Re: Return of the death of cypherpunks.

2005-10-31 Thread John Kelsey
From: James A. Donald [EMAIL PROTECTED]
Sent: Oct 28, 2005 12:09 PM
To: [EMAIL PROTECTED]
Subject: Return of the death of cypherpunks.

From: Eugen Leitl [EMAIL PROTECTED]
..
 The list needs not to stay dead, with some finite 
 effort on our part (all of us) we can well resurrect 
 it. If there's a real content there's even no need 
 from all those forwards, to just fake a heartbeat.

Since cryptography these days is routine and uncontroversial, there
is no longer any strong reason for the cypherpunks list to continue
to exist.

Well, political controversy seems like the least interesting thing
about the list--to the extent we're all babbling about who needs
killing and who's not a sufficiently pure
libertarian/anarchocapitalist and which companies are selling out to
the Man, the list is nothing special.  The cool thing is the
understanding of crypto and computer security techology as applied to
these concerns that are political.  And the coolest thing is getting
smart people who do real crypto/security work, and write working code,
to solve problems.  The ratio of political wanking to technical posts
and of talkers to thinkers to coders needs to be right for the list to
be interesting.  

..
--digsig
 James A. Donald
 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
 AnKV4N6f9DgtOy+KkQ9QsiXcpQm+moX4U09FjLXP
 4zfMeSzzCXNSr737bvqJ6ccbvDSu8fr66LbLEHedb

--John Kelsey



Re: On Digital Cash-like Payment Systems

2005-10-31 Thread John Kelsey
From: cyphrpunk [EMAIL PROTECTED]
Sent: Oct 27, 2005 9:15 PM
To: James A. Donald [EMAIL PROTECTED]
Cc: cryptography@metzdowd.com, [EMAIL PROTECTED]
Subject: Re: On Digital Cash-like Payment Systems

On 10/26/05, James A. Donald [EMAIL PROTECTED] wrote:
 How does one inflate a key?

Just make it bigger by adding redundancy and padding, before you
encrypt it and store it on your disk. That way the attacker who wants
to steal your keyring sees a 4 GB encrypted file which actually holds
about a kilobyte of meaningful data. Current trojans can steal files
and log passwords, but they're not smart enough to decrypt and
decompress before uploading. They'll take hours to snatch the keyfile
through the net, and maybe they'll get caught in the act.

Note that there are crypto schemes that use huge keys, and it's
possible to produce simple variants of existing schemes that use
multiple keys.  That would mean that the whole 8GB string was
necessary to do whatever crypto thing you wanted to do.  A simple
example is to redefine CBC-mode encryption as

C[i] = E_K(C[i-1] xor P[i] xor S[C[i-1] mod 2^{29}])

where S is the huge shared string, and we're using AES.  Without
access to the shared string, you could neither encrypt nor decrypt.

CP

--John



Re: [PracticalSecurity] Anonymity - great technology but hardly used

2005-10-28 Thread John Kelsey
From: Eugen Leitl [EMAIL PROTECTED]
Sent: Oct 27, 2005 3:22 AM
To: Shawn K. Quinn [EMAIL PROTECTED], [EMAIL PROTECTED]
Subject: Re: [PracticalSecurity] Anonymity - great technology but hardly used

..
It's never about merit, and not even money, but about predeployed
base and interoperability. In today's world, you minimize the
surprise on the opposite party's end if you stick with
Redmondware. (Businessfolk hate surprises, especially complicated,
technical, boring surprises).
 
Not only that, but this is often sensible.  Have you noticed the
bizarre misfit between our allegedly phonetic alphabet and how things
are spelled?  Why don't we get everyone to change that?  Or the silly
insistence of sticking with a base 60 time standard?  Or the whole
atrocity of English measurements that the US still is stuck with?  Oh
yeah, because there's an enormous installed base, and people are able
to do their jobs with them, bad though these tools are.  

..
OpenOffice  Co usually supports a subset of Word and Excel formats.
If you want to randomly annoy your coworkers, use OpenOffice to
process the documents in MS Office formats before passing them on,
without telling what you're doing. Much hilarity will ensue.

I'll note that you can do the same thing by simply using slightly
different versions of Word.  MS takes a bad rap for a lot of their
software (Excel and Powerpoint are pretty nice, for example), but Word
is a disaster.

Eugen* Leitl a href=http://leitl.org;leitl/a

--John Kelsey



Re: On the orthogonality of anonymity to current market demand

2005-10-26 Thread John Kelsey
From: R.A. Hettinga [EMAIL PROTECTED]
Sent: Oct 25, 2005 8:34 AM
To: cryptography@metzdowd.com, [EMAIL PROTECTED]
Subject: On the orthogonality of anonymity to current market demand

..
That is to say, your analysis conflicts with the whole trend towards
T-0 trading, execution, clearing and settlement in the capital
markets, and, frankly, with all payment in general as it gets
increasingly granular and automated in nature. The faster you can
trade or transact business with the surety that the asset in question
is now irrevocably yours, the more trades and transactions you can
do, which benefits not only the individual trader but markets as a
whole.

The prerequisite for all this is that when the asset changes hands,
it's very nearly certain that this was the intention of the asset's
previous owner.  My point isn't to express my love for book-entry
payment systems.  There's plenty to hate about them.  But if the
alternative is an anonymous, irreversible payment system whose control
lies in software running alongside three pieces of spyware on my
Windows box, they probably still win for most people.  Even bad
payment systems are better than ones that let you have everything in
your wallet stolen by a single attack.  

..
However anonymous irrevocability might offend one's senses and
cause one to imagine the imminent heat-death of the financial
universe (see Gibbon, below... :-)), I think that technology will
instead step up to the challenge and become more secure as a
result. 

What's with the heat-death nonsense?  Physical bearer instruments
imply stout locks and vaults and alarm systems and armed guards and
all the rest, all the way down to infrastructure like police forces
and armies (private or public) to avoid having the biggest gang end up
owning all the gold.  Electronic bearer instruments imply the same
kinds of things, and the infrastructure for that isn't in place.  It's
like telling people to store their net worth in their homes, in gold.
That can work, but you probably can't leave the cheapest lock sold at
Home Depot on your front door and stick the gold coins in the same
drawer where you used to keep your checkbook.

And, since internet bearer transactions are, by their very
design, more secure on public networks than book-entry transactions
are in encrypted tunnels on private networks, they could even be said
to be secure *in spite* of the fact that they're anonymous; that --
as it ever was in cryptography -- business can be transacted between
two parties even though they don't know, or trust, each other.

Why do you say internet bearer transactions are more secure?  I can
see more efficient, but why more secure?  It looks to me like both
kinds of payment system are susceptible to the same broad classes of
attacks (bank misbehavior (for a short time), someone finding a
software bug, someone breaking a crypto algorithm or protocol).  What
makes one more secure than the other?  

..
Cheers,
RAH

--John Kelsey



Re: [fc-discuss] Financial Cryptography Update: On Digital Cash-like Payment Systems

2005-10-25 Thread John Kelsey
From: cyphrpunk [EMAIL PROTECTED]
Sent: Oct 24, 2005 5:58 PM
To: John Kelsey [EMAIL PROTECTED]
Subject: Re: [fc-discuss] Financial Cryptography Update: On Digital Cash-like 
Payment Systems

..
Digital wallets will require real security in user PCs. Still I don't
see why we don't already have this problem with online banking and
similar financial services. Couldn't a virus today steal people's
passwords and command their banks to transfer funds, just as easily
as the fraud described above? To the extent that this is not
happening, the threat against ecash may not happen either.

Well, one difference is that those transactions can often be undone,
if imperfectly at times.  The whole set of transactions is logged in
many different places, and if there's an attack, there's some
reasonable hope of getting the money back.  And that said, there have
been reports of spyware stealing passwords for online banking systems,
and of course, there are tons of phishing and pharming schemes to get
the account passwords in a more straightforward way.   The point is,
if you're ripped off in this way, there's a reasonable chance you can
get your money back, because the bank has a complete record of the
transactions that were done.  There's no chance of this happening when
there's no record of the transaction anywhere.  

 The payment system operators will surely be sued for this, because
 they're the only ones who will be reachable.  They will go broke, and
 the users will be out their money, and nobody will be silly enough to
 make their mistake again.

They might be sued but they won't necessarily go broke. It depends on
how deep the pockets are suing them compared to their own, and most
especially it depends on whether they win or lose the lawsuit. 

I don't think so.  Suppose there's a widespread attack that steals
money from tens of thousands of users of this payment technology.
There seem to be two choices:

a.  The payment system somehow makes good on their losses.

b.  Everyone who isn't dead or insane pulls every dime left in that
system out, knowing that they could be next.  

It's not even clear that these are mutually exclusive, but if (a)
doesn't happen, (b) surely will.  Nobody wants their money stolen, and
I don't think many people are so confident of their computer security
that they're willing to bet huge amounts of money on it.  If you have
to be that confident in your computer security to use the payment
system, it's not going to have many clients.  

CP

--John



Re: Judy Miller needing killing

2005-10-24 Thread John Kelsey
The question is, can 
she defy a subpoena based on membership in the privileged Reporter class 
that an ordinary person could not defy?

It seems like the real question is how membership in the class is determined.  
If anyone who's acting like a reporter in a certain context (say, Adam Shostack 
interviewing me for his blog) qualifies, then I don't see the constitutional 
problem, though it may still be good or bad policy.  If you've got to get a 
special card from the government that says you're a journalist, it seems like 
that's more of a problem.  

I guess other places where there's some right not to answer these questions 
exist, but they're mostly based on licensed professions.  I gather your lawyer 
or priest has much more ability to refuse to talk than your doctor or 
accountant, and that your psychologist has a shockingly small ability to refuse 
to talk.  Other than priest, though, all these fields are at least somewhat 
licensed by the state for other reasons, so that makes it easy to use 
possession of a license as a way to tell when someone really is a doctor, 
lawyer, psychologist, etc.  For constitutional reasons, that's not really true 
for journalists.  

GH

--John



Re: [fc-discuss] Financial Cryptography Update: On Digital Cash-like Payment Systems

2005-10-24 Thread John Kelsey

From: cyphrpunk [EMAIL PROTECTED]
Sent: Oct 24, 2005 2:14 PM
Subject: Re: [fc-discuss] Financial Cryptography Update: On Digital Cash-like 
Payment Systems

On 10/22/05, Ian G [EMAIL PROTECTED] wrote:

Note that e-gold, which originally sold non-reversibility as a key
benefit of the system, found that this feature attracted Ponzi
schemes and fraudsters of all stripes, and eventually it was forced
to reverse transactions and freeze accounts. It's not clear that any
payment system which keeps information around to allow for potential
reversibility can avoid eventually succumbing to pressure to reverse
transactions. Only a Chaumian type system, whose technology makes
reversibility fundamentally impossible, is guaranteed to allow for
final clearing. And even then, it might just be that the operators
themselves will be targeted for liability since they have engineered
a system that makes it impossible to go after the fruits of criminal
actions.

More to the point, an irreversible payment system raises big practical
problems in a world full of very hard-to-secure PCs running the
relevant software.  One exploitable software bug, properly used, can
steal an enormous amount of money in an irreversible way.  And if your
goal is to sow chaos, you don't even need to put most of the stolen
money in your own account--just randomly move it around in
irreversible, untraceable ways, making sure that your accounts are
among the ones that benefit from the random generosity of the attack.
The payment system operators will surely be sued for this, because
they're the only ones who will be reachable.  They will go broke, and
the users will be out their money, and nobody will be silly enough to
make their mistake again.

CP

--John



Re: [EMAIL PROTECTED]: Wikipedia Tor]

2005-10-03 Thread John Kelsey
Damn good point.  Now that I think of it, all the classic examples of
anonymous publication were really pseudonymous.  (Publius, et al)

They have different requirements.  Votes and cash transactions and similar 
things 
require no history, no reputation.  They're one-shot actions that should not be 
linkable 
to other actions.  

Pseudonyms are used everywhere in practice, because even my name is effectively 
a pseudonym unless you have some reason to try to link it to a meatspace human. 
 
This is why it's worth reading a book by Mark Twain, even though that wasn't 
his real
name.  And it would be worth reading those books even if we had no idea who had 
really
written them.  The reuptation and history of the author lets you decide whether 
you want
to read the next of his books.  The same is true of academic papers--you don't 
need to 
have met me or even to be able to find me, in order to read my papers and 
develop an 
opinion (hopefully a good one) about the quality of my work.  And that 
determines whether
you think the next paper is worth reading.

--John



Re: Well, they got what they want...

2005-07-25 Thread John Kelsey
From: Tyler Durden [EMAIL PROTECTED]
Sent: Jul 23, 2005 9:17 PM
To: [EMAIL PROTECTED], [EMAIL PROTECTED]
Subject: Re: Well, they got what they want...

..  
Saw a local security expert on the news, and he stated the
obvious: Random earches and whatnot are going to do zero
for someone determined, but might deter someone who was
thinking about blowing up the A train. In other words,
everyone here in NYC knows that we've given up a lot for
the sake of the appearence of security, but no one seems to
give a damn.

I think the reality is a bit different.  The random searches
won't keep someone who's planning an attack from trying to
carry it out, but it may delay their attack, if they made
plans based on the old security setup, not the new one.  It
may also convince them to shift the attack to a new target.

--John



Re: Posion Pill for ED?

2005-07-06 Thread John Kelsey
Hey, I think I saw a bald eagle roosting up in that tree.  You know, the one 
next to those buried Indian artifacts, right next to those rusting metal drums 
I got from Russel Bliss.

--John



Re: [IP] Real ID = National ID (fwd from dave@farber.net)

2005-05-12 Thread John Kelsey
From: Justin [EMAIL PROTECTED]
Sent: May 9, 2005 3:55 PM
To: [EMAIL PROTECTED]
Subject: Re: [IP] Real ID = National ID (fwd from [EMAIL PROTECTED])

..
What do we need security for?  We need security because a lot of
people hate the U.S., and because we won't close our borders, and
because society has become too diverse.  

Drivers license security is being pursued because a bunch of people
want to be able to reliably use drivers licenses as ID cards for their
own purposes.  That can be for TSA screening of passneger names
(though I think it's fantasy to imagine that this will really prevent
terrorists from flying, and it has endless creepy totalitarian uses),
or for making it harder to get a bank account without submitting your
true name so you get taxed and monitored, or making it easier for
the folks running various preferred shopper card programs to make
you give them the right information, or keeping you from reselling
your airline tickets.  (Note that the whole market segmentation/price
discrimination scheme that this threatened has basically died by now,
but we're still stuck with binding names to airline tickets.)  

There is a significant correlation between cultural
diversity/proximity and social unrest.  That does not require people
of different races; put white klansmen next to white members of the
Black Panthers and you have the same thing.

This is *very* dependent on the cultures in question.  For the most
part, Japanese and Korean immigrants (to take a couple easy examples)
make wonderful neighbors, though they're members of a different race
and culture and often a different religion.  On the other hand, turn
of the century Irish immigrants were English-speaking Christians, but
they made nightmarish neighbors.  And neither of those have much to do
with terrorism (as opposed to low-level crime, public drunkenness,
imported criminal gangs, etc.).  The Irish in the US have never been
much of a terrorist threat, though things are very different in the
UK!  

None of those three core problems will be solved by RealID.
Therefore, while RealID may make some difference at the margins, it
cannot be very effective.

Well, it depends on what your goal is.  If your goal is
harder-to-forge drivers licenses for all kinds of good and bad
purposes, then it may help.  If your goal is seriously stopping
terrorism or shutting down illegal immigration, it probably won't have
much of an impact.

--John



Re: Pi: Less Random Than We Thought

2005-05-06 Thread John Kelsey

From: Sarad AV [EMAIL PROTECTED]
Sent: May 5, 2005 8:43 AM
To: [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Subject: Re: Pi: Less Random Than We Thought

Well, if it were generated by a random process, we'd expect to see every 
n-bit substring in there somewhere, sooner or later, since the sequence 
never ends or repeats.  Thus, the wonderful joke/idea about selling 
advertising space in the binary expansion of pi.  Not only will your message
last forever, but it will be seen by any advanced civilization that develops 
math
and computers, even ones in other galaxies.

--John



Re: Secure erasing Info (fwd from richard@SCL.UTAH.EDU)

2005-05-04 Thread John Kelsey

Just as a data point, PGPDisk works fine on CF devices.  I use this for a CF 
card on which I keep a bunch of my work for movement between laptop and desktop 
machines.

--John




Re: Ready, Aim, ID Check: In Wrong Hands, Gun Won't Fire

2005-01-13 Thread John Kelsey
From: Justin [EMAIL PROTECTED]
Sent: Jan 10, 2005 7:35 PM
To: [EMAIL PROTECTED]
Subject: Re: Ready, Aim, ID Check: In Wrong Hands, Gun Won't Fire

..
Some gun accidents are suicides reported as such to avoid
embarrassment to the family.  

I've heard this from other people, too--some in reasonably good positions to 
know how such things were reported.  And there's surely some ambiguity between 
fatal accidents caused by doing something really stupid and intentional 
suicides.  

..

--John



Re: Ready, Aim, ID Check: In Wrong Hands, Gun Won't Fire

2005-01-10 Thread John Kelsey
From: R.A. Hettinga [EMAIL PROTECTED]
Sent: Jan 6, 2005 11:47 AM
To: cryptography@metzdowd.com, [EMAIL PROTECTED]
Subject: Ready, Aim, ID Check: In Wrong Hands, Gun Won't Fire

..
Ready, Aim, ID Check: In Wrong Hands, Gun Won't Fire
 By ANNE EISENBERG

I just wonder what the false negative rates are.  Seem like a gun that has a 1% 
chance of refusing to fire when you *really need it* might not be worth all 
that much.  Similarly, one that you can't get to work if you've got a band-aid 
on your finger, or a cut on your hand, or whatever, loses a lot of its value.  
On the other hand, a gun that can't be made to go off by your toddler is a 
pretty huge win, assuming you're willing to trust the technology, but a 90% 
accuracy level sounds to me like 10% of the time, your three year old can, in 
fact, cause the thing to go off.  That's not worth much, but maybe they'll get 
it better.   And the suspect struggles with cop, gets gun, and shoots cop 
problem would definitely be helped by a guy that wouldn't go off for 90% of 
attackers.  

--John



Re: California Bans a Large-Caliber Gun, and the Battle Is On

2005-01-04 Thread John Kelsey
Interesting questions:  How hard is it for someone to actually hit an airplane 
with a rifle bullet?  How often do airplane maintenance people notice 
bulletholes?  

My understanding is that a single bullethole in a plane is not likely to do 
anything serious to its operation--the hole isn't big enough to depressurize 
the cabin of a big plane, and unless it hits some critical bits of the plane, 
it's not going to cause mechanical problems.   I don't think the bigger .50 
round would fundamentally change that.  So this could be one of those things 
that just happens from time to time, without getting much press.  (Most people 
have never heard of phantom controllers either, but they're a real phenomenon, 
and they seem at least as dangerous as some nut with a rifle taking potshots at 
landing planes.)  

 --John
 



Re: How to Build a Global Internet Tsunami Warning System in a Month

2005-01-04 Thread John Kelsey
From: Major Variola (ret) [EMAIL PROTECTED]
Sent: Jan 3, 2005 4:45 PM
To: [EMAIL PROTECTED] [EMAIL PROTECTED]
Subject: Re: How to Build a Global Internet Tsunami Warning System in a  Month

..
3. Homebrew warning systems will face the same problems as eg pro
volcano warning systems: too many false alarms and no one cares.

The best defense would seem to be a population with a lot of TVs and radios.  
At least after the first tsunami hit, the news would quickly spread, and there 
were several hours between when the waves arrived at different shores.  (And a 
9.0 earthquake on the seafloor, or even a 7.0 earthquake on the seafloor, is a 
rare enough event that it's not crazy to at least issue a stay off the beach 
kind of warning.)  My first take on this is that it's an example of the many 
ways that it's better to be in a rich country than a poor one.  Major natural 
disasters are a lot bloodier in poor countries, for lots of infrastructure 
reasons (good communications to get out the warning, good roads to evacuate on, 
resources available for disaster planning long before the disaster hits, 
building codes or best practices that require some resistance to known 
disasters, etc.).  

--John



Re: Israeli Airport Security Questioning Re: CRYPTO-GRAM, December 15, 2004

2004-12-22 Thread John Kelsey
From: Major Variola (ret) [EMAIL PROTECTED]
Sent: Dec 21, 2004 10:20 PM
To: [EMAIL PROTECTED] [EMAIL PROTECTED]
Subject: Re: Israeli Airport Security Questioning Re: CRYPTO-GRAM,  December  
15,  2004

At 02:16 PM 12/20/04 -0500, John Kelsey wrote:
No doubt a real intelligence agent would be good at getting through
this kind of screening, but that doesn't mean most of the people who
want to blow up planes would be any good at it!

You really continue to understimate the freedom fighters, don't you?
(The first) King George did the same.

Maybe so.  It's clearly added cost to the attackers--they have to select not 
just the subset of volunteers willing to blow themselves up on the plane, but 
the subset of *those* who can also keep cool under rapid-fire questioning of 
their cover story.  The attackers probably have to either spend a lot of time 
rehearsing their cover stories, or have to keep their cover stories very close 
to their actual lives and interests, which makes profiling easier.  Both of 
these cut way down on the total pool of attackers available.  

My assumption is that national intelligence agencies can probably afford to do 
this--they can probably filter through a lot more possible candidates to get 
field agents who can handle a cover story well, for example, since they can 
hire openly, rather than quietly recruiting from madrassa students or 
something.  Their training facilities can be centralized and stay in one place, 
rather than being a camp in the desert somewhere that has to be abandoned 
frequently, and they can develop a lot of expertise in training people to 
survive intensive questioning without fumbling their cover story.   

--John






Re: Israeli Airport Security Questioning Re: CRYPTO-GRAM, December 15, 2004

2004-12-21 Thread John Kelsey
The difference here is that Bad_Guy is visiting the
country for the first time. Now, there are fewer
questions to ask.

But that's a common enough situation that the questioners are going to be ready 
for it.  And I bet a lot of the point of their questioning is just to see if 
they detect signs of stress where they expect to.  If you are a smart person 
who does something like this 20 times a day, you'll soon get a really good feel 
for when something odd is going on.  Also, any kind of in-depth questioning is 
likely to uncover a lot of fraudulent claims.  If I say I'm a chemical 
engineer, it's not going to take much depth of knowledge for the questioner to 
find out I don't know things any chemical engineer would know, for example.  
(It wouldn't be hard to come up with some computerized system for pulling up 
lists of questions like this.  Like, someone says he's Catholic, and you ask 
him who was born without sin as a direct result of the immaculate conception, 
or ask him to say a Hail Mary.)  So this might force you to tell more of the 
truth, which makes it easier to profile you.  

And this is all physical / procedural security.  You're not building an 
unclimbable wall, you're building lots of challenging speedbumps.  No doubt a 
real intelligence agent would be good at getting through this kind of 
screening, but that doesn't mean most of the people who want to blow up planes 
would be any good at it!  

Sarad.

--John



Re: Flaw with lava lamp entropy source

2004-12-21 Thread John Kelsey
From: James A. Donald [EMAIL PROTECTED]
Sent: Dec 18, 2004 2:51 PM
To: [EMAIL PROTECTED] [EMAIL PROTECTED]
Subject: Re: Flaw with lava lamp entropy source

..
These days the video entropy source is not a lava lamp, but a
lens cap - in the dark, the ccds generate significant thermal
noise, which (unlike chaotic noise) cannot fail, unless someone
immerses the camera in liquid helium. 

Do you (does anyone) know of any papers that have formally analyzed this 
entropy source?  

--digsig
 James A. Donald

--John



RE: Blinky Rides Again: RCMP suspect al-Qaida messages

2004-12-11 Thread John Kelsey
From: Tyler Durden [EMAIL PROTECTED]
Sent: Dec 9, 2004 2:47 PM
To: [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED], 
   [EMAIL PROTECTED]
Subject: RE: Blinky Rides Again: RCMP suspect al-Qaida messages

..
NSA folks, on the other hand, I would assume have a soft version of a 
Variola Stego suitcase...able to quickly detect the presence of pretty much 
any kind of stego and then perform some tests to determine what kind was 
used. I bet they've been aware of Al Qaeda stego for a long time...that's 
probably the kind of thing they are very very good at.

Maybe, but I think it would be very hard to write a general-purpose stego 
detector, without knowing the techniques used for encoding the message.  And if 
you know the distribution of your cover channel as well as your attacker, or 
can generate lots of values from that distribution even if you can'd describe 
it, you can encode messages in a way that provably can't be detected, down to 
the quality of your random number generator and the difficulty of guessing your 
key.  

I imagine this as something much like a virus scanner.  Look for known stego 
programs, and also for signatures of known stegp programs.  Really good 
programs might be impossible to find without doing, say, a password search.  

But it's worth noting that AQ has to do key management just like the rest of 
us, and that's hard when you are communicating with a lot of different people.  
If your stego is password-protected, some terrorist's laptop is going to have a 
post-it note on the screen with the password.  

..
-TD

--John Kelsey



RE: Blinky Rides Again: RCMP suspect al-Qaida messages

2004-12-11 Thread John Kelsey
From: J.A. Terranson [EMAIL PROTECTED]
Sent: Dec 9, 2004 1:19 PM
To: Tyler Durden [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED], 
   [EMAIL PROTECTED]
Subject: RE: Blinky Rides Again: RCMP suspect al-Qaida messages

.
As recently as two years ago, I had a classroom full of cops (mostly fedz
from various well-known alphabets) who knew *nothing* about stego.  And I
mean *NOTHING*.  They got a pretty shallow intro: here's a picture, and
here's the secret message inside it, followed by an hour of theory and
how-to's using the simplest of tools - every single one of them was just
blown away. Actually, that's not true - the Postal Inspectors were bored,
but everyone _else_ was floored.

But the real thing they needed to know was there can be hidden information in 
files that look innocent and what they need to do to find that hidden 
information.  I expect the answer to that will involve either shipping it off 
to some expert at the FBI (who will have to do some serious flow control, or 
he'll be receiving copies of all the video games on every small-time drug 
dealer's computer), or running some tools to look for the hidden data.  It's 
not like you're going to expect a random detective to learn how to cryptanalyze 
stego schemes, anymore than you're going to expect him to learn how to check 
for DNA matches in a lab.  He'll need to have some notion of how the technology 
works, and some rules of thumb for how to handle the evidence to keep from 
tainting it, and that's about it.  

J.A. Terranson
[EMAIL PROTECTED]
0xBD4A95BF

--John
From jeff Sat Dec 11 15:47:34 2004
Return-Path: [EMAIL PROTECTED]
Delivery-Date: Sat Dec 11 07:47:34 2004
Return-path: [EMAIL PROTECTED]
Envelope-to: archive@jab.org
Delivery-date: Sat, 11 Dec 2004 07:47:34 -0800
Received: from exprod5mx95.postini.com ([64.18.0.83] helo=psmtp.com)
by toko.jab.org with smtp (Exim 3.36 #1 (Debian))
id 1Cd9T4-0007Tv-00
for archive@jab.org; Sat, 11 Dec 2004 07:47:34 -0800
Received: from source ([205.217.113.11]) by exprod5mx95.postini.com 
([64.18.4.10]) with SMTP;
Sat, 11 Dec 2004 07:50:06 PST
Received: from m18.lax.untd.com [64.136.30.81] by mail.bestware.biz
  (SMTPD32-8.01) id A78E6410100; Sat, 11 Dec 2004 09:51:42 -0600
Received: from m18.lax.untd.com (localhost [127.0.0.1])
by m18.lax.untd.com with SMTP id AABA5YFY8AKW4ZCJ
for [EMAIL PROTECTED] (sender [EMAIL PROTECTED]);
Sat, 11 Dec 2004 07:48:46 -0800 (PST)
X-UNTD-OriginStamp: az9YdFY2ee3SNysnJfolq2KJwZepwCZSitJgWH7+UviVe4JGcGTL7Q==
Received: (from [EMAIL PROTECTED]) 
 by m18.lax.untd.com (jqueuemail) id KEK35MH9; Sat, 11 Dec 2004 07:48:33 PST
To: [EMAIL PROTECTED]
Date: Sat, 11 Dec 2004 08:43:34 -0700
Subject: Re: [TruthTalk] Jesus the Messiah
Message-ID: [EMAIL PROTECTED]
X-Mailer: Juno 5.0.33
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary=--__JNP_000_3805.778b.2e05
X-Juno-Line-Breaks: 7-6,7,9-61,63-71,73-78,79-32767
From: [EMAIL PROTECTED]
X-ContentStamp: 15:7:4214601920
Precedence: bulk
Sender: [EMAIL PROTECTED]
Reply-To: [EMAIL PROTECTED]
X-pstn-levels: (S:99.9/99.9 R:95.9108 P:95.9108 M:92.8780 C:99.7951 )
X-pstn-settings: 1 (0.1500:0.1500) gt3 gt2 gt1 r p m c 
X-pstn-addresses: from [EMAIL PROTECTED] [294/10] 
X-Spam-Checker-Version: SpamAssassin 2.64 (2004-01-11) on toko.jab.org
X-Spam-Level: 
X-Spam-Status: No, hits=-4.5 required=4.0 tests=BAYES_00,HTML_FONTCOLOR_BLUE,
HTML_MESSAGE,NO_REAL_NAME autolearn=no version=2.64

This message is in MIME format.  Since your mail reader does not understand
this format, some or all of this message may not be legible.

__JNP_000_3805.778b.2e05
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 8bit

On Sat, 11 Dec 2004 10:19:37 EST [EMAIL PROTECTED] writes:
In a message dated 12/10/2004 11:31:40 PM Pacific Standard Time,
[EMAIL PROTECTED] writes:


John,  Sorry about that. I'm very frustrated right now. It's not you...

||

..Not a good time of the year for heartache.   
John 

--

Well, today has been a sad ol' lonesome day
Yeah, today has been a sad ol' lonesome day
I'm just sittin' here thinking
With my mind a million miles away

Well, they're doing the double shuffle, throwin' sand on the floor
They're doing the double shuffle, they're throwin' sand on the floor
When I left my long-time darlin'
She was standing in the door

Well, my pa he died and left me, my brother got killed in the war
Well, my pa he died and left me, my brother got killed in the war
My sister, she ran off and got married
Never was heard of any more

Samantha Brown lived in my house for about four or five months
Samantha Brown lived in my house for about four or five months
Don't know how it looked to other people
I never slept with her even once

Well, the road's washed out - weather not fit for man or beast
Yeah the road's washed out - weather not fit for man or beast
Funny, how the things you have the hardest time parting 

Re: Word Of the Subgenius...

2004-12-08 Thread John Kelsey
From: Steve Thompson [EMAIL PROTECTED]
Sent: Dec 7, 2004 1:26 PM
To: [EMAIL PROTECTED]
Subject: Re: Word Of the Subgenius...

..
Tim May has probably gotten all strange in the last few years, living in
his remote hilltop home, waiting to see the end that will not come since
the y2k crisis turned out to be nothing more than a financial boondoggle
for the companies that believed all the hype.

Maybe, maybe not.  The thing I always find interesting and annoying about Tim 
May's posts is that he's sometimes making really clearly thought out, 
intelligent points, and other times spewing out nonsense so crazy you can't 
believe it's coming from the same person.  It's also clear he's often yanking 
peoples' chains, often by saying the most offensive thing he can think of.  But 
once in awhile, even amidst the crazy rantings about useless eaters and ovens, 
he'll toss out something that shows some deep, coherent thought about some 
issue in a new and fascinating direction. 

..
Steve

--John



Re: Word Of the Subgenius...

2004-12-06 Thread John Kelsey
From: Tyler Durden [EMAIL PROTECTED]
Sent: Dec 4, 2004 8:33 PM
To: [EMAIL PROTECTED]
Subject: Word Of the Subgenius...

I thought JR Bob Dobbs got beamed up to that comet with those LA Koolaid 
kooks...

No, but I do believe the comet kooks engaged in bobbitization (or perhaps, 
merely bobbing).  

-TD

--John



Re: Fallujah: Marine Eye-Witness Report

2004-11-24 Thread John Kelsey
From: James A. Donald [EMAIL PROTECTED]
Sent: Nov 24, 2004 1:02 AM
To: [EMAIL PROTECTED]
Subject: Re: Fallujah: Marine Eye-Witness Report

..
And the problem with a civil war in Iraq is?

At least three:

a.  The pottery barn theory of foreign affairs--we'd be blamed for making 
things worse.  (I don't know how much this matters long term, but it would 
certainly have made life pretty hard on Tony Blair and the rest of the world 
leaders who actually supported us.)

b.  We would one day like their oil back on the market.

c.  We would like to make sure that the next regime to come to power there 
isn't someone we also feel obligated to get rid of, as even invasions done on 
the cheap cost a lot of money.  


--digsig
 James A. Donald

--John



Re: Fallujah: Marine Eye-Witness Report

2004-11-22 Thread John Kelsey
From: R.A. Hettinga [EMAIL PROTECTED]
Sent: Nov 21, 2004 9:23 PM
To: John Young [EMAIL PROTECTED], [EMAIL PROTECTED]
Subject: Re: Fallujah: Marine Eye-Witness Report

..
By the way, John, did you know that Bush Is Going To Revive The Draft???

I know this is currently known to be false by all informed opinion, but I don't 
think it's crazy to worry about it.  If we want to fight high-tech wars like 
the invasion of Iraq, lots of conscript troops aren't that useful.  If we want 
to occupy places like Iraq, we need people to do the occupying, and it's clear 
that there's some strain on our forces now.  
Conscript troops might very well be useful for that kind of work.  Suppose we 
invade and occupy Iran next.  Where will the soldiers needed to hold down 
occupied territory come from?  Suppose we follow up with Syria, which is surely 
about as repressive and nasty a place as Saddam's Iraq.  

Three things are very clear about the current situation:

a.  A lot of people are finding out that their military obligations are going 
to be longer and much less pleasant than they expected.  This is going to have 
a big impact on recruiting in the future.

b.  If we just want to hold down what we've got, we have enough troops to do 
it, but if we want to really go on a democratizing bender in the Middle East, 
we'll need more troops.  

c.  It's not at all clear we won't be taking some action against Iran in the 
next year.  Hopefully, that won't involve invading them, but it could.  

Cheers,
RAH

--John



RE: The Values-Vote Myth

2004-11-08 Thread John Kelsey
From: J.A. Terranson [EMAIL PROTECTED]
Sent: Nov 6, 2004 5:07 PM
To: Tyler Durden [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED], [EMAIL PROTECTED]
Subject: RE: The Values-Vote Myth

On Sat, 6 Nov 2004, Tyler Durden wrote:

..
 So: A 'moral values' question for Cypherpunks. Does this election indict the
 American people as being complicit in the crime known as Operation
 Freedom? (I notice everyone forgot about that name.)

Complicit?  Thats *technically* correct, but not nearly strong enough.

Similarly, if I hold some stock in Exxon, am I complicit in every crime done by 
the management of Exxon?  How does this change if I'm a child whose trust fund 
contains the stock?  Or if I hold a mutual fund I inherited with a little Exxon 
stock, which can be sold off only if I'm willing to move thousands of miles 
from my home, learn a new language, uproot my family, etc.?  Is there any 
outcome of the election that would have made it immoral to attack Americans?  
(Certainly not electing Kerry, who planned to continue holding down Iraq for 
the forseeable future, though he correctly stated that invading it was a 
mistake in the first place.)  

And if we accept this kind of collective guilt logic, why is, say, flattening 
Fallujah to make an example for the rest of Iraq, wrong?  

 -TD

J.A. Terranson

--John



Re: This Memorable Day

2004-11-08 Thread John Kelsey
From: Peter Gutmann [EMAIL PROTECTED]
Sent: Nov 6, 2004 2:10 AM
To: [EMAIL PROTECTED], [EMAIL PROTECTED]
Subject: Re: This Memorable Day

The figure that's usually quoted is that 80% of German's military force was
directed against Russia.  Of the remaining 20%, a lot had already been engaged
by France, the UK (via the BEF, the RAF, North Africa), Greece, etc etc before
the US got involved in Europe.  So the Russians should get most of the credit.

Yep.  I think to a first approximation, the US defeated Japan and the USSR 
defeated Germany.  My impression is that a lot of the push to do the D-Day 
invasion was to make sure the USSR didn't end up in possession of all of Europe 
at the end of the war.  (Given how things developed, this was a pretty sensible 
concern.)  

Peter.

--John



Re: The Values-Vote Myth

2004-11-08 Thread John Kelsey
From: Eric Cordian [EMAIL PROTECTED]
Sent: Nov 6, 2004 5:57 PM
To: [EMAIL PROTECTED]
Subject: Re: The Values-Vote Myth

..
Also, voting is in some sense political manipulation to blame the population 
for the 
actions of their government.  Everyone who votes is a co-conspirator, and the 
argument is made that those who don't vote have no right to dissent.

Yep, I always get a kick out of this line.  Alice says if you don't vote, you 
have no right to complain about the outcome.  Bob says if you don't volunteer 
for a campaign, man the phone banks, go door to door, and give till it hurts, 
you have no right to complain about the outcome.  Carol says If you don't 
stockpile weapons, organize into cells, and run a campaign of terror bombing 
and assassination, you have no right to complain about the outcome.  Why is 
one of these people more obviously right than the others?  [I know you weren't 
agreeing with the quoted statement either.]

In practice, Alice's strategy has almost no impact on the result--nothing I did 
as a Maryland voter could have given Bush fewer electoral votes than he already 
got, and that's true almost everywhere for an individual voter.  This is 
especially true if you're an individual voter whose major issues are just not 
very important to most other voters.  Kerry spent essentially no time talking 
about the creepy implications of the Jose Padilla case (isn't he still being 
held incommunicado, pending filing in the right district?), or the US 
government's use of torture in the war on terror despite treaties and the basic 
obligations of civilized people not to do that crap.  I see little indication 
that Kerry would have disclaimed the power to do those things, had the vote 
swung a couple percentage points the other way.

Bob's strategy has more going for it, but it comes down to a tradeoff between 
alternate uses of your time.  You could devote your time to the Bush or Kerry 
or Badnarik campaigns, or you could improve your ability to survive whatever 
ugliness may come in other ways--maybe by making more money and banking it 
against future problems, or improving your standing in your field, so you're 
likely to be employable even in a massive post-terror-attack recession.  Maybe 
just spending quality time with your wife and kids, on the theory that the bad 
guys may manage to vaporize you tomorrow whichever clown gets elected 
Bozo-in-Chief.  

Carol's strategy seems doomed to fail to me--look how much damage has been done 
to the pro-life movement by the very small number of wackos willing to shoot 
abortion doctors and bomb clinics.  I'm always amazed at the revolutionary talk 
from people on this list, as though libertarian/anarchocapitalist ideas weren't 
an almost invisibly small minority in the US, as though some kind of unrest 
leading to a civil war would lead anywhere any of us would like.  (Is it the 
secular police state that comes out on top, or the religious police state?)  

Eric Michael Cordian 0+

--John



Re: This Memorable Day

2004-11-03 Thread John Kelsey
From: R.A. Hettinga [EMAIL PROTECTED]
Sent: Nov 2, 2004 10:55 AM
To: [EMAIL PROTECTED]
Subject: Re: This Memorable Day

..
Expect more carnage than culture when Bush is elected.

I gather we waited to start the offensive in Fallujah(sp?) until the polls were all 
closed.   I'm not sure how much of this was trying to time things not to interfere 
with the election (the buildup has been going on for awhile, and Kerry could have 
squawked about this but didn't, so presumably he didn't think it was unfair for the 
attack to be delayed a bit), and how much was trying to bury the coverage of a pretty 
bloody battle with a lot of civilians dying and a lot of peoples homes destroyed, 
behind the whole election coverage.  

Cheers,
RAH

--John



Re: This Memorable Day

2004-11-03 Thread John Kelsey
From: Nomen Nescio [EMAIL PROTECTED]
Sent: Nov 3, 2004 6:50 AM
To: [EMAIL PROTECTED]
Subject: Re: This Memorable Day

..
The only way to move towards a more friendly world is to make
people feel they are able to share the wealth and prosperity of the
world. As long as there is one single person anywhere in the world
hungering to death there is still a basis for fundamentalism and all
the problem that leads to.

Ahh.  So all we have to do to end terrorism is to end poverty, injustice, and 
inequality all over the world.  *Phew*.  I thought it was going to take something 
hard.  

--John






Re: Geodesic neoconservative empire

2004-10-29 Thread John Kelsey
From: R.A. Hettinga [EMAIL PROTECTED]
Sent: Oct 29, 2004 7:06 AM
To: [EMAIL PROTECTED]
Subject: Re: Geodesic neoconservative empire

..
It has always amused me that libertarians and anarcho-capitalists insist on
using the language of the left to describe the things they don't like. One
of the reasons that the right in this country has been so successful has
been their development of a useful analytic apparatus, and corresponding
language, over the past 50 years, certainly more so than the left, which is
nothing but marxism, dilluted or otherwise.

Is there a better term than empire for what gets built when your country goes out, 
invades lots of other countries, takes them over, and runs them?  I don't know about 
other peoples' objections to this, but mine mainly involve my belief that this is an 
expensive and not very effective way to deal with terrorism.  

..
At the moment force-monopoly is, by definition of monopoly, a hierarchical
market. Hence the dance with the girl that brung ya bit. They have
already *stolen* my money, they might as well be doing something with it

Well, the question is, what ought they to be doing with it.  Invading Iraq to build a 
democracy there, in hopes of somehow fixing the root causes of terrorism (as similarly 
goofy idealists on the left once thought they could do for crime in the US), looks 
like a waste of time and money.  I suspect we're causing ourselves more problems, as 
Iraq is not only a place where terrorists can go to attack the US and be attacked by 
us in turn, it's also a place where there are lots of people learning the basic skills 
of being a terrorist, gaining some experience in doing so, etc.  Do you think we're 
going to kill all of those people?  Do you think they'll all abandon terrorist tactics 
when things quiet down in Iraq?  

I know the Republican line these days is that we're safer because the bad guys are all 
shooting at Marines in Iraq, rather than at civilians in Des Moines.  But that only 
makes sense if we don't end up with a much bigger problem later, as a result.  Perhaps 
we should all have rested more secure in our beds when the jihadis were streaming into 
Afghanistan, where they would be killed in large numbers by the Red Army.  But it's 
not clear that was a long-term win  

Anyway, you sound like there's some willingness on the part of this administration (or 
the one Kerry may set up in January) to actually cut government spending to other 
things, in order to do the nation building thing.  What evidence have you seen for 
that, so far?  

..
Cheers,
RAH



Re: US Retardation of Free Markets (was Airport insanity)

2004-10-27 Thread John Kelsey
From: R.A. Hettinga [EMAIL PROTECTED]
Sent: Oct 27, 2004 9:37 AM
To: [EMAIL PROTECTED]
Subject: Re: US Retardation of Free Markets (was Airport insanity)

..

This is actually the running fantasy in Marxism since the 1950's, when it
turned out that that, instead of the workers eating the bourgeoisie by
the firelight or some Glorious Revolution or another, would instead be come
bourgeoisie themselves.

I think this bit gets at the heart of why the Islamic fundamentalists are hard to deal 
with.  For most people I know, some notion of peace and prosperity is the thing we 
want from our governments.  Different people differ on how to do that (like, whether 
the government should employ most of the doctors or the teachers),  but that's the 
kind of goal that makes sense.  And that's largely what the West has to offer.  Not 
membership in a master race, or a date with destiny, or as vision of yourself as part 
of a great, centuries-old Jihad, but safe streets, working sewers, functioning 
markets, and a rising tide that promises to life all boats eventually, so that one 
day, your poor people, like ours, will be overweight from spending too much time 
sitting in front of the TV in an air conditioned room.  

The Islamic fundamentalists can't offer that.  A country run by these guys is just not 
going to be in the forefront of technology, its economy will grow slowly, and it's 
likely to always be close to going to war with some infidels around it.  No peace, not 
much prosperity, but a lot of capital-P Purpose.  A place in history, a part of the 
Jihad.  In this sense, it's a lot like Marxism was, back when it had serious 
adherents; it's a mass movement, like Eric Hoffer talks about.  What Hayek called the 
liberal order (e.g., working minimal government, liberal democracy, rule of law) can't 
offer any of that.   It offers safe streets and working sewers and peace and 
prosperity, but you have to come up with your own purpose.  

The irony is that the neocons seemed to be trying to build up a kind of mass movement 
mentality in the US, which clearly has caught George Bush and his top advisors--this 
wonderful notion that we're going to go out and civilize these heathens, bring them 
democracy and free markets, and then they'll stop wanting to be part of crazy mass 
movements that tell them to strap dynamite to themselves and blow up bus stops full of 
people.   This seems doomed to fail.  A lot of people in the Middle East clearly want 
what we're selling, but it doesn't take many suicide bombers to make that sort of 
thing break down.  

--John



Re: Donald's Job Description

2004-10-25 Thread John Kelsey
From: Tyler Durden [EMAIL PROTECTED]
Sent: Oct 25, 2004 9:40 AM
To: [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED], [EMAIL PROTECTED]
Subject: Re: Donald's Job Description

Well, the Bush supporters I've met aren't normally so sure. They'll kind 
of hem and haw, or saw Well, he's got advisors..., or Well, Kerry ain't 
any better. Once in a while they'll point to Buh's believability or 
decisiveness, but I've never seen anyone (besides Mr Donald) attempt the 
role of super-apolegist for anything the current regime has done.

This is my experience, too.  Bush supporters I know prefer him to Kerry, not because 
he's a great and infallable leader, but because they think he's doing a reasonable job 
relative to what Kerry would do.  It's not like this is an entirely nutty position to 
take, since Kerry really does seem to blow a lot of smoke when talking about Iraq, 
albeit less than Bush does.

..

--John



Re: Airport insanity

2004-10-24 Thread John Kelsey
From: Tyler Durden [EMAIL PROTECTED]
Sent: Oct 23, 2004 7:41 PM
To: [EMAIL PROTECTED], [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Subject: Re: Airport insanity

Let us not forget the more tangible 'value' in bombing the WTC and messing 
up things downtown. First of all, the companies in the WTC were, to say the 
least, impacted (actually, the company I work for lost 11 people and 
relocated to NJ for about a year)hitting them (and their workers) was 
probably not considered collateral damage by Al Qaeda, any more than 
bombing German or japanese urban production centers was considered that for 
the allies in WWII. 

Right.  I don't visualize OBL  Co sitting up nights trying to decide whether their 
next attack needlessly terrorizes civilians, I think that's a decision they already 
made.  I'm pointing out that once you've started justifying acts of terror by people 
you agree with, it seems to be quite hard to draw any meaningful line between them and 
Al Qaida.  Now, this causes no problem for me--OBL, Tim McVeigh, the Unabomber, they 
all look like remorseless murderers to me, and I see the differences between them 
mainly in terms of how effective and dangerous they are.  

..
And while I suspect that Al-Qaeda were probably 
unaware in advance of the impact on Telecom, the rest was certainly a 
conscious decision.

I don't know if this was a goal, exactly, but the other thing the 9/11 attacks 
achieved was to scare the hell out of the power elite in the country, especially the 
people at the top of government, media, and finance.  That made all kinds of dumb 
responses (some parts of the Patriot act, Bush's breathtaking claim of the power to 
lock up citizens without trial, his administration's equally breathtaking claim that 
he could ignore laws and treaties against torture on his authority, the invasion of 
Iraq) possible.  

-TD

--John



Re: Airport insanity

2004-10-23 Thread John Kelsey
From: James A. Donald [EMAIL PROTECTED]
Sent: Oct 22, 2004 12:21 PM
To: [EMAIL PROTECTED] [EMAIL PROTECTED]
Subject: Re: Airport insanity

All of the terrorists came from countries that were
beneficiaries of an immense amount of US help.  Saudi Arabia
was certainly not under attack.  If they were Palestinians, and
they hit the Pentagon but not the two towers, then they would
be defending themselves.

I'm still trying to understand the moral theory on which you differentiate hitting the 
two towers from the Oklaholma City bombing.  McVeigh (not a branch davidian) wanted to 
strike back at the BATF for the Waco massacre, so he killed a whole bunch of people, a 
few of whom were BATF employees, but not, as far as I know, anyone directly involved 
in the decisions that led to all the deaths in Waco.  The 9/11 hijackers wanted to 
strike at the US for a variety of reasons, probably mostly that we're a big, visible 
target, but presumably also that we're propping up states like Saudi Arabia.  So they 
killed a whole bunch of people, most of whom had nothing to do with what they opposed, 
but surely including people who were doing business with Saudi Arabia and Israel.

If McVeigh had used a sniper rifle to kill the specific BATF agent who called for the 
raid/media event on the Branch Davidians' compound, I'd still think he deserved to 
either die or spend his life in prison, but at least I could somehow fathom the moral 
decision to do what he'd done--like the pro-life terrorists (ah, the irony) who 
assassinate abortionists.  They need to be locked up, but you can at least see what 
they were thinking.  Blowing up a building full of random people because a few of them 
are associated with some action you really disagree with is just outside the realm of 
the sort of moral decision I can figure out.  Just like flying planes into buildings 
full of people with almost nothing to do with what you're really getting at.  

 James A. Donald

--John Kelsey



Re: US Retardation of Free Markets (was Airport insanity)

2004-10-22 Thread John Kelsey
From: Tyler Durden [EMAIL PROTECTED]
Sent: Oct 19, 2004 10:23 AM
To: [EMAIL PROTECTED], [EMAIL PROTECTED]
Subject: US Retardation of Free Markets (was Airport insanity)

..
In developing markets the US track record is terrible. The more we interfere 
and set up puppet governments and petty dictators, the result has always 
been the near elimination of any kind of real modern economy.

More than that, some of the countries we've been kicked out or prevented 
from influencing have been modernizing rapidly, the most obvious example is 
China and Vietnam. Bolivia is interesting to watch.

So, Taiwan and South Korea seem like rather obvious counterexamples.

-TD

--John
(Not a fan of interventionist foreign policy, FWIW)



Re: Airport insanity

2004-10-22 Thread John Kelsey
From: James A. Donald [EMAIL PROTECTED]
Sent: Oct 20, 2004 3:10 PM
To: [EMAIL PROTECTED] [EMAIL PROTECTED]
Subject: Re: Airport insanity

Lots of murderous terrorists have been released from Guatanamo, 
and in the nearly all cases the most serious of their 
complaints make it sound like a beach resort, except for the 
fact that they could not leave.

Maybe I missed that.  All but one of the comments I read about involved a lot of 
complaints about mistreatment, albeit often with the admission that Gitmo was still 
better than being in an Afghan prison.  As a nitpick, though, it's not at all clear 
that most of the people at Gitmo were really terrorists, or even murderers.  None of 
them has had a trial, few have even had hearings, and many were released as not a 
threat to us.  (They may still be a threat to everyone else around them.)  

A few have more serious complaints.  Either they are lying or, 
those who say they were well treated apart from being held 
captive are lying. 

Surely the other alternative is that only some prisoners are subjected to torture, 
e.g., the ones that look to have some serious intelligence value.

 James A. Donald

--John




RE: Airport insanity

2004-10-18 Thread John Kelsey
From: James A. Donald [EMAIL PROTECTED]
Sent: Oct 16, 2004 7:01 PM
To: [EMAIL PROTECTED]
Subject: RE: Airport insanity

..
On 15 Oct 2004 at 16:32, Tyler Durden wrote:


..
 He might have looked odd from the photo you saw circulated in
 the press, but I'd bet a lot of money no one would have
 picked him as looking like a terrorist.

But the people sitting beside him did pick him as looking like
a terrorist.

What's the false positive rate?  It's one thing if you see some guy lighting a fuse 
sticking out of his shoe, and quite another if you say You look kinda terroristy; I'm 
sending you off the plane.  This works as a reasonable strategy only if:

a.  The probability ratios don't work out so that the overwhelming majority of people 
you throw off planes are innocent.  (They almost certainly will, just because 
terrorists are so rare.)

b.  The terrorists can't figure out how to make themselves look less threatening.  

--digsig
 James A. Donald

--John



Re: Airport insanity

2004-10-18 Thread John Kelsey
From: James A. Donald [EMAIL PROTECTED]
Sent: Oct 16, 2004 7:22 PM
To: [EMAIL PROTECTED] [EMAIL PROTECTED]
Subject: Re: Airport insanity

..
 Oh, and every white American (recall numerous references to 
 Mr. McVeigh)

Mc Veigh did not target innocents, and if he did target a plane 
full of innocents, perhaps in order to kill one guilty man on 
board, there is no way in hell he himself would be on that 
plane. 

Well, he targeted a building full of innocents, so he could get some BATF people in 
one part of the building, right?  I guess I'm missing the part where he took especial 
care not to blow up people who had no connection with the Waco disaster.  How would 
you differentiate his target selection from that of the 9/11 attackers who hit the 
Pentagon?

Though you're right, he didn't do the suicide bomber thing.  Does that constitute a 
guarantee that no white terrorist ever will do so?  (After all, an awful lot of Arab 
terrorists also plan on living to fight another day.)  

   --digsig
 James A. Donald

--John




Re: Airport insanity

2004-10-18 Thread John Kelsey
From: James A. Donald [EMAIL PROTECTED]
Sent: Oct 16, 2004 2:27 PM
To: [EMAIL PROTECTED]
Subject: Re: Airport insanity

 For whatever reason, pictures of me always come out looking 
 like some crazed religious fanatic.  But that doesn't mean 
 that I'm going to bomb anything.  And I sure hope that I'm 
 not going to be detained or denied entry because of how I 
 *look*, alone.

If you really look like the shoe bomber, then you should have 
to drive, or use public transport.

--digsig
 James A. Donald

Surely this is a matter best left to the private companies offering transportation, 
subject only to restrictions to prevent future 9/11 attacks.  

--John



RE: Airport insanity

2004-10-15 Thread John Kelsey
From: Tyler Durden [EMAIL PROTECTED]
Sent: Oct 15, 2004 10:02 AM
To: [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED]
Subject: RE: Airport insanity

First of all, the guy is a major dumbass...

My profile is radically different from all those who killed nearly 3,000 of
my countrymen on September 11, 2001. My holy book of choice is the Bible.
My race is Caucasian. I am a loyal, taxpaying, patriotic, evil-hating,
English-as-first-language, natural-born American. If profiling were
allowed, I wouldn't be the one filling out government forms to prove I'm
not a terrorist. The other guys would.

I'm thinking that the state-of-the-art on Cypherpunks is such that no real 
comment here is necessary.

Ahh, thanks for flying, Mr McVeigh.  You're in seat 1A, just behind the cockpit.  We 
like to put patriotic Americans there to make sure there's no risk of in-flight 
terrorism.  

This is precisely why Al-Qaeda sent 19 (or probably more) true-believers. 
Even if TSA lowers the odds, all you have to do is roll the dice many more 
times, and a few of the faithful will definitely get through the checkpoint. 
Security measures might stop a lone crazy, but the odds don't stand up if 
they send dozens of people into airports all around the country. And Iraq II 
is promising us a bumper crop of new 'terrorists'.

Yep.  It gives you a warm feeling all over to know that we're spending billions of 
dollars on running a nation-sized terrorist training camp.  Ah, but not to worry.  
*These* terrorists won't get WMDs.  We know, because apparently there's not a gram of 
WMD anywhere in Iraq.  And besides, A.G. Khan has been brought to justice, and is now 
requiring proof of identity and a major credit card before shipping you the Nuclear 
Weapons Program in a Box set, and North Korea is too busy stockpiling nukes and 
missiles for an upcoming negotiated settlement to certain border questions to sell 
any of them to any (other) crazies.  Why the only other place where there's a risk of 
nuclear proliferation is in the old Soviet Union--and we all know *they* don't have 
any Islamic fundamentalist terrorists running about.  So we can clearly rest easy.  

It's a good thing we've got an administration in the White House who cares about 
security and the war on terror.  Otherwise, I'd be a mite worried about now

..
-TD

--John Kelsey



Re: Implant replaces ID cards for access to restricted areas.

2004-10-12 Thread John Kelsey
From: Steve Furlong [EMAIL PROTECTED]
Sent: Oct 9, 2004 7:44 AM
To: [EMAIL PROTECTED]
Subject: Re: Implant replaces ID cards for access to restricted areas.

On Thu, 2004-10-07 at 02:20, Nomen Nescio wrote:
 Mexican Attorney General, Staff Get Chip Implants
 
 Implant replaces ID cards for access to restricted areas.

I think I'd get the implant under my scalp somewhere. If the implant
gave access to a really critical place, I wouldn't want to risk losing
an arm or whatever. Also, I'd be able to block the implant's signals
with my nifty tinfoil hat. I've been waiting for a use for that thing.

Actually, I think the protocol requires that it be placed on your forehead, right 
under the tattooed sixes.  Or maybe I'm getting my protocols mixed up

--John




Re: Cash, Credit -- or Prints?

2004-10-12 Thread John Kelsey
From: Tyler Durden [EMAIL PROTECTED]
Sent: Oct 12, 2004 1:43 PM
To: [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Subject: Re: Cash, Credit -- or Prints?

..
Very interesting question. I'd bet almost any amount of money that it's 
fairly trivial to simply alligator-clip-out the fingerprint's file from 
almost any of the cheaper devices. Hell, I'd bet that's true even of more 
expensive secure devices as well.

I don't think the readers store an image of the fingerprint, just some information to 
make it easy to verify a match.  I don't think you could reconstruct a fingerprint 
from that information, though you could presumably reconstruct a fingerprint image 
that would fool the detector.

From what I've seen, the whole field of biometrics needs a lot of work on 
characterizing the attacks and defenses against them, and coming up with reasonable 
ways to verify that a reader resists some attack.  I think individual vendors often 
have some ideas about this (though I gather their defenses are often disabled to keep 
the false reject rate acceptably low), but there doesn't seem to be a clean process 
for determining how skilled an attacker needs to be to, say, scan my finger once, and 
produce either a fake finger or a machine for projecting a fake fingerprint into the 
reader.   Anyone know whether some kind of standard for this exists?  

-TD

--John



Re: ID Rules Exist, But Can't Be Seen

2004-10-01 Thread John Kelsey
From: Tyler Durden [EMAIL PROTECTED]
Sent: Sep 30, 2004 5:06 PM
To: [EMAIL PROTECTED]
Subject: ID Rules Exist, But Can't Be Seen

..
For instance, is it indeed possible that revealing this rule would pose an 
additional security risk? If such a rule exists (and it does) then hijackers 
obviously already know about it. Could this rule also reveal some deeper 
secrets about how hijackers can be detected? I seriously doubt it.

One possibility raised by Dan Simon (I think) on Eric Rescorla's excellent blog is 
that the rule is part of some monthly briefing that is sent out, which might include 
some kind of information they'd rather not have published, e.g., be especially 
careful about anyone carrying a guitar case; we've heard rumors about using one to 
bring a Tommy gun onboard.  

Then of course, the argument may be that the government wanted to hide the 
rule for the very reason of making it more unassailable. In other words, if 
the rule were known, then it might be more easily contested in court. Hiding 
the rule protects the law which in turn protects national security.

Maybe.  I guess the thing that's confusing about any of these answers is that the 
rules as they're applied must be propogated to thousands of people.  It's not like 
they could easily hide guidance like no more than 10 Arabs per flight or 
double-screen anyone with brown skin and a Koran--someone would leak it.  Perhaps 
the written rules include things like this that they don't want to subject to court 
scrutiny, but then how do they get that down to the people doing the screening at the 
gate?  

The whole idea of laws that the citizens aren't allowed to see just sounds like 
something you'd expect in some godawful third-world dictatorship, not in the US.  

-TD

--John Kelsey



RE: Mystification of Identity: You Say Yusuf, I Say Youssouf...

2004-09-28 Thread John Kelsey
From: Tyler Durden [EMAIL PROTECTED]
Sent: Sep 27, 2004 10:00 AM
To: [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Subject: RE: Mystification of Identity: You Say Yusuf, I Say Youssouf...

Many Cypherpunks view the need to take up crypto arms to stem off an 
Orwellian, hyper-evil and hyper-competent dictatorship. I'm thinking a more 
likely (and no less threatening) scenario is one like Brazil (ie, the 
movie).

Yep.  It turns out that broad and scary police powers don't make you any smarter or 
wiser or more careful, they just make it easier for you to insist on obedience and 
stifle complaints.  Post 9/11, flight attendants and airline employees have more 
authority to order passengers around and deny people boarding, but they're still the 
same people they were on 9/10, they're presumably only marginally better at spotting 
terrorists (at least not obviously Arab-looking terrorists).  They just have more 
power, and fewer consequences when they screw up.

..

-TD

--John Kelsey



Re: potential new IETF WG on anonymous IPSec

2004-09-20 Thread John Kelsey
From: Major Variola (ret) [EMAIL PROTECTED]
Sent: Sep 17, 2004 10:27 PM
To: [EMAIL PROTECTED] [EMAIL PROTECTED]
Subject: Re: potential new IETF WG on anonymous IPSec

At 06:20 AM 9/17/04 +, Justin wrote:
On 2004-09-16T20:11:56-0700, Major Variola (ret) wrote:
..
Oh, come on.  Nothing can be absolutely trusted.  How much security is
enough?

Aren't the DOD CAs trusted enough for your tastes?  Of course, 'tis
problematic for civilians to get certs from there.

DoD certs are good enough for DoD slaves.  Hospital certs are good
enough for their employees.  Joe's Bait Und Tackle certs are good enough
for Joe's employees.  Do you think that Verislime is good enough for
you?

You seem to have rediscovered the fact that crypto can move trust around, but can't 
create any.  You have to decide to trust someone for it to be useful.  The great 
problem with practically using this stuff is getting someone that you're comfortable 
trusting, who can then use crypto to move the trust around in a sensible way.  

The condition necessary for Verisign certificates to have a lot of trust, to me, is 
for the appearance of a fraudulent Verisign certificate to be a major scandal, leading 
to the CEO getting canned, the stock price dropping by some large fraction, and a huge 
fall-off of business for their CA.  When that isn't the case (for the high security 
certs; it's clearly silly to expect it for low-security ones), the CA doesn't have as 
much incentive as I'd like to be careful about forgeries.  You'd like the exposure of 
a fraudulent certificate signed by a CA to have the same kind of effect as the 
exposure of a bank being unable to produce the money a depositor demands.  

Fraudulent certificates issued for any purpose--whether furnishing fake IDs to FBI 
agents, or to Al Qaida terrorists, or to random Nigerian-scam operators--leave a 
permanent trail; the recipient of the certificate can show it around when he discovers 
it's fraudulent.  If the last step of this protocol for the CA is and then you go out 
of business, the incentives not to issue fraudulent certificates looks right.  

--John



Re: Academics locked out by tight visa controls

2004-09-20 Thread John Kelsey
From: R. A. Hettinga [EMAIL PROTECTED]
Sent: Sep 20, 2004 8:33 AM
Subject: Academics locked out by tight visa controls

http://www.mercurynews.com/mld/mercurynews/9710963.htm?template=contentModules/printstory.jsp

Posted on Mon, Sep. 20, 2004

Academics locked out by tight visa controls
U.S. SECURITY BLOCKS FREE EXCHANGE OF IDEAS
By Bruce Schneier

..

I guess I've been surprised this issue hasn't seen a lot more discussion.  It takes 
nothing more than to look at the names of the people doing PhDs and postdocs in any 
technical field to figure out that a lot of them are at least of Chinese, Indian, 
Arab, Iranian, Russian, etc., ancestry.  And only a little more time to find out that 
a lot of them are not citizens, and have a lot of hassles with respect to living and 
working here.  What do you suppose happens to the US lead in high-tech, when we *stop* 
drawing in some large fraction of the smartest, hardest-working thousandth of a 
percent of mankind?  

--John



Re: BrinCity 2.0: Mayor outlines elaborate camera network for city

2004-09-10 Thread John Kelsey
From: R. A. Hettinga [EMAIL PROTECTED]
Sent: Sep 9, 2004 9:50 PM
To: [EMAIL PROTECTED]
Subject: BrinCity 2.0: Mayor outlines elaborate camera network for city

..
 Some people are concerned about Big Brother invading their privacy but
Mayor Daley says the cameras will be located in public areas.

Fortunately, all this is happening in a town noted for its trustworthy and honest 
government, and under a mayor with no tendency to use any excuse he can find to grab 
power, tear up airports he doesn't like in the middle of the night, etc.

..
R. A. Hettinga mailto: [EMAIL PROTECTED]

--John Kelsey



Re: Seth Schoen's Hard to Verify Signatures

2004-09-08 Thread John Kelsey
From: \Hal Finney\ [EMAIL PROTECTED]
Sent: Sep 8, 2004 2:48 PM
To: [EMAIL PROTECTED]
Subject: Seth Schoen's Hard to Verify Signatures

The method Seth describes is to include a random value in the signature
but not to include it in the message.  He shows a sample signature
with 3 decimal digits hidden.  The only way to verify it is to try all
possibilities for the random values.  By controlling how much data is
hidden in this way, the signer can control how long it will take to
verify the signature.

I've seen this described in a paper by Abadi, Lomas  Needham as an alternative to a 
high iteration count for password hashing.  

Hal Finney

--John Kelsey




RE: Another John Young Sighting

2004-08-25 Thread John Kelsey
From: Trei, Peter [EMAIL PROTECTED]
Sent: Aug 24, 2004 9:39 AM
To: Tyler Durden [EMAIL PROTECTED], [EMAIL PROTECTED], 
   [EMAIL PROTECTED], [EMAIL PROTECTED]
Subject: RE: Another John Young Sighting

..
 5) CYA. Since 9/11, the lower echelons of the
security apparatus know that if Something Bad
happens, and they are shown to have discounted
any hint or suspicion concerning any person
even very peripherally involved, their ass is
grass and their career goes in the toilet. 

Yep, I think you hit it on the head.  I'll bet the list of suspected terrorists never 
get a name removed other than by death, if then.  Who wants to be the guy who 
correctly assessent the evidence to remove someone's name, only to have the same guy 
blow up a plane a year later?  IMO, this seems like a fundamental problem with 
watchlists.

Peter

--John Kelsey




Re: On what the NSA does with its tech

2004-08-05 Thread John Kelsey
  From: Major Variola (ret) [EMAIL PROTECTED] 
  Sent: Aug 2, 2004 11:56 PM
  To: [EMAIL PROTECTED] [EMAIL PROTECTED]
  Subject: On what the NSA does with its tech

..
  What they can do is implement an advanced dictionary search that
  includes the kind of mnemonic tricks and regexps that folks typically 
  use when coming up with tough passphrases.   Cracking Italian
  anarchist PGP-equipt PDAs in their possession, things like that.

Yep.  This seems like the practical weak link in a lot of uses of cryptography.  It 
can be made harder in a lot of ways (e.g., upping the iteration count, or doing 
Abadi's trick of generating a big salt value but not disclosing all of it), but all 
this ends up with the attacker's extra work linear in the user's extra work.  Of 
course, if the user chooses good passwords, it's a pretty big linear factor, but it's 
still linear--I double my iteration count, and the attacker doubles his work, though 
he's always doing a million times as much work as I am.  

The only really good solution is to use some external device to mediate in 
password-key generation.  But then you've got to make sure that device is always 
available, or you're unable to get at your data.  And if that device is an online 
server somewhere, then password encryptions become partly traceable.  

--John Kelsey



Re: Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-08-02 Thread John Kelsey
  -Original Message-
  From: Major Variola (ret) [EMAIL PROTECTED] 
  Sent: Jul 30, 2004 10:25 PM
  To: [EMAIL PROTECTED] [EMAIL PROTECTED]
  Subject: Re: Email tapping by ISPs, forwarder addresses, and crypto  proxies


  The profitably part is a non-issue when you have black budgets,
  ie $400 toilet seats.

This is silly.  They have black budgets, but not infinite ones.  Given their budget 
(whatever it is), they want to buy the most processing bang for their buck.  I doubt 
they can do that substantially better than anyone else.  I'd expect them to be really 
clever at finding tricks to optimize keysearch of various kinds, but not to have 
better microprocessor technology than the rest of the world.  

  Bottom line: they're not ahead in tech, but they can make things that
  private-co engineeers only dream of.  DesCrack is a suitcase, get it?

So, then they can break 3-key 3DES with moderate numbers of texts as soon as they can 
build 2^{56} such suitcases, right?  And power them, and get rid of their waste 
heat

  I'll let you speculate on AESCrack :-)

Do the math, and you'll see how implausible 128-bit keysearch is.  Maybe there are 
better attacks on AES (the algebraic stuff doesn't seem to have gone anywhere, but it 
still might), but if keysearch is all we have to worry about, and nontrivial quantum 
computers remain impractical to build, then 128-bit keys are as secure as we're ever 
likely to need, and 256-bit keys more or less eliminate keysearch of any kind from the 
list of things we need ever worry about again.
  

--John






Re: Tyler's Education

2004-07-06 Thread John Kelsey
 From: J.A. Terranson [EMAIL PROTECTED]
 Sent: Jul 4, 2004 12:57 AM
 To: [EMAIL PROTECTED] [EMAIL PROTECTED]
 Subject: Re: Tyler's Education

 Interestingly, I have had more than one report of aural acquistion of
 typists keystrokes being used to attempt to calculate the content of a
 short keysequence (I assume a password is what was meant by short
 keysequence).  These reports indicated poor, but occasionally lucky
 results.  

I wonder if this follows the technique used by Song, Wagner,  Tian to attack 
SSH-encrypted passwords by watching keystroke timings.

 J.A. Terranson
 [EMAIL PROTECTED]

--John Kelsey



Re: Palm Hack?

2004-06-05 Thread John Kelsey
I think the notion of someone using your IR beaming capacity against your will is at 
least a possible threat (imagine what happens if I get a trojan onto your Palm that's 
supposed to leak data--it could just listen on the IR port, and hand over your data 
when I get it the right message.)  Some people tape a piece of aluminum foil over the 
IR port of their Palm to make this class of attacks harder.  

--John



Re: SASSER Worm Dude

2004-05-14 Thread John Kelsey
At 12:47 PM 5/11/04 +0100, Dave Howe wrote:
..
I think you are thinking in terms of the American age scale - In england
(and over most of europe although obviously it varies), 18 is old enough
to marry without parental permission, be served in a bar, drive, and be a
practicing homosexual.  At 16 you can have hetrosexual relationships,
marry with parental permission, work (and pay taxes) and rent property in
your own name (you can *own* property from 12)
Everywhere in the US, you can go to jail for criminal acts when you're 
18.  It's not clear why writing a computer worm is any different in that 
regard than fraud or theft.  I think that's generally true.  In some 
states, much younger people have been sentenced to death.

--John Kelsey, [EMAIL PROTECTED]
PGP: FA48 3237 9AD5 30AC EEDD  BBC8 2A80 6948 4CAA F259



Re: CDR: Re: Can Skype be wiretapped by the authorities? (fwd from em@em.no-ip.com)

2004-05-14 Thread John Kelsey
At 01:40 PM 5/10/04 -0500, Brian Dunbar wrote:

On May 10, 2004, at 1:30 PM, Jack Lloyd wrote:

Like it matters. Do you really think that the government would really allow
Intel and AMD to sell CPUs that didn't have tiny transmitters in them? 
Your CPU
is actually transmitting every instruction it executes to the satellites.
That's a subtle bit of humor, right?
Actually, pretty much all unshielded computer hardware effectively has a 
transmitter in it.  Google for side-channel attacks DPA and TEMPEST 
for more info.  That's not a matter of transmitting to the satellites, but 
it may be a matter of transmitting to the van parked outside your house

~~brian
--John Kelsey, [EMAIL PROTECTED]
PGP: FA48 3237 9AD5 30AC EEDD  BBC8 2A80 6948 4CAA F259



Re: [IP] One Internet provider's view of FBI's CALEA wiretap push

2004-04-23 Thread John Kelsey
From: Tyler Durden [EMAIL PROTECTED]
Sent: Apr 23, 2004 10:09 AM
To: [EMAIL PROTECTED]
Subject: Re: [IP] One Internet provider's view of FBI's CALEA wiretap push

..
Well, what if there were 3 passwords:

1) One for Fake data, for amatuers (very few of the MwG will actually
be smart enough to look beyond this...that's why they have guns)

2)One for real data...this is what you're hiding

3) One for plausible real data, BUT when this one's used, it also
destroys the real data as it opens the plausible real data.

The obvious problem with multiple levels of passwords and data is: When
does the guy with the rubber hose stop beating passwords out of you?
After he gets one?  Yeah, that's plausible, if he's convinced there's
only one.  But once he's seen a second hidden level, why will he ever
believe there's not a third, fourth, etc.?  The same calculation
applies to a judge or district attorney.  He *knows* (even if he's
wrong) that there's evidence of kiddie-porn, drug dealing, etc., in
there somewhere.  He knows you've given up two passwords.  Why is he
ever going to let you out of jail, or ever going to reduce the charges
down to something a normal human might live long enough to serve out
the time for?   

-TD

--John



Re: legally required forgetting

2004-04-15 Thread John Kelsey
At 07:20 PM 4/10/04 -0400, An Metet wrote:
..
BlackNet thwarts such limitations on the reporting of consumer credit.
Clearly, providing access to this data harms individual privacy.
Yet Cypherpunks traditionally have supported this concept.  A privacy
advocacy group promotes technology which would aid the compilation of
individual dossiers and allow access to personally identifying data
about past financial transactions.
All that's needed is for a creditor to publish the names and addresses of 
his 180-day overdue accounts in some public forum, or to file lawsuits that 
become public record.  Web-accessible archives will do the rest.  It's not 
like the credit reporting rules would necessarily keep a private 
investigator now from finding out that you declared bankruptcy twenty years 
ago.
..

Today, the Cypherpunks list is but a shadow of its former glory, with
anarcho-capitalism all but forgotten in favor of fashionable nihilism,
libertarians replaced by liberals.  Perhaps it is not too late to
resurrect the ideals of the past, but it will require hard work and open
mindedness on the part of all.
Well, some of the ideals, or at least assumptions, haven't survived 
encounters with the facts too well.  Moore's law has continued apace, 
strong crypto is widely available, but would anyone claim we have more 
privacy now than in 1990?  Nor is this only because of 9/11 (asymmetric 
warfare apparently *does* work pretty well, though it's hard to see how 
that's done anything for the cause of freedom in the US); surveilance 
cameras, OCR, biometric readers and data mining techniques are all getting 
cheaper.  The split seems to be that most people lose privacy, while those 
who really care a lot gain a little privacy, albeit by standing out as 
obvious people-with-something-to-hide, activists, or cryptographers.  The 
math behind anonymous payment schemes is well-understood, and processors 
are fast enough to do signatures and blinding and all the rest pretty 
painlessly, now.  But e-commerce is still all about credit cards over SSL 
(on a browser that is manifestly *not* a piece of security software!), if 
that.

It's ironic.  All the things that seemed like barriers to serious privacy 
for the masses--Clipper, export controls, the RSA patent, processors barely 
powerful enough to do serious public key operation before the user lost 
patience--are either gone or much-diminished.  But we still don't have 
serious privacy for the masses, or even widespread use of crypto in a way 
that protects communications privacy.  It's not like I expected my mom to 
be making her money trading gold-denominated Burmese opium futures[1] by 
now.  But I at least expected my phone calls and e-mails to her not to be 
trivially tapable!

[1] Classical reference

--John Kelsey, [EMAIL PROTECTED]
PGP: FA48 3237 9AD5 30AC EEDD  BBC8 2A80 6948 4CAA F259



RE: voting

2004-04-15 Thread John Kelsey
 twenty other sets of tradeoffs.  I'm not at all convinced that 
the way we optimize for best security is to minimize technology.

I agree that it's easy to get carried away by the elegance of your 
mathematics, or by the really spiffy blinking lights on the computer, and 
forget the essentials.  But technology and math aren't somehow inherently 
bad things to introduce to voting systems.  It just has to be done in a way 
that makes sense, right?

..
I do think electronic voting machines are coming, and a good
thing. But they should be promoted on the basis that they
are easier to use, and fairer in presentation, then are manual
methods. Promoting them on the basis that they are more
secure, and less subject to vote tampering is simply false.
Less subject to vote tampering than the old machines with mechanical 
counters and levers?  That's not too hard.  Less subject to vote tampering 
than paper ballots marked by hand, that may be a little more of a 
challenge.  I think it's more fair to say that the attacks and threats will 
be different, and that the risk of a class break (work out the details of 
the attack once, then change votes all over the country) is seriously 
scary.  But it's sure not clear to me that adding computers to the mix must 
decrease security, or even must leave it unchanged.

Peter Trei
--John Kelsey, [EMAIL PROTECTED], who is definitely speaking only for 
himself.
PGP: FA48 3237 9AD5 30AC EEDD  BBC8 2A80 6948 4CAA F259




Re: Liquid Natural Flatulence

2004-03-30 Thread John Kelsey

Anyway, about a decade ago, Distrigas, the company that owns the
facility in question, ran several *military* -- not law-enforcement
- -- anti-terrorism scenarios to see exactly what would be needed to
take the place out. What I've heard, albeit second-hand, is that in
order to get a useful amount of that halfway-to-absolute-zero natural
gas actually *flammable*, much less explosive, someone would have to
ring the whole tank with a *huge* amount of explosives themselves,
I'm no big fan of science by press release, but when's the last time you 
heard of anyone saying Well, we looked at our security situation, and two 
teenagers with bottle rockets could set this thing off.  That's why the CEO 
has decided to move out of town.  The usual response after you've pointed 
out a devastating attack on someone's system is yeah, but who'd think of 
that or but you're being unrealistic--real attackers will do this other 
thing (that we just happen to have defended against) instead.

Cheers,
RAH
--John Kelsey, [EMAIL PROTECTED]
PGP: FA48 3237 9AD5 30AC EEDD  BBC8 2A80 6948 4CAA F259



Re: 1st amend, compelled speech in US

2004-01-22 Thread John Kelsey
At 09:47 AM 1/22/04 -0800, Major Variola (ret.) wrote:
..public health officials are considering legal action to force AOL and
certain websites to warn members about...

http://wired.com/news/medtech/0,1286,62005,00.html?tw=wn_tophead_2
Yep.  Because if watching a whole generation of terrifying death rates 
among gay men doesn't convince you to take some precautions to avoid 
getting AIDS, a banner ad on AOL is probably going to do the trick.

Compelled speech is prohibited, suggesting it is treason, no matter the
reason.
Not treason.  Not even unconstitutional if they're planning to sue to try 
to force AOL to put up some condom ads, though I can't see how they'd win 
in court.  Just really stupid policy.

--John Kelsey, [EMAIL PROTECTED]
PGP: FA48 3237 9AD5 30AC EEDD  BBC8 2A80 6948 4CAA F259



Re: DoS-ing fatherland goons

2004-01-06 Thread John Kelsey
At 11:01 AM 1/3/04 +0100, privacy.at Anonymous Remailer wrote:
If we put aside the probable and obvious cause for disrupting the air 
traffic - namely, introduction of the permanent emergency state (in the 
future 2-3% of all flights may be affected - small price for maintaining 
the power), I wonder what are the logistics of injecting false information 
into the snooping systems.
It sure looks Al Qaida et al have already figured this out.  There just so 
happens to be chatter indicative of a major attack before every major 
holiday.  This seems to lead to three possibilities:

a.  AQ has worked out that it's cheaper and safer to disrupt life in the US 
by chatter than by actually trying any attacks here, and disrupting 
holidays is more fun.

b.  There really have been attacks planned, but they've either been foiled 
actively (e.g., the terrorists got arrested or shot or something before the 
attack took place) or passively (e.g., the higher alert status, changes to 
security procedures, etc., have made the terrorists postpone their attacks.

c.  There really isn't much useful information about AQ plans in the 
available intelligence, and what we're seeing is the intelligence 
community's priors (in the Bayesian sense; their prior assumptions are 
swamping the effects of their meager data).
..

--John Kelsey, [EMAIL PROTECTED]
PGP: FA48 3237 9AD5 30AC EEDD  BBC8 2A80 6948 4CAA F259


Re: Singers jailed for lyrics

2004-01-04 Thread John Kelsey
At 05:56 PM 12/30/03 -0800, Major Variola (ret) wrote:
At 07:48 PM 12/26/03 -0500, Michael Kalus wrote:
Then I guess you better start liberating the world.
If I were a neocon asshole, I would.  Instead, I regard liberation as a
local task, and interfering with sovereignty as the initiation of force,
ie an act of war.
Well, clearly bombing and invading them was an initiation of force, in the 
most literal sense--we shot first.  But while I can see that individuals 
have a right that you violate by initiating force against them, I don't see 
how that can apply to governments, especially governments whose main method 
of keeping power involves terrorizing their citizens.  Did the Iraqi 
government have a right to stay in power, or at least not to be 
invaded?  Where did that right come from?  From the rights of its people, 
most of whom apparently didn't have a hell of a lot good to say about 
it?  (That doesn't mean they like *us*, of course.)

In the most morally neutral case, this is like one criminal gang attacking 
another.  If the Sopprano family invades the Bozini family's turf, takes 
over their protection rackets, and hunts down their godfather, it could be 
messy, and it really will be an initiation of force in the most literal 
sense.  But is this the same kind of initiation of force that we normally 
talk about when, say, a mugger knocks me over the head and takes my laptop 
and wallet? (And of course, it's not that morally neutral.  It's more like 
a bunch of vigilantes from the neighborhood next door getting rid of the 
gang running your neighborhood, for reasons of their own, but probably to 
your benefit.)

None of this means it made any sense for us to invade Iraq, or that we did 
it mainly to liberate oppressed Iraqi citizens.  But I think using the same 
kind of language for interactions between individuals and between 
governments is a mistake.

--John Kelsey, [EMAIL PROTECTED]
PGP: FA48 3237 9AD5 30AC EEDD  BBC8 2A80 6948 4CAA F259


Re: Vengeance Libertarianism

2004-01-04 Thread John Kelsey
At 10:18 AM 12/31/03 -0600, Harmon Seaver wrote:
It's
not that just some humans are useless eaters, it's that all are, and the
Goddess Gaia is clearly hard at work trying to rectify this situation with a
variety of new bioweapons, i.e., AIDS, ebola, etc. which will soon, I'm sure,
reduce the human population as is most necessary, by half, if not
three-quarters, or perhaps just eliminate it all together -- to the wild
applause of the rest of the Earth.
You do know she's been trying the same scheme for several hundred thousand 
years, right?  As an artist, I think she's in a creative decline.  Ebola is 
picturesque and flashy, but not all that scary unless your funeral rites 
involve lots of contact with the blood of your dearly departed.  AIDS is 
more subtle, rather like syphlus before good antibiotics, but it's not her 
best work.  Even SARS is Yet Another Coughed Contagion.  If I recall 
correctly, smallpox got 90% of the American Indians who were exposed, and 
measles killed something like 1/3 of Roman citizens.  Bubonic and pneumonic 
plague swept through European cities and wiped out huge numbers of people, 
and they're still with us, though mainly places with lousy public health 
and sanitation.  And lets not forget her original innovation for 
discouraging cities, death-by-crapping-out-all-your-electrolytes.

If diseases get us, they won't be Gaia's work, but rather some of her more 
modern imitators in the bioweapons labs of various countries.  Like every 
great artist, she's spawned a host of followers, mostly not too 
imaginative, but some of whom may take her ideas and techniques to 
undreamt-of levels.

..
Harmon Seaver
--John (*cough, cough*) Kelsey, [EMAIL PROTECTED]
PGP: FA48 3237 9AD5 30AC EEDD  BBC8 2A80 6948 4CAA F259



Re: Zombie Patriots and other musings

2003-12-17 Thread John Kelsey
At 12:34 PM 12/14/03 -0800, Major Variola (ret) wrote:
At 11:52 AM 12/13/03 -0500, John Kelsey wrote:
..
One interesting property of the lone warriors is that they can't
actually make peace.
Good points, but not entirely true.  For instance, we could stop the
Jihad (tm) (including future Jihads by other parties) by stopping all 
foreign aid,
following the good general's advice, Trade with all, make treaties with 
none, and
beware of foreign entanglements.
So, I think that's pretty sound advice, but I don't think any of the top 
ten reasons for supporting it involve whether Al Qaida will stop attacking 
us.  Maybe they will, maybe they won't, but our foreign policy ought to be 
made based on what is in our long-term best interest (our meaning 
American citizens); realistically, terrorist attacks are a fairly small 
part of that calculation.  For example, we could presumably beat China in a 
war, but such a war would be enormously more expensive and dangerous than 
fighting Al Qaida.  If continuing to play world's policeman improves our 
chances of avoiding war with China, at the cost of bringing about some 
attacks from Al Qaida, that's a win for us.

Now, I suspect that playing world's policeman does *not* make us less 
likely to get into really dangerous and expensive war, and often gets us 
caught up in little wars that could expand into bigger ones.  (The Korean 
war apparently came relatively close to getting us into a war with China, 
for example.)  But there's at least some argument to be made about 
that--for example, by ensuring the security of Japan and Germany, we have 
avoided having two potentially very well-armed and dangerous opponents 
wandering around, possibly going on an empire-building spree that would 
have forced us into a nuclear war with them sooner or later.

..
Of course, there's a more fundamental problem with surrendering to the
lone warriors.  Imagine that there's such a wave of pro-life terrorism that
we finally agree to ban abortion.  You're a fanatically committed
pro-choice activist.  What's your next move?
Rudolph bombed clinics, not random people because the govt allowed the
clinics.  Contrast with a distributed jihad which attacks citizens to
sway a govt.
Isn't he alleged to have also done the Olympic Park bombing?  (Who knows 
whether he really did, or whether the FBI just assumed he had so they'd 
only have one domestic terrorist at large.)

Anyway, my point is that it's never going to be acceptable for the US 
government to pull out of making decisions about policy within the US.  A 
campaign of terrorism against abortion clinics, or against liquor stores, 
or against bookstores, can't be responded to by changes in policy to 
appease the terrorists without giving up on any kind of a free society.

--John Kelsey, [EMAIL PROTECTED]
PGP: FA48 3237 9AD5 30AC EEDD  BBC8 2A80 6948 4CAA F259


Re: Don't worry...it's just one of Saddam's doubles

2003-12-17 Thread John Kelsey
At 02:08 PM 12/15/03 -0500, Tyler Durden wrote:
..
Well, of course Saddam is going to test positive...he's apparently an 
actual CLONE.
Actually, from what I understand this is the 'original' Saddam (note how 
much older he seems than the Saddams we've been seeing in the press over 
the last few years), but he hasn't actually controlled things for a couple 
of decades. The Saddam we're really looking for is approximately Saddam 
#3, and he's still at large, and directing the insurgency.
_The Boys from Baghdad_, coming soon to a theater near you.

-TD
--John Kelsey, [EMAIL PROTECTED]
PGP: FA48 3237 9AD5 30AC EEDD  BBC8 2A80 6948 4CAA F259



Re:Textual analysis

2003-12-15 Thread John Kelsey
At 09:44 AM 12/13/03 -0600, Harmon Seaver wrote:
..
  And what is my supposed three-space paragraph lead-ins? The concept of
textual analysis to prove ID has always amused me. A competent writer can 
easily
change writing styles from moment to moment. I well recall a university 
english
lit prof almost accusing me of plagarism when I wrote a piece mimicking 
Faulkner
and doing so well enough that the prof actually started looking thru his works
trying to find it.
Textual analysis correctly identified the author of _Primary Colors_, 
though that was from a pretty small field of people with the right level of 
inside knowledge.  Does anyone know whether there have been real randomized 
trials of any of the textual analysis software or techniques?  E.g., is 
this an identification technique like DNA, or is it an identification 
technique like retrieving repressed memories under hypnosis (or, 
equivalently, consulting a ouiji board)?

It's not obvious to me how you'd change your writing style to defeat these 
textual analysis schemes--would it really be as simple as changing the 
average length of sentences and getting rid of the big words, or would 
there still be ways to determine your identity from that text?  I'm 
thinking especially of long discussions of technical topics--if I wrote a 
five page essay on what to look at when trying to cryptanalyze a new block 
cipher, I think it would be hard to keep readers who knew me from having a 
pretty good guess about the author, even if I tried changing terms, being 
more mathematical and less conversational, etc.  (Though this is more of a 
problem with humans familiar with my writing style, rather than with 
automated analysis.)

Harmon Seaver
CyberShamanix
http://www.cybershamanix.com
--John Kelsey, [EMAIL PROTECTED]
PGP: FA48 3237 9AD5 30AC EEDD  BBC8 2A80 6948 4CAA F259



Re: Zombie Patriots and other musings

2003-12-13 Thread John Kelsey
At 09:19 AM 12/12/03 -0800, Major Variola (ret) wrote:
..
You need to think about the lone warrior scenario that the Gang
worries about.  McVeighs and Rudolphs.
They were influenced by memes which were not immediately suppressed.
One interesting property of the lone warriors is that they can't actually 
make peace.  With large sets of them, there's not only no way to force them 
to surrender, there's no way to even surrender to them!  The demands of 
different lone warriors are different.  Because they're not under anyone's 
authority, you can't negotiate a truce that's worth anything with 
them.  You've executed the FBI and BATF agents involved in the Waco 
disaster, and so Tim McVeigh has made peace with you.  But Randolph still 
blows things up, because he wants abortion clinics and gay bars shut 
down.  And the Unabomber wanted (as far as I can tell) technology shut down.

Of course, there's a more fundamental problem with surrendering to the lone 
warriors.  Imagine that there's such a wave of pro-life terrorism that we 
finally agree to ban abortion.  You're a fanatically committed pro-choice 
activist.  What's your next move?

--John Kelsey, [EMAIL PROTECTED]
PGP: FA48 3237 9AD5 30AC EEDD  BBC8 2A80 6948 4CAA F259


RE: Zombie Patriots and other musings [was: Re: (No Subject)]

2003-12-12 Thread John Kelsey
At 02:07 PM 12/11/03 -0500, Trei, Peter wrote:
It's worth noting that despite over a decade of this rhetoric,
not a single terminally ill American has done this, so far as I
am aware.
Well, I think for most terminal illnesses, by the time it's obvious you're 
really not going to live much longer, you're pretty damned sick.  And until 
then, you'd probably like to make some personal use of what days or weeks 
you have left doing something like talking to your kids, praying, composing 
that last piece of music, etc., rather than blowing random strangers up to 
make some political point.  (Wouldn't it be a hell of a depressing 
statement about yourself, if you really believed that the most valuable use 
of the last hours of your life of which you were capable would involve 
strapping some dynamite to yourself and taking out a busload of random 
strangers?)

Along with that, most people care about either the afterlife form of 
immortality, or at least the reputation/legacy form of immortality.  Even 
if you don't worry about lakes of fire and red guys with pitchforks, you 
might prefer not to have your family and friends humiliated and ashamed at 
the mention of your name.  (Oh my God!  That was *your* son?  How do you 
live with that?)

The *only* even vaguely simlar cases I'm aware of are in
India and Sri Lanka, where young Hindu widows (who, in
traditional Hindu society have very dim prospects for
a happy life) are recruited as suicide bombers by the
Tamil Tigers. I think Rajiv Ghandi's assassin was
such a woman.
So there, the women are still healthy enough to do something, and doing the 
suicide bombing thing won't leave behind a legacy of relatives who change 
their names to avoid being associated with you.

Peter Trei
--John Kelsey, [EMAIL PROTECTED]
PGP: FA48 3237 9AD5 30AC EEDD  BBC8 2A80 6948 4CAA F259


RE: Stego worm

2003-12-12 Thread John Kelsey
At 08:09 PM 12/11/03 -0500, Tyler Durden wrote:
..
As for Variola's comment, you might be right. I just assumed there's some 
kind of relationship between LSB and those spatial freuencies wherein 
image information might be stored. Actually, I would still think there's a 
relationship, in which case an Echelon-like approach based on ffts and 
noise templates might be going on (hence the usefulness of jamming).
Well, you're going to have a model for your covertext.  Maybe that's the 
statistical distribution of low-order bits in the image file, maybe that's 
the distribution of packet arrival times.  You encode messages in your 
covertext by making up new covertexts (maybe from existing or old ones) 
that fit the same model.  If an attacker has no better a model than you do, 
he can't tell stegoed covertext from unstegoed covertext.  If an attacker 
has a better model, he may be able to tell the difference.

Let's make this concrete.  Suppose I decide to encode my real message to 
you in the time I send this e-mail.  If I have 24 hours in which I'm 
willing to send this message, I can encode one of about 80,000 messages to 
you, since the timestamp goes down to the second.

Now imagine an attacker who doesn't know anything about me.  He has no 
reason to be surprised at any time I might be sending messages to you, so 
to him, this isn't a terrible scheme.

Now imagine an attacker who knows I work a 9-5 job.  He ought to be quite 
surprised at seeing e-mail from me at 10:30 AM on Friday, because I'm 
supposed to be in the office then.  He ought to be pretty surprised at 
seeing e-mail from me at 4 AM, because that will make it hard for me to 
make it to work in the morning.  He has a better model of what the 
covertext (the time I send the e-mail) should look like, so he can see a 
couple of innocent-looking e-mails from me to you with weird timestamps, 
and have some reason to suspect something interesting is going on.
..

-TD
--John Kelsey, [EMAIL PROTECTED]
PGP: FA48 3237 9AD5 30AC EEDD  BBC8 2A80 6948 4CAA F259



Re: Deniable data storage

2003-11-14 Thread John Kelsey
At 06:58 PM 11/5/03 -0800, James A. Donald wrote:
I want to store information deniably.
..
This would contain various items of information that one could
extract by supplyin a secret, symmetric, key.   A random key would
extract a block of gibberish of random length   There would be no
indication as to how many bits of meaningful data were stored in the
block, though obviously they would have to add up to less than the
size of the block.
I believe one of Ross Anderson's students did something like this a few 
years ago, basically using error-correcting codes with a lot of 
redundancy.  The basic idea is that you use some kind of massive error 
correction and use a different sequence of bits with each key, so that 
you're very unlikely to have enough of your message bits clobbered by 
another message to make it impossible to decode correctly.  (It seems like 
there'd be a problem with information leakage about number of channels 
here, if you had a message encoded in that block of bits, because you would 
know when you decoded it how often you'd had bits flipped, but maybe they 
resolved that somehow.)

--John Kelsey, [EMAIL PROTECTED]
PGP: FA48 3237 9AD5 30AC EEDD  BBC8 2A80 6948 4CAA F259


Re: paradoxes of randomness

2003-08-23 Thread John Kelsey
At 08:45 AM 8/19/03 -0700, Tim May wrote:
..
(I strongly urge you to actually do this experiment. Really. These are the 
experiments which teach probability theory. No amount of book learning 
substitutes.)
Yep.  I've often thought that one benefit to playing RPGs when I was 
younger was directly observing lots and lots of rolls of various kinds of 
dice.  That gives you an intuition for how unlikely things can happen 
sometimes, for the difference between very unlikely and impossible, etc.

So the coin has been tossed twice in this particular experiment. There is 
now the possibility for equal numbers of heads and tailsbut for the 
second coin toss to give the opposite result of the first toss, every 
time, to balance the outcomes, the coin or the wind currents would have 
to conspire to make the outcome the opposite of what the first toss 
gave. (This is so absurd as to be not worth discussing, except that I know 
of no other way to convince you that your theory that equal numbers of 
heads and tails must be seen cannot be true in any particular experiment. 
The more mathematical way of saying this is that the outcomes are 
independent. The result of one coin toss does not affect the next one, 
which may take place far away, in another room, and so on.)
In fact, I believe this is the trick that makes it very easy to distinguish 
between sequences of coin flips that really happen, and ones that are made 
up by a human.  The human tends to try to make things even out over time.

--Tim May
--John Kelsey, [EMAIL PROTECTED]
PGP: FA48 3237 9AD5 30AC EEDD  BBC8 2A80 6948 4CAA F259


RE: JAP back doored

2003-08-23 Thread John Kelsey
At 05:54 AM 8/22/03 +0200, Thomas Shaddack wrote:
On Thu, 21 Aug 2003, Vincent Penquerc'h wrote:
 Still useful to protect against third party eavesdroppers, I guess.
Could it be at least somehow useful as a part of some bigger scheme, a
layer of a cake? Can a distributed multilayered proxy be built with some
less-than-trusted components?
For this kind of system, I think it's really hard to get much security from 
the people at the endpoints of the chain of anonymizers.  Specifically, if 
the attacker has control of both the entry and exit anonymizer, or if he 
has control of, say, a target site and the entry anonymizer, he can pretty 
reliably unmask the user's identity with just a few minutes of 
browsing.  Wei Dai discussed this idea several years ago, and I later 
reinvented the same idea.

--John Kelsey, [EMAIL PROTECTED]
PGP: FA48 3237 9AD5 30AC EEDD  BBC8 2A80 6948 4CAA F259


Re: What if all things computable are computable in polynomial time?

2003-08-14 Thread John Kelsey
At 03:50 PM 8/6/03 -0700, Major Variola (ret) wrote:
At 02:16 PM 8/6/03 -0700, Bill Stewart wrote:
..
While the public-key algorithms are based on math problems like
factoring or discrete log, most of the symmetric-key algorithms
are based on intractable ugliness, and on doing enough analysis
to find out which kinds of ugliness and bit-twiddling are really
intractable and which can be cracked.
Yes, but the cryptanalysis of symmetric ciphers involves
exponentially-expanding back trees.
That is the whole point of avalanche.  If, somehow, for any NP
algorithm there were an equivalent P algorithm, then the block-cipher 
backtracking
would be solvable in poly time.  You could find the plaintext ASCII needle in
the haystack of possibilities in poly time, no?
There's no reason to think those backtrees wouldn't get too hard to follow 
even without superpolynomial problems to solve.  After all, finding a 
collision in SHA-512 is O(1), as is brute-forcing a 256-bit AES 
key.  There's just a really big constant term.

Honestly, I think for real-world cryptography, we need about an N^3 
advantage or so between defenders and attackers--the defenders do 2^{25} 
work, and the attackers have to do 2^{75}, say, to break it.  Merkle's 
puzzles and all the related schemes give you N^2, and that's not *quite* 
enough to be useful.
..

--John Kelsey, [EMAIL PROTECTED]
PGP: FA48 3237 9AD5 30AC EEDD  BBC8 2A80 6948 4CAA F259


Re: U.S. Drops 'E-Bomb' On Iraqi TV

2003-04-04 Thread John Kelsey
At 10:58 PM 4/3/03 +1200, Peter Gutmann wrote:
..
The Wall of Stalin: Detonate a string of dirty nukes along the Iraqi border
with Kuwait/Saudi Arabia.  Suddenly Dubya decides there are much better places
to play soldiers, he'll look at the Iraqi thing again in 6,000 years or so.
This only works if your attackers have to use the land route.  Bombing and 
airlifting troops lets you leap right over the barrier.  For that matter, 
I'll bet troops in modern tanks and APCs wouldn't be exposed to too much 
radiation in a dash across even a really dangerously radioactive 
zone.  (Though I suppose if you're smart, you set up mines and barriers in 
the radioactive zone, and artillery and fortifications on its inside edge, 
with the goal of forcing your invaders to spend as much time as possible 
out there.  But maintaining your fortifications inside the zone will be a 
serious pain!)

I've heard that people driving through the area contaminated by Chernobyl 
are just told to roll up the windows and drive fast, but I don't know if 
that's true, or how much good it does you.  (And there's a big difference 
between an acceptable level of risk to soldiers in a war, and an acceptable 
risk to random civilians in peacetime.)

Peter.
--John Kelsey, [EMAIL PROTECTED]



Re: U.S. Drops 'E-Bomb' On Iraqi TV

2003-04-04 Thread John Kelsey
At 01:20 PM 4/3/03 +0200, Thomas Shaddack wrote:
..
[Discussing uses for the bomb that don't involve killing millions of 
civilians.]

Or pumping of one-shot gamma lasers. (What you want to use them for is on
you, though.)
Weren't there some proposals for using very low-fallout bombs to break up 
dangerous hurricanes that were forming?  (I just don't have the background 
in meteorology to have any intuition about whether or not this is 
plausible; I know hurricanes have a whole lot of energy tied up in 
temperature and humidity differences in different masses of air, so maybe 
it could work.)  A lot of these struck me as desparate attempts by the bomb 
designers to find *something* useful to do with the damned things besides 
pray that they sit in their silos, rusting, and are never, never used.

I guess the other side of this is maximally evil uses of bombs.  Imagine 
someone setting up a set of fallout-enhanced bombs in their own country, 
with the warning that if anyone invades them, millions of people downwind 
will be dying of cancer in the next decade or two.  Or someone trying to 
use current climate models to allow them to threaten a global catastrophe 
if they're crossed--like trying to screw up ocean currents, or setting off 
a bomb in the calthrate beds under the ocean to try to trigger runaway 
global warming.  (The big problem there is that if the best available 
models change enough over time, as they are subject to do, your deterrent 
might lose all its value very quickly.  And yes, I stole this idea from 
John Barnes.)

MANY more uses.
Yep.  Though honestly, I think fissionables are a lot more valuable when 
you're using them to generate power in a mass-efficient way (e.g., bring 
plenty to Mars with you, so you can distill out CO2 from the atmosphere and 
crack out the oxygen with power from your reactor).  Most of the time when 
you're not trying to blow something to bits, you really get more value out 
of continuous power output for a long time.  At least, you do if you don't 
have to compete with cheaply available natural gas or oil, and if you don't 
have to comply with insanely expensive and complex regulations.

--John Kelsey, [EMAIL PROTECTED]



Re: S-Tools Stego makes an appearance in Law and Order-SVU

2003-04-03 Thread John Kelsey
At 07:15 AM 3/31/03 +0200, Thomas Shaddack wrote:

For very-low-bandwidth data transfers hidden in wideband streams, we could
maybe use timing of packets. Wouldn't work with more congested networks,
and would need some kind of REALLY heavy-duty error correction, but could
be rather difficult to spot.
Do some reasonable error-correction on it, and then implement IP over 
it.  Hey, we *said* it was an unreliable transport protocol  :)

The signal could be transported in the
intervals between the IP packets sent, or by dropping selected packets and
requesting retransmissions, or by swapping the order of some packets.
The constraint here is that an outsider mustn't be able to distinguish the 
performance of a stego-enabled system from a non-stego system.  So I think 
you'd have to be really careful about dropping very many packets, swapping 
packets, etc.

As a first cut, suppose I have a sort of encoding mask for two different 
bits, e.g.

0 == 01010101
1 == 10101010
Then I decide whether to delay packets by some very small amount based on 
which mask I'm using, adding a really small delay whenever there's a 1.

The receiver tries both masks, and chooses the more probable one.  (For the 
nine packets he receives, he does some statistics on the delays between 
packets, and assigns probabilities of 1 symbols in each location, throws 
out obvious outliers, etc., and then chooses the most probable 
decoding.)  The goal here would be to get down to delays that were small 
enough that an attacker who didn't know the two candidate masks would have 
a very low probability of being able to distinguish the behavior of a 
stego-enabled system from a non-stego system.  Sort of like having a timing 
attack which is impractical because the attacker must guess too much 
internal information before he can test his guess

Has anyone done this kind of scheme in the open literature before?  This 
seems like the sort of thing someone would have investigated as a covert 
channel for leaking information from a compromised system.

The world is crammed full with unused communication channels.
Yep.  Mostly unused because they're not all that reliable, or because they 
offer too little bandwidth to be worthwhile, alas.
...

--John Kelsey, [EMAIL PROTECTED]




Re: Things are looking better all the time [TERROR ALERT: Cerenkov Blue]

2003-04-01 Thread John Kelsey
At 09:36 AM 3/27/03 -0800, Tim May wrote:
On Thursday, March 27, 2003, at 08:41  AM, John Kelsey wrote:
...
However, it seems to me it would be very hard for this news not to leak 
out. If, say, a nuke or serious bioterror weapon had been found in a major 
city, a lot of agencies would have had knowledge of it. It seems to me 
that at least one person would have said something, leaked it to the 
press, etc., for any of the usual reasons.
True.  I think it would depend on how it was dealt with.  My wife used to 
work for a state environmental regulatory agency, and when their lab truck 
showed up someplace to collect samples, it always drew a lot of 
attention.  Obviously, if the NEST people show up at some apartment 
building in Manhattan wearing moon suits, or if dozens of firemen and 
policemen are involved, it's going to be hard to keep it from slipping out 
that something interesting has happened.  But if it were handled quietly, a 
single incident like this might not make the news.  And if the incident 
was a terrorist nuke that turned out not to go off, the only evidence might 
be a soon-discounted warning call to a couple of major newspapers.

--John Kelsey, [EMAIL PROTECTED]



RE: U.S. Drops 'E-Bomb' On Iraqi TV

2003-03-29 Thread John Kelsey
At 01:57 AM 3/28/03 -0800, Sarad AV wrote:
...
They are finding it hard to hit
armoured vehicles since they are well spread out in
distinct patterns.US has told iraq to treat US
soldiers as pow's and follow the geneva
convention.they showed images of 3 US pow's,one women
and 2 men-one of them were bandaged on their
head.These had appeared a few hours after US made a
press conference saying that they had taken 3000
iraqi's pow's and there were no US pow's.
Yep.  This led to complaints about showing POWs on TV violating the Geneva 
convention.  For some reason, when CNN showed Iraqi POWs, we didn't notice 
a problem.  (At some level, I think the projections of the people at the 
top were so optimistic, that a lot of people were just shocked that the 
Iraqis didn't just collapse and welcome the soldiers into Baghdad with 
flowers and cheering. This has a really depressing parallel with the way we 
jumped intp Vietnam, though I don't think the Iraqi soldiers are anywhere 
near as tough and committed as the NVA.)

Iraq replied by asking them to follow the geneva
convention and not to do cluster bombing in civilan
areas.
Be fair about this.  We own the skies above Baghdad, at least above the 
range of small-arms fire.  If we wanted the streets of Baghdad choked with 
corpses, they would be.  Basically, civilian casualties have been the 
result of a small number of bombs missing targets, or screwed up targeting, 
or bystanders getting hit when they're too close to what looks like a 
miliatary target.  I think we've probably played up our bombing accuracy a 
bit too much, but it's not like we're targeting civilian areas.  If we 
were, the images from Baghdad would be very different; not just one market 
with a bomb crater, and one hospital flooded with injured and dead people, 
but every building reduced to smoldering ruins, and dead people so thick on 
the ground you couldn't walk across it.

In any case US military pow's are going to have a hard
time and since U.S didnot give pow status to
*suspected* Al-Queda/taliban militants captured in
afghan war-no body is going to put pressure on iraq
either.
Well, there's not a whole lot more pressure we can put on the top 
leadership of Iraq, since our public pronouncements have made clear that 
Saddam, his kids, and presumably most of the rest of the top echelon of 
Iraqi leadership is going to be jailed or executed when this is all 
done.  I guess specific generals may have an incentive to treat US POWs 
better, since the issue will likely come up when the US takes over Iraq in 
another month or two.

I think the usual inducement to treating POWs you hold properly is that you 
want your soldiers who've been taken prisoner to be treated 
properly.  (There's also world opinion, which we care about a lot more than 
Iraq does.)   I'm not sure how important the Iraqi government considers our 
treatment of their captured soldiers, though, and we're not going to shoot 
them all even if the Iraqis do that to our captured soldiers.

Regards Sarath.
--John Kelsey, [EMAIL PROTECTED]




Re: Things are looking better all the time

2003-03-29 Thread John Kelsey
At 02:06 AM 3/28/03 -0800, Sarad AV wrote:
hi,

That cannot possibly even happen-by mistake.Al-jazeera
is qatar based.They might hit a chinese embassy but
not AL-Jazeera.
I believe we hit the Al Jazeera office in Afghanistan pretty early in our 
bombing campaign there.  (I read an archived BBC story about it when I was 
looking for the al-jazeera in english website.)  This is a bit of a 
pattern; we hit television stations in Kosovo and Serbia during our 
campaign there, as well. So we're unlikely to bomb their main office, but 
hostile media offices (and the embassies of countries that p*ss us off) do 
seem to come to a bad end when they're in bombing zones.

1500 turkish troops moved into north iraq-US cannot
immediately do any thing about it since flying over
Turkish air space is important for them.
The tragedy for the Kurds is that they're just not important enough to get 
the kind of backing they'd need to establish their own state, given the 
large set of countries that this would offend.  So, once again, I expect 
that we'll leave them hanging when they're done being useful.  This is 
lousy, though not any different than most countries' management of foreign 
affairs.  What was that famous quote from Austria-Hungary?  Something like 
We will astonish the world with our ingratitude.

...
Sarath.
--John Kelsey, [EMAIL PROTECTED]




RE: Things are looking better all the time

2003-03-26 Thread John Kelsey
At 04:37 AM 3/25/03 +0100, Lucky Green wrote:
...
If any terrorists had nukes, why have they not used them so far?
Suppose you only have one, it was really hard to get, and you're not sure 
how much of your US network has been turned, or at least placed under heavy 
surveilance?  Maybe you wait until you are really sure you can succeed 
before you use it.

Alternatively, we have no way of knowing how often terrorists have tried to 
use nukes, but been stopped one way or another.  Maybe the Russians sold 
them very convincing duds.  Maybe the FBI caught them and disarmed the 
bombs before they went off.

And for a third alternative, it's quite possible (I don't know how likely) 
that one or more groups have smuggled nukes into the US, planted them in US 
cities, and offered proof to the US government, as a way of establishing a 
nuclear deterrent.  (C.f. Ross Anderson's Guy Fawkes Protocol.)

There are pretty obvious reasons why the US government might not announce 
either of the last two cases, and why the terrorist group of your choice 
wouldn't announce we have a bomb until they had the thing planted where 
they wanted it.

--Lucky
--John Kelsey, [EMAIL PROTECTED]



Re: Journalists, Diplomats, Others Urged to Evacuate City

2003-03-21 Thread John Kelsey
At 02:03 PM 3/20/03 +, Ken Brown wrote:
Of all the places in the world you ought not to go if you want to not be
shot at, a war with 8 sides (Residual Lebanese govt. vs Palestinians vs.
Israel vs Islamist Shia militias vs. non-Islamist Shia militias vs.
Sunni militias  vs Maronite militias  vs Druze - with interference from
Iran  Syria)   at least 3 of whom hate /all/ the others, and /all/ of
whom have a history of shooting at each other, is hardly at the top of
the list.
If you go to where the vultures and the jackals are disputing over a
corpse that isn't actually dead, you have yourself to blame if you get
bitten.
So, I don't suppose you've heard about our more recent forays into the 
Balkans, Somalia, and Afghanistan

--John Kelsey, [EMAIL PROTECTED]



Re: What shall we do with a bad government...

2003-03-21 Thread John Kelsey
At 03:49 AM 3/20/03 +0100, Thomas Shaddack wrote:
...
While over 70% of local citizens are against it (caveat: I am not closely
familiar with the polling method, but no one of my local friends is
supporting Shrubya's pet war).
Your sample is probably seriously biased, though.  My friends and family 
run about 98% antiwar, but several different polls seem to indicate over 
half the American people support it.  There's no paradox there; my family 
and friends aren't a representative sample of the American people.  This is 
like that famous quote about Nixon can't have won--nobody I know voted for 
him by some New York Times columnist.  (That's from memory, so I'm 
probably missing some essential facts...but then, the NYT does that 
occasionally, too.)

--John Kelsey, [EMAIL PROTECTED]



Re: Journalists, Diplomats, Others Urged to Evacuate City

2003-03-21 Thread John Kelsey
At 07:42 AM 3/20/03 -0800, James A. Donald wrote:
...
The story you are telling is part of a big commie lie -- that
the US aided the bigoted Taliban against the elightened
communists who created a constitutional democracy where every
man and every women have a vote, and universal education and
health care were guaranteed, etc.
I guess the particular Commie lie I'd always heard along these lines was 
more like the US aided a  lot of crazed, bloodthirsty bandit chieftains 
who were nominally anti-communist, and deeply anti-invading-Russians, some 
of whom later wound up being Taliban bandit chieftains.  I haven't dug 
into this story to see if it's true, but I certainly don't recall ever 
being exposed to the idea that the invading Russians and their allies were 
anything but brutal and nasty.  We have a long history of holding our noses 
and handing weapons to objectionable folks who seem likely to help us fight 
our fights or accomplish our objectives.  Surely it's not too hard to think 
of current examples

--digsig
 James A. Donald
--John Kelsey, [EMAIL PROTECTED]




Re: Identification of users of payphones

2003-03-17 Thread John Kelsey
At 08:03 PM 3/14/03 -0800, Tim May wrote:
...
They could be round, for easy handling. And milled for evidence of having 
been shaved. They could even be made of precious metals for high-value 
coins, and of base and inexpensive metals for low-value coins.
Have you filed for the patent, yet?

--Tim May
That government is best which governs not at all. --Henry David Thoreau
--John Kelsey, [EMAIL PROTECTED]



RE: The burn-off of twenty million useless eaters and minoritie s

2003-02-24 Thread John Kelsey
At 10:31 AM 2/24/03 +, Vincent Penquerc'h wrote:
...
Now, I may have left my clue home, so feel free to explain *why*
100% capitalism (eg no state left, no other power) could never end up
with power aggregation.
I don't think you can *ever* prove a claim like that, since you're dealing 
with humans, who can be only very imperfectly modeled.  There's no system 
that couldn't possibly fall into some horrible state, whether that's 
tyranny or chaos or lemming-like rush to an unwinnable war or ostrich-like 
refusal to prepare for clearly oncoming war.  Systems of human decision 
makers are driven by the decisions made by those humans, and sometimes, 
they're a bunch of idiots.  More centralized decision-making has the ugly 
property that a smaller set of decision-makers have to be idiots to run the 
whole society into a ditch.  On the other hand, more centralized 
decision-making makes larger projects possible sometimes, especially ones 
involving big, long wars.

--
Vincent Penquerc'h
--John Kelsey, [EMAIL PROTECTED]




Re: The burn-off of Tom Veil

2003-02-21 Thread John Kelsey
At 11:13 AM 2/21/03 -0500, Tyler Durden wrote:
...
However, one way to see the situation is more of a buy-off. Arguably, the 
government plunders in order to pay off welfare society, because if they 
didn't the masses would rise up and kill off the system that does not 
really do much to equip them for the opportunities that immigrant kids 
come in and sweep up. (The term Brain drain comes to mind.)
The reality is even more weird, I think.  Suppose there's some 
struggling-to-make-it new family down the street, and I start helping out 
by bringing them dinner every night.  If I do it for a few days, e.g., 
while the mom is in the hospital or something, it's a genuine act of 
kindness.  If I do it every day for five years, then they are more-or-less 
going to become dependent on me.  The day I decide I have better uses for 
my time than bringing them dinner, they're almost certainly going to be mad 
and bitter at me.  (If you don't believe this, observe the interaction 
between a parent and newly-independent kid asking for money, or between a 
rich uncle and his hoping-to-inherit nephews.)

Social programs in general work this way.  It was a goodie being handed out 
once, but now, it looks to the people involved like a necessity, and 
they'll fight hard to keep it.  This is just as true of social security and 
farm subsidies as of welfare.  Listen to a Republican-voting farmer justify 
farm subsidies some time.  You ought to have to *pay* for that kind of 
entertainment.  (Oh, wait, I *am* paying for it.)  In fact, smarter and 
better educated people will tend to be a lot more effective at fighting for 
their benefits than less intelligent, poorly educated people.  So welfare 
reform, for all its weirdness, seems to be working much better than the 
attempts to reform farm subsidies, say.  And even with Republicans in 
control of everything, I'll bet we don't see any major cuts to NEA, say.

-TD
--John Kelsey, [EMAIL PROTECTED]




Re: Blood for Oil (was The Pig Boy was really squealing today

2003-02-20 Thread John Kelsey
At 10:50 AM 2/20/03 +, David Howe wrote:

...

They don't need to build a pipeline though Afganistan any more then? I
know they were pretty annoyed when the taleban refused to let them,
prior to 9/11


I'm trying to think of something I'd personally be less interested in 
investing my own money in than an oil pipeline through Afghanistan.  Lots 
of money invested up front, literally hundreds of small groups who could 
threaten to damage it as a way of demanding a share of the loot, very hard 
to defend, etc.  What an opportunity!


--John Kelsey, [EMAIL PROTECTED]



Re: Science Journal 'Self-Censorship'

2003-02-19 Thread John Kelsey
At 06:58 PM 2/16/03 -0500, Pete Capelli wrote:

http://abc.net.au/news/scitech/2003/02/item20030216103135_1.htm

Self-governance, the editors say, is an alternative to government review
of forthcoming journal articles.

I don't edit any science journals, but I would expect there is no law
requiring 'government review'.  So what are the editors talking about?


There's been a bit of discussion of this stuff in the US media, especially 
NPR.  I think the idea is that the US government (and presumably others) 
want scientific publications to self-censor things that might be useful to 
terrorists, rogue states, and various other bad guys.  Intuitively, this 
seems like a breathtakingly bad idea.  (How does the information get out to 
working scientists, then?  Do you create a situation where only people 
going to the best schools in the US and Europe get to learn the current 
state of the art in a bunch of fields of science?  What do you do about 
preprints and such on the web?)  But post-9/11, if three bureaucrats tell 
congress it's necessary to sacrifice a virgin a week in order to prevent 
the next terrorist attack, they'll vote unanimously to start drafting 
virgins and sharpening knives.  *Nobody* wants to be blamed for ignoring 
the warnings of the next big terrorist attack.

The creepier subtext here is the whole idea that there are some 
technologies that only the Elect (in the currently powerful nations) ought 
to be permitted, and that any attempt to investigate Banned Technologies 
just might get you arrested or invaded or bombed.  This general idea seems 
to pop up a lot, e.g., in Bill Joy's essay Why the Future Doesn't Need 
Us, in Vinge's wonderful novel _The Peace War_,  in Larry Niven's Known 
Space stories.  It's hard to imagine a better recipe for massively slowing 
the advance of technology, protecting incumbents in every field and 
industry, and generally making mankind worse off in order to protect 
him.  And yet, it's an apparently natural reaction to being frightened by 
the threats of new technologies.  (Ironically, the nasty terror weapons 
we're all worried about are mostly 1940s or earlier technology.  Stuff that 
even a third-rate starving dictatorship can cook up.)

-pete


--John Kelsey, [EMAIL PROTECTED]




Re: Crypto anarchy now more than ever

2003-02-19 Thread John Kelsey
At 02:20 PM 2/15/03 -0800, James A. Donald wrote:
...

They will be testing another missile soon.  We shall see how
far it goes.   They would not waste a nuke on an untested
missile --- which is why they test them.


If their goal is to blackmail us into not invading them, I don't think they 
need to threaten to nuke LA or DC.  We have a lot of troops in South Korea, 
within a few miles of the border.  They can threaten them, or maybe 
threaten Tokyo or Seoul.  No need to develop multi-billion dollar 
technology, when 1940s era fission bombs are all that's needed.

If their goal is to extort money from us (this looks like the most likely 
goal), they have a somewhat different set of requirements.  Then, their 
threat is really going to be about proliferation.  They announce they have 
nukes, and make it clear that either we buy them, or someone else will be 
given the chance.  The saber-rattling serves both to communicate the threat 
and to advertise for buyers.

 James A. Donald


--John Kelsey, [EMAIL PROTECTED]




Re: Stand back or I'll jump....

2003-02-19 Thread John Kelsey
At 03:21 PM 2/19/03 -0500, Tyler Durden wrote:

If their goal is to blackmail us into not invading them, I don't think 
they need to threaten to nuke LA or DC.

As I said before, the obvious thing would be for North Korea to threaten 
to nuke itself!

This should clearly be called the Blazing Saddles strategy.


-TD


--John Kelsey, [EMAIL PROTECTED]




Re: \Touching shuttle debris may cause bad spirits

2003-02-05 Thread John Kelsey
At 12:38 PM 2/4/03 -0800, [EMAIL PROTECTED] wrote:

Not necessarily. It is a well documented phenomenon that people show up at 
hospitals with even some seemingly real conditions whenever there is a 
particular panic in the media, even in cases where it is simply not 
possible that they were made sick by the incident.

Well, in a large population, there's also a certain fraction of people who 
are sick for other reasons--food poisoning, say, or coming down with the 
flu.  If you tell all those people you've just been exposed to dangerous 
chemicals that may make you ill, it's not a surprise if some of those 
people assume they're sick because of the dangerous space chemicals, rather 
than because of that potato salad they had at the picnic last Sunday.

...
Jay


--John Kelsey, [EMAIL PROTECTED]




Re: Touching shuttle debris may cause bad spirits to invade your body!

2003-02-03 Thread John Kelsey
At 10:19 AM 2/2/03 -0800, Tim May wrote:
...

Speaking of journalists, why does Wolf Blitzer repeat this obvious lie 
about the metal bits and pieces being tainted by evil spirits? Because 
these so-called journalists are stooges for the state.

Well, the bit about 18 times the speed of light, and other mistakes I've 
seen through the years, make me suspect that Wolf and company simply don't 
have the technical background and built-in BS detectors necessary to catch 
things like this.  (For some reason I've never been able to fathom, many 
journalists seem to be remarkably gullable, when they're told something 
from the right kind of source, especially a government agency or other 
official source.)

A real journalist would just roll his eyes and say Look, folks, NASA 
wants these pieces to be aid in reconstructing the accident. There are no 
traces of liquid propellants and deadly chemicals on these pieces. And 
they certainly didn't stay hot for long. NASA is trying to get us to feed 
you jive so you'll be properly frightened and won't touch them.?

I recall a guy on NPR saying something like this, a bit more 
politely.  Something like The pieces surely aren't going to be dangerous, 
but moving them is going to mess up the investigation of the crash.  Which 
presumably is what everyone with any technical background and common sense 
was thinking when they heard the original warning, right?

--Tim May, Occupied America


John Kelsey, [EMAIL PROTECTED]




Re: DNA evidence countermeasures?

2003-01-30 Thread John Kelsey
At 07:50 PM 1/28/03 +, Ken Brown wrote:
...

Think - you are a suspect. They find 2 human DNA signals at the scene of
the crime, one from you, one from someone quite different from you.
Well, they can look for the other guy in their own  time, but they've
got you. If they are using a stringent enough test (often they don't)
the odds against it not being you are huge.


Yep.  Imagine leaving twenty random peoples' fingerprints at the scene 
along with your own.  You might confuse the police for awhile, but 
eventually, they'd find the set of prints that matched with the suspect 
they were holding

The creepier thing here is the possibility of planting DNA evidence, which 
seems very easy to me.  It wouldn't be a big surprise if this had been done 
by now.  A really careful investigation might detect the fraud, but if the 
planted evidence points in a really plausible direction anyway (e.g., the 
apparent murderer is the husband/ex-husband/disgruntled business 
partner/drug dealer of the victim), it may be hard to get anyone to take a 
second look at the data.

The scary number of death-row inmates who've been more-or-less proven 
innocent by DNA evidence implies that the police, prosecutors, judges, and 
juries just aren't all that careful about checking the plausibility of 
evidence anyway.
...

--John Kelsey, [EMAIL PROTECTED]



Re: Deniable Thumbdrive?

2003-01-26 Thread John Kelsey
At 06:05 PM 1/24/03 +, Ben Laurie wrote:
...

Nice! Get them to cut _all_ your fingers off instead of just one.

Just say no to amputationware.


This whole idea was talked to death many years ago on sci.crypt, and 
probably before that other places.  The good news is that it's not too hard 
to come up with a design that lets you encrypt a large hard drive in such a 
way that there's no way to determine how many tracks of secret data are 
there.  I believe one of Ross Anderson's students did a design for this; it 
doesn't seem like a really hard problem to solve if you don't mind losing 
most of your effective disk capacity.  The bad news is that you *really* 
need to think about your threat model before using it, since there's 
necessarily no way for you to prove that there no more tracks of secret 
data.  It takes no imagination at all to think of ways you might end up 
wishing you *could* convince someone you'd given them the key to all the 
tracks.

IMO, the only way to do this kind of thing is to have the data, or at least 
part of the key, stored remotely.  The remote machine or machines can 
implement duress codes, limits to the number ot password guesses allowed 
per day, number of invalid password guesses before the thing just zeros out 
the key and tells the person making the attempt it has done so, etc.  Trust 
me, you *want* the server to loudly announce that it will zero the key 
irretrievably after the tenth bad password

Cheers,

Ben.


--John Kelsey, [EMAIL PROTECTED]





Re: Deniable Thumbdrive?

2003-01-26 Thread John Kelsey
At 10:06 PM 1/24/03 +0100, Eugen Leitl wrote:
...

Frankly, the fingerprint is a lousy secret: you leak it all over the
place. You can't help it, unless you're wearing gloves all the time. Ditto
DNA.


That's generally true of biometrics.  Unless taking the measurement is so 
intrusive it's obvious when it's taken (e.g., maybe the geometry of your 
sinus cavities or some such thing that requires a CAT scan to measure 
properly), there's no secret.  People constantly seem to get themselves in 
trouble trying to use biometrics in a system as though they were secret.

The best you can usually do is to make it moderately expensive and 
difficult to actually copy the biometric in a way that will fool the 
reader.  But this is really hard.  In fact, making special-purpose devices 
that are hard to copy or imitate is pretty difficult.  It seems enormously 
harder to find a hard-to-copy, easy-to-use token that just happens to 
come free with a normal human body.

I think the best way to think about any biometric is as a very cheap, 
moderately hard to copy identification token.  Think of it like a good ID 
card that just happens to be very hard to misplace or lend to your friends.

--John Kelsey, [EMAIL PROTECTED]




Re: Desert Spam

2003-01-18 Thread John Kelsey
At 06:56 AM 1/16/03 -0800, Mike Rosing wrote:

On Thu, 16 Jan 2003, Anonymous wrote:

   Does anyone know a source for a spam list for US military?
 It would be great to start spamming them with messages about
 how much they are hated by the entire world, how little real
 support they have at home - We hope you don't come home,
 sucker, unless its in a bodybag. - and other nice, morale
 destroying sentiments.

A search on *.mil might get you a few addresses :-)


Anyone with a harvestable e-mail address is immune to this.  Yes, it's 
depressing that one set of spammers hates you and is going to sleep with 
your wife while you're getting your ass shot off in Iraq, but on the other 
hand, you've just found out how to make your penis four inches longer, and 
this Nigerian dude is wanting to give you a bunch of money for helping him 
out with a small banking matter.  It all kind-of balances out.  :)


Patience, persistence, truth,
Dr. mike


--John Kelsey, [EMAIL PROTECTED]




Re: Petro's catch-22 incorrect (Re: citizens can be named as enemy combatants)

2003-01-18 Thread John Kelsey
At 09:38 AM 1/16/03 -0800, Major Variola (ret) wrote:

At 03:20 PM 1/15/03 -0800, Petro wrote:


...
[Question of whether we could have avoided 9/11 and such things by not 
having an activist foreign policy]

Secondly, other groups would have been just as pissed off at us for
*not* helping them.
Not if the USG had no policy towards anyone.  One more time, George, for


No policy toward anyone isn't possible once there's any kind of 
contact.  There are terrorists who'd want to do nasty things to us for 
simply allowing global trade, or for allowing trade with repressive regimes 
like Saudi Arabia or Nigeria, or for selling weapons to countries with bad 
human rights records.  Osama Bin Laden might not hate us, but *someone* 
would.  And once we start allowing our foreign policy to be changed in 
response to terrorism, we're truly f*cked, since a lot of people would like 
to exert control over how the world's most powerful military is used, whom 
we trade with, etc.  Even if we were just an economic giant with little 
foreign policy, we'd still have an impact by which countries we chose to 
trade with, and if someone could improve their fortunes by several billion 
dollars a year by finding a few gullable guys to strap dynamite to 
themselves and blow up shopping malls and such, I'm sure they'd do just that.

I agree we'd be better off with a much less interventionist foreign policy, 
few well-chosen allies (e.g., we're not going to be cool with people 
invading Canada), and free trade with almost everyone (I'd like to see us 
not trade with countries with really bad human rights records, though 
that's not exactly the direction we're heading in now).
...

--John Kelsey, [EMAIL PROTECTED]



Re: citizens can be named as enemy combatants

2003-01-16 Thread John Kelsey
At 10:40 PM 1/13/03 -0800, Tim May wrote:

On Monday, January 13, 2003, at 09:23  PM, John Kelsey wrote:

...

Personally, I was shocked, *shocked*, to see the supreme court make a 
decision on the basis of politics instead of a careful reading of the 
constitution.

Everything the Supreme Court did in the 2000 election was fully justified. 
The Dems lost, then tried to change the rules.

That's not the way it looked to me.  My impression was that both sides were 
willing to do anything that wouldn't actually get them thrown in jail to 
sway the outcome of the election, but that Bush had been dealt a better 
hand.  The Florida court decision (with a big Democratic majority) went for 
the Democrats, the SC decision (with a Republican majority) went for the 
Republicans.  Essentially everyone involved made decisions that were in the 
interests of their party winning the presidency.  But seeing the SC make a 
highly-political decision that upset so many Democrats was entertaining, 
given the usual pattern of Conservatives complaining about activist, 
politicized courts, while Liberals explain that the Constitution needs to 
be interpreted in light of current events.  (Note that with a more 
Conservative court, we can expect this pattern to reverse, just as 
Conservatives were complaining about too much Presidential power during the 
Clinton administration, but in favor of greater Presidential power in the 
Reagan and Bush years.)

...
I'm not happy with Bush, to repeat this mantra that Gore/Lieberman 
actually won is knavish at best.

That's not what I said at all.  (And for what it's worth, I don't think 
Gore would be doing very much differently right now.  It's not like Bush is 
sitting around, coming up with proposals for added surveilance and security 
on his own--these are recommendations from various parts of the 
bureaucracy, and those recommendations carry a lot of weight because nobody 
wants to be seen to have ignored the next set of warnings.)

--Tim May


--John Kelsey, [EMAIL PROTECTED]




  1   2   >