On Mon, Jun 29, 2020, 2:43 PM Karl <gmk...@gmail.com> wrote:
> Just adding on here, > > On Fri, Jun 26, 2020, 10:13 PM coderman <coder...@protonmail.com> wrote: > >> ‐‐‐‐‐‐‐ Original Message ‐‐‐‐‐‐‐ >> On Friday, June 26, 2020 11:54 PM, таракан < >> cryptoanalyz...@protonmail.com> wrote: >> ... >> >> My understanding of Cypherpunks is - as per their Manifesto - that they >> are trying to build privacy in a world where privacy is becoming a crime. >> >> I thought recently that the biggest 'weapon' against a fascism regime >> would be to create the inability for that fascist regime to track, locate, >> monitor and spy someone. >> >> >> in the words of every hacker ever: "What's your threat model?" >> >> nation state attackers are fairly infallible, unless you're personally >> gifted and/or well resourced... >> > > There are different degrees of being targeted. If you can stay > uninteresting, there is still lots of value. (it's also quite inspiring to > see targeted people using privacy technology, as not everyone is free to: > and I imagine this helps talk to others without endangering them) > > I walk in the street right now. Nobody knows who I am. >> >> >> check out Clearview AI - and remember this is a commercial, >> non-classified effort! >> E.g.: >> https://www.nytimes.com/2020/01/18/technology/clearview-privacy-facial-recognition.html >> , https://www.cbc.ca/news/technology/clearview-app-privacy-1.5447420 >> > > Note that many are pausing on facial recognition now due to authority > abuse. The OP would be a dot in a database who might be wearing a > coronavirus mask and is associated only with where he walks. > >> My SIM card isn't linked to any ID (true). >> >> >> check out "The Find", and other techniques that are designed to work >> against burner phones; they attack pattern of life data exhaust across all >> cell tower radios in addition to targeted attacks against specific baseband >> chipsets of "selected" targets.... >> > > Sounds like you need a lot of additional data to build a profile. > > My phone cannot track me because it hasn'\t a GPS and so on ... >> >> >> note that tower based triangulation is nearly as effective as GPS, in >> terms of geolocation privacy risk. >> > > Effective, but less effective. > > I like to keep a phone on hand bought from some physical store that sells > a lot of them, with its antennas and ideally radio chips removed or > grounded, before it is first turned on. I like to add a chain inside and > keep the device chained to me. I have seen such devices do freaky things > one learns to prevent, like update their system time over bluetooth. I > have found them to be reliable secure storage for now. > >> I know that with the time that sort of life will be harder and harder. >> Hence I feel it is a noble task to build a system where people can live a >> normal life and stay anonymous - as they want. >> >> >> indeed! as mentioned before: >> >> first deploy encryption to kill passive Eve's ears. >> then keying Hardened end-to-end to avoid active Mallory in the Middle. >> finally, harden Physical Security against burglary and rubber brutes... >> > > All things people have worked hard on but not quite normalized. Don't > forget EMI. > >> Interesting enugh soon there will be Quantum crypto, and maybe NSA has >> already it. >> How long can we trust these good old programs such as PGP? RSA wouldn't >> last a long time against a quantum computer ... >> >> >> side benefit of privacy enhancing technologies like Fully Homomorphic >> Encryption: they're resistant to quantum attacks (e,g. Post-Quantum ready >> crypto :) >> >> C.f.: https://github.com/homenc/HElib , >> https://github.com/IBM/fhe-toolkit-macos , etc. >> > > Thank you for this. Inspiring. Missing from pqcrypto.org . > > Karl > > There is proof inside many peoples' electronics. Proof that a marketing > group would contract development of a frightening virus. A virus that > responds to peoples' keystrokes and browsing habits, and changes what > people see on their devices. A virus that alters political behavior en > masse, for profit. > There is proof inside many peoples' electronics. Proof that a marketing > group would contract development of a frightening virus. A virus that > responds to peoples' keystrokes and browsing habits, and changes what > people see on their devices. A virus that alters political behavior en > masse, for profit. >