extremely
successful.
You need to go read Richard Stallman's essay on the right to read.
You and others proposing this software are trying to fast-track us to
the scary but plausible future under Palladium that Richard
presciently paints.
http://www.gnu.org/philosophy/right-to-read.html
Adam
or to a trusted
intermediary).
Adam
On Mon, May 09, 2005 at 06:00:58AM -0700, Sarad AV wrote:
hi,
If user A has the integer a and user B has the integer
b, can a zero knowledge proof be developed to show
that ab,ab or a=b.
is for me to paint this stuff on my valuables as proof of
ownership. I think a better idea would be for me to paint it on your
valuables, and then call the police.
http://www.schneier.com/blog/archives/2005/02/smart_water.html
--
- Adam
-
** My new project -- http
things such as the server mediated key exchange are obviously
not shipable grade (server knows all symmetric keys!)
Adam
needed to stop phishing is server auth.
Adam
.
(For example on some key servers there are keys with my name and email
that are nothing to do with me -- they are pure forgeries).
Suggest they add something to say in red letters check the fingerprint
AND keyid matches your key.
Adam
On Sat, Dec 11, 2004 at 10:24:09PM +0100, Florian Weimer wrote:
| * R. A. Hettinga quotes a news article:
|
| There have been numerous media reports in recent years that terrorist
| groups, including al-Qaida, were using steganographic techniques.
|
| As far as I know, these news stories can
a consensus of people of many nations and backgrounds. The
hypocrisy of the Bush Doctrine is simply mind-boggling.
-Adam
On Wed, 20 Oct 2004 06:31:16 -0500 (CDT), J.A. Terranson
[EMAIL PROTECTED] said:
On Tue, 19 Oct 2004, James A. Donald wrote:
... but Bin Laden's indictment
not only mentions
many emails ago, and I believe him to be accurate, especially
since Mr. Donald never responded to the charge.
None-the-less, this has been one of the more inteteresting (and
infuriating) threads in recent memory of Cypherpunks. I'm glad we're
going through it with such vigor.
-Adam
On Tue, 19 Oct
.
Sure, we might kill a few existing terrorists, but where do
terrorists come from? Won't these actions create a larger and more
hostile breeding ground for more people to lash out at US involvement in
foreign affairs? The US government just doesn't understand, or just
doesn't care.
-Adam
On Tue
provide a
definition that isn't self-contradictory.
-Adam
On Tue, 19 Oct 2004 09:59:15 -0700, James A. Donald
[EMAIL PROTECTED] said:
--
On 19 Oct 2004 at 10:23, Tyler Durden wrote:
Most Cypherpunks would agree that free markets are a good
thing. Basically, if you leave people alone
, does not being a suicide bomber make your cause more noble?
Curious why you seem to think McVeigh was justified in his actions.
-Adam
On Sat, 16 Oct 2004 16:01:47 -0700, James A. Donald
Tim McVeigh did not target innocents, nor was he a suicide
bomber.
Nor, incidentally, was he
of the
content was described in academic papers).
also the credentica web site has gone live, lots of content.
(credentica is Stefan's company around digital credentials).
Adam
the slope of the curve changes anything. Why
*would* we discuss it?
Adam the cynic.
. Instead it would be:
x is random, compute y = x^{2^t+1} mod n; verify x =? y^d mod n
I'll add a note about that when I get around to updating it next.
Adam
[1] Hashcash - Amortizable Publicly Auditable Cost-Functions
http://www.hashcash.org/papers/amortizable.pdf
[2] Andy Oram, editor. Peer
they work could be adapted to provide partial pre-images more
efficiently than brute force directly.
Adam
On Wed, Aug 18, 2004 at 02:03:09PM -0400, Jean-Luc Cooke wrote:
To be clear:
MD5 is borken. The whole thing:
http://www.md5crk.com/md5col.zip
SHA-0 is broken. The whole thing
to balance also with how valueable he thought his
leader ship was.
Of course the lieutenants themselves might do the calculation and
figure they would be closer to their goals after cashing in Bin Laden.
Adam
On Thu, Aug 12, 2004 at 03:37:32AM -0400, Sunder wrote:
Yeah, about as brilliant as a turd
will be to do economical things wrt their
objectives and priorities and put as much as they can out for
commercial tender, and/or try to create internal competition or
something.
Adam
On Sat, Jul 31, 2004 at 05:50:36PM -0700, Major Variola (ret) wrote:
Tyler D asked about how the NSA could be so far ahead
You could try sending an email to Austin Hill [EMAIL PROTECTED] to see
if he could organize releasing source for remaining freedom related
source that they are not currently using.
Adam
On Wed, Jul 07, 2004 at 02:34:04PM -0700, Steve Schear wrote:
I wonder if the mail 2.0 code could be publicly
it is unlikely that their activities would
warrant the effort of real time analysis. Well we have carnivore now,
so they could potentially do real-time traffic analysis more routinely
if they were to distribute enough collaborating analysis carnivore
plugins.
Adam
[1] http://www.homeport.org/~adam
really have to wonder about people like this
--
Adam
satyam, shivam, sundaram
of proof (hashcash or
reverse-turing, or short term ability to reply to email
challenge-response).
Adam
Richard Clayton wrote:
[...] Ben Laurie) and I have recently
been doing some sums on proof-of-work / client puzzles / hashcash
methods of imposing economic constraints upon the sending of spam
day or two and I'll move everything over before I
leave.
--
Riad Wahby
[EMAIL PROTECTED]
MIT VI-2 M.Eng
How ironic, I moved from Texas to Massachusetts .. You must be insane to
go to TX
--
Adam
satyam, shivam, sundaram
://custom.marketwatch.com/custom/nyt-com/html-companyprofile.asp?sid=4110time=4yruf=0x=42y=8
Suspicious?
--
Adam
satyam, shivam, sundaram
.)
Adam
(where multiple parties are involved and each holds a
private key fragment), however they tend to be inefficient I think so
above is probably simple and efficient enough.
Adam
of different nonorthogonal features.
I think it would be fair to call it anonymity system, just that the
trust model includes a trusted server. There are lots of things
possible with a trusted server, even with symmetric crypto (KDCs).
Adam
who they are
communicating with. The CA colluding MITM however we'll say does not
apriori, so he has to brute force try all psuedonym, attribute
combinations until he gets the right one. Well still not desirable
security margin, but some extra difficulty for the MITM.
Adam
On Mon, May 10, 2004 at 08:02:12PM +, Jason Holt wrote:
Adam Back wrote:
[...] However the server could mark the encrypted values by encoding
different challenge response values in each of them, right?
Yep, that'd be a problem in that case. In the most recent (unpublished)
paper, I
. Either secure time-stamping,
extending the psuedonym name to include fingerprint as
self-authenticator would allow this.
Adam
On Mon, May 10, 2004 at 06:45:56PM +, Jason Holt wrote:
Well, he can always generate private keys for any pseudonym, just as in cash
systems where the bank can always
the project is that they use hashcash to
throttle nym registration abuse -- before that people were creating
1000s of handles through it.)
Adam
the result
back.
In particular I don't see any way to implement an anonymous epayment
system using Hidden Credentials. As I understand it is simply not
possible as the system has no inherent cryptographic anonymity?
Adam
with
this? G
--
Adam
,
proof does not need to be very strong in relation to your need to
communicate. That is, if Tricky Dick thinks you're Deep Throat, or
Saddam thinks you're the guy who betrayed him, etc.
Adam
--
It is seldom that liberty of any kind is lost all at once
in Germany's GSMK.
Alas, the phones are 3500 Euro a pair.
At that price it is targeting executives, lawyers and bankers who
regularly swap market sensitive information on mergers and lawsuits,
and for whom privacy is worth paying for.
Adam
--
It is seldom that liberty of any kind is lost all
On Thu, Oct 30, 2003 at 09:06:10AM -0800, James A. Donald wrote:
On 28 Oct 2003 at 13:49, Adam Back wrote:
So for that reason I think Chaum's scheme practically would
not be viable over EC. (Or you could do it but you'd be
better off performance, security and key/messag size doing
Chaum
is a generalisation of DH blinding to multiple attributes and
selective disclosure of those attributes).
Adam
On Sun, Nov 02, 2003 at 08:16:45AM -0800, James A. Donald wrote:
See:Anonymous Electronic Cash
http://www.echeque.com/Kong/anon_transfer.htm
Lower case letters represent integers
as it is DH based.
Adam
On Mon, Oct 27, 2003 at 05:41:11PM -0600, Neil Johnson wrote:
Will ECC work with blinding (Chaum, Brands, etc.) techniques?
Just curious.
these folks; they were turned in by someone having second thoughts.
That fellow, who then turned informer, is in jail anyway. Bad
informer management, but no one asked me.
Adam
--
It is seldom that liberty of any kind is lost all at once.
-Hume
this
year.
From what I could see from the two I did (one for someone else) based
on serial number on account it looks like they might be signing up
around 1000 accounts per day. So I could imagine they might pull the
offer also if they got too much take up!
Have phun.
Adam
-like hash would be a
more effective technique for dealing with this issue. Anyone know of any
work in this area? (spell-checker research would probably yield the most
results)
Adam Lydick
On Mon, 2003-09-22 at 15:39, Thomas Shaddack wrote:
Could be the l33t sp3ak next generation for the cases
people who
win are the hologram manufacturers.
Unfortunately, the people actually relying on the cards don't realize
this as fast as the users of the system.
Adam
--
It is seldom that liberty of any kind is lost all at once.
-Hume
First answer: He's in red, no green, argggh!
Second answer: We've changed the name of the program to ITAR so his
lawsuit goes back to square 1! That's the plan!
Third answer: CAPPS was just a clever distraction, the real program
remains classified. Please step over here.
Adam
On Tue, Sep 09
that ZKS would be happy to sell
someone a commercial use license.
Adam
--
It is seldom that liberty of any kind is lost all at once.
-Hume
with them the previous time they now have the logs to get seized.
|
| I'll bet the logs weren't encrypted. Fools.
That's the cool bit about playing by the law; they can ignore it, ruin
people's lives, and then get a month off with pay while their actions
are investigated.
Adam
--
It is seldom
like Tarzan, running low-latency traffic inside the file trading
cloud.
Adam
--
It is seldom that liberty of any kind is lost all at once.
-Hume
John, you write like a Republican speechwriter on a bad trip.
On Tue, Aug 26, 2003 at 12:45:55PM -0700, John Young wrote:
| Nonshit, Robert, Ray's an organ-eating anarchist not a
| vapid tea-sip socialist. A while back Ray yanked a
| capitalist apologist's lawyer's cold dead dried nut heart
|
stealdemocracy.com, a new voting machine
company. Sell machines that explicitly let you steal elections. Get
some press.
Adam
On Wed, Aug 06, 2003 at 11:08:38AM -0400, R. A. Hettinga wrote:
| Notice they did this to Chaum, too...
|
| Cheers,
| RAH
|
| --- begin forwarded text
|
|
| Status: U
On Wed, Aug 06, 2003 at 01:49:26PM -0700, Steve Schear wrote:
| At 11:54 2003-08-06 -0400, Adam Shostack wrote:
| Well, if you can't win on the truth, win on the procedures.
|
| At least Dr. Mercuri is in fine company there, ranging all the way
| back to Socrates and Galileo. Little consolation
regulars with whatever they demand. The trouble with being
anonymous is that you're indistinguishable from a cop.
Adam
--
It is seldom that liberty of any kind is lost all at once.
-Hume
On Sat, Mar 15, 2003 at 08:47:15PM +, Michael Shields wrote:
| In article [EMAIL PROTECTED],
| Adam Shostack [EMAIL PROTECTED] wrote:
| (New York just
| announced the abolition of tokens, making all subway travel
| linkable.)
|
| The last time I was in New York, you could buy a Metrocard
been doing for
60 years.
Adam
--
It is seldom that liberty of any kind is lost all at once.
-Hume
of $1,000 per visit, go fawn on her.
And remind her that the jacket is nearly a year old. Very last
season.
Adam
--
It is seldom that liberty of any kind is lost all at once.
-Hume
victim, or at least size up
their wad of cash.
(There were some complications, because the tags do try not to chat at
the same time, but hey, how well designed do you think a 10c item is?)
Adam
--
It is seldom that liberty of any kind is lost all at once
Look at this shit on fox news, look how they bias the question and
mis-represent the issue.
They ask Should children be allowed to say the Pledge of Allegiance
in school?. As if the children wanted to, and were being prevented!
http://q13.trb.com
and the stats after voting no -- 88% yes.
Adam
Human rights watchdog Privacy International has launched a quest to
find the World's Most Stupid Security Measure.
http://www.theregister.co.uk/content/55/29279.html
--
It is seldom that liberty of any kind is lost all at once.
-Hume
Any particular reason this time, or just on general principle?
-adam
On Sun, 12 Jan 2003, Anonymous wrote:
We must all pray daily that someone will kill Bush ASAP.
, Mr. Serebryany sent hundreds of digital
documents to three satellite pirate Web sites in September and
October.
For my archive of cryptographic information , I'd like to get copies
of these docs. Anyone been able to find them?
Adam
--
It is seldom that liberty of any kind is lost all
On Tue, Dec 31, 2002 at 09:49:28AM -0800, Kevin Elliott wrote:
| At 12:12 -0500 on 12/31/02, Adam Shostack wrote:
| Rummaging through my wallet...a grocery card in the name of Hughes, a
| credit card with the name Shostack, and an expired membership card in
| the name Doe.
|
| Interesting point
On Tue, Dec 31, 2002 at 01:21:52AM -0800, Bill Stewart wrote:
| At 03:57 PM 12/19/2002 -0500, Adam Shostack wrote:
| On Mon, Dec 16, 2002 at 04:56:12PM -0500, John Kelsey wrote:
| | I think this would help, but I also think technology is driving a lot of
| | this. You don't have to give a lot
On Tue, Dec 31, 2002 at 11:02:48AM -0800, Tim May wrote:
| On Tuesday, December 31, 2002, at 09:49 AM, Kevin Elliott wrote:
|
| At 12:12 -0500 on 12/31/02, Adam Shostack wrote:
| Rummaging through my wallet...a grocery card in the name of Hughes, a
| credit card with the name Shostack
.
And then there's economics. Someone has to pay for that noise to
signal ratio.
Adam
--
It is seldom that liberty of any kind is lost all at once.
-Hume
than code which doesn't encrypt.
Adam
--
It is seldom that liberty of any kind is lost all at once.
-Hume
, will be most concerned about. So I would expect this
| opt in approach to not be the full picture.)
Aww, c'mon, Tim! It'll be as voluntary as Clipper was!
Adam
--
It is seldom that liberty of any kind is lost all at once.
-Hume
On Mon, Dec 16, 2002 at 04:56:12PM -0500, John Kelsey wrote:
| At 12:53 PM 12/15/02 -0500, Adam Shostack wrote:
| ...
| I think that a law which re-affirmed the rights to be anonymous, to
| call yourself what you will, to be left alone, to not carry or show ID
| would transform the debate about
On Tue, Dec 17, 2002 at 05:12:35PM -0800, Lucky Green wrote:
| In other words, the new WaveLAN cards are shipping with a remote
| off-switch held by minor government officials. Let's recap the
| initiatives currently underway by both governments and major software
| vendors:
|
| Remote disabling
there it needs no constitution, no law, no court to save it.
The entirety is at
http://www.criminaljustice.org/public.nsf/\ENews/2002e67?opendocument.
Adam
--
It is seldom that liberty of any kind is lost all at once.
-Hume
On Mon, Dec 16, 2002 at 03:03:29PM -0800, Petro wrote:
| Permanently behind on my email:
|
| On Sat, Nov 23, 2002 at 03:22:41PM -0500, Adam Shostack wrote:
| I'm trying to remember details (author, title) of a short story that I
| read once. Its main feature, or the one that's standing out
think). But perhaps different rules apply if you
are holidaying as opposed to moving.
Adam
On Mon, Dec 16, 2002 at 10:28:51PM -0800, Blanc wrote:
About a week ago, someone mentioned that in order to get a Driver's Licence
in CA, one has to provide a thumbprint (and Social Security number). I
persuade a US insurance company to issue you insurance with a
non-US drivers license). Of course in my case I do not have a
Canadian drivers license but I think those are simpler to get.
Adam
http://www.inet-one.com/cypherpunks/dir.1998.08.10-1998.08.16/msg00052.html
Duncan Frissell wrote
of
standard analysis of regulatory capture, public policy making a la
Mancur Olsen, etc that applies here.)
This causes everyone a lot more pain than is really needed.
Adam
--
It is seldom that liberty of any kind is lost all at once.
-Hume
On Fri, Dec 13, 2002 at 02:47:37PM -0800, Steve Schear wrote:
| Dare you to do this with your Groucho glasses on :-)
|
| Oh, you saw me at RSA, eh? (Last year I guess it was, the RSA's staff
| allowed me to be photo ID'd wearing them as long as I promised to wear them
| on the show floor,
On Fri, Dec 13, 2002 at 08:17:27AM -0800, Mike Rosing wrote:
| All represive regiemes are short lived in a historical context.
| Living thru them is hell. This one has already begun a rather
| interesting hypocrisy - they say they support gun ownership, but
| they have no problem with letting the
is to increase the penalties until
we're all cowed, like they did in the old war on drugs.
Adam
PS: Current news in Canada includes the gun registry having undergone
a 12x cost overrun, and its not clear what will happen to it. A large
reason for the overruns have been people making mistakes
On Fri, Dec 13, 2002 at 10:54:06AM -0800, Marshall Clow wrote:
| At 1:38 PM -0500 12/13/02, Adam Shostack wrote:
| PS: Current news in Canada includes the gun registry having undergone
| a 12x cost overrun, and its not clear what will happen to it. A large
| reason for the overruns have been
to 48 hours in a tank broke
nearly anyone.
Adam
--
It is seldom that liberty of any kind is lost all at once.
-Hume
the unofficially sold elections and gerrymandered districts
we have now?
Adam
--
It is seldom that liberty of any kind is lost all at once.
-Hume
weren't
actually wars, perse), Afghanistan. So far, not one of them has turned
out to be.
Is there any overwhelming reason to believe that going back to
Iraq would be any different?
-adam
I think that the intersection of usability and security is of
tremendous import, and wanted to share an under-advertised sort of
workshop announcement:
http://www.acm.org/sigchi/
The conference home page is
http://www.chi2003.org/
The workshop page is
Since posting, I got a better web page:
http://www.iit.nrc.ca/~patricka/CHI2003/HCISEC/index.html
Adam
On Mon, Nov 11, 2002 at 09:54:51AM -0500, Adam Shostack wrote:
| I think that the intersection of usability and security is of
| tremendous import, and wanted to share an under-advertised sort
the dissemination of this kind of info.
A full police state can't prevent anything, it can just make some
things less common. For example, samizdat in the USSR still got
copied and passed around. Drug use is a problem in US prisons. Etc.
Adam
--
It is seldom that liberty of any kind is lost all
, probably google could find it).
Another related type of risk is that SSL does not necessarily obsecure
the page requested as the request and/or response may have unique,
predictable and publicly measurable size uniquely identifying the
document requested.
Adam
--
http://www.cypherspace.org/adam/
be encrypted after someone sent me an NDA. The
person cares about confidentiality, but doesn't know how to achieve
it, and doesn't understand why its not in their mailer.
Adam
--
It is seldom that liberty of any kind is lost all at once.
-Hume
that are outside developers control.
Adam
--
It is seldom that liberty of any kind is lost all at once.
-Hume
of
| terror has become the meta-horseman.
I stand by Hume. Such losses are indeed seldom. Little insidious
losses are far more common.
Adam
--
It is seldom that liberty of any kind is lost all at once.
-Hume
hashing based form of selective disclosure.
Adam
--
[1] Niels Ferguson, Single Term Off-Line Coins, eurocrypt 93.
[2] Stefan Brands, Rethinking Public Key Infrastructures and Digital
Certificates; Building in Privacy, MIT Press, Aug 2000
viz p27: Another attempt to protect privacy is for the CA
://www.apfa.org/public/articles/News-Events/STUPID_RULES.HTML
Adam
--
It is seldom that liberty of any kind is lost all at once.
-Hume
On Fri, Oct 25, 2002 at 02:37:32AM +0100, Adam Back wrote:
| Seems to me this would pass current IP laws because it is like a radio
| station which broadcast the name of a song and the user is expected to
| insert the CD in his player and play along to keep up with the
| commentary, only
to
insert the CD in his player and play along to keep up with the
commentary, only automated and with open APIs for the load and play
this CD track instructions so people can hook it up to whatever is
convenient to them.
Adam
in the
same way that the TOR and SCP functions can be configured by the user
(but not by hostile software).
For example why not a local user present function to lie about TOR
hash to allow debugging (for example).
Adam Back wrote:
- isn't it quite weak as someone could send different information
.
Adam
--
http://www.cypherspace.net/
..For that price you can get securid cards,
which aren't nearly as pretty, but that's nothing Ideo couldn't fix in
a week.
Adam
--
It is seldom that liberty of any kind is lost all at once.
-Hume
.
(If authentication is centralized, searching backwards may not be a
security risk.)
I think the most interesting part of this is the unit looks cool, and
its spun slightly differently than other tokens have been.
Adam
--
It is seldom that liberty of any kind is lost all at once
that the user won't make simple hardware modifications.
Adam
Original Message
Subject: LCS/CIS Talk, OCT 18, TOMORROW
Date: Thu, 17 Oct 2002 12:49:01 -0400
From: Be Blackburn [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
CC: [EMAIL PROTECTED]
Open to the Public
Date: Friday, Oct 18, 2002
to recover messages.
The NSA's backdoor public key is at the URL below.
http://www.cypherspace.org/~adam/hacks/lotus-nsa-key.html
(The public key had an Organization name of MiniTruth, and a Common
Name of Big Brother -- both Orwell 1984 references, presumably by
a lotus programmer).
Adam
Prosecutors also argued that one of the suspects, Shafal Mosed, was
suspicious because he had 11 credit cards in different names and two
social security cards in different names in his wallet when
arrested.
His attorney, Patrick Brown, said Mosed merely had his own social
security card,
On Wed, Oct 02, 2002 at 09:12:47PM +0100, Ben Laurie wrote:
| Adam Shostack wrote:
| On Wed, Oct 02, 2002 at 04:54:54PM +0100, Ben Laurie wrote:
| | Lucky Green wrote:
| | I also agree that current MTAs' implementations of STARTTLS are only a
| | first step. At least in postfix, the only MTA
are authenticated, while anyone
else is opportunisticly encrypted.
Adam
--
It is seldom that liberty of any kind is lost all at once.
-Hume
more interested in playing with things
closer to the output stage, like speaker resonance control and
electrical hum elimination...
Adam
--
It is seldom that liberty of any kind is lost all at once.
-Hume
devastation would be unparalleled!
The damage to the american economy at large would be horrific. Clearly,
only a terrorist would want to possess unlicensed eyes.
-adam
1 - 100 of 155 matches
Mail list logo