Net Censorship.

2003-01-29 Thread Matthew X
Uzbekistan: Online dissidents silenced. Web sites that published articles 
alleging corruption among high state officials in Uzbekistan and 
forecasting President Islam Karimov's resignation have been cut off from 
Uzbek web users.

Free expression is strictly controlled in Uzbekistan, which enjoys the 
support as the key US ally in the region. The sites are still viewable from 
outside the country and are reportedly based out of Russia and Kazakhstan. 
Since then, numerous other sites have also popped up accusing Karimov of 
failing health.
Uzbekistan at hub of regional tension. RFE commentary.
Human Rights in Tashkent, Eurasia.net commentary.
AP report via CNet.
Exploiting the war on terrorism to cover up human rights abuses, IWPR.
http://www.indexonline.org/indexindex/20030127_uzbekistan.shtml



Net Censorship au style.

2002-09-01 Thread Matthew X

Indymedia is under repression,its happened twice before.The first shut down 
Seattle and the Ohio server is no longer with us.See the main board at 
FBI/legal updates.lower left.
On sept 11 the police are charging a mentally disabled man with threats to 
kill them.One was a comment to a post made here on May 8 and another on 
june 1 of 01.
The Ohio legal situation arose after some local LEO's decided to set up 
grand juries and issue subpoena's before actually writing to the address 
provided on the offending post.
Vic.Police followed precedent by not seeking to write the address 
provided.They did use a ph no on one of the posts to 'sting' the MD man by 
pretending to be from his ISP and offering a 'special deal.'
The 'deal' turned into an ordeal for Matt Taylor of Kyneton.
He was rousted for two hours,had things stolen and was later threatened at 
the police station.Taylor was charged with some petty public order 
offence's committed at M1 last year.The good behavior bond issued for those 
expire in Oct.
Apart from that there is no criminal history.The police kept a computer 
seized from Taylor and finally examined it.
The computer policeman who examined it,(actually a 'ghost' copy of the hard 
drive.)said he found 21 items of interest on the computer.
Two have been put forward as supposed evedence of the crime of 'threats to 
kill.'1 is a copy of an e-mail sent sometime after the May 8 post.It's 
datestamped and it differs from the posts timestamp.
The second item is a copy of a post that went up on June 1.
It is not timestamped apart from the time on the Indy site that it was made.
The Police are seriously putting forth the proposition that a few Kbs of 
data out of Gigabytes that someone stored and/or sent from the laptop 
prove beyond reasonable doubt  that Taylor is their man.
That no one else had the means motive and opportunity?
Give us a fucking break.
When Ashley Gardiner of the Hun wrote to Declan Mc Cullogh he wrote,we got 
your man! Note the 'we'. The Hun provided the police with a small mountain 
of their surveillance tapes and photo's of M1.
25,000$ reward was offered for Taylor's arrest in mid May by the La Raza 
Nazi organization.Many Threats were directed at Taylor by various different 
sounding anonymous cowards.The nom de Guerre allegedly used by Taylor 
appears to have been used by other(s) and in a way as to discredit him.
250$ was regularly offered to punch Taylor in the face hard enough to knock 
him down.All this on IMC's
If you search yourself you will find many posts under the name 'proffr' and 
'profrv.'Do they all appear to be from the same man? We have all put up 
with the long standing Hatfield-McCoy fued of Mayne and Hoser.Thats not the 
only disputed ID war on Indymedia.
The police themselves say in court,this(indy)site is one where anyone can 
download.
Therefore ANYONE online at the time those threats, were made could have 
made them by the Police's own admission.
So why delay a trial,bring frivolous charges and harass the defendant and 
even try and nobble him?
FOI has already exposed much about this,no doubt much more will come out.
Like who was the mysterious 'observer' at Taylors arrest?
Who was in charge,State or Feds? or the (ASIO?) 'Observer.'?
Why was a US SS agent overseeing the arrest?
Does the US want to extradite Taylor as has been alleged by Taylors case 
worker,Julian Jamieson of Kyneton?
What will happen to Indymedia when someone alleged to be a regular 
contributor is found guilty of offences carrying a 20 year penalty? If 
anyone can be found guilty of such an 'offence' in this way then is anyone 
contributing here  safe?
Is the ultimate aim of this prosecution to chill Indy comment? Where else 
is this occurring?
This is from EFA.and FBI/legal link...
http://www.sjgames.com/SS/
August 31. -- Closure of the outspoken Internet forum Baiyun Huanghe after 
students posted messages about the 1989 Tiananmen Square massacre. DFN and 
other NGOs reported about the closure on September 6. The Baiyun Huanghe 
bulletin board service (BBS - formerly hosted at http://bbs.whnet.edu.cn) 
belonged to the Huazhong University of Science and Technology (Wuhan, Hubei 
province).

University officials announced that they were temporarily shutting down the 
BBS, which had 30,000 registered users, due to technical problems. A 
school official told Reuters that the university's party committee would 
manage the BBS after the shutdown. Users would be required to register with 
their real names and identification numbers. DFN said online discussion of 
the closure continues on other sites. For example, an Internet forum for 
Huazhong University alumni (http://www.neurophys.wisc.edu/~cai/hust/) has 
been active since Baiyun Huanghe was shut down. The alumni forum is run by 
a nonprofit alumni organization based in the U.S.

Last March, DFN added, the Sina.com Web site erased hundreds of messages 
from its chat rooms which expressed outrage about an explosion that 
destroyed an 

Re: CNN.com - Hackers help counter Net censorship - July 15, 2002 (fwd)

2002-07-18 Thread jayh

Previous message got lost in the ether (I think).

Does anyone know what happened to this site? After all the buildup 
it seem unaccessiblej

j

On 15 Jul 2002 at 16:36, Jim Choate wrote:

 
 http://www.cnn.com/2002/TECH/internet/07/15/censorship.reut/index.html
 
 
  --
 
 
   When I die, I would like to be born again as me.
 
 Hugh Hefner
  [EMAIL PROTECTED] www.ssz.com
  [EMAIL PROTECTED]  www.open-forge.org
 
 
 
 





Re: CNN.com - Hackers help counter Net censorship - July 15, 2002 (fwd)

2002-07-18 Thread jayh

Previous message got lost in the ether (I think).

Does anyone know what happened to this site? After all the buildup 
it seem unaccessiblej

j

On 15 Jul 2002 at 16:36, Jim Choate wrote:

 
 http://www.cnn.com/2002/TECH/internet/07/15/censorship.reut/index.html
 
 
  --
 
 
   When I die, I would like to be born again as me.
 
 Hugh Hefner
  [EMAIL PROTECTED] www.ssz.com
  [EMAIL PROTECTED]  www.open-forge.org
 
 
 
 





Re: CNN.com - Hackers help counter Net censorship - July 15, 2002 (fwd)

2002-07-17 Thread jayh

Does any one know what happened the the hactivisimo website?

It was cited even on CNN, now it seems unavailable.

j

On 15 Jul 2002 at 16:36, Jim Choate wrote:

 
 http://www.cnn.com/2002/TECH/internet/07/15/censorship.reut/index.html
 
 
  --
 
 
   When I die, I would like to be born again as me.
 
 Hugh Hefner
  [EMAIL PROTECTED] www.ssz.com
  [EMAIL PROTECTED]  www.open-forge.org
 
 
 
 





Re: CNN.com - Hackers help counter Net censorship - July 15, 2002 (fwd)

2002-07-17 Thread jayh

Does any one know what happened the the hactivisimo website?

It was cited even on CNN, now it seems unavailable.

j

On 15 Jul 2002 at 16:36, Jim Choate wrote:

 
 http://www.cnn.com/2002/TECH/internet/07/15/censorship.reut/index.html
 
 
  --
 
 
   When I die, I would like to be born again as me.
 
 Hugh Hefner
  [EMAIL PROTECTED] www.ssz.com
  [EMAIL PROTECTED]  www.open-forge.org
 
 
 
 





CNN.com - Hackers help counter Net censorship - July 15, 2002 (fwd)

2002-07-15 Thread Jim Choate


http://www.cnn.com/2002/TECH/internet/07/15/censorship.reut/index.html


 --


  When I die, I would like to be born again as me.

Hugh Hefner
 [EMAIL PROTECTED] www.ssz.com
 [EMAIL PROTECTED]  www.open-forge.org






NSW net censorship It is just not going to work.

2002-03-18 Thread matthew X

Public eyes censorship plans
Karen Dearne
MARCH 13, 2002
NSW plans to censor the internet have been under scrutiny during two days 
of public hearings in Sydney.
The Standing Committee on Social Issues is inquiring into whether the 
Classification Enforcement Amendment Bill provides an effective and 
enforceable way to regulate online material.
But a number of industry and consumer groups warned that the proposed 
legislation discriminates against material published online and was 
unworkable.
Australian Computer Society vice-president Phillip Argy said the NSW 
legislation went much further than the federal model legislation.
This criminally prohibits the making available of matter that would be 
classified as objectionable or unsuitable for minors, basically without 
exception, Mr Argy said.
It's like saying, you cannot make this material available to adults in NSW 
in case children get to see it.
Electronic Frontiers Australia executive director Irene Graham said the 
Bill tried to force internet content into a regime designed for the 
commercial sale and distribution of movies, videos and games.
The internet is not a movie, it is not a computer game and it is nothing 
like television, she said. It is just not going to work.
The legislation treated people using the internet quite differently, less 
fairly and less justly under criminal law than that applicable to speech 
and distribution of information offline.
There is a vast amount of material that this Bill can catch, she said.
This is going to cover actual discussions in chatrooms and on email lists.
We are especially concerned about what is, in effect, a complete ban on 
information that would be classified as 'R' rating.
Office of Film and Literature Classification director Des Clark said he was 
unaware of any censorship board anywhere having regulated the internet.
He agreed that such legislation would be ground-breaking. Computer games 
were not widely regulated worldwide, he said, but they are in Australia.
Arts Law Centre of Australia legal officer Elizabeth Beal was concerned 
that an authorised officer could deem content offensive and issue a 
penalty notice, given the complexity and subjective nature of censorship 
matters.
Although a defendant issued with one of these notices can elect to go to 
court, that involves considerable inconvenience and cost to obtain advice, 
not to mention fear and humiliation, she said.
Internet Industry Association chief executive Peter Coroneos said the IIA 
was totally committed to helping families manage internet content so that 
children were not exposed to inappropriate material.
But in the case of pornography, where so much of the material is created 
and posted by people outside Australia, passing legislation will do nothing 
more than show the community you are concerned about the issue, he said.
The hearings took place last week. The committee is due to report to the 
NSW Parliament by June 7. FROM
http://australianit.news.com.au/articles/0,7204,3942637%5E15319%5E%5Enbv%5E15306,00.html
Kill them all and let satan sort them out.




Re: News: 'U.S. May Help Chinese Evade Net Censorship'

2001-09-01 Thread Faustine

Greg wrote:
 At 05:31 PM 8/31/2001 -0400, Faustine wrote:
Sure. But to what extent can you collaborate without a)approaching
full- blown collusion or b) getting taken for a ride in spite of your
best efforts?
 
 When you talk about collaborating and ZKS selling beta software to
 the  NSA, are you saying you've got information that ZKS gave the NSA
 access to  more information than the general public got, and/or that
 the NSA got their  access or information meaningfully earlier than the
 general public?

 If that's the case, that's interesting, but that's too serious a claim
 to  let pass by as an unstated implication.


Actually, it would be far more more informative to get them to explain 
exactly what happened instead of relying on third-party empty hearsay and 
hot air from me, since honestly that's all I've got. But I'm sure there are 
a lot of reasons--some of them contractural--you'll never hear the whole 
story. Especially given that you'll never get anything more than loose talk 
from the other side. 

My personal opinion is that collusion or not, they got taken for a ride. 
And if it's not worth much, so be it. 

~Faustine.




Re: News: U.S. May Help Chinese Evade Net Censorship

2001-09-01 Thread Faustine

On Friday, August 31, 2001, at 01:27 PM, Faustine wrote:

 On Friday, August 31, 2001, at 11:43 AM, Faustine wrote:
 Tim wrote:
 But, as with Kirchoff's point, the attacker is going to get the design
 eventually.
 If getting the design eventually were good enough, why the keen
 interest in putting in a large order for the beta? There's a reason.
 Perhaps the NSA wanted to use the product without making illegal 
 copies?
 Your earlier point (that they wished to reverse-engineer the product) 
 is in fact undermined by this fact that they bought N copies.

 Unless you believe reverse engineering is only useful for making pirated
 copies, there's no reason to assume any sort of contradiction at all.

 As if the NSA would use anything from the private sector they didn't 
 know inside out.

Consistent with your misconception about big computers being useful for 
brute-force cryptanalyis,

I never said that and you know it. Nice troll, though. 


 it appears you also believe the myth about the 
mighty NSA knowing more than the private sector.
You _really_ need to get an education on these matters.


Are you actually claiming NSA implements COTS technology completely 
straight off-the-shelf? And what do any of these you poopy head 
whippersnapper comments have to do with the fact that you found a 
contradiction where there was none? 

Boss Tom Turkey in full strut.


~Faustine.




Re: News: U.S. May Help Chinese Evade Net Censorship

2001-09-01 Thread Faustine

Tim Wrote:
 On Friday, August 31, 2001, at 11:43 AM, Faustine wrote:

 Consistent with your misconception about big computers being useful for
 brute-force cryptanalyis,

 I never said that and you know it. Nice troll, though.

You did indeed. Several times you alluded to what big and powerful 
computers the NSA must have, the better to blow our house down. When it 
was pointed out to you the nature of brute-forcing a big key, and how 
useless computers are, you seemed not to get the point.

Oh, well that might have a little something to do with the fact that I 
never made the point that brute-forcing keys was the way big and powerful 
NSA computers are going to blow our house down, mightn't it.  The fact 
that brute-forcing keys was the only thing you could think of when you 
saw my phrase interesting possibilities for cryptographic applications 
and then chose to fixate on proving what a damn poopy head whippersnapper I 
am instead of deigning to bother over what methods I meant to refer to is 
indicative of your own limitations, not mine.


~Faustine.




Re: News: 'U.S. May Help Chinese Evade Net Censorship'

2001-09-01 Thread Greg Broiles

At 03:19 PM 9/1/2001 -0400, Faustine wrote:
 
  When you talk about collaborating and ZKS selling beta software to
  the  NSA, are you saying you've got information that ZKS gave the NSA
  access to  more information than the general public got, and/or that
  the NSA got their  access or information meaningfully earlier than the
  general public?

Actually, it would be far more more informative to get them to explain
exactly what happened instead of relying on third-party empty hearsay and
hot air from me, since honestly that's all I've got. But I'm sure there are
a lot of reasons--some of them contractural--you'll never hear the whole
story. Especially given that you'll never get anything more than loose talk
from the other side.

Well, if all you've got is hearsay and hot air, then I think it's unfair to 
tag them with words like collaborator or suggest that they're not 
trustworthy - those are pretty serious allegations to make. I'm aware of 
examples of cryptosystems and companies which were compromised by 
intelligence agencies - and also aware of baseless FUD and conspiracy 
theories spun against uncompromised software unfairly.


--
Greg Broiles
[EMAIL PROTECTED]
We have found and closed the thing you watch us with. -- New Delhi street kids




Re: U.S. May Help Chinese Evade Net Censorship

2001-08-31 Thread Tim May

On Thursday, August 30, 2001, at 02:11 PM, Faustine wrote:

 True, of course they do. Technology is morally neutral, sure, 
 whatever.
 Yay capitalism. I still think handing over your security product beta 
 on a
 silver platter in exchange for a nice fat government contract is a 
 stupid,
 stupid idea.

And since software is infinitely replicable, all the NSA would have to 
do if ZKS refused to sell to them is to get a copy anywhere else: from 
an employee who orders it sent to his home address, from a contractor, 
off the shelf at Fry's or Circuit City (someday, maybe not today), and 
so on.

Much more importantly, modern crypto relies to avoiding security 
through obscurity. As outlined by Kirchoff in the 19th century, the 
security of a cipher ultimately depends only on the _key_, not the 
algorithm used to process the key. (Phrased in more modern terms, 
figuring out the algorithm is an easy problem, presumably solvable in 
polynomial time, while discovering the key is either provably impossible 
(except by guessing) or in the case of RSA is believed to be hard (not 
yet proven, and textbooks will tell you all kinds of stuff about what 
hard means).

Now Freedom is not a cipher, but a system. And no doubt supplying an 
attacker with the program would help him to design an attack. Supplying 
him with the source code and detailed specs would help him even more.

But, as with Kirchoff's point, the attacker is going to get the design 
eventually. But not the keys.

In any case, NSA probably had it from their buddies in Canada, who 
either got it by arrangement with ZKS or snarfed it in one of several 
ways.

The security of Freedom should not depend on even having access to the 
source code, else ZKS would be lying when they claim that even they 
cannot trace a message back to the sender. (Something which some may 
doubt...)


 Either way, the prospects for dissident-grade untraceability are 
 fairly
 bleak.


You pontificate as if you know something about our field, when you 
clearly know very little. Get some education if you plan to pontificate 
like this.

A mixnet of the N extant remailers offers pretty damned good 
untraceability. Needs some work on getting remailers more robust, but 
the underlying nested encryption looks to be a formidable challenge for 
Shin Bet to crack.


--Tim May




RE: News: U.S. May Help Chinese Evade Net Censorship

2001-08-31 Thread Phillip H. Zakas

 Adam writes:
 As far as your opinions of our business, well, I'm really uninterested
 in getting into a pissing match with you.  The reality is that
customers
 and investors give us money tp produce privacy tools, and they, not
you,
 are the ones I need to keep happy.

The reality is that people like may and lists like this one that may
help your customers and investors understand what they are and aren't
getting.  For example, your investors probably don't realize that you
can't use zks tools for more than x% (I'm guessing 45%) of the us
consumer market right off the bat because of self-imposed operating
restrictions of your products (if you're not fully compatible with aol
mail and web browsing, you're missing much of your usa market...btw 85%
of aol users use the internal aol browser not an external browser so I
doubt they will figure out how to download let alone launch an external
browser and follow your arcane load/unload/re-load aol usage
instructions.)  plus investors probably aren't aware that limiting
outlook support to 'internet only' mode cuts your outlook customer base
quite a bit (I haven't seen the latest figures, but I believe a large
group of outlook users configure their software for corporate/workgroup
mode.)  and investors probably don't realize how complex (in my opinion)
the software is to set up and operate -- I'm disappointed that you've
not released usage figures that I could find easily on your website
(both downloads and average customer lifespan for the standard or
premium products)...are people rushing to use the products?  oh, and a
minor point, but how much further have you cut your market share by
focusing only on w2k, w98 and wme?  You should correct me if I've
mis-analyzed the info provided on the zks website.
 
Anyway I don't like criticizing products per se (every products has
weaknesses), but I do think criticisms lead to more aware
investors/customers and perhaps even better products in the future.  So
in a sense it's helpful to listen to commentary from may or lists like
this one.




Re: U.S. May Help Chinese Evade Net Censorship

2001-08-31 Thread Adam Shostack

On Thu, Aug 30, 2001 at 09:14:46PM -0700, Tim May wrote:
| A mixnet of the N extant remailers offers pretty damned good 
| untraceability. Needs some work on getting remailers more robust, but 
| the underlying nested encryption looks to be a formidable challenge for 
| Shin Bet to crack.

http://anon.efga.org/Remailers lists about 35 Mixmasters and 45 type 1 
remailers.  An awful lot depends on what you mean by pretty good
untracability.For example, if you send a dozen messages from
Alice to Bob, then I'd bet you can do an entry-exit correlation
attack.  It becomes harder if you add substantial cover traffic, but
Kocher-esque reductions in the noise are very powerful.

If Alice and Bob are smart spies, and use a different hotmail
recieving address each time, then you get pretty good untracability,
but that untracability comes as much from the one-off nature of the
messages as the mix network between them.  And, depending on how good
I think Shin Bet is at traffic analysis, I'm not sure if I'd even draw
attention to my messages by sending them through 1/40^5 remailers.
Thats 28 or 29 bits with 5 hops.  If you start looking at reliability,
only half or so of the remailers have 99% reliability, although only
10 are below 95% which means either a smaller pool, or a need for
redundancy, both of which reduce your security.

Adam


-- 
It is seldom that liberty of any kind is lost all at once.
   -Hume




Re: News: U.S. May Help Chinese Evade Net Censorship

2001-08-31 Thread Ken Brown

Faustine wrote:

[...]

 Of course it has a trap door, that's probably the whole point of getting it
 over there in the first place. And by the way, if you're going to question
 SafeWeb for cooperating with CIA, you might as well criticize ZeroKnowledge
 for selling a boatload of the Freedom beta to the NSA in 1999 as well. What
 did they think they wanted it for, farting around on Usenet? I bet they had
 that sucker reverse-engineered and compromised in two minutes flat. Stands
 to reason. I wouldn't trust either of them with anything significant.

If it can be compromised by NSA looking at a beta, it can be compromised
by whoever the Chinese have doing this sort of thing. If it is safe
enough to use in a life-or-death situation AT ALL it is safe enough to
use if the NSA  uncle Tom Cobbley and all have the source code. If not,
not.  

Ken




Re: News: U.S. May Help Chinese Evade Net Censorship

2001-08-31 Thread David Honig

At 10:02 AM 8/30/01 -0700, Tim May wrote:
Alas, the marketing of such dissident-grade untraceability is 
difficult. Partly because anything that is dissident-grade is also 
pedophile-grade, money launderer-grade, freedom fighter-grade, 
terrorist-grade, etc.

--Tim May

How about a marketing/psyop campaign promoting
Mistress Grade crypto, and get licensing rights for the
Chandra Levy images...  or Congressional-Diary Grade crypto
if Packwood will do cameos...




Re: News: U.S. May Help Chinese Evade Net Censorship

2001-08-31 Thread jamesd

--
On 30 Aug 2001, at 14:52, Faustine wrote:
 And as long as you have companies like ZeroKnowledge who are  
 willing/gullible/greedy/just plain fucking stupid enough to 
 sell their betas to the NSA, you never will.

There is nothing wrong with selling betas to the NSA.  I make my 
crypto source code available to the NSA, and to everyone else.  
Everyone should do this.  Anyone that fails to do that is up to
no good. 

--digsig
 James A. Donald
 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
 67dYNaWosvJqHSU041w2pF90I0cE+VHfMhQxInsf
 4Is1TS6sNGfG1fhrdBPgbEbNEPYuv+XqX9gM0Ua0i




Re: News: U.S. May Help Chinese Evade Net Censorship

2001-08-31 Thread jamesd

--
On 30 Aug 2001, at 14:41, Faustine wrote:
 Of course it has a trap door, that's probably the whole point 
 of getting it over there in the first place. And by the way, if 
 you're going to question SafeWeb for cooperating with CIA, you 
 might as well criticize ZeroKnowledge for selling a boatload of 
 the Freedom beta to the NSA in 1999 as well. What did they 
 think they wanted it for, farting around on Usenet? I bet they 
 had that sucker reverse-engineered and compromised in two 
 minutes flat. Stands to reason.

 I think it most unlikely that they could compromise rot-13 in
two minutes flat, and as for reverse engineering, any decent 
crypto system makes its engineering publicly available, so that 
reverse engineering is quite unnecessary.  No one should ever use 
a system that has to be reverse engineered. 

--digsig
 James A. Donald
 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
 vmwKl1+31thMlrC2hl4XzwiD6EPSMqrBX8OqN5J0
 4qFXhFjCIcqlGNHPzxbUC4Kfz95pkdg5H60E8+j1v




Re: News: U.S. May Help Chinese Evade Net Censorship

2001-08-31 Thread David Honig

At 02:52 PM 8/30/01 -0400, Faustine wrote:

And as long as you have companies like ZeroKnowledge who are 
willing/gullible/greedy/just plain fucking stupid enough to sell their 
betas to the NSA, you never will. 

~Faustine.

If knowledge of how something works breaks it, it wasn't worth
having.  No security gained through obscurity.

You have to assume NSA can examine any code they want to.
Regular Kevin Mitnicks, them.




Re: News: U.S. May Help Chinese Evade Net Censorship

2001-08-31 Thread David Honig

At 02:41 PM 8/30/01 -0400, Faustine wrote:
And by the way, if you're going to question 
SafeWeb for cooperating with CIA, you might as well criticize ZeroKnowledge 
for selling a boatload of the Freedom beta to the NSA in 1999 as well. What 
did they think they wanted it for, farting around on Usenet? I bet they had 
that sucker reverse-engineered and compromised in two minutes flat. 

Were you intending to insult ZK authors[1]?  

The spooks would have studied the tool and its design, and set up a test
net to study the traffic. Depending on their resources and the
interesting-ness of the ZK-using 'targets
in the field' they would have thought about what can be recovered from
observations and interventions.  As they do with everything, from code to
routers.

Maybe they would, in 2 minutes, look at it and say, oh, well, they
used the Foobar library's implementation of RSA, and we know how to exploit
a bug in that version, and can leverage that to break their scheme, 
so all their zero knowledge is ours.  Or lookee here, they didn't check
a buffer overflow and we can 0wn their nodes But exploration takes
time, especially for a system designed from start to resist.  Unless you
think they're magic.


[1] I'm not one, nor do I know any




Re: News: U.S. May Help Chinese Evade Net Censorship

2001-08-31 Thread Faustine

Tim wrote:

But, as with Kirchoff's point, the attacker is going to get the design 
eventually. 

If getting the design eventually were good enough, why the keen interest 
in putting in a large order for the beta? There's a reason. 

Maybe in the long run, it's right to view any objections as being little 
more than irrelevant, moralistic hand-waving. But I don't find the they're 
going to compromise it anyway so why not make a buck when we can line of 
reasoning particularly satisfying.


The security of Freedom should not depend on even having access to the 
source code, else ZKS would be lying when they claim that even they 
cannot trace a message back to the sender. (Something which some may 
doubt...)

Do you?


 Either way, the prospects for dissident-grade untraceability are 
 fairly bleak.

You pontificate as if you know something about our field, when you 
clearly know very little. Get some education if you plan to pontificate 
like this.

You call that pontificating? My saying Either way, the prospects 
for dissident-grade untraceability are fairly bleak is either 
interesting enough to address, or it isn't (for whatever reason.) Going for 
the gratuitous ad-hominem regarding whatever queer notions you happen to 
have about what I know or don't know is quite beneath you.


A mixnet of the N extant remailers offers pretty damned good 
untraceability. Needs some work on getting remailers more robust, but 
the underlying nested encryption looks to be a formidable challenge for 
Shin Bet to crack.


I'm sure I don't need to tell you a thing about the centrality of a secure 
implementation. Likewise, I'm sure you know that being a formidable 
challenge never prevented anything from being broken before, and it never 
will. 

All place-in-the-pecking-order issues aside, roughly how long do you think 
it's going to take before dissident-grade untraceability becomes a 
reality?  If anyone deigns to show me why the prospects are better 
than bleak, I'd love to be proven wrong.

~Faustine.




Re: News: U.S. May Help Chinese Evade Net Censorship

2001-08-31 Thread Tim May

On Friday, August 31, 2001, at 11:43 AM, Faustine wrote:

 Tim wrote:

 But, as with Kirchoff's point, the attacker is going to get the design
 eventually.

 If getting the design eventually were good enough, why the keen 
 interest
 in putting in a large order for the beta? There's a reason.

Perhaps the NSA wanted to use the product without making illegal copies?

Your earlier point (that they wished to reverse-engineer the product) is 
in fact undermined by this fact that they bought N copies.

--Tim May




Re: News: U.S. May Help Chinese Evade Net Censorship

2001-08-31 Thread Meyer Wolfsheim

On Fri, 31 Aug 2001, Faustine wrote:

 Tim wrote:

 But, as with Kirchoff's point, the attacker is going to get the design
 eventually.

 If getting the design eventually were good enough, why the keen interest
 in putting in a large order for the beta? There's a reason.

As I recall, this was an open beta. The NSA would probably have ordered a
copy under a private individual's name (and had it sent to a residential
address) had ZKS denied them the sale.

(They didn't need a large number of copies to examine it for flaws.)

 Maybe in the long run, it's right to view any objections as being little
 more than irrelevant, moralistic hand-waving. But I don't find the they're
 going to compromise it anyway so why not make a buck when we can line of
 reasoning particularly satisfying.

That's not the reasoning that anyone here is stating.

They're going to obtain a copy of the software anyway, so why not make a
buck while we can, is what's being said, coupled with they shouldn't be
able to break the software even if they have the source, so if we've done
our jobs there is no reason not so sell it to them.

Please. If you are going to participate in this debate, possess the
ability to paraphrase the opponent's arguements correctly.

-MW-




Re: News: U.S. May Help Chinese Evade Net Censorship

2001-08-31 Thread Faustine

On Friday, August 31, 2001, at 11:43 AM, Faustine wrote:
 Tim wrote:
 But, as with Kirchoff's point, the attacker is going to get the design
 eventually.
 If getting the design eventually were good enough, why the keen 
 interest in putting in a large order for the beta? There's a reason.

Perhaps the NSA wanted to use the product without making illegal copies?

Your earlier point (that they wished to reverse-engineer the product) is 
in fact undermined by this fact that they bought N copies.


Unless you believe reverse engineering is only useful for making pirated 
copies, there's no reason to assume any sort of contradiction at all. 

As if the NSA would use anything from the private sector they didn't know 
inside out.

~Faustine.




News: U.S. May Help Chinese Evade Net Censorship

2001-08-30 Thread Tim May

This report says the U.S. Gov't. has plans to make SafeWeb, the Web 
proxy company it helped fund through the CIA, available to Chinese 
citizens who want to bypass their government's censorship.

http://dailynews.yahoo.com/h/nm/20010830/wr/tech_china_internet_report_dc_1.
html

(I can already hear Aimee moaning about this anarchic undermining of the 
official Chinese government...until she realizes it has been blessed by 
a legitimate organ of the government.)

So, what happens when Iran decides to finance systems in the U.S. to 
bypass U.S.G. censorship (e.g., of talk by freedom fighters)? Or when 
Denmark finances a system to bypass crackdowns on teen erotica in the 
U.S.? And so on.

Here's a brief excerpt:

Thursday August 30 3:23 AM ET

U.S. May Help Chinese Evade Net Censorship -NYT

NEW YORK (Reuters) - United States government agencies hope to finance 
an American-based computer network designed to thwart attempts by the 
Chinese government to censor the World Wide Web for users in China, the 
New York Times reported in its online edition on Thursday.

According to the report, the agency is in advanced discussions with 
Safeweb, a small company based in Emeryville, California, which has 
received financing from the venture capital arm of the Central 
Intelligence Agency (news - web sites), In-Q-Tel. The discussions were 
confirmed by parties on both sides, the newspaper said.

Safeweb currently runs its own worldwide network of about 100 privacy 
servers -- computers that help disguise what Web sites a user is seeking 
to view -- which are popular with users in China, according to the 
report. The newspaper said the privacy servers have been a continuing 
target for the Chinese government, which has blocked most of them in 
recent weeks.




Re: News: U.S. May Help Chinese Evade Net Censorship

2001-08-30 Thread Tim May

On Thursday, August 30, 2001, at 12:16 PM, Adam Shostack wrote:

 As far as your opinions of our business, well, I'm really uninterested
 in getting into a pissing match with you.  The reality is that
 customers and investors give us money tp produce privacy tools, and
 they, not you, are the ones I need to keep happy.


I was being quite calm was not getting into a pissing match.

If you react to comments about ZKS by saying people are pissing on you, 
I'd call you overly sensitive.

And I certainly recall you yourself commenting on products from RSA and 
many other companies.


--Tim May




Re: News: U.S. May Help Chinese Evade Net Censorship

2001-08-30 Thread mmotyka

Faustine [EMAIL PROTECTED] wrote :
Adam wrote:
On Thu, Aug 30, 2001 at 10:02:54AM -0700, Tim May wrote:
| Alas, the marketing of such dissident-grade untraceability is 
| difficult. Partly because anything that is dissident-grade is also 
| pedophile-grade, money launderer-grade, freedom fighter-grade, 
| terrorist-grade, etc.

I think a larger problem is that we don't know how to build it. 

And as long as you have companies like ZeroKnowledge who are 
willing/gullible/greedy/just plain fucking stupid enough to sell their 
betas to the NSA, you never will. 

~Faustine.

Holy faulty logic Batman! This has to be one of the more doofy things
I've heard. It's right up there with the EMI Grounding Strap thread.

What're you going to do, sell a product in CompUSA with instructions to
the cashiers that the NSA is not allowed to buy it? If the NSA is
willing to pay for some software that's great. They've got as much right
to buy it as anyone else. As long as they obey the law! and don't
reverse engineer it, let them share in financing further development.

I would find it more relevant to know which commercial product designs
have been influenced by which non-commercial agencies.

oy g'vay ( sp? )
Mike




RE: News: U.S. May Help Chinese Evade Net Censorship

2001-08-30 Thread Phillip H. Zakas

 Faustine wrote:
 I wouldn't trust either of them with anything significant. 

More importantly, the claims that safeweb/triangle boy actually works
may be misleading to the people who will rely on its claims of securely
circumventing government censorship in china.  The entire in/out bound
traffic for the system can be effectively blocked or monitored.  Plus
did it strike anyone as odd that the 'triangle boy' software, to be used
when access to safeweb.com is blocked, is downloaded from the
safeweb.com website?  I've not seen that software anywhere else and
frankly downloading/having that triangleboy software in itself is a dead
giveaway of suspicious activity isn't it?  I'm not as worried about US
citizens using the stuff in the usa, just concerned for chinese
dissidents using it in china.
phillip




Re: U.S. May Help Chinese Evade Net Censorship

2001-08-30 Thread Faustine

Mike wrote:
Faustine [EMAIL PROTECTED] wrote :
Adam wrote:
On Thu, Aug 30, 2001 at 10:02:54AM -0700, Tim May wrote:
| Alas, the marketing of such dissident-grade untraceability is 
| difficult. Partly because anything that is dissident-grade is also 
| pedophile-grade, money launderer-grade, freedom fighter-grade, 
| terrorist-grade, etc.
I think a larger problem is that we don't know how to build it. 

And as long as you have companies like ZeroKnowledge who are 
willing/gullible/greedy/just plain fucking stupid enough to sell their 
betas to the NSA, you never will. 

Holy faulty logic Batman! This has to be one of the more doofy things
I've heard. It's right up there with the EMI Grounding Strap thread.
What're you going to do, sell a product in CompUSA with instructions to
the cashiers that the NSA is not allowed to buy it? If the NSA is
willing to pay for some software that's great. They've got as much right
to buy it as anyone else. 

True, of course they do. Technology is morally neutral, sure, whatever. 
Yay capitalism. I still think handing over your security product beta on a 
silver platter in exchange for a nice fat government contract is a stupid, 
stupid idea.


As long as they obey the law! and don't
reverse engineer it, let them share in financing further development.

Do you really think that anyone would have the slightest qualm about 
reverse engineering a product like this when national security interests 
are at stake?


I would find it more relevant to know which commercial product designs
have been influenced by which non-commercial agencies.

Either way, the prospects for dissident-grade untraceability are fairly 
bleak. 

oy g'vay ( sp? )

close enough. ;)


~Faustine.