[cryptography] GnuPG Crowdfunding

2013-12-20 Thread Moritz Bartl
Main features
- Brand new GnuPG website
- Release of GnuPG 2.1
- Anonymous Tor network access to gnupg.org
- New server for web infrastructure
- New user friendly design optimised for desktop and mobile
- Fresh download page catering to all devices
- Updated collection of external videos, guides, and courses
- New page for Cryptoparties
- Continued availability of all existing pages and manuals
- New subscription handling system for sustaining GnuPG development

http://goteo.org/project/gnupg-new-website-and-infrastructure/home

___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


[cryptography] Exclusive: Secret contract tied NSA and security industry pioneer

2013-12-20 Thread Jeffrey Walton
(Thanks to PF on another list)

http://www.reuters.com/article/2013/12/20/us-usa-security-rsa-idUSBRE9BJ1C220131220

(Reuters) - As a key part of a campaign to embed encryption software
that it could crack into widely used computer products, the U.S.
National Security Agency arranged a secret $10 million contract with
RSA, one of the most influential firms in the computer security
industry, Reuters has learned.

Documents leaked by former NSA contractor Edward Snowden show that the
NSA created and promulgated a flawed formula for generating random
numbers to create a back door in encryption products, the New York
Times reported in September. Reuters later reported that RSA became
the most important distributor of that formula by rolling it into a
software tool called Bsafe that is used to enhance security in
personal computers and many other products.

Undisclosed until now was that RSA received $10 million in a deal that
set the NSA formula as the preferred, or default, method for number
generation in the BSafe software, according to two sources familiar
with the contract. Although that sum might seem paltry, it represented
more than a third of the revenue that the relevant division at RSA had
taken in during the entire previous year, securities filings show.

The earlier disclosures of RSA's entanglement with the NSA already had
shocked some in the close-knit world of computer security experts. The
company had a long history of championing privacy and security, and it
played a leading role in blocking a 1990s effort by the NSA to require
a special chip to enable spying on a wide range of computer and
communications products.

RSA, now a subsidiary of computer storage giant EMC Corp, urged
customers to stop using the NSA formula after the Snowden disclosures
revealed its weakness.

RSA and EMC declined to answer questions for this story, but RSA said
in a statement: RSA always acts in the best interest of its customers
and under no circumstances does RSA design or enable any back doors in
our products. Decisions about the features and functionality of RSA
products are our own.

The NSA declined to comment.

The RSA deal shows one way the NSA carried out what Snowden's
documents describe as a key strategy for enhancing surveillance: the
systematic erosion of security tools. NSA documents released in recent
months called for using commercial relationships to advance that
goal, but did not name any security companies as collaborators.

The NSA came under attack this week in a landmark report from a White
House panel appointed to review U.S. surveillance policy. The panel
noted that encryption is an essential basis for trust on the
Internet, and called for a halt to any NSA efforts to undermine it.

Most of the dozen current and former RSA employees interviewed said
that the company erred in agreeing to such a contract, and many cited
RSA's corporate evolution away from pure cryptography products as one
of the reasons it occurred.

But several said that RSA also was misled by government officials, who
portrayed the formula as a secure technological advance.

They did not show their true hand, one person briefed on the deal
said of the NSA, asserting that government officials did not let on
that they knew how to break the encryption.

STORIED HISTORY

Started by MIT professors in the 1970s and led for years by ex-Marine
Jim Bidzos, RSA and its core algorithm were both named for the last
initials of the three founders, who revolutionized cryptography.
Little known to the public, RSA's encryption tools have been licensed
by most large technology companies, which in turn use them to protect
computers used by hundreds of millions of people.

At the core of RSA's products was a technology known as public key
cryptography. Instead of using the same key for encoding and then
decoding a message, there are two keys related to each other
mathematically. The first, publicly available key is used to encode a
message for someone, who then uses a second, private key to reveal it.

From RSA's earliest days, the U.S. intelligence establishment worried
it would not be able to crack well-engineered public key cryptography.
Martin Hellman, a former Stanford researcher who led the team that
first invented the technique, said NSA experts tried to talk him and
others into believing that the keys did not have to be as large as
they planned.

The stakes rose when more technology companies adopted RSA's methods
and Internet use began to soar. The Clinton administration embraced
the Clipper Chip, envisioned as a mandatory component in phones and
computers to enable officials to overcome encryption with a warrant.

RSA led a fierce public campaign against the effort, distributing
posters with a foundering sailing ship and the words Sink Clipper!

A key argument against the chip was that overseas buyers would shun
U.S. technology products if they were ready-made for spying. Some
companies say that is just what has happened in the wake 

[cryptography] Vegetation Comsec

2013-12-20 Thread John Young

Proceeding with novel comsec investigations, the New Yorker
this week has an article on plant communication and intelligence
and how they differ from those of animals.

http://www.newyorker.com/reporting/2013/12/23/131223fa_fact_pollan

Plant signaling with chemical emissions was intriguing, as were
signals sent through proxies such as insects.

Plant perception of hazards, sensing sources of water, light,
air, nutrients, kin, enemies is suggestive for veggie comsec.

And all this is based on being tethered to the ground, immobile
thus having to do what animals do by different means, barely
perceptible to animals, slow moving, but effective in competing
with other plants as well as animals.

Darwin wrote the seminal work, but current scientists are
deeply involved in what some call neurobiology in which
brain-like activites are accomplished by vegetable swarms
of signals and networks without animal brains. Albeit root
stems searching for water and nutrients appear to behave
like brains below ground, while veggie sex occurs above
ground.

This raises the prospect of using plant capabilities in
emissions of chemicals and finding nutrients in signaling,
SIGINT, comsec, infosec and crypto.

Has anyone seen reports on this? Or on chemical transceiving
for comsec? Public key as a plant with unique biological
identity which absorbs or emits decrypt signal? The use of insect
and chemical proxies?

An amusing account is that of a CIA polygrapher claiming
to exchage signals with plants, discovered by hooking up
a polygraph to them. He said he could just think of burning
a nearby plant for the plant to initiate defenses. His claims were
later discounted but remind of the long-running mind control
research by US and Russia. And the unkillable kudzu of
lie detectors.


___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] Vegetation Comsec

2013-12-20 Thread coderman
On Fri, Dec 20, 2013 at 6:22 PM, John Young j...@pipeline.com wrote:
 ...
 Plant signaling with chemical emissions was intriguing, as were
 signals sent through proxies such as insects.
 ...
 Has anyone seen reports on this? Or on chemical transceiving
 for comsec? Public key as a plant with unique biological
 identity which absorbs or emits decrypt signal? The use of insect
 and chemical proxies?


most stylishly done as 'the drummers':

  where he is taken in by a strange society known as “The Drummers”.
These people operate in underwater compounds located off the coasts of
major centers, perform rhythmic, hypnotic dances and engage in
ritualized sex. This act, we learn later, is actually for the sake of
information exchange, which is done through the transmission of
nanomachines contained within their bodily fluids.

 - http://storiesbywilliams.com/2011/11/25/the-diamond-age/


more recently via vodka emission:

scientists used a desk fan and mist of alcohol to transmit evaporated
molecules that were translated into binary signals and decoded by a
breathalyzer device.

- 
http://www.ibtimes.com/worlds-first-text-message-sent-using-vodka-new-technology-transmits-binary-signals-molecules-photos
[this technique can be generalized to any gaseous emission (or aqueous
when at sea?) with appropriate detector.]


and of course, chemical signalling is not magically immune to flaws;
ant mills (death spirals) one of many examples of signalling amiss.


and there are some interesting research papers on targeted genomic
viral strains which only unlock to a very specific genetic profile.
i don't have them handy...
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography