RE: zombied ypherpunks (Re: Email Certification?)

2005-05-02 Thread Ola Bini
At 17:43 2005-04-29, you wrote:
Eh...for email you may have a point, but I'm not 100% convinced. In other 
words, say they want to monitor your email account. Do you really believe 
they are going to tap all major nodes and then filter all the traffic just 
to get your email? ...
Well, they could just tune in on Echelon, which really seems to be reality. 
There is no need for infinite resources to do such a thing.

This is that whole, The TLAs are infinitely powerful so you might as well 
do nothing philosophy. And even though I might be willing to concede that 
they get all that traffic, one hand doesn't always talk to the other. 
there may be smaller branches on fishing trips accessing your email if 
they want. if one were able to monitor the email account for access, 
you'll at least force your TLA phisher into going through proper internal 
channels. He might actually get a no, depending on the cost vs risk.
Here is the fundamental misunderstanding. Your email is no account. There 
are no place where your account is stored. The only thing that exists is an 
endpoint, where you receive your mail. Before the mail reaches that point, 
its's just TCP-packets on the wire. If the listener is on a mail router, 
you could possibly see a trace of it in the message header, but it's 
possible to rewrite that stuff to, so the only way to KNOW if someone reads 
your mail is to analyze the potential readers behaviour based on the 
information in your mail.

/O



Stash Burn?

2005-05-02 Thread Tyler Durden
yes, this reminded me of another brilliant idea.
Why don't some cars have a little tiny furnace for stash destruction?
If you've got an on-board stash and some Alabama hillbilly with a badge 
pulls you over, you just hit the button and have you're little stashed 
incinerated. Who cares if the badge knows you USED TO have something on 
board? Too late now if any trace of evidence is gone.

What's wrong with this idea?
-TD
From: Eugen Leitl [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Secure erasing Info (fwd from [EMAIL PROTECTED])
Date: Sat, 30 Apr 2005 19:49:56 +0200
- Forwarded message from Richard Glaser [EMAIL PROTECTED] -
From: Richard Glaser [EMAIL PROTECTED]
Date: Wed, 27 Apr 2005 12:17:43 -0600
To: [EMAIL PROTECTED]
Subject: Secure erasing Info
Reply-To: Mac OS X enterprise deployment project
[EMAIL PROTECTED]
FYI:
Rendering Drives Completely Unreadable Can be Difficult
---
The National Association for Information Destruction has said it cannot
endorse the use of wiping applications alone for ensuring that data have
been effectively removed from hard drives.  NAID executive director Bob
Johnson said the only way to ensure that the data will be unreadable is
to physically destroy the drives, and even that has to be done in
certain ways to ensure its efficacy.  Most major PC makers offer a drive
destruction service for $20 or $30.  Some hardware engineers say they
understand why the drives have been created in a way that makes it hard
to completely erase the data: customers demanded it because they were
afraid of losing information they had stored on their drives.
http://news.com.com/2102-1029_3-5676995.html?tag=st.util.print
[Editor's Note (Pescatore): Cool, I want a National Association for
Information Destruction tee shirt. How hard could it be to have an
interlock feature - you can really, really clear the drive if you open
the case, hold this button down while you delete?
(Ranum): Peter Guttman, from New Zealand, did a terrific talk in 1997
at USENIX in which he showed electromicrographs of hard disk surfaces
that had been wiped - you could still clearly see the 1s and 0s where
the heads failed to line up perfectly on the track during the
write/erase sequence. He also pointed out that you can tell more
recently written data from less recently written data by the field
strength in the area, which would actually make it much easier to tell
what had been wiped versus what was persistent long-term store. The
paper, minus the cool photos may be found at:
http://www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html
Hard disks, I've found, make satisfying small arms targets.]
Here is Mac OS X software called SPX that uses the Guttman method
of securely deleting data off a hard disk. If you want to donate old
HD's this might be the best method for protecting your data that was
on the HD other than physically destroying the HD's.
http://rixstep.com/4/0/spx/
--
Thanks:
Richard Glaser
University of Utah - Student Computing Labs
[EMAIL PROTECTED]
801-585-8016
_
Subscription Options and Archives
http://listserv.cuny.edu/archives/macenterprise.html
- End forwarded message -
--
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net
[demime 1.01d removed an attachment of type application/pgp-signature which 
had a name of signature.asc]



RE: zombied ypherpunks (Re: Email Certification?)

2005-05-02 Thread Tyler Durden

Well, they could just tune in on Echelon, which really seems to be
reality. There is no need for infinite resources to do such a thing.
Echelon ain't a radio, and not all members of TLAs have access. Indeed, you 
can be damn sure that they are very careful to NOT share a lot of the 
Echelon-culled information. And unless you're involved in some very 
interesting operations, as a mere agitant you aren't going to merit release 
of Echelon info.

HOWEVER, even if they haven't focused the big microscope on you, this 
doesn't mean you don't merit phishing by someone (perhaps) who's in a 
local office and has decided he doesn't like you personally. Thus, 
lower-level  not infinitely secure efforts might be of some use.

Here is the fundamental misunderstanding. Your email is no account. There 
are no place where your account is stored. The only thing that exists is an 
endpoint, where you receive your mail. Before the mail reaches that point, 
its's just TCP-packets on the wire.
OK, what the heck are you talking about? You're telling me that 
hotmail/gmail is stored on my personal COMPUTER? Not even a TLA-originated 
campaign of disinformation would attempt to get that across. Are you like a 
14-year-old boy or something?

The problem with Cypherpunks is that we're way too pre-occupied with 
infinite security scenarios. Of course, such a subject is of vital 
importance, but there are lower levels of threat (and appropriate response) 
that need to be examined. This well they can break almost anything so don't 
even bother unless you're the Okie City B-*-m-b-*-r or somebody, and then 
you'll need a faraday cage and colliding pulse mode-locked dye laser for 
quantum encryption bullshit actually detracts from Cypherpunkly 
notionsit makes the use of encryption a red flag sticking out of a sea 
of unencrypted grey. And then, of course, in the off chance they can't 
actually break the message under that flag, they can merely send a guy out 
with binoculars or whatever.

-TD



RE: zombied ypherpunks (Re: Email Certification?)

2005-05-02 Thread Ola Bini
At 16:10 2005-05-02, you wrote:

Here is the fundamental misunderstanding. Your email is no account. 
There are no place where your account is stored. The only thing that 
exists is an endpoint, where you receive your mail. Before the mail 
reaches that point, its's just TCP-packets on the wire.
OK, what the heck are you talking about? You're telling me that 
hotmail/gmail is stored on my personal COMPUTER? Not even a TLA-originated 
campaign of disinformation would attempt to get that across. Are you like 
a 14-year-old boy or something?
That's completely unwarranted for. The end point for hotmail is Microsoft's 
hotmail-servers, and for gmail the endpoint is Google's servers. Stop being 
so damned rabid.

/O



Re: Stash Burn?

2005-05-02 Thread Damian Gerow
Thus spake Tyler Durden ([EMAIL PROTECTED]) [02/05/05 10:18]:
: yes, this reminded me of another brilliant idea.
: 
: Why don't some cars have a little tiny furnace for stash destruction?
: 
: If you've got an on-board stash and some Alabama hillbilly with a badge 
: pulls you over, you just hit the button and have you're little stashed 
: incinerated. Who cares if the badge knows you USED TO have something on 
: board? Too late now if any trace of evidence is gone.
: 
: What's wrong with this idea?

The government would never let it fly?



RE: Stash Burn?

2005-05-02 Thread R.W. \(Bob\) Erickson
Congratulations, you just turned your vehicle into drug paraphenalia
What? You claim it is Not for drugs? Tell this to the judge.

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On
Behalf Of Tyler Durden
Sent: May 2, 2005 10:14 AM
To: [EMAIL PROTECTED]; [EMAIL PROTECTED]
Subject: Stash Burn?

yes, this reminded me of another brilliant idea.

Why don't some cars have a little tiny furnace for stash destruction?

If you've got an on-board stash and some Alabama hillbilly with a badge 
pulls you over, you just hit the button and have you're little stashed 
incinerated. Who cares if the badge knows you USED TO have something on 
board? Too late now if any trace of evidence is gone.

What's wrong with this idea?

-TD

From: Eugen Leitl [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Secure erasing Info (fwd from [EMAIL PROTECTED])
Date: Sat, 30 Apr 2005 19:49:56 +0200

- Forwarded message from Richard Glaser [EMAIL PROTECTED] -

From: Richard Glaser [EMAIL PROTECTED]
Date: Wed, 27 Apr 2005 12:17:43 -0600
To: [EMAIL PROTECTED]
Subject: Secure erasing Info
Reply-To: Mac OS X enterprise deployment project
[EMAIL PROTECTED]

FYI:

Rendering Drives Completely Unreadable Can be Difficult
---

The National Association for Information Destruction has said it cannot
endorse the use of wiping applications alone for ensuring that data have
been effectively removed from hard drives.  NAID executive director Bob
Johnson said the only way to ensure that the data will be unreadable is
to physically destroy the drives, and even that has to be done in
certain ways to ensure its efficacy.  Most major PC makers offer a drive
destruction service for $20 or $30.  Some hardware engineers say they
understand why the drives have been created in a way that makes it hard
to completely erase the data: customers demanded it because they were
afraid of losing information they had stored on their drives.
http://news.com.com/2102-1029_3-5676995.html?tag=st.util.print
[Editor's Note (Pescatore): Cool, I want a National Association for
Information Destruction tee shirt. How hard could it be to have an
interlock feature - you can really, really clear the drive if you open
the case, hold this button down while you delete?

(Ranum): Peter Guttman, from New Zealand, did a terrific talk in 1997
at USENIX in which he showed electromicrographs of hard disk surfaces
that had been wiped - you could still clearly see the 1s and 0s where
the heads failed to line up perfectly on the track during the
write/erase sequence. He also pointed out that you can tell more
recently written data from less recently written data by the field
strength in the area, which would actually make it much easier to tell
what had been wiped versus what was persistent long-term store. The
paper, minus the cool photos may be found at:
http://www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html
Hard disks, I've found, make satisfying small arms targets.]

Here is Mac OS X software called SPX that uses the Guttman method
of securely deleting data off a hard disk. If you want to donate old
HD's this might be the best method for protecting your data that was
on the HD other than physically destroying the HD's.

http://rixstep.com/4/0/spx/
--

Thanks:

Richard Glaser
University of Utah - Student Computing Labs
[EMAIL PROTECTED]
801-585-8016

_
Subscription Options and Archives
http://listserv.cuny.edu/archives/macenterprise.html

- End forwarded message -
--
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net

[demime 1.01d removed an attachment of type application/pgp-signature which

had a name of signature.asc]




RE: Stash Burn?

2005-05-02 Thread Tyler Durden
Hum. Well, maybe. I guess a dual use argument wouldn't fly.
Wait...that furnace should be able to reheat burgers also.
-TD

From: R.W. (Bob) Erickson [EMAIL PROTECTED]
To: 'Tyler Durden' [EMAIL PROTECTED],[EMAIL PROTECTED]
Subject: RE: Stash Burn?
Date: Mon, 2 May 2005 12:34:15 -0400
Congratulations, you just turned your vehicle into drug paraphenalia
What? You claim it is Not for drugs? Tell this to the judge.
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On
Behalf Of Tyler Durden
Sent: May 2, 2005 10:14 AM
To: [EMAIL PROTECTED]; [EMAIL PROTECTED]
Subject: Stash Burn?
yes, this reminded me of another brilliant idea.
Why don't some cars have a little tiny furnace for stash destruction?
If you've got an on-board stash and some Alabama hillbilly with a badge
pulls you over, you just hit the button and have you're little stashed
incinerated. Who cares if the badge knows you USED TO have something on
board? Too late now if any trace of evidence is gone.
What's wrong with this idea?
-TD
From: Eugen Leitl [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Secure erasing Info (fwd from [EMAIL PROTECTED])
Date: Sat, 30 Apr 2005 19:49:56 +0200

- Forwarded message from Richard Glaser [EMAIL PROTECTED] -

From: Richard Glaser [EMAIL PROTECTED]
Date: Wed, 27 Apr 2005 12:17:43 -0600
To: [EMAIL PROTECTED]
Subject: Secure erasing Info
Reply-To: Mac OS X enterprise deployment project
[EMAIL PROTECTED]

FYI:

Rendering Drives Completely Unreadable Can be Difficult
---

The National Association for Information Destruction has said it cannot
endorse the use of wiping applications alone for ensuring that data have
been effectively removed from hard drives.  NAID executive director Bob
Johnson said the only way to ensure that the data will be unreadable is
to physically destroy the drives, and even that has to be done in
certain ways to ensure its efficacy.  Most major PC makers offer a drive
destruction service for $20 or $30.  Some hardware engineers say they
understand why the drives have been created in a way that makes it hard
to completely erase the data: customers demanded it because they were
afraid of losing information they had stored on their drives.
http://news.com.com/2102-1029_3-5676995.html?tag=st.util.print
[Editor's Note (Pescatore): Cool, I want a National Association for
Information Destruction tee shirt. How hard could it be to have an
interlock feature - you can really, really clear the drive if you open
the case, hold this button down while you delete?

(Ranum): Peter Guttman, from New Zealand, did a terrific talk in 1997
at USENIX in which he showed electromicrographs of hard disk surfaces
that had been wiped - you could still clearly see the 1s and 0s where
the heads failed to line up perfectly on the track during the
write/erase sequence. He also pointed out that you can tell more
recently written data from less recently written data by the field
strength in the area, which would actually make it much easier to tell
what had been wiped versus what was persistent long-term store. The
paper, minus the cool photos may be found at:
http://www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html
Hard disks, I've found, make satisfying small arms targets.]

Here is Mac OS X software called SPX that uses the Guttman method
of securely deleting data off a hard disk. If you want to donate old
HD's this might be the best method for protecting your data that was
on the HD other than physically destroying the HD's.

http://rixstep.com/4/0/spx/
--

Thanks:

Richard Glaser
University of Utah - Student Computing Labs
[EMAIL PROTECTED]
801-585-8016

_
Subscription Options and Archives
http://listserv.cuny.edu/archives/macenterprise.html

- End forwarded message -
--
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net

[demime 1.01d removed an attachment of type application/pgp-signature 
which

had a name of signature.asc]




Card/Debit Update

2005-05-02 Thread PayPal Billing department
Title: Dear valued PayPal







  


  
  
  

  
  

  
  Dear valued 
  PayPal®
  member: 
  
 
  It has come to our attention that your
  
  PayPal® account information needs to be 
  updated as part of our continuing commitment to protect your account and 
  to 
  reduce the instance of fraud on our website. If you could please take 5-10 
  minutes 
  out of your online experience and update your personal records you will 
  not run into 
  any future problems with the online service. 
 
  However, failure to update your records will result in account 
  suspension. 
  Please update your records on or before May
  4, 2005. 
  
  Once you have updated your account records, your
  
  PayPal® session will not be 
  interrupted and will continue as normal. 
  To update your
  
  PayPal® records click on the following link:
  
  
  http://www.paypal.com/cgi-bin/webscr?cmd=_login-run
   
  Thank You. 
  
  PayPal® UPDATE TEAM 
  Accounts Management As outlined in our User Agreement,
  
  PayPal® will 
  periodically send you information about site changes and enhancements. 
  Visit our Privacy Policy and User Agreement if you have any questions.
  
  
  http://www.paypal.com/cgi-bin/webscr?cmd=p/gen/ua/policy_privacy-outside

  










Re: Stash Burn?

2005-05-02 Thread Thomas Shaddack
On Mon, 2 May 2005, Tyler Durden wrote:

 yes, this reminded me of another brilliant idea.
 
 Why don't some cars have a little tiny furnace for stash destruction?
 
 If you've got an on-board stash and some Alabama hillbilly with a badge pulls
 you over, you just hit the button and have you're little stashed incinerated.
 Who cares if the badge knows you USED TO have something on board? Too late now
 if any trace of evidence is gone.
 
 What's wrong with this idea?

Let's focus on the technical realization first. How to annihilate a 
sizable chunk of matter without leaving even minute traces of it? We 
should keep in mind that contemporary forensic detection/analysis 
technologies are pretty damn sensitive.

We also shouldn't forget that burning the substance releases a 
considerable amount of energy, and takes time - at least several seconds. 
Soaking it with liquid oxygen could dramatically reduce the burning time, 
and lead to total oxidation to CO2/H2O/SO2/NO2/P2O5, but it also bears 
certain risk of explosion, and LOX does not belong between user-friendly 
substances as well.

The method also should not provide any hard evidence about when the 
incinerator was last used, in order to make it difficult to prove the 
exact moment of its deployment. This sharply collides with the requirement 
to dump the waste heat, as the unit will be pretty hot for some time after 
initiation, even if it will be directly connected to the car's heatsink.




Re: Stash Burn?

2005-05-02 Thread Eric Tully
There's laws against destroying evidence, interfering with an officer, 
interfering with an investigation, etc.  If they can prove that you had 
it and destroyed it,  now they can charge you with two crimes instead of 
just one.  (I think I heard once that someone was charged with 
destroying evidence for taking batteries out of a device when he was 
arrested hoping to wipe its memory).

- Eric

Tyler Durden wrote:
yes, this reminded me of another brilliant idea.
Why don't some cars have a little tiny furnace for stash destruction?
If you've got an on-board stash and some Alabama hillbilly with a badge 
pulls you over, you just hit the button and have you're little stashed 
incinerated. Who cares if the badge knows you USED TO have something on 
board? Too late now if any trace of evidence is gone.

What's wrong with this idea?
-TD
From: Eugen Leitl [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Secure erasing Info (fwd from [EMAIL PROTECTED])
Date: Sat, 30 Apr 2005 19:49:56 +0200
- Forwarded message from Richard Glaser [EMAIL PROTECTED] -
From: Richard Glaser [EMAIL PROTECTED]
Date: Wed, 27 Apr 2005 12:17:43 -0600
To: [EMAIL PROTECTED]
Subject: Secure erasing Info
Reply-To: Mac OS X enterprise deployment project
[EMAIL PROTECTED]
FYI:
Rendering Drives Completely Unreadable Can be Difficult
---
The National Association for Information Destruction has said it cannot
endorse the use of wiping applications alone for ensuring that data have
been effectively removed from hard drives.  NAID executive director Bob
Johnson said the only way to ensure that the data will be unreadable is
to physically destroy the drives, and even that has to be done in
certain ways to ensure its efficacy.  Most major PC makers offer a drive
destruction service for $20 or $30.  Some hardware engineers say they
understand why the drives have been created in a way that makes it hard
to completely erase the data: customers demanded it because they were
afraid of losing information they had stored on their drives.
http://news.com.com/2102-1029_3-5676995.html?tag=st.util.print
[Editor's Note (Pescatore): Cool, I want a National Association for
Information Destruction tee shirt. How hard could it be to have an
interlock feature - you can really, really clear the drive if you open
the case, hold this button down while you delete?
(Ranum): Peter Guttman, from New Zealand, did a terrific talk in 1997
at USENIX in which he showed electromicrographs of hard disk surfaces
that had been wiped - you could still clearly see the 1s and 0s where
the heads failed to line up perfectly on the track during the
write/erase sequence. He also pointed out that you can tell more
recently written data from less recently written data by the field
strength in the area, which would actually make it much easier to tell
what had been wiped versus what was persistent long-term store. The
paper, minus the cool photos may be found at:
http://www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html
Hard disks, I've found, make satisfying small arms targets.]
Here is Mac OS X software called SPX that uses the Guttman method
of securely deleting data off a hard disk. If you want to donate old
HD's this might be the best method for protecting your data that was
on the HD other than physically destroying the HD's.
http://rixstep.com/4/0/spx/
--
Thanks:
Richard Glaser
University of Utah - Student Computing Labs
[EMAIL PROTECTED]
801-585-8016
_
Subscription Options and Archives
http://listserv.cuny.edu/archives/macenterprise.html
- End forwarded message -
--
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net
[demime 1.01d removed an attachment of type application/pgp-signature 
which had a name of signature.asc]





Re: Email Certification?

2005-05-02 Thread sunder
Suggestion - you can do what advertisers do - encode a web bug image as 
part of some jucy html emails on a web server that you own and check 
your logs.  (not sure if hotmail or whatever allows this, as I don't use 
their cruft.)

Make sure that unlike a web bug you don't set the name so it looks like 
a web bug (i.e. don't call it 1x1.gif) and don't set the image size 
attributes on the IMG SRC tag to say 1x1.  Instead make the file name 
into something that looks like it came from a digital camera and put it 
in a path that matches that cover story.
ie: 
http://127.53.22.7/phightklub_files/2004-xmas-party-pix/JoeShmoeDrunkAndHigh/Kodak/DSC03284345.JPG

No guarantee that someone won't read the email as source and thus not 
grab the image too, but you can make it look like the content of the 
image is important to the message's content and jucy enough to make 
whomever you believe is spying on you want to fetch it.  i.e. Here's a 
picture of the party, you can clearly see he's got a crack pipe in his 
hand and his eyes are dialated.  I'm thinkin' of reporting him to deh 
fedz, what do u think?(I'm assuming that the feds are your threat 
model here, but you can vary this up with whatever threat model you 
think is appropriate.  i.e. if you think your woman is spying on you, 
make it a fake email from your supposed mistress, something she'd want 
to open - i.e. subject I'm gonna tell ur wife about us if you don't do X.)

I'd also make sure that nothing on the webserver itself points to the 
directory where this lives so it can't be picked up by the search 
spiders/bots accidentally, and make sure that you don't allow the 
directory it lives in to have an auto-index.

Then, watch the server logs like a paranoid hawk with a caffeine 
addiction problem and hope they bite, when they do, you know they've 
read the other emails.  You also have to make sure that you don't 
accidentally open these emails yourself, or leave an open web browser 
with your account where someone can randomly snoop.)

But of course, since you are using hotmail and you're about to receive 
this email, if your account is watched, guess what, you can no longer 
use this method.  Oh well.

Tyler Durden wrote:
 Yes, but this almost misses the point.
 Is it possible to detect ('for certain', within previously mentioned 
boundary conditions) that some has read it? This is a different problem 
from merely trying to retain secrecy.
 Remember, my brain is a little punch-drunk from all the Fight Club 
fighting.
 BUT, I believe that the fact that deeper TLAs desire to hide 
themselves from more run-of-the-mill operations might be exploited in an 
interesting way. Or at least force them to commit to officially 
surveiling you, thereby (one hopes) subjecting them to whatever frail 
tatters of the law still exist.
 A better example may be home security systems. If they're going to 
tempest you, I'd bet they'd prefer not to inform your local security 
company. They'd rather just shut down your alarm system and I bet this 
is easy for them.
 BUT, this fact may enable one to detect (with little doubt) such an 
intrusion, and about this I shall say no more...


Re: Stash Burn?

2005-05-02 Thread Tyler Durden
Yes, I think those are the essential questions.
Admittedly it would normally be quite difficult to eliminate any detectable 
trace...I'm assuming that a huge blast of heat should do it. Cooling can be 
done by liquid, for instance. The liquid could be programmed to flush at 
certain random intervals to cover correlation between operation and smokey 
interest. (But this probably eliminates dual-use arguments.)

Assuming it's doable then I'm as yet uncertain about the legal 
ramifications. Say the smokey's are stopping you for something routine and 
you burn your stash right there. Do they have the legal right to even 
mention the disposal operation? And if they do, is there any legal way to 
state what substance was destroyed? Perhaps it was pot (as opposed to 
something harder), or moonshine, or even some designer drug that's not yet 
technically illegal?

-TD
From: Thomas Shaddack shaddack@ns.arachne.cz
To: Tyler Durden [EMAIL PROTECTED]
CC: [EMAIL PROTECTED], [EMAIL PROTECTED]
Subject: Re: Stash Burn?
Date: Mon, 2 May 2005 20:29:13 +0200 (CEST)
On Mon, 2 May 2005, Tyler Durden wrote:
 yes, this reminded me of another brilliant idea.

 Why don't some cars have a little tiny furnace for stash destruction?

 If you've got an on-board stash and some Alabama hillbilly with a badge 
pulls
 you over, you just hit the button and have you're little stashed 
incinerated.
 Who cares if the badge knows you USED TO have something on board? Too 
late now
 if any trace of evidence is gone.

 What's wrong with this idea?

Let's focus on the technical realization first. How to annihilate a
sizable chunk of matter without leaving even minute traces of it? We
should keep in mind that contemporary forensic detection/analysis
technologies are pretty damn sensitive.
We also shouldn't forget that burning the substance releases a
considerable amount of energy, and takes time - at least several seconds.
Soaking it with liquid oxygen could dramatically reduce the burning time,
and lead to total oxidation to CO2/H2O/SO2/NO2/P2O5, but it also bears
certain risk of explosion, and LOX does not belong between user-friendly
substances as well.
The method also should not provide any hard evidence about when the
incinerator was last used, in order to make it difficult to prove the
exact moment of its deployment. This sharply collides with the requirement
to dump the waste heat, as the unit will be pretty hot for some time after
initiation, even if it will be directly connected to the car's heatsink.




Re: Secure erasing Info (fwd from richard@SCL.UTAH.EDU)

2005-05-02 Thread sunder
Yeah, but these days, I'd go with the largest flash drive I could 
afford.  USB2 or otherwise.  I don't believe you can recover data from 
these once you actually overwrite the bits (anyone out there know any 
different?).

They're either 1 or 0, there's no extra ferrite molecules to the left or 
the right of the track to pick up a signal from  ;-)  As always encrypt 
the data you write to the device. 

I wouldn't overwrite flash repeatedly (i.e. the Guttman method of 35 
writes) though, there's a limit on the number of writes, after which it 
goes bad.  I'd overwrite it once with random data.

Eugen Leitl wrote:
- Forwarded message from Richard Glaser [EMAIL PROTECTED] -
From: Richard Glaser [EMAIL PROTECTED]
Date: Wed, 27 Apr 2005 12:17:43 -0600
To: [EMAIL PROTECTED]
Subject: Secure erasing Info
Reply-To: Mac OS X enterprise deployment project
[EMAIL PROTECTED]
FYI:
Rendering Drives Completely Unreadable Can be Difficult
---
 




Re: Stash Burn?

2005-05-02 Thread Justin
On 2005-05-02T10:13:50-0400, Tyler Durden wrote:
 yes, this reminded me of another brilliant idea.
 
 Why don't some cars have a little tiny furnace for stash destruction?
 If you've got an on-board stash and some Alabama hillbilly with a badge 
 pulls you over, you just hit the button and have you're little stashed 
 incinerated. Who cares if the badge knows you USED TO have something on 
 board? Too late now if any trace of evidence is gone.
 
 What's wrong with this idea?

That's rather complicated and unlikely to succeed.  A more practical
solution would be a pod that can be jettisoned.  Dark-colored or camo,
rock-like, and indestructable for later retrieval.  No cop would notice
such a thing fired directly forward after he's pulled in behind you and
lighted you up.

Add a radio beacon for easy location after the cop has departed.



Re: Secure erasing Info (fwd from richard@SCL.UTAH.EDU)

2005-05-02 Thread Jason Holt

On Mon, 2 May 2005, sunder wrote:

 Yeah, but these days, I'd go with the largest flash drive I could 
 afford.  USB2 or otherwise.  I don't believe you can recover data from 
 these once you actually overwrite the bits (anyone out there know any 
 different?).

There are lots of pitfalls in secure erasure, even without considering
physical media attacks.  Your filesystem may not overwrite data on the same
blocks used to write the data originally, for instance.  Plaintext may be left
in the journal and elsewhere.  Even filling up the disk may not do it, as some
filesystems keep blocks in reserve.  I did a demo a few years ago where I
wrote plaintext, overwrote, then dumped the filesystem blocks out and found
parts of the plaintext.

For anybody who hasn't read it, the Gutmann paper is Secure Deletion of Data
from Magnetic and Solid-State Memory, and is highly recommended.  He shows
that even RAM isn't safe against physical media attacks.

-J




RE[3]: Peniss enlargement breakthrough!...tasscarp

2005-05-02 Thread John Betts


Good morning Sir, 
When choosing a peniss enlargment method, there are
many MANY options these days. But very few are worth the money. In fact, most
arescam!

Don't get ripped off- you deserve the real thing!
Peniss Growth Patches are the newest, safest and absolutely
most potent patch you can buy. No other patch even comes close to duplicating
the results found with our Peniss Growth Patch.
Just look at what ourbuyers are saying:
"All of the women I have slept with would thank you if they new what you have done for me! I've seen an incredible increase of about 2 inches overall."
-Clyde Helton
Try our Peniss Growth Patch system and see how it can change your life!





RE[2]: No more peniss enlarge ripoffs!...novosibirsktried ___ 
http://www.swearet.com/d2/


RE: zombied ypherpunks (Re: Email Certification?)

2005-05-02 Thread Ola Bini
At 17:43 2005-04-29, you wrote:
Eh...for email you may have a point, but I'm not 100% convinced. In other 
words, say they want to monitor your email account. Do you really believe 
they are going to tap all major nodes and then filter all the traffic just 
to get your email? ...
Well, they could just tune in on Echelon, which really seems to be reality. 
There is no need for infinite resources to do such a thing.

This is that whole, The TLAs are infinitely powerful so you might as well 
do nothing philosophy. And even though I might be willing to concede that 
they get all that traffic, one hand doesn't always talk to the other. 
there may be smaller branches on fishing trips accessing your email if 
they want. if one were able to monitor the email account for access, 
you'll at least force your TLA phisher into going through proper internal 
channels. He might actually get a no, depending on the cost vs risk.
Here is the fundamental misunderstanding. Your email is no account. There 
are no place where your account is stored. The only thing that exists is an 
endpoint, where you receive your mail. Before the mail reaches that point, 
its's just TCP-packets on the wire. If the listener is on a mail router, 
you could possibly see a trace of it in the message header, but it's 
possible to rewrite that stuff to, so the only way to KNOW if someone reads 
your mail is to analyze the potential readers behaviour based on the 
information in your mail.

/O



RE: Stash Burn?

2005-05-02 Thread R.W. \(Bob\) Erickson
Congratulations, you just turned your vehicle into drug paraphenalia
What? You claim it is Not for drugs? Tell this to the judge.

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On
Behalf Of Tyler Durden
Sent: May 2, 2005 10:14 AM
To: [EMAIL PROTECTED]; [EMAIL PROTECTED]
Subject: Stash Burn?

yes, this reminded me of another brilliant idea.

Why don't some cars have a little tiny furnace for stash destruction?

If you've got an on-board stash and some Alabama hillbilly with a badge 
pulls you over, you just hit the button and have you're little stashed 
incinerated. Who cares if the badge knows you USED TO have something on 
board? Too late now if any trace of evidence is gone.

What's wrong with this idea?

-TD

From: Eugen Leitl [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Secure erasing Info (fwd from [EMAIL PROTECTED])
Date: Sat, 30 Apr 2005 19:49:56 +0200

- Forwarded message from Richard Glaser [EMAIL PROTECTED] -

From: Richard Glaser [EMAIL PROTECTED]
Date: Wed, 27 Apr 2005 12:17:43 -0600
To: [EMAIL PROTECTED]
Subject: Secure erasing Info
Reply-To: Mac OS X enterprise deployment project
[EMAIL PROTECTED]

FYI:

Rendering Drives Completely Unreadable Can be Difficult
---

The National Association for Information Destruction has said it cannot
endorse the use of wiping applications alone for ensuring that data have
been effectively removed from hard drives.  NAID executive director Bob
Johnson said the only way to ensure that the data will be unreadable is
to physically destroy the drives, and even that has to be done in
certain ways to ensure its efficacy.  Most major PC makers offer a drive
destruction service for $20 or $30.  Some hardware engineers say they
understand why the drives have been created in a way that makes it hard
to completely erase the data: customers demanded it because they were
afraid of losing information they had stored on their drives.
http://news.com.com/2102-1029_3-5676995.html?tag=st.util.print
[Editor's Note (Pescatore): Cool, I want a National Association for
Information Destruction tee shirt. How hard could it be to have an
interlock feature - you can really, really clear the drive if you open
the case, hold this button down while you delete?

(Ranum): Peter Guttman, from New Zealand, did a terrific talk in 1997
at USENIX in which he showed electromicrographs of hard disk surfaces
that had been wiped - you could still clearly see the 1s and 0s where
the heads failed to line up perfectly on the track during the
write/erase sequence. He also pointed out that you can tell more
recently written data from less recently written data by the field
strength in the area, which would actually make it much easier to tell
what had been wiped versus what was persistent long-term store. The
paper, minus the cool photos may be found at:
http://www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html
Hard disks, I've found, make satisfying small arms targets.]

Here is Mac OS X software called SPX that uses the Guttman method
of securely deleting data off a hard disk. If you want to donate old
HD's this might be the best method for protecting your data that was
on the HD other than physically destroying the HD's.

http://rixstep.com/4/0/spx/
--

Thanks:

Richard Glaser
University of Utah - Student Computing Labs
[EMAIL PROTECTED]
801-585-8016

_
Subscription Options and Archives
http://listserv.cuny.edu/archives/macenterprise.html

- End forwarded message -
--
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net

[demime 1.01d removed an attachment of type application/pgp-signature which

had a name of signature.asc]




Re: Stash Burn?

2005-05-02 Thread Damian Gerow
Thus spake Tyler Durden ([EMAIL PROTECTED]) [02/05/05 10:18]:
: yes, this reminded me of another brilliant idea.
: 
: Why don't some cars have a little tiny furnace for stash destruction?
: 
: If you've got an on-board stash and some Alabama hillbilly with a badge 
: pulls you over, you just hit the button and have you're little stashed 
: incinerated. Who cares if the badge knows you USED TO have something on 
: board? Too late now if any trace of evidence is gone.
: 
: What's wrong with this idea?

The government would never let it fly?



RE: Stash Burn?

2005-05-02 Thread Tyler Durden
Hum. Well, maybe. I guess a dual use argument wouldn't fly.
Wait...that furnace should be able to reheat burgers also.
-TD

From: R.W. (Bob) Erickson [EMAIL PROTECTED]
To: 'Tyler Durden' [EMAIL PROTECTED],[EMAIL PROTECTED]
Subject: RE: Stash Burn?
Date: Mon, 2 May 2005 12:34:15 -0400
Congratulations, you just turned your vehicle into drug paraphenalia
What? You claim it is Not for drugs? Tell this to the judge.
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On
Behalf Of Tyler Durden
Sent: May 2, 2005 10:14 AM
To: [EMAIL PROTECTED]; [EMAIL PROTECTED]
Subject: Stash Burn?
yes, this reminded me of another brilliant idea.
Why don't some cars have a little tiny furnace for stash destruction?
If you've got an on-board stash and some Alabama hillbilly with a badge
pulls you over, you just hit the button and have you're little stashed
incinerated. Who cares if the badge knows you USED TO have something on
board? Too late now if any trace of evidence is gone.
What's wrong with this idea?
-TD
From: Eugen Leitl [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Secure erasing Info (fwd from [EMAIL PROTECTED])
Date: Sat, 30 Apr 2005 19:49:56 +0200

- Forwarded message from Richard Glaser [EMAIL PROTECTED] -

From: Richard Glaser [EMAIL PROTECTED]
Date: Wed, 27 Apr 2005 12:17:43 -0600
To: [EMAIL PROTECTED]
Subject: Secure erasing Info
Reply-To: Mac OS X enterprise deployment project
[EMAIL PROTECTED]

FYI:

Rendering Drives Completely Unreadable Can be Difficult
---

The National Association for Information Destruction has said it cannot
endorse the use of wiping applications alone for ensuring that data have
been effectively removed from hard drives.  NAID executive director Bob
Johnson said the only way to ensure that the data will be unreadable is
to physically destroy the drives, and even that has to be done in
certain ways to ensure its efficacy.  Most major PC makers offer a drive
destruction service for $20 or $30.  Some hardware engineers say they
understand why the drives have been created in a way that makes it hard
to completely erase the data: customers demanded it because they were
afraid of losing information they had stored on their drives.
http://news.com.com/2102-1029_3-5676995.html?tag=st.util.print
[Editor's Note (Pescatore): Cool, I want a National Association for
Information Destruction tee shirt. How hard could it be to have an
interlock feature - you can really, really clear the drive if you open
the case, hold this button down while you delete?

(Ranum): Peter Guttman, from New Zealand, did a terrific talk in 1997
at USENIX in which he showed electromicrographs of hard disk surfaces
that had been wiped - you could still clearly see the 1s and 0s where
the heads failed to line up perfectly on the track during the
write/erase sequence. He also pointed out that you can tell more
recently written data from less recently written data by the field
strength in the area, which would actually make it much easier to tell
what had been wiped versus what was persistent long-term store. The
paper, minus the cool photos may be found at:
http://www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html
Hard disks, I've found, make satisfying small arms targets.]

Here is Mac OS X software called SPX that uses the Guttman method
of securely deleting data off a hard disk. If you want to donate old
HD's this might be the best method for protecting your data that was
on the HD other than physically destroying the HD's.

http://rixstep.com/4/0/spx/
--

Thanks:

Richard Glaser
University of Utah - Student Computing Labs
[EMAIL PROTECTED]
801-585-8016

_
Subscription Options and Archives
http://listserv.cuny.edu/archives/macenterprise.html

- End forwarded message -
--
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net

[demime 1.01d removed an attachment of type application/pgp-signature 
which

had a name of signature.asc]




Re: Secure erasing Info (fwd from richard@SCL.UTAH.EDU)

2005-05-02 Thread sunder
Yeah, but these days, I'd go with the largest flash drive I could 
afford.  USB2 or otherwise.  I don't believe you can recover data from 
these once you actually overwrite the bits (anyone out there know any 
different?).

They're either 1 or 0, there's no extra ferrite molecules to the left or 
the right of the track to pick up a signal from  ;-)  As always encrypt 
the data you write to the device. 

I wouldn't overwrite flash repeatedly (i.e. the Guttman method of 35 
writes) though, there's a limit on the number of writes, after which it 
goes bad.  I'd overwrite it once with random data.

Eugen Leitl wrote:
- Forwarded message from Richard Glaser [EMAIL PROTECTED] -
From: Richard Glaser [EMAIL PROTECTED]
Date: Wed, 27 Apr 2005 12:17:43 -0600
To: [EMAIL PROTECTED]
Subject: Secure erasing Info
Reply-To: Mac OS X enterprise deployment project
[EMAIL PROTECTED]
FYI:
Rendering Drives Completely Unreadable Can be Difficult
---
 




Re: Stash Burn?

2005-05-02 Thread Eric Tully
There's laws against destroying evidence, interfering with an officer, 
interfering with an investigation, etc.  If they can prove that you had 
it and destroyed it,  now they can charge you with two crimes instead of 
just one.  (I think I heard once that someone was charged with 
destroying evidence for taking batteries out of a device when he was 
arrested hoping to wipe its memory).

- Eric

Tyler Durden wrote:
yes, this reminded me of another brilliant idea.
Why don't some cars have a little tiny furnace for stash destruction?
If you've got an on-board stash and some Alabama hillbilly with a badge 
pulls you over, you just hit the button and have you're little stashed 
incinerated. Who cares if the badge knows you USED TO have something on 
board? Too late now if any trace of evidence is gone.

What's wrong with this idea?
-TD
From: Eugen Leitl [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Secure erasing Info (fwd from [EMAIL PROTECTED])
Date: Sat, 30 Apr 2005 19:49:56 +0200
- Forwarded message from Richard Glaser [EMAIL PROTECTED] -
From: Richard Glaser [EMAIL PROTECTED]
Date: Wed, 27 Apr 2005 12:17:43 -0600
To: [EMAIL PROTECTED]
Subject: Secure erasing Info
Reply-To: Mac OS X enterprise deployment project
[EMAIL PROTECTED]
FYI:
Rendering Drives Completely Unreadable Can be Difficult
---
The National Association for Information Destruction has said it cannot
endorse the use of wiping applications alone for ensuring that data have
been effectively removed from hard drives.  NAID executive director Bob
Johnson said the only way to ensure that the data will be unreadable is
to physically destroy the drives, and even that has to be done in
certain ways to ensure its efficacy.  Most major PC makers offer a drive
destruction service for $20 or $30.  Some hardware engineers say they
understand why the drives have been created in a way that makes it hard
to completely erase the data: customers demanded it because they were
afraid of losing information they had stored on their drives.
http://news.com.com/2102-1029_3-5676995.html?tag=st.util.print
[Editor's Note (Pescatore): Cool, I want a National Association for
Information Destruction tee shirt. How hard could it be to have an
interlock feature - you can really, really clear the drive if you open
the case, hold this button down while you delete?
(Ranum): Peter Guttman, from New Zealand, did a terrific talk in 1997
at USENIX in which he showed electromicrographs of hard disk surfaces
that had been wiped - you could still clearly see the 1s and 0s where
the heads failed to line up perfectly on the track during the
write/erase sequence. He also pointed out that you can tell more
recently written data from less recently written data by the field
strength in the area, which would actually make it much easier to tell
what had been wiped versus what was persistent long-term store. The
paper, minus the cool photos may be found at:
http://www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html
Hard disks, I've found, make satisfying small arms targets.]
Here is Mac OS X software called SPX that uses the Guttman method
of securely deleting data off a hard disk. If you want to donate old
HD's this might be the best method for protecting your data that was
on the HD other than physically destroying the HD's.
http://rixstep.com/4/0/spx/
--
Thanks:
Richard Glaser
University of Utah - Student Computing Labs
[EMAIL PROTECTED]
801-585-8016
_
Subscription Options and Archives
http://listserv.cuny.edu/archives/macenterprise.html
- End forwarded message -
--
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net
[demime 1.01d removed an attachment of type application/pgp-signature 
which had a name of signature.asc]