Re: Video Mules: (Was: Re: Psuedo-Private Key (eJazeera) )

2002-11-26 Thread Bill Stewart
At 10:23 AM 11/24/2002 -0600, Neil Johnson wrote: (Referring to previous thread about capturing video.) As I sit here looking at a 64 MB SD Card that I just picked up for $28 at my local Wally World, I was wondering why it (or it is larger capacity brethren) couldn't be used to record video and

Re: Video Mules: (Was: Re: Psuedo-Private Key (eJazeera) )

2002-11-25 Thread Major Variola (ret)
At 10:12 PM 11/24/02 +0100, Eugen Leitl wrote: >On Sun, 24 Nov 2002, Tyler Durden wrote: > >> I believe Daniel Hillis (or was it Jaron Lanier?) inserted time-capsule >> information into a cockroach's DNA and released it into the Boston subways. >> He calculated that this would be the way to preserv

Re: Video Mules: (Was: Re: Psuedo-Private Key (eJazeera) )

2002-11-24 Thread Tyler Durden
This assumes the insert doesn't result in negative fitness (could very well be, if the insert kills a gene). If the information is the history of human civilization, that may very well end up being information of great "negative fitness"! (We shall see...) Actually, from what I understand, ther

Re: Video Mules: (Was: Re: Psuedo-Private Key (eJazeera) )

2002-11-24 Thread Morlock Elloi
> couldn't be used to record video and then (after appropriate protection) > swallowed. Eventually this will happen. Maybe a video recorded into a DNA of a bacteria synthesized in a portable device ("diamond age", anyone ?) Ne protocols will be required ("if I infect this east coast girl, how l

Re: Video Mules: (Was: Re: Psuedo-Private Key (eJazeera) )

2002-11-24 Thread Morlock Elloi
> Lousy latency. Just put your DNA-encoded message in a microdot on your > dead tree letter, and PCR/sequence on arrival. Isn't all snail mail already irradiated ? Then soon. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: Yahoo! Mail Plus  Powerful. Affordab

Re: Video Mules: (Was: Re: Psuedo-Private Key (eJazeera) )

2002-11-24 Thread Tyler Durden
rlock Elloi <[EMAIL PROTECTED]> To: Neil Johnson <[EMAIL PROTECTED]>, [EMAIL PROTECTED] Subject: Re: Video Mules: (Was: Re: Psuedo-Private Key (eJazeera) ) Date: Sun, 24 Nov 2002 12:03:39 -0800 (PST) > couldn't be used to record video and then (after appropriate protection) >

Re: Video Mules: (Was: Re: Psuedo-Private Key (eJazeera) )

2002-11-24 Thread Eugen Leitl
On Sun, 24 Nov 2002, Morlock Elloi wrote: > Ne protocols will be required ("if I infect this east coast girl, how long it > will take for the message to get to south africa ?") Lousy latency. Just put your DNA-encoded message in a microdot on your dead tree letter, and PCR/sequence on arrival.

Video Mules: (Was: Re: Psuedo-Private Key (eJazeera) )

2002-11-24 Thread Neil Johnson
(Referring to previous thread about capturing video.) As I sit here looking at a 64 MB SD Card that I just picked up for $28 at my local Wally World, I was wondering why it (or it is larger capacity brethren) couldn't be used to record video and then (after appropriate protection) swallowed.

Re: Video Mules: (Was: Re: Psuedo-Private Key (eJazeera) )

2002-11-24 Thread Eugen Leitl
On Sun, 24 Nov 2002, Morlock Elloi wrote: > Isn't all snail mail already irradiated ? Then soon. It's not, because electron accelerators are a) expensive b) tend to damage mail. Besides, the few ug or ng dry DNA in the microdot is not a living being. It can remain readable at ridiculously hig

Re: Video Mules: (Was: Re: Psuedo-Private Key (eJazeera) )

2002-11-24 Thread Eugen Leitl
On Sun, 24 Nov 2002, Tyler Durden wrote: > I believe Daniel Hillis (or was it Jaron Lanier?) inserted time-capsule > information into a cockroach's DNA and released it into the Boston subways. > He calculated that this would be the way to preserve information for the > longest period of time.

Re: Psuedo-Private Key (eJazeera)

2002-11-21 Thread Sarad AV
hi, I had suggested the same for an encryption product called digisecret,this is what they had to say. >Here is an example where hiding cipher text in cipher text is ideal.. DigiSecret currently does not use assymmetric algorithms. Besides this the introduction of this technique will mean that

RE: Psuedo-Private Key (eJazeera)

2002-11-21 Thread Vincent Penquerc'h
> And depending on the situation, the key-holder will decide > whether to give > them a key that destroys the real data, or that doesn't (and > hides it). Don't even bother trying to destroy the original. Chances are they will make a backup of everything before attempting anything. And destroyi

Re: Psuedo-Private Key (eJazeera)

2002-11-21 Thread Tyler Durden
Variola wrote... What's missing? What part of your threat model didn't they consider? Well, that the recipient of the message may not be on their own machine (not running "Rubberhose"), etc... Stego your activist photos into kiddie porn which is stegoed into >random plaintext cover images

Re: Psuedo-Private Key (eJazeera)

2002-11-21 Thread Peter Fairbrother
Tyler Durden wrote: [...] > Let's say I've been coerced into revealing the private key to a certain > encrypted message. And now, of course, the authorities use that key and open > the message, and see the contents (let's assume they are picture of a > demonstration or whatever). > > WOULDN'T IT B

Re: Psuedo-Private Key (eJazeera)

2002-11-20 Thread Major Variola (ret)
At 02:19 PM 11/20/02 -0500, Tyler Durden wrote: >From what I can grok this is not what I was looking for, but it IS a >valuable tool. What's missing? What part of your threat model didn't they consider? >What I'm talking about, I think, would be better in certain scenarios, as a >rubber-hose-hol

Re: Psuedo-Private Key (eJazeera)

2002-11-20 Thread Tyler Durden
TECTED]> CC: [EMAIL PROTECTED], <[EMAIL PROTECTED]> Subject: Re: Psuedo-Private Key (eJazeera) Date: Wed, 20 Nov 2002 15:49:55 -0500 (EST) On Wed, 20 Nov 2002, Tyler Durden wrote: > to have a big jpg of a hand with middle finger extended...) More than this, > they will have unkn

Re: Psuedo-Private Key (eJazeera)

2002-11-20 Thread dmolnar
On Wed, 20 Nov 2002, Tyler Durden wrote: > to have a big jpg of a hand with middle finger extended...) More than this, > they will have unknowingly destroyed the real data. (Perhaps a 3rd key is > needed that DOESN'T destroy the original data, just 'hides' it a la > Rubberhose.) The question I've

Re: Psuedo-Private Key (eJazeera)

2002-11-20 Thread Tyler Durden
e original data, just 'hides' it a la Rubberhose.) And of course, we'd like to be able to do this on a message-by-message basis. From: Keith Ray <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] Subject: Re: Psuedo-Private Key (eJazeera) Date: Wed, 20 Nov 2002 10:49:43 -0600 Qu

Re: Psuedo-Private Key (eJazeera)

2002-11-20 Thread Keith Ray
Quoting Tyler Durden <[EMAIL PROTECTED]>: > WOULDN'T IT BE NICE...If the original encrypted message actually had TWO > messages inside it, both very similar. In this example, one of the messages > is the "incriminating" pictures of the demonstration, the other is pictures > of Pam Anderson or w

Psuedo-Private Key (eJazeera)

2002-11-20 Thread Tyler Durden
Sorry to be a blabbermouth folks, but this one is interesting. Delete anything I've written in the last two days if ya' want. Here's something I've been thinking about for various reasons. I'm assuming this doesn't exist yet, but it's such an interesting idea I'm tempted to brush the dust off m