-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Meyer wrote:
"So far, U.S. and European authorities battling terrorism and cybercrime have apparently focused their surveillance elsewhere. The FBI and the National Security Agency, which monitors international telecommunications, declined to comment on what strategy, if any, they have for dealing with remailers." That would have made the article much more interesting.. What *is* the FBI/etc.'s strategy on dealing with remailers, other than ignoring them (and hoping that anti-spam/anti-terror legislation will make them illegal?)
I don't know, how about traffic analysis? Exploiting (publicly) undisclosed holes in the remailer software? Exploiting (publicly) undisclosed holes in PGP? That certainly seems like a fruitful place to dump research money. Good old-fashioned deception isn't exactly rocket science, either. How about suckering people into routing traffic through an ever-increasing number of corrupt nodes, either by: 1) running them covertly 2) buying off "trusted pillars of the crypto community" and trading on their reputation capital? A sobering thought. Or how about this one: enticing people interested in developing cryptography into an closed system based in Canada (international, so using full-blown Echelon technology against it isn't a problem) offering "secure" messaging, file storage, sharing and transmission etc. while promising them the moon about being a no-compromise information-haven phuck-the-state all-your-eggs-in-one - -basket crypto system? Oh wait, it's called CryptoHeaven. Nevermind. Not that I'm claiming the first thing about them--it's just that if I were trying to come up with a way to gather information on people interested in developing privacy and cryptography technology, setting up a compromised CryptoHeaven-like system on behalf of the United States Government would be IDEAL. Or at the very least,inserting some bad actors into the system to root up the vulnerabilities couldn't hurt. Not to mention cultivating "trusted insider" informants. At any rate, any company that lays on the "trust us!!" razzamatazz that thick makes me nervous. The fact that you it gives you zero opportunity for compartmentalization ought to be a red flag. Bad OPSEC makes for shitty tradecraft. I just can't say this enough: one of the drawbacks of viewing all feds as donut-chomping incompetents is that it fosters a false sense of complacency. Underestimating your adversary never did anyone a bit of good. Something to think about, anyway. ~Faustine. *** As nightfall does not come at once, neither does oppression....There is a twilight when everything remains seemingly unchanged. And it is in such a twilight that we must be most aware of change in the air however slight lest we become unwitting victims of the darkness. - --William O. Douglas, Associate Justice, US Supreme Court -----BEGIN PGP SIGNATURE----- Version: PGPsdk version 1.7.1 (C) 1997-1999 Network Associates, Inc. and its affiliated companies. (Diffie-Helman/DSS-only version) iQA/AwUBPBfQI/g5Tuca7bfvEQIz+gCffs/DSkAHpK/PU2yxx6QcddQSNAoAoOw3 CHApBSii8Tk3bTaeEzr/xdFh =4PZs -----END PGP SIGNATURE-----
On Wed, 12 Dec 2001, Faustine wrote:
Underestimating your adversary never did anyone a bit of good.
Sure it does, it helps the ones who are underestimated. -- ____________________________________________________________________ Day by day the Penguins are making me lose my mind. Bumper Sticker The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage@ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- --------------------------------------------------------------------
On Wed, 12 Dec 2001, Faustine wrote:
I don't know, how about traffic analysis?
Yes, but see my previous post.
Exploiting (publicly) undisclosed holes in the remailer software?
Same problem as traffic analysis if you are talking about compromising the remailer. Doesn't work after the fact. (Plus, the risk of detection is certainly non-zero.) If you're talking about exploiting flaws in the remailer message encryption or in the mix-net protocol, that would work, but also would rely upon having remailer traffic be intercepted and collected for later analysis.
Good old-fashioned deception isn't exactly rocket science, either. How about suckering people into routing traffic through an ever-increasing number of corrupt nodes, either by: 1) running them covertly 2) buying off "trusted
Stats manipulation has been discussed before. (LEAs run remailers, and then ensure that their remailers are at the top of the stats pages, either by falsifying stats or causing legitimate remailers to sink lower on the stats then LEA remailers.) Another half-decent attack if planned in advance.
pillars of the crypto community" and trading on their reputation capital? A sobering thought.
I'm not skeptical as to how effective that would be. Look at all the times that Phil Zimmermann has been accused of being in bed with the Government. I'm not sure there are any "trusted pillars of the crypto community".
Or how about this one: enticing people interested in developing cryptography into an closed system based in Canada (international, so using full-blown Echelon technology against it isn't a problem)
Except for the pesky fact that the NSA can't spy on US citizens, even if they're in Canada. (Exceptions can be made, but the hoops become higher and more numerous than a simple FBI investigation.)
offering "secure" messaging, file storage, sharing and transmission etc. while promising them the moon about being a no-compromise information-haven phuck-the-state all-your-eggs-in-one -basket crypto system?
Oh wait, it's called CryptoHeaven. Nevermind.
Yes, well. My thoughts on CryptoHeaven are already on the record on this list.
Not that I'm claiming the first thing about them--it's just that if I were trying to come up with a way to gather information on people interested in developing privacy and cryptography technology, setting up a compromised CryptoHeaven-like system on behalf of the United States Government would be IDEAL. Or at the very least,inserting some bad actors into the system to root up the vulnerabilities couldn't hurt. Not to mention cultivating "trusted insider" informants.
Smells like entrapment, though. -MW-
participants (3)
-
Faustine
-
Jim Choate
-
Meyer Wolfsheim