Re: Best Windows XP drive encryption program?
You are correct, I screwed up. They were both co-hosted at: http://www.scramdisk.clara.net/ The site was updated and is authorship is very clear. --- David Howe [EMAIL PROTECTED] wrote: As an aside - Dave Barton? Shaun Hollingworth was the author of SD as far as I know. I can't remember exactly, but seem to recall Dave Barton did a delphi wrapper around some of the SD function calls... = end eof
Re: Best Windows XP drive encryption program?
http://www.drivecrypt.com/dcplus.html DriveCrypt Plus does everything you want. I believe it may have descended from ScramDisk (Dave Barton's disk encryption program). Curt --- Lucky Green [EMAIL PROTECTED] wrote: What are folks' recommendations here for drive encryption programs under Windows XP? Must encrypt the entire hard drive, loading before the OS, and support NTFS. I am in particular interested in first-hand experiences. Thanks, --Lucky Green = end eof
Re: When encryption is also authentication...
I concur. The problem is that the most prevalent e-mail program (Outlook) requires no user intervention as a default when signing and/or encrypting a message with S/MIME. One can override the default to High Security (requiring password) only while the X.509 certificate is being installed. I also agree that alternative authorization mechanisms (or combination thereof) are entirely appropriate: smartcards, flashcards, biometric readers, magnetic strips, bar codes, etc. Different schemes will work provided the hardware is available and adequate authentication can be assured. Curt --- David Howe [EMAIL PROTECTED] wrote: Partially agreed - a user doesn't have to know *how* it works, but must have to take a positive step (eg, type in a password, answer yes to a are you really sure you want to do this message, that sort of thing) for it to be binding under most e-sig legislation. However, the law of contract assumes every dotted i and crossed t is read and fully understood to the full measure of the law. Enough people get caught out this way each year (they find the contract they signed isn't what they negotiated but (eg) binds them to a full term of service (say, two years) when they wanted a three month trial... There is a balance to be had here. it should be impossible for a random user to walk up to their powered off pc, power it on, then sign a document. It should be extremely difficult for a random user to walk up to a pc that has been left logged on (but which hasn't been used to sign documents for five minutes or so) and sign a document; it should be easy for the user to sign a large number of documents in rapid succession, without having to type in a complex password every single time. If this involves remembering the password for a specified idle time, or using a smartcard to auth (rather than a manual password or in addition) that the user can remove when he takes a coffee break then fine - but whatever you do must almost certainly use no other hardware than is already fitted to the machine, so a usb dongle could be ok for a home user but a credit-card style smartcard almost certainly won't be (although if anyone knows a decent floppy-adaptor for smartcards, I would love to know about it) = Curt end eof
Key verification schemes...
(in response to a topic mentioned in various threads) I agree that neither CA-verification nor WoT-verification is as useful as Key Fingerprint-verification for secure communication between crypto-aware individuals. After all, CA's can be subverted and WoT is probably best used as a back-up option when direct key verification is not possible. Key Fingerprints can be verified in both PGP and S/MIME, but neither system enforces it. I would prefer for Key Fingerprint-verification to be more central to the system. --- [EMAIL PROTECTED] wrote: ... The hierarchical verisign model is useful when one wishes to verify that something comes from a famous and well known name --that this software really is issued by Flash, that this website really does belong to the Bank of America. In this case, however, only famous and well known names need their keys from verisign. No one else needs one. When one wishes to know one is really communicating with Bob, it is best to use the same channels to verify this is Bob's key, as one used to verify that Bob is the guy one wishes to talk to. The web of trust, and Verisign, merely get in the way. ... --- Eric Murray [EMAIL PROTECTED] wrote: ... And to be honest, exactly zero of the PGP exchanges I have had have actually used the web of trust to really verify a PGP key. I've only done it in testing. In the real world, I either verify out of band (i.e. over the phone) or don't bother if the other party is too clueless to understand what I want to do and getting them to do PGP at all has already exausted my paticnce. ... = end Yahoo! - Official partner of 2002 FIFA World Cup http://fifaworldcup.yahoo.com
When encryption is also authentication...
I agree that under-the-hood encryption is becoming more and more prevalent, and that it generally improves security. Also, the widespread use of encryption technology helps protect cryptorights in general as important to the public good. The fundamental problem with under-the-hood is that the user is not required to have any understanding of the process. Furthermore encryption technology is often also authentication technology. This includes transparently sending S/MIME documents (encrypted and/or signed) as a default without requiring additional user intervention. In many places this results in legally binding documents. Furthermore, anyone with access to a system can send legally binding e-mail documents on the user's behalf. Both legally-binding and authentication technology should not be completely transparent. Even EULA's require user-intervention. Digitally signed messages should require user-intervention. --- Lucky Green [EMAIL PROTECTED] wrote: ... I indeed consider passive encryption methods alone to be typically insufficient for some of my personal security needs and am continuing to utilize encryption that requires me as the user to make that trust decision. But that does not mean that no security benefits are to be had from opportunistic encryption of Internet traffic. ... How does the increased use of strong crypto under-the-hood help Cypherpunks? The answer reminds me of the response another Cypherpunk gave to my posting statistics about the nature of the USENET traffic seen by a major node. I expressed surprise at these rather revealing statistics, musing that there had to be a lesson to be learned from the fact that the bulk of the data is generated in newsgroups that one would not initially consider mainstream. His response was illuminating: Yes, the lesson is: just look at all that cover traffic. --Lucky = end Yahoo! - Official partner of 2002 FIFA World Cup http://fifaworldcup.yahoo.com
Re: When encryption is also authentication...
I agree that the signer does not need to understand the mathematics or underlying technology for digital signatures to be viable. However, what good is an agreement when the parties do not know what the terms of the agreement are? A signature (digital or otherwise) generally indicates that the signer not only made an agreement, but also understood the agreement. A digital signatures must involve a conscious decision by the signer to keep their part of an agreement. I maintain that this requires user intervention to verify that the signer knew that they making an agreement - a click of understanding or pass phrase. Curt --- Mike Rosing [EMAIL PROTECTED] wrote: ... Having it be transparent where the user doesn't need to know anything about how it works does not have to destroy the effectiveness of digital signatures or crypto. When people sign a document they don't know all the ramifications because few bother to read all of any document they sign - most of it won't apply as long as you keep your part of the bargin, so why bother? The same thing should be true of digital signatures. The user shouldn't have to know a thing, other than they've made a promise they better keep or all the bad clauses really do apply, and the proof of their signature will come to haunt them. The way the digital signature works does not matter to them, and it shouldn't need to. If digital crypto, signatures or e-cash are going to get into mass appeal, then their operations will be magic to the majority. And it all has to work, to 1 part in 10^8th or better, without user comprehension. It may well take user intervention to create a signature, but they shouldn't have to know what they are doing. Patience, persistence, truth, Dr. mike = end Yahoo! - Official partner of 2002 FIFA World Cup http://fifaworldcup.yahoo.com
PGP - when you care enough to send the very best!
It is strange that crypto was a lot more popular back when cryptography export was heavily controlled. Many people fought for their crypto rights, but cannot be bothered with encrypted e-mail. It is similar to securing the right to vote and then declining to do so. Lucky indicates that strong crypto has gone under the hood and is now mainstream and ubiquitous. This is not true. There are countless e-mail and instant messages sent as plaintext across networks, through wireless, and over the Internet. Also under-the-hood is a risky place for crypto. It may be patched or upgraded right out of your system. Or perhaps improved to 40-bit for optimum performance. Stand alone cryptography is best. I enjoy sealing my personal letters in an envelope. I am uncomfortable entrusting that process to a third-party, or to the mailman. I am similarly uncomfortable entrusting e-mail encryption to an embedded system and cached authentication systems. Curt --- Lucky Green [EMAIL PROTECTED] wrote: You may be asking yourself: where, oh where, has all the crypto gone? Where are the BlackNet's? Where is the untraceable Ecash? Where is the Cryptanarchy that we've been waiting for? For that matter...where is the crypto? The staunchest Cypherpunk will by now have noticed that PGP/GPG usage even amongst list members, once the bellwether indicator of Cypherpunks crypto adoption success, is in decline. ...(segment elided) Where has the crypto gone? The crypto has gone under the hood, away from the UI, to a place where the crypto will be of most use to the average user. Yes, for crypto to be secure against the active, well resourced, attacker, the crypto must at one point touch the user to permit the user to make a trust decision. But to secure communications from passive and/or less resourced attacker, crypto can be placed under the hood. ...(segment elided) Where has all the crypto gone? It has gone mainstream. Some of you may remember the discussions from years ago how we should try to find a way to make crypto cool and attractive for the average person. ...(segment elided) Crypto has gone as mainstream as can be. While crypto for crypt's sake may not have become cool to everybody, crypto has become a Must Have for your average 14 year-old high school freshman girl. Crypto has become ubiquitous. = end Yahoo! - Official partner of 2002 FIFA World Cup http://fifaworldcup.yahoo.com
Re: Joe Sixpack doesn't run Linux
The lack of e-mail detailing financial transactions is also the reason many businesses chose not to incur the overhead of secure communications. If there were servers on the internet which automatically displayed all plaintext e-mail messages which passed through them as webpages (for the bored, curious, and opportunistic), THEN everyone would see the value of encrypted e-mail. --- [EMAIL PROTECTED] wrote: ... The big lack of demand for encryption by Joe Sixpack is a result of the lack of financial transactions using the internet between Joe sixpack and Bob sixpack. --digsig James A. Donald = end LAUNCH - Your Yahoo! Music Experience http://launch.yahoo.com
RE: why OpenPGP is preferable to S/MIME
Self-signed and CA x.509 certificates cannot be used in Outlook even when they are added to the Trusted Root CA's. Apparently Outlook is able to distinguish between these and CA-issued x.509 certificates. --- Trei, Peter [EMAIL PROTECTED] wrote: I can't speak for mail-only clients, but it's easy (for moderately geekish or carefully instructed people) to add new trusted roots to IE or Netscape. Peter Trei = end LAUNCH - Your Yahoo! Music Experience http://launch.yahoo.com
RE: NAI pulls out the DMCA stick
Perhaps there is a conflict of interest issue as well? NAI Labs is comprised of more than 100 dedicated scientific and academic professionals in four locations in the Unites States, and is entirely funded by government agencies such as: the Department of Defense's (DoD) Defense Advanced Research Projects Agency (DARPA), the National Security Agency (NSA), and the United States Army. From http://www.nai.com/naicommon/aboutnai/aboutnai.asp --- Lucky Green [EMAIL PROTECTED] wrote: ... LOL. Nothing new here. NAI has been dutifully sending cease-and-desist letters to the well-known PGP mirror site for years. The mirror sites just as dutifully have tossed said notices into the trash can upon receipt. This has been going on for over 5 years. ... --Lucky LAUNCH - Your Yahoo! Music Experience http://launch.yahoo.com
Re: NAI pulls out the DMCA stick
Disk encryption can always be augmented by physical security, however communication encryption is dependent on available encryption tools and legal rights. If quality tools are not available, then individuals and businesses will not use them. As long as communication encryption is not widespread, crypto rights will be vulnerable to attack as a special interest issue vs public safety. Of course privacy and other pillars of democracy seem to be special interest issues as well. --- [EMAIL PROTECTED] wrote: -- On 21 May 2002 at 15:03, Meyer Wolfsheim wrote: NAI is now taking steps to remove the remaining copies of PGP from the Internet, not long after announcing that the company will not release its fully completed Mac OS X and Windows XP versions? Not a problem -- we have too many communication encryption programs already. Still a bit weak on disk encryption programs, and of course, we have no transaction software. We may suspect that someone is leaning on the big boys not to provide encryption to the masses, but if so, it is a bit late. --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG X6j99VDvTvGmFGh1D3CQg9dK9SHeYpD48/ZPZgHz 4BH3f/B8/u/XrQuUz6UmSd7Vb0Xyl7FKwywwFfFdN = End. LAUNCH - Your Yahoo! Music Experience http://launch.yahoo.com
Re: Babel (Re: on the state of PGP compatibility)
sMIME will always be hampered by Certificate Authority issues. PGP is large and complex. Version problems are bound to increase as some users will remain divided between PGPdesktop, PGPfreeware, and OpenPGP. Still others will want historic versions or ckt builds. Older versions are limited by key sizes and algorithm selections, while newer versions are prone to version problems. Simple 3rd Party options are important and must always be available.. I am developing a free program and simple specification - http://www.opencrypto.com - that integrates public key crypto into a basic SMTP program. I agree with Tim that it is perhaps best to settle on a single assymetric algorithm (RSA/DH/EC) and a single symmetric algorithm (3DES/AES/2FISH). Perhaps as every 2 to 5 years the algorithms could be replaced or key lengths increased (if necessary), without adding a extensive feature or significant complexity. And James, although the best standard may win, a lack of viable alternatives is unhealthy. --- [EMAIL PROTECTED] wrote: On 31 Mar 2002 at 10:03, Tim May wrote: And so now PGP (or GPG) use is utterly balkanized, utterly useless. [...] Is there a solution? I would think that a keep it simple, stupid strategy is needed: Forget the hooks into popular mailers (Eudora, Outlook, Entourage), forget the OS X versions of GPG, forget the Red Hat, Mandrake, SuSE, Windows XP, etc. versions. If PGP options have grown beyond human comprehension, perhaps everyone could use my software, which is as simple as you can get with a windows interface. http://www.echeque.com/Kong However, I predict that most people will wind up using RFC2440 (OpenPGP) compliant code. An RFC and source code is far from utter balkanization and utter uselessness. In due course, the best standard will win. --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG uR++DP8NV5KuKFCaDraZEp6VTZQcmTqZI5aotgTD 4KXzf6dt2b3+U2MX665Iy8h+EFpHj6Vw0HKjMhvoy __ Do You Yahoo!? Yahoo! Greetings - send holiday greetings for Easter, Passover http://greetings.yahoo.com/