Dear Sir/Madam, I am trying to stir some interest in my cryptography software/algorithm website (which I consider to break new ground in the field of cryptography): http://www.leopard.uk.com (It is C++ software for *BSD and Linux). The 4 items available are: C12G16 (E-mail crypto) L15 (CSPRNG). IBAA32/64 (CSPRNG). Rick Carey
May I ask what you strive to achieve by specifically stating in your license that: This software may not be used for terrorism, paedophilia or crimes against humanity. Or are you just trying to make sure that terrorists don't just get killed in action and/or sentenced to death (mutiple times in some countries) but also sentenced to whatever is says for breaking an arbitrary user agreement? It's not like a law, rule or ethic of any kind is going to stop any of those 3, if it did they wouldn't exist. We can therefore conclude that you cannot have included it to actually stop those three. Is it then a statement against those? Sort of a "I do not agree with (condone) the activities" of those three? Personally I think stating that you fear this to be used for those things is helping them, some of them exist only to cause such fear. And why should you poise technological process with such fear? -Lewis 2011/8/7 John Young <jya@pipeline.com>
Dear Sir/Madam,
I am trying to stir some interest in my cryptography software/algorithm website (which I consider to break new ground in the field of cryptography):
(It is C++ software for *BSD and Linux).
The 4 items available are:
C12G16 (E-mail crypto) L15 (CSPRNG). IBAA32/64 (CSPRNG).
Rick Carey
May I ask what you strive to achieve by specifically stating in your
license that:
This software may not be used for terrorism, paedophilia or crimes against humanity.
It's ok, Lewis. I'll be releasing a crypto library soon that explicitly allows crimes against humanity, if that's the bit that's getting in your way. Mike.
Thanks. This isn't completely useless though, I always have my drug smuggeling and thefts that could use a little bit of crypto. 2011/8/8 Michael Nelson <nelson_mikel@yahoo.com>
May I ask what you strive to achieve by specifically stating in your
license that:
This software may not be used for terrorism, paedophilia or crimes against humanity.
It's ok, Lewis. I'll be releasing a crypto library soon that explicitly allows crimes against humanity, if that's the bit that's getting in your way.
Mike.
On 2011-08-08, lodewijk andri de la porte wrote:
Thanks. This isn't completely useless though, I always have my drug smuggeling and thefts that could use a little bit of crypto.
Such pettiness. We're still waiting for the fifth horseman, and you're not helping him along. -- Sampo Syreeni, aka decoy - decoy@iki.fi, http://decoy.iki.fi/front +358-50-5756111, 025E D175 ABE5 027C 9494 EEB0 E090 8BA9 0509 85C2
2011/8/8 Sampo Syreeni <decoy@iki.fi>:
Such pettiness. We're still waiting for the fifth horseman, and you're not helping him along.
Could the Fifth Horseman be Whistleblowing? I'm sure The Powers That Be consider that to be as great a threat as terrorism, child porn, money laundering, or drugs. -- Neca eos omnes. Deus suos agnoscet. -- Arnaud-Amaury, 1209
On 2011-08-08, Steve Furlong wrote:
Could the Fifth Horseman be Whistleblowing? I'm sure The Powers That Be consider that to be as great a threat as terrorism, child porn, money laundering, or drugs.
No. It's far too pure, white and clean. What we want here is at least one exceedingly profitable career in tabloid journalism. Post-Breivik it might just be that manure hauling could hit the spot. -- Sampo Syreeni, aka decoy - decoy@iki.fi, http://decoy.iki.fi/front +358-50-5756111, 025E D175 ABE5 027C 9494 EEB0 E090 8BA9 0509 85C2
Isn't the Internet the 5th horseman, so saith Cyber Command underlings recruiting at DefCon and all the universities and hacker hangouts and net cybersecurity-as-crime forums. Nice thing about the horsemen is that you got to be one to know how to fight them for many, many years, with budget upgrades by "unexpected" failures. Human failures always the best. Insiders next best. Never you or us angels. Today GAO issued a study of State Department worldwide information security evaluation and not once mentioned Wikileaks which only weeks ago was State's horse to bet on for great gobs of additional cyber security. Must be policy to keep secret from the public the greatest threat. Shhh. Ok, ok, so it was DoD who let the State's swayback out of the barn and Cyber Command promises to not ever let that happen again as soon as Bradley Manning agrees to become a poster boy recruiter of hackers for the NSA who failed, failed, failed, OMG how those hovering buzzards missed the emanations of FOB Gaga. Or did they? Was it a trap all along, poor Bradass87 the bait? State thinks DoD ran Bradley in an op. Bet on that filly.
On 2011-08-08, John Young wrote:
Isn't the Internet the 5th horseman, so saith Cyber Command underlings recruiting at DefCon and all the universities and hacker hangouts and net cybersecurity-as-crime forums.
I think it's the horse. -- Sampo Syreeni, aka decoy - decoy@iki.fi, http://decoy.iki.fi/front +358-50-5756111, 025E D175 ABE5 027C 9494 EEB0 E090 8BA9 0509 85C2
<I think it's the horse. More or less quite true. That is why the horsemen are so fervently deployed as narcotic diversions. Drugged I offer a pointer to an August 5 mathematician's review of a recent book about Bayes theory helping break Enigma and other humcomsec decoys: http://www.nytimes.com/2011/08/07/books/review/the-theory-that-would-not-die -by-sharon-bertsch-mcgrayne-book-review.html Actually he teases little of Enigma, enigmatically.
On Mon, Aug 08, 2011 at 05:46:33PM -0400, Steve Furlong wrote:
2011/8/8 Sampo Syreeni <decoy@iki.fi>:
Such pettiness. We're still waiting for the fifth horseman, and you're not helping him along.
Could the Fifth Horseman be Whistleblowing? I'm sure The Powers That
Ding-Ding. We may have a winner!
Be consider that to be as great a threat as terrorism, child porn, money laundering, or drugs.
-- Eugen* Leitl <a href="http://leitl.org">leitl</a> http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE
Ding-Ding. We may have a winner!
Very true. Whistleblowing was invented for officials to disclose marked-up, tagged and shrewdly redacted information. There is an international organization of whistleblowers to assure a steady flow, funded by shadowy sources. Beyond that obviously professional outlet there are: Open and secret generous grants available to scholars, renegades, freedom fighters, hackers, siphoners, aggregators, search engines, coders, Tors, leakers, spammers, Chinese, Iranians, Israelis, rogues, drug kingpins, kiddie porn baiters, civil liberty unions, unions, agitators, organizers of the poor and the filthy rich, tweeters and speakers, priests and TLC givers, every conceivable exceedingly fine-grained minority and social and economic injustice aggrievers, Wall Street and off-shore greeders, why there is hardly any way to avoid getting a piece of the pie directly or indirectly, say, through an amazingly lucky break and recognition of your long-overlooked talent, a door opened just for you and your angry bitch gnawing your deadbeat balls. Whistleblowing is a satisfying blow job. That's a recruiting slogan.
Don't know if you saw this one. Would apply to pinpads... "Thermal cameras can steal ATM PINs" http://www.msnbc.msn.com/id/44178369/ns/technology_and_science-security/ Mike
On Fri, 19 Aug 2011, Michael Nelson wrote:
Don't know if you saw this one. Would apply to pinpads...
"Thermal cameras can steal ATM PINs" http://www.msnbc.msn.com/id/44178369/ns/technology_and_science-security/ Mike
Old news. We were doing that in the early "aughts". I'm waiting for a pinpad that maintains a uniform temperature to get around this. //Alif -- I hate Missouri. Land of the free, home of the perjuriously deranged.
J.A. Terranson wrote:
Old news. We were doing that in the early "aughts". Yes, it had a familiar ring to it... I was wondering what the UCSD people meant as their contribution. Presumably getting it to work in the ATM setting.
Same family of attacks as the thin powder or other film over the keypad. A friend of mine who worked for the govt, had an rsa "Pwnie-Token", and he said that after a several years the buttons that he used for the PIN developed indentations...
I'm waiting for a pinpad that maintains a
uniform temperature to get around this. Hard to achieve sufficiently quick response. How about the keys have independent heating elements so that they can be randomized. And of course there is the distribution of heat across each key surface... Mike
Simply wire some wire behind the keys and heat them in irregular patterns, also make them run quite hot. Don't make the wires to small to produce an IDable pattern upon the keys. Never let them cool to close to room temperature. That way whatever pattern there is in the heating (now cooling) of the buttons cannot be the buttons pressed. Also it keeps the snow of the board. Lewis 2011/8/23 Michael Nelson <nelson_mikel@yahoo.com>
J.A. Terranson wrote:
Old news. We were doing that in the early "aughts". Yes, it had a familiar ring to it... I was wondering what the UCSD people meant as their contribution. Presumably getting it to work in the ATM setting.
Same family of attacks as the thin powder or other film over the keypad. A friend of mine who worked for the govt, had an rsa "Pwnie-Token", and he said that after a several years the buttons that he used for the PIN developed indentations...
I'm waiting for a pinpad that maintains a
uniform temperature to get around this.
Hard to achieve sufficiently quick response. How about the keys have independent heating elements so that they can be randomized. And of course there is the distribution of heat across each key surface...
Mike
participants (7)
-
Eugen Leitl
-
J.A. Terranson
-
John Young
-
lodewijk andré de la porte
-
Michael Nelson
-
Sampo Syreeni
-
Steve Furlong