RFID driver's licenses?

2005-09-11 Thread Nomen Nescio
A friend of mine is expressing concern over the recently passed REAL ID act
which will supposedly require RFID-readable driver's licenses (which it doesn't
say in the text of the bill which just makes a vague reference to
machine-readable technology.)

My questions are:

1. Have any states already implemented RFID-readable IDs/licenses?

2. If not, which states plan to?



Re: SIGINT and COMSEC Discussion Group

2005-01-03 Thread Nomen Nescio
On 2 Jan 2005 at 15:43, John Young wrote:

 A. writes:
 
 I have just launched a new discussion group related to hardware
 discussion for signal analysis and communications security systems:
 
 
 http://groups-beta.google.com/group/sigint/

Why would we use a groups beta at google's when there's a big and
proven yahoogroups that's been around for ages (under various names)?





Re: punkly current events

2004-12-14 Thread Nomen Nescio
-BEGIN TYPE III ANONYMOUS MESSAGE-
Message-type: plaintext

On Fri, 10 Dec 2004, J.A. Terranson wrote:
 Take away complexity, and Mix *could* flourish - in spite of the fedz.

What about mixminion? Setting up a node is about five minutes of work on
a somewhat current Linux system.

-END TYPE III ANONYMOUS MESSAGE-


Cypherpunks archives online

2004-12-11 Thread Nomen Nescio
There were some talk about archives here recently.

I found two here:
http://www.mail-archive.com/index.php?hunt=cypherpunks

And this does indeed seem to be an active archive of the list:
http://www.mail-archive.com/cypherpunks%40minder.net/






loosing mail..

2004-12-08 Thread Nomen Nescio
I seem to have not received a few of the emails in the PROMIS thread.
What is the best approach if one really wants to receive all emails?

I'm currently only on minder and it seems from time to time mail
doesn't get through?

Should one simply subscribe to several nodes (and receive some
redundant traffic)?

I sent test messages (help command) to several of the listed mail
servers a whort while back but only these responded:

 [EMAIL PROTECTED]
 [EMAIL PROTECTED]
 [EMAIL PROTECTED]

I did not receive an answer at all from minder even though I'm
receiving my list mail through minder, so it cannot be all dead.

Is there (still) an online archive somewhere being saved of the
cypherpunks messages?


Comments?





RE: Word Of the Subgenius...

2004-12-07 Thread Nomen Nescio
Peter Trei:

  Where is Tim May when when you need him? :-)
  
 Try scruz.general.

or misc.survivalism






Re: Word Of the Subgenius...

2004-12-07 Thread Nomen Nescio
Steve Furlong:

 Random racist ranting is also required. There are some racist
 assholes currently posting on cpunks, but none have quite the May
 flavor.

LOL

You can say that again. Here are a few examples of what this once
renowned cypherpunk usually writes nowadays.


First five quick quotes from Tim May, more further down.

 No wonder the white person wants the brown person sent up the
 chimneys, along with their Jew facillitators.


 I'm chortling. The burn-off of one hundred million useless eaters
 is going to be glorious.


 Me, I spend my years devoloping tools to fight the Zionist Entity,
 including the popular anonymous remailers and steganography to
 allow freedom fighters to fight Amerika and ZOG without detection, 
 to send the last evil Jew to the ovens.


 I cheered when this nigger was shot, in 1968, a very
 good year.


 We need to find ways to help Al Qaeda nuke Washington, D.C. Killing
 a quarter of a million government employee leeches and three
 quarters of a million negro welfare leeches sounds like a good
 deal.





Q: What do you call the death of a billion people from AIDS?
A: A good start.

Negroes in Africa believe that having sex with women and children
expells the virus from their body. (No, I did not just make this up.
Read the interviews with aid (no pun intended) workers.)

Basically, between AIDS, cannibalism, butchering of other tribes, bad
economic practices, corrupt liberal governments, the Dark Continent
is
burning off its negroes. The non-negro areas, in the extreme south
and
extreme north, are doing OK.

In 30 years the negro regions will have been cleansed, naturally, and
whites can colonize and make the entire continent prosperous.

--Tim May






Bush finally has admittted to mistakes in the planning of the war.
And now the search is on for which Jewish spy for ZOG bore the most
blame.

It's been clear for more than 16 months that ZOG viewed the war with
Iraq with delight, a chance to bloody one of their enemies without
themselves having to go to war. Feeding the DOD false information was
part of this disinformation campaign. And as the war with Iraq was
seen
to be winding down (though it has not, of course, as freedom fighters
in Iraq continue to kill Americans working for the ZOG state), the
Zionist Entity floated stories that _Syria_ was the _REAL_ enemy, or
maybe _Iran_, as the Ultimate Enemy.

We need to cut off funds to the ZOG state and let three million
ZOGster
figure out how to swim the Mediterranean, REAL FAST. The burn-off of
3
million ZOGsters would be glorious to behold.

The implicated ZOG spies should be given fair trials, and, if found
guilty, executed. None of the kid glove treatment that the ZOG spy
Pollard has been receiving.

Then we need to look very seriously at the Jews in our own midst.
Many
are not ZOGster, just Jews who fled oppressive regimes (which many of
their fellow Jews helped create, by the way, as the history of Lenin
and Marx and the early Jewish role in the formation of the Soviet
shows). But the many ZOGsters now feeding information to the ZOG
state
need to be rounded up, given fair trials, and liquidated. Entire
departments in the Pentagon will be decimated when this happens. Good
riddance.

As for the war in Iraq, we need to withdraw immediately, in 30 days.
This was ZOG's war, not ours. Let Ari Fleischer and Dov Zackheim and
Paul Wolfowith and Doug Feight become soldiers in the ZOG Army if
they
wish, and if they are not hung as spies, but get these united states
out of the business of fighting ZOG's wars.

--Tim May





You'll get the Trifecta with John Kerry: a Communist, a Jew (recently
acknowledged), and a Papist.  

Me, I'd rather we find the ZOG-employed traitors in the Pentagon, try
them, hang them, and then pull out of all such foreign adventures
or
entanglements, which our first and most honest President warned us
about.

Let the Shiites and Sunnis fight it out in Iraq, let three million
ZOG
invaders swim for their lives, and let the entire Dark Continent deal
with its own savagery, AIDS, cannibalism, killings of Hutus, killings
of Tutsis, HIV, malaria, child rape, and voodoo in its own way. In 30
years the Dark Continent should be ready for white people, the last
Jew
in the ZOG state will have been nailed to a cross, and the world can
get on with things without U.S. Big Brother interference.


--Tim May





I retired more than 18 years ago, in 1986.

Near the beach, too. 

However, I don't believe active minds actually retire. Rather, they
do what is important to them, whether or not K-Mart or Lockheed or
Apple or Intel is employing them.

Me, I spend my years devoloping tools to fight the Zionist Entity,
including the popular anonymous remailers and steganography to allow
freedom fighters to fight Amerika and ZOG without detection,  to send
the last evil Jew to the ovens.

And category theory, topos theory, Haskell, functional programmng,
and
crypto, so long as no Zionist criminals need to be dealt with.



Re: Michael Riconosciuto, PROMIS

2004-12-06 Thread Nomen Nescio
Bill Stewart shrieb:

 There are several different issues related to PROMIS

Thanks for your comments.

But what about the person Michael Riconosciuto? I did some searches
online and I got the feeling that a lot people see him as an
extremely intelligent person, a one-in-a-million type of person,
being involved and on the front line with such diverse areas as human
intelligence, weapons, electronics, computers, cryptography,
bio-warfare etc.

It's stated online that he has warned US about several terrorist
attacks before they ocurred, including but not limited to the
al-qaeda attacks. Is this somewhat related to him being jailed? Can
he verify that US didn't act on alerts in ways so sensitive that the
government simply cannot afford to let him speak up? Does he know
things relating to US wanting some wars that the public simply cannot
be told?

I think I read somewhere that people from NSA or CIA thought of him
as simply put a genius. Is it likely that he as such a genius is
simply too dangerous for his own good when he decided to speak the
truth and that the government is actively trying to shut him down and
indirectly speed up his death by denying him medical care for his
illness?

Why did he come clean and sign the affidavit? He himself stated
that he though he risked being killed or harmed in various ways if he
went through with it. And indeed, just a week or two afterwards he
got arrested!

Smells like a government retaliation, set-up and cover-up if I ever
saw one!

This is almost to good for even Hollywood!

There are many interesting questions here. Keep in mind that not all
of us were around and active with intelligence/computers/cryptography
10-20 years ago.


John Young: Does Cryptome hold any interesting documents involving
this case?





Michael Riconosciuto, PROMIS

2004-12-05 Thread Nomen Nescio
I read a few old email messages I had and stumbled over some
interesting material relating to NSA, CIA and one Michael
Riconosciuto among other things.

I followed up on the info and did some surfing on the subject and got
quite interested. I also did some searches in my cypherpunk mail
folder and got no hits. Surely this must have been up in the list?
Can someone give me some links please? There were also some talk
about some PROMIS software somewhere and modifications being made to
illegally obtained copies of proprietary software. This software was
then sold by the US gov to be able to spy on Canadian authoritites.
Is this also true?

I found the below text saved here locally, if I'm correctly informed
Mr. Michael Riconosciuto went to jail for this affidavit. Can someone
verify if this really is true. (It sounds bizarre but maybe this can
happen in Amerika?)

I am told that Michael Riconosciuto has been diagnosed with prostate
cancer and many delays in diagnosis and treatment have occurred and
people say it's becaus the US gov wants him dead because he knows too
much.

It's also rumoured that he never received a fair trial and that two
of his lawyers were murdered. Because the US government does not
admit anything about PROMIS he has been relegated as a nut and
serious efforts to isolate him have been going on for more than a
decade.


A friend of mine sent me this info on the case:

 Michael Riconosciuto was asked by Bill Hamilton, the proprietor of
 Promis, to sign an affidavit about his alterations to the
 software. A week before he signed, Michael was threatened. There
 had already been deaths around him and Michael informed his family
 that he was about to be murdered or jailed and that whatever the
 family was going to be told about him, it wasn't true, he was being
 framed for telling the truth. A week after signing the affidavit,
 Michael ended up in jail on fraudulent charges of running a drug
 lab.  


Can someone give me some more info on this?


Thank you 






AFFIDAVIT OF MICHAEL J. RICONOSCIUTO
The INSLAW CASE: AFFIDAVIT OF MICHAEL J. RICONOSCIUTO

UNITED STATES BANKRUPTCY COURT
FOR THE DISTRICT OF COLUMBIA

In Re:
INSLAW, INC., Debtor.
CASE NO. 85-00070
(Chapter 11)

INSLAW, INC., Plaintiff
v.
UNITED STATES OF AMERICA and the UNITED STATES DEPARTMENT OF JUSTICE,
Defendants.
CASE NO. 85-00070
Adversary Proceeding
NO. 86-0069

AFFIDAVIT OF MICHAEL J. RICONOSCIUTO

STATE OF WASHINGTON)   

I, MICHAEL J. RICONOSCIUTO, being duly sworn, do hereby state as
follows:

1. During the early 1980's, I served as the Director of Research for
a joint venture between the Wackenhut Corporation of Coral Gables,
Florida, and the Cabazon Band of Indians in Indio, California. The
joint venture was located on the Cabazon reservation.

2. The Wackenhut-Cabazon joint venture sought to develop and/or
manufacture certain materials that are used in military and national
security operations, including night vision goggles, machine guns,
fuel-air explosives, and biological and chemical warfare weapons.

EXHIBIT 1

3. The Cabazon Band of Indians are a sovereign nation. The sovereign
immunity that is accorded the Cabazons as a consequence of this fact
made it feasible to pursue on the reservation the development and/or
manufacture of materials whose development or manufacture would be
subject to stringent controls off the reservation. As a minority
group, the Cabazon Indians also provided the Wackenhut Corporation
with an enhanced ability to obtain federal contracts through the 8A
Set Aside Program, and in connection with Government-owned
contractor-operated (GOCO) facilities.

4. The Wackenhut-Cabazon joint venture was intended to support the
needs of a number of foreign governments and forces, including forces
and governments in Central America and the Middle East. The Contras
in Nicaragua represented one of the most important priorities for the
joint venture.

5. The Wackenhut-Cabazon joint venture maintained close liaison with
certain elements of the United States Government, including
representatives of intelligence, military and law enforcement
agencies.

6. Among the frequent visitors to the Wackenhut-Cabazon joint venture
were Peter Videnieks of the U.S. Department of Justice in Washington,
D.C., and a close associate of Videnieks by the name of Earl W.
Brian. Brian is a private businessman who lives in Maryland and who
has maintained close business ties with the U.S. intelligence
community for many years.

7. In connection with my work for Wackenhut, I engaged in some
software development and modification work in 1983 and 1984 on the
proprietary PROMIS computer software product. The copy of PROMIS on
which I worked came from the Department of Justice. Earl W. Brian
made it available to me through Wackenhut after acquiring it from
Peter Videnieks, who was then a Department of Justice contracting
official with responsibility for 

Jewish wholy words..

2004-12-01 Thread Nomen Nescio
Is it true that the jews have these texts in their scriptures?


#1. Sanhedrin 59a:
Murdering Goyim (Gentiles) is like killing a wild animal.

#2. Aboda Sarah 37a:
A Gentile girl who is three years old can be violated.

#3. Yebamoth 11b:
Sexual intercourse with a little girl is permitted if she is three
years of age.

#4. Abodah Zara 26b:
Even the best of the Gentiles should be killed.

#5. Yebamoth 98a:
All gentile children are animals.

#6. Schulchan Aruch, Johre Deah, 122:
A Jew is forbidden to drink from a glass of wine which a Gentile has
touched, because the touch has made the wine unclean.

#7. Baba Necia 114, 6:
The Jews are human beings, but the nations of the world are not
human beings but beasts.






Swedish military feared linked to Estonia ferry disaster

2004-12-01 Thread Nomen Nescio
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

For those interested in intelligence, munitions smuggling by
authorities and so on - a few words concerning military smuggling of
munitions on the Estonia, feared to have played a part in the sinking
and killings of 852 people on Sept 28, 1994, when the ferry M/S
Estonia sinked during a journey from Estonia to Sweden. It has been
rumoured for a long time that there were some kind of smuggling of
sensitive material taking place on Estonia and that Russian
authorities did not like this, needless to say. The very stressed and
hasty investigation performed by the involved nations also raised
suspicions amongst a lot of people. On top of all this the Swedish
social democratic government did all they could to hinder future
investigations of the wreckage by trying to cover it with stones and
concrete.

First some other related info.

The reader should know that the Swedish social democratic party is
notorious for acting in undemocratic and deceitful manners against
the Swedish people. Two of the most infamous affairs being the IB
affair and the Catalina affair.

In the IB affair it was shown that the social democratic party had
founded a secret and unlawful military intelligence bureau as the
party's own private spy organization to spy on other politcal
adversaries, a Swedish version of Watergate if you will, but it went
far beyond that. Hundreds of thousands of people were targeted during
a number of years. Even Olof Palme himself knew about break-ins that
the intelligence officers performed in other countries embassies in
Stockholm, one of them was Egypt's embassy. One major characteristic
is that the Swedish way of doing things means sweeping things under
the carpet and not letting the public know the truths, this is shown
in every affair known in resent years, including the Estonia
disaster. In all of these affairs it's the social democrats that has
been the most responsible party and the party almost in constant
power in Sweden historically speaking.

The magazine breaking the news in 1973 today has a web site about the
affair, http://www.fib.se/IB/

In the Catalina affair it was very recently shown actually, after the
planes was discovered east of the island Gotland in the Baltic Sea,
that they were both indeed gunned down, as had been suspected for
decades. On June 13 1952 the DC3 plane Hugin disappeared and the only
thing found was a trashed rescue raft. Three days later the rescure
plane of type Catalina was also gunned down and forced to emergency
landing. It's today also known however that the Swedish (social
democratic) governments have all been maliciously and intentionally
lying all along about the Hugin's purpose to both the Swedish people
as well as the families.

Hugin was in fact gathering intelligence very close (some say on the
wrong side even) of the Russian border and was relaying all this
signal intelligence directly to the Americans. USA was amongst other
things interested in Russias capacity to fight the B-47. This was
well known for the Russians and this was the direct cause of the
attacks in 1952. It is believed that the Swedish FRA, standing for
Försvarets RadioAnstalt, translating to The Defence's Radio
Institution, which is Swedens NSA, signed secret treaties with the
US some three years prior to the assult on these planes. The FRA had
5 employees on the Hugin when it was gunned down. It wasn't until
1991 that the families knew what happened, that was when the Russians
admitted a Mig-15 gunned them down.

When the recon plane was found in June 2004 it was situated far east
of the earlier officially declared crash site which further fules the
speculation that Hugin was indeed flying where it shouldn't have
been, conducting its sigint operations and that the Swedish
governments knew this all along. The Hugin was found June 10, 2003.


I'm not sure how much of these affairs is known outside Sweden, but
it's interesting read that's for sure and I just may get back to
these things and others like them later on.


Back to other things now.

This was published today in Sweden, along with a tv show of one hour:

INRIKES Publicerad 30 november
 
   Krigsmateriel fraktades på Estonia   
 
 
   Estonia hade veckorna före förlisning- 
   en vid två tillfällen krigsmateriel
   från Baltikum i lasten. Enligt kväll-  
   ens Uppdrag granskning i SVT rörde 
   det sig om rysk elektronik som svenska 
   försvaret tog in för att studera.  
 
   Lars Borgnäs som gjort programmet  
   säger att avslöjandet belyser hur  
   svenska myndigheter hanterat kata- 
   strofen. -Man har t.ex. inte undersökt 
   bildäck, säger han till SVT Text.  
 
   Den pensionerade tullintendenten   
   Lennart Henriksson uppger att han fått 
   order om att släppa igenom bilarna på  
   begäran av försvarsmakten. 
Läs mer på svt.se/nyheter  



Which translates into something like this:

DOMESTIC Published 

Re: The Values-Vote Myth

2004-11-08 Thread Nomen Nescio
J.A. Terranson schrieb:

 This election *proves* that at least half the electorate, about 60
 million people, are just Useless Eaters, who should be eagerly
 awaiting their Trip Up The Chimneys.

Wow! A Tim May copycat!
(Both the 'useless eaters' and the 'chimney'!)






Re: Why Americans Hate Democrats-A Dialogue

2004-11-06 Thread Nomen Nescio
John Young:

 Tyler,
 
 Commie is the term used here like is nazi used elsewhere
 as the most fearsome if thoughtless epithet. Nazi here is a 
 term of endearment, and also admirable role model by some.
 
 Calling someone both is not allowed, check the FAQ under impurity.
 
 Tim May, praise Allah, always claimed cypherpunks was a fair and
 balanced forum thanks to the one person of the left here who 
 was fingered affectionately like a house rodent, an easy target for
 errant shooters.
 
 CJ is not to be recalled, ever.
 
 Jim Bell still sends very important legal papers, the latest
 yesterday, which describe the way things should be understood. But
 who can believe an MIT chemist political prisoner.
 
 CJ and Jim jailed by the Democratic freedom-fighters.


CJ is CJ Parker, who posted a few emails to this list back in
early 2003? I guess I haven't been around long enough to know all
famous cpunks who have been posting to the list. Maybe someone could
tell in short who those were, I guess there are one or two on the
list who weren't around and would appreciate the stories.

I think I remember having read about Bell, something about him having
threatened FBI agents or something?

Does Jim Bell post emails somewhere today?





Re: This Memorable Day

2004-11-04 Thread Nomen Nescio
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

R.A. Hettinga:

 Are you high, junior? Or is it just your politics that sound so...
 sophomoric?

 Communism, Fuck Yeah!!! States are People Too



Talk sense to a fool and he calls you foolish.
(Euripides)


You too. Sad it is.

Howcome the Americans became so egocentrical and cynical that
anyone who dares to speak up and support compassion for his fellow
man automatically is a communist?

It's a sincere question, no doubt in my mind that we won't get a
sincere answer though.

Reading your email actually reminds me of those of Tim May, he
also seemed to be full of bigotry and hatred and deeply disliked
anyone who were unfortunate enough to be poor.


 Our culture -- yours, too, bunky, since I bet you don't shit into a
 hole in the floor and pray 5 times a day for, as Hanson
 appropriately  

No I don't shit into a hole, but I can still try to be unbiased
and extend a though or two to other people who are not so fortunate
as we are to be born in the rich part of the world.


 Ah. That's right. I'm not nuanced enough. It's too *complicated*
 for anyone who didn't take your sophomore (cryptomarxist) History
 Studies class, or whatever. Please.

To me it's enough to at least try to understand and try live by
the spirit of the Bible.

It's also quite ironical that all those right wing voters
actually read communist propaganda in church, since that is the
logical conclusion of your arguments made here.


 There we go. Wisdom from a thug. How about this thug, instead, kid,
 quoted just about as much out of context as you have yours:
 
 When the hares made speeches in the assembly and demanded that all
 should have equality, the lions replied, Where are your claws and
 teeth? -- attributed to Antisthenes in Aristotle, 'Politics',
 3.7.2  
 
 Oh. That's right. One shouldn't read Aristotle. He was a White Male
 Oppressor...

You like quotes, ok here I have a small collection for you, maybe
one or two of them qualifies as white oppressors too, I don't know.


Insanity in individuals is something rare - but in groups,
parties, nations and epochs, it is the rule.
(Nietzsche)

An honest man can feel no pleasure in the 
exercise of power over his fellow citizens.
(Thomas Jefferson)

I am a firm believer in the people. If given the truth, they can be
depended upon to meet any national crises. The great point is to
bring them the real facts.  
(Abraham Lincoln)

It is forbidden to kill; therefore all murderers are punished unless
they kill in large numbers and to the sound of trumpets.  
(Voltaire)

What difference does it make to the dead, the orphans and the
homeless, whether the mad destruction is wrought under the name of
totalitarianism or the holy name of liberty or democracy?  
(Mahatma Gandhi)

Injustice anywhere is a threat to justice everywhere.
(Martin Luther King)



 Sheesh. When will September ever end?

In my calendar it's November already, I don't know about yours.


Johnny Doelittle


-BEGIN PGP SIGNATURE-
Version: Tom Ridge Special v1.01

iQA/AwUBQYoOvDVaKWz2Ji/mEQLUvgCfZJiR4Nmtvpe00RHmsfJujf1opfYAn289
PIgwc3xyE+/RolLAFBqAc6Ks
=cwYX
-END PGP SIGNATURE-




Re: This Memorable Day

2004-11-04 Thread Nomen Nescio
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

James A. Donald:

 You are quite right, it is unjust that people like Bin Laden are so
 immensely rich with oil wealth.  To remedy this problem, Bush
 should confiscate the Middle Eastern oil reserves.
 
 You are using stale old communist rhetoric - but today's terrorists
 no longer not even pretend to fight on behalf of the poor and
 oppressed.  

This was quite lame and doesn't really deserve a response. 

To label any argument that points out the obvious circumstance
that injustice feeds hatred as communist propaganda, is really only
ridiculous, even if it's also dangerously incompetent and as such no
real laughing matter.

Why do you mention Bin Laden anyway? There are thousands of
bigger and smaller groups around the world (they exists in every
country more or less) that we'd label as terrorists in the western
part of the world. You think every one of these hundreds of thousands
or perhaps millions of recruits and followers are millionaires?
Fantastically lame comment to a real and important issue.

Should we take you seriously when you write these childish rants?

I don't know what to fear the most, the dangerous ignorance of
those of your kind or what dictatorial rulers may accomplish using
your ignorant kind as followers who do not question the truths from
the authorities. Hitler did it in the 30's election where some 37%
voted for the nazis, in a democratic multi-party election I might
add. Some of the ingrediences present then in Hitler's rhetoric are
also present today in Bush's rhetoric, even though I don't mean to
make the comparison .

We just cannot afford to be this naive.

I can't help thinking about the fact that we usually portray
Americans as a religious and church going people. Perhaps some 25%
attend church on a somewhat regular basis. To make matters worse
those people seem to vote for Bush(?). One can't help wonder if
they're literate and if they actually read the bible and it's message
of love, understanding, forgiveness and compassion for their fellow
man.

May god bless the world, we may need it.


Johnny Doelittle


Men willingly believe what they wish.
(Julius Caesar)

There is nothing worse than aggressive stupidity.
(von Goethe)


-BEGIN PGP SIGNATURE-
Version: Tom Ridge Special v1.01

iQA/AwUBQYoO4jVaKWz2Ji/mEQKzWACfTEUN6ENT9/kbzMEOQVuvM4txtpIAnRI2
pU5RbBMeBggUCWf2ZW4rBQYG
=EiIW
-END PGP SIGNATURE-




Re: This Memorable Day

2004-11-03 Thread Nomen Nescio
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

R.A. Hettinga:

 You're gonna love this one: You can't have terrorism without
 state sponsors.

Nonsense! Are you in junior high?


 We take out (by whatever means at hand...) state sponsors of
 terrorism, and, hey, presto, no terrorism. Iraq. Syria. Iran.
 Libya. Doesn't look so hard to me. Oh. That's right. Libya rolled
 over.
 
 Americans -- actually westerners in general -- may win ugly, Peter,
 but, so far, they win.

This post gave me a big laugh. So naive. There are a few basic
forces feeding extremism and terrorism around the world and those are
inequalities and injustice anywhere. As long as the most powerful
nations of the world continues to exploit the earth's resources
without taking appropriate considerations to other nations the wrath
and dismay of people elsewhere will always persist. Not understanding
this or simply neglecting it will further add to the negative
feelings and opinions and fuel extremism.

The only way to move towards a more friendly world is to make
people feel they are able to share the wealth and prosperity of the
world. As long as there is one single person anywhere in the world
hungering to death there is still a basis for fundamentalism and all
the problem that leads to.

Continuing being arrogant and policing the world without
listening to the oppressed people in the middle east and elsewhere
will never ever eradicate terrorism. You may may or may not be able
to reasonable confidently hinder most terror deeds (but only after
having turned also the western civilization into police states) but
you cannot stop the oppressed man from growing the hatred i his mind.

If you do not understand this you are not only unintelligent
IMNSHO but also part of the problem itself.



You're not to be so blind with patriotism that you can't face
reality.
Wrong is wrong, no matter who does it or says it.
 (Malcolm X)


Johnny Doelittle


-BEGIN PGP SIGNATURE-
Version: Tom Ridge Special v1.01

iQA/AwUBQYicHzVaKWz2Ji/mEQJ/KgCeJaL0A7KEtXrdg6DmER5yGHwhJWEAoNA/
96lJo2JRLf4zWoOTjELrPQB4
=Uq+t
-END PGP SIGNATURE-






Poor privacy protection in the states

2004-10-13 Thread Nomen Nescio
Why don't Americans honour security and privacy higher?

Look at this page
http://www.ci.stpaul.mn.us/depts/police/prostitution_photos_current.ht
ml

Which is from a police department!
http://www.ci.stpaul.mn.us/depts/police/


If we look at the spirit of this quote I don't see how it is ok to
behave in this abusive manner by the authorities.

The right of the people to be secure in their persons, houses,
papers and effects, against unreasonable searches and seizures, shall
not be violated... 

(from the fourth amendment, US constitution)

It is one thing if we're talking about very dangerous individuals who
are being sought after by the police and who the public needs to be
aware of but here we have a completely different situation.

Why is the integrity and security of the simple man on the street not
honoured in the US society today? It's a big difference between the
protection of personal privacy in Europe and in the US and all
Americans should really ask themselves why this has to be.






Money Laundering for the Nazis by President Bush's family

2004-10-11 Thread Nomen Nescio
The subject says it all. Read more here:
http://www.debatecomics.org/BushFamilyFortune/

We must retire this criminal from office now!

Link to the full 89 MB pdf below

http://www.debatecomics.org/assets/Sources/US_Fascism/
A-2%20FascistFriendly%20Power%20Brokers/
Roaming%20Ghost%20Case/Whole/full.pdf

(Concat above rows to one URL)





Implant replaces ID cards for access to restricted areas.

2004-10-07 Thread Nomen Nescio
Mexican Attorney General, Staff Get Chip Implants

Implant replaces ID cards for access to restricted areas.

The Attorney General of Mexico, Rafael Macedo de la Concha, recently 
announced at the opening of Mexico's National Information Center that
he
and some of his staff had been implanted with VeriChips to replace
their
ID 
tags for access to restricted areas, and to access the country's
crime 
database.

http://www.govtech.net/magazine/channel_story.php?channel=24id=90885






Re: BrinCity 2.0: Mayor outlines elaborate camera network for city

2004-09-11 Thread Nomen Nescio
-BEGIN TYPE III ANONYMOUS MESSAGE-
Message-type: plaintext

R. A. Hettinga ([EMAIL PROTECTED]) wrote on 2004-09-10:
  Critics say the cameras ought not be regarded as a panacea in crime
 fighting. They say the more there are, the greater the potential for abuse.

So, since this is titled BrinCity, it surely means that the image
streams will be available from a web site and that we the people get
cameras in the emergency response center and the mayor's office?

-END TYPE III ANONYMOUS MESSAGE-



Re: Remailers an unsolveable paradox?

2004-09-04 Thread Nomen Nescio
 We want to be able to provide the means for whistleblowers and
 others to communicate in a secure and anonymous fashion. Yet we need
 to make sure we're not abused too much since sooner or later laws
 will catch up with the remailers should abuse sky-rocket.

The ratio of remailer use to abuse is painfully low because there's no way
to actually communicate. You can broadcast but not recieve, because no
system exists to receive mail psuedononymously. This is not communication.

Remailer use is restricted to when senders don't care about listener,
which means rants, death threats, and the abuse of spam. The only systems
for receiving mail are at best some college student's unimplemented thesis.

Let's take our shining example of truth and freedom, the whistle-blower.
When they send out mail to the media or whomever, one of two things happens:
they see the story published or they don't. If not, there's no idea why: was
it received? Did the media want more information? Did they need more
support? Do they want to verify it? Do they want to help the whistle-blower?
Even if the story is published, whistle-blowing is kneecapped: it can't be
supported, or expanded on, or debated in any but the most rudimentary
fashion.

It doesn't matter if remailers disappear, they've already failed.




Remailers an unsolveable paradox?

2004-09-01 Thread Nomen Nescio
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Are remailers an unsolveable paradox?

We want to be able to provide the means for whistleblowers and
others to communicate in a secure and anonymous fashion. Yet we need
to make sure we're not abused too much since sooner or later laws
will catch up with the remailers should abuse sky-rocket.

Once upon a time all email servers were open relays. This was a
friendly time and spam wasn't invented. As time changed the focus
turned on securing the relaying procedures and has continued until
this day. Yet as we know the flow of spam (most of it coming directly
or indirectly from US) continued to increase, despite even existing
legislation today.

What are the possible solutions for the remailers? Make all
remailers middleman only and adding the ability to opt-in for
delivery outside the network? Having a network of middleman remailers
and some nymservers that only delivers to other nymserver or opted-in
servers will at least provide some means for people to communicate
between themselves. It would in practise destroy the ability to
contact anyone outside the network though, making the network an
isolated place for a few. Using techniques like Hashcash should be
more or less mandatory even today to make it harder to mailbomb or
send large amounts spam? Why is it not?

Regardless of what any hardcore cypherpunk or old-timers in the
remailer community may think about any ideas imposing restrains on
the useability of remailers something just have to be made about the
abuse of the system. I also predict that the abuse will increase so
time is ticking in a sense.

Making sure we have robust remailing services in one shape or
another and at the same time have some kind of at least indirect
acceptance from legislators and also a low degree of spam flowing
through are essential goals.

The average naive and ignorant redneck will never ever understand
the principal arguments for free speech that makes remailers useful.
The average american do not think and analyze what is told to him.
You will probably today find millions of americans who believe that
Saddam and Al-Qaeda did business just because Bush and the
administration lied about that initially, even though it's more or
less confirmed today that those links were not there.

The rednecks also vote however (to some extent) and that's why it
will be a piece of cake to strike against the remailers if the
politicians would like to. And they will, if and when serious abuse
were to happen more often utilizing remailers. What would happen if
it was found (or simply suspected or claimed) that some terror deed
was planned using remailers? How long time would it take for us to
see new laws being proposed? Not long. And don't forget that anyone
(like Tom Ridge himself) could send bogues messages through the
system trying to 

Since providing a true non-censoring remailing service and at the
same time safeguard against spam and abuse are therotically
incompatible I guess remailers are indeed a paradox waiting to be
shut down sooner or later by politicians if we're not open to at
least discuss some aspects of how these services are operated.


Johnny Doelittle


-BEGIN PGP SIGNATURE-
Version: Tom Ridge Special v1.01

iQA/AwUBQTWdszVaKWz2Ji/mEQJlUwCfT/jWnw/p2ydTJTKMYKA5/hs+Dm8AoNoE
r9bl2EtJ3CQpZPgfkSPfGBWB
=B8dt
-END PGP SIGNATURE-




 Effective today, Lemuria will be going middlemen.
 
 Sometime around the middle of the month, Lemuria will go away.
 
 This is final.
 
 
 The main reasons are that I've lost my faith in the usefulness of
 the remailer network. I have indications that the remailer network
 is
 being massively abused, on the scale where the legitimate mails are
 a tiny fraction that would be better served using other means.
 
 There are two main reasons for my thoughts. One is I have looked at
 the bounces I receive, and compared their numbers to my statistics.
 According to that data, without having run a statistically
 significant analysis, the major traffic coming through Lemuria is
 Spam, with
 threats and harrassment a second. I realize that in the no-bounces,
 the fraction of legitimate mails will be higher, but even assuming
 a factor of 10, it is still a negligable part.
 
 Second, I've the mail attached below yesterday. In case you can't
 read german, it is essentially spam advertising the mixmaster
 software and some book and/or software I haven't tested, might be a
 mixmaster
 client, might be a trojan. This is a sign for me that the anonymous
 remailer network is being used systematically for abuse, on a large
 scale. I don't want to be a part of that.
 
 As mixmaster has no features whatsoever to prevent this crap, and
 the encrypted only switch doesn't do what it should do, and
 legitimate traffic is close to zero anyways, I'll be taking Lemuria
 down and
 leaving the remailer community.
 
 It was an interesting time, and between frog, the SciTol fanatics
 

CDR nodes listing

2004-08-28 Thread Nomen Nescio
Can someone post a listing of all active CDR nodes please?

Information from pages like this one lists some inactive nodes I'm
sure
http://www.al-qaeda.net/cpunk/





Michael Moore in Cambridge (download speech)

2004-08-09 Thread Nomen Nescio
Very interesting speech by Michael Moore in Cambridge July 27, 10 MB

http://hem.bredband.net/b114631/tillf/Michael_Moore_in_Cambridge_04072
7.rm

The file will be available for download a short period of time.

Michael shows us what the upcoming election is all about.






Type III Anonymous message

2004-06-28 Thread Nomen Nescio
-BEGIN TYPE III ANONYMOUS MESSAGE-
Message-type: plaintext

From: a.melon@
To: Major Variola (ret) [EMAIL PROTECTED]
Cc: 
Bcc: 
Subject: Re: For Liars and Loafers, Cellphones Offer an Alibi
Reply-To: 
In-Reply-To: [EMAIL PROTECTED]

Hi,
Major Variola (ret) ([EMAIL PROTECTED]) wrote on 2004-06-27:
 At 11:53 PM 6/26/04 -0500, J.A. Terranson wrote:
 not to overpower the wanted signals on something like this.  Even if this
 is doable, it is out of reach of Jane Citizen.
 
 Any signal you put out is trackable to you geographically, whether its
 a cell or GPS frequency.

A GPS receiver doesn't broadcast its location. GPS works purely by
analyzing the signals received from satellites. This is probably a design
goal for military use, as well as a consequence of power requirements.

There is no such thing as a GPS frequency. It seems that for CDMA or
WCDMA phones the location service is defined in terms of messages on the
normal network layer, see a Google search for position determination service
order.
-END TYPE III ANONYMOUS MESSAGE-



Re: [Politech] John Gilmore on the homeless, RFID tags, and kittens

2004-04-02 Thread Nomen Nescio
At 05:39 PM 4/1/04 -0500, Steve Furlong wrote:
On Thu, 2004-04-01 at 16:21, R. A. Hettinga wrote:

 Tastes just like chicken?

Can we change the subject? My girlfriend is Chinese,

Does she have a chip implant?

I've already eaten
things that I wouldn't have considered to be food

Ask her to shower first

 she doesn't like my
cat

Get a new girlfriend



Re: Gentlemen reading mail part II (opsec review)

2004-03-01 Thread Nomen Nescio
Justin says:

 If they know you're trying to shake them, that alerts them and
 eliminates any opportunity you might have otherwise had to feed them
 misinformation in the future.


  That's when you strap on the C-4 vest.

Zombie Monger



the Kuwait issue is not associated with America

2003-12-20 Thread Nomen Nescio
Thanks Steve, I don't think I have heard this before. I googled on the text you quoted 
and found this url

http://wais.stanford.edu/Iraq/iraq_andambassaprilglaspie22303.html

and a few more

http://www.whatreallyhappened.com/ARTICLE5/april.html
http://www.chss.montclair.edu/english/furr/glaspie.html

I don't know what to say. This makes me sick to my stomach.

I guess one way of lookin at this is that U.S. played dirty and deceiving.
U.S. is more or less the reason Iraq invaded Kuwait.

I guess this is not told on Fox news.



Re: U.S. in violation of Geneva convention?

2003-12-19 Thread Nomen Nescio
After WWI the winners humiliated the loosers badly. This is one of the main reasons 
Hitler came to power and got support from the Germans for the aggressions that started 
the war. He managed to use these feelings of being treated as dogs and paying to heavy 
for the first war. Also they were very humiliated by the fact that France then 
occupied part of western Germany.

After WWII the winners had learned their lesson from WWI pretty well. Now they did 
not humilate the people of Germany like after the first war. We got the Marshal plan 
and so on.

Let's face it: not even the Nazi war criminals were treated in the way Saddam has been 
treated.

Is this something U.S. should feel comfortable with then? Some people on this list 
seem to have these disturbing thoughts.

It will backfire sooner or later I'm afraid. And then it may be our kids who pay the 
price.



Re: U.S. in violation of Geneva convention?

2003-12-19 Thread Nomen Nescio
Ken, Eh what?

Yes I've heard a lot of the Soviet union, however I don't see what you meant by that 
comment here.

What I was referring to was the winning powers' treatment of the Nazi war criminals 
after WWII, Nurnburg trials and so on. (Note the word trials here)

I don't think I've ever heard that the Nazi prisoners where drugged, abused or 
otherwice tortured or mistreated and humiliated. Feel free to enlighten me on this.



President of Flies

2003-12-19 Thread Nomen Nescio
US is currently run by thugs supported by the cheering consumer crowds that have been 
bred and conditioned to be infantile.

So the situation is best evaluated in the Lord of Flies context. As long as masters 
are winning and have stronger army than anyone else, nothing will change. You will 
notice that they never engage army unless they have several orders of magnitude 
strength advantage.

Which means that only small countries are in danger.

There are two consequences of this:

(a) there is no likely grouping of bigger entities to strike back - and that is the 
only response that will change US behavior. Until US is beaten and have suffered 
occupation and complete military defeat nothing much will change. This will eventually 
happen as history demonstrates that empires are not capable of sustained supremacy 
(due to the negative selection within among other factors - incidentally, the brain 
drain in the last 3-4 years have changed direction - this is the most significant 
metric.) But not any time soon.

(b) smaller countries will strive to arm themselves with effective weaponry. The 
window for this is closing and in few years there will be two clearly defined clubs: 
untouchables and fair game. It looks that most of the arab world is heading for the 
fair game status and they are understandably unhappy with it.

The main question is - will the income from newly and soon to be acquired colonies be 
sufficient to prevent confrontation between US and the rest of developed and armed 
world? 



Re: U.S. in violation of Geneva convention?

2003-12-17 Thread Nomen Nescio
Tim, sorry it was unclear from my post whom I was referring to. It was James A. 
Donald. I did put his message id in a reply-to header.

Jim Dixon wrote:
 Hitler, you mean?  Or did you have Milosevic in mind?

No what I meant was what IF somehow Bush or Blaire or some other high ranking 
coalition politician were captured by Iraq during the war and was treated in the same 
way. I can only presume you would support Saddam's soldiers checking Bush for lice 
then. You are also utterly missing the point and you are one pretty good example of 
how the mob are thinking. EVERYONE, including Saddam, Pol Pot or whattever should be 
treated in accordance with the laws by us who call ourselves the free democratic part 
of the world. Then they shall stand trial. A fair trial and being represented by 
lawyers.

What would be more satisfying for the critics of U.S. than to see U.S. not being able 
to get its act together and instead conducting itself in a manner inconsistent with 
international law during this rather criticl phase of the Iraqi campaign. Mark my 
words, U.S. will be in regret later.

Jim Dixon, you also wrote some half trouths on the subject of Palestinians and the 
support they received.

You should read up on this subject. Saddam also has a history of building up 
edicational institutions and so on. He recived awards by U.N. earlier on for his 
wellfare programs and the development Iraq was gaining. Anyone can check this up, just 
call U.N. in NY and you'll receive a few references I'm sure. What I mean by this is 
not to defend him in any way but I feel that this rewriting of history and propaganda 
is serving noone in the long run. If you believe that 100% of the arab world in their 
harts and minds hate Saddam you're wring. Very wrong.

Steve Schear: thanks for your interesting post! Some people need to learn more of that.

I also noticed on the news that CIA was conducting the questioning of Saddam. (Did 
anyone expect anything else?!) I guess this also means that U.S. now will join all 
dicatators and awful beasts in performing various forms of abuse and torture on him. 
Iraq formally removed the death penalty just a few weeks ago. Regardless of what you 
feel about that in general, I think it's embarrasing once again to see U.S. almost 
lobbying against the Iraqis to have them not honouring their own laws to satisfy 
Bush on this specific issue! Remember there's only one reason for Bush wanting to see 
Saddam dead and that he does. And that is the fact that Saddam tried to kill my papa 
as Bush put it, I've seen it in interviews myself.

Jim Dixon, going through your post again I see yet another half trough, you write
 The people on this list are less.. public humiliation and hanging of Americans..

And you seem to forget that U.S. was in bed with Saddam during the Iran-Iraq war era 
and that there was a friendly tone then. U.S. officials met with Iraqi, I think that 
Tareq Azis met with Reagan even? 

Your whole post is based on the feeling that we're gonna do what they did to us. In 
doing so you have manifested what has been written here about gasing into the abyss 
and so on. You have become what you hunt. Be ware.

It is my opinion that we shall distinguish ourselves from these bastards by not 
committing their deeds ourselves. You seem not to agree on that. And that is a major 
mistake.



Remailers and TLAs

2003-12-16 Thread Nomen Nescio
Even though I agree this issue is important I wouldn't be surprised if NONE were run 
by TLAs today and NONE has ever been run by TLAs. We will never get any such answer 
and therefore these speculations will continue. Personally I think it sounds really 
stupid when I read comments like you can only trust remailers from pre 9/11 (these 
kinds of silly/stupid/dumb-paranoid comments are often seen on A.P.A-S). The reason 
being really that I think they are too stupid and perhaps doesn't really understand 
what good it would do them to actually operate a few. I may be wrong I guess. When 
thinking of these things I also remeber having read several comments by remops that 
actually have been visited by police. Both in U.S. and abroad. The feeling I got from 
reading their comments is that the police (in case of U.S. I think it was FBI who was 
inviolved) actually didn't even know what a remailer was. If (and this is a bif if) 
that is true in general amongst FBI agents I don't think th
 ere's a major risk of beeing flooded by TLA operated remailers any time soon. But who 
knows.



Re: U.S. in violaton of Geneva convention?

2003-12-16 Thread Nomen Nescio
This makes me a bit curious. Tell me, is your opinion then that the U.S. has done 
nothing questionable here? You don't feel that treating a former head of state 
(regardless of what you happen to think of that person) in this manner and 
videorecording it AND transmitting it to the entire globe violates the spirit of the 
convention? You feel this was the right thing to do? You would have no problem seing a 
U.S. or European leader being treated the same way? 

I think we do have to take into consideration too that a lot of people (I'm not saying 
it's the majority or anything but still a lot of people) in some arab countries like 
Jordan, Egypt, Syria and Saudi Arabia do have some sympathy with Saddam. This has 
nothing to do with supporting his crimes like the chemical warfare but more general 
the fact that he was a leader in the region who stood up against U.S. and Israel. Also 
the Palestinians received a lot of finansial help from Saddam.

I don't know, but I have this feeling that just maybe this wasn't the most appropriate 
way to behave all things considered. This is a tense and volatile region as it is. I 
think we all should exercise caution and careful considerations and try to not 
humiliate the pride of the people in this region. Remember that in many cases this is 
almost all they have left.

Just my 2c.



self adjusting dummy traffic generation?

2003-12-15 Thread Nomen Nescio
Would it be possible to have a self adjusting dummy traffic generator feature 
in remailers? Operator decides that he wants to process x number of incoming and y 
number of outgoing messages each time period t. Then the software adjusts the number 
of dummy messages to this value using some statistical calculations of past t2 hours. 
If incoming traffic increases then the amount of dummy messages are decreasing and so 
on. Does this feature exist today?



Fuck Them All Dead

2003-12-13 Thread Nomen Nescio
Off All the Pigs!



Fuck em to death

2003-12-13 Thread Nomen Nescio
Death to the Oinks!



Re: Zombie Patriots and other musings

2003-12-12 Thread Nomen Nescio
Another excellent group of potential recruits are prisoners.
Especially if you can create a new religious movement teaching
them to stop the interracial, intergang fighting and concentrate
on their true enemy, the Man. Teach that killing cops, soldiers,
any type of government agent, is a holy act. Robbing banks is 
a holy act. Killing the guards in the prisons, killing the 
excutives of polluting industries -- all holy acts. 
Leaflets could be dropped from radio controlled balloons 
during yard time preaching the Word. 



Re: Zombie Patriots and other musings

2003-12-12 Thread Nomen Nescio
Anonymous wrote:

 Nomen pondered:
 
  Why robbing banks?  Aside from allowing the
  government to regulate them, what have they
  done to deserve being robbed
 
Why not? Revolutionaries need money, and the financial sector has 
 always been asshole buddies with the police, politicians, and other pigs.

Retarded.  Someone trying to frame Mr. Seaver by adopting his
three-space paragraph lead-ins.



Re: cypherpunks discussions

2003-12-09 Thread Nomen Nescio
I find it strange that some people here so often wants to intimidate those that dares 
to ask some questions. Eric put it very well in his post about dicksizewar. Very true 
indeed.

I find it very *l*a*m*e* to all the time tell people to RTFM when something comes up 
that happened to be have been dealt with like five years ago.



Re: e voting (receipts, votebuying, brinworld)

2003-11-26 Thread Nomen Nescio
Cameras in the voting booth?  Jesus Christ, you guys are morons.  If you
want to sell your vote, just vote absentee.  The ward guy will even stamp
and mail it for you.  Happens every election.



polygonal sequences

2003-11-25 Thread Nomen Nescio
Hello

 I was trying to find some old references I used to have concerning an idea men tioned 
in sci.crypt way back.

 It was Phil Zimmermann I think who mentioned something about a possibly new idea for 
a new public key scheme. He called it The cryptographic uses of polygonal sequences 
and is found here I think: 
http://groups.google.com/groups?selm=12044%40ncar.ucar.eduoe=UTF-8output=gplain

thanks



Re: EFF Report on Trusted Computing

2003-10-13 Thread Nomen Nescio
Just thought someone should take the trouble to rebut the anonymous
pro-treacherous-computing rantings...

I have heavily trimmed our anonymous ranters verbose writing style to
keep just the bits I'm responding to (inline...)

 The EFF tries to distinguish between good and bad aspects of TC,
 but it does not draw the line in quite the right place, even given
 its somewhat questionable assumptions.  

Unsubstantiated claim: what incorrect assumptions did Schoen make?  I
did not see any.

 It fails to sufficiently emphasize the many positive uses of the
 full version of TC (and hence the costs of blocking its
 implementation),

Schoen points out that TC can be broken out into desirable and
undesirable features.  If you omit the undesirable features, as he
describes, you get the remaining desirable features.

There is no loss from blocking the undesirable features.

 And the recommended fix to TC is not clearly described and as
 written appears to be somewhat contradictory.

I see no contradition.  More unsubstantiated claims.

 But let us begin with some positive elements of the EFF report.  This is
 perhaps the first public, critical analysis of TC which fails to include
 two of the worst lies about the technology, lies promulgated primarily
 by Ross Anderson and Lucky Green: that only authorized programs can run
 trusted, and that unauthorized or illegal programs and data will be
 deleted from computers or prevented from running.  

They are not lying and you do your credibility no favors by making
such unsubstantiated claims.

You are just misconstruing the obvious meaning of their warnings: the
features they describe (and plenty more and worse) are technically
feasible with the TC hardware enforcement, and given microsoft's
history of repeated dirty tricks campaigns in the areas of document
format wars, reporting private information back home to microsoft,
browser wars, interface wars, restrictive business practices regarding
licensing it would be fool hardy in the extreme to not expect more of
the same in the area of platform control based on Palladium.

Of course _you_ are not wishing to admit or emphasize these points,
but you can hardly get away with impugning the integrity of high
reputation individuals like Prof Ross Anderson with such paltry
mischaracterisation.

Your arguments are crass and of the form: but the current microsoft
PR documents don't admit that it could do that, nor of course that
microsoft are planning to do that, so it's not fair for you to point
that out and caution people about the kinds of things microsoft may be
planning.  Technology is criticized and discussed based on the
potential and most likely inferred directions given microsoft's
history and prior demonstration of interest to control various aspects
of the software platform.

 The report also forthrightly rejects the claim that TC technology is
 some kind of trick to defeat Linux or lock-in computers to Microsoft
 operating systems, 

It's far from obvious that TC will have no part to play in the next
few decades of open warfare against linux from microsoft.  There are
any number of ways to extend the existing dirty tricks regarding
formats, protocols, licensing etc using the TC hardware enforcement.

 The EFF attempts to distinguish one feature of TC, remote
 attestation, as a source of problems.  This is the ability of a
 computer user to convince other systems about what software he is
 running.  The EFF is convinced that this feature will cause users to
 be compelled to use software not of their choice; harm
 interoperability and encourage lock-in; and support DRM and various
 restrictive kinds of licensing.

Yes indeed and they are quite right.  That is exactly the problem with
remote attestation.

 But when we break these down in detail, many of the problems either
 go away or are not due to attestation.

More unsubstantiated claims.  This statement is both false and not
backed up by any of your following text.

 Software choice limitation may occur if a remote system provides
 some service conditional on the software being used to access it.
 But that's not really a limitation of choice, because the user could
 always elect not to receive the offered service.

This is really strange logic: you have a choice not to use a client
because you don't have to use the service?!!?  

Of course it detracts from choice.  Absent remote attestation things
would be as they are today and users could modify existing clients,
write their own clients, or obtain third party clients for any
service.  Removing _that_ choice is the problem.  And it is a big and
significant detraction from the current open nature of the internet.
One that favors large companies such as microsoft with an interest to
stifle innovation and competition.

 The implicit assumption here seems to be that if TC did not exist,
 the service would be offered without any limitations.  

Yes it would.  It either wouldn't be offered or it would be offered
without 

Re: Dan Geer Fired (was re: Technology Firm With Ties to Microsoft Fir

2003-10-01 Thread Nomen Nescio
The company I work for forbids its employees to discuss crypto issues
in public forums like this one.  That's why I only post anonymously.

They have several concerns.  One is the still-existent crypto export
regulations which could be construed to forbid technical discussions
of cryptography in public forums accessible to foreigners.  Another is
the danger that the employee might say something which could embarrass
the company, such as admitting problems in the company's products.
Employees may also find themselves talking to customers of the company
and say things different from what the sales representatives are telling
them, which leads to huge problems.

There are actually many valid reasons to keep employees from talking
publicly about technical issues in any field related to their employment.
Add to this the many political and legal issues that are specific to
cryptography and it is unsurprising that so many companies restrict what
their employees can say, as a condition of employment.

One thing I haven't heard in the Geer case is whether his employment
contract did have such limitations.  If not, he might conceivably have
grounds for a wrongful termination suit, although even then the company
could make a pretty good case that bad-mouthing one of the company's
biggest customers is valid grounds for dismissal.

It's also interesting that Geer claims in an interview [1] that he
approached nine differrent academic researchers who refused to sign on
to the report even though they agreed with its recommendations, because
they were afraid of losing funding.  I find this somewhat hard to believe,
first because I don't agree with the conclusions of the report (although
my analysis has been censored), and second because I don't think that
Microsoft controls that much academic research funding.  It's possible
that Geer is exaggerating or that the researchers were not completely
honest about the reasons for their lack of interest.

[1] http://www.eweek.com/article2/0,4149,1304620,00.asp



Cryptome: Torch Concepts threatening Cypherpunks

2003-09-21 Thread Nomen Nescio
http://cryptome.org/jetblue-spy.htm

The attorney for Torch Concepts has sent cease and desist letters to Bill Scannell and 
Len Sassaman for offering the Torch Concepts file, the smoking gun in the Jet Blue 
privacy violation scandal.

The file is currently still available on Len Sassaman's website, as well as Cryptome.



Re: Orwell's Victory goods come home

2003-03-17 Thread Nomen Nescio
On Sat, 15 Mar 2003 18:12:19 -0600, you wrote:

 On Saturday 15 March 2003 12:55 pm, Anonymous via the Cypherpunks Tonga
 Remailer wrote:
  On Sat, 15 Mar 2003 14:25:51 +, you wrote:
   So which American on the list is going to write to Congress to demand
   that the Statue of Liberty be sent back to France?
  
   Ken
 
  It really should go back to France, as the US seems to care less
  about liberty than when it received that gift, and France now
  has quite a profile of opposing foreign domination (from the US)
  over its policies and interests.
 
  So far as I can tell tell, the US approach to other nations is
  essentially shut up and do what we tell you to do if you love
  freedom.

 Americans tend to also forget that the French provided a lot of support for
 the colonies during the American Revolution.

Without the fleet of Admiral Comte de Grasse at Yorktown, and 
the assistance of the Marquis de Lafayette, the revolution would 
have surely been lost and Washington, Jefferson, Franklin, 
Adams, Madison and the rest would have hanged at London Tower. 
Maybe we would be more accurate to consider our role for the 
French in WW1 and 2 to be in compensation for our freedom from 
the British.



Re: From Bush's radio address

2003-03-02 Thread Nomen Nescio
On Fri, 28 Feb 2003 17:20:47 -0500, you wrote:

 on Saturday...

 It will be difficult to help freedom take hold in a country that has known
 three decades of dictatorship, secret police, internal divisions, and war.

 I *think* he's talking about Iraq.

Maybe Kuwait? How is democracy and freedom faring there more 
than a decade after the first Iraq war? Can women vote there? 
No? Has there been an election, or it is still a hereditary 
dictatorship? Oh, the latter. I see... Maybe it wasn't about 
freedom and democracy? Maybe something else? The troops are 
generally too stupid and ill informed to notice this 
incongruity. They will just go and kill people on command, while 
getting teared up over the land of the free and the home of the 
brave.


 -Declan



Re: Revealed: US dirty tricks to win vote on Iraq war

2003-03-02 Thread Nomen Nescio
 http://www.observer.co.uk/international/story/0,6903,905899,00.html


 Revealed: US dirty tricks to win vote on Iraq war

 Secret document details American plan to bug phones and emails of key Security 
 Council members

 Read the memo
 http://www.observer.co.uk/iraq/story/0,12239,905954,00.html

 The memo is directed at senior NSA officials and advises them that the agency is 
 'mounting a surge' aimed at gleaning information not only on how delegations on the 
 Security Council will vote on any second resolution on Iraq, but also 'policies', 
 'negotiating positions', 'alliances' and 'dependencies' - the 'whole gamut of 
 information that could give US policymakers an edge in obtaining results favourable 
 to US goals or to head off surprises'.

 Dated 31 January 2003, the memo was circulated four days after the UN's chief 
 weapons inspector Hans Blix produced his interim report on Iraqi compliance with UN 
 resolution 1441.

 It was sent by Frank Koza, chief of staff in the 'Regional Targets' section of the 
 NSA, which spies on countries that are viewed as strategically important for United 
 States interests.

Do you think Mr. Koza would answer questions about it? The pre-
Total Information Awareness system seems to indicate he can be 
reached at 410-964-3814 in Columbia, MD, a 25 minute drive from 
Fort Meade. If he's encouraging tapping people's home phones, 
surely he can't object to a phone call simply asking for 
information. Learning more about this is clearly in the public 
interest. He should be given an opportunity to explain this 
disturbing news.

 Koza specifies that the information will be used for the US's 'QRC' - Quick Response 
 Capability - 'against' the key delegations.



Re: Yes, I really did zeroize that key (but I didn't check my code!)

2003-02-28 Thread Nomen Nescio
For starters your signature is bad, at least here.

On Thu, 27 Feb 2003 23:18:35 -0500, Patrick Chkoreff [EMAIL PROTECTED] wrote:
I have devised what I believe to be a foolproof and completely
portable way of setting an array of bytes to all zeroes, a common
security operation in cryptography programs.

I have a really hard time trusting your code. Read on.

Here is a simple example of how we can generate this undecidable
zero and pass it into the routine.

int
main(int argc, char *argv[])
{
 char array[32];
 char magic = (argc  1 ? 0 : 255);

 clear_bytes(magic, array, sizeof(array));

 return 0;
}


If you call this program with no command line arguments, the value of
magic will be 0 and the clear_bytes is guaranteed to zero out the
array.

Wrong. Even with no arguments to this sample program, argc will still
be 1. Try it if you don't believe me. Or re-read your KR.



cryptome log downloads

2003-02-26 Thread Nomen Nescio
These IPs downloaded access log from cryptome during hacked state.


pcp259331pcs.howard01.md.comcast.net
212.54.205.184
host.159-142-70-179.gsa.gov
c-889471d5.021-3-73746f50.cust.bredbandsbolaget.se
217.167.197.20
193.128.179.38
217.167.197.20
host.21.88.68.195.rev.coltfrance.com
216.155.104.95
204.249.177.229
c-889471d5.021-3-73746f50.cust.bredbandsbolaget.se
206.180.129.0.dial-ip.hal-pc.org
mchesnik.resnet.bucknell.edu
logos.relcom.ru
pcp03280952pcs.nrockv01.md.comcast.net
pool-138-88-125-69.res.east.verizon.net
adsl441.estpak.ee
194.90.22.83
h219-110-056-001.catv01.itscom.jp
host33-206.pool80181.interbusiness.it
213-140-14-139.fastres.net
pcp03280952pcs.nrockv01.md.comcast.net
server2.gescenter.com
c-889471d5.021-3-73746f50.cust.bredbandsbolaget.se
user142.intonet.co.uk
p50902fb5.dip.t-dialin.net
217.19.80.197
adsl441.estpak.ee
bragi.fh-brandenburg.de
esprx02x.nokia.com
62.92.119.47
washdc3-ar2-4-64-017-068.washdc3.elnk.dsl.genuity.net
bragi.fh-brandenburg.de
mail.emainc.com
cf2.andrews.af.mil
cachix1.tele.net
stop.justice.gc.ca
218.1.37.179
212.137.60.106
m206-5.dsl.tsoft.com
195.243.47.34
host91-189.pool80181.interbusiness.it
130.94.106.228
folsom.officedepot.com
63.171.232.247
gateway1.scottish-southern.co.uk
19.203.252.64.snet.net
156.54.249.179
esprx02x.nokia.com
156.54.249.179
ip68-108-169-227.lv.lv.cox.net
ip-192.landsend.com
212.54.205.184
dssback.smsu.edu
adsl441.estpak.ee
nycmny1-ar5-4-41-204-222.nycmny1.elnk.dsl.genuity.net
ip68-12-36-71.ok.ok.cox.net
spock.ti.telenor.net
h00e018b87996.ne.client2.attbi.com
146.7.100.197
194.102.45.134
ppp011.datacom.bg
paginiaurii.rdsnet.ro
12.146.66.131
segfault.net
host18-121.pool8021.interbusiness.it
212.54.205.184
server.olgastift.s.bw.schule.de
adsl441.estpak.ee
anancy-104-1-2-19.abo.wanadoo.fr
12-238-233-6.client.attbi.com
ppp011.datacom.bg
adsl-154-201-4.clt.bellsouth.net
193.1.100.103
section.eu.org
adsl-65-69-105-82.dsl.tulsok.swbell.net
65.123.207.130
www-cache.rz.uni-karlsruhe.de
interlock.doeal.gov
pcp01686411pcs.wchstr01.pa.comcast.net
px2o.wpafb.af.mil
adsl441.estpak.ee
1cust113.tnt14.stk3.swe.da.uu.net
js.bitnux.com
dsl081-198-094.nyc2.dsl.speakeasy.net
gussie.cs.queensu.ca
62.173.76.47
65.213.245.17
netcache-2002.public.lawson.webtv.net
65.213.245.17
mail.targettv.com
paginiaurii.rdsnet.ro
grossetto.cinetic.de
212.185.163.2
grossetto.cinetic.de
rnet.riss.net
adsl-208-190-44-194.dsl.rcsntx.swbell.net
199.195.109.4
user-0ccskj1.cable.mindspring.com
webcacheh02a.cache.pol.co.uk
202.166.126.229
supercache.qualitynet.net
210.187.2.163
170.red-80-58-4.pooles.rima-tde.net
adsl441.estpak.ee
207.140.171.115
mail.targettv.com
62.118.206.245
gozer.adams.edu
h36n1fls23o1073.telia.com
webcacheh02a.cache.pol.co.uk
mix-poitiers-106-4-203.abo.wanadoo.fr
valis.net.pl
210.187.2.163
200.60.244.210
paginiaurii.rdsnet.ro
user31.net518.tx.sprint-hsd.net
rd.centennialrd.com
grossetto.cinetic.de
doc.atstake.com
paginiaurii.rdsnet.ro
user-2ivfj0h.dialup.mindspring.com
dyn325.win.tue.nl
doc.atstake.com
us1.pharmacia.com
199.67.140.75
198.65.201.34
pf.epsa.pl
cache4.ihug.com.au
24-90-126-37.nyc.rr.com
217.206.228.15
adsl441.estpak.ee
sigsegv.us
199.195.109.4
www.japet.si
el8.net
acb4aa08.ipt.aol.com
ocw-fl6.mit.edu
cache-da03.proxy.aol.com
radio-15.cvairnet.com
ocw-fl6.mit.edu
eric.mvc.mcc.ac.uk
65.213.245.17
host70-246.pool8173.interbusiness.it
adsl-216-102-104-158.dsl.scrm01.pacbell.net
host18-121.pool8021.interbusiness.it
65.213.245.17
india.dsnethosting.com
12.146.66.131
adsl-66-140-35-4.dsl.rcsntx.swbell.net
cc37206-b.ensch1.ov.home.nl
hiryu.st.ryukoku.ac.jp
cc37206-b.ensch1.ov.home.nl
0x50a1be60.abnxx5.adsl.tele.dk
62.13.170.12
130.156.3.254
dhcp80ffaf1a.residence-rooms.uiowa.edu
193.122.21.42
dpc6682075068.direcpc.com
mke-65-29-141-70.wi.rr.com
12-246-108-182.client.attbi.com
209-102-194-133.ipv4.intur.net
unknown1.ne.client2.attbi.com
adsl-66-140-96-228.dsl.lbcktx.swbell.net
makkai1.mfa.kfki.hu
63-216-250-91.sdsl.cais.net
198.143.25.22
63-216-250-91.sdsl.cais.net
pool-138-88-125-69.res.east.verizon.net
adsl-67-37-28-9.dsl.mdsnwi.ameritech.net
200-147-88-242.tlm.dialuol.com.br
d-ip-129-15-111-167.lab.ou.edu
216-39-176-101.ip.theriver.com
ip68-98-187-120.nv.nv.cox.net
170.135.241.45
ip68-98-15-128.ph.ph.cox.net
unwg01a008.customs.gov
stargazer-o.stars-smi.com
stargazer-o.stars-smi.com
rrcs-west-24-106-45-5.biz.rr.com
rrcs-west-24-106-45-5.biz.rr.com
200-147-88-242.tlm.dialuol.com.br
sycamore-226-190.tbcnet.com
218.145.25.13
mankey-76.dynamic.rpi.edu
multilink.deva.rdsnet.ro
wsp000466wss.nebraska.edu
65.213.245.17
cs6669249-49.austin.rr.com
156.80.89.71
212.42.228.2
cache219.156ce.scvmaxonline.com.sg
p0033-121.customer.soneraliving.fi
sycamore-226-190.tbcnet.com
208.247.107.169
ool-18ba0937.dyn.optonline.net
pd958f774.dip.t-dialin.net
ns1.amgen.com
lns-p19-18-81-57-233-23.adsl.proxad.net
host.145.83.23.62.rev.coltfrance.com
ca-westla-cuda5-c7a-48.stmnca.adelphia.net
fwmoc06.fw.gannett.com
adsl441.estpak.ee
gw.forbes.net
ppp-216-7.25-151.libero.it

Re: The practical reason the U.S. is starting a war

2003-02-16 Thread Nomen Nescio
On Sun, 16 Feb 2003 13:37:33 -0800 (PST), John Young wrote:
 Jefferson's
 reputation has been taking on water at an alarming rate, from
 the twin leaks of Sally Hemings and the larger question of
 slavery.

If, when you speak of Martin Luther King, Jr., you speak of him 
in bed with a white woman, you are a racist. If, when you speak 
of Thomas Jefferson, you speak of him NOT in bed with a black 
woman, you are a racist.

Whenever Jefferson is mentioned, at least one of the first three 
points made is his alleged sexual relationship with Ms. Hemings. 
Whenever King is mentioned, there is silence on his rampant, 
documented promiscuity, and those who transgress this unwritten 
rule are branded racist.

Most people seem to buy the tacit, racist line of political 
correctness, without question or objection.




Re: The practical reason the U.S. is starting a war

2003-02-16 Thread Nomen Nescio
On Sun, 16 Feb 2003 10:45:37 -0800 (PST), you wrote:

 America's founding crackers set up a slave-owning nation, after 300 years of 
murdering natives, following the still alive and well European/Asiatic/African 
tradition of stealing from others while being doped by witchdoctors and astrologists 
(today's intelligence industry).

The British set up slave-owning colonies, and along with other 
European powers murdered natives for 250 years. It didn't take 
blessings or exhortations from priests or astrologist. It was 
the traditional way to power and wealth for the stratified class 
structures of Europe. The founding crackers as you call them, 
destroyed the stratified class structure.


 Politics and economics and higher education, and their tools of dissimulation, the 
pantheon of heroes and enemies, were invented to camouflage this brutal depradation, 
in the nation's beginning as now mimicking the civilized practitioners of mayhem (no 
pun on Tim May).

Invented to camouflage? Didn't work, huh?


 The depradation's beneficiaries see nothing wrong with it, even argue that's the way 
of predestination, god's will for spoils to belong to the victor, sloganeering Might 
makes right.

Some say that. It's at least as accurate as Weakness makes 
right, the current socialist mantra. Some understand that right 
is right, whether anyone knows it or cares about it.

 When victims adopt the means and methods of the righteous victors, they are called 
terrorists, enemies of the state, uncivilized, inferior, kill-worthy by weapons of 
mass destruction, collateral damage of hidden hand market forces and bare-faced 
moralism in service to privilege.

Yes they are. By definition, intimidation and violence by 
governments is not terrorism. The fact that the recipient is 
feeling terror is irrelevant. Take back the language.


 Yeah, yeah, all ideological tripe is the same: mine is right, yours is wrong. 
However, ideologues are a tribe on the prowl for victims, so beware media-addiction. 
Like this distortion mirror. What you fail to see incoming can splatter your guts.

That brings a smile to the face and a song to the heart.


 Tim calls what he sees. A horror movie.

He needs more than one screen.




RIAA turns against Hollings bill

2003-01-16 Thread Nomen Nescio
The New York Times is reporting at
http://www.nytimes.com/2003/01/14/technology/14CND-PIRACY.html that
the Recording Industry Association of America, along with two computer
and technology industry trade groups, has agreed not to seek new
government regulations to mandate technological controls for copyright
protection.  This appears to refer primarily to the Hollings bill,
the CBDTPA, which had already been struck a blow when Hollings lost his
committee chairmanship due to the Democrats losing Senate leadership.
Most observers see this latest step as being the last nail in the coffin
for the CBDTPA.

Some months ago there were those who were predicting that Trusted
Computing technology, as embodied in the TCPA and Palladium proposals,
would be mandated by the Hollings bill.  They said that all this talk of
voluntary implementations was just a smoke screen while the players
worked behind the scenes to pass laws that would mandate TCPA and
Palladium in their most restrictive forms.  It was said that Linux would
be banned, that computers would no longer be able to run software that
we can use today.  We would cease to be the real owners of our computers,
others would be root on them.  A whole host of calamaties were forecast.

How does this latest development change the picture?  If there is no
Hollings bill, does this mean that Trusted Computing will be voluntary,
as its proponents have always claimed?  And if we no longer have such
a threat of a mandated Trusted Computing technology, how bad is it for
the system to be offered in a free market?

Let technology companies decide whether to offer Palladium technology
on their computers or not.  Let content producers decide whether to use
Palladium to protect their content or not.  Let consumers decide whether
to purchase and enable Palladium on their systems or not.

Why is it so bad for people to freely make their own decisions about
how best to live their lives?  Cypherpunks of all people should be the
last to advocate limiting the choices of others.  Thankfully, it looks
like freedom may win this round, despite the efforts of cypherpunks and
online freedom advocates to eliminate this new technology option.




Re: Television

2003-01-08 Thread Nomen Nescio
  ## ## 
  ## ## 
  ## ## 
  # 
  # 
  # 
  # 
  # 
  ## ##  ## 
  ## ##  ## 
 ##  ## 
 ##  ## 
 ##  ## 
 ##  ## 
 ### ## 
 ##  ## 
 ##  ## 
 ## 
 ## 
 ## 
    
  # 
  # 

Does anyone have a pointer to software that will create messages
like this?  Could be a great opportunity for stego - just replace the
# characters with random ones.  Then let there be an option to either
use a crypto RNG for the random char choice, or to load in a stealthed
version of a PGP message.

All we need is a nice ascii-font-based program like this and the rest
would be easy.  Anyone?




Re: Television

2003-01-07 Thread Nomen Nescio
A trivial point, barely worth making time for, but folks ought not to 
think that brainwashing via t.v. has _anything_ substantively causal to 
do with the sad state we are in today.

It's amusing that Mr. May thinks that anyone gives a fuck if he (Mr. May) filters 
him/her out for whatever reason and considers worthwhile/effective effort to explain 
that reason at length every time, and yet doesn't consider that similar and far more 
intensive efforts by the state-directed mass media are as well effective.

(more at the bottom)





 ## ## 
 ## ## 
 ## ## 
 # 
 # 
 # 
 # 
 # 
 ## ##  ## 
 ## ##  ## 
##  ## 
##  ## 
##  ## 
##  ## 
### ## 
##  ## 
##  ## 
## 
## 
## 
   
 # 
 # 
   
## 
## 
 # 
   
 # 
 # 
 #
  
 
 
  ### 
##  ## 
 # 
 # 
 # 
 # 
 # 
 ## 
   # 
### 
  ### 

  ###
      
 ###   ###
 ##### 
 ## ## 
 ## ## 
 ## ##
  ##   ## 
  ###
   ##    
 ## ## 
  
 ## ## 
 ## ## 
 # 
 # 
 # 
 # 
 ##   ### 
 # 
   #
  ### 
 ##   ###   ### ## 
 ##  # 
 ###   ### 
 ## ## 
 ##### 
 # 
 ###
 ## 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 # 
 # 
 # 
   
## 
## 
## 

QM, EPR, A/B

2002-12-31 Thread Nomen Nescio
Tim May wrote...


I don't believe, necessarily, in certain forms of the Copenhagen Interpretation, 
especially anything about signals propagating instantaneously, just the quantum 
mechanics is about measurables ground truth of what we see, what has never failed us, 
what the mathematics tells us and what is experimentally verified. Whether there 
really are (in the modal realism sense of Lewis) other worlds is neither here nor 
there. Naturally, I would be thrilled to see evidence, or to conclude myself from 
deeper principles, that other worlds have more than linguistic existence.

Yes, this has been a fashionable set of statements, very smiliar to quantum mechanics 
is merely a useful tool for calclating the outcome of experiments.

I used to chant this too, but the recent (well, over the last 10 years) experimental 
work in EPR has convinced me that there's really something odd going on here.

Many worlds (first proposed in the 50s and recently revived) is one possible 
explanation for why, for instance, photons in the double slit experiment know about 
the slit they didn't go through. And while I am not particularly convinced that this 
is the explanation (there are other basic things about the QM world it doesn't 
explain, such as why I measure THIS outcome rather than THAT outcome), I'm personally 
at the point where I think some form of answer is needed, and that the above 
intellectual dodge is no longer valid. So at least many worlds is one possible attempt 
to answer why photons are able to know instantaneously about correlated photons far 
removed (and for me, and the late John Bell it is inescapable that they do indeed find 
out instantaneously).

One way out is to ditch quantum mechanics as being anything near a description of 
reality as classical theories in essence are. Tim Boyer of CUNY and a batch of Italian 
researchers have done a pretty convincing job of showing that Ahranov-Bohm can be 
classically derived in a fairly straightforward manner. But it doesn't explain how AB 
is able to predict said phenomenon in about 4 lines while they need many pages of 
fairly difficult EM theory.

For me it's clear that A/B and EPR show us that QM is telling us SOMETHING about 
reality, but we don't yet understand what it is.




A Few Words About Palladium

2002-12-13 Thread Nomen Nescio
According to the message below, Palladium will not include a serial
number revocation list, document revocation list, or similar
mechanism to delete pirated music and other unauthorized content.
These claims have been made most vocally by Ross Anderson in his TCPA
FAQ, http://www.cl.cam.ac.uk/~rja14/tcpa-faq.html, and by Lucky Green
in his DefCon presentation, http://www.cypherpunks.to/.

Instead, the point of Palladium is to create a decentralized, trusted
computing base... whose integrity can be audited by anyone.  This is
accomplished, as has been discussed at length here and elsewhere,
by hardware which can compute a secure hash of software as it loads,
and which can attest to this hash via cryptographic signatures sent to
remote systems.  This functionality allows software to prove to third
parties that it is running unmolested, which is the basic functionality
provided by Palladium.

Unfortunately, the exaggerated and misleading claims in the links above
are accepted as truth by most readers, and a false picture of Palladium
is virtually universal on the net.  Isn't it time for security experts
to take a responsible position on this technology, and to speak out
against the spread of these falsehoods?


 A Few Words About Palladium 
 By John Manferdelli, General Manager, Trusted Platform Technologies,
 Microsoft Corporation

 As you may know, I spent some time on the road in the UK in
 November. During my visit, I had the chance to meet some of you at
 the Meet the Technologists breakfast at the Microsoft Campus in
 Reading. Thanks to those of you who were able to attend. It was a great
 chance to engage in frank discussions about some of the more controversial
 topics surrounding Palladium.

 One of the issues we discussed was whether Palladium would include
 mechanisms that would delete pirated music or other content under remote
 control or otherwise disable or censor content, files, or programs running
 on Windows. The truth is, Palladium will not disable any content or file
 that currently runs. Palladium was designed so that no policy will be
 imposed that is not approved by the user. Microsoft is firmly opposed to
 putting policing functions into Palladium and we have no intention of
 doing so. The machine owners - whether an individual or enterprise - have
 sole discretion to determine what programs run under Palladium. Programs
 that run under Palladium, just like programs that run under Windows,
 will do whatever they are allowed to do, based on the security settings
 on the user's machine. Palladium not only respects existing user controls,
 it strengthens them.

 What Palladium does change is the ability for software to be protected
 from other software. Palladium will enable and safeguard a decentralized
 trusted computing base on open systems.  These security-oriented
 capabilities in Windows will be enabled by a relatively small change in
 hardware, and will help transform the PC into a platform that can perform
 trusted operations that span multiple computers under a trust policy that
 can be dynamically created and whose integrity can be authenticated by
 anyone. In addition, it will preserve the flexibility and extensibility
 that contributes so much to the entire PC ecosystem.

 I hope to have an opportunity to meet more of you in the New Year. We'll
 keep you posted about Palladium-related industry events and other Meet
 the Technologist opportunities.

 Happy holidays!
 - John Manferdelli

 P.S. While I was in London, I also had the opportunity to speak about
 Trustworthy Computing and the Palladium initiative at the Trusted
 Computing Masterclass in London. The event included participants from
 Hewlett Packard Labs, Red Hat, and Cambridge University, among others. You
 can read more about the event at www.netproject.com.




Hooray for TIA

2002-12-11 Thread Nomen Nescio
For years we cypherpunks have been telling you people that you are
responsible for protecting your own privacy.  Use cash for purchases, look
into offshore accounts, protect your online privacy with cryptography
and anonymizing proxies.  But did you listen?  No.  You thought to
trust the government.  You believed in transparency.  You passed laws,
for Freedom of Information, and Protection of Privacy, and Insurance
Accountability, and Fair Lending Practices.

And now the government has turned against you.  It's Total Information
Awareness program is being set up to collect data from every database
possible.  Medical records, financial data, favorite web sites and email
addresses, all will be brought together into a centralized office where
every detail can be studied in order to build a profile about you.
All those laws you passed, those government regulations, are being
bypassed, ignored, flushed away, all in the name of National Security.

Well, we fucking told you so.

And don't try blaming the people in charge.  You liberals are cursing
Bush, and Ashcroft, and Poindexter.  These laws were passed by the entire
U.S. Congress, Republicans and Democrats alike.  Representatives have
the full support of the American people; most were re-elected with
large margins.  It's not Bush and company who are at fault, it's the
whole idea that you can trust government to protect your privacy.

All that data out there has been begging to be used.  It was only a
matter of time.

And you know what?  It's good that this has happened.  Not only has
it shown the intellectual bankruptcy of trust-the-government privacy
advocates, it proves what cypherpunks have been saying all along, that
people must protect their own privacy.  The only way to keep your privacy
safe is to keep the data from getting out there in the first place.

Cypherpunks have consistently promoted two seemingly contradictory
ideas.  The first is that people should protect data about themselves.
The second is that they should have full access and usability for
data they acquire about others.  Cypherpunks have supported ideas like
Blacknet, and offshore data havens, places where data could be collected,
consolidated and sold irrespective of government regulations.  The same
encryption technologies which help people protect their privacy can be
used to bypass attempts by government to control the flow of data.

This two-pronged approach to the problem produces a sort of Darwinian
competition between privacy protectors and data collectors.  It's not
unlike the competition between code makers and code breakers, which has
led to amazing enhancements in cryptography technology over the past
few decades.  There is every reason to expect that a similar level of
improvement and innovation can and will eventually develop in privacy
protection and data management as these technologies continue to be
deployed.

But in the mean time, three cheers for TIA.  It's too bad that it's the
government doing it rather than a shadowy offshore agency with virtual
tentacles into the net, but the point is being made all the same.
Now more than ever, people need privacy technology.  Government is not
the answer.  It's time to start protecting ourselves, because nobody
else is going to do it for us.




Anonymous blogging

2002-12-11 Thread Nomen Nescio
I get a lot of compliments on my anonymous posts here.  Thanks very
much guys, keep those cards and letters coming.

But cypherpunks isn't that great a forum for publishing ideas.  Take a
look at http://www.inet-one.com/cypherpunks/current/maillist.html to
see the unfiltered list feed.  Sure, no subscriber with half a clue
actually sees it like this, but that's how it looks to the outside world.
It's tough to find the nuggets of enlightenment buried amongst the crap.

I'd like to start publishing a blog.  But of course given the sensitivity
of my position and the boldness of my arguments, it's important that
there be strong anonymity protection.

Does anyone have advice on how to get started with anonymous blogging?
I have access to Windows, Linux and Mac systems, and I could go through
anonymizer.com or some other service if necessary.  Ideally I'd like to
use one of the turnkey blog clients for ease of setup and use.  Thanks
for your suggestions.




Blaze, Diffie, et al torpedo eDNA

2002-11-22 Thread Nomen Nescio
Markoff writes in the NY Times about a proposal called eDNA which would
reconfigure the Internet to forbid anonymous usage of certain parts.

http://www.nytimes.com/2002/11/22/politics/22TRAC.html

The scheme was explored by DARPA a few months ago, which gave a contract
to SRI to look into it.  SRI convened a panel that included Matt Blaze,
Whit Diffie, Roger Needham and Marc Rotenberg (of EPIC).  These guys
hated the idea, but the SRI contact, one Victoria Stavridou, refused to
allow Blaze to write up the consensus once it became clear that he was
going to shred the proposal.

The commmitee members exchanged furious emails, full of personal attacks,
complaining that Stavridou was hijacking the report.  But she persisted,
briefing DARPA orally and refusing to include Blaze and the others in
the teleconference as had been planned.

Despite Stavridou's attempt to spin the results, DARPA currently says
it has no intention of pursuing eDNA.  SRI says that it concluded that
the costs and risks would outweigh any benefit.




Re: Poker

2002-11-15 Thread Nomen Nescio
James Donald writes:
 In principle it should be possible to create poker playing
 software where the server cannot cheat, but it is not obvious
 to me how this can be done.

 Does anyone know of a cheat proof algorithm?

Sure, there are any number of poker algoerithms which prevent the server
from cheating.  See the many literature references on Mental Poker.
One recent protocol is Kurosawa et al, IEICE Transactions on Fundamentals,
Vol E00-A, No. 1, January 1997.  It is available from citeseer.

The problem is that although you can stop the server from cheating, you
can't stop players from colluding outside the scope of the game protocols.
Two players could communicate by phone, revealing their cards to each
other and influencing the betting.  This kind of cheating can't be
prevented, and it can be significant in an n-player poker game.




Re: OPPOSE THE WAR! We are going to ruin Iraq to get the oil. Who's ne

2002-11-13 Thread Nomen Nescio
Gary Jeffers writes:

The purpose of the coming Iraq war is to steal their oil. After we get 
 Iraq oil, which arab country is next? If U. State can get away with the
 theft of Iraq, then why not just keep on stealing?

  The beneficiaries of this war are:

 1. United State:

 2. Corporations, connected.

 3. The ruling elite families.

 4. The Zionists.

Even if all this were true, so what?  All of the groups above would
do better things with the oil.  The represent the forces of enterprise,
initiative and enlightenment in the world today.  What is the alternative?
Iraq?  Saddam Hussein?  You think the world is a better place with
someone like him controlling Iraqi oil?

He's no better than any of the groups above.  He took power by force
and rules his country with an iron fist.  See the recent elections -
100% of the vote was supposedly for Hussein!  What a joke.

How can anyone claim that the U.S. or Israel or corporations or rich
Americans are morally worse than the likes of Hussein?

A 21st century where democratic, liberal Western democracies control the
world will be far more prosperous, safe and free than one where backwards,
repressive, religious ideologies like Islam dominate.

The mere fact that you feel free to criticize the U.S., but would never
go to Iraq and criticize Hussein just proves the point.  Sure, freedom
of speech is not absolute in the U.S., and the degree of protection has
fluctuated; during WWI people were sent to jail for criticizing the draft,
but we're nowhere near that point now.

But these freedoms are non-existant in Iraq, China, and other countries
which are the real threat to peace and freedom in the coming decades.
Look at http://www.middle-east-online.com/english/?id=3235 which describes
a case in neighboring Iran where a respected academic was sentenced
to DEATH for saying that Muslims should not blindly obey the Imams.
These are the forces which are trying to assert their dominance over
the world as we move into this new century.  We either stand by and
let it happen, condemning future generations to lives of suffering,
poverty and ignorance, or we take steps to stop it, defending Western
culture and its ideals of freedom.

That's what's really at stake here.  We're fighting over which ideology
will control the world.  And yes, oil is a potent weapon in this struggle.
Leaving those vast oil resources in the hands of conservative Muslims
would be a huge mistake from the perspective of this decades-long war.

So let's agree with Gary Jeffers: Beat State!  But the state we must
beat is the state of religious persecution and dictatorship practiced by
Hussein.  If we hold all states to the same standard instead of heaping
criticism only on one, we will see that Iraq is far more deserving of
condemnation than most.  Their government deserves to be beaten, to be
destroyed.  It would be the finest gift we could give to the Iraqi people.




Re: Cypherpunks and Irish Travellers

2002-09-22 Thread Nomen Nescio

another woman, Rose Ann Carroll, were arrested March 27 at a Kohls
department store in Fort Worth on charges of theft $50 to $500.

I wasn't follownig the news ... they didn't get Osama, did they ?




Re: Cryptogram: Palladium Only for DRM

2002-09-18 Thread Nomen Nescio

Peter Biddle writes:
 Pd is designed to fail well - failures in SW design shouldn't result in
 compromised secrets, and compromised secrets shouldn't result in a BORE
 attack.

Could you say something about the sense in which Palladium achieves
BORE (break once run everywhere) resistance?  It seems that although
Palladium is supposed to be able to provide content security (among
other things), a broken Palladium implementation would allow extracting
the content from the virtual vault where it is kept sealed.  In that
case the now-decrypted content can indeed run everywhere.

This seems to present an inconsistency between the claimed strength of the
system and the description of its security behavior.  This discrepancy
may be why Palladium critics like Ross Anderson charge that Microsoft
intends to implement document revocation lists which would let Palladium
systems seek out and destroy illicitly shared documents and even programs.

Some have claimed that Microsoft is talking out of both sides of its
mouth, promising the content industry that it will be protected against
BORE attacks, while assuring the security/privacy community that the
system is limited in its capabilities.  If you could clear up this
discrepancy that would be helpful.  Thanks...




8pm update

2002-09-04 Thread Nomen Nescio

8pm update

Corralitos, September 14th, 2002.

A group of armed white supremacists, known to support anti-american activities and 
publicly calling for dismantling of US government, has been in stand off with police 
for six hours now. The incident started when a guest at Mr. May's party called the 
police to complain about being threatened with a weapon. Several neighbors also 
reported supicious gathering.

Additional SWAT forces are being called in.




Re: Cryptographic privacy protection in TCPA

2002-09-02 Thread Nomen Nescio

It looks like Camenisch  Lysyanskaya are patenting their credential
system.  This is from the online patent applications database:

http://appft1.uspto.gov/netacgi/nph-Parser?Sect1=PTO2Sect2=HITOFFp=1u=/netahtml/PTO/search-bool.htmlr=1f=Gl=50co1=ANDd=PG01s1=camenischOS=camenischRS=camenisch

 Non-transferable anonymous credential system with optional anonymity
 revocation

 Abstract

 The present invention relates to a method and system for securely
 proving ownership of pseudonymous or anonymous electronic credentials. A
 credential system is described consisting of users and organizations. An
 organization knows a user only by a pseudonym.  The pseudonyms of the
 same user, established for use with different organizations, cannot be
 linked. An organization can issue a credential to a pseudonym, and the
 corresponding user can prove possession of this credential to another
 organization that knows him under another pseudonym. During the prove of
 possession of the credential nothing besides the fact that he owns such
 a credential is revealed. A refinement of the credential system provides
 credentials for unlimited use, so called multiple-show credentials,
 and credentials for one-time use, so called one-show credentials.

Some of the claims seem a little broad, like this first one:

 1. A method for establishing a pseudonym system by having a certificate
 authority accepting a user as a new participant in said pseudonym system,
 the method comprising the steps of: receiving a first public key provided
 by said user; verifying that said user is allowed to join the system;
 computing a credential by signing the first public key using a secret
 key owned by said certificate authority; publishing said first public
 key and said credential.

Wouldn't this general description cover most proposed credential systems
in the past, such as those by Chaum or Brands?

Does anyone know how to contact the PTO regarding proposed patents,
perhaps to point out prior art?




Re: Cryptographic privacy protection in TCPA

2002-08-28 Thread Nomen Nescio

Carl Ellison suggested an alternate way that TCPA could work to allow
for revoking virtualized TPMs without the privacy problems associated
with the present systems, and the technical problems of the elaborate
cryptographic methods.

Consider first the simplest possible method, which is just to put a
single signature key in each TPM and allow the TPM to use that to sign
its messages on the net.  This is reliable and allows TPM keys to be
revoked, but it obviously offers no privacy.  Every usage of a TPM key
can be correlated as coming from a single system.

TCPA fixed this by adding a trusted third party, the Identity CA who
would be the only one to see the TPM key.  But Carl offers a different
solution.

Instead of burning only one key into the TPM, burn several.  Maybe even
a hundred.  And let these keys be shared with other TPMs.  Each TPM has
many keys, and each key has copies in many TPMs.

Now let the TPMs use their various keys to identify themselves in
transactions on the net.  Because each key belongs to many different
TPMs, and the set of TPMs varies for each key, this protects privacy.
Any given usage of a key can be narrowed down only to a large set of
TPMs that possess that key.

If a key is misused, i.e. scraped out of the TPM and used to create a
virtualized, rule-breaking software TPM, it can be revoked.  This means
that all the TPMs that share that one key lose the use of that key.
But it doesn't matter much, because they each have many more they can use.
Since it is expected that only a small percentage of TPMs will ever need
their keys revoked, most TPMs should always have plenty of keys to use.

One problem is that a virtualized TPM which loses one of its keys will
still have others that it can use.  Eventually those keys will also be
recognized as being mis-used and be revoked as well.  But it may take
quite a while before all the keys on its list are exhausted.

To fix this, Carl suggests that the TPM manufacturer keep a list of all
the public keys that are in each TPM.  Then when a particular TPM has
some substantial fraction of its keys revoked, that would be a sign that
the TPM itself had been virtualized and all the rest of the keys could be
immediately revoked.  The precise threshold for this would depend on the
details of the system, the number of keys per TPM, the number of TPMs that
share a key, the percentage of revoked keys, etc.  But it should not be
necessary to allow each TPM to go through its entire repertoire of keys,
one at a time, before a virtualized TPM can be removed from the system.

Carl indicated that he suggested this alternative early in the TCPA
planning process, but it was not accepted.  It does seem that while
the system has advantages, in some ways it shares the problems of the
alternatives.  It provides privacy, but not complete privacy, not as
much as the cryptographic schemes.  And it provides security to the TPM
issuers, but not complete security, not as much as the Privacy CA method.
In this way it can be seen as a compromise.  Often, compromise solutions
are perceived more in terms of their disadvantages than their benefits.




Chaum's unpatented ecash scheme

2002-08-21 Thread Nomen Nescio

David Chaum gave a talk at the Crypto 2002 conference recently in which
he briefly presented a number of interesting ideas, including an approach
to digital cash which he himself said would avoid the ecash patents.

The diagram he showed was as follows:


Optimistic Authenticator

 z = x^s

Payer f(m)^a z^b Bank
  -

[f(m)^a z^b]^s
  -

   m, f(m)^s
  -


It's hard to figure out what this means, but it bears resemblance to a
scheme discussed on the Coderpunks list in 1999, a variant on a blinding
method developed by David Wagner.  See
http://www.mail-archive.com/coderpunks@toad.com/msg02323.html for a
description, with a sketch of a proof of blindness at
http://www.mail-archive.com/coderpunks@toad.com/msg02387.html and
http://www.mail-archive.com/coderpunks@toad.com/msg02388.html.

In Chaum's diagram it is not clear which parts of the key are private and
which public, although z is presumably public.  Since the bank's action
is apparently to raise to the s power, s must be secret.  That suggests
that x is public.  However Chaum's system seems to require dividing by
(z^b)^s in order to unblind the value, and if s is secret, that doesn't
seem possible.

In Wagner's scheme everything was like this except that the bank's key
would be expressed as x = z^s, again with x and z public and s secret.
f(m) would be a one-way function, which gets doubly-blinded by being
raised to the a power and multiplied by z^b, where a and b are randomly
chosen blinding factors.  The bank raises this to its secret power s,
and the user unblinds to form f(m)^s.  To later deposit the coin he does
as in the third step, sending m and f(m)^s to the bank.

For the unblinding, the user can divide by (z^b)^s, which equals z^(b*s),
which equals (z^s)^b, which equals x^b.  Since x is public and the user
chose b, he can unblind the value.  Maybe the transcription above of the
Chaum scheme had a typo and it was actually similar to the Wagner method.

Chaum commented that the payer does not receive a signature in this
system, and that he doesn't need one because he is protected against
misbehavior by the bank.  This is apparently where the scheme gets
its name.




Re: Other uses of TCPA

2002-08-04 Thread Nomen Nescio

James Donald writes:

 I can only see one application for voluntary TCPA, and that is the
 application it was designed to perform:  Make it possible run
 software or content which is encrypted so that it will only run on
 one computer for one time period.

You've said this a few times, and while it is a plausible goal of the
designers, I don't actually see this specific capability in the TCPA spec,
nor is it mentioned in the Palladium white paper.

For TCPA, you'd have to have the software as a blob which is encrypted
to some key that is locked in the TPM.  But the problem is that the
endorsement key is never leaked except to the Privacy CA, so the content
provider can't encrypt to that key.  Then there are Identity keys which
are short-term generated keys that get signed by the Privacy CA, but
these are primarily used to prove that you are running a TCPA system.
I'm not even sure if they are decryption keys.  In any case they are
supposed to be relatively transient.  You get a new one each time you go
online so that your web activities are not linkable.  So I don't think
Identity keys would be very suitable for locking software too, either.

I admit that it would be unlikely for Microsoft to go to all the trouble
of creating Palladium, without using it to solve its own severe software
piracy problems.  So I certainly wouldn't be surprised to see some way
of achieving what you are talking about.  But it is not mentioned in the
white paper, and TCPA doesn't seem to support it very well.  If it was,
as you say, the application it was designed to perform, this fact is
far from apparent in the design documents.




Other uses of TCPA

2002-08-03 Thread Nomen Nescio

I think that people are beginning to understand that TCPA is not a
black and white issue.  It is neither the overwhelming threat that some
activists are describing, nor the panacea that the vendors are selling.
It is a technology with strengths and weaknesses.

As an exercise, try thinking of ways you could use TCPA to promote good
guy applications.  What could you do in a P2P network if you could
trust that all participants were running approved software?  And if you
could prevent third parties, including hostile governments, from seeing
the data being used by that software?  You may be surprised to find that
if you look at it with an open mind, TCPA could be a tremendous boon to
freedom-oriented technologies.  From file sharing to crypto protocols
to digital cash, TCPA lets you expand the trusted computing base to
the entire set of participating machines.  It's really a tremendously
powerful technology.

The biggest problem, ironically, is that TCPA may not be secure enough.
It's one thing to make video piracy difficult, it's another matter to keep
the Chinese government from prying into the sealed storage.  But with
future generations of TCPA integrated onto CPUs with improved tamper
resistance, it will be much more difficult to defeat the protections.
It may turn out that TCPA can significantly facilitate cypherpunk goals.




Re: Virtuallizing Palladium

2002-07-16 Thread Nomen Nescio

Ben Laurie wrote:
 Albion Zeglin wrote:
  Similar to DeCSS, only one Palladium chip needs to be reverse engineered and
  it's key(s) broken to virtualize the machine.

 If you break one machine's key:

 a) You won't need to virtualise it

 b) It won't be getting any new software licensed to it

This is true, if you do like DeCSS and try to publish software with the
key in it.  The content consortium will put the cert for that key onto
a CRL, and the key will stop working.

The other possibility is to simply keep the key secret and use it to strip
DRM protection from content, then release the now-free data publicly.
This will work especially well if the companies offer free downloads of
content with some kind of restrictions that you can strip off.  If you
have to pay for each download before you can release it for free, then
you better be a pretty generous guy.

Or maybe you can get paid for your efforts.  This could be the true
killer app for anonymous e-cash.




cypherpunks@einstein.ssz.com

2002-07-10 Thread Nomen Nescio

Nomen Nescio wrote:
  Are you saying that if someone is legally resident in the US
  for a while, the US IRS will attempt to get his assets all
  over the world forever?  I find this hard to believe.

On 10 Jul 2002 at 15:40, F. Marc de Piolenc wrote:
 Not necessarily get them, but tax them. Believe!

So what you are suggesting is that I might as well take out US
citizenship, since the IRS behaves just as piratically and
imperially to anyone who gets a job in the US?




Tax consequences of becoming a US citizen

2002-07-09 Thread Nomen Nescio

On Tue, Jul 09, at 02:02PM, Tim May wrote:
  Also, a person having extensive offshore (outside the U.S.)
  assets may well find his assets are now taxable in the U.S.
  And for those with capital assets not taxed in their home
  countries (e.g., Germany, Japan), this may be quite a shock.

On 9 Jul 2002 at 18:40, Gabriel Rocha wrote:
 This applies wether he is a US citizen or not, green card holder
 or not, Sealand citizen or not. Once the IRS sinkstheir claws
 into you, you're screwed.

Are you saying that if someone is legally resident in the US for a
while, the US IRS will attempt to get his assets all over the
world forever?  I find this hard to believe.




Re: on 'evil' as an abbreviation

2002-07-01 Thread Nomen Nescio

 Evil = bad = counter to our goals.  One of our goals is to have
 general-purpose computers widely available.  A DRM layer between us
 and the hardware is counter to that goal, ergo, undesirable from this
 perspective.

 Its like a governor in a car.  Do you want one in yours?   Are you willing
 to pay for the decreased driving flexibility and decreased reliability
 (extra parts, after all) of your car?

Sure, I might put a governor in my car if it would lower my insurance
rates.  And I might use a DRM system if it let me download music and
video that I wanted, while remaining compliant with the creators' wishes.

 What makes you think you can require one in mine?

We're talking about voluntary systems here.  Ryan said that DRM was
evil even if voluntary.




Re: Ross's TCPA paper

2002-06-23 Thread Nomen Nescio

Lucky Green writes regarding Ross Anderson's paper at:
http://www.ftp.cl.cam.ac.uk/ftp/users/rja14/toulouse.pdf

 I must confess that after reading the paper I am quite relieved to
 finally have solid confirmation that at least one other person has
 realized (outside the authors and proponents of the bill) that the
 Hollings bill, while failing to mention TCPA anywhere in the text of the
 bill, was written with the specific technology provided by the TCPA in
 mind for the purpose of mandating the inclusion of this technology in
 all future general-purpose computing platforms, now that the technology
 has been tested, is ready to ship, and the BIOS vendors are on side.

It's an interesting claim, but there is only one small problem.
Neither Ross Anderson nor Lucky Green offers any evidence that the TCPA
(http://www.trustedcomputing.org) is being designed for the support of
digital rights management (DRM) applications.

In fact if you look at the documents on the TCPA web site you see much
discussion of applications such as platform-based ecommerce (so that
even if a user's keys get stolen they can't be used on another PC),
securing corporate networks (assuring that each workstation is running
an IT-approved configuration), detecting viruses, and enhancing the
security of VPNs.

DRM is not mentioned.

Is the claim by Ross and Lucky that the TCPA is a fraud, secretly designed
for the purpose of supporting DRM while using the applications above
merely as a cover to hide their true purposes?  If so, shouldn't we expect
to see the media content companies as supporters of this effort?  But the
membership list at http://www.trustedcomputing.org/tcpaasp4/members.asp
shows none of the usual suspects.  Disney's not there.  Sony's not there.
No Viacom, no AOL/Time/Warner, no News Corp.  The members are all
technology companies, including crypto companies like RSA, Verisign
and nCipher.

Contrast this for example with the Brodcast Protection Discussion
Group whose ongoing efforts are being monitored by the EFF at
http://www.eff.org/IP/Video/HDTV/.  There you do find the big media
companies.  That effort is plainly aimed at protecting information and
supporting DRM, so it makes sense that the companies most interested in
those goals are involved.

But with the TCPA, the players are completely different.  And unlike
with the BPDG, the rationale being offered is not based on DRM but on
improving the trustworthiness of software for many applications.

Ross and Lucky should justify their claims to the community in general
and to the members of the TCPA in particular.  If you're going to make
accusations, you are obliged to offer evidence.  Is the TCPA really, as
they claim, a secretive effort to get DRM hardware into consumer PCs?
Or is it, as the documents on the web site claim, a general effort to
improve the security in systems and to provide new capabilities for
improving the trustworthiness of computing platforms?




Re: Safe RSA variant?

2002-06-14 Thread Nomen Nescio

Jason Holt writes:
 Trent generates primes p,q.  He publishes n=pq and some random value g.

 Trent calculates a and a' such that aa' = 1 % (p-1)(q-1) and a' is prime.  He
 sends Alice a' and g^a%n.  a' is her secret exponent and g^a%n her public
 value.

Another way to think of g^a is as the a'-th root of g, since (g^a)^a' = g
mod n.  If we instead use k instead of a', then Alice gets k and the kth
root of g.

 Bob can establish a shared secret with Alice if Alice got a' from Trent.  He
 picks a random r and sends her g^ar%n.  She raises it to a' to compute the
 shared secret g^r%n.

In my notion, she publishes her kth root of g, Bob raises it to the rth
power, and Alice then raises it to the kth power to recover g^r.

 So the important questions are:

 * Given g^a%n and a', can Alice derive (p-1)(q-1)?  If so, she'd be able to
 take over Trent's job.

No, given g and the kth root of g, she clearly can't find phi(n), because
every RSA signature supplies such a pair.

 * Given g^k%n and k' for lots of different k, can we derive (p-1)(q-1) or
 otherwise imitate Trent's ability to give out (g^k%n, k') pairs?

I think this is OK too.  See the Strong RSA Assumption, for example at
http://www.zurich.ibm.com/security/ace/sig.pdf.  Basically this says that
you can't find kth roots mod an RSA modulus without knowing the factors.

You might want to ask this on sci.crypt, they are pretty good with pure
math questions like this one.




Re: Laurie's blinding w/cut and choose?

2002-06-05 Thread Nomen Nescio

Jason Holt writes:
   In his paper on Lucre (2nd defence against marking):
 http://anoncvs.aldigital.co.uk/lucre/

   Ben Laurie gives this as a (possibly patent-free) blinding technique,
 where h is the message, and g is the public generator:

 r = blind(h) = h^y * g^b (mod p)

   To sign,

 s = sign(r) = m^h

   To unblind,

 (s/g^k^b)^(1/y) (mod p)

   (where k is the signer's secret exponent. Of course, nobody but the
 signer can verify the signature).  Unfortunately, this doesn't work with cut
 and choose where the signer signs the product of unrevealed documents, since 
 the 1/y exponent above would distribute to all the internal terms:

Boy, you've got a lot of faith asking this question on cypherpunks.
It's not exactly the intellectual center of the crypto freedom movement
these days, you know.  The average IQ is rapidly descending into double
digits, even not counting Choate.  But let's see what we can do for you.

First, let's fix your notation.

r = blind(h) = h^y * g^b  OK
s = sign(r) = r^k, not m^h.
unblind(s) = (s/g^k^b)^(1/y) = h^k = sign(h).

That's what you want to end up with, h^k, as the pseudo-signature on h.

Now for a credential system, you apparently want to create a bunch
of values which have some structure, and get a signature on a product
of them.  Using cut and choose, the client will prepare blinded forms
of all of the values, then the server will ask for half of the blinding
factors to be revealed.  This exposes the raw values to be signed and
the server can make sure they are in the right form.  If so, it then
signs the product of the remaining values, which the client unblinds to
get back a good signature on the product of the unblinded values.

The fundamental problem with this is that the blinding factors have to
be different for each of the values.  If they are all the same, then
when they are revealed for some of the values during cut and choose,
that will reveal them for all of them, and so none of them will be
effectively blinded any more.

But if the blinding factors are all different, we can't unblind since
we don't have a unique power 1/y to raise to.

That's your problem, right?

Here are a couple of possible solutions.  First, you could do a cut and
choose in which all but one of the blinded values are revealed, and only
the remaining (unrevealed) one is signed.  This has the problem that it
has only a 1/n security factor with n values.  That is, the client can
just guess which one the server won't ask to check, and if it sent say 100
values, it has a 1/100 chance of getting lucky, which might seem too high.

However since credential issuing usually occurs in a non-anonymous
context, you can afford to penalize people very heavily if they are
caught in this manner.  (Cutting the connection and refusing to resume
with the previous values has to count as cheating.)

Another approach is as follows.  Go back to the 50-50 cut and choose
with signature on the product.  However, use the same y blinding factor
for all of the values.  Now when the client has to reveal during cut and
choose, it keeps the y value secret but reveals all of the h and b values.
It then proves in zero knowledge that there exists a y such that the h^y
equals the required value.  This is a standard ZK proof of knowledge
of a discrete logarithm.  It is similar to the example Ben's paper gives
of how the bank can prove it is raising to the right power.

Since you don't have to reveal y, you can use the same y for all of them
and successfully perform the unblind operation, getting back the signature
on the product of the h's as required.

But actually another solution is much simpler, which is to do blinding
as just h * g^b, without a y factor.  That works fine as long as the
bank is known not to be misbehaving.  Ben's paper shows how the bank
can use a ZK proof to show that it is raising to the same power k every
time, basically again that same ZK proof regarding discrete logarithms.
If the bank uses such a proof then you can use simpler blinding without
a y factor, and you can recover the signature on the product of your h
values by dividing by g^k^(sum of b's).

So there you go.  A little technical for cypherpunks, but unfortunately
coderpunks, like the little old lady, has fallen and it can't get up.




Re: 2 Challenge Gun Cases, Citing Bush Policy

2002-06-01 Thread Nomen Nescio

   Is there any other possible interpretation other than that 
we have no other choice than to take up arms against the police,
the FBI, or any other TLA, that seeks to deprive us of our rights?
   Ask yourselves -- what would Jefferson or Washington do at this moment?
Ask yourselves -- what is your personal responsibility? 
   For myself -- I can think of nothing personaly more fulfiliing than to 
come upon a cop or a SWAT team arresting someone for drug or gun violation,
and being able to kill each and every one from behind. 
   Don't expose yourselves -- always shoot from behind. But know this one thing -- you 
are morally upright, and the more cops you kill, the more holy 
you are!




Re: FC: Hollywood wants to plug analog hole, regulate A-D converters

2002-05-30 Thread Nomen Nescio

Peter Trei writes:
 My mind has been boggled, my flabbers have been ghasted.

 In the name of protecting their business model, the MPAA
 proposes that every analog/digital (A/D) converter - one of
 the most basic of chips - be required to check for US
 government mandated copyright flags. Quite aside from
 increasing the cost and complexity of the devices many,
 manyfold, it eliminates the ability of the US to compete
 in the world electronics market.

This is absurd.  In all the commentary on this issue, no one has made
the obvious point that the MPAA has no interest or intention in putting
watermark detectors into every ADC chip!  They don't care about the ADC
chip in a digital thermometer or even a cell phone.  All they care about
are things like PC video capture cards, which are high fidelty consumer
devices capable of digitizing copyright protected content.

Their white paper is a brief summary of their goals and intentions and
does not go into full technical detail.  But let's use a little common
sense here, folks.

It's pointless to try to shoot down this proposal by raising all these
horror stories about ADC chips in industrial and technical devices
being crippled by a watermark detector which will never be activated.
If you waste time developing this line of argument, you will be left
with nothing to say when the actual bill focuses only on the specific
devices that the content holders are worried about.

And sure, a sufficiently talented electrical engineer can produce a custom
board to do non-watermark-aware ADC, and digitize TV shows and music.
The MPAA has to accept that such activity will continue to go on at a
low level.  They just want to make sure that consumer devices are not
sold that enable every customer to make easy digital copies of copyrighted
data based on an analog source, as they can now with the Replay DVR.

Please, let's use some common sense and not go overboard with an obviously
mistaken interpretation of the MPAA's intentions.  That wastes everyone's
time.




Re: Detectable cash notes a fantasy

2002-04-10 Thread Nomen Nescio

Tim May writes:
 I'll go back to lurking, as this thread, so to speak, is not 
 interesting to me.

 (More interesting is reading Chris Hillman's page with his Categorical 
 Primer on it, http://www.math.washington.edu/~hillman/papers.html. And 
 to BL and JA, I downloaded O'CAML and picked up a couple of ML texts--I 

Go away.