patriot act and public key encryption

2003-02-07 Thread Michael Cardenas
If secret searches with secret warrants are legal now, what good is it
to use public key encryption and keep a backup of your private key at
home on a floppy?

Is there a protocol to have a blinded private key, so you wouldn't
actually have access to your own private key?

--
michael cardenas   | lead software engineer, lindows.com
hyperpoem.net  | GNU/Linux software developer
people.debian.org/~mbc | encrypted email preferred

That government is best which governs not at all
- Henry David Thoreau

[demime 0.97c removed an attachment of type application/pgp-signature]




Re: Life Sentence for Medical Marijuana?

2003-01-31 Thread Michael Cardenas
I think this is what you call taxation without representation

Note also, that the judge in the case was the brother of the supreme
court judge who bush appointed who's totally opposed to these sates
right cases. 

Great how bush's daughter, the cocaine addict, isn't in jail, but this
man, who was deputized by the city of oakland to grow this marijuana,
is going to be in jail for 20 years. Bush himself was arrested for
DUI, I wish he was rotting in jail instead of ed. 

disgusting. 

On Fri, Jan 31, 2003 at 04:50:00PM -0800, Eric Cordian wrote:
 http://www.foxnews.com/story/0,2933,77234,00.html
 
 The Feebs are crowing over their latest victory, having just obtained a
 conviction against a medical marijuana grower for the city of Oakland.
 
 The individual was of course prohibited from any mention at his trial
 of medical marijuana, that he was growing the stuff legally under a
 1996 state law, or any other mitigating factors. 

There is no such thing as medical marijuana, said 
 Richard Meyer, a DEA spokesman. We're Americans 
 first, Californians second.
 
 Actually, I think that should be Assholes First.
 

-- 
michael cardenas   | lead software engineer, lindows.com
hyperpoem.net  | GNU/Linux software developer
people.debian.org/~mbc | encrypted email preferred

We, the men of the mind, are now on strike against you in the name of
a single axiom, which is the root of our moral code, just as the root 
of yours is the wish to escape it: the axiom that existence exists.
- Ayn Rand, Atlas Shrugged



msg04526/pgp0.pgp
Description: PGP signature


[Fwd: ScanMail Message: To Sender, sensitive content found and action t aken.]

2003-01-09 Thread Michael Cardenas
Anyone have any idea what the fuck this is? Is the post office
subscribed to cypherpunks?

- Forwarded message from [EMAIL PROTECTED] -

X-Envelope-To: [EMAIL PROTECTED]
From: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: ScanMail Message: To Sender, sensitive content found and action t
aken.

Trend SMEX Content Filter has detected sensitive content.

Place = [EMAIL PROTECTED]; ;
Sender = [EMAIL PROTECTED]
Subject = Re: citizens can be named as enemy combatants
Delivery Time = January 09, 2003 (Thursday) 10:46:04
Policy = Dirty Words
Action on this mail = Quarantine message

Warning message from administrator:
Sender, Content filter has detected a sensitive e-mail.

- End forwarded message -

--
michael cardenas   | lead software engineer, lindows.com
hyperpoem.net  | GNU/Linux software developer
people.debian.org/~mbc | encrypted email preferred

Listening to: Rusted Root - martyr

That government is best which governs not at all.
- Henry David Thoreau

[demime 0.97c removed an attachment of type application/pgp-signature]




Re: biological systems and cryptography

2003-01-03 Thread Michael Cardenas
I see that you're entirely correct. I've read about half of Scheiner's 
applied cryptography, and I'm familiar with the fact that current 
algorithms' strength is based on factoring large primes, and familiar 
with his estimates of 10^11 years for a 112 bit key, (given the caveat 
of no new scifi computing technology, from his book). And actually, in 
the chapter on key length he talks about biologocai systems and even 
about thermodynamics and computing machines in space that capture the 
energy of supernovas, giving a rather powerful upper bound, given that 
computation is bound by the laws of space and thermodynamics.

So, do you think that there are enough feasilbe research topics in 
cryptography to do graduate research in it, today? It seems that most of 
the work to be done is application, or solving the reimann zeta function 
and determining how primes come about.

Tim May wrote:

On Wednesday, January 1, 2003, at 08:55  PM, Michael Cardenas wrote:


On Tue, Dec 31, 2002 at 12:23:51PM -0800, Tim May wrote:


On Tuesday, December 31, 2002, at 11:41  AM, Michael Cardenas wrote:


How do you all see the future use of biologically based systems
affecting cryptography in general?

By biologically based systems I mean machine learning, genetic
algorithms, chips that learn (like Carver Mead's work), neural
networks, vecor support machines, associative memory, etc.



Strong crypto is, ipso facto, resistant to all of the above. For the
obvious reason that the specific solution to a cipher is like a Dirac
delta function (a spike) rising above a featureless plain, this in
terms of the usual hill-climbing or landscape-learning models which all
of the above use in one form or another.



People do break cyphers, by finding weaknesses in them. Are you saying
that you think that current cyphers are unbreakable?



You know not whereof you speak.

Breaking RSA or similar systems is very, very, very strongly  believed 
to be related to, for example, factoring large numbers. Hill-climbing 
and landscape-learning algorithms are of no use.

I said this in my last message.

Rather that you reading up on how such ciphers work so as to see 
immediately the content of what I said, you resort to the Are you 
saying that you think that current cyphers are unbreakable? chestnut.

Yes, if by breakable we are excluding brute force factoring, 
mathematical breakthroughs that are deep (and unexpected) and which 
have nothing to do with dumb hill-climbing, or some application of 
Shor's algorithm with quantum computers.

Give it up. Neural nets, simulated annealing, support vector machines, 
etc. are not going to factor a 1000-digit number.




Also, what about using biological systems to create strong cyphers,
not to break them?



I talked about this as well. You need to learn about what strong 
ciphers are.

It seems that all of these analyses assume that an instruction is a
single mathematical operation in a turing machine. What if each
operation was something else? I refuse to believe that the human mind
is just a turing machine.



What if magic wands exist? What if time machines send the decrypted 
message backward in time?

--Tim May



--
michael cardenas   | lead software engineer, lindows.com 
hyperpoem.net	   | GNU/Linux software developer
people.debian.org/~mbc | encrypted mail preferred

That government is best which governs not at all
- Henry David Thoreau



Re: biological systems and cryptography

2003-01-03 Thread Michael Cardenas
On Fri, Jan 03, 2003 at 10:39:45AM -0800, Bill Stewart wrote:
 At 02:18 AM 01/03/2003 -0800, Tim May wrote:
 On Wednesday, January 1, 2003, at 08:55  PM, Michael Cardenas wrote:
 People do break cyphers, by finding weaknesses in them. Are you saying
 that you think that current cyphers are unbreakable?
 
 You know not whereof you speak.
 
 Breaking RSA or similar systems is very, very, very strongly
 believed to be related to, for example, factoring large numbers.
 Hill-climbing and landscape-learning algorithms are of no use.

 That's one of the main points of doing mathematical cryptography,
 as opposed to the traditional I can make a function too ugly for
 you to figure out approaches.   You can make definite statements
 about how hard it is to solve them, as opposed to vague statements
 about how ugly and unbreakable your functions are.


Actually, if I'm not mistaken, it's not yet proven whether or not
factoring large numbers is hard. Until the reimann zeta function is
solved, a solution may be found that shows that it is easy.


--
michael cardenas   | lead software engineer, lindows.com
hyperpoem.net  | GNU/Linux software developer
people.debian.org/~mbc | encrypted email preferred

Searching for the Truth through words and speech is like sticking your head
in a bowl of glue.
- Yuan Wu

[demime 0.97c removed an attachment of type application/pgp-signature]




Re: biological systems and cryptography

2003-01-02 Thread Michael Cardenas
On Tue, Dec 31, 2002 at 12:23:51PM -0800, Tim May wrote:
 On Tuesday, December 31, 2002, at 11:41  AM, Michael Cardenas wrote:

 How do you all see the future use of biologically based systems
 affecting cryptography in general?
 
 By biologically based systems I mean machine learning, genetic
 algorithms, chips that learn (like Carver Mead's work), neural
 networks, vecor support machines, associative memory, etc.

 Strong crypto is, ipso facto, resistant to all of the above. For the
 obvious reason that the specific solution to a cipher is like a Dirac
 delta function (a spike) rising above a featureless plain, this in
 terms of the usual hill-climbing or landscape-learning models which all
 of the above use in one form or another.


People do break cyphers, by finding weaknesses in them. Are you saying
that you think that current cyphers are unbreakable?

Also, what about using biological systems to create strong cyphers,
not to break them?


 Cryptanalysis of weak crypto, in terms of mundane things like
 passphrase guessing, finding images tagged with stego code, etc.,
 already in some cases makes use of these tools. Bob Baldwin's
 Crytpographer's Workbench used learning algorithms a long time ago.

 Strong math wins out over weak crypto any day, and attempting to brute
 force a cipher with even a swimming pool full of Adleman machines will
 not work: if a 400-digit number takes, for instance, a million Pentium
 4 years to brute force factor, then how long does a 600-digit number
 take?

 (And using larger RSA moduli is of course trivial...)

 Homework: Using the estimates Schneier, Diffie, Hellman, and others
 have made for the number of computer operations to break ciphers of
 various kinds, describe a reasonable cipher and modulus or key length
 which will take more energy than there is in the entire universe to
 break. The answer, in terms of how small the key or modulus is, may
 surprise you.


It seems that all of these analyses assume that an instruction is a
single mathematical operation in a turing machine. What if each
operation was something else? I refuse to believe that the human mind
is just a turing machine.


--
michael cardenas   | lead software engineer, lindows.com
hyperpoem.net  | GNU/Linux software developer
people.debian.org/~mbc | encrypted email preferred

It is as hard to see one's self as to look backwards without turning
around.
- Henry David Thoreau

[demime 0.97c removed an attachment of type application/pgp-signature]




Re: Quantum Probability and Decision Theory

2003-01-01 Thread Michael Cardenas
On Tue, Dec 24, 2002 at 09:57:58AM -0800, Tim May wrote:
 First, I sent this in error to the CP list...it was intended for
 another list. (My mailer has command completion and I am so used to
 typing cy in the To: box and having it expand to
 [EMAIL PROTECTED] that I sent it to CP by accident. As to why type
 list addresses rather than Reply to All, this is to get the list in
 the To: and not the Cc: and not have misc. other lists or persons
 getting copied--as in this reply, where TD is initially in the To: and
 CP is in the Cc:, in OS X Mail.)


And what list would that be? I'd like to take a look at it.


...

 On Tuesday, December 24, 2002, at 08:25  AM, Tyler Durden wrote:
 
 Yes. I strongly suspect that minds are quantum mechanical.
 
 Penrose also believes this, and has actually identified
 Aharanov-Bohm-like structures in certain simple organisms used to
 probe their immediate environment.

 Max Tegmark fairly conclusively demonstrated that decoherence occurs
 far too rapidly in proteins and other biological structures for QM to
 be an actor. As for Stuart Hameroff's nanotubules idea, I've been a
 skeptic of this ever since meeting him at the A-LIFE Conference in 1987.


Last summer I read the physics of consciousness. It was a pretty
disappointing attempt to explain consciousness with QM, mixed with
lots of emotional and relgious hand waving, nice background info
though.

Anyway, this is exactly why I want to do computational neuroscience. I
also think that the turing machine is a sorely classical model, and
that the brain is definitely not a turning machine, but something
else, far more powerful.

As for making a neuron, look into the research of henry abarbanel. I
was in his lab the other day, and his students have actually made
simple neurons that can be wired into the brain of a lobster to
simulate removed neurons, creating the proper oscillation to generate
the signals which allow the lobster to digest things. He mostly does
research into the nonlines dynamic properties of neurons. I'm hoping
to work in his lab next year.

michael

--
michael cardenas   | lead software engineer, lindows.com
hyperpoem.net  | GNU/Linux software developer
people.debian.org/~mbc | encrypted email preferred

Listening to: Lamb - Cotton Wool

Sit
 Rest
 Work.
 Alone with yourself,
 Never weary.
 On the edge of the forest
 Live joyfully,
 Without desire.
- The Buddha

[demime 0.97c removed an attachment of type application/pgp-signature]




biological systems and cryptography

2002-12-31 Thread Michael Cardenas
How do you all see the future use of biologically based systems
affecting cryptography in general?

By biologically based systems I mean machine learning, genetic
algorithms, chips that learn (like Carver Mead's work), neural
networks, vecor support machines, associative memory, etc.

It seems to me that computer science based on writing longer and
longer streams of instructions is coming to an end, as it cannot
possibly scale. We now have supercomputers that can execute 35
trillion instructions per second, but if someone has to write all of
those instuctions, what good are they?  Also, it seems that the brain
has immensely powerful visual processing power, without having
millions of lines of code written to do so.

I only ask this because I'm deciding whether to study computational
neuroscience or cryptography in grad school.

--
michael cardenas   | lead software engineer, lindows.com
hyperpoem.net  | GNU/Linux software developer
people.debian.org/~mbc | encrypted email preferred

Listening to: David Bowie - Wild Is The Wind

He who knows himself knows his Lord.
- Sufi saying

[demime 0.97c removed an attachment of type application/pgp-signature]




Re: Recommended: Catch Me If You Can, a film

2002-12-31 Thread Michael Cardenas
On Tue, Dec 31, 2002 at 01:22:49PM -0800, Tim May wrote:
...

 (The next time a CP meeting/party is at my house, someone remind me and
 I'll put it on. Along with A Beautiful Mind, also of interest to us.)

  The tree of liberty must be refreshed from time to time with the
 blood of patriots  tyrants. --Thomas Jefferson, 1787



I actually found a beautiful mind to be a disappointment. I was hoping
for a movie more about math and crypto, but it turned out to be a
movie about schizophrenia. Did you not find the same thing?

--
michael cardenas   | lead software engineer, lindows.com
hyperpoem.net  | GNU/Linux software developer
people.debian.org/~mbc | encrypted email preferred

Zen is the madman yelling 'If you wanta tell me that the stars are not words,
then stop calling them stars!'
- Jack Kerouac

[demime 0.97c removed an attachment of type application/pgp-signature]




Re: Dossiers and Customer Courtesy Cards

2002-12-31 Thread Michael Cardenas
On Tue, Dec 31, 2002 at 11:02:48AM -0800, Tim May wrote:
 On Tuesday, December 31, 2002, at 09:49  AM, Kevin Elliott wrote:

 At 12:12 -0500  on  12/31/02, Adam Shostack wrote:
 Rummaging through my wallet...a grocery card in the name of Hughes, a
 credit card with the name Shostack, and an expired membership card in
 the name Doe.
 
...

 * Dossier compiling at grocery stores is not very useful for Big
 Brother, either. Who consumes Midol, Attends, Trojans, etc. is not
 interesting even to George Bush and Dick Cheney. And few hardware or
 electrical supply stores have courtesy cards. In any case, no
 requirement to use cards, etc.

 * All in all, not a very interesting example of ID and tracking. Things
 will get much more interesting, and worrisome, if there is ever a
 national ID system (in the U.S.) and some kind of legislated
 requirement (albeit unconstitutional!) that citizen-units must ID
 themselves with valid ID for all purchases, or at least of certain
 classes of purchases (beyond guns, for example).

 I don't see this happening in the next 15 years unless some major new
 terrorist incident occurs.


But what if this data is used as part of a larger picture, such as in
TIA. It definitely can be used, along with gas purchases, to track
where a suspect, aka a citizen, is living.  Also, many possible
weapons such as perscription drugs, box cutters, and kitchen knives
can be purchased at a grocery store, which combined with case data
could be useful in framing, aka finding, the suspect.

--
michael cardenas   | lead software engineer, lindows.com
hyperpoem.net  | GNU/Linux software developer
people.debian.org/~mbc | encrypted email preferred

Listening to: A Tribe Called Quest - Scenario

Each molecule preaches
   perfect law,
 Each moment chants true
   sutra;
 The most fleeting thought
   is timeless,
 A single hair's enough to
   stir the sea
- Shutaku

[demime 0.97c removed an attachment of type application/pgp-signature]




Re: Dossiers and Customer Courtesy Cards

2002-12-31 Thread Michael Cardenas
On Tue, Dec 31, 2002 at 12:12:02PM -0800, Tim May wrote:
 On Tuesday, December 31, 2002, at 11:32  AM, Michael Cardenas wrote:
 But what if this data is used as part of a larger picture, such as in
 TIA. It definitely can be used, along with gas purchases, to track
 where a suspect, aka a citizen, is living.  Also, many possible
 weapons such as perscription drugs, box cutters, and kitchen knives
 can be purchased at a grocery store, which combined with case data
 could be useful in framing, aka finding, the suspect.

...

 As for your point about prescription drugs, box cutters, kitchen knives
 being trackable, I assume this is a troll or something you haven't
 thought through. Treat it as a signal to noise problem, with millions
 of such purchases every day. Again, I don't have time to describe this
 in detail. Think about it.


Isn't the whole purpose of TIA (or the claimed purpose) to be able to
say person A bought weapon B on this day, bought C gallons of gas to
drive to govt building D, and then blew up building D with weapon B,
therefore person A must be the criminal?

--
michael cardenas   | lead software engineer, lindows.com
hyperpoem.net  | GNU/Linux software developer
people.debian.org/~mbc | encrypted email preferred

Listening to: Sonic Youth - Inhuman

Existence is a fullness which man can never abandon.
- Jean-Paul Sartre

[demime 0.97c removed an attachment of type application/pgp-signature]




Re: BigBrotherWare

2002-12-21 Thread Michael Cardenas
Tim May wrote:


Speculation: I expect the battles over cyberspace to shift to the OS, 
with the leading private (non open source) OS makers enlisted in the 
War Against Illegal Thoughts. The easiest initial front in this war, 
one the OS companies like Apple and Microsoft have a corporate 
interest in, is for the OS to more aggressively check for hacks or 
products not approved. Software registration and signatures will of 
course not be granted to DVD hacks.


This is exactly what Palladium is all about, forcing people to use only 
approved software. Maybe they'll be md5summing websites for version 2 of 
palladium and only letting you read approved content.

(Much has been made of how the Microsoft- and Intel-backed security 
regimes will be opt in or voluntary. This seems dubious. It is 
precisely the non-volunteers who these companies, and Hollywood, and 
the Nation States, will be most concerned about. So I would expect 
this opt in approach to not be the full picture.)


Microsoft is pushing hard to get palladium into the silicon, with intel 
and amd happy to comply. It's hard to imagine how it will be voluntary 
after that happens.

--
michael cardenas   | lead software engineer, lindows.com 
hyperpoem.net	   | GNU/Linux software developer
people.debian.org/~mbc | encrypted mail preferred

Be the change you wish to see in the world
-Mahatma Gandhi



Re: Bruce Schneier hullabaloo

2002-12-21 Thread Michael Cardenas
Anonymous wrote:


Like I said before, P2P, Crypto, WiFi and cheap chips will turn everything upside down. 
 


I'm curious as to what makes you, or anyone on this list, think that 
these technologies by themselves will cause any sort of political 
upheaval. Lawrence Lessig has talked about how technologies, as long as 
they're created and controlled by people and corporations operating 
within the laws and boundaries of some country, can be regulated to 
express the will of governments. Your MAC address is already sent out in 
every packet that your machine generates, so with that, a snoop could 
tell a whole hell of a lot about what you're doing. What's to say that 
these technologies are not going to be shaped to meet the needs and 
wants of the transnational corporations that run our government?

I think that Bruce Schneier's terse comment just illustrates the 
flippant attitude that lots of geeks have towards politics, and that 
lots of people have also. Just because geeks know a lot about 
technology, doesn't mean that they're impervious to the massive 
propaganda and mind control that goes on in democratic societies to keep 
the rabble out of the political process.

I just have a hard time seeing the bridge between armed rebellion 
against the largest military power the world has ever known, the U.S., 
and some new networking technologies that are being designed for cisco 
to make more money. Even beautiful open source efforts like p2p and 
linux that actually express the will of the people are starting to get 
onto the radar of U.S. legislators, who see the danger it poses to the 
traditional power structures. Unless all those free software programmers 
are prepared for armed rebellion when their right to share code is taken 
away, I'm not sure its all going to mean much.

--
michael cardenas   | lead software engineer, lindows.com 
hyperpoem.net	   | GNU/Linux software developer
people.debian.org/~mbc | encrypted mail preferred

Be the change you wish to see in the world
-Mahatma Gandhi



Re: Bruce Schneier hullabaloo

2002-12-21 Thread Michael Cardenas
Mike Rosing wrote:


On Fri, 20 Dec 2002, Michael Cardenas wrote:
 

I just have a hard time seeing the bridge between armed rebellion
against the largest military power the world has ever known, the U.S.,
and some new networking technologies that are being designed for cisco
to make more money. Even beautiful open source efforts like p2p and
linux that actually express the will of the people are starting to get
onto the radar of U.S. legislators, who see the danger it poses to the
traditional power structures. Unless all those free software programmers
are prepared for armed rebellion when their right to share code is taken
away, I'm not sure its all going to mean much.
   


It's an absolute last resort that nobody really wants to get into.
Nobody like the idea of getting shot at.  So as long as they don't
have to, they won't.
 

Be the change you wish to see in the world
-Mahatma Gandhi
   


So how we gonna change the world dude?
 


I'm not advocating armed rebellion. I'm saying that the current 
political structures in power have massive political might and are 
willing to use it to stay in power, as we are witnessing more everyday, 
and anything that challenges that might will eventually have to face it.

--
michael cardenas   | lead software engineer, lindows.com 
hyperpoem.net	   | GNU/Linux software developer
people.debian.org/~mbc | encrypted mail preferred

Be the change you wish to see in the world
-Mahatma Gandhi



Re: Misconceptions about how remailers work

2002-12-21 Thread Michael Cardenas
Tim May wrote:


On Friday, December 20, 2002, at 12:34  PM, Michael Cardenas wrote:


Anonymous wrote:


Like I said before, P2P, Crypto, WiFi and cheap chips will turn 
everything upside down.

I'm curious as to what makes you, or anyone on this list, think that 
these technologies by themselves will cause any sort of political 
upheaval. Lawrence Lessig has talked about how technologies, as long 
as they're created and controlled by people and corporations 
operating within the laws and boundaries of some country, can be 
regulated to express the will of governments. Your MAC address is 
already sent out in every packet that your machine generates, so with 
that, a snoop could tell a whole hell of a lot about what you're 
doing. What's to say that these technologies are not going to be 
shaped to meet the needs and wants of the transnational corporations 
that run our government?


Remailers and Web proxies work in ways that skirt this transparency 
of MACs and routing that you are referring to. These are the types of 
technologies we are discussing. The fact that Disney or Lockheed may 
be using Carnivore- and Echelon-vulnerable technologies does not 
challenge the points about how better technologies will turn 
everything upside down.
...


There are other forms of traffic besides email that are significant.


These sorts of things have been covered in many of the past messages 
on this list and in tutorials and reviews. I recommend my own article 
in Vernor Vinge's True Names and the Opening of the Cyberspace 
Frontier. Still being sold at Borders and other bookstores, so you 
can read my article there for free.


I've read your article there, and it was very interesting. That's why 
I'm here. I just didn't see the bridge from the technology to the 
revolution clearly articulated in your essay either.

--
michael cardenas   | lead software engineer, lindows.com 
hyperpoem.net	   | GNU/Linux software developer
people.debian.org/~mbc | encrypted mail preferred

Be the change you wish to see in the world
-Mahatma Gandhi



Re: Build It Rolling Your Own Tivo (fwd)

2002-12-05 Thread Michael Cardenas
Of course, you could do this yourself with a $199 microtel box from
walmart and linux. Then you'd just have to add a $30 tv in card.

On Thu, Dec 05, 2002 at 04:48:44PM -0600, Jim Choate wrote:
 http://www.extremetech.com/article2/0,3973,692134,00.asp



 We don't see things as they are,  [EMAIL PROTECTED]
 we see them as we are.   www.ssz.com
   [EMAIL PROTECTED]
 Anais Nin www.open-forge.org




--
michael cardenas   | lead software engineer, lindows.com
hyperpoem.net  | GNU/Linux software developer
people.debian.org/~mbc | encrypted email preferred

One evening I seated beauty on my knees.
 And I found her bitter,
 And I cursed her.
- Arthur Rimbaud

[demime 0.97c removed an attachment of type application/pgp-signature]