"

I believe we can group streams into the above categories and others
which make sense.

Different security requires different routing - even accessing an MSM
web page could be diverted to my altnet chaff fill node, if more
important stuff is not being up/down-loaded via my node, but only if
my node is not doing something I deem more important.

With a fundamentally flexible packet switched UDP base layer, we can
build appropriate stream "protocols" or "configurations" on top, to
satisfy different users, uses and/ or apps - at least this is the
goal - don't lock in the end users to a single stream modality, so
that we don't keep rewriting the stack over and over and ...



Re: F2F UDP mesh net prototype proof of concept

2019-10-21 Thread Zenaan Harkness
On Sun, Oct 20, 2019 at 08:40:09PM -0300, Punk - Stasi 2.0 wrote:
>   3) ... Packet size? 

Check out MTU:
  https://en.wikipedia.org/wiki/Maximum_transmission_unit

Most ISPs deliver an IP network.

There's a bit of a movement to push ethernet out to the home:
  https://en.wikipedia.org/wiki/Ethernet_in_the_first_mile

MTU is a known/solved problem - basically for streams to be
efficient, you must use packet sizes which correspond to the minimum
packet size in your circuit, otherwise you introduce things like
buffering, packet dis/reassembly and therefore latency and/or link
inefficiencies.

Garlic routing
  https://en.wikipedia.org/wiki/Garlic_routing

is intended as an improvement over onion routing where smaller
messages get combined, to improve anonymity - but the principle can
improve link efficiency too of course, so that's a win win.

In any case, with UDP base layer, or rather, packet switching, folks
can experiment with variations of these concepts much more easily
than with a TCP base layer.



Re: Pipe-Net

2019-10-21 Thread Zenaan Harkness
On Mon, Oct 21, 2019 at 06:27:42AM -0400, grarpamp wrote:
> On 10/17/19, coderman  wrote:
> >> There are many, many analogies you can draw about a network of this
> >> type to an ATM (asynchronous transfer mode) network.
> >
> >
> > i'm old enough to remember writing XTI/STREAMS code for ATM networks. (blast
> > from the past!)
> >
> > ATM CBR SVCs would be a perfect fit for padding schemes, if they existed for
> > consumer use :)
> 
> 
> Telco generated clocked TDM bucket brigades...
> Suggested for years overlays can still emulate them to good use...
> full time chaff padding fill all node-to-node links at negotiated maintained
> rates, displace chaff with wheat as it comes in, reclock and enforce
> the line contracts, keying, etc at the switchports (overlay nodes).
> *VC padding requires lots of management overhead and signaling
> between layers in overlay net to avoid user traffic saturating paths,
> finding bw routes, etc, forget that. Chaff fill at node-to-node
> link layer is easier... just as physical link crypto over fulltime fill
> works in background between switchports (there are proposals
> for ethernet to do this, embedded PHY instead of aftermarket
> anti-SPY gadget). Nodes already know what other nodes the
> upper layer wants to talk to, so they nego fill with them before
> swapping out lower fill for upper wheat on demand. Tor-like circuit
> extends in upper layer still works. User traffic in upper layers rides
> happy till users fill their own circuits they provisioned into the net,
> no different than tor or any other overlay today.

I'm parsing most of that, but not all.

"Negotiating" chaff for wheat is the issue - who to trust, or rather,
how to achieve a functional, --against GPAs/ government adversaries--
model/ improvement over Tor!

If we rely on layers below end-user control, we lose a major element
of security we're trying to achieve here.

We can begin with low bw links for wheat in the chaff text messages -
bittorrent floods at all times would kill backbones in a sense -
that's why unlimited plans ultimately shape.



Re: Box for simple Tor node.

2019-10-21 Thread Zenaan Harkness
On Mon, Oct 21, 2019 at 06:59:00AM -0400, grarpamp wrote:
> On 10/13/19, jim bell  wrote:
> > arbitrarily-long hops (256 hops?  65,536 hops?
> > An even larger power-of-2 hops?)
> 
> Hops, alone, don't add much protection beyond
> a good routing of 3 to 9 or so. They're more for fucking
> with traditional jurisdictional log reconstruction trails,

That's a point.


> than dealing with GPA's, GT-1's and GAA'a including Sybil

  GPA - Global Passive Adversary
  GAA - Global Active Adversary
  GT-1 - ??


> that can just follow traffic patterns across the mesh bisecting
> in real time, or more generally... sort and match traffic patterns
> between all sets of two edge hosts.

"between two edge hosts (aka src and dst)" is the point why more than
say 3 to 9 hops adds little to nought - and if you're onion routing,
not only reducing bw by [header_size] per layer, but consuming
overall network bandwidth according to hop count (again, to little or
no advantage to privacy).


> If applied together with other tech, especially
> regarding nets where you want any kind of
> useable stream

> (even delivery of storage or msgs is in a way a stream),

indeed


> beyond those hops is going to get
> really unperformant, and less security return than thought.

No increase in security in relation to conceivable attacks.

Jurisdictional hops - e.g. through Russia if you're avoiding USGov
etc - sound conceptually useful.


> You can demo today by recompile Tor and Phantom and tweak I2P,
> to set arbitrary hop levels beyond single digits... are you more
> secure from G* as result... probably not.

Link(s) to Phantom please?



Re: Neowin: New OnionShare 2.2 update makes it easy to share files and host sites on the Tor network

2019-10-21 Thread grarpamp
On 10/17/19, jim bell  wrote:
>   Okay, I'm not advocating (or opposing) this concept.  It just seemed to me
> that since we are talking TOR-related features, we should pay attention to
> what TOR currently claims to provide.
> I think a few months ago, I mentioned the idea (which I assume somebody else
> thought of first, probably years ago) of splitting a file into two (or
> more?) pieces, stored in two (or more?) separate systems), which when XOR'd
> together, provide the (forbidden, banned, 'reallybad!!!' 'highly-illegal')
> product file.   Neither file, alone, would be 'forbidden'.
> The purpose of this is not 'secrecy' of course, but merely deniability.
> Without the other file(s), the one file _I_ possess will be
> indistinguishable from a random number.   In fact, it could be a random
> number, which when XOR'd with a forbidden text, becomes what amounts to
> another random number, and somebody else's system will hold the other
> 'random number'  .   Think Vernam cipher, otherwise known as a "one-time
> pad".  https://en.wikipedia.org/wiki/One-time_pad


See the related...

https://en.wikipedia.org/wiki/OFFSystem



> On Thursday, October 17, 2019, 12:36:16 PM PDT, Steven Schear
>  wrote:
>
>  Filesharing is a privacy dead end. Only something like Mojo Nation / Mnet
> publishing, where few or no participants need be aware of or hold file
> contents, offer viable plausible deniability.


Re: Box for simple Tor node.

2019-10-21 Thread grarpamp
On 10/13/19, jim bell  wrote:
> arbitrarily-long hops (256 hops?  65,536 hops?
> An even larger power-of-2 hops?)

Hops, alone, don't add much protection beyond
a good routing of 3 to 9 or so. They're more for fucking
with traditional jurisdictional log reconstruction trails,
than dealing with GPA's, GT-1's and GAA'a including Sybil
that can just follow traffic patterns across the mesh bisecting
in real time, or more generally... sort and match traffic patterns
between all sets of two edge hosts.

If applied together with other tech, especially
regarding nets where you want any kind of
useable stream (even delivery of storage or msgs
is in a way a stream), beyond those hops is going to get
really unperformant, and less security return than thought.

You can demo today by recompile Tor and Phantom and tweak I2P,
to set arbitrary hop levels beyond single digits... are you more
secure from G* as result... probably not.


Re: Pipe-Net

2019-10-21 Thread grarpamp
On 10/17/19, coderman  wrote:
>> There are many, many analogies you can draw about a network of this
>> type to an ATM (asynchronous transfer mode) network.
>
>
> i'm old enough to remember writing XTI/STREAMS code for ATM networks. (blast
> from the past!)
>
> ATM CBR SVCs would be a perfect fit for padding schemes, if they existed for
> consumer use :)


Telco generated clocked TDM bucket brigades...
Suggested for years overlays can still emulate them to good use...
full time chaff padding fill all node-to-node links at negotiated maintained
rates, displace chaff with wheat as it comes in, reclock and enforce
the line contracts, keying, etc at the switchports (overlay nodes).
*VC padding requires lots of management overhead and signaling
between layers in overlay net to avoid user traffic saturating paths,
finding bw routes, etc, forget that. Chaff fill at node-to-node
link layer is easier... just as physical link crypto over fulltime fill
works in background between switchports (there are proposals
for ethernet to do this, embedded PHY instead of aftermarket
anti-SPY gadget). Nodes already know what other nodes the
upper layer wants to talk to, so they nego fill with them before
swapping out lower fill for upper wheat on demand. Tor-like circuit
extends in upper layer still works. User traffic in upper layers rides
happy till users fill their own circuits they provisioned into the net,
no different than tor or any other overlay today.


Re: F2F UDP mesh net prototype proof of concept

2019-10-21 Thread Zenaan Harkness
On Mon, Oct 21, 2019 at 06:28:01PM +1100, Zenaan Harkness wrote:
> There are ~7 billion people on Earth.

Napkin calculations are important when it comes to such numbers as 7
billion.

In terms of routing, if we create a flat "whole earth altnet" address
space, this also implies that each node needs to know, or may need to
know, or may be directly contacted by (sooner or later), every other
node on earth - all 7 billion if we assume on average one node per
human.

So we can say things like:

  - assume that node identification and all node metrics, are stored
in 1KiB of data

and so each node will sooner or later need to store, at an absolute
minimum, 7 * 10^9 * 1024*8 (1KiB of bits) / 8 / 1024^3 ~= 6,675 GiB !

So we must compress that (again, assuming a flat virtual network
for the time being, ignoring natural physical proximities and natural
physical grouping/clumpiness).

Let's say a node_info requires:
 - IPv6 altnet address - 128 bits
 - say 5-bits per metric, and 6 metrics (stat fields) = 30 bits
 - a few booleans (node blocked by me, "friend", "known" etc) - say
   30 bits
 - a display name is desired, say on average compressed to 160 bits

IF the above is sufficient, we have now ~348 bits per node, instead
of 8192 (1 kibibyte = 1024 * 8 = 8192 bits), and our node static
storage requirement (for end user routing) becomes:

  7 * 10^9 * 348 / 8 / 1024^3 = ~ 283 GiB

Now we reduce storage costs by assuming that, from my personal node
perspective, the majority of people in the world (the majority of
nodes) will fit within a bell curve of "average", and can be treated
as such, until and unless they identify themselves as not average
(either preferred, or avoided or blocked, again, by me) - other than
that, most folks will not distinguish themselves to me, they will be
in the set "unknown" and otherwise uninteresting.

  https://en.wikipedia.org/wiki/Normal_distribution

Ultimate bell curve density is an empirical matter, but for now we
can make the averaging assumptions, pluck a random normal deviate out
of thin air statistics to please ourselves and say it'll be a
standard normal distribution and that the only interesting nodes (out
of 7 billion) are gonna be beyond the second sigma - i.e. no more
than about ~5%, as ~95% will be "normal".

(Defining "normal" in the context of "empirical metrics for a node I
 am currently connected to" shall come later.)

So, 5% of 7 billion = ~350 million nodes of interest, multiplied by
~348 bits (for long term per-interesting-node storage) gives:

  7 * 10^9 * 0.05 * 348 / 8 / 1024^3 = ~ 14 GiB

Still too high for a mobile phone, albeit in the realms of
"possible today".

We can obviously get rid of display names (these are bulk
"interesting" but not "known friends" nodes), and assume for now 5
instead of 30 state bits per node:

  7 * 10^9 * 0.05 * 163 / 8 / 1024^3 = ~ 6.6 GiB

And if we change our random normal distribution assumption to 3
standard deviations being "normal" (~0.3% abnormal/metriced), we get:

  7 * 10^9 * 0.003 * 163 / 8 / 1024^3 = ~ 400 MiB

And finally we're in the realm of "possibly reasonable".

Of course, the most interesting sets are "those I choose to regularly
connect to" and "those I completely block", so we can likely get that
400MiB down a bit further still...



Re: F2F UDP mesh net prototype proof of concept

2019-10-21 Thread Zenaan Harkness
On Mon, Oct 21, 2019 at 06:28:01PM +1100, Zenaan Harkness wrote:
> On Sun, Oct 20, 2019 at 08:40:09PM -0300, Punk - Stasi 2.0 wrote:
> > 3) virtual-circuit-switched, or packet-switched? Is packet switiching 
> > the most expensive and the most secure option? Packet size? 

Re circuit switching, Tor does what's called onion routing, using TCP
circuits per onion layer.

This means A connects to B with a (encrypted) TCP connection, and
requests of B a next hop connection to C.

So B decrypts A's first layer incoming connection, which contains
A's encrypted connection to C, and B forwards the packets of that
connection, on to node C.

This layered encryption means B cannot read the contents of A's
connection with C.

It also is supposed to mean that because A's initial connection to B
is effective double encrypted, external onlookers should not be able
to determine that A is connecting to C, only that A is connecting to
B, but in practice to actually deliver this promise would require an
effective chaff fill mechanism, to actually obfuscate when and how
much data A sends to B, etc.



Re: F2F UDP mesh net prototype proof of concept

2019-10-21 Thread Zenaan Harkness
On Sun, Oct 20, 2019 at 08:40:09PM -0300, Punk - Stasi 2.0 wrote:
> On Mon, 21 Oct 2019 09:30:02 +1100
> Zenaan Harkness  wrote:
> > I could have called this RayzerNet, which has a better ring to it,
> 
>   yep, but you don't need to call it anything. We can discuss the basic 
> architecture without you using it as an excuse for your fascist propaganda.

I certainly don't need to call it "anything" - plain English words
are a bitch for search terms ... seriously.

Glad we agree on this one.


>   So, what about defining only the core features of an hypothetical 
> system? 
> 
>   1) peer to peer - no 'directory authorities' 

ack


>   2) are all nodes equal, bandwidth wise, or are there bigger nodes that 
> provide some kind of 'convenient' (and less secure prolly) routing services?

all nodes equal, in the sense you use the word equal

every node is of course a unique snowflake - i.e. a unique set of
ISP, possibly >1 network connection, possibly >=1 dark fibre links
(off public network back links) such as N2N (neighbour to neighbour
ETH or WIFI down your street/ suburb), cpu, ram etc


>   3) virtual-circuit-switched, or packet-switched? Is packet switiching 
> the most expensive and the most secure option? Packet size? 

Now this is a good question.

We must consider the limits, and for sanity compare with existing
global Internet.

There are ~7 billion people on Earth.

The existing physical network (phys net), is clumpy - nations, in
particular island nations including Australia, have backbones running
around them joining cities, and branches out to regional areas, which
ultimately branch out to individual premises (a home, an office).

It's kind of a fractal of a star network, so sort of centralized.

At each aggregating point or "layer", is a router, routing within
that clump, and routing externally to other clumps, to other "star
networks".

With mobile phones (literally pocket supercomputers by the standards
of 3 decades ago), we have more dynamic possibilities, and demands
from users:

 - we -should- make use of physical peer to peer "ad hoc" wireless
   mesh networks, but this has yet to be solved in any production
   environment, except "sort of" by the occasional burning man etc
   set up - which have AIUI so far just been an "off grid" local star
   network replacing the traditional network

 - when known friends are near to each other, our phones should send
   text messages BYPASSING the national/ centralised govnet

Avoiding physical correlation of nodes is probably unwise, due to
such possible benefits. This implies inherent network "clumpiness".


So, back to routing - we can assume, with IPv6 at least, a flat
global node address space - at least, we can do this in a virtual
layer above govnet.

But do we want to?

We want to replace govnet, not assume govnet.

This means we want to in some sense create a practical physical alt
net, which is not govnet, and so our design MUST cater for this from
the get go, even though many links shall in the early days make use
of govnet.



Re: F2F UDP mesh net prototype proof of concept

2019-10-21 Thread Zenaan Harkness
On Sun, Oct 20, 2019 at 08:40:09PM -0300, Punk - Stasi 2.0 wrote:
> On Mon, 21 Oct 2019 09:30:02 +1100
> Zenaan Harkness  wrote:
> 
> > On Sun, Oct 20, 2019 at 07:22:12PM -0300, Punk - Stasi 2.0 wrote:
> > > On Sun, 20 Oct 2019 20:58:37 +1100
> > > Zenaan Harkness  wrote:
> > > 
> > > 
> > > > See https://github.com/zenaan/covfefe if you wish to follow along
> > > > with this exploration.
> > >   
> > >   "covfefe"? - you might want to first explain why you chose that name 
> > > and then change it.
> > > 
> > >   Until you do, it may be safe to dismiss you as a fascist trump agent. 
> > 
> > Doesn't matter if it's Antifa Rayzer who wishes to speak, Trump or
> > Juan who wishes to speak. The right is sacrosanct,
> 
>   right, and that has fuck to do with the name you chose. A free
>   speech platform is unbiased. The name you chose isn't unbiased at
>   all. 

My expressions in this world are at base, events of my exercise of my
right to communicate freely, pursuant to my will.

Rail on muffa :)

BTW, such reaction, ironically, is the very motivation, and further
motivation, for further memeing, which to some is just hilarious and
the source of endless giggles.

But in this case I intend to get on with the work at hand - a meme
name is enough for me and covfefe has more public traction than
Rayzer, and besides, some domain squatter is trying to sell
covfefe.com for ~ USD $8,000 :D


> > and
> > notwithstanding if anyoen of these call to censor (or worse, murder,
> > in the case of Rayzer), they have a right to say what they wish to
> > say.
> > 
> > If we cannot stand for the right of those with disagree with, to say
> > what they wish to say, we don't deserve our own freedom of
> > communication.
> 
>   and what has that got to do with you creating an account at
>   github-MICROSOFT-NSA and naming it after some fascist bullshit
>   'meme'? 

I am inclined to create a git account somewhere else - I created my
github account before it was purchased by MS, if you must know... so,
momentum.

But if you suggest an alternative, I'd be glad to swap actually -
been wanting to get off of github since they sold out.

You are of course free and encouraged to create your own forks,
originations, deployments and etc under whatever meme suits ya - I
was pretty sure I didn't need to say that but hey, feel free to chomp
on another tastily rabbit hole bated meme hook ;)

I'll reply to the tech discussion in a separate email.