Re: How true can this be?

2008-02-09 Thread Jean-David Beyer
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Janusz A. Urbanowicz wrote:
> On Sun, Jan 27, 2008 at 04:23:06PM -0500, John W. Moore III wrote:
>> -BEGIN PGP SIGNED MESSAGE-
>> Hash: SHA512
>>
>> -  Original Message  ----
>> Subject: Re: How true can this be?
>> From: Janusz A. Urbanowicz <[EMAIL PROTECTED]>
>> To: Raygene <[EMAIL PROTECTED]>
>> Cc: gnupg-users@gnupg.org
>> Date: Sunday, January 27, 2008 1:39:04 PM
>>
>>
>>> if a), then b) would land him in jail, quickly
>> More likely a fatal traffic accident or victim of a street mugging with
>> similar outcome.  People communicate in and from Jails.
> 
> Blabbering about classified stuff is a breach of security procedures and
> NDA-s, that leads to administrative action, prosecution and usually jail
> sentence (or a hefty fine).

Long ago I had a secret security clearance. The secrets were laughable, but
I have never disclosed them. Mine had nothing to do with encryption.

When getting the clearance, I had to read some of the laws that pertained.
In addition to jail and fines, another punishment option was death. But I
imagine it would be done officially.
> 
> The approach you mention would be probably used on someone who would like to
> play the game (as in sell the info to another country), not for some random
> blabberer.
> 
> Alex


- --
  .~.  Jean-David Beyer  Registered Linux User 85642.
  /V\  PGP-Key: 9A2FC99A Registered Machine   241939.
 /( )\ Shrewsbury, New Jerseyhttp://counter.li.org
 ^^-^^ 12:50:01 up 16 days, 2:36, 2 users, load average: 5.02, 5.03, 4.68
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.5 (GNU/Linux)
Comment: Using GnuPG with CentOS - http://enigmail.mozdev.org

iD8DBQFHrejkPtu2XpovyZoRAgC9AJ9DknvNBSUr0NU7jxdHUr3PGWHKYACgg2Lo
eVMtegDw54+UQDnlz+fGK+8=
=YzkQ
-END PGP SIGNATURE-

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: How true can this be?

2008-01-28 Thread Janusz A. Urbanowicz
On Sun, Jan 27, 2008 at 04:23:06PM -0500, John W. Moore III wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
> 
> -  Original Message  
> Subject: Re: How true can this be?
> From: Janusz A. Urbanowicz <[EMAIL PROTECTED]>
> To: Raygene <[EMAIL PROTECTED]>
> Cc: gnupg-users@gnupg.org
> Date: Sunday, January 27, 2008 1:39:04 PM
> 
> 
> > if a), then b) would land him in jail, quickly
> 
> More likely a fatal traffic accident or victim of a street mugging with
> similar outcome.  People communicate in and from Jails.

Blabbering about classified stuff is a breach of security procedures and
NDA-s, that leads to administrative action, prosecution and usually jail
sentence (or a hefty fine).

The approach you mention would be probably used on someone who would like to
play the game (as in sell the info to another country), not for some random
blabberer.

Alex
-- 
JID: [EMAIL PROTECTED]
PGP: 0x46399138
od zwracania uwagi na detale są lekarze, adwokaci, programiści i zegarmistrze
 -- Czerski

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: How true can this be?

2008-01-27 Thread Robert J. Hansen

John W. Moore III wrote:

More likely a fatal traffic accident or victim of a street mugging with
similar outcome.  People communicate in and from Jails.


I hate to rain on people's parades, but that sort of James Bond stuff 
tends to draw a lot more attention.  Assassination is an extremely 
ineffective form of censorship.  Historically speaking, effective 
governments have relied on discredit more than death for controlling 
their secrets--if someone gets a reputation in the field for being 
crazy, for being unstable, for being whatever, then nobody will listen 
to them anyway, so who cares if they're blabbing secrets?


That said, I agree with the claim that it's very unlikely that someone 
with the clearance to know about the NSA's latest crypto research would 
talk about it with others who weren't cleared.  Far, far more likely 
that someone was trying to impress others with a "if only you knew what 
I knew" fish story.






___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: How true can this be?

2008-01-27 Thread John W. Moore III
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

-  Original Message  
Subject: Re: How true can this be?
From: Janusz A. Urbanowicz <[EMAIL PROTECTED]>
To: Raygene <[EMAIL PROTECTED]>
Cc: gnupg-users@gnupg.org
Date: Sunday, January 27, 2008 1:39:04 PM


> if a), then b) would land him in jail, quickly

More likely a fatal traffic accident or victim of a street mugging with
similar outcome.  People communicate in and from Jails.

JOHN ;)
Timestamp: Sunday 27 Jan 2008, 16:22  --500 (Eastern Standard Time)
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9-svn4675: (MingW32)
Comment: Public Key at:  http://tinyurl.com/8cpho
Comment: Gossamer Spider Web of Trust: https://www.gswot.org
Comment: Homepage:  http://tinyurl.com/9ubue

iQEcBAEBCgAGBQJHnPY4AAoJEBCGy9eAtCsPXI4H/Ryk+Mb9sn8yPhVH+igLsVwj
SjEmdYlZlzFnynqZCNFih8R/XBxGTPnpcpdcPWJEOx8MKvrfavg8diAv3qfTEGxO
csUXaBjWi+xuUyzoJs1iwBCAE+ycibUbWX3X/nHDCYC29QHoZGVMxTraNDxf0/7r
sakxRn3TqihbLND5/1ACohRctCfxuqCyl1U5aMRQqcxC42THmB1ZcYJjnjnnbkJe
u+RR2dmDY/k8zX53O4Y8rHzWGw5Dt6XkMXqpADBnYMiep5j8mhX0Qc/DwIwzIk6g
saycj1YjtEc/JEnp5EHawTk6bk+dWfUEHdwRMmcMZWIasS5hVAKJvofL5gekdkA=
=gTY2
-END PGP SIGNATURE-

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: How true can this be?

2008-01-27 Thread Janusz A. Urbanowicz
On Sat, Jan 26, 2008 at 01:15:23PM -0800, Raygene wrote:
> 
> While discussing GnuPG on MacNN forum, someone posted the following message:
> 
> Tonight I met this guy who works for an internet security company. they help
> governments/law agencies, what he told me is so depressing. apparently, big
> brother has the decryption keys for most internet algorithms, they basically
> can record the information and decrypt it in %95 of the cases... I am no
> security/privacy expert, but its shocking to know that. The guy did not want
> to speak much, but he said that mac is the most secure platform from all
> operating systems?. does anyone know more about this?
> 
> Does this hold water or was that so-called security expert full of it?

both yes and no

spooks don't need to break your ciphers to get your encrypted stuff, the
simplest technical measure is to inject a trojan into your system that will
siphon off what's needed, then there is traffic analysis, TEMPEST, etc etc

BTW: I really doubt that if there is a classified shortcut to solve RSA, a
random guy from a random security firm would a) know it (COMSEC/INFOSEC is
usually classified TOP SECRET as it is conidered of vital importance to
state security), and b) he would blabber about it to anyone who would care
to listen

if a), then b) would land him in jail, quickly
 
Alex
-- 
JID: [EMAIL PROTECTED]
PGP: 0x46399138
od zwracania uwagi na detale są lekarze, adwokaci, programiści i zegarmistrze
 -- Czerski

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: How true can this be?

2008-01-26 Thread Raygene


Robert J. Hansen-3 wrote:
> 
>> I sent you (off-list) a link to a web page that talks about this in some
>> detail: the Landauer Bound, the Margolus-Levitin Limit, the
>> thermodynamic and quantum information theoretical limits of crypto. You
>> may find some useful information in there. I would suggest two things:
> 
>> ~  1. Read it skeptically.
>> ~  2. Whatever else, don't believe it just because I wrote it.
> 

Thanks Robert.

Just read the following about the Echelon Project:

National Security Agency (US)

The prime mover in the UKUSA arrangement is undeniably the National Security
Agency (NSA). The majority of funds for joint projects and facilities
(discussed below) as well as the direction for intelligence gathering
operations are issued primarily through the NSA. The participating agencies
frequently exchange personnel, divide up intelligence collection tasks and
establish common guidelines for classifying and protecting shared
information. However, the NSA utilizes its role as the largest spy agency in
the world to have its international intelligence partners do its bidding.

President Harry Truman established the NSA in 1952 with a presidential
directive that remains classified to this day. The US government did not
acknowledge the existence of the NSA until 1957. Its original mission was to
conduct the signal intelligence (SIGINT) and communications security
(COMSEC) for the US. President Ronald Reagan added the tasks of information
systems security and operations security training in 1984 and 1988
respectively. A 1986 law charged the NSA with supporting combat operations
for the Department of Defense.<7>

Headquartered at Fort George Meade, located between Washington D.C. and
Baltimore, Maryland, the NSA boasts the most enviable array of intelligence
equipment and personnel in the world. The NSA is the largest global employer
of mathematicians, featuring the best teams of codemakers and codebreakers
ever assembled. The latter's job is to crack the encryption codes of foreign
and domestic electronic communications, forwarding the revealed messages to
their enormous team of skilled linguists to review and analyze the messages
in over 100 languages. The NSA is also responsible for creating the
encryption codes that protect the US government’s communications.

In its role as gang leader for UKUSA, the NSA is primarily involved with
creating new surveillance and codebreaking technology, directing the other
cooperating agencies to their targets, and providing them with training and
tools to intercept, process and analyze enormous amounts of signals
intelligence. By possessing what is arguably the most technologically
advanced communications, computer and codebreaking equipment of any
government agency in the world, the NSA serves as a competent and capable
taskmaster for UKUSA. 

http://home.hiwaay.net/~pspoole/echelon.html The Echelon Project 

Darn it, we sure live in dangerous times, don't we...

Thanks,
Gene

-- 
View this message in context: 
http://www.nabble.com/How-true-can-this-be--tp15112665p15115629.html
Sent from the GnuPG - User mailing list archive at Nabble.com.


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: How true can this be?

2008-01-26 Thread Robert J. Hansen

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Raygene wrote:
| I do admit that this is all random and anyone can claim to be a
| so-called expert on something or other (then again, there are the
| know-it-alls and phonies) but how true is that claim?

~  1. Completely true.
~  2. Completely false.
~  3. Somewhere in between.
~  4. A quixotically jocular zephyr named "oblong threnody".
~  5. Colorless green ideas sleep furiously.
~  6. The business of the book sleeps eternally.

There is signal and there is noise.  At present, you do not have any way
of distinguishing the two.  That means it's all noise, and the last
three answers are just as meaningful as the first three.

You are looking for simple and pat answers.  They do not exist.  You
need to do a good bit of reading if you want to have a good handle on
this question.

| We all know that the various "Agencies" have super computers and some
|  of the best programmers and internet security experts in the country
|  ... have you ever heard of some agency actually cracking a lot of
| people's encrypted emails or files? Is encryption as safe as claimed?

I sent you (off-list) a link to a web page that talks about this in some
detail: the Landauer Bound, the Margolus-Levitin Limit, the
thermodynamic and quantum information theoretical limits of crypto. You
may find some useful information in there. I would suggest two things:

~  1. Read it skeptically.
~  2. Whatever else, don't believe it just because I wrote it.


-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.8 (Darwin)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iFYEAREIAAYFAkebwAMACgkQf2XByo0Cu7NHOADffx0SSCJzSDqT+nrMvTMDxPki
tnRRZxDwtd9oGwDgk0jZPqh4FNWRWUSfztXWUiQQE7vv6BsRfdt5GIkBHAQBAQgA
BgUCR5vAAwAKCRC3APSC/q+BCVL8B/0THUOdaBInO13oMgAlm6J9aft9sXWy7pJB
/8qqOAL/gJZ1zBAPhBb6j5Txgfz1PDkTOl10A4hK8YxktNZTqJ5iKM8rmHmindfZ
wtq1ZdyEhTbsCXK1hVkQMxPjNDsghhdnygo0tPeipD9Wu9jdyjG+llBWL+CXcXbO
ZwqL0wNgJynvvGhkkiwUMqHFCdU4F5xbpe49pCHmMGcIZGFJYLvCqTpZvaw+/Evu
U/+Hj+WMAJ6HGnwnEjrMdHhfXYTJ1pCeFqgt4db3HL87VqgJfMVD799I6fu/XZWX
f1+ehTsNGFrsEzNKajyx8aGNYIKyA5MHXR4v2/FosH1v2lrQDutm
=YRas
-END PGP SIGNATURE-

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: How true can this be?

2008-01-26 Thread Raygene


David Shaw wrote:
> 
> On Sat, Jan 26, 2008 at 01:15:23PM -0800, Raygene wrote:
>> 
>> While discussing GnuPG on MacNN forum, someone posted the following
>> message:
>> 
>> Tonight I met this guy who works for an internet security company. they
>> help
>> governments/law agencies, what he told me is so depressing. apparently,
>> big
>> brother has the decryption keys for most internet algorithms, they
>> basically
>> can record the information and decrypt it in %95 of the cases... I am no
>> security/privacy expert, but its shocking to know that. The guy did not
>> want
>> to speak much, but he said that mac is the most secure platform from all
>> operating systems?. does anyone know more about this?
>> 
>> Does this hold water or was that so-called security expert full of it?
> 
>>> On the whole, the words of some random guy on some random web page
>>> quoting some other random guy that he just happened to meet might not
>>> be your best source of information.
> 
> Thanks David,
> 
> I do admit that this is all random and anyone can claim to be a so-called
> expert on something or other (then again, there are the know-it-alls and
> phonies) but how true is that claim? We all know that the various
> "Agencies" have super computers and some of the best programmers and
> internet security experts in the country, have you ever heard of some
> agency actually cracking a lot of people's encrypted emails or files? Is
> encryption as safe as claimed?
> 
> Newbie paranoia, just installed MacPG and playing around with it... :-/
> 
> Cheers,
> Gene
> 
> 
> _______________
> Gnupg-users mailing list
> Gnupg-users@gnupg.org
> http://lists.gnupg.org/mailman/listinfo/gnupg-users
> 
> 

-- 
View this message in context: 
http://www.nabble.com/How-true-can-this-be--tp15112665p15113566.html
Sent from the GnuPG - User mailing list archive at Nabble.com.


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: How true can this be?

2008-01-26 Thread David Shaw
On Sat, Jan 26, 2008 at 01:15:23PM -0800, Raygene wrote:
> 
> While discussing GnuPG on MacNN forum, someone posted the following message:
> 
> Tonight I met this guy who works for an internet security company. they help
> governments/law agencies, what he told me is so depressing. apparently, big
> brother has the decryption keys for most internet algorithms, they basically
> can record the information and decrypt it in %95 of the cases... I am no
> security/privacy expert, but its shocking to know that. The guy did not want
> to speak much, but he said that mac is the most secure platform from all
> operating systems?. does anyone know more about this?
> 
> Does this hold water or was that so-called security expert full of it?

On the whole, the words of some random guy on some random web page
quoting some other random guy that he just happened to meet might not
be your best source of information.

David

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


How true can this be?

2008-01-26 Thread Raygene

While discussing GnuPG on MacNN forum, someone posted the following message:

Tonight I met this guy who works for an internet security company. they help
governments/law agencies, what he told me is so depressing. apparently, big
brother has the decryption keys for most internet algorithms, they basically
can record the information and decrypt it in %95 of the cases... I am no
security/privacy expert, but its shocking to know that. The guy did not want
to speak much, but he said that mac is the most secure platform from all
operating systems?. does anyone know more about this?

Does this hold water or was that so-called security expert full of it?

Cheers
RG
-- 
View this message in context: 
http://www.nabble.com/How-true-can-this-be--tp15112665p15112665.html
Sent from the GnuPG - User mailing list archive at Nabble.com.


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users