An Analysis of Compromised Remailers

2003-12-16 Thread John Young
This came in response to Cryptome's posting of Len Sassman's
comments on remailers.

-

From: S
Subject: Re: remailers-tla.htm Compromised Remailers, December 15, 2003
Date: Mon, 15 Dec 2003 16:16:17 -0700
To: [EMAIL PROTECTED]
Message-Id: [EMAIL PROTECTED]

Thank you for posting the Compromised Remailers article:


http://cryptome.org/remailers-tla.htm

Over the past year, many remailer users have noticed that the reliability of 
the Mixmaster type II network has steadily degraded. Although it may well be 
the result of TLA interference, the remailer community's statistical methods 
of selecting a reliable remailer chain contribute significantly to the 
network's degradation.

As a former employee of the United States Army Communications Command [USACC] 
Headquarters, I was amazed to stumble upon the existence of a publicly 
available communications medium permitting truly anonymous communication by 
hampering the government's ability at traffic analysis, or tracking an 
email message from its source to its destination. One would have to be 
foolish to believe that TLAs are not hard at work trying to pierce the veil 
of anonymity afforded by the Mixmaster type II, and, the yet to be released, 
type III remailers.

I ran tests in September, October  November, and provided the Mixmaster 
developers  remail operators with the same results I've included below. My 
testing was extremely simple: send a bunch of messages, and note which 

messages arrived. [The same procedure an accountant would use in tracking a 
financial transaction from its origin to its destination.]

What I found was that a handful of remailers accounted for virtually all of 
the un-delivered email messages. Yet, these same remailers, that never 
delivered my email messages to the alt.anonymous.messages news group, where 
also listed as among the most reliable remailers in mixmaster stats used to 
select remailer chains.

I've included my recommendations to improve the network's reliability in the 
test results below.

-
Mixmaster II Reliability Issues  Test Results
-

The major issue currently plaguing the Mixmaster remailer network is the true 
reliability of the LAST remailer in a chain. A considerable number of these 
remailers habitually act like Black Holes for email messages destined for 
alt.anonymous.messages and other news groups. 

Unfortunately, most of these Black Hole remailers also happen to be listed 
as among the most reliable remailers in mixmaster stats, with ratings ranging 
from the upper 90's to 100; consequently, it's highly probable that messages 
sent to newsgroups will frequently hit one of these demon remailers, never to 
reach their intended recipient.

Over the past 2 months, I've sent  tracked over 5,124 email messages 
consisting of either 4 or 6 copies of 1,220 unique messages, each routed 
through 11 Mixmaster type II remailers, to the alt.anonymous.messages news 
group.

---
Last Remailer   Lost Msgs  Delivered Msgs% Reliability
---
antani 63  0 0
cripto 65  0 0
hastio 41  0 0
george 31  718
paranoia   41 1020
futurew33  921
edo27  925
starwars   54 2935
itys7  956
italy   7 1059
bog 3 1482
freedom 3 4594
tonga   510695
liberty 2 5196
panta   3 6996
bigapple310497
metacolo3 9997

bogg1 5298
dizum   210698
jmbcv   1 5998
frell   0 34   100
randseed0  3   100
---
Sub-totals39582568
---
Total   1,220
---


Surprisingly - at first - I found that sending messages through chains of 
remailers rated, in mixmaster stats, at 98% or greater was FAR LESS reliable 

Re: An Analysis of Compromised Remailers

2003-12-16 Thread Len Sassaman
On Mon, 15 Dec 2003, John Young wrote:

 This came in response to Cryptome's posting of Len Sassman's
 comments on remailers.

(BTW, John -- while the threat originally started out as being about
compromised remailers, my comments had little to do with that title.
Perhaps remailer security would be a better index term for cryptome?)

 Over the past year, many remailer users have noticed that the reliability of
 the Mixmaster type II network has steadily degraded. Although it may well be
 the result of TLA interference, the remailer community's statistical methods
 of selecting a reliable remailer chain contribute significantly to the
 network's degradation.

There are conflicting opinions on that statement. For instance, have a
look at this threat on alt.privacy.anon-server:

http://groups.google.com/groups?selm=8eb77bbdadfd2a6d1b21efabc1e1e090%40firenze.linux.itoe=UTF-8output=gplain

So, on one hand we have the claim that remailer reliability is degrading
because of how we select reliable remailer chains, and on the other hand
there is the claim that the reliability is increasing, because TLAs are
the only entities competent to run reliable remailers. (Apparently, if you
believe this theory, you also believe I work for the FBI.)

The facts are that the remailer network's reliability has increased over
the past few years, largely due to the renewed development attention that
Mixmaster has received.


 I ran tests in September, October  November, and provided the Mixmaster
 developers  remail operators with the same results I've included below. My
 testing was extremely simple: send a bunch of messages, and note which

The tests below unfortunately do not provide any really useful data. What
is really being tested isn't the remailer reliability, but the mail to
news gateway reliability. It would be much more useful for the tester to
isolate which remailer/mail2news combinations are resulting in lost news,
and post that data instead.


--Len.



Remailers and TLAs

2003-12-16 Thread Nomen Nescio
Even though I agree this issue is important I wouldn't be surprised if NONE were run 
by TLAs today and NONE has ever been run by TLAs. We will never get any such answer 
and therefore these speculations will continue. Personally I think it sounds really 
stupid when I read comments like you can only trust remailers from pre 9/11 (these 
kinds of silly/stupid/dumb-paranoid comments are often seen on A.P.A-S). The reason 
being really that I think they are too stupid and perhaps doesn't really understand 
what good it would do them to actually operate a few. I may be wrong I guess. When 
thinking of these things I also remeber having read several comments by remops that 
actually have been visited by police. Both in U.S. and abroad. The feeling I got from 
reading their comments is that the police (in case of U.S. I think it was FBI who was 
inviolved) actually didn't even know what a remailer was. If (and this is a bif if) 
that is true in general amongst FBI agents I don't think th
 ere's a major risk of beeing flooded by TLA operated remailers any time soon. But who 
knows.



U.S. in violation of Geneva convention?

2003-12-16 Thread James A. Donald
--
On 16 Dec 2003 at 2:36, Anonymous wrote:
 I saw several people commenting the issue of Geneva 
 convention on CNN during the day. Also I saw an expert on 
 this field from another country commenting on the issue 
 stating that it was a clear violation of the convention. In 
 either of these interviews were there any discussion on 
 whether it didn't apply to this specific case due to what 
 clothings he happened to wear or whattever. I got the 
 impression that it was clear that the U.S. treatment wasn't 
 fully appropriate.

If you were watching the BBC, you would have thought most of
the Iraqi population were outraged by his capture.

I think you are suffering from New York Times syndrome If even 
the New York Times admits that the kulaks are happy and 
prosperous under Stalin, that shows you how great the Soviet 
Union really must be when you discount all that capitalist 
propaganda. 

--digsig
 James A. Donald
 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
 Lh9C/c3J2U0bybWlK/P0f5hnnZT1z+2QEe1K9Ev2
 4cVVWOLkCVsvYQG/u75vRB5xVrL2GjBeaEl+j6x07



Re: U.S. in violation of Geneva convention?

2003-12-16 Thread Tim May
On Dec 15, 2003, at 5:36 PM, Anonymous wrote:

I am not sure I agree. I am no expert on this however. I saw several 
people commenting the issue of Geneva convention on CNN during the 
day. Also I saw an expert on this field from another country 
commenting on the issue stating that it was a clear violation of the 
convention. In either of these interviews were there any discussion on 
whether it didn't apply to this specific case due to what clothings he 
happened to wear or whattever. I got the impression that it was clear 
that the U.S. treatment wasn't fully appropriate.
The U.S. would have screamed up and down in front of the U.N. and 
threatened severe reprisals if a U.S. prisoner were to have his (or 
her) mouth, hair, and medical exam televised by the Iranians, Syrians, 
Serbians, Iraqis, Panamanians, or any of the other nations we have gone 
to war with.

There are specific clauses which refer to not publically humiliating a 
prisoner. I'm surprised the Agitprop Division didn't show video of 
Saddam taking his first dump while in custody.

Saddam is not a good guy. But this went beyond the pale. I hope the 
next time a U.S. fighter is captured he is shown publically humiliated, 
with an Iranian or Syrian or French doctor forcing his mouth open and 
checking his hair for lice. The U.S. would be in no position to 
complain. (But they would, of course.)

But, what can one expect of a country which refers to its own 
terrorists who blow up commercial Cuban planes as freedom fighters 
and to Palestinians seeking to expel the Zionist Jew invaders as 
terrorists?

We are in Wonderland and the Republicrats are the Mad Hatters.

--Tim May
We are at war with Oceania. We have always been at war with Oceania.
We are at war with Eurasia. We have always been at war with Eurasia.
We are at war with Iraq. We have always been at war with Iraq.
We are at war with France. We have always been at war with France.


Re: U.S. in violation of Geneva convention?

2003-12-16 Thread R. A. Hettinga
At 8:43 PM -0600 12/15/03, J.A. Terranson wrote:
This report contains all the earmarks of pure propaganda.

:-)

Cheers,
RAH

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Re:Textual analysis

2003-12-16 Thread Major Variola (ret)
At 10:36 AM 12/14/03 -0500, John Kelsey wrote:
It's not obvious to me how you'd change your writing style to defeat
these
textual analysis schemes--would it really be as simple as changing the
average length of sentences and getting rid of the big words, or would
there still be ways to determine your identity from that text?

Its like steganalysis.  Its an arms race between measuring your own
signatures vs. what the Adversary can measure.  If sentence length
is a metric known to you, you can write filters that warn you.
Similarly for the Adversary.   You end up in an arms race
over metrics ---who has the more sensitive ones that the other
does not control for?



Re: U.S. in violation of Geneva convention?

2003-12-16 Thread James A. Donald
--
On 15 Dec 2003 at 20:06, privacy.at Anonymous Remailer wrote:
 The image of an Arab leader (however terrible) being 
 objectivised by a white gloved American medic like a bug on a 
 lab bench, will not be read in the Arab world as a moment of 
 liberation. It will be seen as a special kind of humiliation, 
 the kind which typifies the depth of ignorance which has 
 inspired this campaign from its outset.

Arabs respect power.  Well, everyone respects power, but arabs 
more so.

The image of Saddam being poked around will devastate the 
insurgents just as much as his bullet ridden body would have
done.  Either one works.

If he was cocky and defiant after being taken prisoner, that 
would have been a problem -- and I suspect that problem would 
have been swiftly solved.

What was done was an excellent use of him, perhaps the best 
possible use of him.


--digsig
 James A. Donald
 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
 DijbC0CdsDlDq+JMzf6Soaoy/uQpAPvQzIqw+vZV
 4V4l1cML3B68fAUZdXEQULOypQU+iOODMqAEAhN3z



Re: Textual analysis

2003-12-16 Thread coderman
Adam Shostack wrote:

...
| It's not obvious to me how you'd change your writing style to defeat these 
| textual analysis schemes--would it really be as simple as changing the 
| average length of sentences and getting rid of the big words, or would 
| there still be ways to determine your identity from that text?

So, the question boils down to economics.  There's how much you need
to communicate, how much someone is willing to spend to tag you, and
how good their proof needs to be.  I suspect that for most purposes,
proof does not need to be very strong in relation to your need to
communicate.
An interesting ad-hoc test subject might be Eleusis/ZWITTERION from
a.d.c.; I've wanted to see someone apply these techniques against his
writing after following his posts and being amused/surprised myself.
http://groups.google.com/groups?safe=offq=Eleusis+group%3Aalt.drugs.chemistry
http://groups.google.com/groups?safe=offq=ZWITTERION+group%3Aalt.drugs.chemistry
Strangely enough, the powers that be showed little interest in his
electronic trail ...
[ http://www.rhodium.ws/chemistry/eleusis/memoirs.html ]



Re: U.S. in violation of Geneva convention?

2003-12-16 Thread J.A. Terranson
On Mon, 15 Dec 2003, R. A. Hettinga wrote:

 At 5:21 PM + 12/15/03, Dave Howe wrote:
  Iraq was somehow involved in
 the Trade Center attacks too
 
 For those who wondered why Abu Nidal took two in the hat shortly before the
 daisycutters came to play:
 
 http://www.telegraph.co.uk/news/main.jhtml?xml=/news/2003/12/14/wterr14.xmlsSheet=/portal/2003/12/14/ixportaltop.html

This report contains all the earmarks of pure propaganda.  It includes
informations that repeats the Niger yellowcacke canard, the non-existent
AlQuaeda connection, etc.  

99  44/100ths percent bullshit.


-- 
Yours, 
J.A. Terranson
[EMAIL PROTECTED]

Unbridled nationalism, as distinguished from a sane and legitimate
patriotism, must give way to a wider loyalty, to the love of humanity as a
whole. Bah'u'llh's statement is: The earth is but one country, and mankind
its citizens. 

The Promise of World Peace
http://www.us.bahai.org/interactive/pdaFiles/pwp.htm



Re:Textual analysis

2003-12-16 Thread Morlock Elloi
 Its like steganalysis.  Its an arms race between measuring your own
 signatures vs. what the Adversary can measure.  If sentence length
 is a metric known to you, you can write filters that warn you.
 Similarly for the Adversary.   You end up in an arms race
 over metrics ---who has the more sensitive ones that the other
 does not control for?

But unlike stego, where the issue is faking the noise, personal fingerprints
can be removed from the message more reliably. You just need the right gloves.

One way is to use automated translators. They all have an internal language
and modules that translate to and from it. The internal language is far more
restricted than the natural one, so it doesn't leak many aspects of the
linguistic fingerprint. Going to the internal form is lossy compression.
There is no way to recreate the original.

The simplest method is an englih-to-english translator. Better method, and
thicker gloves, can be used by going through several from/to modules for
different languages. In commercial engines the meaning starts to suffer after
3-4 steps but just before that happens the word ordering and use gets
completely skewed.

Of course, you have to buy the translator and not use the online
google/babelfish access. It's the small things that get you ...



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
New Yahoo! Photos - easier uploading and sharing.
http://photos.yahoo.com/



Re: cpunk-like meeting report

2003-12-16 Thread V Alex Brennen
Tim May wrote:
On Dec 14, 2003, at 6:07 PM, [EMAIL PROTECTED] wrote:

Hi, I've been admiring your and Tim's contributions, and I was 
wondering if
either of you were planning to subscribe to the (new) news list.

http://lists.cryptnet.net/mailman/listinfo/cpunx-news
No, we don't need a cpunx-news list. This is what Google and the 
ability to see hundreds of various lists and sites is for.
I don't even plan on subscribing myself.  I just wanted to get
the traffic off of cypherpunks.
Back when I first joined this list, cypherpunks where
known for making news, not reading it. I recognized some
addresses posting here recently from other lists that may
suggest a revival is possible if we can clean things up a
bit.
For the most part, the only people who subscribed to the
new list are the people who tend to forward news
announcements.  There seems to be very few consumers
(4 out of 7 subscribers on the new list - there's 8 total
so far, one person subscribed twice).
- VAB

--
V. Alex Brennen  [EMAIL PROTECTED]
  http://www.cryptnet.net/people/vab/
   F A R  B E Y O N D  D R I V E N !


Re: cpunk-like meeting report

2003-12-16 Thread Tim May
On Dec 16, 2003, at 7:50 AM, V Alex Brennen wrote:

Tim May wrote:
On Dec 14, 2003, at 6:07 PM, [EMAIL PROTECTED] wrote:
Hi, I've been admiring your and Tim's contributions, and I was 
wondering if
either of you were planning to subscribe to the (new) news list.

http://lists.cryptnet.net/mailman/listinfo/cpunx-news
No, we don't need a cpunx-news list. This is what Google and the 
ability to see hundreds of various lists and sites is for.
I don't even plan on subscribing myself.  I just wanted to get
the traffic off of cypherpunks.
Back when I first joined this list, cypherpunks where
known for making news, not reading it. I recognized some
addresses posting here recently from other lists that may
suggest a revival is possible if we can clean things up a
bit.
For the most part, the only people who subscribed to the
new list are the people who tend to forward news
announcements.  There seems to be very few consumers
(4 out of 7 subscribers on the new list - there's 8 total
so far, one person subscribed twice).
This figures. And I doubt subscriptions will ever climb much higher.

We've heard similar clamorings for chat and technical and 
announcement sub-lists many times in the past. Nevermind that the 
main list is not terribly high-volume. Nevermind that sub-lists tends 
to wither away. (As when a relatively small city like Monterey gets 
monterey.config, monterey.events, monterey.forsale, monterey.general, 
and monterey.test, all of which are nearly empty or filled only with 
Usenet spam. But, hey, someone thought that what Monterey needed to 
boost traffic was a bunch of newsgroups. Didn't happen, the traffic, 
that is.)

As for Cypherpunks, this was done. Several Usenet newsgroups, which are 
perfectly fine for news announcements, were created by someone (no 
doubt long-since gone on to other projects). Here they are:

alt.cypherpunks
alt.cypherpunks.announce
alt.cypherpunks.social
alt.cypherpunks.technical
But, hey, I hope the subscribers to the new list send their dumpings 
there.

--Tim May





I think the root of the problem is that we tend to organize ourselves 
into tribes.  Then people in the tribe are our friends, and people 
outside are our enemies.  I think it happens like this: Someone uses 
Perl, and likes it, and then they use it some more.  But then something 
strange happens.  They start to identify themselves with Perl, as if 
Perl were part of their body, or vice versa.  They're part of the Big 
Perl Tribe.  They want other people to join the Tribe.  If they meet 
someone who doesn't like Perl, it's an insult to the Tribe and a 
personal affront to them.
--Mark Dominus, Why I Hate Advocacy, 2000



Re: cpunk-like meeting report

2003-12-16 Thread Eugen Leitl
On Tue, Dec 16, 2003 at 10:50:51AM -0500, V Alex Brennen wrote:

 I don't even plan on subscribing myself.  I just wanted to get
 the traffic off of cypherpunks.

Fair enough. You can remove the list, as far as I'm concerned.
I don't give a damn about posting copyrighted content; no point posting to a
closed-archive list if you've got cold feet. I can hide that information
on my own hard drive as well.

 Back when I first joined this list, cypherpunks where
 known for making news, not reading it. I recognized some

The world has moved on since, unfortunately. Wake up, and smell the Kafka.

 addresses posting here recently from other lists that may
 suggest a revival is possible if we can clean things up a
 bit.

Yeah, you and John Galt.

 For the most part, the only people who subscribed to the
 new list are the people who tend to forward news
 announcements.  There seems to be very few consumers

Which part of collaborative news filtering you don't understand?
Ideally, one should a producer and consumer in one person.
Alas, most people are passive slobs, so it takes a lot of them to become
critical.

 (4 out of 7 subscribers on the new list - there's 8 total
 so far, one person subscribed twice).

Transhumantech has 300 subscribers. Five of them are active posters.
I consider the list a success, and read it daily. It took several years to
get there.

Cypherpunk agenda is supposed to be a _widely_ held secret.

-- Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net

[demime 0.97c removed an attachment of type application/pgp-signature]



CarBomb Rips Berkeley, CA

2003-12-16 Thread wguerin
CarBomb Rips Berkeley California

A large though prude carbomb rips through the student community of Berkeley, 
CA at exactly 4:20 am pacific time on friday Dec. 12th.

Friday December 12th, 4:20am Pacific, Berkeley California:

The device, a 10 element remotely detonated carbomb rips through the dense 
student populated section of Berkeley, CA less than 4 blocks from the 
southwest corner of the UCB campus.

An audio recording by a student preparing her oral component of a final 
documents the sequential detonation of a 3-element primary fired by a tap off 
the vehicles car horn security system, followed by between 5 and 8 secondary 
charges detonated presumably by burnout. 

Students in the area have exactly 2 comments on the event:

Most living in the adjacent appartments say in a monotonic way: I'm sorry, I 
do NOT know what you are talking about. and a limited few others, also from 
the same areas, say I am not at liberty to discuss these issues.

Students from the surrounding appartment complexes are concerned about the 
excessive secrecy regarding this explosion that woke over half the people 
within a quarter mile radius, early friday morning.

The explosive elements, after audio analysis, appear to be roughly equivalent 
to 10 cases of TNT.

At least one Berkeley Police Department officer has said that they had a NO 
RESPONSE VECTOR during and prior the time of the explosion. This author has 
not yet determined the meaning of this phrase.

Numerous appartment complexes in the surrounding area have had multiple 
unexplained fire alarms and other strange activities in the last few days.

No mass media coverage or documentation has been available to this author, and 
most parties researching this event are hesitant to discuss for obvious 
reasons.



(forwarded - WLG)



[fc-announce] FC'04: Call for Participation

2003-12-16 Thread R. A. Hettinga
--- begin forwarded text


Status:  U
From: Hinde ten Berge [EMAIL PROTECTED]
Organization: Embryo
To: [EMAIL PROTECTED]
Subject: [fc-announce] FC'04: Call for Participation
Sender: [EMAIL PROTECTED]
List-Id: Financial Cryptography Conference Announcements fc-announce.ifca.ai
List-Post: mailto:[EMAIL PROTECTED]
List-Help: mailto:[EMAIL PROTECTED]
List-Subscribe: http://mail.ifca.ai/mailman/listinfo/fc-announce,
mailto:[EMAIL PROTECTED]
List-Archive: http://mail.ifca.ai/pipermail/fc-announce/
Date: Tue, 16 Dec 2003 19:56:27 +0100

Financial Cryptography '04
9-12 February 2004
  Key West, Florida, USA


  Call for Participation

Financial Cryptography is the premier international
forum for education, exploration, and debate at the
heart of one theme: Money and trust in the digital
world. Dedicated to the relationship between cryptography
and data security and cutting-edge financial and payment
technologies and trends, the conference brings together
top data-security specialists and scientists with
economists, bankers, implementers, and policy makers.

Financial Cryptography includes a program of invited
talks, academic presentations, technical demonstrations,
and panel discussions. These explore a range of topics
in their full technical and interdisciplinary complexity:
Emerging financial instruments and trends, legal
regulation of financial technologies and privacy issues,
encryption and authentication techologies, digital cash,
and smartcard payment systems -- among many others.

The conference proceedings containing all accepted
submissions will be published in the Springer-Verlag
Lecture Notes in Computer Science (LNCS) series after
the conference. A pre-proceedings containing preliminary
versions of the papers will be distributed at the
conference.

More information on the invited speakers is available
on the web site, as well as the list of accepted papers
and the preliminary schedule (see below as well).

Registration for Financial Cryptography 2004 is now open;
details and online registration can be found at
http://fc04.ifca.ai along with information about
discounted hotel accommodation and travel.

Financial Cryptography is organized by the International
Financial Cryptography Association (IFCA). More
information can be obtained from the IFCA web site at
http://www.ifca.ai or by contacting the conference
general chair, Hinde ten Berge, at [EMAIL PROTECTED]



Financial Cryptography '04
   Preliminary Schedule


Sunday February 8

[tba] Registration and Welcome Reception


Monday February 9

08:45-09:00 Opening Remarks

09:00-10:00 Keynote Speaker: Jack Selby

10:00-11:00 Keynote Speaker: Ron Rivest

11:00-11:30 Coffee Break

11:30-12:30 Loyalty and Micropayment Systems

Microcredits for Verifiable Foreign Service
Provider Metering
Craig Gentry and Zulfikar Ramzan

A Privacy-Friendly Loyalty System Based on Discrete
Logarithms over Elliptic Curves
Matthias Enzmann, Marc Fischlin, and Markus Schneider

12:30-14:00 Lunch

14:00-15:00 User Authentication

Addressing Online Dictionary Attacks with Login
Histories and Humans-in-the-Loop
S. Stubblebine and P.C. van Oorschot

Call Center Customer Verification by Query-Directed
Passwords
Lawrence OGorman, Smit Begga, and John Bentley


Tuesday February 10


09:00-10:00 Keynote Speaker: Jacques Stern
(Session Chair: Moti Yung)

10:00-11:00 Keynote Speaker: Simon Pugh
(Session Chair: Moti Yung)

11:0011:30 Coffee Break

11:30-12:30 E-voting
(Session Chair: Helger Lipmaa)

The Vector-Ballot E-Voting Approach
Aggelos Kiayias and Moti Yung

Efficient Maximal Privacy in Voting and Anonymous
Broadcast
Jens Groth

12:30-14:00 Lunch

14:00-15:00 Panel: Building Usable Security Systems
Moderator: Andrew Patrick

Usability and Acceptablity of Biometric Security
Systems
Andrew Patrick, National Research Council of Canada

Risk Perception Failures in Computer Security
L. Jean Camp, Harvard University

Visualization Tools for Security Administrators
Bill Yurcik, NCSA, Univeristy of Illinois

20:00-21:00 General meeting

21:00-  Rump session


Wednesday February 11

09:00-10:00 Keynote Speaker: Jon Peha

10:00-10:30 Coffee Break

10:30-12:30 Auctions and Lotteries
(Session Chair: Roger Dingledine)

Interleaving Cryptography and Mechanism Design: The
Case of Online Auctions
Edith Elkind and Helger Lipmaa

Secure Generalized Vickrey Auction without Third-Party
Servers
Makoto Yokoo and Koutarou Suzuki

Electronic National Lotteries
Elisavet Konstantinou, Vasiliki Liagokou, Paul
Spirakis, Yannis C. Stamatiou, and Moti Yung

Identity-based Chameleon Hash and Applications
Giuseppe Ateniese and Breno de 

Re: U.S. in violaton of Geneva convention?

2003-12-16 Thread Nomen Nescio
This makes me a bit curious. Tell me, is your opinion then that the U.S. has done 
nothing questionable here? You don't feel that treating a former head of state 
(regardless of what you happen to think of that person) in this manner and 
videorecording it AND transmitting it to the entire globe violates the spirit of the 
convention? You feel this was the right thing to do? You would have no problem seing a 
U.S. or European leader being treated the same way? 

I think we do have to take into consideration too that a lot of people (I'm not saying 
it's the majority or anything but still a lot of people) in some arab countries like 
Jordan, Egypt, Syria and Saudi Arabia do have some sympathy with Saddam. This has 
nothing to do with supporting his crimes like the chemical warfare but more general 
the fact that he was a leader in the region who stood up against U.S. and Israel. Also 
the Palestinians received a lot of finansial help from Saddam.

I don't know, but I have this feeling that just maybe this wasn't the most appropriate 
way to behave all things considered. This is a tense and volatile region as it is. I 
think we all should exercise caution and careful considerations and try to not 
humiliate the pride of the people in this region. Remember that in many cases this is 
almost all they have left.

Just my 2c.



Re: U.S. in violaton of Geneva convention?

2003-12-16 Thread Jim Dixon
On Tue, 16 Dec 2003, Nomen Nescio wrote:

 This makes me a bit curious. Tell me, is your opinion then that the
 U.S. has done nothing questionable here?

No one seems to question certain facts:

*  Saddam had hundreds of thousands of Iraqis tortured and killed
*  he used chemical weapons casually, wiping out at least one Kurdish
   village of several thousand people
*  he deliberately destroyed the swamp Arabs and the environment that
   they lived in
*  his regime treated POWs brutally; few people in Britain will forget
   the pilot who was badly beaten during the first Gulf War and then
   displayed on TV; few Americans will forget the wounded POWs
   interrogated on TV in the second

The people on this list are less likely to remember that Saddam's coming
to power was marked by the public humiliation and hanging of Americans
unfortunate enough to be in Baghdad at the time.

  You don't feel that treating
 a former head of state (regardless of what you happen to think of that
 person) in this manner and videorecording it AND transmitting it to
 the entire globe violates the spirit of the convention?

You mean, do I think that it is somehow immoral to have examined him for
head lice and then checked his teeth?  Well, no.  Do I think that the
Geneva convention is there to protect bandits, thugs, and tyrants?  Well,
no. If you read it, the focus is on protecting civilians and captured
soldiers from the sort of abuse that Saddam considered normal.

 You feel this
 was the right thing to do? You would have no problem seing a U.S. or
 European leader being treated the same way?

Hitler, you mean?  Or did you have Milosevic in mind?

You should try to remember how the US Civil War ended.  The armed forces
of the South surrendered.  Lee handed his sword to Grant.  I believe that
Grant returned it - and allowed each Southern soldier to keep a rifle and
a mule.  Lee and the other leaders of the South lived out their lives in
peace.  There were of course acts of terror on both sides, but on the
whole the combatants behaved decently. There was considerable mutual
respect, because both sides recognized that the other had behaved
honourably.  The same cannot be said of Saddam Hussain.

The people of the South did not walk in terror of Robert E Lee and
Jefferson Davis. The people of the North were not murdered, raped, and
tortured by Grant and Lincoln.

 I think we do have to take into consideration too that a lot of people
 (I'm not saying it's the majority or anything but still a lot of
 people) in some arab countries like Jordan, Egypt, Syria and Saudi
 Arabia do have some sympathy with Saddam. This has nothing to do with
 supporting his crimes like the chemical warfare but more general the
 fact that he was a leader in the region who stood up against U.S. and
 Israel. Also the Palestinians received a lot of finansial help from
 Saddam.

Yeah, you're right.  I forgot that Saddam paid $25,000 or so to the family
of each Palestinian 'soldier' who blew himself up, slaughtering innocent
civilians in the sort of attack that the Geneva conventions were designed
to prevent.  The Palestinian suicide bombers wear no uniforms, they
conceal their weapons, they deliberately target civilians.

This has nothing to do with the justice for the Palestinians or whether
the Israelis are right or wrong.  The Geneva conventions, which you seem
to be advocating, were established to set limits on the behaviour of
combatants in war, to encourage the sort of peaceful resolution that
marked the end of the American Civil War.  What Saddam wanted was just the
opposite. He advertised and paid for routine violations of the Geneva
conventions in Israel.  He wanted hatred and endless violence.

 I don't know, but I have this feeling that just maybe this wasn't the
 most appropriate way to behave all things considered. This is a tense
 and volatile region as it is. I think we all should exercise caution
 and careful considerations and try to not humiliate the pride of the
 people in this region. Remember that in many cases this is almost all
 they have left.

The US plan appears to intend to stall until the Iraqis have regained
sovereignty and then turn Saddam over to the new government, which will
probably follow local practice and execute him.  This will please tens of
millions of Iraqis.  The UK government, which has a long tradition of
ignoring the wishes of the British people in regard to capital punishment,
will tut-tut.  The ex-governor of Texas will doubtless say again that he
does not intend to express any personal opinions in the matter -- and
smile.

I spent several years travelling in that part of the world.  From my
experience, I think that the people of the region, who are rightfully
proud of their heritage, of their traditions and beliefs, will respect the
US and the UK more for having shown obviously superior strength, and for
having 

Re: U.S. in violaton of Geneva convention?

2003-12-16 Thread Steve Schear


At 03:18 PM 12/16/2003, Jim Dixon wrote:
You should try to remember how the
US Civil War ended. The armed forces
of the South surrendered. Lee handed his sword to Grant. I
believe that
Grant returned it - and allowed each Southern soldier to keep a rifle
and
a mule. Lee and the other leaders of the South lived out their
lives in
peace. There were of course acts of terror on both sides, but on
the
whole the combatants behaved decently. There was considerable 
mutual
respect, because both sides recognized that the other had behaved
honourably. The same cannot be said of Saddam
Hussain.
I have no idea what led to believe this. The North behaved so
dishonorably during the war that it essentially rewrote the book on the
rules of war for the rest of the world. Most academic historians,
without legal training, have played down the war crimes issue, as if it
has no bearing on those who win a war. It does.
In the early seventeenth century, Hugo Grotius, a Dutch lawyer, came
forth with The Law of War and Peace, which was translated into
English in 1646. It immediately became the bible of the law of nations
and found its way into the courts, libraries, and governments of Europe.
Grotius soon became the father of modern international law.
Grotius held that states, like people, are bound by a code of law, with
duties and prohibitions that are universal, reasonable, and unchangeable.
One nation, for example, may not attack another. After reviewing the
practices of ancient nations, philosophers and legists, Grotius concluded
that authorities generally as­sign to wars three justifiable
causes: defence, recovery of property, and punishment.
Grotius noted that the German barbarians of the north had a strong code
and were the most just: they refrained from war unless
attacked. The Ro­man lawyer Cicero would have been the father of
ancient international law. In his De Republica (30.23) he set
forth the principle that wars undertaken without reason are unjust
wars. Except for the purpose of avenging or re­pulsing an enemy, no just
war can be waged.
By the nineteenth century, the concept of a just war became a part of the
law of nations even though it had been an unwritten rule of society since
the Middle Ages. Many of the tax rebellions in Europe, Spain, and England
were resisting revenue demands of unjust wars, wars that were not for the
defense of the realms. That same principle became part of the U.S.
Constitution, which restricted tax expenditures for the common
Defense.
At West Point cadets were taught the principles of Grotius and
international law under General Order no. 12, by none other than
Lincoln's top commander, General Henry Halleck, who wrote the book. No
general dur­ing the Civil War can claim ignorance of the laws of wars,
especially the laws against the plunder and devastation of private
property. Here is an ex­cerpt from General Order no. 12, written by
Halleck on the wanton plun­der of private property: The inevitable
consequences . . . are universal pil­lage and a total relaxation of
discipline; the loss of private property, and the violation of individual
rights . . . and the ordinary peaceful and non­combatants are converted
into bitter and implacable enemies. The system is, therefore, regarded as
both impolitic and unjust, and is coming into gen­eral disuse among the
most civilized nations.
But Halleck's book and teachings weren't the only condemnation of plunder
of civilian property. On 24 April 1863, under Lincoln's signature, the
army promulgated to its officers General Order no. 100, which came to be
known as the Lieber Code and eventually received acclaim throughout the
military in the Western world. Halleck was a close friend of its author,
Professor Francis Lieber of Columbia University. A month after this order
was given to the officers in the Union army, Professor Lieber wrote to
the top commander, General Halleck
I know by letters . . . that the wanton destruction of property by
our men is alarming. It does incalculable injury. It demoralizes our
troops, it annihilates wealth irrevocably and makes a return to a state
of peace and peaceful minds more and more difficult. Your order [to the
offi­cers] . . . with reference to the Code, and pointing out the
disastrous consequences of reckless devastation, in a manner that it
might not furnish our reckless enemy with new arguments for his
savagery.
Halleck remained general in chief until Lincoln fired him in 1864 and
appointed Grant as top commander. 1t was under Grant that the Lieber
Code, now in the hands of all leading officers, was disregarded, and
pillage and plunder became the general order of the final year of the
war. Sherman and Sheridan could not possibly have undertaken their
devastation of the South if they had followed this new military code on
the laws of war. They also turned away from their education at West Point
and the laws of war they had learned there under Halleck.
Years after the war Sherman wrote a letter to a friend in