Re: [cryptography] Paris Attacks Blamed on Strong Cryptography and Edward Snowden

2015-11-19 Thread Benjamin Kreuter
On Thu, 2015-11-19 at 06:21 +, mtm wrote: > how did hominids manage prior to crypto? The same way we managed before writing -- ciphers of various kinds have been in use for all of recorded history. -- Ben signature.asc Description: This is a digitally signed message part __

Re: [cryptography] Define Privacy

2014-10-26 Thread Benjamin Kreuter
On Sun, 2014-10-26 at 10:35 +, ianG wrote: > On 22/10/2014 03:22 am, Jason Iannone wrote: > > On a fundamental level I wonder why privacy is important and why we > > should care about it. > > > Financial privacy is all about theft. If someone knows where the money > is, it can be stolen. It

Re: [cryptography] Can we move to a forum, please?

2013-12-24 Thread Benjamin Kreuter
On Tue, 24 Dec 2013 21:36:46 -0500 Peter Todd wrote: > On Tue, Dec 24, 2013 at 07:43:12PM -0500, Greg wrote: > > I'm curious, is Aaron's response representative of the entire > > list's, or are there folks out there lurking who would actually > > appreciate a forum? > > > > Show of hands? > > I

Re: [cryptography] Can we move to a forum, please?

2013-12-24 Thread Benjamin Kreuter
On Tue, 24 Dec 2013 19:56:32 -0500 Greg wrote: > It would be interesting, actually, to see whether the list's software > could be automatically integrated with a forum like SMF. Nobody needs to modify the list's software. You can just have your forum's web server receive the mailing list's mess

Re: [cryptography] Can we move to a forum, please?

2013-12-24 Thread Benjamin Kreuter
On Tue, 24 Dec 2013 18:40:29 -0500 Greg wrote: > K, ya'll got some recommendations? Stick with the mailing list. If we are going to move anywhere, it should be toward something like a moderated Usenet newsgroup (if not actually moving to Usenet). > Also, do you enjoy not being able to edit you

Re: [cryptography] Can we move to a forum, please?

2013-12-24 Thread Benjamin Kreuter
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On Tue, 24 Dec 2013 16:44:24 -0500 Greg wrote: > Thoughts? Can we please *not* do this? Web forums are horribly annoying places where we must deal with some other person's conception of what a good client should look like. Frankly, after everyth

Re: [cryptography] Design Strategies for Defending against Backdoors

2013-11-18 Thread Benjamin Kreuter
On Mon, 18 Nov 2013 12:58:40 -0500 Thierry Moreau wrote: > Then you lose the better theoretical foundations of probabilistic > signature schemes ... Deterministic signature schemes are not without their theoretical merits e.g. Merkle trees. -- Ben -- Benjamin R Kreuter KK4FJZ -- "If larg

Re: [cryptography] Design Strategies for Defending against Backdoors

2013-11-18 Thread Benjamin Kreuter
On Mon, 18 Nov 2013 10:27:30 +0300 ianG wrote: > Vendors should make their encryption code public, including the > protocol specifications. This will allow others to examine the code > for vulnerabilities. I would add to this that simpler code is better. The Underhanded C Coding Contest s

Re: [cryptography] open letter to Phil Zimmermann and Jon Callas of Silent Circle, re: Silent Mail shutdown

2013-08-17 Thread Benjamin Kreuter
On Sat, 17 Aug 2013 12:30:40 +0300 ianG wrote: > This was always known as the weakness of the model. The operator > could simply replace the applet that was downloaded in every instance > with one that had other more nefarious capabilities. There were > thoughts and discussions about how to avo

Re: [cryptography] skype backdoor confirmation

2013-05-21 Thread Benjamin Kreuter
On Tue, 21 May 2013 14:17:02 +1000 "James A. Donald" wrote: > Police install malware by black bagging, and by the same methods as > botnets. Both methods are noticeable. I do not think the following scenario is terribly far-fetched: Suppose the police want to target a grad student in a CS dep

Re: [cryptography] ��

2012-04-28 Thread Benjamin Kreuter
On Sat, 28 Apr 2012 16:31:10 +1000 "James A. Donald" wrote: > On 2012-04-28 4:05 PM, ianG wrote: > > Yes. Let's talk about traffic analysis - how are we going to > > mitigate traffic analysis? That's much more interesting. > > Assume everything is encrypted. Then stuff that is not time urgent >

Re: [cryptography] [info] The NSA Is Building the Country’s Biggest Spy Center (Watch What You Say)

2012-03-25 Thread Benjamin Kreuter
On Sat, 24 Mar 2012 02:29:30 -0500 Marsh Ray wrote: > If you're looking for someplace to feel subversive around, this isn't > it. Crypto is a mainstream engineering discipline these days, and one > greatly needed by modern civilization. Unfortunately, there is still a great deal of resistance

Re: [cryptography] (off-topic) Bitcoin is a repeated lesson in cryptography applications - was "endgame"

2012-02-26 Thread Benjamin Kreuter
On Sun, 26 Feb 2012 11:00:15 -0500 "Bill St. Clair" wrote: > On Sun, Feb 26, 2012 at 10:08 AM, Benjamin Kreuter > wrote: > > On Sun, 26 Feb 2012 08:48:05 -0500 > > d...@geer.org wrote: > > > Money and government go hand in hand.  Governments need money in &

Re: [cryptography] (off-topic) Bitcoin is a repeated lesson in cryptography applications - was "endgame"

2012-02-26 Thread Benjamin Kreuter
On Sun, 26 Feb 2012 17:57:14 +1000 "James A. Donald" wrote: > > On 2012-02-26 1:18 AM, Benjamin Kreuter wrote: The demand > > for Bitcoin as a currency is driven by its properties as a > > digital cash system; people still need to get their > > nation&

Re: [cryptography] (off-topic) Bitcoin is a repeated lesson in cryptography applications - was "endgame"

2012-02-26 Thread Benjamin Kreuter
On Sun, 26 Feb 2012 08:48:05 -0500 d...@geer.org wrote: > > Well put, James. Warren Buffet's arguments are, to my eye, > aligned with yours. He argues that gold has no intrinsic > value, unlike farmland or a company like Coca Cola. In that > way, his evaluation is as instrumentalist as is your

Re: [cryptography] (off-topic) Bitcoin is a repeated lesson in cryptography applications - was "endgame"

2012-02-25 Thread Benjamin Kreuter
On Sat, 25 Feb 2012 13:36:50 +1000 "James A. Donald" wrote: > On 2012-02-25 12:53 PM, ianG wrote: > > It is also a singular lesson in the emotive power of cryptography > > to encourage large numbers of people to hash their intelligent > > thought processes. What we are seeing is otherwise rati

Re: [cryptography] US Appeals Court upholds right not to decrypt a drive

2012-02-24 Thread Benjamin Kreuter
On Sat, 25 Feb 2012 05:30:57 +1000 "James A. Donald" wrote: > So: Don't talk to police about the contents of your drive, or indeed > anything of which they might potentially disapprove. I believe that you meant to say, "Don't talk to the police at all," which should be standard policy for anyo

Re: [cryptography] Homomorphic split-key encryption OR snake oil crypto

2012-02-19 Thread Benjamin Kreuter
On Sun, 19 Feb 2012 17:08:25 +0100 Florian Weimer wrote: > * Saqib Ali: > > > Can somebody explain me how this so-called Homomorphic split-key > > encryption works? > > Isn't this just a protocal which performs a cryptographic primitive > using split key material, without actually recombining t

Re: [cryptography] trustwave admits issuing corporate mitm certs

2012-02-12 Thread Benjamin Kreuter
On Sun, 12 Feb 2012 05:57:02 -0500 Jeffrey Walton wrote: > On Sun, Feb 12, 2012 at 5:43 AM, Krassimir Tzvetanov > wrote: > > While I'm not a lawyer and my opinion is in noway authoritive I do > > not believe there is any violation. They ay be an accessory to a > > potential crime but they themse

Re: [cryptography] Gregory Perry's follow-up to the FBI OpenBSD / OCF backdoors thread

2012-01-16 Thread Benjamin Kreuter
On Mon, 16 Jan 2012 18:47:06 +1300 Peter Gutmann wrote: > Harald Hanche-Olsen writes: > > >Maybe it's just me, but I find myself unable to make sense of this > >part: > > > > [...] one mathematical vulnerability in the RSA encryption > > algorithm related to changing the base numbering system

Re: [cryptography] Complying with GPL V3 (Tivoization)

2012-01-10 Thread Benjamin Kreuter
On Tue, 10 Jan 2012 21:34:53 +0100 Florian Weimer wrote: > * Thierry Moreau: > > > [D] The GPL V3 compliance would forbid any transfer of such > > gplv3-turned-proprietary ROM-based equipment outside of the > > organization (one would put back the original ROM version as part of > > IT equipment

Re: [cryptography] Complying with GPL V3 (Tivoization)

2012-01-09 Thread Benjamin Kreuter
On Sun, 8 Jan 2012 22:46:13 -0500 Jeffrey Walton wrote: > Hi All, > > I was reading on CyanogenMod (a custom ROM project for Android) and > "The story behind the mysterious CyanogenMod update" > (http://lwn.net/Articles/448134/). > > Interestingly, it seems some privaye keys were circulated to

Re: [cryptography] really sub-CAs for MitM deep packet inspectors? (Re: Auditable CAs)

2011-12-06 Thread Benjamin Kreuter
On Tue, 6 Dec 2011 12:34:37 +0100 Adam Back wrote: > Kids figure this stuff out getting through site restrictions on > school wifi also. Some schools try to block popular web games.. eg > runescape. Let us not discourage either the children or the schools! This sounds like an excellent way for

Re: [cryptography] Math corrections

2011-09-19 Thread Benjamin Kreuter
On 09/18/2011 05:11 PM, Marsh Ray wrote: > B. If your threat model considers as an adversary government A, then > you're in good company with governments B through Z. So all the comments > on "won't save you from The Government", while true, are also > potentially writing off your biggest ally. Un

Re: [cryptography] Math corrections

2011-09-18 Thread Benjamin Kreuter
On 09/18/2011 03:30 PM, Joe St Sauver wrote: > Ian asked: > > #Right -- how to fix the race to the bottom? > > Wasn't that supposed to be part of the Extended Validation solution? > > If it has failed at that, and I could see arguments either way, the > other "natural" solution is probably gover