Re: who goes 1st problem

2004-05-12 Thread Adam Back
On Tue, May 11, 2004 at 09:10:35PM +, Jason Holt wrote: [...] issue [...] would be how you actually get your certs to the other guy. Hidden credentials, as Ninghui pointed out, assume you have some means for creating the other guy's cert, [...] The OSBE paper, OTOH, assumes we're going

We're jamming, we're jamming, we hope you like jammin too

2004-05-12 Thread Major Variola (ret)
At 03:09 PM 5/11/04 +0200, Eugen Leitl wrote: The second covers a hacking the system concept. I'd considered something similar myself, though different in approach. Rather than finding RFID chips and redistributing them, why not create programmable RFID broadcasters which could spoof other

Prometheus Award finalists announced

2004-05-12 Thread Freematt357
For immediate release: May 12, 2004 Libertarian Futurist Society announces Prometheus Award finalists, and Hall of Fame finalists. The Libertarian Futurist Society has chosen finalists for its annual Prometheus Award for Best Novel and its annual Prometheus Hall of Fame for Classic Fiction. The

Re: SASSER Worm Dude

2004-05-12 Thread Eugen Leitl
On Mon, May 10, 2004 at 02:31:18PM -0400, Tyler Durden wrote: So a HS kid, living with his parents, is able to write a worm that takes out millions and millions of computers throughout the world running the latest MS OS. Uhshouldn't we arrest Bill Gates first? The decision is rational,

Re: CDR: We're jamming, we're jamming, we hope you like jammin too

2004-05-12 Thread Brian Dunbar
On May 12, 2004, at 12:47 PM, Major Variola (ret) wrote: At 03:09 PM 5/11/04 +0200, Eugen Leitl wrote: The second covers a hacking the system concept. I'd considered something similar myself, though different in approach. Rather than finding RFID chips and redistributing them, why not create

RE: We're jamming, we're jamming, we hope you like jammin too

2004-05-12 Thread Trei, Peter
You might want to look at the work RSA Labs is doing on 'blocker tags'. These are special tags which leverage the mechanism used to disambiguate the presence of multiple tags to make it look as if you are carrying 2^n (n usually 128) different tags at once. They propose a protocol to make them

Re: We're jamming, we're jamming, we hope you like jammin too

2004-05-12 Thread Ian Farquhar
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Major Variola (ret) wrote: | RFID jamming should be very easy and a quite amusing DoS attack | on commercial targets. Easy because its not frequency hopping, low | power, and relatively low frequency. Particularly cute would be | transmitting sex-toy

Re: We're jamming, we're jamming, we hope you like jammin too

2004-05-12 Thread Major Variola (ret)
ASK any Elmer you happen to see, what's the best jamming, RFID.. (With apologies to the tuna industry and those too young to know the jingle. Or to know the RF double meanings.) Interesting cultural reference that goes entirely above my head with a cute swooshing sound. Care to explain,

Re: We're jamming, we're jamming, we hope you like jammin too

2004-05-12 Thread Thomas Shaddack
RFID jamming should be very easy and a quite amusing DoS attack on commercial targets. Easy because its not frequency hopping, low power, and relatively low frequency. Particularly cute would be transmitting sex-toy codes intermittently. Considering the transmitting powers of the tags, an

Illuminating Blacked-Out Words

2004-05-12 Thread R. A. Hettinga
http://www.nytimes.com/2004/05/10/technology/10crypto.html?pagewanted=printposition= The New York Times May 10, 2004 Illuminating Blacked-Out Words By JOHN MARKOFF European researchers at a security conference in Switzerland last week demonstrated computer-based techniques that can identify