better at your job and we need EVERYONE to step up and be better at
their jobs
Visitors, readers, consumers must be skeptical of security ...
Advocacy of skepticism is rendered ineffective if that advocacy extends
to skepticism of logic and mathematics.
--
-- StealthMonger
Long, random
.
The only individual in the universe who is qualified to authoritatively
deny the actress' claim is Ann. To convince Bob, she needs something
the actress cannot have, such as the password to her encryption key.
--
-- StealthMonger
Long, random latency is part of the price of Internet
and publicly declaring that
any expression purporting to be from her but not signed by her private
key is a forgery.
On the Internet, your identity is your private key. If you have no
private key, you have no Internet identity.
--
-- StealthMonger stealthmon...@nym.mixmin.net who herewith
of RFC 1855, Netiquette Guidelines? There
it is stated among other things that It is extremely bad form to simply
reply to a message by including all the previous message: edit out all
the irrelevant material.
--
-- StealthMonger stealthmon...@nym.mixmin.net
Long, random latency is part
by the appropriate key and presented. Other messages are discarded.
[1] See mailto URL below.
--
-- StealthMonger stealthmon...@nym.mixmin.net
Long, random latency is part of the price of Internet anonymity.
anonget: Is this anonymous browsing, or what?
http://groups.google.ws
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Steven Bellovin s...@cs.columbia.edu writes:
Ever since Microsoft bought the company, these rumors have been
floating around.
If they're innocent, why would they not issue an unequivocal denial
with supporting argument?
- --
-- StealthMonger
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
James A. Donald jam...@echeque.com writes:
On 2013-03-06 4:41 AM, StealthMonger wrote:
2. Prospective customer verification of merchant: Merchant includes
the ID of its signing key in every advertisement and repeatedly
admonishes prospects
: Merchants don't deal with
people. They deal with keys. It's the key that has the purchasing
power, not some person. Nobody has the illusion that correlation
between key and person is any stronger than that person's security
habits.
4. Etc.
- --
-- StealthMonger stealthmon...@nym.mixmin.net
key ring for certificate material.
- --
-- StealthMonger stealthmon...@nym.mixmin.net
Long, random latency is part of the price of Internet anonymity.
anonget: Is this anonymous browsing, or what?
http://groups.google.ws/group/alt.privacy.anon-server/msg/073f34abb668df33?dmode
.
- --
-- StealthMonger stealthmon...@nym.mixmin.net
Long, random latency is part of the price of Internet anonymity.
anonget: Is this anonymous browsing, or what?
http://groups.google.ws/group/alt.privacy.anon-server/msg/073f34abb668df33?dmode=sourceoutput=gplain
stealthmail: Hide whether you're doing
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
James A. Donald jam...@echeque.com writes:
On 2012-09-05 11:51 PM, StealthMonger wrote:
Can there be a cryptographic dead man switch? A secret is to be
revealed only if/when signed messages stop appearing. It is to be
cryptographically strong
third parties out.
- --
-- StealthMonger stealthmon...@nym.mixmin.net
Long, random latency is part of the price of Internet anonymity.
anonget: Is this anonymous browsing, or what?
http://groups.google.ws/group/alt.privacy.anon-server/msg/073f34abb668df33?dmode=sourceoutput=gplain
the Grantor wants
to keep secret, even from the Trustee, the locations of his caches of
gold until such time as he is no longer able to send signed messages.
Each signed message has to somehow avert revelation of the secret for
another time period (three months, say).
- --
-- StealthMonger
. What actually happened was a high profile weapon - the export
control - was loosened up enough just enough to make many think we'd
won. All the low-profile weapons were left in place.
It's world-class protracted social engineering. Orchestrated by whom?
- --
-- StealthMonger
won, crypto would be in widespread use today for
email. As it is, enough FUD and confusion was sown to avert that
outcome. Even on geek mailing lists such as this, signatures are
rare.
- --
-- StealthMonger stealthmon...@nym.mixmin.net
Long, random latency is part of the price
. Similarly, would-be
email correspondents can get each other's public keys.
- --
-- StealthMonger stealthmon...@nym.mixmin.net
Long, random latency is part of the price of Internet anonymity.
anonget: Is this anonymous browsing, or what?
http://groups.google.ws/group/alt.privacy.anon
doesn't matter. What
matters is that Grandma took an interest in the product associated
with that Key ID. She enters that key into her local key book (like
a phone book) and refers to it when she wants to learn more about the
product, or to buy it.
- --
-- StealthMonger stealthmon
participate in ... politics you must change [your
society's] culture
No, you may simply go your own way in peace.
- --
-- StealthMonger stealthmon...@nym.mixmin.net
Long, random latency is part of the price of Internet anonymity.
uinmyn: Is this anonymous browsing, or what
18 matches
Mail list logo