Re: X-Cypher, SIP VoIP, stupid propriatory crapola
On Wed, 28 Jul 2004, Dave Howe wrote: Particularly disgusted by the last paragraph | With encryption comes the problem of either managing public/private | keys, which must be kept secret, or the annoyance of transmitting a | secure key to a remote party over other secure methods. X-Cipher | eliminates these issues. No public/private keys exist to guard and keep | safe and worry about theft and reuse. Each conversation through | X-Cipher gets a unique secure key generated by an X-Cipher server using | strong Crypto random safe algorithms. Sounds like an anonymous Diffie-Hellman session key, wrapped in marketing bullshit. Usable, but susceptible to MITM.
Re: Email tapping by ISPs, forwarder addresses, and crypto proxies
At 06:44 PM 7/24/04 -0500, J.A. Terranson wrote: On Sat, 24 Jul 2004, Major Variola (ret) wrote: There might be blind cypherpunks, we don't discriminate[1], There Is No We. touche' [1] the original phone phreaks were blind, This is a ridiculous statement, and even worse, leaks information about your nym: [young enough to have not been there]. Yes. Did you know that your teeth enamel contain isotope ratios that encode regions where you might have grown up around age 6? Ask Otzi. You are thinking of Joe Whistler Joe Egressia (sp?), and the kid form New York whose names escape me at the moment. These two do not even com close to the original phone phreaks were blind. More like at least two of the original batch of phreaks were blind. Ok, so this was book reading. Sosume. I once worked for a guy who hired Capt'n Crunch, *briefly*. [This is reference to a digression later in the thread. His dentition was not discussed.] -- WE are all just voices in Tim May's head.
Re: Email tapping by ISPs, forwarder addresses, and crypto proxies
On Wed, 28 Jul 2004, Major Variola (ret) wrote: Did you know that your teeth enamel contain isotope ratios that encode regions where you might have grown up around age 6? Yes. I am also aware that tooth enamel has the interesting property of trapping a fantastic number of parmaceuticals. The teeth can be used to lay out a life history of drug [ab]use, from simple tetracycline use as a kid through to the occasional lines as an adult. AFAIK, the tests now available are simply qualitative, and without accurate date-stamping, but I am no expert in this area (so if it's important to you, seek Knowledgeable Assistance (tm)). I once worked for a guy who hired Capt'n Crunch, *briefly*. Yeah. Most people find John a bit difficult to stomach for long. While I won't go into my personal interactions with him here, it is worth noting that I take pains to point out that John is *not* representative of the average phreak when I teach classes touching on that area. Remember: John spent a great deal of time bemoaning the fact that secrets was published, and that it was going to end phreaking, yet *he* was the one who spent all the time talking to the goddamned reporter! John is not, IMNSHO, well pasted together. Besides, he has the most disturbing physical motions I have ever seen in another human being. The way he moves his body tells you there is something wrong - you don't even need to talk to him before the hairs on the back of your neck start screaming for cover :-( [This is reference to a digression later in the thread. His dentition was not discussed.] Thank god... -- Yours, J.A. Terranson [EMAIL PROTECTED] 0xBD4A95BF ...justice is a duty towards those whom you love and those whom you do not. And people's rights will not be harmed if the opponent speaks out about them. Osama Bin Laden - - - There aught to be limits to freedom!George Bush - - - Which one scares you more?
Re: Email tapping by ISPs, forwarder addresses, and crypto proxies
At 03:52 PM 7/27/04 -0400, Tyler Durden wrote: Variola wrote... In the *public* lit. Well, perhaps but perhaps not. Burst-mode signaling, transceivers, and networking technology are a good example. If you see DISA, NSA, and DARPA all working with the acknoledged experts inthe academic field, and if you see them spending $$$ on burst-mode testbeds, then it's clear that there are some issues they haven't solved. You're right on this, I admit. Its clear that things like smart dust and gait recognition and autonomous cruising across the desert are not things the Beast has yet. There just happen to be physical limitations. But I have zero doubt that the NSA can't make a laser that is siginificantly more efficient than what I can buy off the shelf. I'm not one to dispute physics. However most professional skeptics (eg cryptographers) grant the adversary anything from 2 to 10 x the COTS tech. Do you *really* think the NSA's DesCrack was built with old Sun chassis like Gilmore, Kocher, et als??? Remember that the spookfabs don't have to contend with *economics and yield*. They can use *radioisotopes*. Subs can lay independant cable. Not a lot of folks walk along the undersea cables, to say nothing of how bribable telecom folks are. Conservativism sometimes means being liberal in modelling others' capabilities. -- Be Useful -the Baron
Thanks Declan
1. Thanks Declan for pruning my beliefs ---I had actually thought the younger, stupider, more surrounded by idiots Bush had puked that quote re Athiests not being 'Merikans. But Googling and your 0-ROI investment in Lexis-Nexus shows that stupidity is heriditary. But this is why you are an investigative reporter and I a rube. Bush the Elder it shall be. 2. I asked my dad, who has similar L-N access, about my current manager, and managed to find that he had had 2 different SSNs (and what they were) as well as where he had lived the last 10 or so years. Other than lying to a hospital to get past HIPAA I have never in four decades been a social engineer. Always good to have something to ask the boss from the don't export here country :-) 3. The UPTSO informed me similarly, if not so exploitably, about a productive colleage next 'cube over. Employer, place of residence, year. 4. It amuses me that my last 2 crypto bosses have both been born in the do not export here list of political tiles... 5. Science vol 304 25 June 2004 pp1896-1897 documents a physicists retreat wherein the weirdness of quantum physics was discussed. 5.1 Us hidden variable types still keep the faith amongst respiring physicists. 5.2 It may be possible in 20 years (tm) to prove that you can't build a 128 programmable qbit machine; or as some of the more paranoid amongst us worry about, an existence proof may exist. Depending on your understanding of decoherence. If its exponentially harder to run quantum computation for bigger problems the 'tographers would have beaten the 'analysts yet again. But that's way over my head. #1: The result suggest that the basic stuff of the universe is information, he says #2: What's it mean to say that the universe if just information? To me, information has to be information about something Personally all the bits I've ever seen have been states of some *thing*. Try to figure out why anyone who'se been receiving Earth RF has *not* tried beaming a signal back...-DH
Re: Email tapping by ISPs, forwarder addresses, and crypto proxies
Remember that the spookfabs don't have to contend with *economics and yield*. Damn, this is precisely where I wish Tim May was still around. Certainly, the Spooks have their own fabs, and I don't think they even hide this fact (I doubt they could, ultimately). And certainly, the Spooks crank out all sort of special ASICs using their own IP as well as some store-bought stuff they drop onto their designs. However, where I have some BIG doubts is whether their fab is X generations ahead of the most advanced commercial fabs. Frankly, I bet they have a pretty good fab that was modified by a commercial vendor to support small production runs. This fab, however, does not utilize cosmic rays for etching or whatever. It's probably 0.13 microns at best (wait...I think Taiwan Semi and a couple of other places are one step ahead of this). This limits what they can do with a chip or chipset, and implies that they won't be orders of magnitude better at opening up LOTS of traffic. (In non-troll mode.) -TD From: Major Variola (ret) [EMAIL PROTECTED] To: [EMAIL PROTECTED] [EMAIL PROTECTED] Subject: Re: Email tapping by ISPs, forwarder addresses, and crypto proxies Date: Wed, 28 Jul 2004 21:34:59 -0700 At 03:52 PM 7/27/04 -0400, Tyler Durden wrote: Variola wrote... In the *public* lit. Well, perhaps but perhaps not. Burst-mode signaling, transceivers, and networking technology are a good example. If you see DISA, NSA, and DARPA all working with the acknoledged experts inthe academic field, and if you see them spending $$$ on burst-mode testbeds, then it's clear that there are some issues they haven't solved. You're right on this, I admit. Its clear that things like smart dust and gait recognition and autonomous cruising across the desert are not things the Beast has yet. There just happen to be physical limitations. But I have zero doubt that the NSA can't make a laser that is siginificantly more efficient than what I can buy off the shelf. I'm not one to dispute physics. However most professional skeptics (eg cryptographers) grant the adversary anything from 2 to 10 x the COTS tech. Do you *really* think the NSA's DesCrack was built with old Sun chassis like Gilmore, Kocher, et als??? Remember that the spookfabs don't have to contend with *economics and yield*. They can use *radioisotopes*. Subs can lay independant cable. Not a lot of folks walk along the undersea cables, to say nothing of how bribable telecom folks are. Conservativism sometimes means being liberal in modelling others' capabilities. -- Be Useful -the Baron _ Overwhelmed by debt? Find out how to Dig Yourself Out of Debt from MSN Money. http://special.msn.com/money/0407debt.armx
[OT] Apple calls Real a hacker
http://money.cnn.com/2004/07/29/technology/apple_real/ Interesting non-cypherpunkish stuff. So Real goes off and does some reverse engineering so it can use Apple's DRM to publish its own stuff for iPod's. Interestingly, Apple wants to sue using the DMCA, *BUT* where it gets interesting is that IMHO, Real didn't provide a crack to Apple's DRM, rather it used it for its own benefit. So will the DMCA even apply? Even more interesting, Real used publically available documents so they didn't do the reverse engineering themselves, so they're not likely to be sued on that aspect - though quite likely this is based on the fair play stuff which was based on reverse engineering... This might also have ramifications concerning things like X-Box and modchips. i.e. if Apple loses, then it will be legal for someone to build a modchip to allow X-Box's to run Linux (but not play copied games.) It will be an interesting fight, and if we, the consumers, are lucky, then perhaps some of the evil provisions in the DMCA will go away so we can get some more interoperability instead of vendor lock-in. --Kaos-Keraunos-Kybernetos--- + ^ + :I find it ironic that, on an amendment designed to protect /|\ \|/ :American democracy and our constitutional rights, the /\|/\ --*--:Republican leadership in the House had to rig the vote and \/|\/ /|\ :subvert the democratic process in order to prevail \|/ + v + : -- Rep. Sanders re vote to ammend the US PATRIOT ACT. -- http://www.sunder.net