Re: Idea: Simplified TEMPEST-shielded unit (speculative proposal)

2003-12-15 Thread Tim May
On Dec 14, 2003, at 8:33 PM, Thomas Shaddack wrote:

TEMPEST shielding is fairly esoteric (at least for non-EM-specialists)
field. But potentially could be made easier by simplifying the problem.
If we won't want to shield the user interface (eg. we want just a
cryptographic processor), we may put the device into a solid metal case
without holes, battery-powered, with the seams in the case covered with
eg. adhesive copper tape. The input and output can be mediated by 
fibers,
whose ports can be the only holes, fraction of millimeter in diameter,
carefully shielded, in the otherwise seamless well-grounded box. There 
are
potential cooling problems, as there are no ventilation holes in the
enclosure; this can be alleviated by using one side of the box as a 
large
passive cooler, eventually with an externally mounted fan with separate
power supply. If magnetic shielding is required as well, the box could 
be
made of permalloy or other material with similar magnetic properties.

I am not sure how to shield a display. Maybe taking an LCD, bolting it 
on
the shielded box, and cover it with a fine wire mesh and possibly
metalized glass? Using LCD with high response time of the individual
pixels also dramatically reduces the value of eventual optical 
emissions.
I worked inside a Faraday cage in a physic lab for several months. And, 
later, I did experiments in and around Faraday cages. Shielding is 
fairly easy to measure. (Using portable radios and televisions, or even 
using the Software-Defined Radio as a low-cost spectrum analyzer.)

My advice? Skip all of the nonsense about building special laptops or 
computers and special displays with mesh grids over the displays. Those 
who are _casually_ interested will not replace their existing Mac 
Powerbooks or Dell laptops with this metal box monster.

Instead, devise a metal mesh bag that one climbs into to use whichever 
laptop is of interest. To reduce costs, most of the bag can be 
metallized fabric that is not mesh, with only part of it being mesh, 
for breathability. (Perhaps the head region, to minimize claustrophobia 
and to allow audio and visual communication with others nearby.)

I would imagine a durable-enough metallized fabric bag could be 
constructed for under a few hundred dollars, which is surely cheaper 
for most to use than designing a custom laptop or desktop.

Or consider heads-up LCD glasses. These have been available for PCs and 
gamers for a few years (longer in more experimental forms, of course, 
dating back to the VR days of the late 80s). Sony has had a couple of 
models, and so have others. Some have video resolutions (PAL, NTSC), 
some have VGA resolutions. Perfectly adequate for displaying crypto 
results and requesting input.

These very probably radiate little. But of course a lightweight hood, a 
la the above mesh bag, would drop the emissions by some other goodly 
amount of dB. Experiments necessary, of course.

Interface to a laptop or PC could be as you described it, with shielded 
cables. Or just use a small PC (Poqet, etc.) and move the keyboard and 
CPU under the draped hood. Leakage out the bottom, hence the earlier 
proposal for a full bag, like a sleeping bag.

--Tim May



Idea: Simplified TEMPEST-shielded unit (speculative proposal)

2003-12-15 Thread Thomas Shaddack
TEMPEST shielding is fairly esoteric (at least for non-EM-specialists)
field. But potentially could be made easier by simplifying the problem.

If we won't want to shield the user interface (eg. we want just a
cryptographic processor), we may put the device into a solid metal case
without holes, battery-powered, with the seams in the case covered with
eg. adhesive copper tape. The input and output can be mediated by fibers,
whose ports can be the only holes, fraction of millimeter in diameter,
carefully shielded, in the otherwise seamless well-grounded box. There are
potential cooling problems, as there are no ventilation holes in the
enclosure; this can be alleviated by using one side of the box as a large
passive cooler, eventually with an externally mounted fan with separate
power supply. If magnetic shielding is required as well, the box could be
made of permalloy or other material with similar magnetic properties.

I am not sure how to shield a display. Maybe taking an LCD, bolting it on
the shielded box, and cover it with a fine wire mesh and possibly
metalized glass? Using LCD with high response time of the individual
pixels also dramatically reduces the value of eventual optical emissions.

I also have doubts about the keyboard. Several ideas that could help: We
may use optical scanning of the key matrix, with the light fed into and
read from the matrix by optical fibers, coming out from a well-shielded
enclosure, similar to the I/O lines of the first example. We may use a
normal keyboard, but modified to use reliably random scanning pattern;
that won't reduce the EM emissions of the keyboard, but effectively
encrypts them, dramatically reducing their intelligence value. It's then
necessary to take precautions about the data cable between the keyboard
itself and the computer, where the data go through in plaintext; it's
possible to encrypt it, or to use a fiber.

As really good shielding of complicated cases is difficult to achieve, the
primary objective of this approach is to put everything into simple
metallic boxes with as few and as small ports as possible, which should be
comparatively easy to manufacture, replacing the special contacting of
removable panels with disposable adhesive copper tape (the only reason to
go inside is replacing batteries, and the tape together with other
measures may serve as tamperproofing), and replacement of all potentially
radiating external data connections with fiber optic.

I should disclaim I have nothing that could vaguely resemble any deeper
knowledge of high frequencies; therefore I lay out the idea here and
wonder if anyone can see holes in it (and where they are).



Re: cpunk-like meeting report

2003-12-15 Thread Morlock Elloi
 http://lists.cryptnet.net/mailman/listinfo/cpunx-news
 
 Be sure and check the archive before posting.  It is still small.

Cookies, members only archive access. Bad deal. Will not happen. Very few
consumers here.


=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
New Yahoo! Photos - easier uploading and sharing.
http://photos.yahoo.com/



Re: Don't worry...it's just one of Saddam's doubles

2003-12-15 Thread Thomas Shaddack
On Sun, 14 Dec 2003, Tim May wrote:

 How boring. The DNA confirmation was reported on all of the puppet news
 organizations here.

It made it to the evening news. Which I missed (my info was from the news
at noon), and caught only this morning in the evening news rerun.

 The Germans and Eastern Europeans, being mostly opposed to the war,
 probably just buried the confirmation.

They just delayed it. Most likely timezone stuff. Local news take their
material from the standard newsfeeds; though it's fun to watch who
includes what details and how the spin differs by station. (Does anybody
here know if it's possible to receive the raw APTN and Reuters satellite
newsfeeds, and how?)

 The Czech Republic supported the war,

Local political scene was much less than homogenous in this issue. The
quarrels around it were quite amusing to watch (though it all boiled down
into if it will be better to kiss American ass or the European one, or,
better, if there isn't a way how to kiss both of them at once).

 and sent troops, and now that Saddam has been captured, both of them
 will be returning home, with medals.

You don't know local administration. The troops can consider themselves
lucky if they get official thank you.



Re: Compromised Remailers

2003-12-15 Thread Len Sassaman
On Sun, 14 Dec 2003, Tim May wrote:

 I haven't carefully looked at the current source code (if it's
 available) for things like Type II Mixmaster remailers, things which
 offer reply-blocks.

Yes, it is available. You can download it via ftp from
mixmaster.anonymizer.com, or view the SVN tree at
https://source.mixmaster.anonymizer.com/

(We believe that keeping the source tree and commit list open is
important, as it should help prevent a situation like that which happened
to JAP not too long ago. Changes to the code should all be made in
public.)

Also it's important to note that Type II does not support reply blocks,
while Type I remailers do. (Perhaps the first cut of Cypherpunk
remailers, i.e. those running Hal's scripts did not, but the Cypherpunk
nym servers that use reply blocks are built on top of Type I.)

 Certainly for the canonical Cypherpunks remailer, the
 store-and-forward-after-mixing remailer, the fact that the nested
 encryption is GENERATED BY THE ORIGINATOR means that interception is
 useless to a TLA. The most a TLA can do is to a) not forward as
 planned, resulting in a dropped message, or b) see where a particular
 collection of random-looking (because of encryption) bits came from and
 where they are intended to next go.

For most TLS adversaries that may be correct. However, there are a number
of subtle attacks on Chaum systems that Type I is susceptible to --
tagging and timing attacks in particular, as well as replay attacks, and
various other attacks which all strive to narrow the anonymity set.

 In particular, a TLA or interceptor or corrupted or threatened remailer
 operator CANNOT insert new text or new delivery instructions into
 packets received by his node BECAUSE HE CANNOT OPEN ANY PAYLOAD
 ENCRYPTED TO THE NEXT NODE. Anything he adds to the payload bits (which
 he can see of course, though not decrypt or make sense of) will of
 course make the next node see only garbage when he tries to decrypt the
 payload.

Ideally. There are ways to flip bits in PGP encrypted messages which will
not result in a failed decryption, however. (The property you describe is
essential for protecting against tagging attacks. Type II does better than
PGP-based systems, but is still not as good at this as Type III. The
Mixminion design paper covers these concerns in detail:

http://mixminion.net/minion-design.pdf

 This process continues, in a recursive fashion.

 Now of course there are some boundary conditions. If every remailer is
 compromised, then complete visibility is ensured. The sender and
 receiver are in a fishbowl, a panopticon, with everything visible to
 the TLA or attackers.

 And if even a fraction of the remailers are compromised, then with
 collusion they can map inputs to outputs, in many cases. (How many they
 can and how many they can't are issues of statistics and suchlike.)

Right. The claim that there only needs to be one trustworthy remailer in
a chain fails to recognize the power of statistical analysis of a
network's traffic. Certainly, having k number of remailers in a network
under your control makes such analysis easier.

 Another boundary condition is when a remailer network is lightly used,
 or when correlations between sent messages, received messages, and
 actions take place. A signal recovery problem, perhaps akin to some
 military sorts of problems.

Yes. And as you look at this problem more closely (as I have been doing
ever since our conversation about this problem at the Cypherpunks meeting
in Santa Cruz a while back), the solutions become more elusive.

The big problems arise when the adversary has the ability to observe
messages in the network over time. Partitioning attacks and long-term
intersection attacks likely mean that the original Cypherpunk remailer
system is transparent to any entity which is able to view the traffic on
the entire network. (The attacks are passive, though they can be optimized
with some active interference.)

Big weak spots: client version information, statistics distribution, and
key rotation. In a system like Type I which relies on an external program
for the layered crypto, information about the user's software
distinguishes him from other users. Likewise, a user's choice of remailer
nodes in a selected chain may vary based on which pinger service he is
using, and whether he has updated his remailer keys after the remailer has
gone through a key rotation also gives away valuable information. These
and other distinguishing factors allow an attacker to partition the
main anonymity set into smaller sets. Over time, the attacker may be able
to plot the intersection of these sets such that he is able to identify a
given user based on his usage patterns and the information he is leaking.

Type III goes a long way to address many of these, but still falls short
of perfect. The particularly troubling issue at the moment is how to
distribute information about the reliability (as well as key information)
of remailers in the network 

Wardial for Bush! 1-800-531-6789 -- call AGAIN AND AGAIN!

2003-12-15 Thread Tim Meehan
From: Wardialers For Bush [EMAIL PROTECTED]
Subject: [Wardialers for Bush] Set a record! Call 1-800-531-6789 AS OFTEN AS YOU CAN!

Resident George W. Bush wants your support!  

Even though every nuisance call to this phone number costs him money, he
wants you to call NOW, AGAIN AND AGAIN!

1-800-531-6789

If you don't get through, call again!

1-800-531-6789

Keep calling.  Say you were told to call by Ken Mehlman!  Ask for your free
prize!

1-800-531-6789


1-800-531-6789


1-800-531-6789


1-800-531-6789


1-800-531-6789



Re: cpunk-like meeting report

2003-12-15 Thread Eugen Leitl
On Mon, Dec 15, 2003 at 08:52:52AM -0500, V Alex Brennen wrote:

 Archive it your selfs you fucking wankers.  Damn.  Since when

That was I was going to do before you volunteered to host the lists.
Thanks for letting me know that the offer has been withdrawn.

I guess I don't need another illustration as to why free is too expensive.

 can cypherpunks not even handle setting up a public mailing
 list archive?  If that's beyond you, you probably don't

If you think debugging SuSE + Postfix + Mailman (Failure to exec script.
WANTED gid 65534, GOT gid 8. -- none of the standard fixes work) is high on
my priority list, you're on crack.

 belong on the cypherpunks list.

 What do you need a government assistance program?  Some public
 service announcements?  A welfare sponsored skills training
 program?

 Here's the hand out you're looking for:

 http://www.mail-archive.com/faq.html#newlist

A redundant archive is a good idea. Thanks.

-- Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net

[demime 0.97c removed an attachment of type application/pgp-signature]



Re: cpunk-like meeting report

2003-12-15 Thread Eugen Leitl
On Sun, Dec 14, 2003 at 06:36:12PM -0800, Tim May wrote:

 No, we don't need a cpunx-news list. This is what Google and the
 ability to see hundreds of various lists and sites is for.

This is a bogus statement. As long as I can't use a single keyword to make
Google's news alerts topical, and _full text_ a search engine is rather
useless.

 News lists tend strongly to be just dumping grounds for crap from
 other lists.

The point is that you don't have to subscribe to 20-odd email lists, which
have about 5% relevance each. Life's too short for that. People are the best
filters, and with a handful of sustained contributors the list becomes a
valuable resource.

 I failed the entrance exam for Interesting People, which is fine, for
 obvious reasons.

Case in point: most of IP list traffic is garbage from a cypherpunk point of
view. Let one list subscriber read it, and filter relevant bits to the
newsticker.

If it's a steaming pile of crap for Tim May it doesn't mean it's useless for
everybody else.

-- Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net

[demime 0.97c removed an attachment of type application/pgp-signature]



Re: U.S. in violation of Geneva convention?

2003-12-15 Thread Jim Dixon
On Mon, 15 Dec 2003, Anonymous wrote:

   The U.S. official's way of behaving like Texas rednecks are
 embarrassing. Not only are they cheering we got him like a child who
 can not withhold his enthusiasm. Displaying Saddam the way they did
 are also possibly a clear violation of the Geneva convention as far as
 I can tell.

The Geneva conventions require, among other things, that soldiers wear
uniforms.  Maybe it was just the movies, but I do believe that in the
first and second world wars combatants dressed in civilian clothes were
routinely shot.

--
Jim Dixon  [EMAIL PROTECTED]   tel +44 117 982 0786  mobile +44 797 373 7881
http://xlattice.sourceforge.net p2p communications infrastructure




Re: Idea: Simplified TEMPEST-shielded unit (speculative proposal)

2003-12-15 Thread John Young
There's a good possibility that Saddam was traced by Tempest
sensing, airborne or mundane. The technology is far more sensitive
than a decade ago. And with a lot of snooping technology kept obscure 
by tales of HUMINT, finks, lost laptops and black bag jobs.

For less sensitive compromising emanations, BETA, among others, 
makes portable Tempest units, desktop and room-sized, the devices 
export-restricted as if munitions.

There's a patent on a booth-like Tempest device into which the
user climbs, with protection provided for connections, but whether
it was ever built is unknown.

A slew of firms make Tempest products which can be examined
for what shielding works sufficiently well to be placed on NSA's
more or less trustworthy Tempest products list:

Beyond commercial-grade, NSA is reportedly able to read faint 
emanations from all known Tempest protection, thanks in part to 
reviewing products and international sharing among spooks.

Those leaked from fiber are now a piece of cake, and not by 
tapping the glass a la the RU submarine cable escapade and 
the derring-do of USS Jimmy Carter custom-rigged to hack 
transoceanic fiber.

Tempest snooping at the atomic level is feasible, thanks to
physicists who walk among the electrons with supercomputers.

As ever, what you don't know is what kills you, and if you are not
currently doing research or working on NDA stuff, you're toast.

Protecting against the known is what keeps the orchestrated 
leak industry thriving.

Be sure to submit bright inventions to the authorities to get contracts
for funding dark ones that work against the grain, then you'll get
really swell contracts or offed.

Ex-NSA staff are rolling in clover selling commercialized versions
of security technology that NSA freely accesses. Reminds of the Brits
selling to gullible govs impregnable Enigma machines after WW2.




U.S. in violation of Geneva convention?

2003-12-15 Thread Anonymous
  The U.S. official's way of behaving like Texas rednecks are embarrassing. Not only 
are they cheering we got him like a child who can not withhold his enthusiasm. 
Displaying Saddam the way they did are also possibly a clear violation of the Geneva 
convention as far as I can tell.
  What was that quote by Nietsche again?
  One person who actually did behave in a respectable manner was the President. No 
lame we got him or cowboy hats there. At least not this time.




Re: U.S. in violation of Geneva convention?

2003-12-15 Thread Jim Dixon
On Mon, 15 Dec 2003, Bill Stewart wrote:

 The Geneva conventions require, among other things, that soldiers wear
 uniforms.  Maybe it was just the movies, but I do believe that in the
 first and second world wars combatants dressed in civilian clothes were
 routinely shot.

 But Saddam isn't a soldier - he's a politician.   He may also have
 been in charge of his country's army, but he was being attacked because
 of his position as a political leader.

Saddam was apparently quite proud of being a soldier.  He routinely wore a
uniform bearing insignia of miliary rank.  He carried weapons.  He was
armed when captured and had with him evidence that he was directing
military operations.

In any case, if you are arguing that he should be treated as a POW, you
cannot simultaneously argue that he is not a soldier.

On Mon, 15 Dec 2003, Dave Howe wrote:

  The Geneva conventions require, among other things, that soldiers wear
  uniforms.
   No, they don't.

The provisions are reasonably clear.  You wear a uniform of some sort, or
you openly display your weapons:

3. In order to promote the protection of the civilian population from the
effects of hostilities, combatants are obliged to distinguish themselves
from the civilian population while they are engaged in an attack or in a
military operation preparatory to an attack. Recognizing, however, that
there are situations in armed conflicts where, owing to the nature of the
hostilities an armed combatant cannot so distinguish himself, he shall
retain his status as a combatant, provided that, in such situations, he
carries his arms openly:

(a) During each military engagement, and

(b) During such time as he is visible to the adversary while he is
engaged in a military deployment preceding the launching of an attack in
which he is to participate.

Acts which comply with the requirements of this paragraph shall not be
considered as perfidious within the meaning of Article 37, paragraph 1
(c).  (http://www.unhchr.ch/html/menu3/b/93.htm)

If you don't wear a uniform or display your weapons during an engagement,
whether offensive or defensive, then you are engaging in perfidious acts
and lose the protection of the Geneva conventions.  Note that this says
during each military engagement; if you drop your weapon and try to melt
into the crowd, you have failed to comply, your behaviour is perfidious.

   If you are defending though, you are entitled to the protection of the
 geneva convention (and lawful combatant status) simply by being an open
 hostile (carrying your weaponry openly and obeying all the usual
 provisions of the geneva convention, which obviously doesn't allow hiding
 in a crowd of civilians). This is the take up arms provision so beloved
 of the american people - that in the face of invasion, the ordinary
 citizen would take up arms to defend his home and neighbours.

I can find no support for what you say in this paragraph.  Attackers are
not distinguished from defenders except at the level of individual
engagements.  That is, if you are a member of an irregular force invading
another country and are captured, you are a POW, so long as you comply
with the rules: distinguish yourself from the civilian population, and
display your weapons openly.

Notwithstanding the above,

7. This Article is not intended to change the generally accepted practice
of States with respect to the wearing of the uniform by combatants
assigned to the regular, uniformed armed units of a Party to the
conflict.

Saddam was an officer in a regular, uniformed armed unit.  He had worn his
uniform conspicuously for many years. He was not an irregular combatant.
Therefore he was obliged to continue to wear a uniform while engaged in
military action and not doing so could be considered perfidious.

The following is also relevant:

Article 46.-Spies

1. Notwithstanding any other provision of the Conventions or of this
Protocol, any member of the armed forces of a Party to the conflict who
falls into the power of an adverse Party while engaging in espionage shall
not have the right to the status of prisoner of war and may be treated as
a spy.

2. A member of the armed forces of a Party to the conflict who, on behalf
of that Party and in territory controlled by an adverse Party, gathers or
attempts to gather information shall not be considered as engaging in
espionage if, while so acting, he is in the uniform of his armed forces.

If you gather information or attempt to do so, and are NOT in uniform,
you can be considered a spy and so are not eligible for POW status.

According to news reports, our friend Saddam had many intelligence reports
with him when captured.  He was gathering information for military
purposes.  He was not in uniform.  Therefore he forfeited any right to be
treated as a captured soldier - specifically because he was not in
uniform.

It was presumably on one of these grounds that Allied prisoners out of
uniform when captured were routinely executed in Europe during 

Re: U.S. in violation of Geneva convention?

2003-12-15 Thread Bill Stewart
At 03:47 PM 12/15/2003 +, Jim Dixon wrote:
On Mon, 15 Dec 2003, Anonymous wrote:

   The U.S. official's way of behaving like Texas rednecks are
 embarrassing. Not only are they cheering we got him like a child who
 can not withhold his enthusiasm. Displaying Saddam the way they did
 are also possibly a clear violation of the Geneva convention as far as
 I can tell.
The Geneva conventions require, among other things, that soldiers wear
uniforms.  Maybe it was just the movies, but I do believe that in the
first and second world wars combatants dressed in civilian clothes were
routinely shot.
But Saddam isn't a soldier - he's a politician.   He may also have
been in charge of his country's army, but he was being attacked because
of his position as a political leader.



Re: cpunk-like meeting report

2003-12-15 Thread V Alex Brennen
Eugen Leitl wrote:
On Sun, Dec 14, 2003 at 09:57:09PM -0800, Morlock Elloi wrote:

http://lists.cryptnet.net/mailman/listinfo/cpunx-news

Be sure and check the archive before posting.  It is still small.
Cookies, members only archive access. Bad deal. Will not happen. Very few
consumers here.


To see the collection of prior postings to the list, visit the cpunx-news
Archives. The current archive is only available to the list members.
No good. Please fix.
Archive it your selfs you fucking wankers.  Damn.  Since when
can cypherpunks not even handle setting up a public mailing
list archive?  If that's beyond you, you probably don't
belong on the cypherpunks list.
What do you need a government assistance program?  Some public
service announcements?  A welfare sponsored skills training
program?
Here's the hand out you're looking for:

http://www.mail-archive.com/faq.html#newlist



   - VAB



Re: U.S. in violation of Geneva convention?

2003-12-15 Thread R. A. Hettinga
At 5:21 PM + 12/15/03, Dave Howe wrote:
 Iraq was somehow involved in
the Trade Center attacks too

For those who wondered why Abu Nidal took two in the hat shortly before the
daisycutters came to play:

http://www.telegraph.co.uk/news/main.jhtml?xml=/news/2003/12/14/wterr14.xmlsSheet=/portal/2003/12/14/ixportaltop.html


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Re: cpunk-like meeting report

2003-12-15 Thread Eugen Leitl
On Sun, Dec 14, 2003 at 08:00:57PM -0800, Tim May wrote:

 Some people think spinning off new lists whenever they get interested
 in some area is interesting. Most of these lists fail for obvious

There's a specific niche of high-volume topical news lists. They're designed
to distribute the mining the news sources load. Life's too short for
everybody to read every news source just to learn what's new in a specific
area.

They can take a while to get started, but once they go critical they
can become a valuable resource.

My problem with cpunx-news is that I've found relying on other people
for critical infrastructure a mistake.

 reasons. Sometimes a famous person, especially Net famous, creates a
 vanity list. Hence the Interesting People vanity list. This trend
 seems to be giving way to Blogs, however, as the various
 net.personalities realize that what they really want is a forum for
 blogging their message to an attentive audience.

-- Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net

[demime 0.97c removed an attachment of type application/pgp-signature]



Re: cpunk-like meeting report

2003-12-15 Thread Eugen Leitl
On Sun, Dec 14, 2003 at 09:57:09PM -0800, Morlock Elloi wrote:
  http://lists.cryptnet.net/mailman/listinfo/cpunx-news
 
  Be sure and check the archive before posting.  It is still small.

 Cookies, members only archive access. Bad deal. Will not happen. Very few
 consumers here.

To see the collection of prior postings to the list, visit the cpunx-news
Archives. The current archive is only available to the list members.

No good. Please fix.

-- Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net

[demime 0.97c removed an attachment of type application/pgp-signature]



Re: U.S. in violation of Geneva convention?

2003-12-15 Thread Dave Howe
Jim Dixon wrote:
 The Geneva conventions require, among other things, that soldiers wear
 uniforms.
  No, they don't.

  Fox news repeats this enough that more than half of america believes it,
but then, more than half of america believes Iraq was somehow involved in
the Trade Center attacks too

  The rules are considerably more lax for the defenders than the
attackers - if you are entering another country, then you must either be
part of a uniformed, standing army or be part of a militia (with a rigid
authority structure, open carrage of arms and an identifying badge or
emblem). You must also respect the rules of war - so at least in theory,
even a uniformed official combatant is not entitled to the protections
of the Geneva conventions if he himself breaks those conventions (by e.g.
shooting noncombatants)

  If you are defending though, you are entitled to the protection of the
geneva convention (and lawful combatant status) simply by being an open
hostile (carrying your weaponry openly and obeying all the usual
provisions of the geneva convention, which obviously doesn't allow hiding
in a crowd of civilians). This is the take up arms provision so beloved
of the american people - that in the face of invasion, the ordinary
citizen would take up arms to defend his home and neighbours.

  There is considerable doubt as to exactly how this applies to sniping -
certainly, uniformed combatants are little less likely to decide to dive
into cover and take out their opponents with aimed fire than random
undertrained militia are, and it would be insane for a lone take up arms
defender to stand out in the open to duke it out; the problem is a
random sniper is difficult to locate *after* an attack if he is not
otherwise identifiable; ok, he isn't permitted to drop his weapon and
retain his lawful combatant status, but nor could a uniformed individual
(one of several) be expected to volunteer that he was the one who just
killed four of the team now pointing weapons at him. (the take up
arms provision seems to assume the defender picks up a gun and continues
firing until he is killed, captured, or he wins :)

name rank and number is for the movies.



self adjusting dummy traffic generation?

2003-12-15 Thread Nomen Nescio
Would it be possible to have a self adjusting dummy traffic generator feature 
in remailers? Operator decides that he wants to process x number of incoming and y 
number of outgoing messages each time period t. Then the software adjusts the number 
of dummy messages to this value using some statistical calculations of past t2 hours. 
If incoming traffic increases then the amount of dummy messages are decreasing and so 
on. Does this feature exist today?



Re: U.S. in violation of Geneva convention?

2003-12-15 Thread privacy.at Anonymous Remailer
The U.S. official's way of behaving like Texas rednecks are embarrassing. Not 

Crosspost from nettime:

Subject:  nettime wrong signals

If symbols really do matter we might conclude that American
administration's PR machine has got it badly wrong. In the carefully
orchestrated news management of Saddam's capture, once again, the public
opinion which *really* matters in the middle east: Arab public opinion,
has been conclusively misread

The image of an Arab leader (however terrible) being objectivised by a
white gloved American medic like a bug on a lab bench, will not be read in
the Arab world as a moment of liberation. It will be seen as a special
kind of humiliation, the kind which typifies the depth of ignorance which
has inspired this campaign from its outset. Once again the images (chosen
with great care one imagines, given the time lapse between Saddam's
capture and the John Wayne style triumphalism of the announcement) treats
Arab opinion to a further demonstration of the power of the west to
objectivize the world under a coolly scientific gaze. In this context no
mediaeval torturer could have conceived of a greater humiliation than the
medical torch's pencil thin beam illuminating the inside of the tyrant's
mouth.

A stupidity of almost incomprehensible proportions seems bent on
prosecuting a war against terror in which the twenty-four hour news
machine is mobilized to disseminate images that do little more than fan
the flames of hate.



Hack the Vote: cause a blackout

2003-12-15 Thread Major Variola (ret)
(This inspired by comments in Scheier's cryptogram)

Do all the newly electronic voting places have UPS?  I doubt
it.  Think of the fun you could cause if you downed a few
substations or poles.

 And because elections happen all at once, there would be no means of
recovery.  Imagine if, in the next presidential election, someone
hacked the vote in New York.  Would we let New York vote again in a
week?  Would we redo the entire national election?  Would we tell New
York that their votes didn't count?

What we need are simple voting systems--paper ballots that can be
counted even in a blackout.



Re: Compromised Remailers

2003-12-15 Thread Keith Ray
Quoting Bill Stewart [EMAIL PROTECTED]:

 At 06:49 PM 12/13/2003 +0100, some provocateur claiming to be Anonymous
 wrote:
 A question for the moment might well be how many if any of
 the remailers are operated by TLAs?
 
 Remailers are secure if at least one remailer in a chain
 is _not_ compromised...

A case-in-point on this is the admin of the Frog remailer in 2001.  He 'outted'
a user who chained a message through both of Frog admin's remailers.  The admin
didn't like what was said and used his logs to match the sender with the
decrypted outgoing message.  With sendmail and verbose Mixmaster logs, this is
trivial to do.  It's also not unheard of for remops to log and cooperate to
'out' a spammer.

If I were remailing a message that would get me sent to prison, I would
definately use a Wi-Fi hotspot and use 3-4 chained remailers with random delays.
 By the time the message is delivered, it will be many hours/days since the
message was sent.

 --
Keith Ray [EMAIL PROTECTED] -- OpenPGP Key: 0x79269A12



Re: Idea: Simplified TEMPEST-shielded unit (speculative proposal)

2003-12-15 Thread Anonymous Sender
While I agree with much of what you say I don't think it's likely that any 
kind of advanced SIGINT operation was what brought him down. The most important thing 
to have is intelligence from humans. From insiders. This is partly the problem with 
the intelligence agencies today. They think too much of the technology and it's 
possible uses. Good old fashion spies will always be the most powerfull way to get 
information if you can get someone to cooperate. This is also why it is a bit harder 
in countries with a lot of people willing to kill or be killed for the sake of ideas. 
Even so it seems that someone sold him for the money in this case. It was bound to 
happen sooner or later since it's not possible to be on the run without trusting at 
least one or a few individuals from time to time.



Re: U.S. in violation of Geneva convention?

2003-12-15 Thread Anonymous
I am not sure I agree. I am no expert on this however. I saw several people commenting 
the issue of Geneva convention on CNN during the day. Also I saw an expert on this 
field from another country commenting on the issue stating that it was a clear 
violation of the convention. In either of these interviews were there any discussion 
on whether it didn't apply to this specific case due to what clothings he happened to 
wear or whattever. I got the impression that it was clear that the U.S. treatment 
wasn't fully appropriate.

Nietsche quote sought: Battle not with monsters, lest ye become a monster. And if you 
gaze long into the abyss, the abyss gazes into you.

I think it's about not becoming evil yourself when you're fighting evil. Pretty 
applicable, yes. We should not be tempted to act in unlawful and questionable ways. It 
is sticking by international treaties and handling everyone in accordance to law and 
human values that separates us from evil men like Saddam. This is a good time to show 
him and his followers that all men, even those of his sort, are treated equal and 
given a fair trial as stipulated by the universal declaration of human rights by the 
UN in 1948. And this by the state they call the great satan. Behaving like a lynch 
mob will make us loosers too. 



Using PCR to find Hussein via the sewers? [GATTACA]

2003-12-15 Thread Major Variola (ret)
At 04:50 AM 12/15/03 -0800, John Young wrote:
There's a good possibility that Saddam was traced by Tempest
sensing, airborne or mundane.

I wonder if you can trace DNA in sewers back to the source,
esp. in an inbred locale?   (Peter?  PCR with Saddam specific
primers?)

Or did he just dig a cat-hole instead of using the infrastructure?

You can trace industrial contamination up sewer lines back to the
source.
How about the cells we shed?

Just theoretically.  Papers fnord says someone used to the good life
narced, couldn't
handle a jail cell.



Re: cpunk-like meeting report

2003-12-15 Thread Major Variola (ret)
At 09:57 PM 12/14/03 -0800, Morlock Elloi wrote:
 Be sure and check the archive before posting.  It is still small.

Cookies, members only archive access. Bad deal. Will not happen. Very
few
consumers here.

But look how many IP addresses he got from members checking it out!



Re: Don't worry...it's just one of Saddam's doubles

2003-12-15 Thread Tyler Durden
If I don't remember incorrectly, they said something about identifying him
by DNA testing.
Well, of course Saddam is going to test positive...he's apparently an 
actual CLONE.
Actually, from what I understand this is the 'original' Saddam (note how 
much older he seems than the Saddams we've been seeing in the press over the 
last few years), but he hasn't actually controlled things for a couple of 
decades. The Saddam we're really looking for is approximately Saddam #3, and 
he's still at large, and directing the insurgency.

-TD


From: Thomas Shaddack [EMAIL PROTECTED]
To: Tyler Durden [EMAIL PROTECTED]
CC: [EMAIL PROTECTED]
Subject: Re: Don't worry...it's just one of Saddam's doubles
Date: Mon, 15 Dec 2003 03:33:53 +0100 (CET)
On Sun, 14 Dec 2003, Tyler Durden wrote:

 Spread the word. The adminstration got desparate. In a few weeks they'll
 announce this isn't the real Saddam, but that rounding up all of the 
clones
 is necessary progress in the fight to get the real Saddam.

If I don't remember incorrectly, they said something about identifying him
by DNA testing. But it wasn't widely quoted in the mainstream news. So
even if it really is him - they may still claim he isn't the real McCoy if
the insurgency won't stop.
The timing is definitely weird. Too soon before the Elections.

But there is still the backup, the Lost TV Star, also known as Ossama;
whether They intend to announce capturing him, or whether he will be
claimed responsible for Something Scary in a psyops attempt to make the
voters more susceptible to the beat of the Homeland Security drums.
_
Wonder if the latest virus has gotten to your computer? Find out. Run the 
FREE McAfee online computer scan! 
http://clinic.mcafee.com/clinic/ibuy/campaign.asp?cid=3963



Re:Textual analysis

2003-12-15 Thread John Kelsey
At 09:44 AM 12/13/03 -0600, Harmon Seaver wrote:
..
  And what is my supposed three-space paragraph lead-ins? The concept of
textual analysis to prove ID has always amused me. A competent writer can 
easily
change writing styles from moment to moment. I well recall a university 
english
lit prof almost accusing me of plagarism when I wrote a piece mimicking 
Faulkner
and doing so well enough that the prof actually started looking thru his works
trying to find it.
Textual analysis correctly identified the author of _Primary Colors_, 
though that was from a pretty small field of people with the right level of 
inside knowledge.  Does anyone know whether there have been real randomized 
trials of any of the textual analysis software or techniques?  E.g., is 
this an identification technique like DNA, or is it an identification 
technique like retrieving repressed memories under hypnosis (or, 
equivalently, consulting a ouiji board)?

It's not obvious to me how you'd change your writing style to defeat these 
textual analysis schemes--would it really be as simple as changing the 
average length of sentences and getting rid of the big words, or would 
there still be ways to determine your identity from that text?  I'm 
thinking especially of long discussions of technical topics--if I wrote a 
five page essay on what to look at when trying to cryptanalyze a new block 
cipher, I think it would be hard to keep readers who knew me from having a 
pretty good guess about the author, even if I tried changing terms, being 
more mathematical and less conversational, etc.  (Though this is more of a 
problem with humans familiar with my writing style, rather than with 
automated analysis.)

Harmon Seaver
CyberShamanix
http://www.cybershamanix.com
--John Kelsey, [EMAIL PROTECTED]
PGP: FA48 3237 9AD5 30AC EEDD  BBC8 2A80 6948 4CAA F259



Re: Textual analysis

2003-12-15 Thread Adam Shostack
On Sun, Dec 14, 2003 at 10:36:02AM -0500, John Kelsey wrote:
| Textual analysis correctly identified the author of _Primary Colors_, 
| though that was from a pretty small field of people with the right level of 
| inside knowledge.  Does anyone know whether there have been real randomized 
| trials of any of the textual analysis software or techniques?  E.g., is 

Not as far as I know, and I spent a bit of time reading through both
Author Unknown, by Don Foster (who named Klien) and Analyzing for
Authorship, by Jill Farringdon.

Foster is an English professor, and reads the work under analysis, and
then works by the potential authors.  His technique would be described
as intuitive, but the human brain has large power to make linkages.
Analysing for Authorship, from the University of Wales press.

Analyzing for Authorship really didn't strike me as better. It uses
a technique called CUSUM, but the methodology and graphs (as I
recall) vary from text to text, and neither I, nor Alice, who read the
book for ZKS, wondering if we could build this stuff into a product,
was very impressed by it.

| It's not obvious to me how you'd change your writing style to defeat these 
| textual analysis schemes--would it really be as simple as changing the 
| average length of sentences and getting rid of the big words, or would 
| there still be ways to determine your identity from that text?  I'm 
| thinking especially of long discussions of technical topics--if I wrote a 
| five page essay on what to look at when trying to cryptanalyze a new block 
| cipher, I think it would be hard to keep readers who knew me from having a 
| pretty good guess about the author, even if I tried changing terms, being 
| more mathematical and less conversational, etc.  (Though this is more of a 
| problem with humans familiar with my writing style, rather than with 
| automated analysis.)

So, the question boils down to economics.  There's how much you need
to communicate, how much someone is willing to spend to tag you, and
how good their proof needs to be.  I suspect that for most purposes,
proof does not need to be very strong in relation to your need to
communicate.   That is, if Tricky Dick thinks you're Deep Throat, or
Saddam thinks you're the guy who betrayed him, etc.

Adam



-- 
It is seldom that liberty of any kind is lost all at once.
   -Hume