Re: Run a remailer, go to jail?

2003-04-01 Thread Derek Atkins
Dave Emery [EMAIL PROTECTED] writes:

   For those on this list in the Boston area there is a hearing
 scheduled on the Mass Bill at 10 Am in Room 222 of the Mass State House
 in Boston.

10am on what date?

-derek

-- 
   Derek Atkins
   Computer and Internet Security Consultant
   [EMAIL PROTECTED] www.ihtfp.com



Re: Run a remailer, go to jail?

2003-04-01 Thread Derek Atkins
Peter,

I'll see if I can get there.  I'm not sure I can.  But I know a
number of other MIT-types who are considering going.  If I can
go I'll try to keep notes.  If I can't go, then hopefully someone
else can take some notes.

-derek

Trei, Peter [EMAIL PROTECTED] writes:

 Derek, etal
 
 If you (or anyone) goes, I'm sure we'd all appreciate some 
 notes on what transpired. I understand 17 different bills are 
 being considered at this hearing, so don't blink or
 you may miss it.
 
 Peter Trei

-- 
   Derek Atkins
   Computer and Internet Security Consultant
   [EMAIL PROTECTED] www.ihtfp.com



Re: responding to claims about TCPA

2002-08-11 Thread Derek Atkins

AARG!Anonymous [EMAIL PROTECTED] writes:

 I don't agree with this distinction.  If I use a smart card chip that
 has a private key on it that won't come off, is that protecting me from
 third parties, or vice versa?  If I run a TCPA-enhanced Gnutella that

Who owns the key?  If you bought the smartcard, you generated the key
yourself on the smartcard, and you control it, then it is probably
benefitting you.  If the smartcard came preprogrammed with a
certificate from the manufacturer, then I would say that it is
protecting the third party from you.

 I wrote earlier that if people were honest, trusted computing would not
 be necessary, because they would keep their promises.  Trusted computing
 allows people to prove to remote users that they will behave honestly.
 How does that fit into your dichotomy?  Society has evolved a myriad

The difference is proving that you are being honest to someone else
vs. an application proving to YOU that it is being honest.  Again, it
is a question of ownership.  There is the DRM side (you proving to
someone else that you are being honest) vs. Virus Protection (an
application proving to _you_ that it is being honest).

-derek

-- 
   Derek Atkins
   Computer and Internet Security Consultant
   [EMAIL PROTECTED] www.ihtfp.com




Re: Ross's TCPA paper

2002-06-24 Thread Derek Atkins

I, for one, can vouch for the fact that TCPA could absolutely
be applied to a DRM application.  In a previous life I actually
designed a DRM system (the company has since gone under).  In
our research and development in '96-98, we decided that you need
at least some trusted hardware at the client to perform any DRM,
but if you _did_ have some _minimal_ trusted hardware, that would
provide a large hook to a fairly secure DRM system.

Check the archives of, IIRC, coderpunks... I started a thread entitled
The Black Box Problem.  The issue is that in a DRM system you (the
content provider) wants to verify the operation of the client, even
though the client is not under your control.  We developed an online
interactive protocol with a sandbox environment to protect content,
but it would certainly be possible for someone to crack it.  Our
threat model was that we didn't want people to be able to use a hacked
client against our distributation system.

We discovered that if we had some trusted hardware that had a few key
functions (I don't recall the few key functions offhand, but it was
more than just encrypt and decrypt) we could increase the
effectiveness of the DRM system astoundingly.  We thought about using
cryptodongles, but the Black Box problem still applies.  The trusted
hardware must be a core piece of the client machine for this to work.

Like everything else in the technical world, TPCA is a tool..  It is
neither good nor bad; that distinction comes in how us humans apply
the technology.

-derek

Lucky Green [EMAIL PROTECTED] writes:

 Anonymous writes:
  Lucky Green writes regarding Ross Anderson's paper at: 
  Ross and Lucky should justify their claims to the community 
  in general and to the members of the TCPA in particular.  If 
  you're going to make accusations, you are obliged to offer 
  evidence.  Is the TCPA really, as they claim, a secretive 
  effort to get DRM hardware into consumer PCs? Or is it, as 
  the documents on the web site claim, a general effort to 
  improve the security in systems and to provide new 
  capabilities for improving the trustworthiness of computing platforms?
 
 Anonymous raises a valid question. To hand Anonymous additional rope, I
 will even assure the reader that when questioned directly, the members
 of the TCPA will insist that their efforts in the context of TCPA are
 concerned with increasing platform security in general and are not
 targeted at providing a DRM solution.
 
 Unfortunately, and I apologize for having to disappoint the reader, I do
 not feel at liberty to provide the proof Anonymous is requesting myself,
 though perhaps Ross might. (I have no first-hand knowledge of what Ross
 may or may not be able to provide).
 
 I however encourage readers familiar with the state of the art in PC
 platform security to read the TCPA specifications, read the TCPA's
 membership list, read the Hollings bill, and then ask themselves if they
 are aware of, or can locate somebody who is aware of, any other
 technical solution that enjoys a similar level of PC platform industry
 support, is anywhere as near to wide-spread production as TPM's, and is
 of sufficient integration into the platform to be able to form the
 platform basis for meeting the requirements of the Hollings bill.
 
 Would Anonymous perhaps like to take this question?
 
 --Lucky Green
 
 
 -
 The Cryptography Mailing List
 Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]

-- 
   Derek Atkins
   Computer and Internet Security Consultant
   [EMAIL PROTECTED] www.ihtfp.com




Re: PKI: Only Mostly Dead

2002-06-09 Thread Derek Atkins

[EMAIL PROTECTED] (Peter Gutmann) writes:

 For example the value
 1234567890 taken in isolation could be anything from my ICQ number
 to my shoe size in kilo-angstroms, but if you view it as the pair {
 ICQ domain, locally unique number } then it makes sense
 (disclaimer: I have no idea whether that's either a valid ICQ number
 or my shoe size in kilo-angstroms).

It's clearly not your shoe size in kilo-angstroms, unless you have
MIGHTY large feet.  According to 'units', that works out to 4860
inches.

-derek
-- 
   Derek Atkins
   Computer and Internet Security Consultant
   [EMAIL PROTECTED] www.ihtfp.com




Re: PKI: Only Mostly Dead

2002-06-09 Thread Derek Atkins

[EMAIL PROTECTED] (Peter Gutmann) writes:

 It's clearly not your shoe size in kilo-angstroms, unless you have MIGHTY
 large feet.  According to 'units', that works out to 4860 inches.
 
 Obviously it's my hat size then.

I always knew you had a fat head ;)

 Peter.

-derek

-- 
   Derek Atkins, SB '93 MIT EE, SM '95 MIT Media Laboratory
   Member, MIT Student Information Processing Board  (SIPB)
   URL: http://web.mit.edu/warlord/PP-ASEL-IA N1NWH
   [EMAIL PROTECTED]PGP key available