Re: [cryptography] 2010 TAO QUANTUMINSERT trial against 300 (hard) targets

2014-03-13 Thread Jeffrey Walton
On Thu, Mar 13, 2014 at 1:57 AM, coderman coder...@gmail.com wrote: https://s3.amazonaws.com/s3.documentcloud.org/documents/1076891/there-is-more-than-one-way-to-quantum.pdf TAO implants were deployed via QUANTUMINSERT to targets that were un-exploitable by _any_ other means. And Schneier's

[cryptography] TAO QUANTUMINSERT Bonanza

2014-03-13 Thread John Young
If NSA and GCHQ were, are, doing these alleged operations as surmised with slightest evidence greatly amplified, cherry-picked and moshed like a Tom Clancy hot seller, it is likely the Devil's Duo are meticulously tracking, siphoning and implanting: 1. Those reporting, editing, checking,

Re: [cryptography] TAO QUANTUMINSERT Bonanza

2014-03-13 Thread John Young
Thanks, Ed, comsec evangelist extraordinaire. If the media operation goes well Snowden could die penniless like the genius Tesla was aced by profit-driven Edison. ___ cryptography mailing list cryptography@randombit.net

Re: [cryptography] 2010 TAO QUANTUMINSERT trial against 300 (hard) targets

2014-03-13 Thread Jeffrey Walton
On Thu, Mar 13, 2014 at 9:17 AM, Jason Iannone jason.iann...@gmail.com wrote: Are there details regarding Hammerstein? Are they actually breaking routers? Cisco makes regular appearances on Bugtraq an Full Disclosure. Pound for pound, there's probably more exploits for Cisco gear than Linux and

Re: [cryptography] 2010 TAO QUANTUMINSERT trial against 300 (hard) targets

2014-03-13 Thread Jason Iannone
The First Look article is light on details so I don't know how one gets from infect[ing] large-scale network routers to perform[ing] exploitation attacks against data that is sent through a Virtual Private Network. I'd like to better understand that. On Thu, Mar 13, 2014 at 7:22 AM, Jeffrey

[cryptography] Comsec as Public Utility Beyond Illusory Privacy

2014-03-13 Thread John Young
Snowden may have raised the prospect of comsec as a public utility like power, water, gas, sewage, air quality, environmental protection and telecommunications. Privacy protection has been shown to be illusory at best, deceptive at worst, due to the uncontrollable technology applied erroneously

Re: [cryptography] Comsec as Public Utility Beyond Illusory Privacy

2014-03-13 Thread Kevin
On 3/13/2014 9:59 AM, John Young wrote: Snowden may have raised the prospect of comsec as a public utility like power, water, gas, sewage, air quality, environmental protection and telecommunications. Privacy protection has been shown to be illusory at best, deceptive at worst, due to the

Re: [cryptography] Comsec as Public Utility Beyond Illusory Privacy

2014-03-13 Thread Jeffrey Walton
Freedom of comsec, say, as a new entry in the US Bill of Rights could lead the way for it to be a fundamental element of Human Rights. The Right to Privacy by Warren and Brandeis (1890) FTW! NSA's ubiquitous spying on everybody at home and elsewhere with technology beyond accountability does

Re: [cryptography] 2010 TAO QUANTUMINSERT trial against 300 (hard) targets

2014-03-13 Thread Greg Rose
You get the routers to create valid-looking certificates for the endpoints, to mount man-in-the-middle attacks. On Mar 13, 2014, at 6:28 , Jason Iannone jason.iann...@gmail.com wrote: The First Look article is light on details so I don't know how one gets from infect[ing] large-scale network

Re: [cryptography] 2010 TAO QUANTUMINSERT trial against 300 (hard) targets

2014-03-13 Thread Jason Iannone
And remain undetected? That's a nontrivial task and one that I would suspect generates interesting CPU or other resource utilization anomalies. It's a pretty high risk activity. The best we can hope for is someone discovering the exploit and publicly dissecting it. On Thu, Mar 13, 2014 at

Re: [cryptography] Comsec as Public Utility Beyond Illusory Privacy

2014-03-13 Thread tpb-crypto
Okay, isn't this a bit over the top? -- Kevin Over the top you say? I will tell you what is over the top ... The US and UK are doing the digital equivalent of the medieval practice of throwing corpses, rats and dead cats over the fence of our backyards on the mere suspicion that we

Re: [cryptography] Comsec as Public Utility Beyond Illusory Privacy

2014-03-13 Thread tpb-crypto
Message du 13/03/14 15:33 De : John Young A : cypherpu...@cpunks.org, cryptography@randombit.net, crypt...@freelists.org Copie à : Objet : Comsec as Public Utility Beyond Illusory Privacy Snowden may have raised the prospect of comsec as a public utility like power, water, gas,

[cryptography] Privacy Enforced [was: Comsec as Public Utility Beyond Illusory Privacy]

2014-03-13 Thread coderman
On Thu, Mar 13, 2014 at 6:59 AM, John Young j...@pipeline.com wrote: Snowden may have raised the prospect of comsec as a public utility like power, water, gas, sewage, air quality, environmental protection and telecommunications... Comsec as a right for human discourse rather than a

Re: [cryptography] Privacy Enforced [was: Comsec as Public Utility Beyond Illusory Privacy]

2014-03-13 Thread Alexandre Anzala-Yamajako
If OpenSSL has taught us one thing over the years it's that collaborative dev doesn't mean perfection and far from it. Also this : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0092 Also your first point sounds a lot like privacy is not a right you have but something that has to earned

Re: [cryptography] Privacy Enforced [was: Comsec as Public Utility Beyond Illusory Privacy]

2014-03-13 Thread coderman
On Thu, Mar 13, 2014 at 9:47 AM, Alexandre Anzala-Yamajako anzal...@gmail.com wrote: If OpenSSL has taught us one thing over the years it's that collaborative dev doesn't mean perfection and far from it. you'll notice that my focus is on testing and breaking, not developing. i agree in full

Re: [cryptography] 2010 TAO QUANTUMINSERT trial against 300 (hard) targets

2014-03-13 Thread Peter Gutmann
Greg Rose g...@seer-grog.net writes: You get the routers to create valid-looking certificates for the endpoints, to mount man-in-the-middle attacks. This is relatively easy for home routers, since the self-signed certs they're configured with are frequently CA certs. In other words they ship