Re: [cryptography] NSA Attacks on VPN, SSL, TLS, SSH, Tor

2014-12-30 Thread John Young

Cryptome does not pretend to provide illusory security, that is security.
It is a vile, rotten, corrupt endeavor, like life. Chuckle.

Visitors, readers, consumers must be skeptical of security, and not rely
upon security promoters, their followers and investors who exploit
dependency by fear uncertainty and doubt.

Skepticism of security claims and methods is one of the purposes of
these lists. Perhaps the main purpose, although it is commonplace for
these lists to be used for soliciting befuddled consumers to hop aboard
the gravy train. Now and then skeptcism of the security arises but is usually
suppressed during times of crisis when incentive is rich to promote poor
products and services. Governments, commerce, orgs, experts cooperate
to foster crises under guise of opposition.

This applies to all forms of security, safety, protection, defense, hygienic
pharma.

Still, Cryptome endorses the continuing struggle to improve citizen
protection, not only as a job, career, industry, but as citizens' obligation
to bear responsibility for the commonweal against its inside and outside
enemies, if you will, common math against the deadly germs.

One way to do that is to not oversell it, tone down the threats, reduce
drumbeating, avoid hyperbole for and against, forego advertising,
gang-bang hectoring, circle jerk conferencing, TEDing, prize bestowing,
to quietly invent, improve, critique, test, apply, re-test often, expect to
be deceived by colleagues witting or unwitting, especially by sales,
politicians, authoritarians -- the persistent germs.




At 02:50 AM 12/30/2014, you wrote:
john likes to be poetic as a wall - dear john please listen to the 
smart people and have a small bit of humility - it will make you 
better at your job and we need EVERYONE to step up and be better at their jobs


On Tue, Dec 30, 2014 at 7:38 AM, grarpamp 
mailto:grarp...@gmail.comgrarp...@gmail.com wrote:
On Mon, Dec 29, 2014 at 8:20 AM, John Young 
mailto:j...@pipeline.comj...@pipeline.com wrote:

 Hash this motherfucker, said math to germ.

JYA, you, as the original publisher of various and valued datasets...
the responsibility to calculate, sign, and publish said hashes rests with
you alone. Please consult with any trusted parties should you need
assistance in such matters. A future of archivers, disseminators, and
analysts will thank you.




--
Cari Machet
NYC 646-436-7795
mailto:carimac...@gmail.comcarimac...@gmail.com
AIM carismachet
Syria +963-099 277 3243
Amman +962 077 636 9407
Berlin +49 152 11779219
Reykjavik +354 894 8650
Twitter: @carimachet 
https://twitter.com/carimachethttps://twitter.com/carimachet


7035 690E 5E47 41D4 B0E5 B3D1 AF90 49D6 BE09 2187

Ruh-roh, this is now necessary: This email is intended only for the
addressee(s) and may contain confidential information. If you are not the
intended recipient, you are hereby notified that any use of this
information, dissemination, distribution, or copying of this email without
permission is strictly prohibited.

___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] NSA Attacks on VPN, SSL, TLS, SSH, Tor

2014-12-30 Thread StealthMonger
John Young j...@pipeline.com writes:
 At 02:50 AM 12/30/2014, you wrote:
On Tue, Dec 30, 2014 at 7:38 AM, grarpamp 
mailto:grarp...@gmail.comgrarp...@gmail.com wrote:
On Mon, Dec 29, 2014 at 8:20 AM, John Young 
mailto:j...@pipeline.comj...@pipeline.com wrote:

  Hash this motherfucker, said math to germ.

JYA, you, as the original publisher of various and valued datasets...
the responsibility to calculate, sign, and publish said hashes rests
with you alone.

john likes to be poetic as a wall - dear john please listen to the
smart people and have a small bit of humility - it will make you
better at your job and we need EVERYONE to step up and be better at
their jobs

 Visitors, readers, consumers must be skeptical of security ...

Advocacy of skepticism is rendered ineffective if that advocacy extends
to skepticism of logic and mathematics.


-- 


 -- StealthMonger
Long, random latency is part of the price of Internet anonymity.

Key: 
mailto:stealthsuiteyouknowwhatgoesherenym.mixmin.net?subject=send%20stealthmonger-key



pgpwT3h7OvJgk.pgp
Description: PGP signature
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] NSA Attacks on VPN, SSL, TLS, SSH, Tor

2014-12-30 Thread grarpamp
On Tue, Dec 30, 2014 at 7:17 AM, John Young j...@pipeline.com wrote:
 Cryptome does not pretend to provide illusory security, that is security.
 It is a vile, rotten, corrupt endeavor, like life. Chuckle.
 Visitors, readers, consumers must be skeptical of security, and not rely
 [...]

All due respect to Cryptome, and points well made and taken.
Yet this isn't really an effective response to the issue at hand.
While we should and must be skeptical... until contrary proof
exists we should be taking advantage of all means available
regarding distribution integrity and even provenance and secret
comms if desired. That's hard, it involves some work, and homework.
Yet until such proof, it's probably better than going bare assed to
the Sun.

 Still, Cryptome endorses the continuing struggle to improve citizen
 ...
 common math against the deadly germs.

Indeed.

 One way to do that is to not oversell it, tone down the threats, reduce

Interestingly true in some regards. Yet in the context herein, it's
probably not the place to make a stand. Especially considering
the stand itself is in one's very existance all so long. Is it not?
Oh were there but more of this kind, be they true or not :)
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] NSA Attacks on VPN, SSL, TLS, SSH, Tor

2014-12-30 Thread dan
  you know what nietzsche said about the skeptics - stranglers of life force


Scepticism is the chastity of the intellect; it is shameful to give
it up too soon, or to the first comer.
-- George Santayana


And now that we have reached the dueling quotes stage,
it is time to move on to something productive.

--dan

___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] NSA Attacks on VPN, SSL, TLS, SSH, Tor

2014-12-29 Thread John Young

From discussion on these lists and elsewhere tampering with
data can, does, occur at every software and hardware hand-off,
with each self-serving iteration having hidden and vulnerable hardware
and software undisclosed malignity, no matter the security ostentatiously
applied: reputation, credibility, impeccability, highly trusted, crypto,
hashes, fail by ruses of unexamined modules and inevitable, unavoidable
deceptions of too little skill, too little time, too little 
suspicion, driven by

need to pay alimony, debts, IRS, loutish family's begging.

Selected hand-offs of innumerable:

Multiple devious inventors, manufacturers and handlers inside and outside NSA
Devious NSA leaking like a sieve to madly grabbing everything devious Snowden
Snowden madly shoveling everything to multiple exceptionally devious 
media persons
Multiple media persons to hyper devious lawyers, publishing staff, 
tech experts, govs consulted

Devious selections of data to publish, then revised, then corrected
DEvious posting on outlet web sites and shoveling to cohort journos
Devious authenticating of docs (the prime deception)

Deviously orchestrated subsequently:

Downloads of docs
Sharing of docs
Archiving of docs
Dropboxing, torrenting of docs
Biased analysis and cherrypicking of docs
Multiple tagging and piggybacking and implanting of docs
Shading, smearing, vaunting, lying about docs
Accusing and defending about docs
Writing, lecturing, TEDing about docs
Dismissing of docs, the threat, the countermeasures

Then deviously shipping, shopping fools to take blame
by signature-bold leaders of pro and con opportunities
or to a prize ceremony for valorizing the criminal prize-funder
and bestowing generous tax avoidances.

These vulns and subterfuges and braggardies are as old as
comsec, hyperbolized by the digital era for rep building,
monetizing, and political ideology. These lists survive on
ingesting these toxic fumes and expel multiple recyclings
of them for jingle-jangle of gullible consumers, here as in
in the spy agencies working the yokels.

NSA or some monstrous threat -- God, Google, Cisco, MS --
is inside our skulls and peripherals, left brain in mortal combat
with the right brain, digital vs analog. Or so we imagine the two
halves pretending opposition like officials and anarchists to
outfox deviously malign genitalia orchestrating brain to slave at
getting food, air and water -- rigging the mind game to lose
after 60-70 years of wanking the slot handle obsessively.

Hash this motherfucker, said math to germ.

At 03:02 AM 12/29/2014, you wrote:
Suggestion: Anyone with a correct version, post sha512 hashes to 
list. Those with hashes matching John: Do *NOT* change filename, 
make a single-file torrent, and start seeding. Should have same 
info-hash, so should simultaneously seed from same DHT node. John 
can post a magnet link here (or the torrent file on cryptome?) and 
we can get a verifiable version through P2P.


On 29/12/14 06:33, Peter Tonoli wrote:

On 29/12/2014 3:50 pm, Gregory Foster wrote:

On 12/28/14 10:07 PM, Ryan Carboni wrote:

CRC failed in 'media-35515.pdf' file is broken

http://www.spiegel.de/media/media-35515.pdf


I guess this is why John never promised anonymity to his sources, he
can't get zip files right.

Zip worked for me.  Thanks, John.

Failed for me, using both UnArchiver and UnRarX :(



___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] NSA Attacks on VPN, SSL, TLS, SSH, Tor

2014-12-29 Thread grarpamp
On Mon, Dec 29, 2014 at 8:20 AM, John Young j...@pipeline.com wrote:
 Hash this motherfucker, said math to germ.

JYA, you, as the original publisher of various and valued datasets...
the responsibility to calculate, sign, and publish said hashes rests with
you alone. Please consult with any trusted parties should you need
assistance in such matters. A future of archivers, disseminators, and
analysts will thank you.
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


[cryptography] NSA Attacks on VPN, SSL, TLS, SSH, Tor

2014-12-28 Thread John Young

Der Spiegel released largest single day number of Snowden docs today,
666 pages, on NSA Attacks on VPN, SSL, TLS, SSH, Tor.

http://www.spiegel.de/international/world/nsa-documents-attacks-on-vpn-ssl-tls-ssh-tor-a-1010525.html

We offer a RAR of the 44 docs:

http://cryptome.org/2014/12/nsa-spiegel-14-1228.rar (197MB)


___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] NSA Attacks on VPN, SSL, TLS, SSH, Tor

2014-12-28 Thread Ryan Carboni
On Sun, Dec 28, 2014 at 3:14 PM, John Young j...@pipeline.com wrote:

 Der Spiegel released largest single day number of Snowden docs today,
 666 pages, on NSA Attacks on VPN, SSL, TLS, SSH, Tor.


 http://www.spiegel.de/international/world/nsa-documents-attacks-on-vpn-ssl-tls-ssh-tor-a-1010525.html

 We offer a RAR of the 44 docs:

 http://cryptome.org/2014/12/nsa-spiegel-14-1228.rar (197MB)


my browser says it's 188 MB... am I being man in the middled?



-Ryan C.
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] NSA Attacks on VPN, SSL, TLS, SSH, Tor

2014-12-28 Thread Michael Kjörling
On 28 Dec 2014 15:24 -0800, from rya...@gmail.com (Ryan Carboni):
 On Sun, Dec 28, 2014 at 3:14 PM, John Young j...@pipeline.com wrote:
 We offer a RAR of the 44 docs:
 
 http://cryptome.org/2014/12/nsa-spiegel-14-1228.rar (197MB)
 
 my browser says it's 188 MB... am I being man in the middled?

Some quick math says 188 × 2^20 ~ 197 × 10^6. Let's have a hash and I
think we can boil this one down to decimal versus binary prefixes.

-- 
Michael Kjörling • https://michael.kjorling.se • mich...@kjorling.se
OpenPGP B501AC6429EF4514 https://michael.kjorling.se/public-keys/pgp
 “People who think they know everything really annoy
 those of us who know we don’t.” (Bjarne Stroustrup)
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography