Re: [cryptography] the Zcash Open Source Miner Challenge (and about Zcash in general)

2016-11-02 Thread grarpamp
On Mon, Oct 10, 2016 at 10:55 PM, Zooko Wilcox-OHearn wrote: > open-source implementations > Jump in! The worst that can happen is that you get the fun and > education of implementing an interesting new proof-of-work algorithm. > :-) Zcash is Linux only. That's not good for diversity, adoption,

Re: [cryptography] the Zcash Open Source Miner Challenge (and about Zcash in general)

2016-10-11 Thread grarpamp
I'd agree that "forums" are a poor choice. They're magnets for masses of the clueless, which is fine for that purpose. And they're heavyweight, captive, and exploitable. Lists can be archived, replicated, distributed, offlined, searched with any MUA, etc. +1. (A bidirectional gateway to list, with

[cryptography] RNG Breakthrough: Explicit Two-Source Extractors and Resilient Functions

2016-05-17 Thread grarpamp
Let's do another 100 post round on the favorite subject shall we... because serious RNG is serious. Academics Make Theoretical Breakthrough in Random Number Generation https://news.ycombinator.com/item?id=11719543 https://threatpost.com/academics-make-theoretical-breakthrough-in-random-number-gene

Re: [cryptography] USG-Apple - 3/22/16 Hearing Procedures, Add 3 USGs

2016-03-20 Thread grarpamp
On 3/18/16, Jeffrey Walton wrote: > It sounds like its turning into a circus sideshow: > > ... in addition to Courtroom 4, there will be additional overflow > rooms in which the hearing will be shown on video screens. All of > these rooms together can accommodate up to a total of 324 spectators. >

Re: [cryptography] [cryptome] Crypto Beguilement

2016-02-21 Thread grarpamp
On 2/21/16, Michael Best wrote: > What, if anything, could the government do involving crypto that you > wouldn't see as nefarious or two faced? Um, as crypto can be done anywhere by any individuals / consensus / delegee. Question is really, is any govt (any specific extant one, or in theory), va

Re: [cryptography] [Cryptography] Cryptome’s searing critique of Snowden Inc.

2016-02-14 Thread grarpamp
On 2/14/16, Henry Baker wrote: > Can someone please post a link to the .mp3 or .mp4 of this interview? youtube-dl https://api.soundcloud.com/tracks/246093198 Interview with Cryptome (2016-02-06)-246093198.mp3 sha1: 2cf21291e0190dcc2b6c1fa2587994546311ea0f _

Re: [cryptography] Paris Attacks Blamed on Strong Cryptography and Edward Snowden

2015-11-18 Thread grarpamp
On Thu, Nov 19, 2015 at 1:21 AM, mtm wrote: > how did hominids manage prior to crypto? Papyrus sealed in wax via trusted courier with promise of sword to neck for peeking, capture, or failed delivery. ___ cryptography mailing list cryptography@randombit

Re: [cryptography] Paris Attacks Blamed on Strong Cryptography and Edward Snowden

2015-11-18 Thread grarpamp
On Wed, Nov 18, 2015 at 8:51 PM, Ted W. wrote: > And yet, we find that the Paris attackers did not communicate via > encrypted channels for most of their planning. Surprise surprise: Which means absolutely nothing to these anti crypto people. And is no excuse for you to quit deploying crypto and

Re: [cryptography] Paris Attacks Blamed on Strong Cryptography and Edward Snowden

2015-11-17 Thread grarpamp
On Tue, Nov 17, 2015 at 1:39 PM, Givon Zirkind wrote: > imho, the crypto involved is not the issue. not having boots on the ground, > good intel, good spies who can walk and talk like the enemy, is the real > issue. Exactly. Governments have had at least 15 years to strap those boots, and certai

Re: [cryptography] Paris Attacks Blamed on Strong Cryptography and Edward Snowden

2015-11-17 Thread grarpamp
On Tue, Nov 17, 2015 at 11:06 AM, John Young wrote: > Wheedling about crypto and Snowden diverts from CIA Director's full speech > and broader critique. CIA version omits Q&A. > > http://csis.org/files/attachments/151116_GSF_OpeningSession.pdf > https://www.schneier.com/blog/archives/2015/11/pari

Re: [cryptography] a little help with cookies please

2015-09-16 Thread grarpamp
What is of more crypto / security interest is not bandwidth use or even domain or path restrictions, but failure of webdevs to seed and restrict sensitive cookies (like your authenticated session id's) from and to TLS only sessions. Well known top100 sites that still have a legacy http mode fail to

Re: [cryptography] CNSS Issues Memo on Shift to Quantum-Resistant Cryptography

2015-08-18 Thread grarpamp
On Mon, Aug 17, 2015 at 12:53 PM, John Young wrote: > CNSS Advisory Memo on Use of Public Standards for Secure Sharing of > Information Among NatSec Systems 08/11/15 > > https://www.cnss.gov/CNSS/openDoc.cfm?DLuhIVBMUGJh7R8iXAWwIQ== > iang wrote: > John, that document blocked due to session varia

Re: [cryptography] Possible SigInt Metadata Dump Files Circulating

2015-06-11 Thread grarpamp
No evidence, calling baloney on this one. The theory is fun though. ___ cryptography mailing list cryptography@randombit.net http://lists.randombit.net/mailman/listinfo/cryptography

Re: [cryptography] Mixing multiple password hashing: Crypto Blasphemy or Useful approach?

2015-03-15 Thread grarpamp
Is this not the old chained crypto argument? It comes down to whether or not you believe is, or will be, an attack known or unknown upon any singular or combined crypto choice. If you do believe, which is reasonable given prior crypto has been broken and that all knowledge is never public, then com

Re: [cryptography] OT: THE GREAT SIM HEIST

2015-02-19 Thread grarpamp
On Thu, Feb 19, 2015 at 3:50 PM, Jeffrey Walton wrote: > https://firstlook.org/theintercept/2015/02/19/great-sim-heist/ > > AMERICAN AND BRITISH spies hacked into the internal computer network > of the largest manufacturer of SIM cards in the world, stealing > encryption keys used to protect the

Re: [cryptography] [Cryptography] Equation Group Multiple Malware Program, NSA Implicated

2015-02-17 Thread grarpamp
>From someone failing to send to list: > Or he actually got those docs ... Possible, but you would expect crypto research to be well compartmented from legal, sigint and offensive ops that appear to be the sole scope of the known docs. If research does posess a break, maintaining that secret while

Re: [cryptography] [Cryptography] Equation Group Multiple Malware Program, NSA Implicated

2015-02-17 Thread grarpamp
Here's an interesting comparison. Most academic cryptographers believe that the NSA has lost its lead: While for years they were the only ones doing cryptography, and were decades ahead of anyone on the outside, but now we have so many good people on the outside that we've cau

Re: [cryptography] [Cryptography] How the CIA Made Google

2015-02-09 Thread grarpamp
On Sun, Feb 1, 2015 at 6:31 PM, ianG wrote: > On 31/01/2015 16:14 pm, John Young wrote: >> >> An early program of Highlands Group was perception management by >> which public opinion would be shaped by disparagement of opposition >> to ubiquitous gov-com spying with gambits like "tin-foil hat," "c

Re: [cryptography] ODNI Counsel: Governments Want Accessible Crypto from Business

2015-02-07 Thread grarpamp
> http://en.wikipedia.org/wiki/USA_Freedom_Act > http://www.lawfareblog.com/2015/02/the-lawfare-podcast-episode-109-robet-litt-on-us-surveillance-policy-one-year-after-ppd-28/ > http://www.lawfareblog.com/2015/02/live-bob-litt-speaks-at-brookings-on-intelligence-and-surveillance-reform/ Related la

Re: [cryptography] ODNI Counsel: Governments Want Accessible Crypto from Business

2015-02-07 Thread grarpamp
On Sat, Feb 7, 2015 at 8:42 PM, John Young wrote: > ODNI counsel Robert Litt is "optimistic" cryptographers will devise secure > encryption which provides government access, it's "what many governments > > want." > "One of the many ways in which Snowden's leaks have damaged our national > securit

Re: [cryptography] John Gilmore: Cryptography list is censoring my emails

2014-12-31 Thread grarpamp
On Wed, Dec 31, 2014 at 7:16 AM, John Young wrote: > http://cryptome.org/2014/12/gilmore-crypto-censored.htm John(Gnu): Likely Trilight Zone is not an app (like cspace), it's a service (like other/similar services they claim to be concerned about in media-35535.pdf). Best used in the noted conju

Re: [cryptography] NSA Attacks on VPN, SSL, TLS, SSH, Tor

2014-12-30 Thread grarpamp
On Tue, Dec 30, 2014 at 7:17 AM, John Young wrote: > Cryptome does not pretend to provide illusory security, that is security. > It is a vile, rotten, corrupt endeavor, like life. Chuckle. > Visitors, readers, consumers must be skeptical of security, and not rely > [...] All due respect to Crypto

Re: [cryptography] Hash this motherfucker, said math to germ.

2014-12-30 Thread grarpamp
> K scriben: > I would like to get back to serious crypto conversations now. Thank you. You mean the quarterly circle jerk about random numbers, PKI, standards, committees, and whatever else gets routinely hashed to death? I'd consider models of hashing and signing distributed materials as a ser

Re: [cryptography] NSA Attacks on VPN, SSL, TLS, SSH, Tor

2014-12-29 Thread grarpamp
On Mon, Dec 29, 2014 at 8:20 AM, John Young wrote: > Hash this motherfucker, said math to germ. JYA, you, as the original publisher of various and valued datasets... the responsibility to calculate, sign, and publish said hashes rests with you alone. Please consult with any trusted parties should

Re: [cryptography] Near-collisions and ECC public keys

2014-12-29 Thread grarpamp
On Mon, Dec 29, 2014 at 8:18 AM, Florian Weimer wrote: > To check an OpenPGP fingerprint for correctness, it is sufficient (for > practical purposes) to compare the leading and trailing eight > hexadecimal digits, and perhaps a few digits in the middle. It is, only if you prefer these odds... 16^

Re: [cryptography] [Cryptography] Email encryption for the wider public

2014-09-18 Thread grarpamp
On Thu, Sep 18, 2014 at 10:16 AM, Jonathan Thornburg > business to E-mail me a receipt/confirmation/whatever.) Getting the > spelling of $spouse's (8-letter, but "odd" to many people) E-mail correct > over a poor-quality phone connection is hard enough already! http://en.wikipedia.org/wiki/NATO_

Re: [cryptography] Email encryption for the wider public

2014-09-17 Thread grarpamp
On Wed, Sep 17, 2014 at 9:43 AM, Henry Augustus Chamberlain wrote: > I propose that we use the local part of the email address to store the public > key, > ... > my email address would be (64 random letters)@gmail.com > ... > Somebody not using encrypted emails could still click on your "mailto"

Re: [cryptography] [Cryptography] Browser JS (client side) crypto FUD

2014-07-27 Thread grarpamp
On Sat, Jul 26, 2014 at 2:57 PM, Theodore Ts'o wrote: > On Sat, Jul 26, 2014 at 05:03:46PM +0200, Lodewijk andré de la porte wrote: >> >> "WHAT'S THE "CHICKEN-EGG PROBLEM" WITH DELIVERING JAVASCRIPT CRYPTOGRAPHY? > Somebody, please, give me something to say against people that claim JS > client s

Re: [cryptography] Hashing power of attackers

2014-07-22 Thread grarpamp
On Tue, Jul 22, 2014 at 12:46 AM, Maarten Billemont wrote: > Is there public research to demonstrate what kind of cost would be associated > with, say, 10B, 50B, 100B SHA-256 hashes per second? The Bitcoin network is bruteforcing at about $950k/PH/s of double SHA-256 on ASIC, plus expenses. So u

[cryptography] List of digital currencies?

2014-06-24 Thread grarpamp
Any links to a list of digital currencies organized by technology? ie: Bitcoin has countless forks characterized by nothing more than adjusting (or not) the operating parameters of the bitcoin.org code and starting their own genesis. Others may swap out the hash or crypto functions within that. Wh

Re: [cryptography] How big a speedup through storage?

2014-06-21 Thread grarpamp
On Fri, Jun 20, 2014 at 6:35 PM, Jeffrey Goldberg wrote: > (I hope it is clear that I do not think of this as anything like a practical > threat to AES. Of course, 8 rounds at 2^unreachable is not practical. > I had just remembered this paper, with its enormous data > requirements when I saw ori

Re: [cryptography] How big a speedup through storage?

2014-06-20 Thread grarpamp
On Fri, Jun 20, 2014 at 3:23 PM, Jeffrey Goldberg wrote: > On 2014-06-19, at 10:42 PM, Lodewijk andré de la porte > wrote: > >> With common algorithms, how much would a LOT of storage help? > > Well, with an unimaginable amount of storage it is possible to shave a few > bits off of AES. > > As

Re: [cryptography] [Cryptography] encrypting hard drives (was Re: Shredding a file on a flash-based file system?)

2014-06-19 Thread grarpamp
On Thu, Jun 19, 2014 at 6:05 PM, Dan McDonald wrote: >> In the OpenZFS world, you deploy each OS's FDE underneath ZFS. > > For now, yes. That's what you're stuck with. That's actually not a problem. > That blog is 3.5 years old. I think things have likely improved since then. Only if customer

Re: [cryptography] [Cryptography] encrypting hard drives (was Re: Shredding a file on a flash-based file system?)

2014-06-19 Thread grarpamp
On Thu, Jun 19, 2014 at 4:18 PM, Dan McDonald wrote: > ZFS crypto, closed-source thanks to Oracle, was supposed to address this > problem. Its design was to apply crypto in the "ZIO" path, like it does for > checksums. I've not used Oracle Solaris, but apparently ZFS crypto is in > there and it

Re: [cryptography] [Cryptography] Help investigate cell phone snooping by police nationwide

2014-06-08 Thread grarpamp
On Sun, Jun 8, 2014 at 1:04 PM, jim bell wrote: > Why not wrap the phone in a couple of layers of aluminum foil? (Although, > it won't shield against audio if that's being recorded even while an RF > contact does not exist...) The thread referred to refrigerators and microwaves. Yes even an ungr

Re: [cryptography] [Cryptography] Help investigate cell phone snooping by police nationwide

2014-06-07 Thread grarpamp
On Sat, Jun 7, 2014 at 11:45 PM, Sidney Markowitz wrote: > I don't know what would make me feel safer - putting the phones in a microwave > oven with the chance that the door could easily be left ajar, or getting the > acoustic insulation and masking hum of a refrigerator. Trust the microwave you

Re: [cryptography] [Cryptography] Help investigate cell phone snooping by police nationwide

2014-06-07 Thread grarpamp
(or as Snowden demonstrated, put in a fridge to avoid scrutiny and audio capture the best idea. non-serial tower associations are an anomaly alerted and acted upon.) Faraday cages concept really depend on the freqs they are designed to inhibit, pressure, sound, radio, optic, etc. G

Re: [cryptography] The next gen P2P secure email solution

2014-06-01 Thread grarpamp
On Sun, Jun 1, 2014 at 9:45 PM, Cathal (phone) wrote: > What about streaming, which is increasingly used to hold power to account in > real time? Or other rich, necessarily large media which needs to *get out > fast*? Big media isn't always frivolous. Even frivolity is important, and a > mixnet wi

Re: [cryptography] The next gen P2P secure email solution

2014-06-01 Thread grarpamp
On Fri, May 16, 2014 at 6:01 AM, wrote: >> >> pesky to/from/subject/etc headers. >> > Those are hidden by use of TLS. >> weaknesses intrinsic to SMTP discussions? >> Yes, they are hidden in TLS transport on the wire. >> No, they are not hidden in core or on disk at >> the intermediate and final

Re: [cryptography] The next gen P2P secure email solution

2014-06-01 Thread grarpamp
In May 2014 someone wrote: >> > p2p is no panacea, it doesn't scale >> >> I believe it could. Even if requiring super aggregating >> nodes of some sort. Layers of service of the whole >> DHT space. More research is surely required. > It is not possible to have fast p2p unless: > - Cable networks c

Re: [cryptography] The next gen P2P secure email solution

2014-05-15 Thread grarpamp
>> pesky to/from/subject/etc headers. > > Oh boy, here we go. > Those are hidden by use of TLS. Have you not been following the weaknesses intrinsic to SMTP discussions? Yes, they are hidden in TLS transport on the wire. No, they are not hidden in core or on disk at the intermediate and final mess

Re: [cryptography] The next gen P2P secure email solution

2014-05-15 Thread grarpamp
On Thu, May 15, 2014 at 8:36 AM, wrote: >> >> - Email is entrenched in the offices, many a business is powered by it; >> >> They are powered by authorized access to and useful end use of message >> content, not by email. That's not going anywhere, only the intermediate >> transport is being redes

Re: [cryptography] The next gen P2P secure email solution

2014-05-12 Thread grarpamp
On Fri, May 9, 2014 at 11:49 AM, rysiek wrote: > Dnia wtorek, 22 kwietnia 2014 20:58:50 tpb-cry...@laposte.net pisze: >> Although technical solutions are feasible Then do it and see what happens. >> we ought to consider some things: >> - Email is older than the web itself; So is TCP/IP and the

Re: [cryptography] OT: Speeding up and strengthening HTTPS connections for Chrome on Android

2014-04-25 Thread grarpamp
On Fri, Apr 25, 2014 at 5:36 PM, ianG wrote: > On 25/04/2014 22:14 pm, Jeffrey Walton wrote: >> Somewhat off-topic, but Google took ChaCha20/Poly1305 live. >> http://googleonlinesecurity.blogspot.com/2014/04/speeding-up-and-strengthening-https.html >> ... It also *does not support any cipher suit

Re: [cryptography] [tor-talk] The Heartbleed Bug is a serious vulnerability in OpenSSL

2014-04-08 Thread grarpamp
On Tue, Apr 8, 2014 at 2:02 PM, Joe Btfsplk wrote: >> On 4/7/2014 6:14 PM, grarpamp wrote: >> http://heartbleed.com/ >> Patch your stuff. > Comments / suggestions from those w/ in depth knowledge in this area? How > users should proceed; how to check if sites used (bank

Re: [cryptography] 2010 TAO QUANTUMINSERT trial against 300 (hard) targets

2014-03-15 Thread grarpamp
On Thu, Mar 13, 2014 at 11:13 AM, Jason Iannone wrote: > And remain undetected? That's a nontrivial task and one that I would > suspect generates interesting CPU or other resource utilization anomalies. > It's a pretty high risk activity. The best we can hope for is someone > discovering the exp

Re: [cryptography] Commercialized Attack Hardware on SmartPhones

2014-03-06 Thread grarpamp
The liberationtech list occaisionally has threads on this. Then things like guardianproject are working on hardening and even making alternate phone OS's. ie: I think there may now be some porting of some BSD's to phone cpu's, not that it is much different from linux/droid in regard. Then remember

Re: [cryptography] MaidSafe: p2p encrypted anonymous drivesharing homedir network?

2014-01-28 Thread grarpamp
On Tue, Jan 28, 2014 at 10:03 AM, Kevin wrote: > What sort of claims? 1) secure 2) anonymous 3) free 4) the usual etc ___ cryptography mailing list cryptography@randombit.net http://lists.randombit.net/mailman/listinfo/cryptography

[cryptography] MaidSafe: p2p encrypted anonymous drivesharing homedir network?

2014-01-27 Thread grarpamp
Lots of unknown popups making bold claims lately that should be looked into... discuss? -- Forwarded message -- From: David Irvine Date: Sun, Jan 26, 2014 at 10:51 AM Subject: [bitcoin-list] Meeting place to discuss 'the decentralised internet' projects To: bitcoin-l...@lists.sou

[cryptography] Fwd: Email is unsecurable - maybe not?

2014-01-18 Thread grarpamp
More direct junkmail... -- Forwarded message -- From: Doug McFetters Date: Thu, Jan 16, 2014 at 2:06 PM Subject: Email is unsecurable - maybe not? To: grarp...@gmail.com Hello I ran across the Nov 25 blog post on RandomBit.net titled ‘Email is unsecurable.’ I think we have

Re: [cryptography] using Curve p25519 cryptography for type 2(Mixmaster) and type 3(mixminion) remailer blocks

2014-01-14 Thread grarpamp
>> On Tue, Jan 14, 2014 at 2:14 PM, gwen hastings wrote: >>> ... >>> I am looking at resurrecting >>> >>> mixmaster, mixminion and nym.alias.net nymserver designs from the >>> various code wastebaskets and retrofit them with some newer encryption >>> technology based on curve25519 and poly-1305 li

Re: [cryptography] The next gen P2P secure email solution

2014-01-09 Thread grarpamp
On Tue, Dec 24, 2013 at 5:09 AM, danimoth wrote: > On 24/12/13 at 04:20am, grarpamp wrote: >> This thread pertains specifically to the use of P2P/DHT models >> to replace traditional email as we know it today. There was >> a former similarly named thread on this that

Re: [cryptography] The next gen P2P secure email solution

2013-12-25 Thread grarpamp
On Wed, Dec 25, 2013 at 7:19 AM, Randolph wrote: > Anyone looked at BitMail p2p ? > http://sourceforge.net/projects/bitmail/?source=directory re: bitmail, goldbug, etc. With all due respect, I doubt few here have or will anytime soon. You spam out links to binaries no one's heard of, your source

[cryptography] The next gen P2P secure email solution

2013-12-25 Thread grarpamp
On Wed, Dec 25, 2013 at 8:21 AM, Jeremie Miller wrote: > This thread seems pretty immense and in various places, what's the best way > to contribute to it? > > I'm pretty keen on the topic, been working on /real/ p2p infrastructure for > 5+ years now :) I'm not sure that it has a proper home.

Re: [cryptography] The next gen P2P secure email solution

2013-12-24 Thread grarpamp
On Tue, Dec 24, 2013 at 5:01 AM, danimoth wrote: > In these months there was a lot of talking about "metadata", which SMTP > exposes regardless of encryption or authentication. In the design of > this p2p system, should metadata's problem kept in consideration or not? > IMHO exposing danimoth@cryp

Re: [cryptography] The next gen P2P secure email solution

2013-12-24 Thread grarpamp
On Tue, Dec 24, 2013 at 5:03 AM, Natanael wrote: > Somebody in there mentioned allowing IPv6 addressing on top of I2P/Tor. That > would be Garlicat/Onioncat. It creates a local virtual IPv6 network > interface for your software to use, so that you can map key based addresses > to routable local ad

Re: [cryptography] The next gen P2P secure email solution

2013-12-24 Thread grarpamp
On Tue, Dec 24, 2013 at 5:09 AM, danimoth wrote: > A problem which could rise is the 'incentive' for peers to continuosly > providing bandwidth and disk space to store messages. I'm a simple dude, > with a mailflow of ~5 email per day. Why I should work for you, with > your ~1 mail per day for

Re: [cryptography] The next gen P2P secure email solution

2013-12-24 Thread grarpamp
More summary pasting... / Someone... / There are people I know who do not mind the extra steps for pgp. I / certainly want to get the roll out to use and test and enjoy. Sign me / up. grarpamp... Encryption is only part of it. There's transport, elimination of central storage, anonymity

[cryptography] The next gen P2P secure email solution

2013-12-24 Thread grarpamp
g and finally a user facing daemon that moves messages into and out of local spools for use by normal user/system tools. Pasting in a very rough and unflowing thread summary to date for interested people to pick up and discuss, draft, etc. = grarpamp... > [pgp/smime email encryption, etc] >

Re: [cryptography] The next generation secure email solution

2013-12-15 Thread grarpamp
Moving the last couple days talk to this thread seems fine. On Sun, Dec 15, 2013 at 3:19 PM, Ralf Senderek wrote: > On Sun, 15 Dec 2013 grarpamp wrote: > >> The only way to have any real global seamless success is to go >> ground up with a completely new model. IMO, that will

[cryptography] Gaps in email [was: PGP userbase]

2013-12-15 Thread grarpamp
>> Phillip H-B, et al have been saying... >> [email encryption, etc] >> What is the gap we have to close to turn this on by default? > > How many times has this been rehashed the last six months? > You can't fix email as we know it today using todays bolt-ons, > protocols and corporate stakeholders

Re: [cryptography] [Cryptography] Email is unsecurable

2013-11-25 Thread grarpamp
On Mon, Nov 25, 2013 at 1:01 AM, ianG wrote: > On 23/11/13 15:30 PM, Ralf Senderek wrote: >> On Sat, 23 Nov 2013, David Mercer wrote: >> >>> But of course you're right about actual current usage, encrypted email >>> is an >>> epic fail on that measure regardless of format/protocol. >> >> Yes, but

Re: [cryptography] Fwd: GB Secure Messenger V 06 released

2013-10-24 Thread grarpamp
On Thu, Oct 24, 2013 at 5:50 PM, R.R. D. wrote: > fwd fyi > -- Forwarded message -- > Subject: GoldBug Secure Messenger V 06 released > http://goldbug.sf.net Forwarded eh? From who, or where? ... 'mikeweber', 'berndhs'? Public mailing list, forum, website, bugtracker, IRC? You kee

[cryptography] FreeBSD crypto and security meta

2013-10-21 Thread grarpamp
> https://lists.freebsd.org/pipermail/freebsd-security/2013-October/007226.html http://www.freebsd.org/news/status/report-2013-07-2013-09.html#AES-NI-Improvements-for-GELI http://www.freebsd.org/news/status/report-2013-07-2013-09.html#Reworking-random(4) ___

[cryptography] FreeBSD crypto and security meta [was: zfs review 4185 New hash algo]

2013-10-07 Thread grarpamp
> Date: Mon, 7 Oct 2013 11:44:57 +0200 > From: Pawel Jakub Dawidek > To: z...@lists.illumos.org > Subject: Re: [zfs] [Review] 4185 New hash algorithm support > > On Mon, Oct 07, 2013 at 12:47:52AM +0100, Saso Kiselkov wrote: >> Please review what frankly has become a bit of a large-ish feature: >>

Re: [cryptography] Daniel the King. Jon the President. Linus the God?

2013-10-05 Thread grarpamp
On Sat, Oct 5, 2013 at 4:21 AM, ianG wrote: > Long Live Competition! There should be no King to serve, no Committee to subvert, only an open Process. ___ cryptography mailing list cryptography@randombit.net http://lists.randombit.net/mailman/listinfo/cr

Re: [cryptography] [tor-talk] Guardian Tor article

2013-10-04 Thread grarpamp
Some have said... > this [Snowden meta arena] has been a subject of discussion on > the [various] lists as well > Congrats, torproject :-D > "Tor Stinks" means you're doing it right; good job Tor devs :) > good news everybody; defense in depth is effective and practical! Yes, fine work all han

Re: [cryptography] The Compromised Internet

2013-09-27 Thread grarpamp
On 9/27/13, Eugen Leitl wrote: > On Fri, Sep 27, 2013 at 01:12:19PM -0400, grarpamp wrote: >> >> The mentioned tech has nothing to do with traditional 'ham'. >> And without the crypto key they can't see it and can't disrupt > > HamNet/AMPRNet ... >

Re: [cryptography] The Compromised Internet

2013-09-27 Thread grarpamp
On 9/27/13, Eugen Leitl wrote: > I don't see how a ham running a repeater backbone can > prevent end to end encryption other than sniffing for > traffic and actively disrupting it. I'm not sure tampering > with transport is within ham ethics, though they definitely > don't understand the actual us

Re: [cryptography] The Compromised Internet

2013-09-25 Thread grarpamp
On 9/25/13, Greg Rose wrote: > Even under the much-relaxed export laws of the US, deriving spreading > information cryptographically is a prohibited export. Which isn't to say it > is not a good idea. The US only applies to itself. Further, over the air, it's noise, the crypto is undetectable and

Re: [cryptography] The Compromised Internet

2013-09-25 Thread grarpamp
On 9/25/13, Rich Jones wrote: > That kind of technology is already widely deployed in walkie talkies - I > think I remember at HOPE a speaker mentioning that the NYPD used this > technique until they abandoned it due to its inconvenience. > > http://en.wikipedia.org/wiki/Frequency-hopping_spread_s

Re: [cryptography] The Compromised Internet

2013-09-25 Thread grarpamp
On 9/25/13, John Young wrote: > Now that it appears the Internet is compromised what other > means can rapidly deliver tiny fragments of an encrypted > message, each unique for transmission, then reassembled > upon receipt, kind of like packets but much smaller and less > predictable, dare say ran

[cryptography] Random number generation influenced, HW RNG

2013-09-06 Thread grarpamp
On 9/6/13, Eugen Leitl wrote: > - Forwarded message from Andy Isaacson - > > From: Andy Isaacson > Subject: Re: [liberationtech] Random number generation being influenced - > rumors > > On Fri, Sep 06, 2013 at 10:45:46AM -0700, Joe Szilagyi wrote: >> Does anyone put any stock into the ru

Re: [cryptography] Matthew Green: An understated response to the NSA and unidentifed friends treachery

2013-09-06 Thread grarpamp
On 9/6/13, John Young wrote: > An understated response to the NSA and unidentifed friends treachery: > > http://blog.cryptographyengineering.com/2013/09/on-nsa.html > > More of these expected, many. But who knows, as Green says, > all could go back to swell comsec business as usual. Linked from s

Re: [cryptography] regarding the NSA crypto "breakthrough"

2013-09-05 Thread grarpamp
On 9/5/13, coderman wrote: > of all the no such agency disclosures, this one fuels the most wild > speculation. > """ > James Bamford, a veteran chronicler of the NSA, describes the agency > """ Links to links to source quotes... http://lists.randombit.net/pipermail/cryptography/2013-June/004477.

Re: [cryptography] regarding the NSA crypto "breakthrough"

2013-09-05 Thread grarpamp
On 9/5/13, coderman wrote: > On Thu, Sep 5, 2013 at 11:38 AM, grarpamp wrote: >> ... >>> however, the crypto breakthrough discussed is more mundane: >> >> Source? Sure, non-PFS can be exploited. > > i asked Snowden for an authoritative copy... ;P Didn't

Re: [cryptography] Snowden Induced Mea Culpas

2013-08-26 Thread grarpamp
On Sun, Aug 25, 2013 at 8:49 PM, Lodewijk andré de la porte wrote: > Assume all mayor cryptotools are exploited. Sad but true. > .. > False security is a danger unlike many others. None of us should forget > that. NSA says use aes256 for top secret. AES goes worldwide. Would be pretty funny if in

Re: [cryptography] urandom vs random

2013-08-21 Thread grarpamp
On Wed, Aug 21, 2013 at 6:44 PM, Aaron Toponce > which in order to be truly random, must come from some chaotic random > source, such as radioactive decay. However, you can make statistical > judgements on the output > to determine if the source is 'random enough'. Perhaps not quite, as others h

Re: [cryptography] urandom vs random

2013-08-20 Thread grarpamp
On Tue, Aug 20, 2013 at 5:58 PM, Natanael wrote: > For all you know the PRNG could be doing nothing more > than doing SHA256 of a fixed value plus a counter Yes, and in an application where even that trivial design would serve to fit some use, testing the apparent randomness.of proposed hash func

Re: [cryptography] urandom vs random

2013-08-20 Thread grarpamp
The subject thread is covering a lot about OS implementations and RNG various sources. But what are the short list of open source tools we should be using to actually test and evaluate the resulting number streams? ___ cryptography mailing list cryptograp

Re: [cryptography] urandom vs random

2013-08-19 Thread grarpamp
> if they had a product, you would have had it. > > It's a recurring theme -- there doesn't seem to be enough market demand for > Hardware RNGs. > > I once toyed with the idea of creating an open source hardware design This reminds me, where are the open designs for a strong hwRNG based on the com

Re: [cryptography] evidence for threat modelling -- street-sold hardware has been compromised

2013-07-31 Thread grarpamp
> On IBM's watch, right. But the Thinkpads were manufactured by Lenova in > China well before that; what IBM sold was the franchise & rights. And so where does Cisco and Juniper gear come from again... ? ___ cryptography mailing list cryptography@rando

Re: [cryptography] a Cypherpunks comeback

2013-07-22 Thread grarpamp
On Mon, Jul 22, 2013 at 3:41 AM, Adam Back wrote: > Could you please get another domain name, that name is just ridiculous. > > It might tickle your humour but I guarantee it does not 99% of potential > subscribers... > > Unless your hidden objective is to drive away potential subscribers. Though

Re: [cryptography] Must have seemed like a good idea at the time

2013-07-21 Thread grarpamp
> A number of projects have been launched to use cell phones as a money > device, a smart card. I am pretty sure if your malware can send sms, it can > transfer funds. > > This not all that fatal, as the money is traceable, but it means that the > financial institution needs an apparatus to revers

Re: [cryptography] Is the NSA now a civilian intelligence agency? (Was: Re: Snowden: Fabricating Digital Keys?)

2013-07-01 Thread grarpamp
> id like to say these fellas are decent men True for sure. Yet sometimes when you assemble large systems of even the best of men, those systems may drift from or not always retain the fine character of its components. A weakness of humanity perhaps. ___

Re: [cryptography] Is the NSA now a civilian intelligence agency? (Was: Re: Snowden: Fabricating Digital Keys?)

2013-07-01 Thread grarpamp
> Whereas the > incentive to keep the secret from spilling is so strong that it should > act as a moderator on its operators. ... against use outside of its original scope/parties. I can see that. Time and history tends to expose everything though. And in the present, not knowing what we don't kno

Re: [cryptography] Potential funding for crypto-related projects

2013-07-01 Thread grarpamp
> I think if Tor had an arbitrary queue with store and forward as a high > latency module of sorts, we'd really be onto something. Then there would > be tons of traffic on the Tor relays for all kinds of reasons - high and > low latency - only to all be wrapped in TLS and then in the Tor protocol.

Re: [cryptography] Is the NSA now a civilian intelligence agency? (Was: Re: Snowden: Fabricating Digital Keys?)

2013-07-01 Thread grarpamp
> And when LEA > get caught doing this nothing terribly bad happens to LEA (no officers > go to prison, for example). It is often in the interest/whim of the executive to decline to prosecute its own, even if only to save embarassment, so many of these cases will never see a jury. That's why you n

Re: [cryptography] Potential funding for crypto-related projects

2013-06-30 Thread grarpamp
> I'm not seeing that many options though. The Phantom project died pretty > fast; > https://code.google.com/p/phantom/ > https://groups.google.com/forum/#!forum/phantom-protocol > http://phantom-anon.blogspot.se/ I would bet that Phantom both ran out of developer time and has discouraged further

Re: [cryptography] Potential funding for crypto-related projects

2013-06-30 Thread grarpamp
> There should be a disclaimer somewhere that Tor is a competitor to I2P, is > far from perfect itself (actually has a few glaring weaknesses, such as exit > nodes), and the guy critiquing I2P works for Tor. There should be a table somewhere that shows that all these different systems have diffe

Re: [cryptography] Snowden: Fabricating Digital Keys?

2013-06-30 Thread grarpamp
> that if Snowden has access to them - other people who wish to have > access may also have these document - too bad none of them seem to care > to educate the public or to expose the incredibly illegal interpretation The incidence/depth of leakers/leaks over time seems to be increasing. Whether o