On Thu, Mar 13, 2014 at 1:57 AM, coderman coder...@gmail.com wrote:
https://s3.amazonaws.com/s3.documentcloud.org/documents/1076891/there-is-more-than-one-way-to-quantum.pdf
TAO implants were deployed via QUANTUMINSERT to targets that were
un-exploitable by _any_ other means.
And Schneier's
If NSA and GCHQ were, are, doing these alleged operations as surmised
with slightest evidence greatly amplified, cherry-picked and moshed like
a Tom Clancy hot seller, it is likely the Devil's Duo are meticulously
tracking, siphoning and implanting:
1. Those reporting, editing, checking,
Thanks, Ed, comsec evangelist extraordinaire. If the media operation
goes well Snowden could die penniless like the genius Tesla was aced
by profit-driven Edison.
___
cryptography mailing list
cryptography@randombit.net
On Thu, Mar 13, 2014 at 9:17 AM, Jason Iannone jason.iann...@gmail.com wrote:
Are there details regarding Hammerstein? Are they actually breaking
routers?
Cisco makes regular appearances on Bugtraq an Full Disclosure. Pound
for pound, there's probably more exploits for Cisco gear than Linux
and
The First Look article is light on details so I don't know how one gets
from infect[ing] large-scale network routers to perform[ing]
exploitation attacks against data that is sent through a Virtual Private
Network. I'd like to better understand that.
On Thu, Mar 13, 2014 at 7:22 AM, Jeffrey
Snowden may have raised the prospect of comsec as a public utility
like power, water, gas, sewage, air quality, environmental protection
and telecommunications. Privacy protection has been shown to be
illusory at best, deceptive at worst, due to the uncontrollable
technology applied erroneously
On 3/13/2014 9:59 AM, John Young wrote:
Snowden may have raised the prospect of comsec as a public utility
like power, water, gas, sewage, air quality, environmental protection
and telecommunications. Privacy protection has been shown to be
illusory at best, deceptive at worst, due to the
Freedom of comsec, say, as a new entry in the US Bill of Rights
could lead the way for it to be a fundamental element of Human
Rights.
The Right to Privacy by Warren and Brandeis (1890) FTW!
NSA's ubiquitous spying on everybody at home and elsewhere
with technology beyond accountability does
You get the routers to create valid-looking certificates for the endpoints, to
mount man-in-the-middle attacks.
On Mar 13, 2014, at 6:28 , Jason Iannone jason.iann...@gmail.com wrote:
The First Look article is light on details so I don't know how one gets from
infect[ing] large-scale network
And remain undetected? That's a nontrivial task and one that I would
suspect generates interesting CPU or other resource utilization anomalies.
It's a pretty high risk activity. The best we can hope for is someone
discovering the exploit and publicly dissecting it.
On Thu, Mar 13, 2014 at
Okay, isn't this a bit over the top?
--
Kevin
Over the top you say? I will tell you what is over the top ...
The US and UK are doing the digital equivalent of the medieval practice of
throwing corpses, rats and dead cats over the fence of our backyards on the
mere suspicion that we
Message du 13/03/14 15:33
De : John Young
A : cypherpu...@cpunks.org, cryptography@randombit.net, crypt...@freelists.org
Copie à :
Objet : Comsec as Public Utility Beyond Illusory Privacy
Snowden may have raised the prospect of comsec as a public utility
like power, water, gas,
On Thu, Mar 13, 2014 at 6:59 AM, John Young j...@pipeline.com wrote:
Snowden may have raised the prospect of comsec as a public utility
like power, water, gas, sewage, air quality, environmental protection
and telecommunications...
Comsec as a right for human discourse rather than a
If OpenSSL has taught us one thing over the years it's that collaborative
dev doesn't mean perfection and far from it.
Also this : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0092
Also your first point sounds a lot like privacy is not a right you have but
something that has to earned
On Thu, Mar 13, 2014 at 9:47 AM, Alexandre Anzala-Yamajako
anzal...@gmail.com wrote:
If OpenSSL has taught us one thing over the years it's that collaborative
dev doesn't mean perfection and far from it.
you'll notice that my focus is on testing and breaking, not developing.
i agree in full
Greg Rose g...@seer-grog.net writes:
You get the routers to create valid-looking certificates for the endpoints,
to mount man-in-the-middle attacks.
This is relatively easy for home routers, since the self-signed certs they're
configured with are frequently CA certs. In other words they ship
16 matches
Mail list logo