Re: Interesting article

2005-07-11 Thread Jack Lloyd
On Fri, Jul 08, 2005 at 01:32:34PM -0400, Tyler Durden wrote: That is interesting. One wonders if in certain circles of Russia people are much more careful with their data and encrypting it. Who knows? A country like that might evolve some fairly rigorous privacy procedures. Here in the US

Re: Interesting article

2005-07-08 Thread Jack Lloyd
On Fri, Jul 08, 2005 at 01:32:34PM -0400, Tyler Durden wrote: That is interesting. One wonders if in certain circles of Russia people are much more careful with their data and encrypting it. Who knows? A country like that might evolve some fairly rigorous privacy procedures. Here in the US

Re: FW: on FPGAs vs ASICs

2005-03-22 Thread Jack Lloyd
On Mon, Mar 21, 2005 at 06:34:07PM -0800, Major Variola (ret) wrote: Tangentially, I should note that there are modes of encryption which can be scaled infinitely with parallel hardware; they use interleaved blocks so each chip sees every Nth block of the real stream. So high clock rates are

SHA-1 results available

2005-02-22 Thread Jack Lloyd
http://theory.csail.mit.edu/~yiqun/shanote.pdf No real details, just collisions for 80 round SHA-0 (which I just confirmed) and 58 round SHA-1 (which I haven't bothered with), plus the now famous work factor estimate of 2^69 for full SHA-1. As usual, Technical details will be provided in a

SHA-1 results available

2005-02-18 Thread Jack Lloyd
http://theory.csail.mit.edu/~yiqun/shanote.pdf No real details, just collisions for 80 round SHA-0 (which I just confirmed) and 58 round SHA-1 (which I haven't bothered with), plus the now famous work factor estimate of 2^69 for full SHA-1. As usual, Technical details will be provided in a

Re: Congress Close to Establishing Rules for Driver's Licenses

2004-10-12 Thread Jack Lloyd
On Tue, Oct 12, 2004 at 10:09:26AM -0500, Riad S. Wahby wrote: Dave Howe [EMAIL PROTECTED] wrote: And how many americans have a passport,and carry one for identification purposes? Probably not all that many. Tangentially, I was once told that, at least in Massachusetts liquor stores,

Re: Most Disturbing Yet - Senate Wants Database Dragnet

2004-10-07 Thread Jack Lloyd
On Thu, Oct 07, 2004 at 06:19:43AM -0400, Sunder wrote: SNIP To prevent abuses of the system, the Markle task force recommended anonymized technology, graduated levels of permission-based access and automated auditing software constantly hunting for abuses. {Huh? How would anonimized

Re: Most Disturbing Yet - Senate Wants Database Dragnet

2004-10-07 Thread Jack Lloyd
On Thu, Oct 07, 2004 at 06:19:43AM -0400, Sunder wrote: SNIP To prevent abuses of the system, the Markle task force recommended anonymized technology, graduated levels of permission-based access and automated auditing software constantly hunting for abuses. {Huh? How would anonimized

Re: Seth Schoen's Hard to Verify Signatures

2004-09-08 Thread Jack Lloyd
On Wed, Sep 08, 2004 at 12:44:39PM -0700, Major Variola (ret) wrote: [...] In an RSA cryptosystem the public exponent is typically low, often 3 or 65537 (for efficiency reasons only a few bits are set; the other constraint is that your message, raised to that power, wraps in your modulus,

Re: Seth Schoen's Hard to Verify Signatures

2004-09-08 Thread Jack Lloyd
On Wed, Sep 08, 2004 at 12:44:39PM -0700, Major Variola (ret) wrote: [...] In an RSA cryptosystem the public exponent is typically low, often 3 or 65537 (for efficiency reasons only a few bits are set; the other constraint is that your message, raised to that power, wraps in your modulus,

Re: Remailers an unsolveable paradox?

2004-09-04 Thread Jack Lloyd
On Sat, Sep 04, 2004 at 09:50:14PM +0200, Nomen Nescio wrote: Let's take our shining example of truth and freedom, the whistle-blower. When they send out mail to the media or whomever, one of two things happens: they see the story published or they don't. If not, there's no idea why: was it

Re: Remailers an unsolveable paradox?

2004-09-04 Thread Jack Lloyd
On Sat, Sep 04, 2004 at 09:50:14PM +0200, Nomen Nescio wrote: Let's take our shining example of truth and freedom, the whistle-blower. When they send out mail to the media or whomever, one of two things happens: they see the story published or they don't. If not, there's no idea why: was it

Re: On what the NSA does with its tech

2004-08-04 Thread Jack Lloyd
On Wed, Aug 04, 2004 at 11:04:15AM -0700, Hal Finney wrote: [...] The system will consume 10^25 * 60 nanowatts or about 6 * 10^17 watts. Now, that's a lot. It's four times what the earth receives from the sun. So we have to build a disk four times the area (not volume) of the earth, collect

Re: On what the NSA does with its tech

2004-08-04 Thread Jack Lloyd
On Wed, Aug 04, 2004 at 11:04:15AM -0700, Hal Finney wrote: [...] The system will consume 10^25 * 60 nanowatts or about 6 * 10^17 watts. Now, that's a lot. It's four times what the earth receives from the sun. So we have to build a disk four times the area (not volume) of the earth, collect

NSA crypto at DNC?

2004-07-28 Thread Jack Lloyd
http://www.nytimes.com/2004/07/26/business/26verizon.html Nextel, the official mobile provider to both conventions, is deploying its iDEN network with encryption codes used by the National Security Agency to make sure no one eavesdrops on all the deal making. Anyone know what's up with this? I'm

NSA crypto at DNC?

2004-07-27 Thread Jack Lloyd
http://www.nytimes.com/2004/07/26/business/26verizon.html Nextel, the official mobile provider to both conventions, is deploying its iDEN network with encryption codes used by the National Security Agency to make sure no one eavesdrops on all the deal making. Anyone know what's up with this? I'm

Re: Secure telephones

2004-07-18 Thread Jack Lloyd
On Sun, Jul 18, 2004 at 07:31:59PM +0100, Dave Howe wrote: OpenVPN is of course built on SSL, and can use either X509 certificates or a preshared key for authentication. Sadly, there is no convenient way to use DNS-SEC key records for OpenVPN. How well is VoIP going to work over SSL/TLS

Re: Secure telephones

2004-07-18 Thread Jack Lloyd
On Sun, Jul 18, 2004 at 08:53:35PM +0100, Dave Howe wrote: That may have just been an artifact of a bad implementation, though. DTLS might be a better pick for securing VoIP. There's also SRTP. The strength of a pure VPN solution is that you aren't limited to *just* VoIP - you can transfer

Re: Secure telephones

2004-07-18 Thread Jack Lloyd
On Sun, Jul 18, 2004 at 08:53:35PM +0100, Dave Howe wrote: That may have just been an artifact of a bad implementation, though. DTLS might be a better pick for securing VoIP. There's also SRTP. The strength of a pure VPN solution is that you aren't limited to *just* VoIP - you can transfer

Re: Secure telephones

2004-07-18 Thread Jack Lloyd
On Sun, Jul 18, 2004 at 07:31:59PM +0100, Dave Howe wrote: OpenVPN is of course built on SSL, and can use either X509 certificates or a preshared key for authentication. Sadly, there is no convenient way to use DNS-SEC key records for OpenVPN. How well is VoIP going to work over SSL/TLS

Re: For Liars and Loafers, Cellphones Offer an Alibi

2004-06-27 Thread Jack Lloyd
More recent phones from Sprint must support real GPS, since Qualcomm offers chipsets with GPS support, which they wouldn't do unless their only customers (Sprint phone manufacturers) wanted it. I was looking at getting a Sprint phone last week - every model I looked at had a GPS chip. -J

Re: Linksys WRT54G (and clones)

2004-06-21 Thread Jack Lloyd
The WRT54G clones are largely useful as very cheap Linux boxes with radio, for individual homes and small scall meshes. They should be able to support a few VPNs over typical ADSL/cable modem link bitrate, but for more serious work I'd go with VIA's C5 family (1 GHz fanless, and hardware

Re: Linksys WRT54G (and clones)

2004-06-20 Thread Jack Lloyd
The WRT54G clones are largely useful as very cheap Linux boxes with radio, for individual homes and small scall meshes. They should be able to support a few VPNs over typical ADSL/cable modem link bitrate, but for more serious work I'd go with VIA's C5 family (1 GHz fanless, and hardware

Re: Breaking Iranian Codes (Re: CRYPTO-GRAM, June 15, 2003)

2004-06-15 Thread Jack Lloyd
On Wed, Jun 16, 2004 at 03:37:54AM +1200, Peter Gutmann wrote: R. A. Hettinga [EMAIL PROTECTED] forwarded: So now the NSA's secret is out. The Iranians have undoubtedly changed their encryption machines, and the NSA has lost its source of Iranian secrets. But little else is known. Who

Re: 2 million bank accounts robbed

2004-06-15 Thread Jack Lloyd
So... don't give your account info to organized crime, and don't use Outlook, and your risk is reduced by, what, 90%? And doing online banking from a Net cafe... I mean really. At least some of these numbers seem wrong. If nearly 2 million people got ripped off last year, and at least 1.8 million

Re: Breaking Iranian Codes (Re: CRYPTO-GRAM, June 15, 2003)

2004-06-15 Thread Jack Lloyd
On Wed, Jun 16, 2004 at 03:37:54AM +1200, Peter Gutmann wrote: R. A. Hettinga [EMAIL PROTECTED] forwarded: So now the NSA's secret is out. The Iranians have undoubtedly changed their encryption machines, and the NSA has lost its source of Iranian secrets. But little else is known. Who

Re: 2 million bank accounts robbed

2004-06-15 Thread Jack Lloyd
So... don't give your account info to organized crime, and don't use Outlook, and your risk is reduced by, what, 90%? And doing online banking from a Net cafe... I mean really. At least some of these numbers seem wrong. If nearly 2 million people got ripped off last year, and at least 1.8 million

Re: Breaking Iranian Codes (Re: CRYPTO-GRAM, June 15, 2003)

2004-06-15 Thread Jack Lloyd
On Tue, Jun 15, 2004 at 01:25:13PM -0700, John Young wrote: [...] Now, how about that story of Phil Zimmermann getting out of prosecution by agreeing to a backdoor in PGP after 2.0? A man swears Phil told him that face-to-face, man says he disassembled the source code to see the damning

Re: The Fingerprint As Password

2004-05-21 Thread Jack Lloyd
a) Why do I have the feeling that there is no way to tell which password a piece of software is asking for when you thumb it. Does the host machine get all of them and figure out which one it wants to use? b) How hard is it to bypass the check and simply pull the complete set of passwords out of

Re: The Fingerprint As Password

2004-05-21 Thread Jack Lloyd
a) Why do I have the feeling that there is no way to tell which password a piece of software is asking for when you thumb it. Does the host machine get all of them and figure out which one it wants to use? b) How hard is it to bypass the check and simply pull the complete set of passwords out of

Re: Shoulder surfing for passwords by ear

2004-05-13 Thread Jack Lloyd
On Thu, May 13, 2004 at 09:32:40AM -0400, Sunder wrote: http://searchsecurity.techtarget.com/originalContent/0,289142,sid14_gci963348,00.html 'Whispering keyboards' could be next attack trend By Niall McKay, Contributing Writer 11 May 2004 | SearchSecurity.com OAKLAND -- Listen

Re: Shoulder surfing for passwords by ear

2004-05-13 Thread Jack Lloyd
On Thu, May 13, 2004 at 09:32:40AM -0400, Sunder wrote: http://searchsecurity.techtarget.com/originalContent/0,289142,sid14_gci963348,00.html 'Whispering keyboards' could be next attack trend By Niall McKay, Contributing Writer 11 May 2004 | SearchSecurity.com OAKLAND -- Listen

Re: Can Skype be wiretapped by the authorities? (fwd from em@em.no-ip.com)

2004-05-10 Thread Jack Lloyd
Like it matters. Do you really think that the government would really allow Intel and AMD to sell CPUs that didn't have tiny transmitters in them? Your CPU is actually transmitting every instruction it executes to the satellites. On Mon, May 10, 2004 at 11:14:49AM -0700, Hasan Diwan wrote:

Re: Can Skype be wiretapped by the authorities? (fwd from em@em.no-ip.com)

2004-05-10 Thread Jack Lloyd
Like it matters. Do you really think that the government would really allow Intel and AMD to sell CPUs that didn't have tiny transmitters in them? Your CPU is actually transmitting every instruction it executes to the satellites. On Mon, May 10, 2004 at 11:14:49AM -0700, Hasan Diwan wrote:

Re: BBC on all-electronic Indian elections

2004-04-26 Thread Jack Lloyd
On Mon, Apr 26, 2004 at 11:18:52AM -0400, sunder wrote: Jack Lloyd wrote: Still, I liked this quote: 'I came to vote because wasting one's ballot in a democracy is a sin, he told the BBC.' Not too common a view in the US these days, it seems like. What do you expect when the previous

Re: BBC on all-electronic Indian elections

2004-04-20 Thread Jack Lloyd
On Tue, Apr 20, 2004 at 04:28:07PM +0100, Graham Lally wrote: Current report: http://news.bbc.co.uk/1/hi/world/south_asia/3641419.stm The tech: http://news.bbc.co.uk/1/hi/world/south_asia/3493474.stm Bit scant on details.. anyone know anything more about how the machine (/system) is

Re: BBC on all-electronic Indian elections

2004-04-20 Thread Jack Lloyd
On Tue, Apr 20, 2004 at 04:28:07PM +0100, Graham Lally wrote: Current report: http://news.bbc.co.uk/1/hi/world/south_asia/3641419.stm The tech: http://news.bbc.co.uk/1/hi/world/south_asia/3493474.stm Bit scant on details.. anyone know anything more about how the machine (/system) is

Re: The Gilmore Dimissal

2004-03-30 Thread Jack Lloyd
I was curious about that. I notice now that Amtrak requires ID as well: http://www.amtrak.com/idrequire.html Does anyone know when this happened, or have experiences with having to show ID on Amtrak? Sometime before early January this year, at least (probably significantly before).

Re: The Gilmore Dimissal

2004-03-30 Thread Jack Lloyd
I was curious about that. I notice now that Amtrak requires ID as well: http://www.amtrak.com/idrequire.html Does anyone know when this happened, or have experiences with having to show ID on Amtrak? Sometime before early January this year, at least (probably significantly before).

Re: chatroom conversation turing computable

2004-03-18 Thread Jack Lloyd
On Thu, Mar 18, 2004 at 10:37:25AM -0800, Major Variola (ret.) wrote: http://news.scotsman.com/scitech.cfm?id=312492004 If a nanniebot detects signs of paedophile activity, such as an adult posing as a child, it sends out an alert. I can't wait for two of them to meet and each decide the other

Re: chatroom conversation turing computable

2004-03-18 Thread Jack Lloyd
On Thu, Mar 18, 2004 at 10:37:25AM -0800, Major Variola (ret.) wrote: http://news.scotsman.com/scitech.cfm?id=312492004 If a nanniebot detects signs of paedophile activity, such as an adult posing as a child, it sends out an alert. I can't wait for two of them to meet and each decide the other

Re: Freedomphone

2003-11-19 Thread Jack Lloyd
We allow everyone to check the security for themselves, because we're the only ones who publish the source code, said Rop Gonggrijp We are currently performing a internal round of reviews with a expert group of security researchers and cryptographers. Depending on the results of this review

Re: Freedomphone

2003-11-19 Thread Jack Lloyd
We allow everyone to check the security for themselves, because we're the only ones who publish the source code, said Rop Gonggrijp We are currently performing a internal round of reviews with a expert group of security researchers and cryptographers. Depending on the results of this review

Re: someone stealing e-gold passwords

2003-01-22 Thread Jack Lloyd
I got one of these in early January, but I don't use e-gold. Probably they hit everyone they can find an address for on the assumption that some of them use e-gold. Even a small number of accounts could be quite profitable for them. (Perhaps they are more selective, mailing people who post on

Re: someone stealing e-gold passwords

2003-01-22 Thread Jack Lloyd
I got one of these in early January, but I don't use e-gold. Probably they hit everyone they can find an address for on the assumption that some of them use e-gold. Even a small number of accounts could be quite profitable for them. (Perhaps they are more selective, mailing people who post on

RE: Supremes and thieves.

2003-01-21 Thread Jack Lloyd
On Tue, 21 Jan 2003, Trei, Peter wrote: The song is sung by Jimmy Stewart, on camera, so a new soundtrack would be tough. Given that they can make dead actors dance in commercials, I can't imagine it would be terribly difficult to do it. Though I know next to nothing about video editing in

RE: Supremes and thieves.

2003-01-21 Thread Jack Lloyd
On Tue, 21 Jan 2003, Trei, Peter wrote: However, in 1993, Republic Pictures started to assert control on the basis that the song Buffalo Girls (which occurs many times throughout the film) was still in copyright. So, the film has effectively been removed from PD, after being in PD for

RE: Supremes and thieves.

2003-01-21 Thread Jack Lloyd
On Tue, 21 Jan 2003, Trei, Peter wrote: The song is sung by Jimmy Stewart, on camera, so a new soundtrack would be tough. Given that they can make dead actors dance in commercials, I can't imagine it would be terribly difficult to do it. Though I know next to nothing about video editing in

Re: Hollywood Hackers

2002-08-01 Thread Jack Lloyd
On Wed, 31 Jul 2002, A.Melon wrote: and on the left hand side of the page it says: At the moment, we do not support non-Javascript browsers. If they are concerned about security, Shouldn't they be avoiding javascript? Shapiro has a strange love for Javascript. I don't know what that

Re: Hollywood Hackers

2002-08-01 Thread Jack Lloyd
On Wed, 31 Jul 2002, A.Melon wrote: and on the left hand side of the page it says: At the moment, we do not support non-Javascript browsers. If they are concerned about security, Shouldn't they be avoiding javascript? Shapiro has a strange love for Javascript. I don't know what that

Re: Hollywood Hackers

2002-07-31 Thread Jack Lloyd
On Wed, 31 Jul 2002, Steve Schear wrote: Looks amazingly familiar. Could it be, could be, could it be Mojo Nation (now MNet http://mnet.sourceforge.net )? Or OpenCM (http://www.opencm.org) -Jack

Re: Hollywood Hackers

2002-07-31 Thread Jack Lloyd
On Wed, 31 Jul 2002, Steve Schear wrote: Looks amazingly familiar. Could it be, could be, could it be Mojo Nation (now MNet http://mnet.sourceforge.net )? Or OpenCM (http://www.opencm.org) -Jack

Re: to outlaw general purpose computers

2002-07-02 Thread Jack Lloyd
On Tue, 2 Jul 2002, Eric Cordian wrote: [...] I agree that making them mandatory requirements for new machines will do more than enough, without having to bother to make old machines illegal. Not even counting your computers, and my computers, and 500 million computers already out in the

Re: NAI pulls out the DMCA stick

2002-05-25 Thread Jack Lloyd
On Fri, 24 May 2002, Eric Murray wrote: 3. Is a relavent developer reference is available for X.509? X.509 is an ITU/T standard, which means, among other things, that they charge money for copies. You can find copies on the net though. Depending on how good your local library is, they

Re: NAI pulls out the DMCA stick

2002-05-25 Thread Jack Lloyd
On Fri, 24 May 2002, Eric Murray wrote: 3. Is a relavent developer reference is available for X.509? X.509 is an ITU/T standard, which means, among other things, that they charge money for copies. You can find copies on the net though. Depending on how good your local library is, they

RE: Two ideas for random number generation

2002-04-22 Thread Jack Lloyd
On Mon, 22 Apr 2002, Trei, Peter wrote: So my suggestion is that while hardware accelaration of PRNGs may have some usefulness, true RNGs need not have the same performance. I'd rather see people work on making the true RNGs *trustworthy*, which is a much more difficult problem. Out of