Re: [cryptography] Constitutional Showdown Voided as Feds Decrypt Laptop

2012-03-01 Thread Jeffrey Walton
On Wed, Feb 29, 2012 at 5:53 PM, James S. Tyre jst...@jstyre.com wrote: (This is the case in Colorado, not the 11th Circuit Court of Appeals case which has been much discussed of late.) http://www.wired.com/threatlevel/2012/02/decryption-flap-mooted Constitutional Showdown Voided as Feds

[cryptography] Certificate Transparency: working code

2012-03-01 Thread Ben Laurie
http://www.links.org/?p=1226 Certificate Transparency: Spec and Working Codehttp://www.links.org/?p=1226 Quite a few people have said to me that Certificate Transparency (CT) sounds like a good idea, but they’d like to see a proper spec. Well, there’s been one of those for quite a while, you

Re: [cryptography] Certificate Transparency: working code

2012-03-01 Thread Thierry Moreau
Ben Laurie wrote: http://www.links.org/?p=1226 Quite a few people have said to me that Certificate Transparency (CT) sounds like a good idea, but they’d like to see a proper spec. Well, there’s been one of those for quite a while, you can find the latest version [...], or for your viewing

Re: [cryptography] Certificate Transparency: working code

2012-03-01 Thread James A. Donald
On 2012-03-02 7:14 AM, Thierry Moreau wrote: Then what remains of the scheme reputation once Mallory managed to inject a fraudulent certificate in whatever is being audited (It's called a log but I understand it as a grow-only repository)? Suppose an Iranian CA were to issue certificate for a

Re: [cryptography] Constitutional Showdown Voided as Feds Decrypt Laptop

2012-03-01 Thread Jeffrey Walton
On Thu, Mar 1, 2012 at 5:49 PM, Steven Bellovin s...@cs.columbia.edu wrote: On Mar 1, 2012, at 4:33 12PM, Nico Williams wrote: On Thu, Mar 1, 2012 at 3:22 PM, Randall  Webmail rv...@insightbb.com wrote: From: Jeffrey Walton noloa...@gmail.com Perhaps Fricosu reused a password and was on a

Re: [cryptography] Constitutional Showdown Voided as Feds Decrypt Laptop

2012-03-01 Thread Nico Williams
IOW, I doubt mailman is how they got Fricosu's password. ___ cryptography mailing list cryptography@randombit.net http://lists.randombit.net/mailman/listinfo/cryptography

Re: [cryptography] Constitutional Showdown Voided as Feds Decrypt Laptop

2012-03-01 Thread James A. Donald
On 2012-03-01 8:53 AM, James S. Tyre wrote: The authorities seized the encrypted Toshiba laptop from defendant Ramona Fricosu in 2010 with valid court warrants while investigating alleged mortgage fraud, and demanded she decrypt it. Colorado U.S. District Judge Robert Blackburn ordered the

Re: [cryptography] Constitutional Showdown Voided as Feds Decrypt Laptop

2012-03-01 Thread Jeffrey I. Schiller
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 s/are/our/ grrr... :-) - - -- ___ Jeffrey I. Schiller MIT Technologist, Consultant, and Cavy Breeder Cambridge, MA 02139-4307

Re: [cryptography] Constitutional Showdown Voided as Feds Decrypt Laptop

2012-03-01 Thread Steven Bellovin
On Mar 1, 2012, at 8:18 32PM, Jeffrey I. Schiller wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 03/01/2012 06:09 PM, Nico Williams wrote: I let mailman generate passwords. And I never use them, much less re-use them. Well, I do use them when I need to change e-mail addresses,

Re: [cryptography] cryptography Digest, Vol 25, Issue 3

2012-03-01 Thread พรเพ็ญ สุวรรณสุข
SIGNATURE- -- next part -- A non-text attachment was scrubbed... Name: smime.p7s Type: application/pkcs7-signature Size: 4881 bytes Desc: S/MIME Cryptographic Signature URL: http://lists.randombit.net/pipermail/cryptography/attachments/20120301/97b82e64

Re: [cryptography] cryptography Digest, Vol 25, Issue 2

2012-03-01 Thread พรเพ็ญ สุวรรณสุข
From: cryptography-requ...@randombit.net Subject: cryptography Digest, Vol 25, Issue 2 To: cryptography@randombit.net Date: Thu, 1 Mar 2012 17:04:14 -0500 Send cryptography mailing list submissions to cryptography@randombit.net To subscribe or unsubscribe via the World Wide Web,

[cryptography] The NSA and secure VoIP

2012-03-01 Thread Steven Bellovin
http://www.scmagazine.com.au/News/292189,nsa-builds-android-phone-for-top-secret-calls.aspx makes for interesting reading. I was particularly intrigued by this: Voice calls are encrypted twice in accordance with NSA policy, using IPSEC and SRTP, meaning a failure requires “two

Re: [cryptography] The NSA and secure VoIP

2012-03-01 Thread John Case
On Thu, 1 Mar 2012, Jeffrey Walton wrote: On Thu, Mar 1, 2012 at 10:27 PM, Steven Bellovin s...@cs.columbia.edu wrote: http://www.scmagazine.com.au/News/292189,nsa-builds-android-phone-for-top-secret-calls.aspx makes for interesting reading.  I was particularly intrigued by this:        

Re: [cryptography] The NSA and secure VoIP

2012-03-01 Thread coderman
On Thu, Mar 1, 2012 at 7:31 PM, Jeffrey Walton noloa...@gmail.com wrote: ... Interesting. I seem to recall that cascading ciphers is frowned upon on sci.crypt. I wonder if this is mis-information you've got a single cipher suite applied for a given transport layer, but two layers of

Re: [cryptography] The NSA and secure VoIP

2012-03-01 Thread Nasko Oskov
On Thu, Mar 01, 2012 at 09:08:54PM -0800, coderman wrote: On Thu, Mar 1, 2012 at 7:31 PM, Jeffrey Walton noloa...@gmail.com wrote: ... Interesting. I seem to recall that cascading ciphers is frowned upon on sci.crypt. I wonder if this is mis-information you've got a single cipher suite