Re: It's time for PGP to die.

2014-08-20 Thread Johan Wevers
On 19-08-2014 22:49, Robert J. Hansen wrote:

 And do they get it or will the government just ignore the supreme
 court?

 I could literally list *dozens* of cases where the Supreme Court told
 Congress and the President no on subjects where Congress and the
 President insisted they would only take yes for an answer.  In each
 case that I'm aware of, the Supreme Court won the argument handily.

Ah yes, the supreme court has had its say. Now the question is, do the
prisoners at Guantanomo Bay notice anything of it? Or will they still be
tortured, have no access to lawyers and get still no fair trial and the
right to sue for damages if they win after many years of imp[risonment
without any formal case?

-- 
ir. J.C.A. Wevers
PGP/GPG public keys at http://www.xs4all.nl/~johanw/pgpkeys.html


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: It's time for PGP to die.

2014-08-20 Thread MFPA
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Hi


On Wednesday 20 August 2014 at 7:04:23 AM, in
mid:53f43a67.1030...@vulcan.xs4all.nl, Johan Wevers wrote:


 Now the
 question is, do the prisoners at Guantanomo Bay notice
 anything of it? Or will they still be tortured, have no
 access to lawyers and get still no fair trial and the
 right to sue for damages if they win after many years
 of imp[risonment without any formal case?

Not to mention having first been abducted and forcibly transported
halfway round the world.



- --
Best regards

MFPAmailto:2014-667rhzu3dc-lists-gro...@riseup.net

A closed mouth gathers no foot
-BEGIN PGP SIGNATURE-

iPQEAQEKAF4FAlP0QSdXFIAALgAgaXNzdWVyLWZwckBub3RhdGlvbnMub3Bl
bnBncC5maWZ0aGhvcnNlbWFuLm5ldEJBMjM5QjQ2ODFGMUVGOTUxOEU2QkQ0NjQ0
N0VDQTAzAAoJEKipC46tDG5pdLcEAJlXSLYUxcm1QeZ+439MFZoZAyb5phu1hB5P
vlwNDT7F5rmUdK+7lmgkBH4ySBwjimW5I7dflQjwP4BwNJo07SoiPBoJXWdZcJSx
qqq5zEfowfxXkDw+FQwITgiLaeL0+05woa9VR2pHSYdBH0Rl5XjXNz4cBxRa2Na5
iKs/T0Z4
=Vb6j
-END PGP SIGNATURE-


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: It's time for PGP to die.

2014-08-20 Thread Robert J. Hansen
On 8/20/2014 2:04 AM, Johan Wevers wrote:
 Ah yes, the supreme court has had its say. Now the question is, do the
 prisoners at Guantanomo Bay notice anything of it?

Yes, as you could discover by checking interviews with their lawyers.

 ... have no access to lawyers ...

Of course, checking interviews with their lawyers might disturb your
narrative.




smime.p7s
Description: S/MIME Cryptographic Signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: It's time for PGP to die.

2014-08-19 Thread James Platt
On Aug 18, 2014, at 3:21 PM, Robert J. Hansen r...@sixdemonbag.org wrote:

 At least for US persons, iirc the protection doesn't extend beyond
 that?
 
 No, the Fourth Amendment protects all people within U.S. borders
 equally.  Americans get no special protections over visitors to the country.

The Fourteenth Amendment makes this clear.  It was added to The Constitution 
after the American Civil War because southerners who were opposing 
reconstruction claimed that the former slaves did not have constitutional 
rights because they were not citizens.  To be more precise, constitutional 
rights apply to “…all persons within the jurisdiction of the United States.”   
In a more recent event, the Supreme Court ruled that Guantanamo Bay is in the 
jurisdiction of the United States and, therefore, the detainees moved there 
gained the protection of The Constitution.





signature.asc
Description: Message signed with OpenPGP using GPGMail
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Fwd: It's time for PGP to die.

2014-08-19 Thread MFPA
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Hi


On Monday 18 August 2014 at 7:11:57 PM, in
mid:53f241ed.4050...@sixdemonbag.org, Robert J. Hansen wrote:


 If you're a witness
 to a crime, you can be compelled to testify about what
 you see.

Yes, but they can't make you remember accurately what you saw, or tell
you what to say.


- --
Best regards

MFPAmailto:2014-667rhzu3dc-lists-gro...@riseup.net

Amateurs built the ark. Professionals built the Titanic.
-BEGIN PGP SIGNATURE-

iPQEAQEKAF4FAlPznQhXFIAALgAgaXNzdWVyLWZwckBub3RhdGlvbnMub3Bl
bnBncC5maWZ0aGhvcnNlbWFuLm5ldEJBMjM5QjQ2ODFGMUVGOTUxOEU2QkQ0NjQ0
N0VDQTAzAAoJEKipC46tDG5pTuoD/RAU5zkY+d60HJlTpLtQAW4NS4FB2KhlNGzP
srzm8iRsfPDH1K9jabFaxq/llGrlBK7DOPmGddMwe9ty4FXvW0Mep5YOo/0ubnUk
6pX3822P7pFCKCMNcGAuV+SKIUr/EBxrEUM2NNV00efqiyiukqKtVppMFDc1qEdG
Ljoz7ig6
=9q7P
-END PGP SIGNATURE-


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: It's time for PGP to die.

2014-08-19 Thread Johan Wevers
On 19-08-2014 17:10, James Platt wrote:

 In a more recent event, the Supreme Court ruled that Guantanamo Bay
 is in the jurisdiction of the United States and, therefore, the
 detainees moved there gained the protection of The Constitution.

And do they get it or will the government just ignore the supreme court?

-- 
ir. J.C.A. Wevers
PGP/GPG public keys at http://www.xs4all.nl/~johanw/pgpkeys.html


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: It's time for PGP to die.

2014-08-19 Thread MFPA
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Hi


On Monday 18 August 2014 at 8:21:06 PM, in
mid:53f25222.1040...@sixdemonbag.org, Robert J. Hansen wrote:



 No, the Fourth Amendment protects all people within
 U.S. borders equally.  Americans get no special
 protections over visitors to the country.

Do people at a border crossing point count as being within the
borders?

- --
Best regards

MFPAmailto:2014-667rhzu3dc-lists-gro...@riseup.net

Puns are bad but poetry is verse.
-BEGIN PGP SIGNATURE-

iPQEAQEKAF4FAlPzoplXFIAALgAgaXNzdWVyLWZwckBub3RhdGlvbnMub3Bl
bnBncC5maWZ0aGhvcnNlbWFuLm5ldEJBMjM5QjQ2ODFGMUVGOTUxOEU2QkQ0NjQ0
N0VDQTAzAAoJEKipC46tDG5pCeID/1mH059v5L/9psR+zFB1tdJVK05sceROanmo
7PK43SJ98/d4uYD6mMZryGSwYpNhMzCqUOJrmxex6pTJZ2InINYt9ZvyQxYDysiM
IWMbhuFyYzetxO2FWtkjnWowNQ1th4Tx4F034kAV2NrwBJMSDXhc03eIYGSDKysK
Av0I3acr
=Pdnf
-END PGP SIGNATURE-


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: It's time for PGP to die.

2014-08-19 Thread Martin Behrendt
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Am 19.08.2014 um 21:16 schrieb MFPA:
 Hi
 
 
 On Monday 18 August 2014 at 8:21:06 PM, in 
 mid:53f25222.1040...@sixdemonbag.org, Robert J. Hansen wrote:
 
 
 
 No, the Fourth Amendment protects all people within U.S. borders
 equally.  Americans get no special protections over visitors to
 the country.
 
 Do people at a border crossing point count as being within the 
 borders?
 

As far as I know, at (international) airports the answer is no.
There is a zone (that can be extended at will*), where you are
basically in no mans land.
I think that relates to the word transit zone[0]
A search for airport transit zone might get you some better information.

[0] https://en.wikipedia.org/wiki/International_zone
* see also Snowden  and his whereabouts during the phase were he
applied for asylum
-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iEYEARECAAYFAlPzpooACgkQ/6vdZgk46shoFgCfc2qWkoQDDkCAH2cy/FtEH3e6
cpQAnjoh/s+VWS3wzNpbPwx9Yhb1LQBY
=7VNg
-END PGP SIGNATURE-

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Fwd: It's time for PGP to die.

2014-08-19 Thread Bob Holtzman
On Mon, Aug 18, 2014 at 10:43:49PM -0400, Robert J. Hansen wrote:
 On 8/18/2014 9:32 PM, Bob Holtzman wrote:
  There are quite a few ways police and prosecutors can coerce a 
  suspect to hand over his encryption key(s).
 
 Your examples which involve coercion are illegal, and the ones that are
 legal do not involve coercion.
 
  Dangling the prospect of a lighter sentence under the poor bugger's 
  nose
 
 Not coercion.
 
 Prosecutor: We know you have an encrypted drive partition with a lot of
 child porn on it.  Give up your passphrase and we'll reduce it to ten
 counts of possession and drop the intent to distribute, and we won't
 object to sentences running concurrently.

Which, of course, carries the implied threat of not reducing it to ten
counts and objecting to concurrency if he doesn't come across with the
keys. 

Not coercion?

 
 Defendant: ... that sounds really good.
 
 Or, alternately, imagine the defendant is innocent of the charge:
 
 Defendant: I can't accept that deal.  I'm innocent of that.  (True: if
 you're innocent of the charge, you're not allowed to plead guilty to it.
  You might be able to talk the judge into accepting an Alford, but it'd
 be an uphill battle.)

...and if the prosecutor is hungry for another conviction to aid in his
political ambitions it's Katy bar the door and the hell with the
truth.

BTW what's an Alford? 

 
 Or, alternately, imagine the defendant is guilty, but only of eight
 counts of possession:
 
 Defendant: No deal.  I'll take my risks in court.  Good luck producing
 these 'thousands of images' you're talking about.
 
  or conversely, threatening to come down hard, perhaps going for a 
  death penalty.
 
 Grossly illegal, in violation of the canons of legal ethics,

So is hiding exculpatory evidence. Of course prosecutors would never do
such a thing, right?right?

 and wil get an attorney disbarred.

If caught. Some were caught and are still practicing. It made the
papers.

http://usatoday30.usatoday.com/news/washington/judicial/2010-09-22-federal-prosecutors-reform_N.htm
http://reason.com/archives/2009/08/17/innocent-man-freed-but-shabby 

There are a bunch more.

 Don't confuse Law  Order re-runs with
 real life.  

Give me some credit, pal.

The DA is allowed to threaten prosecution of only those
 crimes the DA reasonably believes a person violated, and the DA is
 expressly forbidden from using the threat of the death penalty to
 persuade someone to taking a lesser sentence.

What should be and what is isn't always the same.

 
  The surrender of a suspect's keys would be voluntary and therefore 
  constitutional.
 
 In your first example yes, in your second example no.
 
 Don't get me wrong: prosecutors have a lot of power, and I personally
 believe they have too much power with too little accountability.
 However, it's not a de-facto state of tyranny, either.

Of course not. Some prosecutors are real, live, human beings with
consciences. Others...pregnant pause

 As always, my best advice for people facing legal problems is shut up
 and get a lawyer.
 



 ___
 Gnupg-users mailing list
 Gnupg-users@gnupg.org
 http://lists.gnupg.org/mailman/listinfo/gnupg-users


-- 
Bob Holtzman
Giant intergalactic brain-sucking hyperbacteria 
came to Earth to rape our women and create a race 
of mindless zombies.  Look!  It's working!


signature.asc
Description: Digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Fwd: It's time for PGP to die.

2014-08-19 Thread Robert J. Hansen

Not coercion?


Nope.  That's a trade.

Passphrase coercion is like so: you will produce the passphrase, or you
will sit in jail until you decide to produce the passphrase, and we're
just fine if you sit in there the rest of your natural life, and once we
get the passphrase then we'll decide whether we want to prosecute you
further, and if we do then your time sitting in jail while deciding to
cough up the passphrase won't count against whatever prison term you
ultimately get.

What the prosecutor is offering there is, you will plead guilty to
lesser charges, but I'm only willing to do this if you're willing to
show me the full extent of your illegal activities, so cough up the
passphrase so I can verify it for myself.

When you're facing coercion, you're not getting anything out of the
trade.  When you agree to something as part of a plea agreement, you do.
Or maybe you think that you should be allowed to get a plea deal just
by showing up, without cooperating with the State in any way?


BTW what's an Alford?


http://lmgtfy.com/?q=alford+plea


So is hiding exculpatory evidence. Of course prosecutors would never
do such a thing, right?right?


The vast majority of prosecutors would not.  Some would, and in such
cases I think the doctrine of prosecutorial immunity should be waived.

Snark is not serious argument.


There are a bunch more.


So what?  There are a bunch of prosecutors.  If even 1% of prosecutors
are corrupt -- which would make them on balance a bunch of saints by the
standards of the rest of society -- that's still a large number.  The
fact there are a large number of abuses is kind of unsurprising given a
country with over 300 million people.  It's the law of large numbers:
one-in-a-million events literally happen thousands of times a day.


Don't confuse Law  Order re-runs with real life.


Give me some credit, pal.


You're the one who didn't know what an Alford plea was.  Just sayin'.

Please note: I'm not saying prosecutorial abuse doesn't happen, that
it's not a problem, or that we haven't vastly overcriminalized our civil
life.  But this paranoid fantasy some people have going, where they
believe *every* prosecutor is corrupt... that's just childish.

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Fwd: It's time for PGP to die.

2014-08-19 Thread MFPA
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Hi


On Tuesday 19 August 2014 at 10:05:23 PM, in
mid:53f3bc13.8040...@sixdemonbag.org, Robert J. Hansen wrote:



 What the prosecutor is offering there is, you will plead guilty to
 lesser charges, but I'm only willing to do this if you're willing to
 show me the full extent of your illegal activities, so cough up the
 passphrase so I can verify it for myself.

 When you're facing coercion, you're not getting anything out of the
 trade.

In my opinion that is pure semantics.

The situation you described can be characterised as the prosecutor
telling the accused that they will suffer X regardless, plus the
threat that they will additionally suffer Y if they refuse to
co-operate.

That seems to resemble the definition of Coercion [0]:-

The action or practice of persuading someone to do something by using
force or threats.

[0] http://www.oxforddictionaries.com/definition/english/coercion




- --
Best regards

MFPAmailto:2014-667rhzu3dc-lists-gro...@riseup.net

No matter what a man's past may have been, his future is spotless.
-BEGIN PGP SIGNATURE-

iPQEAQEKAF4FAlPzxDJXFIAALgAgaXNzdWVyLWZwckBub3RhdGlvbnMub3Bl
bnBncC5maWZ0aGhvcnNlbWFuLm5ldEJBMjM5QjQ2ODFGMUVGOTUxOEU2QkQ0NjQ0
N0VDQTAzAAoJEKipC46tDG5ph5kD/0q4ZWtNYVLRdgmtcCv877H8fV+o0yaoC2Ud
h4nkA/K9kEC8ILA9QLhYOnLB7cpXwwATWAsLCgDTOHmK7R+raQANQKfAXnxaDKaR
9k/CfoSyUsB7+eXinVrIjRq7ELMhnRbMsBsPhS8mEKcz2p8wCafC3HkW5CuHYRvx
RewEIzom
=9Mhf
-END PGP SIGNATURE-


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Fwd: It's time for PGP to die.

2014-08-19 Thread Robert J. Hansen
 In my opinion that is pure semantics.

In other news, water is wet, bricks are heavy, and politicians lie.

Yes, it's pure semantics.  It's *law*.  What, were you expecting
something else?  Wake up and realize the essential nature of what you're
talking about: law is *all about* formalism, syntax, semantics.  If you
think law is other than this, then -- well -- this conversation just
ceased being worth my time.  Discussing law with people who complain
about semantics is like discussing biology with Creationists.

 The situation you described can be characterised...

The great thing about liberty is everyone has the right to an opinion.

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Fwd: It's time for PGP to die.

2014-08-19 Thread MFPA
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Hi


On Tuesday 19 August 2014 at 11:48:29 PM, in
mid:53f3d43d.2030...@sixdemonbag.org, Robert J. Hansen wrote:


 Yes, it's pure semantics.  It's *law*.  What, were you
 expecting something else?

Fair comment, but what has been described as bargaining is still
coercion.



 The great thing about liberty is everyone has the right
 to an opinion.

It had to be good for something.


- --
Best regards

MFPAmailto:2014-667rhzu3dc-lists-gro...@riseup.net

To know what we know, and know what we do not know, is wisdom.
-BEGIN PGP SIGNATURE-

iPQEAQEKAF4FAlPz24RXFIAALgAgaXNzdWVyLWZwckBub3RhdGlvbnMub3Bl
bnBncC5maWZ0aGhvcnNlbWFuLm5ldEJBMjM5QjQ2ODFGMUVGOTUxOEU2QkQ0NjQ0
N0VDQTAzAAoJEKipC46tDG5pshsEAI5Zg1+T2KqDdeVsAOx63fsYukAi4hCDOsj1
REqcD0ChkBXRxTo0o2He2WQKo5Ojst5jPSlbGRqnkJz5DC9jkS9JwvTyTLye7r/W
Fn+t4r9pgO7yH/fJl2KEhvlq/hxI1iMQTHbIZXHczONrVwUUUFZsEG3jxuLku7dt
uNiTe+TU
=FtsL
-END PGP SIGNATURE-


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Fwd: It's time for PGP to die.

2014-08-18 Thread Johan Wevers
On 17-08-2014 22:42, Robert J. Hansen wrote:

 The only time production of a passphrase is permitted is when
 it lacks any testimonial value.

And who determines wether it has any testimonial value?

That sounds like a fine legal loophole to pressure someone into telling
the passphrase. In those cases where the US government is actually
interested in paying lip service that it will obey the law that is -
they could just as easily declare you an illegal combattant or
something like that and just torture it out of you.

-- 
ir. J.C.A. Wevers
PGP/GPG public keys at http://www.xs4all.nl/~johanw/pgpkeys.html


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: It's time for PGP to die.

2014-08-18 Thread Nicholas Cole
On Sun, Aug 17, 2014 at 10:14 PM, Robert J. Hansen r...@sixdemonbag.org wrote:
 Leaving aside the issue of how popular encryption of mail is - we are
 faced with the fact that 98 per cent of computer users are completely
 ignorant about software and hardware.


But even if they weren't, the problem is that OpenPGP protects such a
small part of the problem that it is hard to justify the additional
time and effort to users.

If the revelations of the last year have proved anything, it is that
most computer systems are vulnerable at a very deep level to all kinds
of sophisticated attacks.  In that context, where the underlying
operating systems themselves are so vulnerable, OpenPGP really doesn't
solve very much for most users.

Supposing the following threat model (which I think corresponds to how
must people use email):

- physical security of hardware.
- the need for secure communication contents (but the fact of the
communication is not secret).
- connection of the computers to the internet.
- attackers who are interested in the content of the communication and
who are willing to launch electronic attacks to get it.

OpenPGP would be an ideal solution for the actual transmission in this
scenario -- except that there is simply no operating system that can
be trusted to be a secure platform upon which to run OpenPGP.  There
will always be a weaker link than the encryption, and so the right
solution for most users is not to send confidential information by
email at all.

Now, there are still plenty of uses for OpenPGP, but they tend to be
niche ones with particular threat models and especially motivated
users.  To expect mass-adoption of a tool with only niche uses is not
reasonable.  It doesn't mean that the project is a failure.

N.

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Fwd: It's time for PGP to die.

2014-08-18 Thread Rob Ambidge
I read an article or something a while back stating the legal theory that if 
your passphrase is an admittance to a past crime, to hand over said passphrase 
would constitute as having said testimonial value and you could get away with 
not disclosing the passphrase.
But it is just legal theory, and I am no expert in law, american law, or even 
cryptography. So what happens in practice is anyone's guess really.

On 18 August 2014 07:01:46 BST, Johan Wevers joh...@vulcan.xs4all.nl wrote:
On 17-08-2014 22:42, Robert J. Hansen wrote:

 The only time production of a passphrase is permitted is when
 it lacks any testimonial value.

And who determines wether it has any testimonial value?

That sounds like a fine legal loophole to pressure someone into telling
the passphrase. In those cases where the US government is actually
interested in paying lip service that it will obey the law that is -
they could just as easily declare you an illegal combattant or
something like that and just torture it out of you.

-- 
ir. J.C.A. Wevers
PGP/GPG public keys at http://www.xs4all.nl/~johanw/pgpkeys.html


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

-- 
Sent from my Android device with K-9 Mail. Please excuse my brevity.___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Fwd: It's time for PGP to die.

2014-08-18 Thread Robert J. Hansen
On 8/18/2014 5:04 AM, Rob Ambidge wrote:
 I read an article or something a while back stating the legal theory 
 that if your passphrase is an admittance to a past crime, to hand
 over said passphrase would constitute as having said testimonial
 value and you could get away with not disclosing the passphrase.

That's one of the exceptions, yes.

Basically, if the fact you know something would tend to implicate you in
the commission of a crime, then you can't be compelled to reveal that
you know it.  Whether it's a passphrase or a safe combination makes no
difference.

There are a lot of nuances and exceptions here.  This isn't legal
advice.  If you need legal advice, ask a real lawyer, not an internet
mailing list...




smime.p7s
Description: S/MIME Cryptographic Signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: It's time for PGP to die.

2014-08-18 Thread Jerry
On Mon, 18 Aug 2014 10:04:54 +0100, Rob Ambidge stated:

 I read an article or something a while back stating the legal theory that
 if your passphrase is an admittance to a past crime, to hand over said
 passphrase would constitute as having said testimonial value and you
 could get away with not disclosing the passphrase. But it is just legal
 theory, and I am no expert in law, american law, or even cryptography. So
 what happens in practice is anyone's guess really.
 
 On 18 August 2014 07:01:46 BST, Johan Wevers joh...@vulcan.xs4all.nl
 wrote:
 On 17-08-2014 22:42, Robert J. Hansen wrote:
 
  The only time production of a passphrase is permitted is when
  it lacks any testimonial value.
 
 And who determines wether it has any testimonial value?
 
 That sounds like a fine legal loophole to pressure someone into telling
 the passphrase. In those cases where the US government is actually
 interested in paying lip service that it will obey the law that is -
 they could just as easily declare you an illegal combattant or
 something like that and just torture it out of you.

Much of the discussion has been about what analogy comes closest. Prosecutors
tend to view PGP passphrases as akin to someone possessing a key to a safe
filled with incriminating documents. That person can, in general, be legally
compelled to hand over the key. Other examples include the U.S. Supreme Court
saying that defendants can be forced to provide fingerprints, blood samples,
or voice recordings.

The entire article is available here:
http://www.cnet.com/news/judge-americans-can-be-forced-to-decrypt-their-laptops/

-- 
Jerry

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Fwd: It's time for PGP to die.

2014-08-18 Thread Robert J. Hansen
On 8/18/2014 2:01 AM, Johan Wevers wrote:
 And who determines wether it has any testimonial value?

Johan, we're entering paranoid fantasy here.  If you truly believe the
whole of the USG is corrupt, and that our independent judiciary is in
cahoots with a corrupt Executive and Legislature in order to
systematically violate people's rights, well... then I think I'm going
to need to stop talking with you, which I regret.  :(




smime.p7s
Description: S/MIME Cryptographic Signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Fwd: It's time for PGP to die.

2014-08-18 Thread Mark H. Wood
On Sun, Aug 17, 2014 at 12:41:52AM +0100, Nicholas Cole wrote:
 On Sun, Aug 17, 2014 at 12:08 AM, Robert J. Hansen r...@sixdemonbag.org 
 wrote:
[snip]
  OpenPGP's biggest problem, BTW, which goes *completely unmentioned* in
  this blogpost: OpenPGP can't protect your metadata, and that turns out
  to often be higher-value content than your emails themselves are.
  Further, exposed metadata is inherent to SMTP, which means this problem
  is going to be absolutely devilish to fix.
 
 That is true.  But perhaps it would be a start if email clients
 actually put the actual email (with subject and references headers
 etc.) as an attachment to a bare email that contained only the minimal
 headers for delivery.  It wouldn't be a perfect solution, but it would
 at least fix a certain amount of metadata analysis.

Perhaps it would be a start if sites providing SMTP would turn on
STARTTLS.

-- 
Mark H. Wood
Lead Technology Analyst

University Library
Indiana University - Purdue University Indianapolis
755 W. Michigan Street
Indianapolis, IN 46202
317-274-0749
www.ulib.iupui.edu


signature.asc
Description: Digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Fwd: It's time for PGP to die.

2014-08-18 Thread Aaron Toponce
On Mon, Aug 18, 2014 at 09:59:33AM -0400, Mark H. Wood wrote:
 Perhaps it would be a start if sites providing SMTP would turn on
 STARTTLS.

STARTTLS does not encrypt mail. It only provides safe passage over the network.
It is also client/server encrypted and decrypted. Thus, an administrator with
root at an SMTP server can view the mail once the mail transfer is decrypted.
Also, many big mail vendors have already enabled SSL/TLS/STARTTLS, such as
Google, Yahoo, and Microsoft.

-- 
. o .   o . o   . . o   o . .   . o .
. . o   . o o   o . o   . o o   . . o
o o o   . o .   . o o   o o .   o o o


pgprklDx6SXoi.pgp
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Fwd: It's time for PGP to die.

2014-08-18 Thread Mark H. Wood
On Mon, Aug 18, 2014 at 08:15:49AM -0600, Aaron Toponce wrote:
 On Mon, Aug 18, 2014 at 09:59:33AM -0400, Mark H. Wood wrote:
  Perhaps it would be a start if sites providing SMTP would turn on
  STARTTLS.
 
 STARTTLS does not encrypt mail. It only provides safe passage over the 
 network.

Sure, it does encrypt mail.  My SMTP has mail from me to deliver.  It
contacts an SMTP that it thinks can get the mail closer to its
addressee.  My SMTP sends STARTTLS, the receiving SMTP agrees, they
handshake, and the rest of the session, including MAIL FROM, RCPT TO,
and my mailgram following the DATA, is encrypted over the wire.

 It is also client/server encrypted and decrypted. Thus, an administrator with
 root at an SMTP server can view the mail once the mail transfer is decrypted.

As is often said here, what's your threat model?  Keeping
nonprivileged people out of the transaction is worthwhile, if I am
worried about mail being spied on in transit.  STARTTLS greatly
reduces the number of parties who could just read email metadata if
they have access to the wire.

Sysadmin.s take a risk if they are prying into the mail spool -- they
could be discovered.  Governments, too, may judge that the cost of
exposure of such activity is worth more than the advantage of doing
it.

But I wouldn't depend solely on STARTTLS for securing email any more
than I am satisfied to depend solely on encrypting the message body
with OpenPGP or similar means.  I believe in making the bad guys take
as much time, create as much mess, and make as much noise as I can
compel.  It costs almost nothing to make as much trouble as possible
for snoopers, and it's interesting work, so why not do it?

 Also, many big mail vendors have already enabled SSL/TLS/STARTTLS, such as
 Google, Yahoo, and Microsoft.

You mean those webmail thingies that I never use?  There's so much we
don't know about their security practices that I wasn't even thinking
about such services.  My remark was focused on the scenario above:
there is a local MUA, a local MTA and a remote MTA.

-- 
Mark H. Wood
Lead Technology Analyst

University Library
Indiana University - Purdue University Indianapolis
755 W. Michigan Street
Indianapolis, IN 46202
317-274-0749
www.ulib.iupui.edu


signature.asc
Description: Digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: It's time for PGP to die.

2014-08-18 Thread Mark H. Wood
On Sun, Aug 17, 2014 at 10:41:27AM +0100, da...@gbenet.com wrote:
 Time to die? Well after 20 years I think it is all very academic - professors 
 sit in class
 rooms the world over - not much common sense comes out of their mouths. The 
 real issues are:
 
 (a) do we want to implement our own security on our own devices as a geek or

Yes.  I know what tools I used and how I used them.

 (b) have some automated pre-installed software that will create all that's 
 necessary at
 first boot or

No.  I have no idea what it actually did.

 (c) rely on some large corporation to handle the encryption and decryption 
 for us

Same answer as (b).

-- 
Mark H. Wood
Lead Technology Analyst

University Library
Indiana University - Purdue University Indianapolis
755 W. Michigan Street
Indianapolis, IN 46202
317-274-0749
www.ulib.iupui.edu


signature.asc
Description: Digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Fwd: It's time for PGP to die.

2014-08-18 Thread Aaron Toponce
On Mon, Aug 18, 2014 at 12:24:43PM -0400, Mark H. Wood wrote:
 Sure, it does encrypt mail.  My SMTP has mail from me to deliver.  It
 contacts an SMTP that it thinks can get the mail closer to its
 addressee.  My SMTP sends STARTTLS, the receiving SMTP agrees, they
 handshake, and the rest of the session, including MAIL FROM, RCPT TO,
 and my mailgram following the DATA, is encrypted over the wire.

The connection is encrypted, not the mail itelf. SSL/TLS behave like a tunnel.
The end result is the same, but the details are different. Much like on OpenSSH
tunnel, where SSH does not know anything of the data moving through the tunnel,
STARTTLS knows nothing about the data going through its tunnel.

 You mean those webmail thingies that I never use?  There's so much we
 don't know about their security practices that I wasn't even thinking
 about such services.  My remark was focused on the scenario above:
 there is a local MUA, a local MTA and a remote MTA.

No, I mean the POP3S/IMAPS/SMTPS/MAPIS protocols your MUA, and other SMTP MTAs
connects to. Not HTTPS.

-- 
. o .   o . o   . . o   o . .   . o .
. . o   . o o   o . o   . o o   . . o
o o o   . o .   . o o   o o .   o o o


pgp2Xw45OQOkz.pgp
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Fwd: It's time for PGP to die.

2014-08-18 Thread Johan Wevers
On 18-08-2014 11:04, Rob Ambidge wrote:

 But it is just legal theory, and I am no expert in law, american law, or
 even cryptography. So what happens in practice is anyone's guess really.

I've seen what happens in practice: some group of people was accused of
organized growing of hennep. They arrested a lot of people, then dropped
the charges against some minor members of the gang. And then they became
witnesses and had to testify. Considering what could happen to them if
they talked they suddenly all had amnesia...

-- 
ir. J.C.A. Wevers
PGP/GPG public keys at http://www.xs4all.nl/~johanw/pgpkeys.html


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Fwd: It's time for PGP to die.

2014-08-18 Thread Johan Wevers
On 18-08-2014 14:31, Robert J. Hansen wrote:

 And who determines wether it has any testimonial value?

 Johan, we're entering paranoid fantasy here.  If you truly believe the
 whole of the USG is corrupt,

Well, I see some ridiculous sentences of US judges published here, but I
realize that only the most stupid ones reach the press here. However,
since US law has something called subphoena, which I consider a grave
violation of the right to remain silent, I have not much trust in US law.

And as I described in another reply, I've seen in practice what they do
to make someone testify: drop charges against person 1 so he can be
declared witness against person 2.

 and that our independent judiciary is in
 cahoots with a corrupt Executive and Legislature in order to
 systematically violate people's rights,

That seems to be what Snowden showd.

-- 
ir. J.C.A. Wevers
PGP/GPG public keys at http://www.xs4all.nl/~johanw/pgpkeys.html


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


(OT) It's time for PGP to die.

2014-08-18 Thread Peter Lebbing
On 18/08/14 19:28, Johan Wevers wrote:
 And then they became witnesses and had to testify. Considering what
 could happen to them if they talked they suddenly all had amnesia...

Classic prisoners dillemma! You know, they should arrest a whole lot of
these groups, and in a controlled setting try this many times. For science!

;P

Peter.

-- 
I use the GNU Privacy Guard (GnuPG) in combination with Enigmail.
You can send me encrypted mail if you want some privacy.
My key is available at http://digitalbrains.com/2012/openpgp-key-peter

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: It's time for PGP to die.

2014-08-18 Thread Peter Lebbing
On 17/08/14 23:14, Robert J. Hansen wrote:
 But let's be real careful about thinking we are in any way better
 than other people.  We're not.

I completely agree with that statement but never read any disrespect in
the mail you are replying to. It /can/ be read that way, I agree. So it
might be good to point it out, as you did.

 If a new email cryptography standard comes out that's significantly 
 better than GnuPG, do you think Werner is going to sit around
 drinking Tanqueray straight out of the bottle because nobody's using
 GnuPG anymore?  I don't.  I think he'll cheerfully send GnuPG off
 into maintenance, applaud the new standard, and volunteer to help
 with a free implementation of the new standard.
 
 [...]
 
 When (not if) GnuPG dies out, the only question will be, is this on 
 balance good for people?  If so, then let's be thankful GnuPG
 existed, celebrate its passing, and cheerfully move on.

Thank you for that! It was something that bothered me about the blog
post. If the writer then and there came with a great new successor to
OpenPGP and put the title OpenPGP needs to die above his article that
then goes on ... because here is my killer application, then I would
congratulate him.

Now it's nothing but hot air. OpenPGP doesn't need to die; who is it
bothering by merely existing? What has OpenPGP ever done to him? Present
large blocks of base64 at the bottom of a mail? :)

Something better needs to live. That's the opposite of what he is
saying. What a negative Nancy.

-- 
I use the GNU Privacy Guard (GnuPG) in combination with Enigmail.
You can send me encrypted mail if you want some privacy.
My key is available at http://digitalbrains.com/2012/openpgp-key-peter

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Fwd: It's time for PGP to die.

2014-08-18 Thread Robert J. Hansen
 Well, I see some ridiculous sentences of US judges published here, 
 but I realize that only the most stupid ones reach the press here. 
 However, since US law has something called subphoena, which I 
 consider a grave violation of the right to remain silent, I have not 
 much trust in US law.

Err -- *what* right to remain silent?  No country has a universal right
to remain silent.  If you're a witness to a crime, you can be compelled
to testify about what you see.  If you're in possession of documents
that are relevant to a police investigation, you can be ordered to
produce them, and so on and so on.  That's the subpoena duces tecum in a
nutshell, right there.

Keep in mind that the idea of a subpoena duces tecum is so
uncontroversial that it's been formalized in *two* separate Hague
conventions: the Hague Service Convention and the Hague Evidence
Convention.  If you don't have trust in U.S. law because we have the
subpoena duces tecum, you should have no more faith in Dutch law...

 That seems to be what Snowden showd.

Been nice talking to you, Johan.

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: It's time for PGP to die.

2014-08-18 Thread James Platt
On Aug 18, 2014, at 7:13 AM, Jerry je...@seibercom.net wrote:

 The entire article is available here:
 http://www.cnet.com/news/judge-americans-can-be-forced-to-decrypt-their-laptops/

As the article says, the question of whether the 5th Amendment applies to 
passphrases remains unclear.  There have been conflicting rulings in various 
other cases.

The article also mentions the issue of inspections at border crossings which 
are not criminal investigations.   I discussed this a while back with an ACLU 
lawyer and his take was that the border crossing is more like civil law than 
criminal law.  In a civil case, you can assert a 5th Amendment right but then 
still be compelled to testify (including disclosure of passphrases) if they 
grant you immunity from criminal prosecution for anything revealed by the 
testimony.  In this way, the 5th amendment can not protect you from civil 
liability.  So, if the ACLU lawyer is correct, then you can assert a 5th 
amendment right at a border crossing to not decrypt your laptop, they could 
then compel decryption of the laptop on condition of giving you immunity from 
prosecution.  

We use PGP whole disk encryption for laptops which have HIPAA regulated data on 
them.  Doctors here have raised questions about whether it’s right for border 
agents to get access to this data.  



signature.asc
Description: Message signed with OpenPGP using GPGMail
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: It's time for PGP to die.

2014-08-18 Thread Robert J. Hansen
 Something better needs to live. That's the opposite of what he is
 saying. What a negative Nancy.

(Long anecdote, but I promise, it's relevant.)

=

I live maybe ten miles away from the world's largest firearms museum.
When I first moved to this area a couple of years ago I figured I'd take
a look around and see what it was like.  While there, I got the chance
to see an original M-16 rifle from *1959* -- before it had even been
accepted for military service.

The museum curator explained to me that the original rifle from 1959 was
the product of extremely strict requirements.  The strictest was, it
couldn't mass more than 2.7 kilograms.  The rifle was built to meet this
seemingly-impossible weight target, and many of the worst defects of the
rifle were in reality triumphs of engineering that let them reach this goal.

For instance: the M-16 feeds hot gases directly from the barrel back
into the action in order to tap some of that energy to cycle the action
and chamber a new round.  The AK-47 has the hot gases operate on a
piston, and the piston in turn works the action.  This has the effect of
the AK-47 being much more reliable than the M-16, since it isn't
channeling hot gas and gunpowder residue directly back into the weapon.

For the last 50-odd years, people have called the M16's direct gas
impingement operation Eugene Stoner's biggest blunder.  The reality
was, the AK-47's piston-style arrangement is *heavy*, and they had a
2.7-kg weight limit... so by doing it this way, they saved about 200
grams of weight.  That's a big deal when your total allowed mass is 2.7
kilos.  That it had an unpleasant effect on the reliability, everyone
knew... but everyone also knew that if they hadn't done it, there's no
way they would've hit 2.7kg.

Today, when the basic M-16 model weighs in at 3.8kg (they waived the
2.7kg limit in the 1980s), it's easy to look at the defects and start
criticizing Eugene Stoner's biggest mistake.  When you've got a 3.8kg
rifle there's no excuse for direct gas impingement.  When your rifle is
3.8kg, the direct gas impingement can only be thought of as a terrible
blunder.

But it didn't start out that way.

=

There's a big difference between saying, this needs to die, and
something better needs to live, I agree.

I find myself wishing, though, that before people said either of them
they would give more thought to why *this particular thing* came to live
in the first place.  Because I keep on thinking about that walk through
the National Firearms Museum, and seeing that old M-16, and hearing the
curator explain that everything people hated about it were actually
features demanded by the government, and it would have never been
adopted -- much less been so successful -- without those defects.

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: It's time for PGP to die.

2014-08-18 Thread Robert J. Hansen
 The article also mentions the issue of inspections at border crossings
 which are not criminal investigations.

A U.S. appellate court recently ruled that inspections of laptop
contents at border crossings violated the Fourth Amendment.  It's
currently being appealed, but so far the tea leaves are the Supreme
Court won't touch it and will instead simply let the appellate decision
stand.  Just FYI.  :)



signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: It's time for PGP to die.

2014-08-18 Thread Kristian Fiskerstrand
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 08/18/2014 09:03 PM, Robert J. Hansen wrote:
 The article also mentions the issue of inspections at border
 crossings which are not criminal investigations.
 
 A U.S. appellate court recently ruled that inspections of laptop 
 contents at border crossings violated the Fourth Amendment.  It's 
 currently being appealed, but so far the tea leaves are the
 Supreme Court won't touch it and will instead simply let the
 appellate decision stand.  Just FYI.  :)

At least for US persons, iirc the protection doesn't extend beyond that?

- -- 
- 
Kristian Fiskerstrand
Blog: http://blog.sumptuouscapital.com
Twitter: @krifisk
- 
Public OpenPGP key 0xE3EDFAE3 at hkp://pool.sks-keyservers.net
fpr:94CB AFDD 3034 5109 5618 35AA 0B7F 8B60 E3ED FAE3
- 
Potius sero quam numquam
Better late then never
-BEGIN PGP SIGNATURE-
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=0WAA
-END PGP SIGNATURE-

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: It's time for PGP to die.

2014-08-18 Thread Robert J. Hansen
 At least for US persons, iirc the protection doesn't extend beyond
 that?

No, the Fourth Amendment protects all people within U.S. borders
equally.  Americans get no special protections over visitors to the country.


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Fwd: It's time for PGP to die.

2014-08-18 Thread Johan Wevers
On 18-08-2014 20:11, Robert J. Hansen wrote:

 Err -- *what* right to remain silent?  No country has a universal right
 to remain silent.  If you're a witness to a crime, you can be compelled
 to testify about what you see.

Yes, unfortunately.

  If you're in possession of documents
 that are relevant to a police investigation, you can be ordered to
 produce them, and so on and so on.

No, not here. When the police thinks I have such documents they can get
a search order, but if they can't find them and I remain silent it's too
bad for them. I am not in violation of any law when I don't give them,
not even when they later find out I did have them. Same for when I would
destroy or encrypt said documents after I found out the police was
looking for them.

 Keep in mind that the idea of a subpoena duces tecum is so
 uncontroversial that it's been formalized in *two* separate Hague
 conventions: the Hague Service Convention and the Hague Evidence
 Convention.

Perhaps, but the Dutch law doesn't wortk like that.

 If you don't have trust in U.S. law because we have the
 subpoena duces tecum,

Not ONLY because of that.

-- 
ir. J.C.A. Wevers
PGP/GPG public keys at http://www.xs4all.nl/~johanw/pgpkeys.html


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: It's time for PGP to die

2014-08-18 Thread Michael Anders


 Once a crisp and nicely implementable asynchronous protocol with forward
 secrecy comes up, however, we should have it implemented
 immediately.(The synchronous ones are easy, of course.)

Whispersystems has done a good job with Textsecure as ar as I read the
opinions about it. In practice their application is very usable too,
except that MMS does not work in some circumstances (but who uses that
anyway in 2014?)




Think about implementing forward secrecy for a moment and imagine, you had to develop a forward secret PGP(actually in my opinion it should properly be called backward secrecy for that matter.)

You have to keep track of all one to one communications with their current status of shared secrets. This is much more data to be kept secret than without fs. In fact depending on your activity possibly so much more that simply enciphering the whole database would not be efficient anymore. You would have to use a random access cipher (like e.g. in truecrypt). You dont have it yet? Then you have to code it - a formidable task- or get it from some other source. Just in case - do you trust the other source...?

And if you have a random access cipher, what amount of information is visible to the intruder just from viewing the outer structure and its reaction to activity of this random access database cipher?

How do you deal with simultaneously maintaining one to one communications that exchange messages 10 times a day as well as comms that talk to each other once every other year. This is a problem if you have a systen that changes public keys on a time basis.

You will have to delete info regarding dead communication strands to keep the database compact. What time do you set to declare a strand dead?
How do you recover if messages were lost or if a deleted strand suddenly is reanimated by your peer? How do you recover without opening a soft flank to attackers who want to highjack the strand?

How do you detect it when a strand was highjacked by a MITM-Attack?

How do you deal with highly asymmetric communication strands, once a year into one direction, twice a day into the other direction?

How about a busy strand where one strand sends two messages in rapid succession and resets his timer in between and the messages arrive in reversed order? How do you recover in this case?

How do you synchronize databases if a user wants to sustain the one to one communication using different systems(e.g. office PC - netbook-smartphone) intermittingly.

I can go on and on and on. To me this IS like opening a can of worms. And I seriosly doubt if the pain is worth the reward(forward secrecy).



Matthew Green mentions the Axolotl protocol and TextSecure(which you refer to in your post as well) as a product that uses it. Well if TextSecure/Axolotl -which I havent used and dont seriously know yet- solved all these problems satisfactorily and securely I bow in humble adoration(seriously).

You should have a look at the Axolotl protocol https://github.com/trevp/axolotl/wiki

First look at the humongous state variable!
Then it takes about 60 lines of description where a standard public key protocol would take about 5. From studying the protocol, you can see that some of the above mentioned problems might be solved, yet we dont know how it stands against a brilliant attacker. The sheer complexity makes me feel very uneasy.

In my view, the axolotl protocol has the elegance of transporting water in a bucket with twenty something holes, where each hole got a cork plugged into it. I wouldnt want to code it.

By the way - Green (rightfully) critizises PGP for bad defaults (e.g. using SHA1) yet he praises TextSecure which heavily relies on SHA1. This leaves me baffled.



Cheers,

 Michael Anders







___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Fwd: It's time for PGP to die.

2014-08-18 Thread Bob Holtzman
On Sun, Aug 17, 2014 at 04:42:52PM -0400, Robert J. Hansen wrote:
  Unfortunately most of us do. Including the US, UK and the Dutch are
  aklso pushing for such laws.
 
 Speaking only for the U.S., this is not the case.

Dream on.
 
 The United States Constitution protects an individual's right not to
 testify against themselves.  If the production of a passphrase would
 have any kind of testimonial value, then such production cannot be
 ordered.  The only time production of a passphrase is permitted is when
 it lacks any testimonial value.

There are quite a few ways police and prosecutors can coerce a suspect
to hand over his encryption key(s). Dangling the prospect of a lighter
sentence under the poor bugger's nose, or conversely, threatening to
come down hard, perhaps going for a death penalty. The surrender of a
suspect's keys would be voluntary and therefore constitutional. Even if
the role production serves is testimonial, if it's voluntary, and the
statement the poor sod is required to sign will so state, it's 
constitutional (I think).   

Don't forget, even non-testimonial key surrender can be used to build a
body of evidence.  

DISCLAIMER: I'm not a lawyer and the above is opinion only.
 

 Many people look at one particular case and say, hey, production was
 required in that case, clearly the U.S. can compel you to produce!, or
 production wasn't required in that case, clearly the U.S. can't compel
 you to produce!  The reality is different.  You need to look at the
 role the production serves.  Testimonial in nature?  Nope, forbidden.
 Non-testimonial?  Yep, permitted.

-- 
Bob Holtzman
Giant intergalactic brain-sucking hyperbacteria 
came to Earth to rape our women and create a race 
of mindless zombies.  Look!  It's working!


signature.asc
Description: Digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Fwd: It's time for PGP to die.

2014-08-18 Thread Robert J. Hansen
On 8/18/2014 9:32 PM, Bob Holtzman wrote:
 There are quite a few ways police and prosecutors can coerce a 
 suspect to hand over his encryption key(s).

Your examples which involve coercion are illegal, and the ones that are
legal do not involve coercion.

 Dangling the prospect of a lighter sentence under the poor bugger's 
 nose

Not coercion.

Prosecutor: We know you have an encrypted drive partition with a lot of
child porn on it.  Give up your passphrase and we'll reduce it to ten
counts of possession and drop the intent to distribute, and we won't
object to sentences running concurrently.

Defendant: ... that sounds really good.

Or, alternately, imagine the defendant is innocent of the charge:

Defendant: I can't accept that deal.  I'm innocent of that.  (True: if
you're innocent of the charge, you're not allowed to plead guilty to it.
 You might be able to talk the judge into accepting an Alford, but it'd
be an uphill battle.)

Or, alternately, imagine the defendant is guilty, but only of eight
counts of possession:

Defendant: No deal.  I'll take my risks in court.  Good luck producing
these 'thousands of images' you're talking about.

 or conversely, threatening to come down hard, perhaps going for a 
 death penalty.

Grossly illegal, in violation of the canons of legal ethics, and will
get an attorney disbarred.  Don't confuse Law  Order re-runs with
real life.  The DA is allowed to threaten prosecution of only those
crimes the DA reasonably believes a person violated, and the DA is
expressly forbidden from using the threat of the death penalty to
persuade someone to taking a lesser sentence.

 The surrender of a suspect's keys would be voluntary and therefore 
 constitutional.

In your first example yes, in your second example no.

Don't get me wrong: prosecutors have a lot of power, and I personally
believe they have too much power with too little accountability.
However, it's not a de-facto state of tyranny, either.

As always, my best advice for people facing legal problems is shut up
and get a lawyer.



smime.p7s
Description: S/MIME Cryptographic Signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: It's time for PGP to die.

2014-08-17 Thread Heinz Diehl
On 16.08.2014, Kristy Chambers wrote: 

 Sorry for that crap subject. I just want to leave this.
[]

The use of PGP/GPG depends entirely on the respective needs and
and context. For me, it has been working perfectly in many years, and
thus, what's described in this article is a good example for theory
which doesn't affect practice. At least in my case.


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: It's time for PGP to die.

2014-08-17 Thread da...@gbenet.com
On 17/08/14 08:57, Heinz Diehl wrote:
 On 16.08.2014, Kristy Chambers wrote: 
 
 Sorry for that crap subject. I just want to leave this.
 []
 
 The use of PGP/GPG depends entirely on the respective needs and
 and context. For me, it has been working perfectly in many years, and
 thus, what's described in this article is a good example for theory
 which doesn't affect practice. At least in my case.
 
 
 ___
 Gnupg-users mailing list
 Gnupg-users@gnupg.org
 http://lists.gnupg.org/mailman/listinfo/gnupg-users
 

I've been using gnupg for many many years. I have 199 users in my key ring and 
99.99 per
cent are untrusted. A fact that I for one do not mind. You don't trust my key 
is from me -
right? Trust is relative - you have all been here for many many years - but I 
will not sign
keys from you as trusted.

Leaving aside the issue of how popular encryption of mail is - we are faced 
with the fact
that 98 per cent of computer users are completely ignorant about software and 
hardware. They
just go into PC World and buy what they like. There is No Microsoft pre-loaded 
security
features built-in and so end users have no idea about encrypting their emails - 
and no easy
way to instantly share keys between users. There is no automatic key generation 
at the point
of switching the computer on for the very first time and then sharing your key 
with millions
of other people.

Same with so-called smart phones and tablets - there is no automatic simple 
key creation
and automatic posting to a secure key server.

We make an effort - but I have very very few friends that I have had to install 
gnupg on
their computers - every one I know knows nothing about computers. While we are 
concerned
with our rights to private communication - concerned with NSA GCHQ 99.99 per 
cent of the
world's population while having a general or non-existent idea of security 
have no idea of
what they should do. We fiddle while Rome burns.

After 20 odd years while there has been advances in cryptography and GUIs there 
has been an
almost zero growth in take up. No wonder Yahoo and Google (who can not be 
trusted) are
providing solutions to end users who are completely ignorant. Can you imagine 
the horror of
Microsoft entering the market? That thought scares me to death.

But we have to face the fact that Microsoft has a hold on hard drive 
manufacturers - in that
they are all sold with a version of Windows on them. What is required is that 
at first
boot up of a computer an Iphone or an Itablet whatever a programme needs to run 
that will
install and create a set of keys automatically. Your public key will 
automatically be sent
to key servers. If there are any bugs security holes - then updates should be 
automatic.

Time to die? Well after 20 years I think it is all very academic - professors 
sit in class
rooms the world over - not much common sense comes out of their mouths. The 
real issues are:

(a) do we want to implement our own security on our own devices as a geek or
(b) have some automated pre-installed software that will create all that's 
necessary at
first boot or
(c) rely on some large corporation to handle the encryption and decryption for 
us

Will global encryption and de-cryption of all emails and there attachments be 
fully automatic?

The implications for security and intelligence services are a real head ache 
but who cares!!
Some countries do not allow encryption by law and those that do will change 
their laws to
have access to All private keys or face long term jail sentences. All 
governments are
against the people.

GNUpg would have a great future if the developers had greater vision. We are in 
a very very
tiny minority of people. So small we are insignificant. The use of gpg will die 
out because
we are ALL getting a bit long in the tooth.

Service providers will make their own solutions available simply as an added 
end-user
benefit but without any legal binding on their own security. We know that the 
NSA and GCHQ
would be horrified by the thought of every one in the entire world encrypting 
their emails.
They have a vested interest of keeping it under their control.

The fact is 99.99 per cent of the world's population does not know gnupg 
exists. Or GPG4WIN.
Perhaps when we are all in our 90's we will say Oh gpg was a good idea, pity 
it did not
catch on.

David














-- 
“See the sanity of the man! No gods, no angels, no demons, no body. Nothing of 
the
kind.Stern, sane,every brain-cell perfect and complete even at the moment of 
death. No
delusion.” https://linuxcounter.net/user/512854.html - http://gbenet.com


0xAAD8C47D.asc
Description: application/pgp-keys
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Mail header encryption (was Re: It's time for PGP to die.)

2014-08-17 Thread Peter Lebbing
On 17/08/14 03:05, Garreau, Alexandre wrote:
 Well, afaik, there’s *no* MIME header which is required for delivery

However, in practice, MTA's, and specific configurations of MTA's, might depend
on headers in the mail:

- Spam filtering setups. Enough said.

- Microsoft Exchange[1] is not an RFC2822-based messaging system. When
interfacing through SMTP, POP3 or IMAP, messages are converted to and from 
X.400.

And then there is the problem of RFC 6409, Message Submission for Mail, which
specifies that the SMTP server receiving the message from the user (in other
terms, the MSA receiving the message from the MUA) /is/ allowed to alter the
message. I see a very nice example in the RFC which could be a problem with your
proposal:

 8.1. Add 'Sender'
 
 
 The MSA MAY add or replace the 'Sender' field, if the identity of the sender
 is known and this is not given in the 'From' field.
 
 The MSA MUST ensure that any address it places in a 'Sender' field is, in
 fact, a valid mail address.

And as a very specific example, I can't get my Exim server to interface to
Spamassassin without acting as an MSA to Spamassassin. This means it will
invariably add missing 'Date' and 'Message-ID' headers to any mail delivered to
me. This would not be a problem for what you're proposing; I'm just pointing out
that in practice, some unexpected issues might crop up.

 (maybe RFC says there is, but currently mail servers accepts mails with no
 headers at all)

The ones acting as MSA's will usually add them, though.

 Then things like the subject, the date, the message-id, the list of attached
 things, etc. would be protected.

The date is usually the same as the moment it is passing through the internet. A
monitoring adversary doesn't learn anything worthwhile.

The Message-ID by itself doesn't seem interesting to me. However, when combined
with the In-Reply-To and References headers, it can be very interesting.

 That makes less metadata, but it still leaks the more important: recipient
 and receiver.

Yes, it only solves minor issues but leaves the major one untouched.

Peter.

[1] I'm unsure if there are versions that are pure RFC2822. AFAIK, all Exchange
servers are prone to mangling your message, whether that's caused by X.400
conversions or not. Of course, Microsoft often knows better than RFC's, and
treats MUST NOT as purely optional.

-- 
I use the GNU Privacy Guard (GnuPG) in combination with Enigmail.
You can send me encrypted mail if you want some privacy.
My key is available at http://digitalbrains.com/2012/openpgp-key-peter

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: It's time for PGP to die.

2014-08-17 Thread Werner Koch
On Sun, 17 Aug 2014 01:08, r...@sixdemonbag.org said:

 this blogpost: OpenPGP can't protect your metadata, and that turns out
 to often be higher-value content than your emails themselves are.
 Further, exposed metadata is inherent to SMTP, which means this problem
 is going to be absolutely devilish to fix.

Right; this is an SMTP thing (RFC-821).  However SMTP is only for
transport and the content format RFC-822 defines a simple way to
encapsulate messages in other messages: Content-Type: message/rfc822.
Using this feature it is possible to keep the entire RFC-822 based mail
infrastructure while using a different transport mechanism.  This can be
done mostly transparent for existing applications using a private or
corporate gateways.


Shalom-Salam,

   Werner


-- 
Die Gedanken sind frei.  Ausnahmen regelt ein Bundesgesetz.


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: It's time for PGP to die.

2014-08-17 Thread Peter Lebbing
On 17/08/14 11:57, Werner Koch wrote:
 Using this feature it is possible to keep the entire RFC-822 based mail
 infrastructure while using a different transport mechanism.  This can be
 done mostly transparent for existing applications using a private or
 corporate gateways.

So basically what you're suggesting is:

- MUA's still work with RFC-822 based mail, with a sort of dummy envelope that
holds an encrypted MIME message/rfc822 inside with the real metadata. These
MUA's still talk IMAP and SMTP.

- We define a new transport; the message the MUA hands via SMTP is not sent on
with SMTP, but with a different transport that's not quite as leaky with
metadata. This transport ultimately delivers the message to a mailbox server
allowing access over IMAP for the MUA.

Did I interpret it correctly?

Regards,

Peter.

BTW: I still think hop-by-hop encryption with TLS, with the certificates
authenticated through something different than the CA system, goes a long way in
thwarting mass surveilance. For massive, passive data trawling surveilance, even
the CA system combined with ephemeral TLS keying might be enough, since it
requires a MITM to intercept TLS with a fake certificate. Ephemeral keys just to
be on the safe side :).

-- 
I use the GNU Privacy Guard (GnuPG) in combination with Enigmail.
You can send me encrypted mail if you want some privacy.
My key is available at http://digitalbrains.com/2012/openpgp-key-peter

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: It's time for PGP to die.

2014-08-17 Thread Heinz Diehl
On 17.08.2014, da...@gbenet.com wrote: 

 Leaving aside the issue of how popular encryption of mail is - we are faced 
 with the fact
 that 98 per cent of computer users are completely ignorant about software and 
 hardware. They
 just go into PC World and buy what they like.

Looking around where I live and work, nearly nobody is even able to
install Windows itself, and software installation is mainly done by
IT specialists. I agree that this phenomenon is caused at least
halfways by ignorance. How would these people ever be able to use GPG?
The anwer is: they would if they would care - but they don't. I've
got nothing to hide, so why bother? (*). These people won't use GPG,
even if they were capable to do so. Even in the light of the recent
spying on the privacy of the general public. I've got nothing to
hide, so I can be sure that they didn't that to me. You won't change
those peoples attitudes and perception - ever.

 We make an effort - but I have very very few friends that I have had to 
 install gnupg on
 their computers - every one I know knows nothing about computers. While we 
 are concerned
 with our rights to private communication - concerned with NSA GCHQ 99.99 
 per cent of the
 world's population while having a general or non-existent idea of security 
 have no idea of
 what they should do. We fiddle while Rome burns.

I'm afraid this won't change.
 
 After 20 odd years while there has been advances in cryptography and GUIs 
 there has been an
 almost zero growth in take up.

This is a global phenomenon wrt the information society. Knowledge as
a capacity for action has never worked. The know-do gap, failing in
getting evidence into action, is well documented (**).

 No wonder Yahoo and Google (who can not be trusted) are
 providing solutions to end users who are completely ignorant.

Giving the people what they want is a common marketing
strategy. This is not about security, it's all about binding the
customers.
 
 Time to die?

Not for me. Never. I appreciate to be able to have at least a little
bit of privacy when communication via the Internet. Even if the use of
GPG encrypted email is limited to 4-5 persons. It's worth every word
written, in every email.
 
 The implications for security and intelligence services are a real head ache 
 but who cares!!

I also care about the personnel working for my uplink who is tempted
to snook in other peoples email.

 Some countries do not allow encryption by law and those that do will change 
 their laws to
 have access to All private keys or face long term jail sentences.

They fear their own population, because they lie and
misbehave. Unfortunately, this is nothing new either.

 GNUpg would have a great future if the developers had greater vision. We are 
 in a very very
 tiny minority of people. So small we are insignificant. The use of gpg will 
 die out because
 we are ALL getting a bit long in the tooth.

It won't. At least not for me. We (= the people using it) have never
been more. I'm quite sure this won't change.

 Service providers will make their own solutions available simply as an added 
 end-user
 benefit but without any legal binding on their own security. We know that 
 the NSA and GCHQ
 would be horrified by the thought of every one in the entire world encrypting 
 their emails.

Provider encryption is useless if you don't trust your provider. It's
like letting your private key get handled by somebody else who does
the decryption for you.

 The fact is 99.99 per cent of the world's population does not know gnupg 
 exists. Or GPG4WIN.
 Perhaps when we are all in our 90's we will say Oh gpg was a good idea, pity 
 it did not
 catch on.

And that's where the big providers like Go*gle and Yah*o step
in. Wonder why they exactly came on with that after Snowden (and
others) blowed the whistle? Now, at least some are frightened they
could be a target for spying and surveillance, and the big providers
give them what they need...

Just my 5ø.


(*)  http://tinyurl.com/45xpmjr
(**) http://www.inco.hu/inco3/kozpont/cikk0h.htm


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Fwd: It's time for PGP to die.

2014-08-17 Thread Michael Anders
I share most of Greene's arguments agaist PGP to a limited extent,
however, he seems strongly biased against it.
There are two points, in which I strongly disagree with Greene:

A) For me forward secrecy is not of utmost importance for asymmetric end
to end mail encryption. Your private key is compromized if your system
has been hacked(if you don't live in a police state where authorities
can force you to reveal it). Most likely the important private messages
will still reside on your system then, so they are leaked anyways in
this case. So there is limited gain by implementing forward secrecy. So
the complaint about lacking forward secrecy is exaggerated in my eyes.

Nevertheless, there do exist solutions for asynchronous message exchange
with forward secrecy and we need to have an eye on them and watch out
for new publications on these. At present IMHO they are awkwardly
difficult to implement and maintain and just keeping a watchful eye on
them seems perfectly reasonable today. 
Once a crisp and nicely implementable asynchronous protocol with forward
secrecy comes up, however, we should have it implemented
immediately.(The synchronous ones are easy, of course.)

B) A minor point.
Greene complains, that in PGP securing ciphers with a MAC is not
enforced in the standard. For an asymmetrically enciphered message IMHO
it does not make any sense whatsoever, to secure message authenticity
with a MAC. A correct MAC is proof that the message has not been altered
by someone not knowing the symmetric key. But knowledge of the symmetric
key doesn't prove anything since it is essentially a random number
selected by the unauthenticated sender. So a correct MAC in a RSA cipher
just proves that the sender is the sender - so what? (I know that many
people disagree with me on this point, yet I have never heard a
convincing argument for the MAC in an asymmetric cipher.)
If you want authenticity, you have to have the message or cipher be
digitally signed by the sender.
For me the critcism of PGP is clearly unfair regarding this second
aspect.

Regards,
  Michael Anders




___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Fwd: It's time for PGP to die.

2014-08-17 Thread Johan Wevers
On 17-08-2014 17:08, Michael Anders wrote:

 Your private key is compromized if your system
 has been hacked(if you don't live in a police state where authorities
 can force you to reveal it).

Unfortunately most of us do. Including the US, UK and the Dutch are
aklso pushing for such laws.

 Once a crisp and nicely implementable asynchronous protocol with forward
 secrecy comes up, however, we should have it implemented
 immediately.(The synchronous ones are easy, of course.)

Whispersystems has done a good job with Textsecure as ar as I read the
opinions about it. In practice their application is very usable too,
except that MMS does not work in some circumstances (but who uses that
anyway in 2014?)

-- 
ir. J.C.A. Wevers
PGP/GPG public keys at http://www.xs4all.nl/~johanw/pgpkeys.html


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: It's time for PGP to die.

2014-08-17 Thread MFPA
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Hi


On Sunday 17 August 2014 at 10:41:27 AM, in
mid:53f078c7.2060...@gbenet.com, da...@gbenet.com wrote:




 I've been using gnupg for many many years. I have 199
 users in my key ring and 99.99 per cent are
 untrusted. A fact that I for one do not mind. You
 don't trust my key is from me - right? Trust is
 relative - you have all been here for many many years -
 but I will not sign keys from you as trusted.

I suspect that percentage is only slightly over-stated. (-;

For most of my communications, if the person has told me their email
address and it works, that's good enough for me. Use of GnuPG adds
encryption, and signing if we should want it. The Web of Trust adds
nothing in this usage case.



 Leaving aside the issue of how popular encryption of
 mail is - we are faced with the fact that 98 per cent
 of computer users are completely ignorant about
 software and hardware. They just go into PC World and
 buy what they like. There is No Microsoft pre-loaded
 security features built-in and so end users have no
 idea about encrypting their emails - and no easy way to
 instantly share keys between users. There is no
 automatic key generation at the point of switching the
 computer on for the very first time and then sharing
 your key with millions of other people.

Why would you want to automatically share your key with millions? You
would hope not to receive email from millions, and at first boot your
computer does not know your email address.



 Same with so-called smart phones and tablets - there is
 no automatic simple key creation and automatic
 posting to a secure key server.

If that did happen, whose control would the server be under? Would it
provide security or an illusion of security?



 After 20 odd years while there has been advances in
 cryptography and GUIs there has been an almost zero
 growth in take up. No wonder Yahoo and Google (who can
 not be trusted) are providing solutions to end users
 who are completely ignorant.

Is this mainly advertising hype, and there will still be limited
take-up?


 Can you imagine the horror
 of Microsoft entering the market? That thought scares
 me to death.

Wasn't that what you were advocating with automatic key generation at
the point of switching the computer on for the very first time?



 But we have to face the fact that Microsoft has a hold
 on hard drive manufacturers - in that they are all sold
 with a version of Windows on them. What is required
 is that at first boot up of a computer an Iphone or an
 Itablet whatever a programme needs to run that will
 install and create a set of keys automatically. Your
 public key will automatically be sent to key servers.

Why on earth would we want that?



 (a) do we want to implement our own security on our own
 devices as a geek or
 (b) have some automated pre-installed software that will
 create all that's necessary at first boot or
 (c) rely on some large corporation to handle the
 encryption and decryption for us

What's the difference between (b) and (c) for a Windows or Mac user?



- --
Best regards

MFPAmailto:2014-667rhzu3dc-lists-gro...@riseup.net

Learning without thought is naught;
 thought without learning is dangerous.
-BEGIN PGP SIGNATURE-

iPQEAQEKAF4FAlPxC8pXFIAALgAgaXNzdWVyLWZwckBub3RhdGlvbnMub3Bl
bnBncC5maWZ0aGhvcnNlbWFuLm5ldEJBMjM5QjQ2ODFGMUVGOTUxOEU2QkQ0NjQ0
N0VDQTAzAAoJEKipC46tDG5pUAoD/2BxQsjaN2/+HAHsCI+XNLLuWLSOzVivOF5Q
G+Xr55o3puBmzoT7NkAPYQSPe/brVtcqQ+4cH+ofjAhbcXyp8OeMhlBSJGm1zkjT
m8quXFxvXVAqBjUeitXmt0/GX9Mm9JK+Bojyv1jhdfpLAHYvF23UkkTM3+pVWu/z
E+SfcNNL
=7b6U
-END PGP SIGNATURE-


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: It's time for PGP to die.

2014-08-17 Thread Robert J. Hansen
 Leaving aside the issue of how popular encryption of mail is - we are
 faced with the fact that 98 per cent of computer users are completely
 ignorant about software and hardware.

Completely ignorant is an overstatement.  Few people today are
completely ignorant about software and hardware.  Most people do not
have the sort of knowledge about computers that I'd like, but... you
know what I realized a few weeks ago?

I was watching a janitor mop a floor... without leaving footprints in
anything.  It struck me because I mopped my kitchen floor recently and
wound up with soapy water all over my shoes and tracked it through some
of my apartment before I realized what I was doing.  I mean to go back
to that janitor sometime soon and ask him, hey, man, you look like you
know how to mop a floor correctly: what am I doing wrong?

The janitor probably doesn't know the minimum voltage to flip a
transistor (200mV, usually) and couldn't build an adder out of NAND
gates if his life depended on it.  I can't mop a floor without tracking
soapy water throughout my place.  Kind of puts in perspective which one
of us is the ignorant one, you know?

Saying most people today know very little about computers is true, and
it deserves to be said.  But let's be real careful about thinking we are
in any way better than other people.  We're not.

 There is No Microsoft pre-loaded security features built-in

Microsoft has a *ton* of security features built into their operating
systems.  Post-XP, Microsoft radically overhauled their kernel and
started enabling a ton of useful features.  DEP, ASLR, enabling some of
the cool security features of the x64 architecture...

In the XP and Win2K days, yes, Microsoft's security was a joke and it
deserved to be mocked.  It has not been that way for several years now.

 After 20 odd years while there has been advances in cryptography and
 GUIs there has been an almost zero growth in take up.

Considered reading any of the available peer-reviewed papers that have
explored why this is the case?

 But we have to face the fact that Microsoft has a hold on hard drive
 manufacturers - in that they are all sold with a version of Windows
 on them.

No, Microsoft doesn't.  Walk into a Best Buy, a Fry's Electronics, or
whatever store you choose, and it's *easy* to find hard drives that
aren't pre-loaded with Windows.

 GNUpg would have a great future if the developers had greater
 vision.

Then fork the source code and code up your own vision.

 The use of gpg will die out because we are ALL getting a bit long in
 the tooth.

So what?

If a new email cryptography standard comes out that's significantly
better than GnuPG, do you think Werner is going to sit around drinking
Tanqueray straight out of the bottle because nobody's using GnuPG
anymore?  I don't.  I think he'll cheerfully send GnuPG off into
maintenance, applaud the new standard, and volunteer to help with a free
implementation of the new standard.

If GnuPG dies out because nobody cares about privacy, I'm not going to
mourn the loss of GnuPG.  I'm going to mourn how nobody cares about
privacy any more.

GnuPG is useful and good only to the extent that it is a useful and good
thing for human beings.  *People* are the important thing.  The authors
hope GnuPG will help people.  But, by itself, GnuPG is ... really rather
pointless.

When (not if) GnuPG dies out, the only question will be, is this on
balance good for people?  If so, then let's be thankful GnuPG existed,
celebrate its passing, and cheerfully move on.

 Perhaps when we are all in our 90's we will say Oh gpg was a good
 idea, pity it did not catch on.

The good ideas in computer science are overwhelmingly rejected.  The
ones that endure are usually really bad ones.  Compare the Intel 80x86
architecture against *any* of its competitors, for instance.  x86
Assembler makes me bleed through my eyeballs and beg for the sweet sweet
release of death.  It isn't MIPS or PA-RISC or PowerPC or any of the
literally *dozens* of superior architectures I've worked with over the
years.  And yet, x86 won in the marketplace.

I think everyone on this list who has more than ten or so years of
experience in the industry will have their own tales of technological
woe.  Good technologies get rejected, and then ten years later they get
rediscovered and renewed.

Look at VMS and UNIX.  UNIX won the server wars of the '80s and early
'90s and completely crushed VMS... up until VMS came back as Windows NT.
 Now, VMS has won the desktop, where UNIX is completely dead... except
for how UNIX got re-resurrected a few years ago as OS X, and as the Mac
desktop it's making a strong showing.  Good technologies rarely win, but
they almost always get re-adopted later.  It's a cycle.  :)

(No, I'm not kidding regarding Windows NT/VMS.  The parallels between
them are *profound*.  The same guy, Cutler, designed both, and the
Windows desktops that most people use nowadays are direct descendants of
VMS!)


Re: Fwd: It's time for PGP to die.

2014-08-17 Thread Robert J. Hansen
 Unfortunately most of us do. Including the US, UK and the Dutch are
 aklso pushing for such laws.

Speaking only for the U.S., this is not the case.

The United States Constitution protects an individual's right not to
testify against themselves.  If the production of a passphrase would
have any kind of testimonial value, then such production cannot be
ordered.  The only time production of a passphrase is permitted is when
it lacks any testimonial value.

Many people look at one particular case and say, hey, production was
required in that case, clearly the U.S. can compel you to produce!, or
production wasn't required in that case, clearly the U.S. can't compel
you to produce!  The reality is different.  You need to look at the
role the production serves.  Testimonial in nature?  Nope, forbidden.
Non-testimonial?  Yep, permitted.

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: It's time for PGP to die.

2014-08-17 Thread MFPA
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Hi


On Sunday 17 August 2014 at 10:14:51 PM, in
mid:53f11b4b.1040...@sixdemonbag.org, Robert J. Hansen wrote:


 I was watching a janitor mop a floor... without leaving
 footprints in anything.  It struck me because I mopped
 my kitchen floor recently and wound up with soapy water
 all over my shoes and tracked it through some of my
 apartment before I realized what I was doing.  I mean
 to go back to that janitor sometime soon and ask him,
 hey, man, you look like you know how to mop a floor
 correctly: what am I doing wrong?

To mop a floor (or, indeed, to concrete a floor) you start at the
opposite end to the door you will leave through and you work towards
the door, keeping off the bit you have already done.


- --
Best regards

MFPAmailto:2014-667rhzu3dc-lists-gro...@riseup.net

It is easy to propose impossible remedies.
-BEGIN PGP SIGNATURE-

iPQEAQEKAF4FAlPxIb5XFIAALgAgaXNzdWVyLWZwckBub3RhdGlvbnMub3Bl
bnBncC5maWZ0aGhvcnNlbWFuLm5ldEJBMjM5QjQ2ODFGMUVGOTUxOEU2QkQ0NjQ0
N0VDQTAzAAoJEKipC46tDG5p7wgD/RWd4o+hxCKgRTs1kZwU2lF6Ky3+oU6I9Yw/
luXgAFzuFbLo84MEDLByAxuDvtViIr9JY7ScGTcWGbWqtU9/npm/MMEaqp0UeUqJ
uC9Zg6eAB4qeTlimxDQWf2i+Y1yyws09Nq2/sIaHEqXM5E4dwBLYPOtFnEWjkHhL
9p33zSUu
=Fk1y
-END PGP SIGNATURE-


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: It's time for PGP to die.

2014-08-17 Thread Robert J. Hansen
 To mop a floor (or, indeed, to concrete a floor) you start at the
 opposite end to the door you will leave through and you work towards
 the door, keeping off the bit you have already done.

Yes.  And somehow, I keep on getting soapy water on my shoes.


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


It's time for PGP to die.

2014-08-16 Thread Kristy Chambers
Sorry for that crap subject. I just want to leave this.
http://blog.cryptographyengineering.com/2014/08/whats-matter-with-pgp.html

Regards,
Chambers

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: It's time for PGP to die.

2014-08-16 Thread Garreau, Alexandre
On 2014-08-16 at 19:14, Kristy Chambers wrote:
 Sorry for that crap subject. I just want to leave this.
 http://blog.cryptographyengineering.com/2014/08/whats-matter-with-pgp.html

Yeah, PGP’s what I’d call something coming with and for the “old”
Internet, the slow, federated, cleartext, client–server, monocast and
sedentary one. Another critique: http://secushare.org/PGP.

But if you really want to fix all these issues, what you need is not
improving PGP/GnuPG, but rebuilding the whole Internet. That’s not the
goal of GnuPG, you’d better give a look at GNUnet. To fix these issues,
it doesn’t only plan to replace GnuPG, but also mail, IRC, jabber, web
forums, web itself, HTTP(S), newsgroups, FTP, bittorrent, TLS, DNS(SEC),
TCP–UDP/IP, BGP, and quite everything that you could imagine in
Internet, which is all fundamentally completely broken, obsolete and way
excessively complicated, if you try to see things from this point of
view.

Yet PGP hides some information in a more secure way than cleartext, is
usable by the people who need it the most and is part of our internet
tech culture. So waiting during we try to rebuild and revolution the
world again, it stays fine to keep using it, but we need to know its
deficiencies, and to take care of who, how, when, where and why to teach
it.


signature.asc
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: It's time for PGP to die.

2014-08-16 Thread Robert J. Hansen
On 8/16/2014 1:14 PM, Kristy Chambers wrote:
 Sorry for that crap subject. I just want to leave this.

Meh.  Color me unimpressed.


* PGP keys suck.  No, asymmetric key infrastructure sucks in general.
 OpenPGP provides no infrastructure, only tools with which to build
infrastructure.  If your organization doesn't build its infrastructure,
that's not OpenPGP's fault.

* PGP key management sucks.  Sigh.  Ditto.

* No forward secrecy.  Not everyone needs PFS, and frankly, obsession
with PFS is one of those things I really wish people would grow out of.
 Before complaining about what OpenPGP needs or where it's lacking, try
looking at where OpenPGP has been broken in the real world.  Hint: PFS
ain't a panacea.

* The OpenPGP format and defaults suck.

Good Lord, no.  As Jon Callas pointed out recently on the OpenPGP
working group list, there's a big difference between what the standard
*requires* and what implementations are encouraged to *use*.  Most
implementations have moved far beyond minimal conformance with the
standard.  The standard exists so that there is a common minimal core
that all clients can conform to: the reality is the two biggest players
(PGP and GnuPG) both go *far* beyond the defaults.

* Terrible mail client implementations.

Again, unimpressed.  Consider his criticism that most OpenPGP-enabled
mail clients store passphrases in memory for longer than he'd like.
Well, one, this is easily configurable via gpg-agent, and two, *so
what*?  If an attacker is in a position where he or she can read
arbitrary memory locations on your PC, you're completely screwed anyway
and there's nothing OpenPGP can do to help you.

* So what should we be doing?

I'd start by ignoring the recommendations.  Do your own homework on
where OpenPGP fails and how, and start thinking about how to fix those.
 The author falls into the trap of knowing how to fix A, B, and C, and
so he wants to fix A, B, and C, without realizing the real problems are
X, Y and Z.

OpenPGP's biggest problem, BTW, which goes *completely unmentioned* in
this blogpost: OpenPGP can't protect your metadata, and that turns out
to often be higher-value content than your emails themselves are.
Further, exposed metadata is inherent to SMTP, which means this problem
is going to be absolutely devilish to fix.





smime.p7s
Description: S/MIME Cryptographic Signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Fwd: It's time for PGP to die.

2014-08-16 Thread Nicholas Cole
On Sun, Aug 17, 2014 at 12:08 AM, Robert J. Hansen r...@sixdemonbag.org wrote:
 On 8/16/2014 1:14 PM, Kristy Chambers wrote:
 Sorry for that crap subject. I just want to leave this.

 Meh.  Color me unimpressed.

This was a terrific post.  Thank you, Robert.

[snip]

 * No forward secrecy.  Not everyone needs PFS, and frankly, obsession
 with PFS is one of those things I really wish people would grow out of.
  Before complaining about what OpenPGP needs or where it's lacking, try
 looking at where OpenPGP has been broken in the real world.  Hint: PFS
 ain't a panacea.

I agree people are obsessed with this, and it is unhealthy. I think
the name doesn't help.  I've seen various definitions.

http://en.wikipedia.org/wiki/Forward_secrecy

This means that the compromise of one message cannot lead to the
compromise of others.  In the case of PGP, of course, it is true that
the compromise of the Public key would compromise all messages, but in
other ways PGP does help. It is possible, for example, to surrender
just the session key, in the case that it is necessary to do so to
comply with a legitimate law-enforcement request.  But I don't see how
PFS could really apply to something like email, as opposed to
something like an http request.

 * So what should we be doing?

There are 25 years invested in making PGP work. Many subtle bugs and
security errors in the protocol and the gnupg implementation have been
worked out.   Throwing out PGP would be a bit like making this
mistake:

http://www.joelonsoftware.com/articles/fog69.html

 OpenPGP's biggest problem, BTW, which goes *completely unmentioned* in
 this blogpost: OpenPGP can't protect your metadata, and that turns out
 to often be higher-value content than your emails themselves are.
 Further, exposed metadata is inherent to SMTP, which means this problem
 is going to be absolutely devilish to fix.

That is true.  But perhaps it would be a start if email clients
actually put the actual email (with subject and references headers
etc.) as an attachment to a bare email that contained only the minimal
headers for delivery.  It wouldn't be a perfect solution, but it would
at least fix a certain amount of metadata analysis.

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Fwd: It's time for PGP to die.

2014-08-16 Thread Garreau, Alexandre
On 2014-08-17 at 01:41, Nicholas Cole wrote:
 On Sun, Aug 17, 2014 at 12:08 AM, Robert J. Hansen r...@sixdemonbag.org 
 wrote:
 OpenPGP's biggest problem, BTW, which goes *completely unmentioned* in
 this blogpost: OpenPGP can't protect your metadata, and that turns out
 to often be higher-value content than your emails themselves are.
 Further, exposed metadata is inherent to SMTP, which means this problem
 is going to be absolutely devilish to fix.

 That is true.  But perhaps it would be a start if email clients
 actually put the actual email (with subject and references headers
 etc.) as an attachment to a bare email that contained only the minimal
 headers for delivery.  It wouldn't be a perfect solution, but it would
 at least fix a certain amount of metadata analysis.

Well, afaik, there’s *no* MIME header which is required for delivery
(maybe RFC says there is, but currently mail servers accepts mails with
no headers at all). The headers that are needed for delivery are not
MIME ones (the ones like “From:”, “To:”, “Date:”, “Message-Id:”,
“Subject:”, etc.) but the SMTP one (the “MAIL FROM:” and “RCPT TO:”)
which are separated. So I think mail clients could just send a void mail
with just as much MIME informations to says its content is a MIME
message (“message/rfc822” MIME type I think). Then things like the
subject, the date, the message-id, the list of attached things,
etc. would be protected. That makes less metadata, but it still leaks
the more important: recipient and receiver.

So the only way is to build an asynchronous communication system based
on anonymity, like GNUnet’s doing.


signature.asc
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Fwd: It's time for PGP to die.

2014-08-16 Thread Robert J. Hansen
On 8/16/2014 7:41 PM, Nicholas Cole wrote:
 There are 25 years invested in making PGP work. Many subtle bugs and
 security errors in the protocol and the gnupg implementation have been
 worked out.   Throwing out PGP would be a bit like making this
 mistake:

More or less, yeah.  Someday I'm going to wind up getting frustrated to
the point where I write an angry, bitter, ranty screed on how the
biggest headache with OpenPGP is unrealistic expectations and demands on
the part of people who claim to know better, but obviously don't...



smime.p7s
Description: S/MIME Cryptographic Signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users