Re: ecash, cut & choose and private credentials (Re: Jim Bell)

2000-12-03 Thread Adam Back
James wrote: > Adam Back wrote: > > Hal says: > > > > > > http://www.finney.org/~hal/chcash1.html and > > > http://www.finney.org/~hal/chcash2.html > > > > Wow look at the dates on those files -- Oct 93, and we still no > > deployed

ecash, cut & choose and private credentials (Re: Jim Bell)

2000-11-28 Thread Adam Back
[Hey Hal, what happened to your Chaum's ecash description? Can't find it to link to]. Anonymous wrote: > Ray wrote: > > Even if she provides enough > > tokens to completely populate the cut-and-choose protocol, > > those tokens still have to have splits of valid identification > > informatio

link padding & traffic analysis (Re: ZKS -- the path to world domination)

2000-11-22 Thread Adam Back
Obfuscation writes: > Adam Back writes: > > It's as strong as we could make it. Private interactive > > communications are a hard problem. As Wei and I were discussing in > > the "PipeNet protocol" thread in the last couple of weeks, there are 4 > >

ZKS "Smart Privacy Policies"

2000-10-31 Thread Adam Back
[Sent this once from a dud address trying to work around a mail problem -- apologies for duplicates] cypherpunk agent X wrote: > Here we get to the meat of the issue... the > item that NAI tried to force down our throats...Corporate Key Escrow.. > this time via key splitting... Shades of the NSA

auditable gaming PRNGs (Re: PRNG server)

2000-09-03 Thread Adam Back
Seems to me you can do better with a gaming server. If the gaming server servers RNGs in a sequence such that each sample in the sequence can be verified, they don't need to trust the server; or at least there is an audit function. Eg. say that the server publishes subsequent pre-images in a ha

Re: [YARROW] PRNG server

2000-08-30 Thread Adam Back
Mark writes: > You'd need to prtect the numbers thus served; they'd be no use if an > ethernet snooper could pick them up, so the distribution channel > should be at least encrypted. (SSH and SSL could both be used). Problem I see is: where do you get the key material to securely exchange random

Re: /dev/random (Re: deriving yarrow test vectors)

2000-08-28 Thread Adam Back
HJ Keller writes: > On Fri, Aug 25, 2000 at 09:54:02PM -0400, Adam Back wrote: > > You can see the effect if you do: > > > > % od -x < /dev/random > > > > and hold down for example the control key, or any other key. You get > > a continuous stream of

betting pools out AP (Re: family of russion sub victims drugged)

2000-08-26 Thread Adam Back
Tim writes: > [...] > > Untraceable contract killings, crypto anarchy, is about to make > possible a wave of justice the world has never seen. Forget Bell's > hoaky, and cumbersome, "betting pool." Easier to simply hire > assassins untraceably. (If bets can be placed untraceably, contracts >

ADK and keyrings?

2000-08-26 Thread Adam Back
Has anyone tried attaching unsigned ADK ARR packets to keys and resubmitting them to keyservers -- and seeing if they stick? Might be kind of poetic if some ARR packets got stuck to public keys of PGP employees who where arguing for ARRs. Now where did that NSA key I got out of Lotus notes go :

/dev/random (Re: deriving yarrow test vectors)

2000-08-25 Thread Adam Back
Eric wrote: > Adam wrote: > > There is for example code in PGP which looks at inter key press > > timings, and constructs 1st and 2nd order differentials to try to > > avoid stuck keys, people pressing the same key repeatedly etc. > > There's also the code in the linux /dev/random implementation

deriving yarrow test vectors

2000-08-24 Thread Adam Back
We would like to encourage people who have written yarrow implementations to participate in deriving test vectors. By arriving at a standard set of test vectors, we can better assure ourselves that implementations are consistent with the specification, and iron out different interpretations of

mailcrypt-3.5.x security patch

2000-08-19 Thread Adam Back
tiple identities, with an entry in your .emacs file which looks like this: (set-variable 'mc-pgp-user-id "Adam Back <[EMAIL PROTECTED]>") Mailcrypt-3.5 introduced pgp5 and gnuPG support. But they also changed the variable name. So if kept your existing .emacs file, they would si

RSA expiry commemorative version of PGP?

2000-08-02 Thread Adam Back
So as the RSA patent is expiring, and the PGP folks are pissed at RSA for various underhand legal shenanigans, can we expect a PGP version with RSA on by default, perhaps released midnight 20 September as a ceromonial event at the party? What about a GnuPG version which includes RSA and IDEA, by

Re: reverse Zero Knowledge?

2000-08-01 Thread Adam Back
Ben writes: > > Imagine there is a blinding function b, and an unblinding function > > b'. Alice sends Bob b(y). Bob produces z=f'(b(y)). Alice extracts x = > > b'(z). > > > > Has this been done for RSA etc? > > Pass, but I can't see why anyone would, since f'() for RSA is thought to > not exist

ecash & distributed service (Re: MojoNation [cpunk])

2000-07-31 Thread Adam Back
Peter writes: > > To earn Mojo tokens, users can sell their extra bandwidth > > or disk space and act as servers, or create their own > > service that others want to pay for. A successful system > > would also likely include money exchangers who buy and > > sell Mojo tokens in exchange for dollar

carnivore is a windoze app... ha

2000-07-26 Thread Adam Back
Declan reports in his article that Carnivore is a "windows 2000 computer". Given the insecurity of windows, with or without source sooner or later someone is going to figure out a virus which frags it. Say like the email address overflow which hit outlook recently. The payload could be disabli

Re: Random musings

2000-07-26 Thread Adam Back
I don't see any compelling advantage in replacing /dev/urandom's output function with a more yarrow like one. The Yarrow protocol brings two things: - recovery from the state compromise attack Ted refers to. - design that has been formally reasonsed about (many of the existing CPRNG have been

alt.cypherpunks / mail2news (Re: cypherpunks spam - destroy the mailing list and go for a)slashsite

2000-07-16 Thread Adam Back
Tim writes: > Making the Cypherpunks list a Usenet group has been discussed many, > many times. In fact, search Usenet for "cypherpunks" and one should > find one or more newsgroups, ready for use. (IIRC, Adam Back created > several groups.) Not me. I think it was Pa

comments on proposed mixmaster v3 protocol

2000-06-30 Thread Adam Back
http://www.eskimo.com/~rowdenw/crypt/Mix/draft-moeller-v3-01.txt Some comments on the proposed mixmaster 3 protocol (see above). - Section 3.2 describes using Elgamal. Two problems with this 1) I'm not sure Elgamal is a good idea. RSA patent expires RSN, probably before mix3 is likely to get

FBI site blocking ZKS? (Re: Feds' hands caught in cookie jar)

2000-06-30 Thread Adam Back
Patrick writes: > Of further interest is the fact that I cannot access the FBI website > at all from the ZKS system. I use US-based ZKS proxies, so in > effect the FBI is denying me, a U.S. taxpaying citizen, access to > the public FBI website (created with my money of course). [...] I > think

Re: economics of MicroMint

2000-06-22 Thread Adam Back
Anonymous writes: > This gives the mint an advantage over the forger because he will > generally not be trying to create as many coins as the mint. Even if > he is willing to spend as much as the mint in order to compete on the > per-coin cost, he has a time disadvantage because he does not know

napster vs gnutella -- why distributed systems win

2000-05-10 Thread Adam Back
So Napster (www.napster.com) has an architecture which includes a central server architecture for searching, and connecting to the network, has been legally forced to remove 100s of thousands of user accounts [1] So the is possible because a) the notion of an 'account' exists (napster is an IRC

stego / stealth remailers (Re: python script for stealth remailer)

2000-03-09 Thread Adam Back
Ch'i writes: > I've been intrigued with the idea of "stealth remailers", which > retrieve messages from news servers. In order to play with this > idea a little I've written a quick-and-dirty python script. > [...] So the stealth remailer conceals from the attacker which entry point the origina

Re: About payee untraceability ...

2000-03-09 Thread Adam Back
Stefan Brands writes: > > ... By the way, to forestall Clarice unblinding the cash received > > from Dave and thus knowing the identity of the cash Alice gets, > > here's one option: > > > > Alice provides the appropriate keys in an envelope Clarice > > encrypted to Dave, such that Dave encry

Re: LogJam

2000-02-28 Thread Adam Back
Marcel Popescu <[EMAIL PROTECTED]> writes: > > Actually it's more like the store owner logging your name when you come in > > just to take a look at his price for beer (and he doesn't even have to ask > > you, because his security system will just query your ID smartcard). And > > while he's at