Re: all about transferable off-line ecash (Re: Brands off-line tech)

2002-04-08 Thread Mike Rosing

On Tue, 9 Apr 2002, Adam Back wrote:

> Tranferable off-line coins allow all kinds of cool anonymity features
> as described above, I also argued above that the linkability
> deficiency can somewhat defended against.
> 
> And transferable off-line coins add yet more flexibility, while again
> not preventing online clearing for those that prefer it.  While some
> of the features have the linkability artifact, those features are
> optional and the user has free choice to select methods to avoid
> entirely or defend against linkability by any of the available methods
> respectively fetching fresh online coins, using money-changers to do
> the same more off-line, and self re-spending to add confusion.  Hence
> transferable off-line coins are already superior to both
> non-transferable off-line coins and online coins due to the selection
> of choice of new features and trade-offs offered to the users.  All we
> need now is a way to more robustly defeat linkability.

While I agree with goal, it's not clear to me that it's physically
possible.  What makes "money" useful is it's physical existance, people
have been counterfiting coins since they were invented but it's been
getting harder to do.  With off-line coins you could easily counterfit or
double spend and live off the float, especially if you do it all
anonymously.  And if you just do it once with some huge sum, you'd get
away with it (like Enron guys did :-)

Money boils down to psycology - people trust that it trades their effort
for somebody elses effort.  who's going to trust ephemeral bits?  Crossing
that barrier is going to be a lot harder than any technology.

Patience, persistence, truth,
Dr. mike





Re: all about transferable off-line ecash (Re: Brands off-line tech)

2002-04-08 Thread Adam Back

Anonymous gives some comments on some deficiencies in the properties
of the transferable ecash schemes to date:

On Mon, Apr 08, 2002 at 04:15:09AM +0200, Anonymous wrote:
> [...]
> And second, because they grow, it is possible to tell exactly how
> many hands a particular coin has passed through - just count the
> transcripts of previous spends.  So coins are not all that
> anonymous.  And further, there is no re-blinding of the earlier
> transcripts.  The Alice transcript is in the clear in all following
> uses of that same coin.  Transferred coins are recognizable and
> linkable.

While it is true that the coins are by unavoidably linkable, the
linkability will only leak information where a user happens to see the
same coin twice as it gets re-spent, as he can recognize this.  As the
chain length is also visible he knows how many hands it has gone
through since he spent it.  However he has no way to identify the
intermediate payers except the last payer.

The amount of identifying information the immediate payer discloses is
up to that payer, though some identification may be relatively hard to
avoid if there is no anonymous communication link used.

So in general the shorter the intermediate chain the more revealing
about the first and last payer in the intermediate chain the
observation is.  The more people who collude, the more chance their is
that the colluding group can find samples of respent coins and so
identify or gain information about the transactions of a target payer
or payee.

The transaction information leakage from the linkability may be fairly
limited in practice -- for example by comparison how much transaction
leakage would you expect to get as an individual or small group of
coluding individuals if you write down the serial number on a bank
note and wait until you see it again -- or even if a bank were to
perform the same experiment, and they are far more likely to see it
again due to volume.  The issue will tend to be worse in small payment
communities.

Clearly it's not ideal, and it is useful to think about things you
could do to improve the situation:

- One thing that could be done to obscure this is to add a few extra
random spending hops (say 0-2) which the user can do himself by
spending to himself, though this comes at some extra space overhead.
The recipient won't be able to distinguish self-spends from
third-party spends.

- Another defense would be to use third party money-changer to
exchange coins for different coins.  Basically to shuffle coins around
a bit so that receiving a coin from someone with a short enough chain
length between current and recognised spend to normally leak some
information will no longer gain useful information.

Ideas for more robustly fixing it:

- Perhaps there is a way to encrypt the original chain with the bank's
public key with a randomizable encryption algorithm such as Elgamal
and yet retain sufficient proofs that the encrypted chain contains
coin transcripts which would identify the appropriate part if the coin
were double spent, and such that people handling the coin are assured
of it's issue value.


Also here are some comments on the conclusions:

> So it works, but broadly speaking there are two problems.  First, off-line
> coins suck, as described above.  And second, because they grow, it is
> possible to tell exactly how many hands a particular coin has passed
> through - just count the transcripts of previous spends.  So coins are
> not all that anonymous.  And further, there is no re-blinding of the
> earlier transcripts.  The Alice transcript is in the clear in all
> following uses of that same coin.  Transferred coins are recognizable
> and linkable.  Hence they suck even worse than off-line coins.

Online actions are harder to perform anonymously, therefore added
flexibility to behave more off-line is good for anonymity.  Off-line
and transferable off-line coins add several new features which are
useful to an anonymous user:

- ability to transfer rather than deposit, so better hiding payee
identity from bank for payers that want this (there are good uses for
payee privacy as well as payer privacy)

- accountless operation is better for privacy than forcing payments to
be deposited and withdrawn as it also gives a user privacy of
transaction volume; however accountless operation where you have to
connect to the bank in real time (online protocol) makes it more
difficult to remain anonymous due to the need for interactive
low-latency communication

- a money changer is much easier and more realistic to operate with
off-line transferability -- it's basically impossible for the bank to
detect with off-line transferability.  With online coins a money
changer would stand out exchanging a lot of coins through it's account
(with forced-account option), plus even with accountless online
exchange of fresh coins at the bank it's harder for the money changer
to hide it's identity due to it's necessarily high bandwidth,
low-latency inter

Re: mil disinfo on cryptome

2002-04-08 Thread Steve Thompson


Quoting Khoder bin Hakkin ([EMAIL PROTECTED]):
[faustine]
> More interestingly, s/he neglects to include this disqualifier from
> State Secrets:
> 
> >>Allegiance to the United States
> 
> Conditions that could raise a security concern and may be disqualifying
> include:
> 
>  d. Involvement in activities which unlawfully advocate or practice
> the
>  commission of acts of force or violence to prevent others from
> exercising
>  their rights under the Constitution or laws of the United States or
> of any state.<<
> 
> How many Congressvermin, police w/ NCIS access, FBI, judges, domestic
> spooks of all flavors, etc are guilty of this?

Here is a classic example of disinformation.  Obviously, certain rights,
activities, etc. are from time-to-time require that various rights be
temporarily curtailed so that the important machinery of law-enforcement may
work its magic.

You're just trying to divert attention from this necessary exception to the
normal rules.  Therefore, you must be a spook.


Regards,

Steve

-- 
Just fake it.


-- 
Include "35da3c9e079dcf68ec3a608e8c0a47f6" somewhere in your
message when you reply.




RE: out of the box

2002-04-08 Thread Jonathan Wienke

ummm, you've been to Sweden, but can't even spell it right?

-Original Message-
From: Michael Roberts [mailto:[EMAIL PROTECTED]]
Sent: Thursday, April 04, 2002 2:19 PM
To: [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Subject: Re: out of the box


weird.  I was told this when I was in sweeden, as an explaination for
the basic niceness of sweedes - ie, that they recieved in school basic
emotional education which enabled them to deal with difficult people and
situations.

true/not true ?

M


On Thu, 2002-04-04 at 08:18, [EMAIL PROTECTED] wrote:
> Citerar Michael Roberts <[EMAIL PROTECTED]>:
>  
> > In Sweeden basic emotional education for all cuts social problems down
> > to a minscule amount. 
> 
> Sweden has a basic emotional education for all? How come they never told me 
> that? 
> 
>  - Sten (born and raised in Sweden)




RE: mil disinfo on cryptome

2002-04-08 Thread Khoder bin Hakkin

> Oh, and I can't believe I almost forgot--I'm sure you'll be
> tickled pink to learn that ever having had anything to do with
> you can be the kiss of death as far as getting clearance is
> concerned. From the adjudication guidelines:
>
> http://www.dss.mil/training/adr/adjguid/adjguidF.htm
>
> "Conditions that could raise a security concern and may be
> disqualifying include:
>
>>d. Any foreign, domestic, or international organization or person
engaged in
 analysis, discussion, or publication of material on intelligence,
defense,
 foreign affairs, or protected technology.<<

However Faustine neglects to include the simple solution, that you
simply
renounce playing with Johnny:

>>Conditions that could mitigate security concerns include:
 b. The individual terminates the employment or discontinues the
activity upon
 being notified that it is in conflict with his or her security
responsibilities.<<

More interestingly, s/he neglects to include this disqualifier from
State Secrets:

>>Allegiance to the United States

Conditions that could raise a security concern and may be disqualifying
include:

 d. Involvement in activities which unlawfully advocate or practice
the
 commission of acts of force or violence to prevent others from
exercising
 their rights under the Constitution or laws of the United States or
of any state.<<

How many Congressvermin, police w/ NCIS access, FBI, judges, domestic
spooks of all flavors, etc are guilty of this?




brilliancy

2002-04-08 Thread Anonymous

"Any attacker who can control 100,000 machines is a major force on the
internet, while someone with a million or more is currently unstoppable:
able to launch massively diffuse DDOS attacks, perform needle in a
hayfield searches, and commit all sorts of other mayhem. We already
understand how worms could be used to gain control of so many machines.
Yet the recent revelation that Brilliant Digital Media has bundled a
small trojan with KaZaA has underscored another means by which an
attacker could gain control of so many machines: poorly secured
automatic updaters. If an attacker can distribute his own code as an
update, he can take control of millions of machines. "

http://www.cs.berkeley.edu/~nweaver/0wn2.html

So, now, how hard would it be to use this mechanism to upload PGPNet with 
opportunistic encryption enabled to millions of hosts ?




Re: FUCANN Fully UnCentrallized Authority for Naming and Numbers

2002-04-08 Thread Graham Lally

Frob the Builder wrote:
>> The problem comes when the server a domain points to is the map
>>for several domains, say via Virtual Hosts or selected forwarding. Many servers
>>use this if they're on a dedicated web-hoster, or for subdomains.
> 
> Ahah, because the 'physical' server uses the URL to map to 'virtual'
> servers.
> You're right, the Rev 1.0 plan doesn't handle that.

This only applies to HTTP requests though, AFAIK. The easiest work around, I 
figure, is a translation proxy that you run (locally) and channel all requests 
through. This proxy could look up the virtual mapping from a local domain to a 
"legacy" domain and vice versa. Not big on proxies myself, so not sure how 
feasible it'd be to either build a custom one, or to adapt an existing one.

Off to look through Squid...

.g
-- 
"...not much (legal) material is out there that's full of graphics and in
a consumer-friendly format to create the need for DSL." - Jack Valenti

http://www.exmosis.net/"Sometimes I use Google instead of pants."




Re: all about transferable off-line ecash (Re: Brands off-line tech)

2002-04-08 Thread Anonymous

The issue with off-line cash is this: has the coin being offered already
been spent?

With on-line cash, the offered coin is immediately deposited at the bank,
hence doubly-spent coins are detected instantly.  With off-line cash
this cannot be done because by definition there is no connection to the
bank.  Hence there is no way to know, off-line, if a coin has already
been spent.

The solution is to embed the identity of the withdrawer into the coin
when it is withdrawn from the bank, in such a way that this identity
will only be revealed if the coin is double-spent.  That provides a
partial solution to the off-line scenario.

A coin is offered off-line, and the recipient again has no guarantee that
it hasn't been spent already.  He accepts the coin anyway, and later when
he gets on-line he tries to deposit it at the bank.  But he learns that
he was cheated; the coin had already been spent.  Now he has a fall-back
solution: the doubly-spent coin reveals the embedded identity of the
party who withdrew it (and who doubly-spent it).  He can call the cops
and try to track down and prosecute the cheater.

All off-line spending schemes work this way.  All they can offer is
the hope of tracking down cheaters after the fact.  They can never
offer the assurance of validity that an immediate on-line check can
provide.

With off-line coins, unlike on-line coins, the spender knows more than
he's telling.  He knows secrets about those coins which would reveal his
identity; that is, his identity is embedded in some secret information
associated with the coin.  When he spends it at a shop, he responds
to a random challenge from the shop, using his secret information.
The system is set up so that the shop, and later the bank, can validate
his response as being valid, proving that he truly owned a coin.  For the
double-spending detection, the system is further arranged that if two
different shops offer two different random challenges, then from the
responses to these two challenges, the user's secret information and
therefore his identity is revealed.

To turn this into a transferrable system, we would allow a chain of
transfers before the bank gets involved.  Alice spends the coin with Bob,
who spends it with Carol, who spends it with David, who deposits it at
the bank.  There are two problems.  First, only Alice knows the secret
information associated with the coin.  She can't give all the secrets to
Bob, or else he would know her identity.  So Bob only has a limited amount
of information about the coin.  Second, after this chain of transfers,
if there was double-spending, it might have been anyone along the chain.
The system for double-spending detection has to be able to identify
which person was the cheater.

The solution which Adam describes works as follows.  Each party
pre-withdraws a zero-value coin from the bank.  This is an off-line
coin which has their identity encoded in it, if they double-spend it.
Alice first spends her coin with Bob in the normal off-line way.  Bob ends
up with a transcript sufficient to prove that he received a presumably
valid coin from Alice (but one which might have been doubly-spent).

Now Bob wants to spend with Carol.  He does two things: he gives her
the transcript of Alice's spend with him, which implicitly identifies
the value of the coin; and also he engages in the regular off-line
coin spend with her, using his zero-value coin.

If Carol then spends the coin with David, she does the same two things:
she gives David the transcript of Bob's spend with her (which itself
included the two parts above), and also spends a zero-value coin with
him.  The resulting transcript now has three parts.

So it grows at each transfer, and in the end the transcript is deposited.
If there was a double-spend, someone spent his zero-value coin twice,
and his own identity is revealed.

There is one flaw, which is that Bob could use the same Alice transaction
with more than one zero-value coin, which he after all gets for free.
Carol can't tell that the Alice transaction she sees is the same one
someone else saw, and if Bob uses a unique zero-value coin for each spend,
then Bob's identity will not be revealed as it should be.

The fix for this is that when Bob receives the coin from Alice, knowing
that he is going to pass it on, he must link the specific zero-value coin
he will later use into the transcript he will receive of Alice's spend
with him.  This is done by including a hash of the coin information into
the random challenge he sends to Alice.  Then when he tries to pass the
coin on to Carol, she checks that the zero-value coin he is spending with
her matches the value used in the Alice transcript.  That prevents Bob
from using two different zero-value coins with a single Alice transcript.

So it works, but broadly speaking there are two problems.  First, off-line
coins suck, as described above.  And second, because they grow, it is
possible to tell exactly how many hands a particular coin has 

RE: mil disinfo on cryptome

2002-04-08 Thread Mike Rosing

On Sun, 7 Apr 2002, John Young wrote:

> Reputation is a trap not an accomplishment,  

Yeah, I like this statement a lot.  I've worked in some golden cages.  You
can't accomplish much when all you do is politics.  It's not anybody's
fault the disinfo forces specific mental states, but they can be pretty
sick states.

Patience, persistence, truth,
Dr. mike